Unlock instant, AI-driven research and patent intelligence for your innovation.

Storage system having security storage device and management method therefor

A technology for secure storage and storage systems, applied in memory systems, computer security devices, electrical digital data processing, etc., can solve problems such as account and password theft, information disclosure, account and password leakage, etc.

Active Publication Date: 2016-08-17
CIDISK KOREA CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, as in the above-mentioned Korean Patent Laid-Open (10-2009-0067649), most storage device security systems can use an encrypted security area by entering an account number and password, or only a password, so there is a problem of reduced security
[0009] That is, there is a problem in the conventional storage device security system, that is, as long as the account and password or only the password are leaked, the information used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Storage system having security storage device and management method therefor
  • Storage system having security storage device and management method therefor
  • Storage system having security storage device and management method therefor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] Hereinafter, the configuration and operation of a storage system having a secure storage device according to the present invention will be described with reference to the drawings, and a method for managing the secure storage device in the system will be described.

[0059] figure 1 is a diagram showing the structure of a storage system with a secure storage device of the present invention, Figure 5 It is a diagram showing the data storage structure of the secure storage device of the present invention, below, refer to figure 1 and Figure 5 Be explained.

[0060] The storage system with a secure storage device of the present invention includes an application unit 100 , a kernel layer unit 200 , a storage unit 300 and a secure application unit 600 .

[0061] The storage unit 300 of the present invention is a large-capacity storage device with a capacity of any size such as 16G, 32G, 100G, 1T, etc., such as Figure 5 As shown, the above-mentioned storage unit 300 in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a storage system of a computer and, more particularly, to a storage system and method having a security storage device including a security disk area, wherein the existence or absence of the security disk area cannot be known through the application of an operating system in a deactivated state, and the security disk area can be activated and used only by a digital key and password when a user's password is input through an application including the digital key.

Description

technical field [0001] The present invention relates to a storage system of a computer, and in more detail, to a storage system and method with a secure storage device including a secure disk area. When the secure storage device is in an inactive state, it is impossible to know whether the There is a secure disk area, which is activated and used only when the user enters the password through the application including the numeric keys by means of the above-mentioned number keys and a password. Background technique [0002] With the popularization and popularity of high-speed networks and the integration of wireless communication technologies, a cloud computing environment can be connected to wireless networks and receive various services anytime and anywhere. [0003] Moreover, with the popularization of various computers such as desktop computers, notebook computers, tablet computers, smart phones and smart touch panels, most users store important information in computers fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/78G06F21/70
CPCG06F3/0622G06F3/0637G06F3/0674G06F21/6209G06F12/1408G06F12/1466
Inventor 权龙求
Owner CIDISK KOREA CO LTD