U disk security encryption management method

A management method and security encryption technology, which is applied in the field of U disk security encryption management, can solve problems such as incompatibility, inconvenient use, and insecurity, and achieve the effects of not being easy to decrypt and improving use efficiency

Inactive Publication Date: 2017-02-01
WUHU ZHENHUA RONGKE INTELLIGENT TECH
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the encrypted U disks only emphasize the individual key authentication of the U disk, which can only be used confidentially and cannot be used universally; at the same time, after entering the encryption area, if the user wants to leave temporarily, the encrypted U disk on the market can only be unplugged. When the encrypted U disk is used again, the encrypted U disk can only be reinserted into the machine, which is very inconvenient and not safe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • U disk security encryption management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The preferred technical solutions of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0021] U disk safety encryption management method of the present invention comprises the following steps:

[0022] 1) Connection: Switch the switch of the U disk to the interface connection state, connect the U disk to the host through the main interface, or switch the switch of the U disk to the wireless connection state, and connect the U disk to the host through the wireless connection module;

[0023] 2) Login: When the U disk is connected to the host through the main interface, the input procedure of the login password is required. When the U disk is connected to the host through a wireless connection, it is necessary to log in through the login module, and through the wireless connection security module to Scan the signal of wireless connection to ensure the security of the wireless connection environment;

[0024] 3) Commo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a U disk security encryption management method. The method comprises the following steps of 1) establishing a connection; 2) performing login; 3) performing general region operation; 4) performing encrypted region operation; 5) performing transmission file security management; 6) performing storage file security management; and 7) performing hardware environment security management. According to the U disk security encryption management method, a general region is arranged in a U disk, so that the U disk is used as a general U disk; an encrypted region is arranged in the U disk, so that the U disk is used as an encrypted U disk; the encrypted region is hidden when not in use; when the encrypted region needs to be used, the login is performed as an administrator through a login display program set in the encrypted region, so that files of the encrypted region can be displayed; each encrypted file is provided with an encryption end and an independent encryption program, so that the encrypted files are very secure and difficult to decrypt; and the usage efficiency of the U disk is fully improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for securely encrypting a USB disk. Background technique [0002] With the popularization of computer applications, U disks are widely used in secret-related systems, which makes U disks an important object for criminals to steal secrets. Especially mobile storage products, because data information needs to be frequently exchanged on multiple computers, or used by multiple people, so the protection of information security is particularly important. Most of the encrypted USB flash drives only emphasize the individual key authentication of the USB flash drive, which can only be used confidentially and cannot be used universally; at the same time, after entering the encryption area, the encrypted USB flash drive on the market can only be unplugged if the user wants to leave temporarily. When the encrypted U disk is used again, the encrypted U disk can only be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/79G06F21/74G06F21/62
CPCG06F21/79G06F21/6218G06F21/74G06F2221/2113G06F2221/2125
Inventor 徐超谭守标李正平黄林生许耀华
Owner WUHU ZHENHUA RONGKE INTELLIGENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products