Bracelet and terminal-based U disk encryption method and system

A disk encryption and wristband technology, which is applied in the field of U disk encryption based on bracelets and terminals, can solve problems such as data leakage, extortion, and top-secret data leakage.

Active Publication Date: 2017-02-15
深圳市魔样科技有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, there are main U-disk bracelets on the market, all of which have the function of ordinary U-disk, and the information will be leaked after being lost. Many people have been blackmailed because of the leak of top-secret information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bracelet and terminal-based U disk encryption method and system
  • Bracelet and terminal-based U disk encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to facilitate the understanding of the present invention, the present invention will be described more fully below with reference to the associated drawings. Preferred embodiments of the invention are shown in the accompanying drawings. However, the present invention can be embodied in many different forms and is not limited to the embodiments described herein. On the contrary, these embodiments are provided to make the understanding of the disclosure of the present invention more thorough and comprehensive.

[0036] It should be noted that when an element is referred to as being “fixed” to another element, it can be directly on the other element or there can also be an intervening element. When an element is referred to as being "connected to" another element, it can be directly connected to the other element or intervening elements may also be present. The terms "vertical," "horizontal," "left," "right," and similar expressions are used herein for purposes ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a bracelet and terminal-based U disk encryption method and system. A bracelet, a terminal and a U disk are initially matched and are mutually bound correspondingly and an authentication key is generated and stored. When data information in the U disk needs to be accessed, a command of obtaining an identity authentication key needs to be transmitted to the terminal; the identity authentication key is compared with the identity authentication key during initialization after being transmitted by the terminal; if the identity authentication keys are consistent, the bracelet is controlled to transmit a password obtaining command to the terminal; and the terminal transmits a preset password to the bracelet, so that read-write operation can be carried out on the U disk. That is to say, the identity authentication key of the terminal needs to be compared with that of the U disk, the preset password can be can be transmitted to the bracelet after correct comparison, and then a user completes the read-write operation according to the preset password. By adopting bidirectional authentication, encryption of the U disk is safer and more reliable through authentication for multiple times.

Description

technical field [0001] The invention relates to U disk encryption technology, in particular to a bidirectional authentication and high security U disk encryption method and system based on a bracelet and a terminal. Background technique [0002] With the progress of the times, bracelets have been widely used, and many bracelets have appeared in the market, including sports, fashion, and U disk. [0003] At present, the main USB flash drive bracelets have appeared on the market, all of which have the function of ordinary USB flash drives. After the loss, the data will be leaked. Many people have been blackmailed because of such top-secret data leaked. Now people pay great attention to their privacy, especially data, such as photos, work files, etc., all need to be encrypted. Contents of the invention [0004] Based on this, it is necessary to provide a U disk encryption method and system based on a bracelet and a terminal with two-way authentication and high security. [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/35G06F21/44H04L9/32H04M1/21H04W76/02
CPCG06F21/35G06F21/445G06F21/602H04L9/3273H04M1/21H04W76/14
Inventor 邓白涛孟帅陈有良
Owner 深圳市魔样科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products