Wireless authentication secretive mobile storage apparatus and encryption authenticating method

A mobile storage device, encryption authentication technology, applied in security devices, wireless communications, computer security devices, etc., can solve the problems of confidentiality loopholes, complicated operations, easy to leak, etc., to prevent leakage, protect privacy, and ensure security. Effect

Inactive Publication Date: 2018-03-30
卢冠熊
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above two encryption devices have good encryption effects, but there are also the following problems: cumbersome to use, passwords must be entered every time, passwords are easy to forget, and the user experience is relatively poor; passwords are frequently entered and easily leaked; cost is high, encryption/decryption requires hardware circuit, and the cost of encryption/decryption IC is high; there are loopholes in confidentiality: if the user decrypts and uses the data in the mobile storage device, but leaves in the middle of a public place, there are also scenarios where the da

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless authentication secretive mobile storage apparatus and encryption authenticating method
  • Wireless authentication secretive mobile storage apparatus and encryption authenticating method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0023] The following specific examples illustrate the implementation of the present invention. Those familiar with the technology can easily understand other advantages and effects of the present invention from the content disclosed in this specification.

[0024] See figure 1 , 2 . It should be noted that the structure, ratio, size, etc. shown in the accompanying drawings in this specification are only used to match the content disclosed in the specification for the understanding and reading of those familiar with this technology, and are not intended to limit the implementation of the present invention Limited conditions, so it has no technical significance. Any structural modification, proportional relationship change or size adjustment should still fall under the present invention without affecting the effects and objectives that can be achieved by the present invention. The disclosed technical content must be within the scope of coverage.

[0025] Such as figure 1 As shown, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a wireless authentication secretive mobile storage apparatus. The wireless authentication secretive mobile storage apparatus comprises a data storage apparatus and an encryptionauthenticating apparatus; the data storage apparatus includes a data storage module, a first communication module, an encryption authenticating module and a data operation control module; the encryption authenticating apparatus includes a second communication module and an authentication code sending module; and when the first communication module is in a communication connection with the secondcommunication module, the authentication code sending module is used for sending an authentication code to the encryption authenticating module, the encryption authenticating module is used for performing authentication on the authentication code and sending authentication information to the data operation control module, and the data operation control module is used for controlling a read/write operation of the data storage module. The wireless authentication secretive mobile storage apparatus is provided with the special encryption authenticating apparatus, so only after being encrypted by the encryption authenticating apparatus, the data can be transmitted; and in this way, the security of the data in the mobile storage apparatus can be effectively guaranteed, the leakage is avoided, and the privacy of a user is protected better.

Description

technical field [0001] The invention relates to a mobile storage device, in particular to a mobile storage device capable of realizing wireless authentication and having a security function. Background technique [0002] At present, mobile storage devices (such as U disk, mobile hard disk, etc.) are widely used in daily life and work; mobile storage devices bring convenience to everyone's data exchange and data transfer; make people's life and work more convenient, but a large number of Frequent and frequent replacement of data exchange locations also brings about data security issues. [0003] A large number of products have also appeared on the market for the security of mobile storage devices. However, in summary, there are several implementation methods as follows: The first method: establish an encryption / decryption device in the mobile storage device to perform data storage on the stored data. Encryption, every time you use it, you need to enter the password through t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W12/06G06F21/60G06F21/78
CPCH04L63/08H04W12/06G06F21/602G06F21/78
Inventor 卢冠熊
Owner 卢冠熊
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products