Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Wireless authentication secretive mobile storage apparatus and encryption authenticating method

A mobile storage device, encryption authentication technology, applied in security devices, wireless communications, computer security devices, etc., can solve the problems of confidentiality loopholes, complicated operations, easy to leak, etc., to prevent leakage, protect privacy, and ensure security. Effect

Inactive Publication Date: 2018-03-30
卢冠熊
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above two encryption devices have good encryption effects, but there are also the following problems: cumbersome to use, passwords must be entered every time, passwords are easy to forget, and the user experience is relatively poor; passwords are frequently entered and easily leaked; cost is high, encryption / decryption requires hardware circuit, and the cost of encryption / decryption IC is high; there are loopholes in confidentiality: if the user decrypts and uses the data in the mobile storage device, but leaves in the middle of a public place, there are also scenarios where the data cannot be kept secret; Confidentiality issues; if the password is entered frequently, there is a problem of poor operating experience
Therefore, the existing products have the problems of high cost, complicated operation and high requirements for confidentiality, which limits the wide promotion of this product. At present, it is only used in some fields where the applicable environment itself is good and users have a high awareness of confidentiality, such as confidentiality units. , Arrange special personnel for use in important business areas; greatly limit the use environment and users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless authentication secretive mobile storage apparatus and encryption authenticating method
  • Wireless authentication secretive mobile storage apparatus and encryption authenticating method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The implementation of the present invention will be illustrated by specific specific examples below, and those skilled in the art can easily understand other advantages and effects of the present invention from the contents disclosed in this specification.

[0024] see figure 1 , 2 . It should be noted that the structures, proportions, sizes, etc. shown in the drawings attached to this specification are only used to match the content disclosed in the specification, for those who are familiar with this technology to understand and read, and are not used to limit the implementation of the present invention. Limiting conditions, so there is no technical substantive meaning, any modification of structure, change of proportional relationship or adjustment of size, without affecting the effect and purpose of the present invention, should still fall within the scope of the present invention. The disclosed technical content must be within the scope covered.

[0025] Such as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a wireless authentication secretive mobile storage apparatus. The wireless authentication secretive mobile storage apparatus comprises a data storage apparatus and an encryptionauthenticating apparatus; the data storage apparatus includes a data storage module, a first communication module, an encryption authenticating module and a data operation control module; the encryption authenticating apparatus includes a second communication module and an authentication code sending module; and when the first communication module is in a communication connection with the secondcommunication module, the authentication code sending module is used for sending an authentication code to the encryption authenticating module, the encryption authenticating module is used for performing authentication on the authentication code and sending authentication information to the data operation control module, and the data operation control module is used for controlling a read / write operation of the data storage module. The wireless authentication secretive mobile storage apparatus is provided with the special encryption authenticating apparatus, so only after being encrypted by the encryption authenticating apparatus, the data can be transmitted; and in this way, the security of the data in the mobile storage apparatus can be effectively guaranteed, the leakage is avoided, and the privacy of a user is protected better.

Description

technical field [0001] The invention relates to a mobile storage device, in particular to a mobile storage device capable of realizing wireless authentication and having a security function. Background technique [0002] At present, mobile storage devices (such as U disk, mobile hard disk, etc.) are widely used in daily life and work; mobile storage devices bring convenience to everyone's data exchange and data transfer; make people's life and work more convenient, but a large number of Frequent and frequent replacement of data exchange locations also brings about data security issues. [0003] A large number of products have also appeared on the market for the security of mobile storage devices. However, in summary, there are several implementation methods as follows: The first method: establish an encryption / decryption device in the mobile storage device to perform data storage on the stored data. Encryption, every time you use it, you need to enter the password through t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04W12/06G06F21/60G06F21/78
CPCH04L63/08H04W12/06G06F21/602G06F21/78
Inventor 卢冠熊
Owner 卢冠熊
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products