Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for safe operation of stored data

A technology for safe operation and data storage, applied in the information field, can solve problems such as poor operating experience, and achieve the effect of saving storage space and high user experience

Active Publication Date: 2020-09-25
HUNAN GOKE MICROELECTRONICS +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this requires customized BIOS (i.e. extended BIOS functions), considering the differences of various BIOS manufacturers, this is almost impossible, and requires the user to manually enter an identity key to unlock the hard disk, which has a poor operating experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for safe operation of stored data
  • Method and system for safe operation of stored data
  • Method and system for safe operation of stored data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0027] The method and system for safe operation of s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and system for safe operation of stored data, and relates to the field of information technology. The method and system for safe operation of stored data read the encrypted identity information pre-stored in the second storage device when the second storage device is detected; and then send the encrypted identity information to the first storage device; Then, the first storage device decrypts the identity information and loads the system data after the verification is successful; finally, the operating system is run according to the system data, and the BIOS does not need to be expanded while the operating system is run safely, and no manual intervention is required, the user experience is high, and the security management The program is pre-stored in the first storage device, which saves the storage space of the host.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to a method and system for safe operation of stored data. Background technique [0002] Data security storage and applications have gradually been recognized by users, but how to facilitate the use of secure storage devices with encryption functions and how to seamlessly integrate with existing application scenarios is the key to determining whether the storage solution of encrypted storage devices can be accepted by users factor. [0003] At present, in the secure encryption storage devices with authentication included in the market, the data is stored in cipher text on the medium of the secure encryption storage device. Before accessing the data, the device needs to authenticate the user identity first. to access. The secure encrypted storage device with authentication needs to check the identity of the host user and only allows legitimate users to access the hard d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/78G06F21/31
CPCG06F21/31G06F21/602G06F21/78G06F21/6218G06F21/50G06F21/60G06F3/0623G06F3/0632G06F3/0673G06F9/4406G06F12/1408G06F2212/1052
Inventor 杨万云
Owner HUNAN GOKE MICROELECTRONICS