Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A secure USB disk for solid state disk authentication

A solid-state hard disk, secure technology, applied in the protection of internal/peripheral computer components, instruments, digital data authentication, etc., can solve the problem of low security, operability and efficiency, single mode encryption storage method, reducing data security and other problems, to achieve the effect of complete data destruction, improvement of security performance, and prevention of illegal intrusion or cracking

Inactive Publication Date: 2019-01-11
HANGZHOU DIANZI UNIV
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In short, the security, operability and efficiency of the encryption method or authentication method of the solid-state hard disk currently on the market are not very high. In order to meet the above requirements, there is also a U disk in the prior art to perform related operations combined with the solid-state hard disk. , see patent application document 105354479A, a solid-state hard disk and data hiding method based on U-disk authentication (application number is 201510737530.9), however, in the technical solution recorded in this patent document, the U-disk introduced is only used as a load-bearing transmission solid-state hard disk The medium of the safe storage area key, that is, when the USB flash drive is inserted, there will be an extra partition on the SSD module. This partition is the area where the encrypted information that needs the key to open is located. It is easy to be cracked by unauthorized persons using holes, which greatly reduces the security of data
[0006] At the same time, in terms of hard disk data destruction, the existing technology mainly uses special data destruction software to repeatedly erase and write the hard disk. However, the defect of this data destruction method is that the data is not completely destroyed, especially for Solid-state hard drives, it is difficult to completely destroy data, and it takes a long time to destroy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure USB disk for solid state disk authentication
  • A secure USB disk for solid state disk authentication
  • A secure USB disk for solid state disk authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be further described below in conjunction with the accompanying drawings.

[0032] In order to address the shortcomings of the prior art, see Figure 4 and 5 , the invention discloses a secure USB flash drive for solid-state hard disk authentication, including a secure USB flash drive and a solid-state hard drive (SSD) connected to a host, and the secure USB flash drive at least includes a first interface module and a USB flash drive controller , a first authentication module and a user login management module, the SSD at least includes a second interface module, an SSD controller, a second authentication module and a data storage module, wherein the first interface module is connected to the host for realizing The secure U disk communicates with the outside; the second interface module is connected with the host for data communication between the SSD and the outside; the U disk controller is connected with the first interface module, the fir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure USB disk for solid state hard disk authentication, the secure USB disk comprising at least a first interface module, a USB disk controller, a first authentication module and a user login management module. An operating system is built in the U disk controller for starting when the host computer detects the access of the secure U disk and completing the U disk authentication operation and the user authentication operation with the SSD accessed to the operating system by the operating system. When the USB disk authentication and the user authentication are successful, the USB disk controller sends an unlock instruction to the SSD to unlock the SSD, otherwise, the SSD is in a fully locked state. Through the technical scheme of the invention, only after the authentication of the U disk and the authentication of the user are passed, can the encrypted solid-state hard disk uniquely corresponding to the encrypted solid-state hard disk be decrypted.

Description

technical field [0001] The invention relates to the fields of data encryption, data storage, data transmission and data authentication, in particular to a safe USB disk used for solid-state hard disk authentication. Background technique [0002] With the continuous development of science and technology, the data security of computer hard drives has always been the focus of social attention. Due to the progress in flash memory device technology, solid state drives have been greatly strengthened as the preferred storage medium. consolidate. In recent years, due to the theft of information in solid-state drives, serious leakage problems have been caused, and in some special fields such as aerospace and financial fields, there are high requirements for data security, and there is a need for safe destruction of original data in solid-state drives. Therefore, it is extremely important to perform high-strength encryption on solid-state drives. [0003] The encryption method of so...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46G06F21/80
CPCG06F21/46G06F21/80G06F2221/2143
Inventor 樊凌雁赵经天方立春
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products