Encrypted solid state disk capable of being automatically authorized and automatic authorization method

A technology of solid-state hard disk and automatic authorization, which is applied in the direction of instruments, digital data authentication, electronic digital data processing, etc., can solve the problems of poor safety and reliability, high cost, low security, etc., achieve high security, meet application requirements, reduce The effect of unlock time

Pending Publication Date: 2019-11-26
AXD (ANXINDA) MEMORY TECH CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The above-mentioned method mainly has the following defects: First, the existing technology uses a board composed of an encryption chip to authorize and encrypt the hard disk. It is necessary to manually enter the key to read the data of the SSD solid-state hard disk. Users often have problems with data access due to forgetting the password. , and the cost of the implementation process is relatively high; secondly, due to the use of the password input processing method, the security setting of the password strength has higher requirements, especially when entering the password each time it takes a long time, the operation process is relatively It is cumbersome and inefficient; in addition, the security of the existing authorized encryption method is not high, as long as others have the password, they can unlock the hard disk by entering the password, and then realize the information reading, which is poor in security and reliability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted solid state disk capable of being automatically authorized and automatic authorization method
  • Encrypted solid state disk capable of being automatically authorized and automatic authorization method
  • Encrypted solid state disk capable of being automatically authorized and automatic authorization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be described in more detail below in conjunction with the accompanying drawings and embodiments.

[0021] The invention discloses an encrypted solid-state hard disk capable of automatic authorization, which combines figure 2 with image 3 As shown, it includes a hard disk body 1, a data protocol processor 2, a radio frequency read-write module 3 and a radio frequency transponder 4, and the hard disk body 1, the data protocol processor 2 and the radio frequency read-write module 3 are connected in sequence, wherein:

[0022] The radio frequency transponder 4 is used to store identity information;

[0023] The radio frequency reading and writing module 3 is used to establish radio frequency communication with the radio frequency transponder 4, and then read the identity information stored in the radio frequency transponder 4;

[0024] The data protocol processor 2 is used to receive the identity information read by the radio frequency read-wr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encrypted solid state disk capable of automatic authorization. The solid state disk comprises a hard disk body, a data protocol processor, a radio frequency read-write module and a radio frequency transponder. The hard disk body, the data protocol processor and the radio frequency read-write module are connected in sequence, and the radio frequency transponder is used for storing identity information. The radio frequency read-write module is used for establishing radio frequency communication with the radio frequency transponder so as to read identity information stored in the radio frequency transponder. The data protocol processor is used for receiving the identity information read by the radio frequency read-write module, verifying the identity information according to a preset data processing protocol, and allowing the operating system to read and write the hard disk body after the verification is passed. According to the invention, a plurality of defectscaused by encryption processing of a hard disk by a board card formed by a traditional encryption chip are solved. Meanwhile, the unlocking time of the hard disk is shortened to a great extent, and the verification and unlocking efficiency is greatly improved.

Description

technical field [0001] The invention relates to an SSD solid state hard disk, in particular to an encrypted solid state hard disk capable of automatic authorization and an automatic authorization method. Background technique [0002] In the existing technology, the traditional solid-state hard disk encryption method is basically processed through digital passwords. In the SSD solid-state hard disk storage industry, the innovative automatic authorization encrypted solid-state hard disk is the method that all enterprises urgently want to solve, and the most methods on the market It uses a board composed of an encryption chip as an adapter board, and then the SSD solid-state hard disk is plugged into this adapter board to process through the encryption chip, thereby encrypting the hard disk, see figure 1 , the basis for its technical realization is: the SSD solid-state hard disk is encrypted through a fixed algorithm encryption chip through plaintext and ciphertext, such as AES...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/79G06F21/44G06F21/60
CPCG06F21/44G06F21/602G06F21/79
Inventor 李修录朱小聪尹善腾吴健全
Owner AXD (ANXINDA) MEMORY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products