Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Movable external memory content enciphering method independent of computer

A computer and content technology, applied in the direction of protecting stored content from loss, preventing unauthorized use of memory, etc., can solve problems such as the general limitations of mobile external storage devices, and the lack of reliable protection of content, and the method is simple, practical, and efficient. Increased security and ease of use, high reliability effects

Inactive Publication Date: 2003-06-04
LENOVO (BEIJING) CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The versatility of the mobile external storage device is greatly limited, and the content therein cannot be reliably protected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Movable external memory content enciphering method independent of computer
  • Movable external memory content enciphering method independent of computer
  • Movable external memory content enciphering method independent of computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0016] In the present invention, the step of running the encryption program can also be realized by installing and running the encryption program in the mobile external storage in the computer.

[0017] In one embodiment of the present invention, when the mobile external memory is inserted into the computer, the encryption program in the mobile external memory is installed in the computer; after the encryption program is installed in the computer, the computer automatically runs the encryption program every time it is started. program.

[0018] The method of the present invention can be independent of the computer and only relies on the mobile external storage to realize the encryption of the content of the mobile external storage, thereby greatly increasing its security and ease of use; when the mobile external storage encrypted according to the present invention is inserted into any computer After connecting the USB interface, the encryption method of the present invention w...

Embodiment 1

[0026] figure 1 and figure 2 is a flowchart illustrating the embodiment.

[0027] 1. First, there needs to be a program for setting a password for the mobile external storage. This program is an independent program installed in the operating system. This program provides functions of password setting and password erasing. When the user needs to set a password for the mobile external storage, call this program, and the program will store the set password in a special location of the mobile external storage and hide it. There are many methods for hiding passwords, and the functions of these methods for hiding passwords are also strong or weak, which can be selected according to user needs. When the user forgets the password of the mobile storage, the password of the mobile storage can be deleted on this machine. (The computer that installs the password setting program can have the authority to set, modify, and delete the password of the mobile external storage)

[0028] 2. ...

Embodiment 2

[0035]The biggest difference between Embodiment 2 and Embodiment 1 is that the encryption program is activated in different ways, such as image 3 shown. Embodiment 2 mainly utilizes the principle similar to the automatic operation of a CD. At the same time, the encryption program is installed in the computer, rather than just loaded into the computer memory as in Embodiment 1, so this scheme will leave traces in the computer.

[0036] 1. First, there is a program for setting a password for the mobile external storage, which can be the same as that described in Embodiment 1, such as figure 1 shown.

[0037] 2 Secondly, place an AUTORUN.INF file in the root directory of the mobile memory (this file is mainly used to automatically run the contents of the mobile memory when it is just inserted , the disc can be automatically started), the file is read-only, but not hidden, and the file is always readable and will not be encrypted.

[0038] 3. At the same time, the encryption p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method of enciphering the content of movable external memory includes the following steps: running one cipher setting program set in the computer operation system for setting the access cipher tothe movable external memory to set cipher and store the cipher in the movable external memory by the user; and running the enciphering program set in the movable external memory through inputting cipher while the movable external memory is run by the computer user or operation system for the first time after being inserted. When the input cipher is the same as that in the movable external memory,the computer user or operation system is allowed to access the movable external memory. The present invention makes the enciphering to the movable external memory independent on computer and universal while ensuring the data safety and reliability.

Description

Technical field [0001] The invention relates to a method for encrypting content in a mobile external storage, which is used for prohibiting unauthorized access to the mobile external storage. Background technique [0002] Mobile external memory is a removable storage device that uses semiconductor memory as a storage medium and has an interface with a computer. For example, a commonly used mobile external memory is also called a "USB flash drive". As a storage medium, it adopts USB (Universal Serial Bus) interface. This kind of mobile external storage is small in size, large in storage capacity and easy to carry, and can support plug and play. However, the mobile external storage may be lost or read and written by others, and there may be many personal or confidential data in the mobile external storage, or content that you do not want to be opened and used by others. The content is encrypted and protected, and can only be used by those who have the right to use it. At pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F12/14G06F12/16
Inventor 李学文刘江
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products