Hand disk locking and de-locking control scheme based on USB key apparatus

A key device and control scheme technology, applied in the direction of instruments, electrical digital data processing, digital data processing components, etc., can solve the problems of low feasibility, trouble, slow operation speed, etc., and achieve the effect of solving huge workload

Inactive Publication Date: 2005-11-30
西安三茗科技股份有限公司
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is very troublesome to operate, and it is difficult for ordinary users to insist on using it, and it is more likely for a person who is familiar with encryption and file systems to crack this method
[0006] The general protection scheme is to identify the user's identity through the user name and user password. This identification method is based on character strings, and it has a high possibility of leakage. It is not as easy to store as a physical carrier, such as the magnetic card of a bank ATM. , you must have a physical magnetic card, user name and password to pass the identity verification
[0007] When the computer hard disk is scrapped, the usual method is to format it once, but this method is based on the operating system and has its obvious disadvantages
For example, the system partition in use cannot be formatted in the Windows operating system, so there is always a system partition in Windows that cannot be cleared
If the file system format of this partition happens to be NTFS, then its information cannot be erased in Dos
This is especially true for Linux systems. For hard disks used as Linux servers, after clearing other partitions, there will always be an EXT2 or EXT3 system partition that cannot be cleared.
Another method of hard disk scrapping is low-level formatting. Although this method can effectively clear every sector on the hard disk, its slow operation speed is unacceptable.
Today, as the hard disk capacity is getting larger and larger, its feasibility is also getting lower and lower

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hand disk locking and de-locking control scheme based on USB key apparatus
  • Hand disk locking and de-locking control scheme based on USB key apparatus
  • Hand disk locking and de-locking control scheme based on USB key apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be further described below in conjunction with the accompanying drawings and specific implementation.

[0031] Figure 1 shows the architecture of the program and the interaction of each part. After the user puts forward a lock and unlock request, the "authority information identification module" requires the user to insert the "USB key device" and enter the user name and password, and then the "authority information identification module" will call the "bottom USB driver module" to read out the "USB key device". After checking and authenticating the user's identity, the "authority information authentication module" will call the "hard disk lock and unlock execution module" to complete the hard disk lock and unlock. The control program is the core of the whole scheme, and all the affairs in the scheme are scheduled by the control program. The authority information authentication module provides a graphical input interface to the user, and disp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A control scheme for hard disc can realize reading and writing any sector of hard disc with corresponding rights through locking and unlocking hard disc finished instantly, and provides a managerial approach with multi-rights for USB key device. The scheme comprises a USB key device, a control program for locking and unlocking hard disc, said control program locks and unlocks hard disc according to the right information in key device through computer USB bus and USB key device communication.

Description

technical field [0001] The invention relates to the field of computer data security, and specifically provides a scheme for controlling the use of hard disks, especially a scheme for quickly locking and unlocking hard disks according to authority levels. Background technique [0002] As the most important medium for data storage today, hard disks are widely used in various computers. In most PC and notebook systems, the hard disk is the only data storage device. Ensuring the security of hard disk data is of great significance to the data security of the entire computer system. [0003] Today, with the popularization of computers, almost all companies use hard disks to store various important data of the company. According to statistics, most of the company's confidential data leaks are caused by poor management of the company's hard disks. Unscrupulous internal employees or outsiders can secretly copy the company's hard disk data or simply steal the hard disk to take away ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F1/00
Inventor 李增胜
Owner 西安三茗科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products