Safe U disc storage system and method

A storage system and security technology, applied in information storage, static storage, digital storage information, etc., can solve problems such as difficult management and use, loss of security protection of classified information, mixed storage of ordinary information and classified information, etc., to prevent The effect of leaking confidential information

Inactive Publication Date: 2007-02-21
刘学明
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Whether it is a software-encrypted or hardware-encrypted U disk, there are the following problems in use: there are still disadvantages that common information and classified information are mixed and difficult to manage and use; if the U disk is lost or stolen, the cla

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe U disc storage system and method
  • Safe U disc storage system and method
  • Safe U disc storage system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] see figure 1 . This embodiment illustrates the basic structure of the secure U disk storage system device of the present invention. The safety U disk storage system device of the present invention adopts a paired composite U disk structure, which is composed of a main disk 1 and a secondary disk 2. The encryption circuit 13 connected to the output port of 12, the front plug-in 14 at the front of the housing 10 and the rear plug-in 15 at the rear of the housing 10 are composed of the power line contacts, equipment line contacts and data on the front plug-in 14 The line contact is connected with the corresponding port of the USB chip 11, and the rear plug-in 15 is connected with the output port of the encryption circuit. The front plug-in 24 of the sub-disk at the front part of the housing 20, wherein the sub-disk device line contacts and the sub-disk data line contacts on the sub-disk front plug-in 24 are connected to the corresponding ports of the sub-disk USB chip 21...

Embodiment 2

[0027] see figure 2 . This embodiment illustrates the processing flow of the secondary disk conditional self-destruct software.

Embodiment 3

[0029] see image 3 . This embodiment illustrates the processing flow of the matching authentication software between the master disk 1 and the slave disk 2 .

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A safety storage system of U disc comprises master disc including USB chip in shell, monolithic computer connected with said chip, enciphering circuit connected to output port of monolithic computer, front pluggable unit and back pluggable unit at front and back of shell; subdisc including subdisc USB chip in subdisc shell, subdisc monolithic computer connected to said chip and front pluggable unit of subdisc at front of subdisc shell; enabling to hand master disc to user for using or holding it by user and to hand subdisc with secret information to concerning department for storing it there safety.

Description

Technical field: [0001] The invention relates to a safe U disk storage system device for confidential information. Background technique: [0002] Due to the needs of national information security, military units, government agencies and secret-related enterprises have already required a large number of encrypted U disks as mobile storage devices. Many domestic manufacturers have also increased the research and development of U disk security encryption technology and launched their own security encryption U disk storage system one after another. For example: Patriot Encrypted U Disk, T-LAND Free Encrypted U Disk, Suang Encrypted U Disk, Lexar Encrypted U Disk, Langke Encrypted U Disk, Xiaobawang Encrypted U Disk, Hanwang Encrypted Type U disk, etc., with dozens of products. These encrypted U disk storage devices can be divided into hardware encryption type and software encryption type. The basic method of the software encryption type is to preset a specific encrypted folde...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G11C7/00
Inventor 刘学明
Owner 刘学明
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products