Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for controlling access to data stored on a data storage device

a data storage device and access control technology, applied in the field of data encryption and decryption systems and methods, can solve the problems of preventing unauthorized access to data, tampering with data, data inaccessible or unusable by an authorized user, etc., and achieve the effect of preventing the access to data on the storage devi

Inactive Publication Date: 2007-07-12
AUTHENEX
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

"The present invention provides a system and method for data encryption and decryption for controlling access to a data storage device, such as a hard disk drive or optical drive. The method utilizes a unique token device that is detachably coupled to the data port of a computer. The token device includes a processor running a data encryption / decryption program and a memory device for storing user data. The method filters the flow of data between the storage device and the computer's memory using a symmetrical key. The method also includes a unique string of information that enables the generation of a dynamic key for each dynamic puzzle, ensuring the proper functioning of the method. The invention provides a secure and efficient way to control access to data on a data storage device."

Problems solved by technology

Therefore, preventing unauthorized access to data is critical.
Unauthorized access to data stored on the storage device, often results in tampering with the data.
This data tampering may include deletion, corruption, or infection of the data with a computer virus, for example.
Any of these may render the data inaccessible or unusable by an authorized user.
Thus, the information that the electronic data represents is lost to the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for controlling access to data stored on a data storage device
  • Method and system for controlling access to data stored on a data storage device
  • Method and system for controlling access to data stored on a data storage device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following description is provided to enable any person skilled in the art to make and use the invention and sets forth the best modes presently contemplated by the inventors of carrying out the invention. Various modifications, however, will remain readily apparent to those skilled in the art, since the generic principles of the present invention have been defined herein.

[0026] The present invention provides a method of data encryption and decryption for controlling access to a data storage device such as a hard disk drive or optical drive. The invented method utilizes data encryption and decryption techniques, combined with a token device, to control access to the data storage device. Further, the method utilizes a symmetrical key for decrypting data, as the data is transmitted from the storage device to the memory, and for encrypting data, as the data is transmitted from memory to the storage device.

[0027] Referring now to FIG. 1 of the drawings, a preferred embodimen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method of data encryption and decryption for controlling access to a data storage device such as a hard disk drive or optical drive is provided. The invented method utilizes data encryption and decryption techniques, combined with a token device, to control access to data stored on the data storage device.

Description

BACKGROUND OF THE INVENTION [0001] 1. Field of the Invention [0002] The present invention relates generally to data encryption and decryption systems and methods and, more particularly, to a method and system for controlling access to a data storage device. [0003] 2. Background Information [0004] As electronic data becomes increasingly important, in both the business world and in personal lives, the need to protect such data similarly increases. Electronic data is typically stored on a data storage device. Known data storage devices include hard disk drives, tape drives, and optical disk drives, and may be situated in a computer system. Known computer systems include personal computers, or desktop computers, as well as networked computers. [0005] The importance of the data stored on storage devices cannot be under emphasized. Business accounting records, personnel records, research information, images, and personal information are stored as data on storage devices, and each is impor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F12/14G06F21/00
CPCG06F21/6218G06F2221/2153G06F2221/2103G06F21/78
Inventor LIN, PAULHON, HENRY
Owner AUTHENEX