Method and storage device for limiting read of sensitive information

A technology for sensitive information and storage devices, applied in the field of information security to achieve the effect of overcoming illegal use, avoiding theft, and protecting legitimate interests

Inactive Publication Date: 2007-11-28
FEITIAN TECHNOLOGIES
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, fundamentally speaking, sensitive information is still stored in the storage medium. Once the storage medium is cracked, illegal users can still obtain sensitive information for illegal use.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and storage device for limiting read of sensitive information
  • Method and storage device for limiting read of sensitive information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] This embodiment provides a method for restricting the use of sensitive information, see Figure 1, the specific steps are as follows:

[0047] Step 101: The customer pre-defines the number N of uses of sensitive information.

[0048] Step 102: Create N pieces of sensitive information.

[0049] Sensitive information includes codes, keys, serial numbers, user passwords, user names, certificates, user identifiers, user rights, etc., and the sensitive information in this embodiment is keys and serial numbers. The carrier for storing sensitive information may be a smart card chip, a non-smart card chip or a storage chip, and the smart card chip is selected for storage in this embodiment. The content of each piece of sensitive information may be completely the same or different. For example, multiple pieces of sensitive information may all have the same key and serial number, or different keys and serial numbers.

[0050] In the production management process, the smart card ...

Embodiment 2

[0082] This embodiment provides a storage device that restricts reading of sensitive information. As shown in FIG. 2, the storage device includes:

[0083] The receiving module 201 is configured to receive instructions and forward the received instructions to corresponding modules;

[0084] The storage module 202 is configured to store the sensitive information in the instruction after receiving the instruction to write the sensitive information forwarded by the receiving module 201;

[0085] The sensitive information requesting module 203 is configured to read a piece of sensitive information from the storage module 202 after receiving the requesting instruction forwarded by the receiving module 201, and delete the read sensitive information.

[0086] The sensitive information is specifically one or more of codes, keys, serial numbers, user passwords, user identifications, and user permissions. The content of each piece of sensitive information may be completely the same or ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method to limiting read sensitization information and storing device in information safe technical domain, which is characterized by the following: writing several strip sensitive information into storing device; receiving collected instrument; reading one sensitive information in the storing device; deleting the reading sensitive information; setting the storing device as receiving module, storing module and sensitive information collecting module. This invention avoids the sensitive information pilfered, intensifies the safety of data and improves safety in reading course.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and a storage device for restricting reading of sensitive information. Background technique [0002] Today, with the development of information technology, computers and networks have become important information carriers and transmission channels. While people enjoy the convenience brought by computers and computer networks, it will increase the risk of some sensitive or valuable data being misused. risk. There are many reasons for the leakage of sensitive information, among which the unauthorized use of storage media is an important reason, for example, illegal copying of sensitive information to disks, CDs, and USB disks; disks that have stored sensitive information are used as waste disks for others to use ; Hard disks containing confidential information are taken out for repair without processing or unsupervised, etc. A more extreme example is that a d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06K19/073
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products