Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure storage device

A technology for safe storage and equipment, applied in computer security devices, instruments, electrical digital data processing and other directions, can solve the problems of insufficient data encryption key transmission means, no data transmission security measures, etc. Effects of data leakage

Active Publication Date: 2014-12-24
POTEVIO INFORMATION TECH
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0021] The protection of data by the storage system is limited to the security of stored data, and there are no security measures that match data transmission; the means of data encryption key transmission is not perfect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure storage device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] Embodiment 1 is: (1) the server module 102 supports Hypertext Markup Language 5 (HTML5) or an earlier version of HTML, and the server module 102 can support various file operations in addition to generating traditional pages; (2) when the user When the local computer accesses the storage, it is completed through the HTML browser, and the server module 102 receives the file access request sent by the user's local computer through the HTML browser; when the user's local computer opens the file on the storage, it is equivalent to the server module 102 completing a series of operations , and display the operation results in the form of HTML5 objects or HTML pages.

Embodiment 2

[0059] The second embodiment is: (1) The server module 102 is an X-server, and the user's local computer sends a file access request through the x-client or RDP; (2) When the user's local computer accesses the storage, the local X-client will be opened. All operations are completed by the processor on the memory, and the user's local computer only displays the graphics results after processing. Wherein, X-server refers to that the server is a device that supports client access through a graphics protocol, and the X-client terminal interacts with the server through a graphics protocol.

[0060] In addition, if the method of X-Server or HTML Server is not used, the server module 103 can be implemented by starting a server software program on the safe storage, and the storage provides a client program that can be obtained by the user's local computer, and the program can communicate with The server module interacts. The client program can communicate with the server through secu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure storage device which comprises an interface module, a server module, an encryption algorithm module, an encryption strategy management module, a recognition module and a storage medium module. The server module is used for providing an operating system and file processing programs of the storage device, receiving file access requests from a local computer of a user, converting operation results into images, and transmitting the images to the local computer of the user through the interface module. The encryption algorithm module is used for extracting an encryption strategy from the encryption strategy management module, adopting the encryption strategy to carry out encryption on files according to random seeds formed by the recognition module and file characteristic information and then storing the files in the storage medium module and is also used for adopting the encryption strategy to carry out decryption on the files stored in the storage medium module according to encryption seeds formed by the recognition module and the file characteristic information. The recognition module is used for receiving information input by the user to generate the random seeds which are used as initial indexes of other secret keys.

Description

technical field [0001] The present application relates to the field of computer and storage technologies, and in particular to a safe storage device. Background technique [0002] In a computer system, the storage system, as an important place for code execution and data storage, plays an important role in realizing computing security; at the same time, the storage system is often the most vulnerable place to be attacked. Storage systems mainly include the following categories: [0003] Cache (Cache): Processor on-chip cache memory; [0004] Main memory: off-chip random access memory memory of the processor; [0005] Peripheral storage devices, typical devices include hard disk, U disk, etc.; [0006] Network storage devices: Typical devices include network attached storage (NAS), server storage, cloud storage, etc. [0007] From an attacker's point of view, attacking the processor is difficult (usually physically attacking the processor chip is not feasible for most att...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/78
CPCG06F21/6209G06F21/78G06F2221/2107
Inventor 李庆华
Owner POTEVIO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products