Data protection system and method for mobile storage

A technology for data protection and mobile storage, applied in digital data authentication, internal/peripheral computer component protection, etc., can solve problems such as inability to complete mobile terminal authentication, difficulty in application and promotion, etc.

Active Publication Date: 2015-04-29
CHIPSEA TECH SHENZHEN CO LTD
View PDF11 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method not only requires the fingerprint authentication of the internal network host terminal to the mobile terminal, but also needs to set up an authentication server, and store the authentication information in the audit database of the authentication server. If the audit database is missing, or the authentication server cannot be connected, it cannot be completed. authentication of mobile terminals, therefore, this method is difficult to be applied and promoted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection system and method for mobile storage
  • Data protection system and method for mobile storage
  • Data protection system and method for mobile storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0034] figure 1 , figure 2 Shown is a structural diagram of the data protection system implementing mobile storage in the present invention. As shown in the figure, the data protection system structure includes identification, NAND FLASH storage, data hiding, data recovery and other parts. The whole process of identity authentication goes through four states: no authentication to authenticated state, authenticated to authenticated state, authenticated to unauthenticated state, and unauthenticated to unauthenticated state. Unauthenticated to authenticated state means that the device has not been...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data protection system and a data protection method for mobile storage. The system is arranged in mobile storage equipment, and is divided into an identity recognition module, a NAND FLASH storage module, a data hiding module and a data recovery module, wherein the identity recognition module is used for reading identity authentication information, performing comparison, and transmitting a result to the mobile storage equipment through an interface, and the result is stored into the NAND FLASH storage module through the mobile storage equipment; the data recovery module is used for judging a non-authenticated-to-authenticated state, and performing processing; the data hiding module is used for judging an authenticated-to- non-authenticated state. According to the data protection system and the data protection method for mobile storage, the working state is cyclically queried every time when the storage equipment is plugged and unplugged, and continuous query, state judgment and command analysis aim to combine data hiding, data recovery, file system operation and PC (Personal Computer) characteristics to realize intelligent plug-in detection.

Description

technical field [0001] The invention relates to mobile storage, in particular to a data protection method and device for mobile storage. Background technique [0002] The current data protection devices are basically realized by using PC software technology and hardware encryption. Traditional data protection devices are limited to encryption software and mechanical switches in the disk, which are easy to crack and have great security risks. All data is protected and there is a risk of data leakage. [0003] Patent application 200810236803.1 discloses a mobile storage device and a method and system for secure data transmission. Based on smart card technology, the device has a built-in smart card chip, data exchange area and private area. Among them, the memory in the data exchange area, private area, and intranet host terminal is combined with supporting software and hardware to achieve pure data security without protocol. Based on this The user authorization mechanism is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/79
CPCG06F21/32G06F21/79
Inventor 庞新洁
Owner CHIPSEA TECH SHENZHEN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products