CN101562523B - Security certification method applied on mobile storage device - Google Patents
Security certification method applied on mobile storage device Download PDFInfo
- Publication number
- CN101562523B CN101562523B CN2008101040570A CN200810104057A CN101562523B CN 101562523 B CN101562523 B CN 101562523B CN 2008101040570 A CN2008101040570 A CN 2008101040570A CN 200810104057 A CN200810104057 A CN 200810104057A CN 101562523 B CN101562523 B CN 101562523B
- Authority
- CN
- China
- Prior art keywords
- storage device
- movable storage
- safe key
- key carrier
- carry out
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- FGUUSXIOTUKUDN-IBGZPJMESA-N C1(=CC=CC=C1)N1C2=C(NC([C@H](C1)NC=1OC(=NN=1)C1=CC=CC=C1)=O)C=CC=C2 Chemical compound C1(=CC=CC=C1)N1C2=C(NC([C@H](C1)NC=1OC(=NN=1)C1=CC=CC=C1)=O)C=CC=C2 FGUUSXIOTUKUDN-IBGZPJMESA-N 0.000 claims abstract description 11
- 101150035983 str1 gene Proteins 0.000 claims description 9
- 238000004364 calculation method Methods 0.000 claims description 6
- 230000008676 import Effects 0.000 claims description 4
- 230000001186 cumulative effect Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 4
- 238000007726 management method Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to a security certification method applied on a mobile storage device. The mobile storage device is matched with a safe key carrier; and the security certification method comprises the following steps: a: determining whether the safe key carrier corresponding to the mobile storage device has validity or not , and implementing a step e if the certification does not pass; b: determining whether the mobile storage device corresponding to the safe key carrier has validity or not, and implementing the step e if the certification does not pass; c: inputting a user password by auser, determining whether the usage of the safe key carrier used by the user has validity or not, and implementing the step e if the certification is not valid; d: allowing the user to access the dat a in the mobile storage device if the certification passes, and implementing a step f; e: not allowing the user to access the data in the mobile storage device if the certification fails, and implementing the step f; and f: finishing the certification. The invention can achieve the aim of improving the security.
Description
Technical field
What the present invention relates to is a kind of safety certifying method, particularly be a kind of being applied on the movable storage device in order to increase the safety certifying method of reliability.
Background technology
In recent years, adopt movable storage device all to obtain using widely in all trades and professions as Mass Data Storage Facility, particularly as movable storage device with USB interface, characteristics such as it has highly versatile, portable, easy use, capacity is big, the life-span is long have been substituted early stage 3.5 inches and 5.25 inches floppy disc.But these big capacity movable storage devices have also brought great potential safety hazard when bringing convenience to the user, these safety problems such as for example user's identity can't authenticate, the easy leakage of data stored in clear.In case user's movable storage device is lost or by illegal holder's visit, will cause the leakage of inner confidential data, causes immeasurable loss can for user and even country.
In order to improve the security performance of movable storage device, some manufacturers have released one after another and have had the movable storage device of certain safety function.
Some manufacturer has installed mechanical gear additional and has locked the visit that limits equipment on movable storage device, this means have no fail safe concerning the professional person.
Some safe mobile memory apparatus adopts the way of input password or fingerprint to realize the affirmation of user identity.But password is easily stolen, and in these equipment, depositing and transmitting of password lacks reliable security means, easily is cracked simultaneously.The fingerprint recognition system that has is to ambient temperature and humidity sensitive, and the user fingerprints feature that has is not obvious, causes equipment also to exist certain refusing to declare rate and False Rate in actual applications.Existing fingerprint identification technology is just stored the fingerprint characteristic data after encrypting that obtains from fingerprint, there is the possibility that is replicated in the fingerprint trace that the user stays on fingerprint sensor.And the fingerprint recognition chip that these equipment adopted at present and cryptographic algorithm do not possess independent intellectual property right, according to " national Business Code Regulations ", these products do not meet the relevant requirements of national Password Management office, fail safe is not enough, has limited the application in some special industries at home.
What the safe mobile memory apparatus that has used is simple data guard technology, for example adopts hidden partition, does not adopt data encryption technology, and data easily are cracked, and fail safe is lower.
The safe mobile memory apparatus that has is to realize data encrypting and deciphering by client software, needs to install earlier client software during use, and inconvenient operation the more important thing is that software cryptography makes key and encipheror easily be cracked, and fail safe is very low.
The safe mobile memory apparatus that has adopts chip to realize data encryption, but the anti-physical attacks performance of its chip that adopts is lower, make cryptographic algorithm and key in the chip easily be cracked, also some safe mobile memory apparatus has adopted disclosed in the world cryptographic algorithm, these algorithms all do not possess independent intellectual property right, according to " national Business Code Regulations ", these algorithms are not approved by national Password Management office, have limited the application in some special industries at home.
This shows, these products or be that fail safe, the reliability of authentication is not enough, be the insufficient strength of data encryption, simultaneously they do not satisfy the requirement of national Password Management office to commercial encryption product yet, not have the thoroughly solution safety issue that ordinary mobile storage faced.
In order to address the above problem, creator of the present invention is through investigation and research for a long time, according to the pertinent regulations of national Password Management office to commercial encryption product, createed a kind of safety certifying method that is applied on the movable storage device finally.
Summary of the invention
The objective of the invention is to, a kind of safety certifying method that is applied on the movable storage device is provided, in order to realize above-mentioned purpose.
For achieving the above object, the technical solution used in the present invention is, a kind of safety certifying method that is applied on the movable storage device is provided, and a described movable storage device and a safe key carrier are used, and it comprises that step is:
Step a: carry out internal authentication, confirm whether described safe key carrier has legitimacy with respect to described movable storage device,, otherwise carry out following step e if the following step b of execution is passed through in authentication;
Step b: carry out external authentication, confirm whether described movable storage device has legitimacy with respect to described safe key carrier,, otherwise carry out following step e if the following step c of execution is passed through in authentication;
Step c: the user imports user cipher, confirms whether the user has legitimacy to the use of described safe key carrier, if the following steps d of legal execution, otherwise would carry out following step e;
Steps d: authentication is passed through, and allows the user that the data in the described movable storage device are conducted interviews, and carries out following step f;
Step e: authentification failure, do not allow the user that the data in the described movable storage device are conducted interviews, carry out following step f;
Step f: authentication finishes.
Preferable, storing user cipher in the described safe key carrier, external authentication key and internal authentication key, described safe key carrier also have a backup safe key carrier.
Preferable, described user cipher comprises: domestic consumer's password and supervisor password.
Preferable, described step a comprises:
Step a1: described movable storage device sends a string random number str1 to described safe key carrier;
Step a2: described safe key carrier uses internal authentication key and block encryption algorithm that described this string random number str1 is carried out cryptographic calculation, and encrypted result is returned to described movable storage device;
Step a3: described movable storage device is decrypted computing by same key and algorithm;
Step a4: judge whether the result who decrypts is identical with described this string random number str1, if identical, then carries out following step b, otherwise carries out following step e.
Preferable, described step b comprises:
Step b1: described safe key carrier sends a string random number str2 to described movable storage device;
Step b2: described movable storage device uses external authentication key and block encryption algorithm that described this string random number str2 is carried out cryptographic calculation, and encrypted result is returned to described safe key carrier;
Step b3: described safe key carrier is decrypted computing by same key and algorithm;
Step b4: judge whether the result who decrypts is identical with described this string random number str2, if identical, then carries out following step c, otherwise carries out following step e.
Preferable, described step c comprises:
Step c1: the user inputs domestic consumer's password to described safe key carrier;
Step c2: described safe key carrier judges whether domestic consumer's password is correct, if the following steps d of correct execution, otherwise would carry out following step c3;
Step c3: domestic consumer's password input error is added up;
Step c4: judge whether accumulative frequency reaches default n1 time, carry out following step c5, otherwise carry out above-mentioned steps c1 if reach;
Step c5: described safe key carrier is in deadlock state.
Preferable, also comprise:
Step c6: to the described safe key carrier input supervisor password that is in deadlock state;
Step c7: described safe key carrier judges whether supervisor password is correct, if correct, carry out following step c8, otherwise carries out following step c9;
Step c8: remove deadlock state, described domestic consumer password is reset to initial value carry out above-mentioned steps c1;
Step c9: input error adds up to supervisor password;
Step c10: judge whether cumulative number reaches default n2 time, carry out following step c11, otherwise carry out above-mentioned steps c6 if reach;
Step c11: described safe key carrier is in permanent deadlock state, carries out following step e.
Preferable, described step c11 also comprises makes described safe key carrier scrap.
Preferable, described safe key carrier is lost or is scrapped, the user reissues blank safe key carrier as new backup safe key carrier after the authentication of described backup safe key carrier and described movable storage device is passed through, and upgrades internal authentication key and external authentication key.
Preferable, after described movable storage device and the authentication of safe key carrier, the user can make amendment to described domestic consumer password and supervisor password on described movable storage device.
Beneficial effect of the present invention compared with the prior art is, the security performance of described movable storage device is improved, reliability strengthens, the highly versatile that also keeps movable storage device simultaneously and had, need not to drive, be easy to carry, advantage such as easy to use, reliable.
Description of drawings
Fig. 1 is the annexation schematic diagram of physical structure of the present invention;
Fig. 2 is applied in the flow chart of the safety certifying method on the movable storage device for the present invention;
Fig. 3 is applied in the flow chart that step a realizes in the flow process of the safety certifying method on the movable storage device for the present invention;
Fig. 4 is applied in the flow chart that step b realizes in the flow process of the safety certifying method on the movable storage device for the present invention.
Fig. 5 is applied in the flow chart that step c realizes in the flow process of the safety certifying method on the movable storage device for the present invention;
Fig. 6 is applied in the flow chart of handling at deadlock state among the step a in the flow process of the safety certifying method on the movable storage device for the present invention.
Embodiment
Below in conjunction with accompanying drawing, to this novel above-mentionedly is described in more detail with other technical characterictic and advantage.
See also shown in Figure 1, it is for the annexation schematic diagram of physical structure of the present invention, as a kind of movable storage device, it is the main body of carrying out storage naturally, from the safety of data angle, its inside will inevitably have corresponding encryption chip, trusted authentication chip and processor, can carry out transfer of data with corresponding receiving equipment by data-interface, therefore as we know from the figure, the annexation of physical structure of the present invention, comprise: a movable storage device 2, safe key carrier 1 that combines with described movable storage device 2 and and with a computer 3 as the equipment of diverting the aim, this described movable storage device 2 can adopt USB with combining of described computer 3, also can be serial data line, can certainly be wireless mode.Described safe key carrier 1 can be an IC-card, so it is as long as just can realize and the combining of described movable storage device 2 by the relation of pegging graft; Also can be radio-frequency identification card, combine with described movable storage device 2, and the present invention sets forth technical scheme with IC-card as the embodiment of described safe key carrier 1 by card reader; Wherein, store user cipher in the described safe key carrier 1, external authentication key and internal authentication key, described safe key carrier 1 also have a backup safe key carrier.
See also shown in Figure 2ly, it is applied in the flow chart of the safety certifying method on the movable storage device for the present invention; It step that comprises is:
Step a: carry out internal authentication, confirm whether described safe key carrier 1 has legitimacy with respect to described movable storage device 2,, otherwise carry out following step e if the following step b of execution is passed through in authentication;
Step b: carry out external authentication, confirm whether described movable storage device 2 has legitimacy with respect to described safe key carrier 1,, otherwise carry out following step e if the following step c of execution is passed through in authentication;
Step c: the user imports user cipher, confirms whether the user has legitimacy to the use of described safe key carrier 1, if the following steps d of legal execution, otherwise would carry out following step e;
Steps d: authentication is passed through, and allows the user that the data in the described movable storage device 2 are conducted interviews, and carries out following step f;
Step e: authentification failure, do not allow the user that the data in the described movable storage device 2 are conducted interviews, carry out following step f;
Step f: authentication finishes.
See also shown in Figure 3ly, it is applied in the flow chart that step a realizes in the flow process of the safety certifying method on the movable storage device for the present invention; Promptly at first carry out external authentication, confirm whether described movable storage device 2 has legitimacy with respect to described safe key carrier 1, and its step that comprises in the specific implementation is:
Step a1: described movable storage device 2 sends a string random number str1 to described safe key carrier 1;
Step a2: described safe key carrier 1 uses internal authentication key and block encryption algorithm that described this string random number str1 is carried out cryptographic calculation, and encrypted result is returned to described movable storage device 2;
Step a3: described movable storage device 2 is decrypted computing by same key and algorithm;
Step a4: judge whether the result who decrypts is identical with described this string random number str1, if identical, then carries out following step b, otherwise carries out following step e.
See also shown in 4, it is applied in the flow chart that step b realizes in the flow process of the safety certifying method on the movable storage device for the present invention; Promptly carry out external authentication, confirm whether described movable storage device 2 has legitimacy with respect to described safe key carrier 1, its concrete step of implementing to comprise is:
Step b1: described safe key carrier 1 sends a string random number str2 to described movable storage device 2;
Step b2: described movable storage device 2 uses external authentication key and block encryption algorithm that described this string random number str2 is carried out cryptographic calculation, and encrypted result is returned to described safe key carrier 1;
Step b3: described safe key carrier 1 is decrypted computing by same key and algorithm;
Step b4: judge whether the result who decrypts is identical with described this string random number str2, if identical, then carries out following step c, otherwise carries out following step e.
In fact for the safety certifying method on being applied in movable storage device 2 above the present invention, what described internal authentication and external authentication solved is the authentication of equipment (safe key carrier 1) to equipment (movable storage device 2), can prevent effectively that by above-mentioned internal authentication and external authentication IC-card is by bootlegging simultaneously.
Fail safe for movable storage device 2, not only between equipment, authenticate, also to whether test on the legitimacy to the use of equipment simultaneously the user, just the above-mentioned steps c user that will carry out imports user cipher, confirm whether the user has legitimacy to the use of described safe key carrier, have only this three step all to pass through, could realize read operation to the data of storage in the described movable storage device 2, even otherwise the memory circuit in the movable storage device 2 is pulled down, owing to there is not key, and cryptographic algorithm is unexposed, also can't decode the ciphertext on the hard disk.
See also shown in Figure 5ly, it is applied in the flow chart that step c realizes in the flow process of the safety certifying method on the movable storage device for the present invention; The user cipher of storage is domestic consumer's password in the described safe key carrier 1, and described step c confirms that the user comprises the concrete implementation step of the legitimacy of described safe key carrier 1 use:
Step c1: the user inputs domestic consumer's password to described safe key carrier 1;
Step c2: described safe key carrier 1 judges whether domestic consumer's password is correct, if the following steps d of correct execution, otherwise would carry out following step c3;
Step c3: domestic consumer's password input error is added up;
Step c4: judge whether accumulative frequency reaches default n1 time, carry out following step c5, otherwise carry out above-mentioned steps c1 if reach;
Step c5: described safe key carrier 1 is in deadlock state.
For the safe key carrier 1 that is in deadlock state, still need to realize replying use by release, the user cipher of storage is except domestic consumer's password in the described for this reason safe key carrier 1, also comprise a kind of supervisor password, in order to remove deadlock state, see also shown in Figure 6ly, it is applied in the flow chart of handling at deadlock state in the flow process of the safety certifying method on the movable storage device for the present invention; It step that comprises is:
Step c6: to the described safe key carrier 1 input supervisor password that is in deadlock state;
Step c7: described safe key carrier 1 judges whether supervisor password is correct, if correct, carry out following step c8, otherwise carries out following step c9;
Step c8: remove deadlock state, described domestic consumer password is reset to initial value carry out above-mentioned steps c1;
Step c9: input error adds up to supervisor password;
Step c10: judge whether cumulative number reaches default n2 time, carry out following step c11, otherwise carry out above-mentioned steps c6 if reach;
Step c11: described safe key carrier 1 is in permanent deadlock state, and makes described safe key carrier 1 scrap, and carries out following step e.
Described safe key carrier 1 is lost or is scrapped, the user is after 2 authentications of described backup safe key carrier and described movable storage device are passed through, reissue blank safe key carrier as new backup safe key carrier, and upgrade internal authentication key and external authentication key.
If permanent deadlock state, at this moment, be in the state of scrapping as the IC-card of safe key carrier 1.In order to prevent scrapping or lose and causing that movable storage device 2 can not normally use of IC-card, described movable storage device 2 should just be furnished with two IC-cards at first, backup safe key carrier promptly above-mentioned, and these two IC-card identity are identical, backup each other.When IC-card is wherein lost or is damaged, can use another IC-card, the user needs to reissue a new blank card simultaneously and gives over to new backup after described backup safe key carrier and 2 authentications of described movable storage device are passed through.After the distribution, because all internal keys and external key all pass through renewal, original IC-card of losing will cancel automatically.Just needn't worry and to stay hidden danger to the data security of movable storage device 2 that the user can also change user cipher and super code at described safe key carrier 1 with after movable storage device 2 combines unlimitedly on described movable storage device 2.These modes of operation all are existing movable storage device 2 not available features.
More than explanation is novel just illustrative for this; and it is nonrestrictive; those of ordinary skills understand; under the situation of the spirit and scope that do not break away from following claims and limited; can make many modifications; change, or equivalence, but all will fall in the protection range of the present utility model.
Claims (8)
1. safety certifying method that is applied on the movable storage device, a described movable storage device and a safe key carrier are used, and it is characterized in that: it comprises that step is:
Step a: carry out internal authentication, confirm whether described safe key carrier has legitimacy with respect to described movable storage device,, otherwise carry out following step e if the following step b of execution is passed through in authentication;
Step b: carry out external authentication, confirm whether described movable storage device has legitimacy with respect to described safe key carrier,, otherwise carry out following step e if the following step c of execution is passed through in authentication;
Step c: the user imports user cipher, confirms whether the user has legitimacy to the use of described safe key carrier, if the following steps d of legal execution, otherwise would carry out following step e;
Steps d: authentication is passed through, and allows the user that the data in the described movable storage device are conducted interviews, and carries out following step f;
Step e: authentification failure, do not allow the user that the data in the described movable storage device are conducted interviews, carry out following step f;
Step f: authentication finishes, and wherein said step c comprises:
Step c1: the user inputs domestic consumer's password to described safe key carrier;
Step c2: described safe key carrier judges whether domestic consumer's password is correct, if the following steps d of correct execution, otherwise would carry out following step c3;
Step c3: domestic consumer's password input error is added up;
Step c4: judge whether accumulative frequency reaches default n1 time, carry out following step c5, otherwise carry out above-mentioned steps c1 if reach;
Step c5: described safe key carrier is in deadlock state;
Step c6: to the described safe key carrier input supervisor password that is in deadlock state;
Step c7: described safe key carrier judges whether supervisor password is correct, if correct, carry out following step c8, otherwise carries out following step c9;
Step c8: remove deadlock state, described domestic consumer password is reset to initial value carry out above-mentioned steps c1;
Step c9: input error adds up to supervisor password;
Step c10: judge whether cumulative number reaches default n2 time, carry out following step c11, otherwise carry out above-mentioned steps c6 if reach;
Step c11: described safe key carrier is in permanent deadlock state, carries out following step e.
2. the safety certifying method that is applied on the movable storage device according to claim 1, it is characterized in that: store user cipher in the described safe key carrier, external authentication key and internal authentication key, described safe key carrier also have a backup safe key carrier.
3. the safety certifying method that is applied on the movable storage device according to claim 2 is characterized in that: described user cipher comprises: domestic consumer's password and supervisor password.
4. the safety certifying method that is applied on the movable storage device according to claim 3 is characterized in that: described step a comprises:
Step a1: described movable storage device sends a string random number str1 to described safe key carrier;
Step a2: described safe key carrier uses internal authentication key and block encryption algorithm that described random number str1 is carried out cryptographic calculation, and encrypted result is returned to described movable storage device;
Step a3: described movable storage device is decrypted computing by same key and algorithm;
Step a4: judge whether the result who decrypts is identical with described random number str1, if identical, then carries out following step b, otherwise carries out following step e.
5. the safety certifying method that is applied on the movable storage device according to claim 4 is characterized in that: described step b comprises:
Step b1: described safe key carrier sends a string random number str2 to described movable storage device;
Step b2: described movable storage device uses external authentication key and block encryption algorithm that described random number str2 is carried out cryptographic calculation, and encrypted result is returned to described safe key carrier;
Step b3: described safe key carrier is decrypted computing by same key and algorithm;
Step b4: judge whether the result who decrypts is identical with described random number str2, if identical, then carries out following step c, otherwise carries out following step e.
6. the safety certifying method that is applied on the movable storage device according to claim 1 is characterized in that: described step c11 also comprises makes described safe key carrier scrap.
7. the safety certifying method that is applied on the movable storage device according to claim 2, it is characterized in that: described safe key carrier is lost or is scrapped, the user is after the authentication of described backup safe key carrier and described movable storage device is passed through, reissue blank safe key carrier as new backup safe key carrier, and upgrade internal authentication key and external authentication key.
8. the safety certifying method that is applied on the movable storage device according to claim 3, it is characterized in that: after described movable storage device and the authentication of safe key carrier, the user can make amendment to described domestic consumer password and supervisor password on described movable storage device.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN2008101040570A CN101562523B (en) | 2008-04-15 | 2008-04-15 | Security certification method applied on mobile storage device |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN2008101040570A CN101562523B (en) | 2008-04-15 | 2008-04-15 | Security certification method applied on mobile storage device |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN101562523A CN101562523A (en) | 2009-10-21 |
| CN101562523B true CN101562523B (en) | 2011-04-20 |
Family
ID=41221155
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN2008101040570A Active CN101562523B (en) | 2008-04-15 | 2008-04-15 | Security certification method applied on mobile storage device |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN101562523B (en) |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103581906A (en) * | 2012-08-02 | 2014-02-12 | 中兴通讯股份有限公司 | Method for carrying out portal certification through WLAN and data terminal |
| CN104346556A (en) * | 2014-09-26 | 2015-02-11 | 中国航天科工集团第二研究院七〇六所 | Hard disk security protection system based on wireless security certification |
| CN106899611B (en) * | 2017-03-27 | 2019-12-10 | 广州市麦多科机械有限公司 | remote safety communication method and system for weighing equipment |
| CN109190417A (en) * | 2018-08-27 | 2019-01-11 | 深圳豪杰创新电子有限公司 | A kind of access method of movable storage device, device, terminal device and storage medium |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN2650231Y (en) * | 2003-09-26 | 2004-10-20 | 北京华旗资讯数码科技有限公司 | Storage unit with optimized compression management mechanism |
| CN1801226A (en) * | 2005-12-30 | 2006-07-12 | 邵军利 | Universal check IC card processing method |
| CN1912884A (en) * | 2006-08-28 | 2007-02-14 | 上海华申智能卡应用系统有限公司 | Mobile key disc implementing method and device based on biological characteristic identification technology |
-
2008
- 2008-04-15 CN CN2008101040570A patent/CN101562523B/en active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN2650231Y (en) * | 2003-09-26 | 2004-10-20 | 北京华旗资讯数码科技有限公司 | Storage unit with optimized compression management mechanism |
| CN1801226A (en) * | 2005-12-30 | 2006-07-12 | 邵军利 | Universal check IC card processing method |
| CN1912884A (en) * | 2006-08-28 | 2007-02-14 | 上海华申智能卡应用系统有限公司 | Mobile key disc implementing method and device based on biological characteristic identification technology |
Also Published As
| Publication number | Publication date |
|---|---|
| CN101562523A (en) | 2009-10-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN101562040B (en) | Data processing method of high-security mobile memory | |
| CN100533459C (en) | Data safe reading method and safe storage device thereof | |
| CA2554300C (en) | System and method for encrypted smart card pin entry | |
| CN101345619B (en) | Electronic data protection method and device based on biological characteristic and mobile cryptographic key | |
| CN104579649B (en) | Personal identification method and system | |
| CN101923660B (en) | Dynamic password identity authorization system and method based on RFID | |
| US20110154501A1 (en) | Hardware attestation techniques | |
| CN203746071U (en) | Security computer based on encrypted hard disc | |
| CN106503492A (en) | A kind of authorization management method, server, customer equipment and system | |
| CN103218571A (en) | System and method for authenticating data between processors | |
| CN102508791A (en) | Method and device for encrypting hard disk partition | |
| CN114241631B (en) | Control method, registration method and related device of intelligent door lock | |
| CN201185082Y (en) | Mobile memory with high safety | |
| CN201590091U (en) | Encryption type memory card read/write device based on password authentication | |
| CN101072100B (en) | Authenticating system and method utilizing reliable platform module | |
| CN101562523B (en) | Security certification method applied on mobile storage device | |
| CN1331015C (en) | Computer security startup method | |
| CN109886662A (en) | Block chain wallet application method and system, terminal and computer readable storage medium | |
| CN201549223U (en) | Trusted secure portable storage device | |
| CN103456340A (en) | Safe movable hard disk and application method thereof | |
| US9185106B2 (en) | Access control method and mobile terminal which employs an access control method | |
| CN103336918B (en) | Electronic hard disk system authorization method and device | |
| CN101777097A (en) | Monitorable mobile storage device | |
| Lee et al. | A study on a secure USB mechanism that prevents the exposure of authentication information for smart human care services | |
| CN112637172A (en) | Novel data security and confidentiality method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant |