CN110912677B - Mobile storage device, device and data encryption and decryption processing method - Google Patents
Mobile storage device, device and data encryption and decryption processing method Download PDFInfo
- Publication number
- CN110912677B CN110912677B CN201911005683.9A CN201911005683A CN110912677B CN 110912677 B CN110912677 B CN 110912677B CN 201911005683 A CN201911005683 A CN 201911005683A CN 110912677 B CN110912677 B CN 110912677B
- Authority
- CN
- China
- Prior art keywords
- data
- encryption
- stored
- decryption
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003860 storage Methods 0.000 title claims abstract description 116
- 238000003672 processing method Methods 0.000 title claims abstract description 26
- 238000000034 method Methods 0.000 claims abstract description 24
- 230000008569 process Effects 0.000 claims abstract description 17
- 238000012545 processing Methods 0.000 claims description 39
- 238000013500 data storage Methods 0.000 claims description 27
- 239000000758 substrate Substances 0.000 claims description 22
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 claims description 14
- 229910052802 copper Inorganic materials 0.000 claims description 14
- 239000010949 copper Substances 0.000 claims description 14
- 238000000354 decomposition reaction Methods 0.000 claims description 12
- 238000004590 computer program Methods 0.000 claims description 6
- 238000009826 distribution Methods 0.000 claims description 5
- 230000007935 neutral effect Effects 0.000 claims description 5
- 230000008707 rearrangement Effects 0.000 claims description 5
- 238000011084 recovery Methods 0.000 claims description 4
- 238000012795 verification Methods 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 abstract description 29
- 238000010586 diagram Methods 0.000 description 7
- 238000003825 pressing Methods 0.000 description 7
- 229910052751 metal Inorganic materials 0.000 description 6
- 239000002184 metal Substances 0.000 description 6
- 238000013461 design Methods 0.000 description 4
- 238000012546 transfer Methods 0.000 description 4
- 238000003466 welding Methods 0.000 description 4
- 239000000853 adhesive Substances 0.000 description 3
- 230000001070 adhesive effect Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 238000004321 preservation Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- BASFCYQUMIYNBI-UHFFFAOYSA-N platinum Chemical compound [Pt] BASFCYQUMIYNBI-UHFFFAOYSA-N 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 229920000049 Carbon (fiber) Polymers 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 229910052782 aluminium Inorganic materials 0.000 description 1
- XAGFODPZIPBFFR-UHFFFAOYSA-N aluminium Chemical compound [Al] XAGFODPZIPBFFR-UHFFFAOYSA-N 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008033 biological extinction Effects 0.000 description 1
- 239000004917 carbon fiber Substances 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005286 illumination Methods 0.000 description 1
- 230000006698 induction Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- VNWKTOKETHGBQD-UHFFFAOYSA-N methane Chemical compound C VNWKTOKETHGBQD-UHFFFAOYSA-N 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 229910052697 platinum Inorganic materials 0.000 description 1
- 230000002633 protecting effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The application relates to a mobile storage device, a device and a data encryption and decryption processing method, wherein the mobile storage device comprises a shell, and an encryption and decryption module, a sliding switch module, a data plug and a data socket which are respectively arranged on the shell. The encryption and decryption module is electrically connected with the sliding switch module, the data plug and the data socket respectively. The encryption and decryption module is used for encrypting and storing the input data to be stored and decrypting the output stored data. The sliding switch module is used for switching the on and off states of the encryption and decryption module and switching the data input and output states of the encryption and decryption module. The data plug and the data socket are used for transmitting data to be stored and decrypted stored data. By using the mobile storage device, the data sharing process does not need to pass through a computer terminal, so that the data transmission safety is greatly improved, and the convenience of data secret transmission is greatly improved.
Description
Technical Field
The present invention relates to the field of data transmission technologies, and in particular, to a mobile storage device, a device, and a data encryption and decryption processing method.
Background
With the development of data transmission technology, an effective segment is provided for the secure transmission of trade secrets, technical secrets or other important data of various industries. Different data can be shared in different ranges, some data need to be completely eradicated, and some data need to be shared with specific cooperative objects. The safe transmission of the data goes through the development stages of file drawing preservation, hardware equipment preservation of modern electronic storage and the like. In a traditional electronic storage hardware device storage mode, data sharing is generally performed by a data source user using a mobile storage device such as a usb disk or a mobile hard disk, copying the data from a computer disconnected from an external network, and then accessing the mobile storage device to another computer to share the data with other users. However, in the process of implementing the present invention, the inventor has found that the problem of low data transmission security still exists in the traditional hardware device storage mode of electronic storage.
Disclosure of Invention
Based on this, it is necessary to provide a mobile storage device, a data encryption processing method, a data decryption processing method, a data encryption processing apparatus, a data decryption processing apparatus and a computer readable storage medium capable of greatly improving the security of data transmission in view of the technical problems existing in the above-mentioned hardware device preservation manner of the conventional electronic storage.
In order to achieve the above object, the embodiment of the present invention provides the following technical solutions:
in one aspect, a mobile storage device is provided, including a housing, and an encryption and decryption module, a sliding switch module, a data plug and a data socket which are respectively installed on the housing, wherein the encryption and decryption module is respectively electrically connected with the sliding switch module, the data plug and the data socket;
the encryption and decryption module is used for encrypting and storing the input data to be stored and decrypting the output stored data;
the sliding switch module is used for switching the on and off states of the encryption and decryption module and switching the data input and output states of the encryption and decryption module;
the data plug and the data socket are used for transmitting data to be stored and decrypted stored data.
In one embodiment, the sliding switch module comprises a toggle button, a slide rail, an input gear, an output gear and an idle gear;
the toggle button is arranged in a matched mode with the sliding rail, the sliding rail is mechanically connected with the shell, the input gear piece, the output gear piece and the idle gear piece are respectively arranged on the sliding rail, and the toggle button, the input gear piece, the output gear piece and the idle gear piece are respectively electrically connected with the encryption and decryption module;
The toggle button is used for respectively sliding and triggering the input gear piece, the output gear piece and the idle gear piece on the sliding rail and controlling the switching of the opening and closing states of the encryption and decryption module;
the input gear piece is used for controlling the encryption and decryption module to receive data to be stored, the output gear piece is used for controlling the encryption and decryption module to output stored data, and the empty gear piece is used for controlling the encryption and decryption module to enter a data latch state.
In one embodiment, the slide rail is a concave slide rail, the toggle button is a copper sheet button, and the input gear, the output gear and the idle gear are copper sheets.
In one embodiment, the encryption and decryption module comprises an operation input unit, an encryption and decryption control unit and a data storage unit;
the operation input unit is mechanically connected with the shell, the encryption and decryption control unit and the data storage unit are arranged in the accommodating cavity of the shell, and the encryption and decryption control unit is respectively and electrically connected with the data storage unit, the sliding switch module, the data plug and the data socket;
the operation input unit is used for inputting an encryption operation signal and a decryption operation signal to the encryption and decryption control unit, and the encryption and decryption control unit is used for encrypting the data to be stored of the input data storage unit after receiving the encryption operation signal; and after receiving the decryption operation signal, decrypting the stored data output by the data storage unit.
In one embodiment, the operation input unit comprises a key substrate and a plurality of digital keys;
the key substrate is matched with the mechanical structure of each digital key, the key substrate is mechanically connected with the shell, each digital key is embedded on the outer surface of the shell, and the key substrate is electrically connected with the encryption and decryption control unit.
In one embodiment, the data plug is a USB plug and the data receptacle is a USB receptacle.
In one embodiment, the USB plug and the USB socket are mechanically connected to the housing, respectively, and the USB plug and the USB socket are disposed opposite to each other on the housing.
In one embodiment, the mobile storage device further includes an indicator light, wherein the indicator light is disposed on the housing and electrically connected to the encryption/decryption module, and the indicator light is used for indicating an encryption/decryption state indication of the encryption/decryption module.
On the other hand, a data encryption processing method is also provided, and is applied to the mobile storage device, and the method comprises the following steps:
collecting input data to be stored and receiving input encryption operation signals;
determining the length of an encryption password according to the encryption operation signal, and equally dividing data to be stored according to the length of the encryption password;
respectively distributing different data labels for each divided part of data to be stored, correlating the data labels with the input sequence of the encryption passwords, and determining key labels of each part of data to be stored;
And after the data to be stored of each component are recombined in sequence according to each key label, the data to be stored of each component are rearranged in sequence according to the sequence of the key labels to obtain encrypted data.
In still another aspect, a data decryption processing method is provided, which is applied to the mobile storage device, and the method includes:
reading the encrypted stored data and receiving an input decryption operation signal;
determining whether the input encryption password is correct according to the decryption operation signal;
if so, decomposing the stored data according to the length of the encrypted password and each key label of the stored data;
and rearranging each part of the decomposed data to be stored according to the input sequence of the encryption passwords associated with each key label to obtain decrypted data to be stored.
In one embodiment, the process of decomposing stored data includes:
if any key label corresponds to a plurality of data to be stored, extracting the data to be stored with the front distribution sequence of the data labels according to the input sequence of the encryption passwords.
In still another aspect, a data encryption processing apparatus is provided, which is applied to the above mobile storage device, and the data encryption processing apparatus includes:
The first acquisition module is used for acquiring input data to be stored and receiving input encryption operation signals;
the data grouping module is used for determining the length of the encryption password according to the encryption operation signal and equally dividing the data to be stored according to the length of the encryption password;
the label processing module is used for respectively distributing different data labels for each divided part of data to be stored, correlating the data labels with the input sequence of the encryption passwords and determining key labels of each part of data to be stored;
and the rearrangement module is used for rearranging the data to be stored according to the sequence of the key labels to obtain encrypted data after the data to be stored are rearranged in sequence according to the sequence of the key labels.
In still another aspect, a data decryption processing apparatus is provided, which is applied to the above mobile storage device, and the data decryption processing apparatus includes:
the second acquisition module is used for reading the encrypted stored data and receiving an input decryption operation signal;
the verification module is used for determining whether the input encryption password is correct or not according to the decryption operation signal;
the data decomposition module is used for decomposing stored data according to the length of the encrypted password and each key label of the stored data when the input encrypted password is correct;
And the recovery processing module is used for rearranging the decomposed data to be stored to obtain decrypted data to be stored according to the input sequence of the encryption passwords associated with the key labels.
In still another aspect, there is also provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the above-described data encryption processing method or implements the steps of the above-described data decryption processing method.
One of the above technical solutions has the following advantages and beneficial effects:
according to the mobile storage device, the device and the data encryption and decryption processing method, a brand new mobile storage device is formed through the combined design of the shell, the encryption and decryption module, the sliding switch module, the gear switch, the data plug and the data socket. When data sharing is carried out, the data plug can be directly inserted into a data socket of another mobile storage device of the same type, and the sliding switch module of each mobile storage device controls the starting of the encryption and decryption module and switches the control of the encryption and decryption module on the data input and output states. After decrypting the stored data to be output, the encryption and decryption module of the mobile storage device sharing the data outputs the data to the data plug (or data socket) of the mobile storage device receiving the data through the data socket (or data plug); the encryption and decryption module of the mobile storage device receiving the data can encrypt and store the input data to be stored. The data sharing process does not need to pass through a computer terminal, so that the data transmission safety is greatly improved, and the convenience of data secret transmission is greatly improved.
Drawings
FIG. 1 is a front view of a mobile storage device in one embodiment;
FIG. 2 is a schematic circuit diagram of a mobile memory device according to an embodiment;
FIG. 3 is a schematic circuit diagram of a mobile memory device according to another embodiment;
FIG. 4 is a side view of a mobile storage device in one embodiment;
FIG. 5 is a schematic diagram of an application of a mobile storage device in one embodiment;
FIG. 6 is a flow chart of a data encryption processing method in one embodiment;
FIG. 7 is a diagram illustrating changes in data morphology during data encryption in one embodiment;
FIG. 8 is a flow chart of a data decryption processing method in one embodiment;
FIG. 9 is a diagram illustrating changes in data morphology during data decryption in one embodiment;
FIG. 10 is a block diagram showing a block configuration of a data encryption processing apparatus in one embodiment;
fig. 11 is a block diagram showing a block configuration of a data decryption processing apparatus in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
It is to be noted that all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs unless defined otherwise. The terminology used herein in the description of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. The term "and/or" as used herein includes any and all combinations of one or more of the associated listed items.
For sharing important data needing confidentiality, the data is commonly shared on another terminal device after the data is copied from a computer, a tablet, a smart phone or other terminal devices which are disconnected from an external network through a USB flash disk, a mobile hard disk or other mobile storage devices. However, when mobile storage devices such as a usb disk or a mobile hard disk share data on a terminal device, traces of data transmission may be left. In this way, when the terminal device connects to the internet again, a hacker can learn the transmitted important data, such as the contents of trade secrets or technical secrets, through the trace of the data transmission. In addition, if the terminal equipment or the mobile storage equipment is lost, an external person can also learn the content of the transmitted important data through the trace left by the data transmission port of the terminal equipment, learn the content of the important data directly obtained by the picked up mobile storage equipment, so that the leakage of the important data is caused, and the data security is still easy to be threatened greatly.
In one embodiment, as shown in fig. 1, a mobile storage device 100 is provided, which includes a housing 12, and an encryption and decryption module 14, a sliding switch module 16, a data plug 18 and a data socket 19 respectively installed on the housing 12, aiming at the problem of low data transmission security in the above-mentioned conventional storage hardware device storage mode. The encryption and decryption module 14 is electrically connected with the sliding switch module 16, the data plug 18 and the data socket 19 respectively. The encryption and decryption module 14 is used for encrypting and storing the input data to be stored and decrypting the output stored data. The sliding switch module 16 is used for switching the on and off states of the encryption and decryption module 14 and switching the data input and output states of the encryption and decryption module 14. The data plug 18 and the data socket 19 are used for transmitting data to be stored and decrypted stored data.
It is understood that the housing 12 described above may be a plastic housing 12, a metal housing 12, or a carbon fiber housing 12 of various geometries for carrying and shielding the various electronic components of the mobile storage device 100. The housing 12 may be an integrally formed housing 12, or may be a detachable combined housing 12, such as a housing 12 formed by assembling two components (housing components) or a plurality of components together. The shape, size, material, etc. of the housing 12 may be determined according to the needs of the electronic component loading, protection, portability, etc. of the practical application, as long as the respective electronic components of the portable storage device 100 can be effectively loaded and protected. The dashed connection in fig. 1 represents an electrical connection. The broken line portions of the elements represent the structural portions disposed within the housing 12.
The encryption and decryption module 14, the sliding switch module 16, the data plug 18, the data socket 19 and other components are arranged on the shell 12, wherein part of the components are arranged on the outer surface of the shell 12, and part of the components are arranged in a containing cavity formed by the shell 12, or part of the components are embedded in the shell 12; for example, but not limited to, the encryption and decryption module 14 and the sliding switch module 16 are installed on the outer surface of the housing 12, the data plug 18 and the data socket 19 are installed in the accommodating cavity of the housing 12, the data plug 18 extends out of the outer surface of the housing 12, the jack of the data socket 19 faces to one side of the outer surface of the housing 12, and the specific installation mode, the specific installation position and the like can be determined according to the shape and the size of each electronic component, the loading fixing and protecting effect required by each electronic component, and the like. The data plug 18 and the data receptacle 19 may each be a data transmission port conventional in the art, such as, but not limited to, a type-c interface type or versions of a USB interface type data plug 18 and data receptacle 19. The arrangement of the data plug 18 and the data socket 19 on the housing 12 may be arranged in a symmetrical manner or may be arranged in an asymmetrical manner, as long as it enables the mobile storage device 100 to be reliably connected to another type of mobile storage device 100 or terminal device.
The encryption and decryption module 14 is a module of digital encryption and decryption circuit modules or devices known in the art, and a data storage device conventional in the art. The encryption and decryption circuit module or device is not limited to the encryption and decryption module or device in the input form of a rotary disk input, a touch input or a key input. The sliding switch module 16 may be any type of sliding switch in the art, so long as it can control the starting and stopping of the encryption/decryption module 14 and the switching of the data input/output states. The encryption and decryption module 14, the sliding switch module 16, the data plug 18 and the data socket 19 can be electrically connected through metal wires respectively, or can be integrally arranged through a PCB, so that connection can be realized through a printed circuit on the PCB, and the connection can be specifically selected according to the needs of practical application.
Specifically, the mobile storage device 100 may access the terminal device storing the important data through the data plug 18, and copy the important data to be shared from the terminal device. The encryption and decryption module 14 can be switched to the data encryption working state by the operation of the sliding switch module 16, and the current data transmission state of the encryption and decryption module 14 is selected as the input state. Thereafter, the important data to be shared can be input through the data plug 18, and the encryption and decryption module 14 performs encryption processing, for example, the encryption and decryption module 14 completes encryption processing on the input important data according to the encryption password input by manual operation, and then stores the encrypted data. After the data is copied, the encryption and decryption module 14 can be withdrawn from the encryption working state by the operation of the sliding switch module 16, and the current data transmission state is converted from the input state to the non-input and output latch state. As such, the terminal device cannot continue to input to the mobile storage device 100, and the important data stored in the mobile storage device 100 cannot be output to the outside.
When the important data stored in the mobile storage device 100 needs to be shared externally, the data plug 18 of another mobile storage device 100 (hereinafter referred to as a target device for convenience of distinction and explanation) that needs to acquire the important data may be inserted into the data socket 19 of the mobile storage device 100 (hereinafter referred to as a source device for convenience of distinction and explanation) that has stored the important data. It will be appreciated that the data plug 18 of the source device may be plugged into the data socket 19 of the destination device, and the corresponding subsequent input/output operations may be similarly understood. After the two mobile storage devices 100 are connected, the two mobile storage devices can operate on the sliding switch module 16 of the source device, the working state of the source device is switched to be on, and the data transmission state of the encryption and decryption module 14 of the source device is switched to be in a data output state; correspondingly, the sliding switch module 16 of the target device is operated to switch the working state of the target device to be on, and the data transmission state of the encryption and decryption module 14 of the target device is switched to the data input state.
Thus, the encryption and decryption module 14 of the source device inputs the encryption password used in encryption, and the encryption and decryption module 14 of the source device can decrypt the stored and encrypted important data and output the encrypted important data to the data plug 18 of the target device through the data socket 19. Accordingly, the encryption and decryption module 14 of the target device inputs the encryption password to be adopted, and the encryption and decryption module 14 of the target device can encrypt and automatically store the important data input from the data plug 18 according to the input encryption password. After the important data is transmitted, the respective encryption and decryption modules 14 can be moved out of the decryption/encryption working state by the operation of the sliding switch modules 16 of the source device and the target device, and the respective current data transmission state is converted from the output/input state to the non-input/output latch state, so that the sharing of the important data can be completed.
The mobile storage device is a brand new mobile storage device through the combined design of the shell 12, the encryption and decryption module 14, the sliding switch module 16, the gear switch, the data plug 18 and the data socket 19. During data sharing, the data plug 18 can be directly inserted into the data socket 19 of another mobile storage device of the same type, and the sliding switch module 16 of each mobile storage device controls the starting of the encryption and decryption module 14, and switches the control of the encryption and decryption module 14 on the data input and output states. After decrypting the stored data to be output, the encryption and decryption module 14 of the mobile storage device sharing the data outputs the decrypted data to the data plug 18 (or the data socket 19) of the mobile storage device receiving the data through the data socket 19 (or the data plug 18); the encryption and decryption module 14 of the mobile storage device receiving the data can encrypt and store the input data to be stored. The data sharing process does not need to pass through a computer terminal, so that the data transmission safety is greatly improved, and the convenience of data secret transmission is greatly improved.
In one embodiment, as shown in FIG. 2, the slide switch module 16 includes a toggle button 162, a slide rail 164, an input gear 166, an output gear 168, and a neutral gear 169. Toggle button 162 is positioned in matching relation with slide rail 164. The slide rail 164 is mechanically coupled to the housing 12. An input gear member 166, an output gear member 168 and a neutral gear member 169 are respectively disposed on the slide rail 164. The toggle button 162, the input gear 166, the output gear 168, and the idle gear 169 are electrically connected to the encryption and decryption module 14, respectively. The toggle button 162 is used for respectively sliding on the sliding rail 164 to trigger the input gear 166, the output gear 168 and the idle gear 169, and controlling the switching of the on and off states of the encryption and decryption module 14. The input gear 166 is used for controlling the encryption and decryption module 14 to receive data to be stored. The output gear 168 is used for controlling the encryption and decryption module 14 to output stored data. The idle gear 169 is used for controlling the encryption and decryption module 14 to enter a data latch state.
It will be appreciated that the rail 164 may be a male insulated rail or a female insulated rail as is conventional in the art. The gear members are distributed on the slide rail 164, and the specific position can be determined according to the need of triggering the gear members when the toggle button 162 slides on the slide rail 164. The gear members may be uniformly distributed on the sliding rail 164 at equal intervals or non-uniformly distributed at unequal intervals, so long as the gear members can be effectively triggered by sliding the toggle button 162.
The toggle button 162 may be an independent start-stop switch button, for example, toggling or pressing the toggle button 162 alone may effect a state switch of the start-stop switch without direct contact with the gear. The toggle button 162 may also be a non-independent switch button that cooperates with each gear to realize the start-stop control of the encryption and decryption module 14 and simultaneously realize the gear selection, for example, the toggle button 162 slides on the sliding rail 164 to the gear, when the toggle button 162 is toggled or pressed, the metal plectrum of the toggle button 162 is engaged with the gear to realize the start-stop control of the encryption and decryption module 14 and simultaneously realize the gear selection of the currently contacted gear. Correspondingly, each gear can be a separate gear switch, the toggle button 162 slides to any gear on the sliding rail 164, and the toggle button 162 triggers the gear to switch to the state by direct contact or non-contact induction triggering. Each gear piece may also be a metal conductive sheet separately disposed on the sliding rail 164, and is used to cooperate with the toggle button 162 to realize gear selection. The toggle button 162 and each gear member may be a switch component of a metal conductive sheet of the same type (such as a copper sheet, an aluminum sheet, a platinum sheet, or other conductive sheets), or may be a metal conductive sheet of a different type, which may be specifically selected according to practical application and design cost.
The mechanical connection between the rail 164 and the housing 12 may be by welding, adhesive, snap-fit, or other means of connection, provided that a secure mounting of the rail 164 on the housing 12 is achieved. The arrangement mode of each gear piece on the sliding rail 164 can be bonding, clamping or other arrangement modes, so long as each gear piece can be firmly installed on the sliding rail 164. The arrangement order of the gear members on the slide rail 164 may be the arrangement order of the input gear member 166 and the output gear member 168 to the idle gear member 169, or the arrangement order of the input gear member 166, the idle gear member 169 to the output gear member 168, or the arrangement order of the idle gear member 169, the input gear member 166 to the output gear member 168, or other arrangement orders, specifically, the arrangement order may be determined according to the matching requirement of the sliding trigger with the toggle button 162, as long as the switching of the data input and output and the latch state can be accurately realized.
Specifically, by sliding the toggle button 162 on the slide rail 164, a selection trigger of different gear positions can be achieved. For example, the output gear 168 is set to the T gear, the input gear 166 is set to the R gear, and the neutral gear 169 is set to the N gear. When the mobile storage device 100 does not share data with other terminal devices or the mobile storage device 100, the toggle button 162 can be slid to the N-gear, at this time, the data stored in the encryption and decryption module 14 cannot be output to the outside, the external data cannot be input to the encryption and decryption module 14, and the encryption and decryption module 14 can be withdrawn from the working state by toggling or pressing the toggle button 162. When the mobile storage device 100 needs to share data with other terminal devices or the mobile storage device 100, the toggle button 162 can be slid to the T-gear, and after the toggle button 162 is toggled or pressed at this time, the data stored by the encryption and decryption module 14 can be decrypted and then output, while external data cannot be input into the encryption and decryption module 14; after the data sharing is completed, the data output state can be exited by toggling or pressing the toggle button 162 again. When the mobile storage device 100 needs to receive data shared by other terminal devices or the mobile storage device 100, the toggle button 162 can be slid to the R-gear, after the toggle button 162 is toggled or pressed, the data stored in the encryption and decryption module 14 cannot be output, and the external data can be input into the encryption and decryption module 14 and stored in an encrypted manner; after the data is received, the data input state can be exited by toggling or pressing the toggle button 162 again.
Through the above arrangement mode of the toggle button 162 and each gear piece on the sliding rail 164, the switching of different data input/output states of the mobile storage device 100 can be effectively realized, and the safety of the data storage and sharing process is effectively improved.
In one embodiment, as shown in FIG. 2, the rail 164 is a concave rail 164. Toggle button 162 is a copper button. The input gear member 166, the output gear member 168 and the neutral gear member 169 are all copper sheets.
It can be appreciated that in this embodiment, the concave sliding rail 164 is used to provide the toggle button 162 and each gear, the toggle button 162 can slide in the sliding groove of the concave sliding rail 164, and the reliability of the limit is better, so that the stability of the toggle button 162 on the housing 12 can be further improved. A copper button refers to a button that employs a copper sheet as a metallic conductive sheet, which generally comprises a copper sheet and a button member.
Specifically, in this embodiment, each gear piece adopts a copper sheet, and the toggle button 162 adopts a copper sheet button, and each copper sheet is directly and electrically connected to the encryption and decryption module 14, or indirectly and electrically connected to the encryption and decryption module 14 through a printed circuit of a PCB substrate or other intermediate auxiliary elements, for implementing switching of the on-off state and switching of the data input and output state of the encryption and decryption module 14. By adopting the slide rail 164 and the copper element, the structural reliability of the mobile storage device 100 can be further improved, and meanwhile, the signal transmission performance of the circuit is ensured and the production cost is reduced.
In one embodiment, as shown in fig. 3, the encryption and decryption module 14 includes an operation input unit 142, an encryption and decryption control unit 144, and a data storage unit 146. The operation input unit 142 is mechanically connected to the housing 12. The encryption and decryption control unit 144 and the data storage unit 146 are disposed in the accommodating cavity of the housing 12. The encryption and decryption control unit 144 is electrically connected to the data storage unit 146, the slide switch module 16, the data plug 18 and the data socket 19, respectively. The operation input unit 142 is used to input an encryption operation signal and a decryption operation signal to the encryption/decryption control unit 144. The encryption/decryption control unit 144 is configured to encrypt the data to be stored in the input data storage unit 146 after receiving the encryption operation signal; and for decrypting the stored data output from the data storage unit 146 after receiving the decryption operation signal.
It is understood that the operation input unit 142 is an operation unit for inputting an encrypted password, and may be a touch input unit or a key unit, such as a touch screen or a keyboard. The operation input unit 142 may be a voice input module in the art, and may specifically be selected according to the design requirement of practical application, so long as the encryption and decryption control unit 144 can be effectively provided with the required encryption password. The encryption and decryption control unit 144 is an encryption and decryption controller or a main control board in the field, and can be used for realizing the encryption and decryption functions of data according to the input encryption password. The data storage unit 146 is a readable memory as known in the art, and the specific size and the like can be selected according to the needs of the actual application.
The operation input unit 142 may be mechanically coupled to the housing 12 by welding, bonding, clamping, or other coupling means, so long as the operation input unit 142 can be stably mounted on the housing 12 so as to be convenient for a user to operate to input the encryption code. Inside the housing 12, i.e. in the accommodating cavity of the housing 12, the encryption/decryption control unit 144 and the data storage unit 146 are respectively mechanically connected to the inner surface of the housing 12 (i.e. the surface of the housing 12 near one side of the accommodating cavity) directly or indirectly, so as to realize limit fixation. The encryption and decryption control unit 144 and the data storage unit 146 may be separately disposed in the accommodating cavity of the housing 12, or may be mounted on the same PCB substrate to achieve unified arrangement.
Specifically, when the encryption/decryption control unit 144 is set by the slide switch module 16 to enter an encryption/decryption working state and a corresponding data input or output state is selected, the encryption/decryption control unit 144 is provided with an encryption password by operating the input unit 142, and the encryption/decryption control unit 144 can encrypt data input from the data socket 19 or the data plug 18 into the data storage unit 146 or decrypt stored data output from the data storage unit 146 and then output the decrypted data to the outside through the data socket 19 or the data plug 18.
Through the cooperation of the units, the encryption and storage processing of the data input into the data storage unit 146 and the decryption processing of the data output from the data storage unit 146 can be efficiently realized, the encryption password can be flexibly set, the randomness is strong, and the storage and transmission security of the data can be effectively improved.
In one embodiment, as shown in fig. 4, the operation input unit 142 includes a key substrate 1422 and a number of numeric keys 1424. The key substrate 1422 is mechanically coupled to each of the number keys 1424. The key substrate 1422 is mechanically coupled to the housing 12. Each number key 1424 is embedded in the outer surface of the housing 12. The key substrate 1422 is electrically connected to the encryption/decryption control unit 144.
It will be appreciated that the number of the number keys 1424 may be 10 bits, for example, keys 0-9, or may be 4 bits or 6 bits, for example, any 4 bits or 6 bits of keys 0-9, and may be specifically determined according to the type of encryption/decryption control unit 144 used, the selected encryption password length, and the like. The key substrate 1422 is an electronic key pad that mates with the number keys 1424, and the number of key contacts included on the key substrate 1422 is determined according to the number of number keys 1424. The key substrate 1422 is used to convert the actions of the numeric keys 1424 into corresponding electrical signals. The key substrate 1422 may be mechanically coupled to the housing 12 by a screw connection, welding, adhesive, snap-fit, or other connection, so long as a secure mounting of the key substrate 1422 on the housing 12 is achieved. The key substrate 1422 and each number key 1424 may be mechanically coupled by a conventional snap, spring, or other mechanical connection.
In the foregoing embodiments, the number keys 1424 may be mechanically coupled to the outer surface of the housing 12 directly through the key substrate 1422. In this embodiment, each of the number keys 1424 may be embedded in the outer surface of the housing 12, so that the pressing operation portion of each of the number keys 1424 extends out of the outer surface of the housing 12, and the whole number keys 1424 do not float out of the outer surface of the housing 12, thereby increasing the stability of each of the number keys 1424 and reducing the probability of key falling. Each number key 1424 is movable relative to the housing 12 when pressed to enter an encryption code.
Specifically, when the toggle button 162 is slid to the input gear or the output gear and the toggle button 162 is pressed, the encryption/decryption control unit 144 enters the encryption/decryption operation state and switches to the data input or output state. At this time, after the corresponding number key 1424 is pressed to input the encryption code, the input encryption code is converted into a corresponding electrical signal through the key substrate 1422 and is output to the encryption and decryption control unit 144, so that the input of the encryption code is completed. Thereafter, the encryption/decryption control unit 144 may encrypt the input data according to the input encryption password, or decrypt the output data.
By adopting the operation input unit 142, the password input operation is simple and convenient, and the overall production cost of the mobile storage device 100 can be reduced.
In one embodiment, data plug 18 is a USB plug and data receptacle 19 is a USB receptacle. Optionally, in this embodiment, a USB interface type data plug 18 and a data socket 19 are preferably used for port transmission of data to and from the mobile storage device 100. The USB protocol versions of the USB plug and the USB socket are not limited in the present specification, and may be all existing protocol versions, or may be updated versions that are to be updated and pushed out, specifically may be determined according to the needs of practical applications, so long as the required functions of data transmission, interface adaptation, expansion, and the like can be provided.
Through adopting USB plug and USB socket, can provide high-efficient data transmission performance simultaneously, can improve mobile storage device 100's expansion ability to promote mobile storage device 100's commonality, and do benefit to the reduction in production cost of complete machine.
In one embodiment, as shown in fig. 1, the USB plug and the USB socket are mechanically connected to the housing 12, respectively, and the USB plug and the USB socket are disposed opposite to each other on the housing 12.
It will be appreciated that the USB plug and USB socket may be mechanically coupled to the housing 12 by a screw connection, welding, adhesive, snap-fit or other connection, so long as a secure mounting on the housing 12 is achieved. The USB plug may protrude to the outer surface of the housing 12, the corresponding USB socket may be built in the accommodating cavity of the housing 12, and the socket is disposed in a level with the outer surface of the housing 12, or the socket portion extends to the outer surface of the housing 12, and the specific mounting structure may be determined according to the actual application requirement.
The opposite arrangement of the USB plug and the USB socket on the housing 12 means that the USB plug and the USB socket are arranged in a symmetrical manner along the axial direction of the housing 12 or in a symmetrical manner along the radial direction of the housing 12. For example, when the housing 12 is a cylindrical housing 12, the overall shape of the mobile storage device 100 is cylindrical, and then the USB plug and the USB socket are located at two axial ends of the housing 12, respectively. By the above arrangement of the positions of the USB plug and the USB socket on the housing 12, the mobile storage device 100 can be conveniently plugged into other terminal devices or the mobile storage device 100, so as to effectively improve the use efficiency of the mobile storage device 100.
In one embodiment, the mobile storage device further includes an indicator light. The indicator light is disposed on the housing 12 and electrically connected to the encryption/decryption module 14. The indicator light is used for indicating the encryption and decryption state indication of the encryption and decryption module 14.
It can be understood that the indicator lamp can be an LED indicator lamp, a laser indicator lamp or other types of indicator lamps, so long as the indicator lamp can flash through the lamp tube or realize the indication of different encryption and decryption states through the different color lamp tubes. The number of the indication lamps may be one, for example, one indication lamp capable of emitting one or more colors, or two or more indication lamps may be determined according to various encryption and decryption states indicated by the required distinction, for example, the illumination or yellow light indicates that the encryption and decryption control unit 144 starts working, the long-colored green light or the flashing green light indicates that the password input is correctly encrypted/decrypted, the long-colored red light or the flashing red light indicates that the password is incorrect (error alarm), the extinction indicates that the password is output in a non-data transmission state, and the like.
The indicator lamp is installed on the outer surface of the casing 12, and the specific position can be determined according to the shape and the use mode of the whole mobile storage device 100, so long as the current encryption and decryption state can be conveniently and prominently reminded to a user. The current encryption and decryption state of the encryption and decryption module 14 can be visually indicated through the setting of the indicator lamp, so that a user can know the current working state of the mobile storage device 100 in real time, and the use efficiency of the mobile storage device 100 is further improved.
In one embodiment, as shown in fig. 5, for more clearly describing the above-mentioned mobile storage device 100 and for facilitating understanding of the above-mentioned embodiments, the following application description is given by taking an application scenario of data transmission between two mobile storage devices 100 of the same type as an example:
before data sharing, the source device and the target device are set to N files. And inserting the USB plug of the target device into the USB socket of the source device to realize USB interface connection. Setting the target device as R-file to switch to the data input state, setting the source device as T-file (and inputting an encryption password, which is a scene when encryption and decryption are needed) to switch to the data output state, and sharing data from the source device to the target device until the data transmission is completed. Setting the source device and the target device as N-gear, and pulling the target device out of the source device.
In one embodiment, as shown in fig. 6 and fig. 7, there is further provided a data encryption processing method, which is described by taking the application of the method to the above-mentioned mobile storage device 100 as an example, and includes the following steps S12 to S18:
s12, collecting input data to be stored and receiving input encryption operation signals.
The encryption operation signal refers to an operation signal generated by the encryption and decryption module when the user operates the encryption and decryption module of the mobile storage device 100 to input an encryption password. For example, when a user sequentially presses or touches a digital key (which may be a mechanical key or a virtual key on a touch screen) on the encryption and decryption module to input an encryption password, the encryption and decryption module correspondingly generates an encryption signal input, so that the encryption and decryption module obtains the currently input encryption password.
Specifically, after the user operates the sliding switch module to start the encryption and decryption module, the encryption and decryption module starts to collect the data to be stored input from the data plug or the data socket, and the encryption and decryption module receives a corresponding encryption operation signal when the user inputs the encryption password so as to acquire the input encryption password.
S14, determining the length of the encryption password according to the encryption operation signal, and equally dividing the data to be stored according to the length of the encryption password.
The length of the encrypted password refers to the length of the input password, for example, the number of times that the user presses or touches the digital key on the encryption and decryption module, that is, the length of the encrypted password.
Specifically, the encryption and decryption module equally divides the acquired data to be stored according to the length of the encryption password to obtain each piece of data to be stored corresponding to the length of the encryption password. For example, the number of times of pressing or touching the digital key is 7 times (or 6 times or 9 times, and the same can be understood), the collected data to be stored is divided into 7 parts equally.
S16, respectively distributing different data labels for each piece of divided data to be stored, correlating the data labels with the input sequence of the encryption passwords, and determining key labels of each piece of data to be stored.
The data labels are unique marks corresponding to the data to be stored in one-to-one correspondence, for example, but not limited to, 7 parts of data to be stored, and the data labels A/B/C/D/E/F/G are respectively allocated, or labels with mixed letters and numbers or other forms can be adopted, so long as the data to be stored in each part can be respectively and uniquely marked. The input sequence of the encryption passwords refers to the sequence of pressing or touching the number keys on the encryption and decryption module by the user, for example 1/3/4/3/1/3/2 (i.e. the sequence of the number keys triggered).
Specifically, after the encryption and decryption module equally divides the collected data to be stored, the data labels of the encryption and decryption module are respectively set for each part of the data to be stored, and then the data labels are associated with the input sequence of the encryption passwords so as to respectively set corresponding key labels for each part of the data to be stored. As shown in FIG. 7, for example, the input sequence of the encryption codes is 1/3/4/3/1/3/2, and the data labels are A/B/C/D/E/F/G, respectively, and the key labels of the data to be stored are A-1/B-3/C-4/D-3/E-1/F-3/G-2, respectively.
S18, after the data to be stored of each component are recombined in sequence according to each key label, the data to be stored of each component are rearranged in sequence according to the sequence of the key labels, and encrypted data are obtained.
Specifically, the encryption and decryption module sequentially recombines the data to be stored according to the key labels of the data to be stored, and the key labels are respectively A-1/B-3/C-4/D-3/E-1/F-3/G-2 for illustration, and as shown in FIG. 7, the combination results are 1-A/E, 2-G, 3-B/D/F and 4-C. And then, the encryption and decryption module rearranges the sequentially recombined data to be stored in sequence according to the sequence of the key labels, namely A/E/G/B/D/F/C. And sequentially rearranging each part of data to be stored according to the input sequence of the encryption passwords to obtain the encrypted whole data to be stored. It should be noted that the foregoing examples are merely illustrative, so as to facilitate understanding, and are not limited solely to the present application, and those skilled in the art may choose to assign different data labels according to the foregoing steps, thereby implementing different key label settings. The encrypted data to be stored may be stored in the internal data storage unit 146, for example, the user operates the sliding switch module again to switch the encryption and decryption module to the off state, and latches the decrypted data for carrying and sharing.
According to the data encryption processing method, through being applied to the mobile storage device 100, the encryption operation on input data is realized by cooperating with the encryption and decryption module, the encryption operation convenience is high, the encryption password is flexibly set, the encryption and decryption module can encrypt corresponding data for the data to be stored according to the input encryption password, the encryption operation efficiency is high, the security is good, and the security of data storage and transfer can be effectively improved.
In one embodiment, as shown in fig. 8 and 9, a data decryption processing method is further provided, and an example of application of the method to the above-mentioned mobile storage device 100 is described, including the following steps S21 to S27:
s21, reading the encrypted stored data and receiving an input decryption operation signal.
The decryption operation signal refers to an operation signal generated by the encryption and decryption module when the user operates the encryption and decryption module of the mobile storage device 100 to input the encryption password. For example, when a user sequentially presses or touches a digital key (which may be a mechanical key or a virtual key on a touch screen) on the encryption and decryption module to input an encryption password, the encryption and decryption module correspondingly generates a decryption signal input, so that the encryption and decryption module obtains the currently input encryption password. Generally, the decryption process and the encryption process use the same encryption password on the same mobile storage device 100. The encrypted stored data is the data of the data to be stored after encryption processing.
Specifically, after the user operates the sliding switch module to start the encryption and decryption module, the encryption and decryption module starts to read the stored data inside, namely the data needing to be shared currently; the encryption and decryption module receives corresponding decryption operation signals when the user inputs the encryption password so as to acquire the input encryption password.
S23, determining whether the input encryption password is correct or not according to the decryption operation signal.
Specifically, when the user needs to share the output of the encrypted stored data, the user needs to provide the correct encryption password for the encryption and decryption module, so that the encryption and decryption module decrypts and outputs the encrypted stored data. When the user inputs the encryption password to enable the encryption and decryption module to decrypt the stored data, the encryption and decryption module will firstly compare the currently input encryption password with the original encryption password input in the encryption process, if the two encryption passwords are consistent, the currently input encryption password is correct, otherwise, the currently input encryption password is wrong.
When the encryption password is correct, the encryption and decryption module can normally perform subsequent data decryption output operation. When the encryption password is wrong, the encryption and decryption module can warn through controlling the indicator lamp, for example, the indicator lamp is controlled to light red. If the user inputs the encryption password error for multiple times, for example, 3 times or 5 times, the encryption and decryption module can be automatically switched to the closed state to latch the stored data, or the encryption password input operation can be set to the invalid state so that the user cannot continue to operate or directly destroy the stored data, and the encryption and decryption module can be specifically set according to the actual application occasion, the confidentiality of the data and the like.
S25, if so, decomposing the stored data according to the length of the encrypted password and each key label of the stored data.
The explanation of the length of the encryption password and the key label may be referred to the corresponding explanation of the above embodiment of the data encryption processing method, and the description will not be repeated here and hereinafter.
Specifically, after the encryption and decryption module verifies that the currently input encryption password is correct, the read stored data can be decomposed according to the length of the encryption password and each key label of the stored data, that is, the whole stored data is decomposed into parts corresponding to the length of the encryption password, for example, if the encryption password is 7 bits, the stored data is decomposed into 7 parts of data to be stored, taking the above A-1/B-3/C-4/D-3/E-1/F-3/G-2 as an example, and the decomposition process is shown in fig. 9, and each part of decomposed data to be stored is 1-A/E, 2-G, 3-B/D/F and 4-C.
S27, rearranging each part of data to be stored obtained through decomposition according to the input sequence of the encryption passwords associated with each key label to obtain decrypted data to be stored.
Specifically, the encryption and decryption module rearranges each part of data to be stored according to the sequence of the currently input encryption passwords, namely the input sequence of the encryption passwords used in the encryption process, so that the whole accurate data to be stored can be obtained: if the order of the input encryption passwords is 1/3/4/3/1/3/2, the whole data to be stored, which sequentially consists of all the data A/B/C/D/E/F/G to be stored, is decrypted data to be stored. The decrypted data to be stored can be output to the outside through the data socket or the data plug.
According to the data decryption processing method, through being applied to the mobile storage device 100, the decryption operation on output data is realized in cooperation with the encryption and decryption module, the decryption operation convenience is high, the encryption and decryption module can perform corresponding data decryption on stored data according to the input encryption password, the decryption operation efficiency is high, the security is good, and the security of data transfer can be effectively improved.
In one embodiment, as shown in fig. 9, regarding the process of decomposing the stored data in step S25, the following processing steps may be further included:
if any key label corresponds to a plurality of data to be stored, extracting the data to be stored with the front distribution sequence of the data labels according to the input sequence of the encryption passwords.
Specifically, in the data decryption process, if one key label corresponds to the data to be stored of multiple data labels, example 1 corresponds to two pieces of data to be stored of a/E, and 3 corresponds to three pieces of data to be stored of B/D/F, respectively, the encryption and decryption module may first strip and extract the first piece of data to be stored of the distribution sequence of the corresponding data label in the current data decomposition process according to the input sequence of the encryption password in the data decomposition process of each round (the total number of rounds is determined by the total number of pieces of data to be stored). As shown in fig. 9, the key tag 1 corresponds to two pieces of data to be stored of the data tag a and the data tag E; when the data to be stored corresponding to the key label 1 is decomposed for the first time, the data to be stored of the data label A with the previous allocation sequence of the corresponding data label is extracted and stripped. That is, when the previous round of data is decomposed, the key tag 1 no longer corresponds to the data tag a, but the data to be stored of the data tag E corresponding to the key tag 1 is still reserved for subsequent decomposition. Thus, the decomposition processing of each part of data to be stored is completed.
Through the processing steps, the data decomposition processing is efficiently completed, the disorder of decomposed data is reduced, the processing speed of data rearrangement is facilitated, and the efficiency of data decryption processing is improved.
It should be understood that, although the steps in the flowcharts 6 and 8 of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 6 and 8 may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor does the order in which the sub-steps or stages are performed necessarily occur in sequence, but may be performed alternately or alternately with at least a portion of the other steps or sub-steps of other steps.
In one embodiment, as shown in fig. 10, a data encryption processing apparatus 200 is provided, which can be applied to the above-described mobile storage device 100. The data encryption processing apparatus 200 includes a first acquisition module 201, a data grouping module 203, a tag processing module 205, and a rearrangement module 207. The first acquisition module 201 is configured to acquire input data to be stored and receive an input encryption operation signal. The data grouping module 203 is configured to determine the length of the encryption password according to the encryption operation signal, and equally divide the data to be stored according to the length of the encryption password. The tag processing module 205 is configured to allocate different data tags to each divided portion of data to be stored, and associate the data tags with an input sequence of an encrypted password, so as to determine a key tag of each portion of data to be stored. The rearrangement module 207 is configured to rearrange the data to be stored according to the sequence of the key labels to obtain encrypted data.
According to the data encryption processing device 200, the encryption operation on the input data is realized through cooperation of the modules, the encryption operation convenience is high, the encryption password is flexibly set, the encryption operation efficiency is high, the security is good, and the security of data storage and transfer can be effectively improved.
The specific limitation of the data encryption processing apparatus 200 may be referred to the limitation of the data encryption processing method hereinabove, and will not be described herein. The respective modules in the above-described data encryption processing apparatus 200 may be implemented in whole or in part by software, hardware, or a combination thereof. The above modules may be embedded in hardware or independent of the processor, or may be stored in software in a memory, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, as shown in fig. 11, there is further provided a data decryption processing apparatus 300, which can be applied to the above-mentioned mobile storage device 100. The data decryption processing apparatus 300 includes a second acquisition module 31, a verification module 33, a data decomposition module 35, and a recovery processing module 37. The second acquisition module 31 is configured to read the encrypted stored data and receive an input decryption operation signal. The verification module 33 is configured to determine whether the input encryption password is correct according to the decryption operation signal. The data decomposition module 35 is configured to decompose the stored data according to the length of the encrypted password and each key label of the stored data when the input encrypted password is correct. The recovery processing module 37 is configured to rearrange the decomposed pieces of data to be stored according to the input sequence of the encrypted password associated with each key label to obtain decrypted data to be stored.
The data decryption processing device 300 realizes the decryption operation on the output data through the cooperation of the modules, has high decryption operation convenience, high decryption operation efficiency and better security, and can effectively improve the security of data transfer.
For the specific limitation of the data decryption processing apparatus 300, reference may be made to the limitation of the data decryption processing method hereinabove, and the description thereof will not be repeated here. The respective modules in the above-described data decryption processing apparatus 300 may be implemented in whole or in part by software, hardware, or a combination thereof. The above modules may be embedded in hardware or independent of the processor, or may be stored in software in a memory, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, the above-mentioned data decomposition module 35 may be further configured to, when any key label corresponds to a plurality of data to be stored, extract, according to the input sequence of the encryption password, a data to be stored with a previous distribution sequence of the data label in the process of decomposing the stored data.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of: collecting input data to be stored and receiving input encryption operation signals; determining the length of an encryption password according to the encryption operation signal, and equally dividing data to be stored according to the length of the encryption password; respectively distributing different data labels for each divided part of data to be stored, correlating the data labels with the input sequence of the encryption passwords, and determining key labels of each part of data to be stored; and after the data to be stored of each component are recombined in sequence according to each key label, the data to be stored of each component are rearranged in sequence according to the sequence of the key labels to obtain encrypted data.
Or the following steps are realized: reading the encrypted stored data and receiving an input decryption operation signal; determining whether the input encryption password is correct according to the decryption operation signal; if so, decomposing the stored data according to the length of the encrypted password and each key label of the stored data; and rearranging each part of the decomposed data to be stored according to the input sequence of the encryption passwords associated with each key label to obtain decrypted data to be stored.
In an embodiment, the computer program, when executed by a processor, may further implement the added sub-steps of the embodiments of the data decryption processing method described above.
Those skilled in the art will appreciate that implementing all or part of the above-described methods in accordance with the embodiments may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples represent only a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.
Claims (13)
1. The mobile storage device is characterized by comprising a shell, and an encryption and decryption module, a sliding switch module, a data plug and a data socket which are respectively arranged on the shell, wherein the encryption and decryption module is respectively and electrically connected with the sliding switch module, the data plug and the data socket;
the encryption and decryption module is used for encrypting and storing the input data to be stored and decrypting the output stored data;
The sliding switch module is used for switching the on and off states of the encryption and decryption module and switching the data input and output control states of the encryption and decryption module;
the data plug and the data socket are used for transmitting the data to be stored and the decrypted stored data;
a mobile storage device copies data from the terminal device through the data plug, encrypts and stores the data; when the data stored in the one mobile storage device needs to be shared to another mobile storage device, the data plug of the other mobile storage device is inserted into the data socket of the mobile storage device, the one mobile storage device decrypts the encrypted data and outputs the encrypted data to the data plug of the other mobile storage device through the data socket of the one mobile storage device, and the other mobile storage device encrypts and stores the input data;
the sliding switch module comprises a toggle button, a sliding rail, an input gear piece, an output gear piece and a vacant gear piece;
the toggle button is arranged in a position matched with the slide rail, the slide rail is mechanically connected with the shell, the input gear piece, the output gear piece and the idle gear piece are respectively arranged on the slide rail, and the toggle button, the input gear piece, the output gear piece and the idle gear piece are respectively electrically connected with the encryption and decryption module;
The toggle button is used for respectively triggering the input gear piece, the output gear piece and the idle gear piece in a sliding manner on the sliding rail, and controlling the switching of the opening and closing states of the encryption and decryption module;
the input gear piece is used for controlling the encryption and decryption module to receive the data to be stored, the output gear piece is used for controlling the encryption and decryption module to output the stored data, and the idle gear piece is used for controlling the encryption and decryption module to enter a data latch state.
2. The mobile storage device of claim 1, wherein the slide rail is a concave slide rail, the toggle button is a copper tab button, and the input gear, the output gear, and the neutral gear are copper tabs.
3. The mobile storage device according to any one of claims 1 to 2, wherein the encryption/decryption module includes an operation input unit, an encryption/decryption control unit, and a data storage unit;
the operation input unit is mechanically connected with the shell, the encryption and decryption control unit and the data storage unit are arranged in the accommodating cavity of the shell, and the encryption and decryption control unit is respectively and electrically connected with the data storage unit, the sliding switch module, the data plug and the data socket;
The operation input unit is used for inputting an encryption operation signal and a decryption operation signal to the encryption and decryption control unit, and the encryption and decryption control unit is used for encrypting the data to be stored, which is input into the data storage unit, after receiving the encryption operation signal; and the decryption unit is used for decrypting the stored data output by the data storage unit after receiving the decryption operation signal.
4. The mobile storage device of claim 3, wherein the operation input unit comprises a key substrate and a number of number keys;
the key substrate is matched with the mechanical structures of the digital keys, the key substrate is mechanically connected with the shell, the digital keys are embedded in the outer surface of the shell, and the key substrate is electrically connected with the encryption and decryption control unit.
5. The mobile storage device of claim 1, wherein the data plug is a USB plug and the data receptacle is a USB receptacle.
6. The mobile storage device of claim 5, wherein the USB plug and the USB socket are mechanically coupled to the housing, respectively, and the USB plug and the USB socket are positioned opposite each other on the housing.
7. The mobile storage device of claim 1, further comprising an indicator light disposed on the housing and electrically connected to the encryption and decryption module, the indicator light being configured to indicate an encryption and decryption status indication of the encryption and decryption module.
8. A data encryption processing method applied to the mobile storage device of any one of claims 1 to 7, the method comprising:
collecting input data to be stored and receiving input encryption operation signals;
determining the length of an encryption password according to the encryption operation signal, and equally dividing the data to be stored according to the length of the encryption password;
respectively distributing different data labels for each divided part of the data to be stored, correlating the data labels with the input sequence of the encryption passwords, and determining key labels of each part of the data to be stored;
and after the data to be stored of each component are sequentially recombined according to each key label, sequentially rearranging each component of the data to be stored according to the sequence of the key labels to obtain encrypted data.
9. A data decryption processing method, applied to the mobile storage device of any one of claims 1 to 7, comprising:
Reading the encrypted stored data and receiving an input decryption operation signal;
determining whether the input encryption password is correct according to the decryption operation signal;
if yes, decomposing the stored data according to the length of the encrypted password and each key label of the stored data;
and rearranging each part of the decomposed data to be stored according to the input sequence of the encryption password associated with each key label to obtain decrypted data to be stored.
10. The data decryption processing method according to claim 9, wherein the process of decomposing the stored data comprises:
and if any key label corresponds to a plurality of parts of data to be stored, extracting the part of data to be stored with the previous distribution sequence of the data labels according to the input sequence of the encryption passwords.
11. A data encryption processing apparatus applied to the mobile storage device of any one of claims 1 to 7, the apparatus comprising:
the first acquisition module is used for acquiring input data to be stored and receiving input encryption operation signals;
the data grouping module is used for determining the length of an encryption password according to the encryption operation signal and equally dividing the data to be stored according to the length of the encryption password;
The label processing module is used for respectively distributing different data labels for each divided part of the data to be stored, correlating the data labels with the input sequence of the encryption passwords and determining key labels of each part of the data to be stored;
and the rearrangement module is used for rearranging each part of the data to be stored according to the sequence of the key labels to obtain encrypted data after the data to be stored are rearranged in sequence according to the sequence of the key labels.
12. A data decryption processing apparatus, applied to the mobile storage device of any one of claims 1 to 7, comprising:
the second acquisition module is used for reading the encrypted stored data and receiving an input decryption operation signal;
the verification module is used for determining whether the input encryption password is correct or not according to the decryption operation signal;
the data decomposition module is used for decomposing the stored data according to the length of the encrypted password and each key label of the stored data when the input encrypted password is correct;
and the recovery processing module is used for rearranging the decomposed parts of the data to be stored to obtain decrypted data to be stored according to the input sequence of the encryption passwords associated with the key labels.
13. A computer-readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the data encryption processing method according to claim 8 or the steps of the data decryption processing method according to claim 9 or 10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911005683.9A CN110912677B (en) | 2019-10-22 | 2019-10-22 | Mobile storage device, device and data encryption and decryption processing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911005683.9A CN110912677B (en) | 2019-10-22 | 2019-10-22 | Mobile storage device, device and data encryption and decryption processing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110912677A CN110912677A (en) | 2020-03-24 |
CN110912677B true CN110912677B (en) | 2023-06-30 |
Family
ID=69814876
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911005683.9A Active CN110912677B (en) | 2019-10-22 | 2019-10-22 | Mobile storage device, device and data encryption and decryption processing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110912677B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1435761A (en) * | 2002-01-29 | 2003-08-13 | 记忆科技(深圳)有限公司 | Mobile data memory unit capable of implementing in-line and off-line encryption/decryption |
CN105184179A (en) * | 2015-11-05 | 2015-12-23 | 深圳市凯祥源科技有限公司 | Embedded encrypted mobile storage device and operation method thereof |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
BR0015190A (en) * | 2000-02-21 | 2002-07-02 | Trek 2000 Int Ltd | Portable data storage device |
CN102436568B (en) * | 2010-09-29 | 2014-12-17 | 苏州慧尔科技发展有限公司 | Computer external encryption device with storage function and encryption and decryption method utilizing same |
-
2019
- 2019-10-22 CN CN201911005683.9A patent/CN110912677B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1435761A (en) * | 2002-01-29 | 2003-08-13 | 记忆科技(深圳)有限公司 | Mobile data memory unit capable of implementing in-line and off-line encryption/decryption |
CN105184179A (en) * | 2015-11-05 | 2015-12-23 | 深圳市凯祥源科技有限公司 | Embedded encrypted mobile storage device and operation method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN110912677A (en) | 2020-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101401105B (en) | Encryption apparatus and method for providing an encrypted file system | |
CN112507365B (en) | Data matching method, terminal and storage medium | |
CN102945574B (en) | Device and method for controlling locking system permission by mobile equipment | |
CN109286487B (en) | Remote control method and system for electronic equipment | |
ES2068026T3 (en) | ELECTRONIC AND MECHANICAL LOCK, AND KEY FOR SUCH LOCK. | |
CN111596938A (en) | Embedded device firmware security upgrade method, system, terminal and storage medium | |
CN111427860A (en) | Distributed storage system and data processing method thereof | |
CN111415440B (en) | Data storage device | |
CN105069365A (en) | Data processing method and mobile terminal | |
CN110912677B (en) | Mobile storage device, device and data encryption and decryption processing method | |
CN111866864A (en) | Method, device and storage medium for realizing encrypted storage and safe use management of cloud platform certificate based on wireless AP | |
CN114329546A (en) | File encryption method and device, and file decryption method | |
CN110912678B (en) | Data memory, data encryption method, data decryption apparatus, and medium | |
CN118199992B (en) | Data encryption method and device, electronic equipment and storage medium | |
KR20200070532A (en) | Management system and method for data security for storage device using security device | |
US8347113B2 (en) | System and method for encrypting an electronic file in a mobile electronic device | |
JP7327990B2 (en) | Integrated circuit device and method of operating integrated circuit device | |
CN117997549A (en) | Certificate encryption storage, decryption reading method and device | |
CN106325710A (en) | Mobile terminal control method, device and mobile terminal | |
CN115567212A (en) | File processing method and device, computer equipment and computer readable storage medium | |
RU150869U1 (en) | DEVICE FOR TRANSFER OF CONFIDENTIAL MESSAGES BY MOBILE PHONE | |
CN103001774B (en) | Method and device for managing package file | |
CN101788985B (en) | Method and device for carrying out k anonymity updating on encrypted inverted index table | |
CN108921550B (en) | Management method and device of digital currency wallet, electronic equipment and storage medium | |
CN112866996A (en) | Electricity card and electric power data transmission system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 519000 No. 333, Kexing Road, Xiangzhou District, Zhuhai City, Guangdong Province Applicant after: ZHUHAI JIELI TECHNOLOGY Co.,Ltd. Address before: Floor 1-107, building 904, ShiJiHua Road, Zhuhai City, Guangdong Province Applicant before: ZHUHAI JIELI TECHNOLOGY Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |