[go: up one dir, main page]

CN113378216A - eMMC control method, system and storage medium thereof - Google Patents

eMMC control method, system and storage medium thereof Download PDF

Info

Publication number
CN113378216A
CN113378216A CN202110595576.7A CN202110595576A CN113378216A CN 113378216 A CN113378216 A CN 113378216A CN 202110595576 A CN202110595576 A CN 202110595576A CN 113378216 A CN113378216 A CN 113378216A
Authority
CN
China
Prior art keywords
password
data
hidden area
user
power
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110595576.7A
Other languages
Chinese (zh)
Inventor
任鸣
罗挺
吴大畏
李晓强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yeestor Microelectronics Co ltd
Original Assignee
Yeestor Microelectronics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yeestor Microelectronics Co ltd filed Critical Yeestor Microelectronics Co ltd
Priority to CN202110595576.7A priority Critical patent/CN113378216A/en
Publication of CN113378216A publication Critical patent/CN113378216A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to an eMMC control method, a system and a storage medium thereof, wherein the eMMC control method comprises the following steps: after the terminal is powered on, acquiring a power-on password of a user at the terminal; when the write operation of a user is acquired, writing data into a storage area; when the starting password is the same as the preset verification password, inquiring whether to hide the data written into the storage area, if so, copying the encrypted data to the hidden area and deleting the data of the original storage area, and if not, not moving the data; and when the starting password is different from the preset verification password, the written data is not processed. The method and the device have the effects that the terminal can be used by most people, and the privacy of partial data is guaranteed.

Description

eMMC control method, system and storage medium thereof
Technical Field
The invention relates to the field of data storage, in particular to an eMMC control method and system with an encryption function and a storage medium thereof.
Background
When the current terminal protects data, a password is usually set when the terminal is started, and the data of the terminal can be browsed only through the verification of the start password.
The above prior art solutions have the following drawbacks: in some cases, only a small portion of the terminal is not shown to all, but only the person who enters the correct password can read the data in the terminal due to the power-on password, so that the number of users who can use the terminal is very limited.
Disclosure of Invention
In order to make a terminal usable by most people and to ensure privacy of part of data, the present application provides an eMMC control method having an encryption function.
In a first aspect, the eMMC control method provided in the present application adopts the following technical solution:
an eMMC control method, comprising: after the terminal is powered on, acquiring a power-on password of a user at the terminal; when the write operation of a user is acquired, writing data into a storage area; when the starting password is the same as the preset verification password, inquiring whether to hide the data written into the storage area, if so, copying the encrypted data to the hidden area and deleting the data of the original storage area, and if not, not moving the data; and when the starting password is different from the preset verification password, the written data is not processed.
By adopting the technical scheme, only when the input power-on password is the same as the preset verification password, the data to be hidden can be written into the hidden area, and other users who do not input the correct power-on password can only store the data into the conventional storage area. The data privacy of the user who inputs the power-on password correctly is ensured.
Optionally, the method further includes: when a user reads the operation, displaying the data of the storage area on the terminal;
when the starting-up password is the same as the preset verification password, the hidden area is displayed, and the data in the hidden area can be read; when the boot password is different from the preset verification password, the hidden area is not displayed, and the data in the hidden area cannot be read.
By adopting the technical scheme, when the user enters the terminal after inputting the password correctly, the data in the hidden area can be directly seen, and the password does not need to be input additionally, so that the data reading is more convenient. And when the user inputs the password incorrectly, the hidden area is not displayed, so that the data in the hidden area is not acquired by the user, and the privacy of the data is improved.
Optionally, the method further includes: when a user reading operation is acquired, when the starting password is different from a preset verification password, authentication information input by the user is acquired, when the authentication information is the same as the preset verification information, the hidden area is displayed, and data in the hidden area can be read; and when the authentication information is different from the preset verification information, the hidden area is not displayed, and the data in the hidden area cannot be read.
By adopting the technical scheme, after the user inputs the power-on password incorrectly, the terminal provides a way for determining whether the user can read the hidden data or not through the authentication information, and provides another way for reading the hidden data for the user.
Optionally, when the user resets the verification password, if the verification password is reset, the data in the hidden area is deleted, and if the verification password is not reset, the hidden area is not operated.
By adopting the technical scheme, after the verification password is modified, the data in the hidden area are directly deleted, so that the steps that the user needs to delete the data in the hidden area one by one are reduced, the operation flow of the user is reduced, and the operation efficiency is improved.
In a second aspect, the present application provides an eMMC control system, which adopts the following technical solution:
an eMMC control system, comprising: the terminal comprises a power-on password acquisition module, a power-on password acquisition module and a power-on password acquisition module, wherein the power-on password acquisition module is used for acquiring a power-on password input by a user in the terminal after the terminal is powered on; the writing module is used for writing data into the storage area when the user writing operation is acquired; the password verification module is used for inquiring whether the data written into the storage area is hidden or not when the starting password is the same as a preset verification password, if so, copying the encrypted data to the hidden area and deleting the data in the original storage area, and if not, not moving the data; and when the starting password is different from the preset verification password, the written data is not processed.
By adopting the technical scheme, only when the input power-on password is the same as the preset verification password, the data to be hidden can be written into the hidden area, and other users who do not input the correct power-on password can only store the data into the conventional storage area. The data privacy of the user who inputs the power-on password correctly is ensured.
Optionally, the method includes: the reading module is used for acquiring data of a storage area displayed on the terminal when a user reads the data; the password verification module is also used for displaying the hidden area when the starting password is the same as the preset verification password, and the data in the hidden area can be read; when the boot password is different from the preset verification password, the hidden area is not displayed, and the data in the hidden area cannot be read.
By adopting the technical scheme, when the user enters the terminal after inputting the password correctly, the data in the hidden area can be directly seen, and the password does not need to be input additionally, so that the data reading is more convenient. And when the user inputs the password incorrectly, the hidden area is not displayed, so that the data in the hidden area is not acquired by the user, and the privacy of the data is improved.
Optionally, the method includes: the information verification module is used for acquiring authentication information input by a user when a boot password is different from a preset verification password during reading operation of the user, and displaying the hidden area when the authentication information is the same as the preset verification information, wherein data in the hidden area can be read; and when the authentication information is different from the preset verification information, the hidden area is not displayed, and the data in the hidden area cannot be read.
By adopting the technical scheme, after the user inputs the power-on password incorrectly, the terminal provides a way for determining whether the user can read the hidden data or not through the authentication information, and provides another way for reading the hidden data for the user.
Optionally, the method includes: and the resetting module is used for deleting the data in the hidden area if the verification password is reset when the user resets the verification password, and not operating the hidden area if the verification password is not reset.
By adopting the technical scheme, after the verification password is modified, the data in the hidden area are directly deleted, so that the steps that the user needs to delete the data in the hidden area one by one are reduced, the operation flow of the user is reduced, and the operation efficiency is improved.
In a third aspect, the present application provides a computer readable storage medium storing a computer program that is loadable by a processor and operable to execute one of the eMMC control methods described above.
In summary, the present application includes at least one of the following beneficial technical effects:
1. only the user who inputs the boot password and the verification password are the same can store the data into the hidden area;
2. the user who inputs the boot password and the verification password are the same can read the data in the hidden area, so that the privacy of the data is improved, and the operation of other users on the data in the storage area is not influenced;
3. when the authentication information is the same as the verification information, the data in the hidden area can be displayed, and another way for a user to read the data in the hidden area is provided.
Drawings
Fig. 1 is a schematic flow chart of an eMMC control method according to an embodiment of the present application;
fig. 2 is a block diagram of an eMMC control system according to an embodiment of the present application.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
The present embodiment is only for explaining the present invention, and it is not limited to the present invention, and those skilled in the art can make modifications of the present embodiment without inventive contribution as needed after reading the present specification, but all of them are protected by patent law within the scope of the claims of the present invention.
An embodiment of the present invention provides an eMMC control method, which includes, in combination with fig. 1, the following steps:
s101: and after the terminal is powered on, acquiring a power-on password of the user at the terminal.
In the embodiment of the application, the terminal can be any device with a storage function, such as a mobile phone, a television box, a vehicle event recorder and the like. The boot password may be a character password or biometric information of a person, such as facial identification information, fingerprint identification information, and the like. The character password and the biological identification information can be used as the starting password together. Taking a mobile phone as an example, when the boot password is a character password, after the boot screen of the terminal is displayed, the password input box is displayed on the display screen to prompt the user to input the password, when the display screen is a touch screen, the soft keyboard is displayed on the display screen for the user to input the password, and when the display screen does not have a touch function, the user can input the password through the physical keyboard.
S102: and writing data into the storage area when the user writing operation is acquired.
In the embodiment of the application, after the user inputs the power-on password, the user can write the data into the storage area no matter whether the power-on password is correct or not. The memory area includes a memory area in the central control chip (for example, a read-only memory area ROM in the central control chip) and an embedded multimedia card eMMC built in the terminal.
S103: when the starting password is the same as the preset verification password, inquiring whether to hide the data written into the storage area, if so, copying the encrypted data to the hidden area and deleting the data of the original storage area, and if not, not moving the data; and when the starting password is different from the preset verification password, the written data is not processed.
In the embodiment of the present application, the authentication password may be stored in a Flash memory (a non-volatile memory) of the terminal in advance. When a user inputs a power-on password, the eMMC controller calls a verification password in the Flash memory, the power-on password is compared with the verification password, when the power-on password is the same as a preset verification password, a display screen of the terminal displays a prompt for inquiring whether a data prompt box written in a storage area is hidden or not, and the user selects whether a prompt is sent to the prompt box according to the requirement of the user. If the user selects yes, the data is copied to the hidden area after being encrypted, the data in the original storage area is deleted, and if the user selects no, the data is not moved and is reserved in the storage area. In some embodiments, the operation of encrypting and copying data from the storage area to the hidden area and deleting data in the original storage area may not be performed when the user performs the writing operation, that is, the user may perform the above operation on data already stored in the storage area to hide data originally displayed by all people. When the boot password is different from the preset verification password, the written data is not processed, specifically, the terminal does not display a data prompt box for inquiring whether to hide the written storage area on the display screen, so that a user who inputs the boot password incorrectly writes the data into the storage area normally without knowing that the hidden area exists.
The eMMC control method further comprises the following steps:
s201: and when the user reads the operation, displaying the data in the storage area on the terminal.
S202: when the starting-up password is the same as the preset verification password, the hidden area is displayed, and the data in the hidden area can be read; when the boot password is different from the preset verification password, the hidden area is not displayed, and the data in the hidden area cannot be read.
In the embodiment of the application, when the boot password is the same as the preset verification password, the terminal displays the specific representation form of the hidden area on the display screen as an icon corresponding to the data in the hidden area, or displays the icon corresponding to the folder by taking the folder as the hidden area for storing the data. The icon of the data in the hidden area or the folder corresponding to the hidden area may be displayed in the same manner as the icon of the data in the storage area, and in order to distinguish the data in the hidden area from the data in the storage area, the icon may be displayed in a semi-transparent state, or a pattern of the icon may be marked, or a name of the folder corresponding to the hidden area or a name of the data in the hidden area may be marked by adding characters. When the boot password is different from the preset verification password, the icons of the folders corresponding to the hidden area and the icons corresponding to the data in the hidden area are not displayed, so that users who input the boot password incorrectly do not know the existence of the hidden area.
The eMMC control method further comprises the following steps:
s301: when a user reading operation is acquired, when the starting password is different from a preset verification password, authentication information input by the user is acquired, when the authentication information is the same as the preset verification information, the hidden area is displayed, and data in the hidden area can be read; and when the authentication information is different from the preset verification information, the hidden area is not displayed, and the data in the hidden area cannot be read.
In the embodiment of the application, an authentication frame for authenticating user information is displayed on a display screen of the terminal, the authentication information may be fixed information, such as fixed characters, the user may be asked questions in the form of questions in the authentication frame, an input frame is provided below the questions for the user to input answers, and when the answers input by the user are the same as the passwords stored in the terminal, the authentication information is the same as the preset authentication information. In some embodiments, the verification information may also be dynamic information, for example, the terminal obtains a dynamic password from the server through the communication module, the server sends the dynamic password to the communication device of the user, and an input box for inputting the dynamic password is displayed in a display screen of the terminal, when the dynamic password input by the user is the same as the dynamic password obtained by the terminal, that is, the authentication information is the same as the preset verification information. When the authentication information is the same as the preset verification information, the hidden area is displayed, the data in the hidden area can be read, but the data can only be read and can not be written in because the power-on password input by the user is different from the verification password.
The eMMC control method further comprises the following steps:
s401: and when the operation of resetting the verification password by the user is obtained, if the verification password is reset, deleting the data in the hidden area, and if the verification password is not reset, not operating the hidden area.
In the embodiment of the application, a reset icon of the reset password is displayed on a display screen of the terminal, when a user clicks the reset icon, a reset frame is displayed on the display screen, the original verification password and the reset verification password need to be input into the reset frame, and when the original verification password is input correctly, the input reset verification password is used as a new verification password. After the password reset is verified, all data in the hidden area are deleted, the workload of a user for deleting the data in the hidden area can be reduced, and the efficiency is improved.
The embodiment of the application also provides an eMMC control system, and the eMMC control system corresponds to the eMMC control methods in the embodiment one to one. As shown in fig. 2, the eMMC control system includes a power-on password obtaining module, a writing module, a password verifying module, a reading module, an information verifying module, and a resetting module. The functional modules are explained in detail as follows:
and the power-on password acquisition module is used for acquiring the power-on password input by the user at the terminal after the terminal is powered on.
And the writing module is used for writing data into the storage area when the user writing operation is acquired.
The password verification module is used for inquiring whether the data written into the storage area is hidden or not when the starting password is the same as a preset verification password, if so, copying the encrypted data to the hidden area and deleting the data in the original storage area, and if not, not moving the data; when the boot password is different from the preset verification password, the written data is not processed;
the password verification module is also used for displaying the hidden area when the starting password is the same as the preset verification password, and the data in the hidden area can be read; when the boot password is different from the preset verification password, the hidden area is not displayed, and the data in the hidden area cannot be read.
The reading module is used for acquiring data of a storage area displayed on the terminal when a user reads the data;
the information verification module is used for acquiring authentication information input by a user when a boot password is different from a preset verification password during reading operation of the user, and displaying the hidden area when the authentication information is the same as the preset verification information, wherein data in the hidden area can be read; and when the authentication information is different from the preset verification information, the hidden area is not displayed, and the data in the hidden area cannot be read.
And the resetting module is used for deleting the data in the hidden area if the verification password is reset when the user resets the verification password, and not operating the hidden area if the verification password is not reset.
The eMMC control system can be applied to equipment such as mobile phones, television boxes, automobile data recorders and the like, wherein two file systems are divided into the equipment for use, one file system is a file system of a normal storage area and can be seen by anyone; the other is a file system of the hidden area, which is visible only to those who know that the hidden area exists and know the power-on password.
In some embodiments, the present application further provides a computer-readable storage medium storing a computer program that is loadable by a processor and operable to perform one of the eMMC control methods described above.
The computer-readable storage medium includes, for example: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.

Claims (9)

1.一种eMMC控制方法,其特征在于,包括:1. an eMMC control method, is characterized in that, comprises: 在终端上电后,获取用户在终端的开机密码;After the terminal is powered on, obtain the user's power-on password on the terminal; 获取用户写入操作时,向存储区域写入数据;When the user's write operation is obtained, write data to the storage area; 当开机密码与预设的验证密码相同时,询问是否隐藏写入存储区域的数据,若是,则将数据加密后拷贝至隐藏区域并将原存储区域的数据删除,如否,则不移动该数据;开机密码与预设的验证密码不相同时,则不处理写入的数据。When the power-on password is the same as the preset verification password, ask whether to hide the data written in the storage area. If so, encrypt the data and copy it to the hidden area and delete the data in the original storage area. If not, do not move the data. ; When the power-on password is different from the preset verification password, the written data will not be processed. 2.根据权利要求1所述的eMMC控制方法,其特征在于,所述方法还包括:2. The eMMC control method according to claim 1, wherein the method further comprises: 获取用户读取操作时,在终端显示存储区域的数据;When the user's read operation is obtained, the data of the storage area is displayed on the terminal; 当开机密码与预设的验证密码相同时,显示隐藏区域,隐藏区域中的数据可读取;当开机密码与预设的验证密码不相同时,则不显示隐藏区域,隐藏区域中的数据不可读取。When the power-on password is the same as the preset verification password, the hidden area is displayed, and the data in the hidden area can be read; when the power-on password is different from the preset verification password, the hidden area is not displayed, and the data in the hidden area cannot be displayed. read. 3.根据权利要求1或2所述的eMMC控制方法,其特征在于,所述方法还包括:3. The eMMC control method according to claim 1 or 2, wherein the method further comprises: 获取用户读取操作时,当开机密码与预设的验证密码不相同时,获取用户输入的认证信息,当认证信息与预设的验证信息相同时,显示隐藏区域,隐藏区域中的数据可读取;当认证信息与预设的验证信息不相同时,则不显示隐藏区域,隐藏区域中的数据不可读取。When obtaining the user read operation, when the power-on password is different from the preset verification password, the authentication information input by the user is obtained. When the authentication information is the same as the preset verification information, the hidden area is displayed, and the data in the hidden area is readable. When the authentication information is different from the preset verification information, the hidden area is not displayed, and the data in the hidden area cannot be read. 4.根据权利要求1-3任一项所述的eMMC控制方法,其特征在于,获取用户重置验证密码操作时,若验证密码重置,将隐藏区域中的数据删除,若验证密码未重置,则不对隐藏区域进行操作。4. the eMMC control method according to any one of claims 1-3, is characterized in that, when obtaining the user to reset the verification password operation, if the verification password is reset, the data in the hidden area is deleted, if the verification password is not repeated. If it is set, the hidden area will not be operated. 5.一种eMMC控制系统,其特征在于,包括:5. an eMMC control system, is characterized in that, comprises: 开机密码获取模块,用于在终端上电后,获取用户在终端输入的开机密码;The power-on password acquisition module is used to obtain the power-on password entered by the user in the terminal after the terminal is powered on; 写入模块,用于获取用户写入操作时,向存储区域写入数据;The writing module is used to write data to the storage area when obtaining the user's write operation; 密码验证模块,用于当开机密码与预设的验证密码相同时,询问是否隐藏写入存储区域的数据,若是,则将数据加密后拷贝至隐藏区域并将原存储区域的数据删除,如否,则不移动该数据;开机密码与预设的验证密码不相同时,则不处理写入的数据。The password verification module is used to ask whether to hide the data written in the storage area when the power-on password is the same as the preset verification password. If so, encrypt the data and copy it to the hidden area and delete the data in the original storage area. , the data will not be moved; if the power-on password is different from the preset verification password, the written data will not be processed. 6.根据权利要求5所述的eMMC控制系统,其特征在于,包括:6. eMMC control system according to claim 5, is characterized in that, comprises: 读取模块,用于获取用户读取操作时,在终端显示存储区域的数据;The reading module is used to obtain the data of the storage area displayed on the terminal when the user reads it; 密码验证模块还用于当开机密码与预设的验证密码相同时,显示隐藏区域,隐藏区域中的数据可读取;当开机密码与预设的验证密码不相同时,则不显示隐藏区域,隐藏区域中的数据不可读取。The password verification module is also used to display the hidden area when the power-on password is the same as the preset verification password, and the data in the hidden area can be read; when the power-on password is different from the preset verification password, the hidden area is not displayed, The data in the hidden area is not readable. 7.根据权利要求5或6所述的eMMC控制方系统,其特征在于,包括:7. The eMMC controller system according to claim 5 or 6, characterized in that, comprising: 信息验证模块,用于获取用户读取操作时,当开机密码与预设的验证密码不相同时,获取用户输入的认证信息,当认证信息与预设的验证信息相同时,显示隐藏区域,隐藏区域中的数据可读取;当认证信息与预设的验证信息不相同时,则不显示隐藏区域,隐藏区域中的数据不可读取。The information verification module is used to obtain the user's reading operation, when the power-on password is different from the preset verification password, obtain the authentication information input by the user, when the authentication information is the same as the preset verification information, display the hidden area and hide the The data in the area can be read; when the authentication information is different from the preset verification information, the hidden area is not displayed, and the data in the hidden area cannot be read. 8.根据权利要求5-7任一项所述的eMMC控制系统,其特征在于,包括:8. The eMMC control system according to any one of claims 5-7, characterized in that, comprising: 重置模块,用于获取用户重置验证密码操作时,若验证密码重置,将隐藏区域中的数据删除,若验证密码未重置,则不对隐藏区域进行操作。The reset module is used to obtain the operation of resetting the verification password by the user. If the verification password is reset, the data in the hidden area will be deleted. If the verification password is not reset, the hidden area will not be operated. 9.一种计算机可读存储介质,其特征在于,存储有能够被处理器加载并执行如权利要求1至4中任一种方法的计算机程序。9. A computer-readable storage medium, characterized by storing a computer program capable of being loaded by a processor and executing the method according to any one of claims 1 to 4.
CN202110595576.7A 2021-05-29 2021-05-29 eMMC control method, system and storage medium thereof Pending CN113378216A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110595576.7A CN113378216A (en) 2021-05-29 2021-05-29 eMMC control method, system and storage medium thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110595576.7A CN113378216A (en) 2021-05-29 2021-05-29 eMMC control method, system and storage medium thereof

Publications (1)

Publication Number Publication Date
CN113378216A true CN113378216A (en) 2021-09-10

Family

ID=77574865

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110595576.7A Pending CN113378216A (en) 2021-05-29 2021-05-29 eMMC control method, system and storage medium thereof

Country Status (1)

Country Link
CN (1) CN113378216A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102201072A (en) * 2010-03-22 2011-09-28 英属开曼群岛商康帝国际科技股份有限公司 System and method for managing storage device
CN103927652A (en) * 2013-01-15 2014-07-16 周宏建 Portable electronic transaction device
CN103971719A (en) * 2013-01-31 2014-08-06 山东先行电子信息技术有限公司 Password memory protection UK disk
CN104715207A (en) * 2013-12-16 2015-06-17 航天信息股份有限公司 Method for storing files through secret key on android platform
CN106156573A (en) * 2015-04-13 2016-11-23 阿里巴巴集团控股有限公司 A kind of method controlling intelligent terminal and the device of control intelligent terminal
CN107818028A (en) * 2017-04-26 2018-03-20 西安航空学院 A kind of computer data backup and restoring method
CN108171025A (en) * 2017-12-08 2018-06-15 深圳市金立通信设备有限公司 Implementation method, terminal and the computer readable storage medium of multi-user login pattern
CN108563933A (en) * 2018-04-19 2018-09-21 Oppo广东移动通信有限公司 Application program control method and device, storage medium and mobile terminal
CN109840435A (en) * 2017-11-27 2019-06-04 深圳市朗科科技股份有限公司 A kind of data guard method storing equipment
CN110069934A (en) * 2018-01-23 2019-07-30 群联电子股份有限公司 Storage system, host system verification method and memory storage apparatus
CN110807186A (en) * 2019-11-06 2020-02-18 杭州华澜微电子股份有限公司 Method, device, equipment and storage medium for safe storage of storage equipment

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102201072A (en) * 2010-03-22 2011-09-28 英属开曼群岛商康帝国际科技股份有限公司 System and method for managing storage device
CN103927652A (en) * 2013-01-15 2014-07-16 周宏建 Portable electronic transaction device
CN103971719A (en) * 2013-01-31 2014-08-06 山东先行电子信息技术有限公司 Password memory protection UK disk
CN104715207A (en) * 2013-12-16 2015-06-17 航天信息股份有限公司 Method for storing files through secret key on android platform
CN106156573A (en) * 2015-04-13 2016-11-23 阿里巴巴集团控股有限公司 A kind of method controlling intelligent terminal and the device of control intelligent terminal
CN107818028A (en) * 2017-04-26 2018-03-20 西安航空学院 A kind of computer data backup and restoring method
CN109840435A (en) * 2017-11-27 2019-06-04 深圳市朗科科技股份有限公司 A kind of data guard method storing equipment
CN108171025A (en) * 2017-12-08 2018-06-15 深圳市金立通信设备有限公司 Implementation method, terminal and the computer readable storage medium of multi-user login pattern
CN110069934A (en) * 2018-01-23 2019-07-30 群联电子股份有限公司 Storage system, host system verification method and memory storage apparatus
CN108563933A (en) * 2018-04-19 2018-09-21 Oppo广东移动通信有限公司 Application program control method and device, storage medium and mobile terminal
CN110807186A (en) * 2019-11-06 2020-02-18 杭州华澜微电子股份有限公司 Method, device, equipment and storage medium for safe storage of storage equipment

Similar Documents

Publication Publication Date Title
JP3767818B2 (en) Detachable device and program startup method
JP4576336B2 (en) Electronic data management apparatus, control program therefor, and electronic data management method
CN102073807A (en) Information processing apparatus, information processing method, and program
US8719922B2 (en) Sensory association passcode
CN105701420B (en) A kind of management method and terminal of user data
JP2008148095A (en) Storage device and user authentication method
US20130174227A1 (en) Computer-readable medium, information processing device, information processing method and information processing system
JP2001202484A (en) Security management system and its program recording medium
JP2022002103A (en) Privacy protecting method and protecting device for mobile terminal and mobile terminal
US8190813B2 (en) Terminal apparatus with restricted non-volatile storage medium
JP2003280994A (en) Content data processing system, electronic equipment, server
CN112989379B (en) Key protection implementation method, device and electronic device
JP2007528035A (en) Smart card for storing invisible signatures
KR20050063174A (en) Personal terminal with multiple password system and control method thereof
JP7559826B2 (en) Information display device, information display method, and recording medium
JP2001117661A (en) Portable information terminal device and its program recording medium
JP2011192154A (en) Usb storage device
JP2009181218A (en) Authentication device, authentication method and program
CN113378216A (en) eMMC control method, system and storage medium thereof
JP4866858B2 (en) Data processing apparatus and processing method
EP4102766A1 (en) Data management system, data management method, and non-transitory computer-readable medium
EP4329241A1 (en) Data management system, data management method, and non-transitory recording medium
JP2005234809A (en) Attachable/detachable external storage device and automatic start program
JP2006011959A (en) Information terminal device and user authentication method
JP2005149093A (en) Storage device with access right control function, control program for storage device with access right control function and method for controlling access right

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 518000 area a, 7th floor, building A1, Shenzhen digital technology park, 17 Gaoxin South 7th Road, high tech Zone community, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Deyi Microelectronics Co.,Ltd.

Address before: 518000 area a, 7th floor, building A1, Shenzhen digital technology park, 17 Gaoxin South 7th Road, high tech Zone community, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Applicant before: YEESTOR MICROELECTRONICS Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210910