CN117592069A - Encryption and decryption method and system for external mobile storage medium - Google Patents
Encryption and decryption method and system for external mobile storage medium Download PDFInfo
- Publication number
- CN117592069A CN117592069A CN202311549247.4A CN202311549247A CN117592069A CN 117592069 A CN117592069 A CN 117592069A CN 202311549247 A CN202311549247 A CN 202311549247A CN 117592069 A CN117592069 A CN 117592069A
- Authority
- CN
- China
- Prior art keywords
- storage medium
- mobile storage
- encrypted
- registration information
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 238000005192 partition Methods 0.000 claims description 42
- 238000004590 computer program Methods 0.000 claims description 14
- 230000008569 process Effects 0.000 claims description 14
- 238000010586 diagram Methods 0.000 description 10
- 230000006870 function Effects 0.000 description 8
- 238000012545 processing Methods 0.000 description 4
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention belongs to the technical field of data encryption and decryption, and provides an encryption and decryption method and system for an external mobile storage medium. Selecting reserved sectors according to the attribute of a mobile storage medium; writing the encrypted registration information of the mobile storage medium and the encrypted secret key into a reserved sector; respectively calculating a check code of the encrypted registration information and a check code of the encrypted key, and writing the check codes into a reserved sector; and encrypting the subarea except for the reserved sector in the mobile storage medium, and writing the encrypted subarea key into the subarea after the subarea is successfully encrypted, so that the registration is successful. The invention can realize more refined control on the mobile storage medium, and control which machines the mobile storage medium can be identified on; the encrypted decryption key is stored in the mobile storage medium, so that the data cannot be decrypted even if the key is lost, and the problem that the data cannot be recovered due to the loss of the key is solved.
Description
Technical Field
The invention belongs to the technical field of data encryption and decryption, and particularly relates to an encryption and decryption method and system for an external mobile storage medium.
Background
The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art.
Under the condition that the movable secret medium is lost or stolen, risks of data leakage are faced, unencrypted data can be easily accessed by unauthorized persons, and the encrypted data can be unlocked only by a corresponding key or password.
Important information such as company business secrets, research and development results, customer databases and the like needs to be protected to prevent competitors from acquiring these sensitive data. Leakage of this information may lead to commercial competitive disadvantages.
Currently, the linux mobile medium is encrypted by using a key to encrypt data in the mobile medium, so that password management is complex, and if a user loses a password or a key file, the data can never be recovered.
For more and more complex environments, sometimes a specific mobile storage medium only allows specific machine identification and access, and current solutions cannot achieve this function.
Disclosure of Invention
In order to solve the technical problems in the background art, the invention provides an encryption and decryption method and system for an external mobile storage medium. When the key information is identified, the system firstly reads the registration information in the mobile storage medium, and when the registration information is consistent with the system, the key information can be continuously read, and the key information can be correctly decrypted on the encrypted data in the mobile storage medium and is mounted on the operating system.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
the first aspect of the present invention provides an encryption method for an external mobile storage medium.
An encryption method for an external mobile storage medium, comprising:
selecting a reserved sector according to the attribute of the mobile storage medium;
writing the encrypted registration information of the mobile storage medium and the encrypted secret key into a reserved sector;
respectively calculating a check code of the encrypted registration information and a check code of the encrypted key, and writing the check codes into a reserved sector;
and encrypting the subareas except the reserved sector in the mobile storage medium, and registering successfully after the subarea is successfully encrypted.
Further, the process of obtaining the mobile storage medium includes: acquiring equipment nodes generated when a mobile storage medium is accessed to a system through a UDEV event; and acquiring the attribute of the mobile storage medium through the equipment node.
Further, the attributes include partition table type GPT or MBR, partition table start position and partition size.
A second aspect of the present invention provides an encryption system for externally connecting a mobile storage medium.
An encryption system for an external removable storage medium, comprising:
a sector selection module configured to: selecting a reserved sector according to the attribute of the mobile storage medium;
a first write module configured to: writing the encrypted registration information of the mobile storage medium and the encrypted secret key into a reserved sector;
a second write module configured to: respectively calculating a check code of the encrypted registration information and a check code of the encrypted key, and writing the check codes into a reserved sector;
an encryption module configured to: and encrypting the subareas except the reserved sector in the mobile storage medium, and registering successfully after the subarea is successfully encrypted.
A third aspect of the present invention provides a decryption method for an external mobile storage medium.
A decryption method of an external mobile storage medium comprises the following steps:
selecting a reserved sector of the mobile storage medium according to the attribute of the mobile storage medium;
finding out the encrypted registration information, the encrypted secret key and the storage position of the check code in the reserved sector, and decrypting the encrypted registration information to obtain the registration information when the check code is judged to be correct;
comparing the decrypted registration information with the local registration information accessed by the mobile storage medium, and reading the encrypted key and decrypting when the registration information is consistent;
and decrypting the partition data of the mobile storage medium through the decrypted key, and mounting the partition data on a system.
Further, the process of obtaining the mobile storage medium includes: acquiring equipment nodes generated when a mobile storage medium is accessed to a system through a UDEV event; and acquiring the attribute of the mobile storage medium through the equipment node.
Further, the attributes include partition table type GPT or MBR, partition table start position and partition size.
A fourth aspect of the present invention provides a decryption system for externally connecting a mobile storage medium.
A decryption system for an external removable storage medium, comprising:
a reserved sector selection module configured to: selecting a reserved sector of the mobile storage medium according to the attribute of the mobile storage medium;
a first decryption module configured to: finding out the encrypted registration information, the encrypted secret key and the storage position of the check code in the reserved sector, and decrypting the encrypted registration information to obtain the registration information when the check code is judged to be correct;
an alignment module configured to: comparing the decrypted registration information with the local registration information accessed by the mobile storage medium, and reading the encrypted key and decrypting when the registration information is consistent;
a second decryption module configured to: and decrypting the partition data of the mobile storage medium through the decrypted key, and mounting the partition data on a system.
A fifth aspect of the present invention provides a computer-readable removable storage medium having stored thereon a computer program which, when executed by a processor, performs steps in the encryption method of an external removable storage medium as described in the first aspect, or performs steps in the decryption method of an external removable storage medium as described in the third aspect.
A sixth aspect of the present invention provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps in the encryption method of an external mobile storage medium according to the first aspect or the decryption method of an external mobile storage medium according to the third aspect when executing the program.
Compared with the prior art, the invention has the beneficial effects that:
the invention can realize more refined control on the mobile storage medium, and control which machines the mobile storage medium can be identified on; the encrypted decryption key is stored in the mobile storage medium, so that the data cannot be decrypted even if the key is lost, and the problem that the data cannot be recovered due to the loss of the key is solved.
The invention writes the registration information (which can contain user organization information, secret class, etc.) into the medium, and then encrypts the key information after successful writing, and writes the key information into the mobile storage medium. When the system is identified, the registration information in the mobile storage medium is read first, the key information can be read continuously when the registration information is consistent with the system, the encrypted data in the mobile storage medium can be decrypted continuously when the key information is correct, and the encrypted data is mounted on the operating system, so that the security level of the mobile storage medium is improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention.
FIG. 1 is a flow chart of an encryption method of an external mobile storage medium according to the present invention;
fig. 2 is a flowchart of a decryption method of an external mobile storage medium according to the present invention.
Detailed Description
The invention will be further described with reference to the drawings and examples.
It should be noted that the following detailed description is illustrative and is intended to provide further explanation of the invention. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of exemplary embodiments according to the present invention. As used herein, the singular is also intended to include the plural unless the context clearly indicates otherwise, and furthermore, it is to be understood that the terms "comprises" and/or "comprising" when used in this specification are taken to specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof.
It is noted that the flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of methods and systems according to various embodiments of the present disclosure. It should be noted that each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the logical functions specified in the various embodiments. It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by special purpose hardware-based systems which perform the specified functions or operations, or combinations of special purpose hardware and computer instructions.
Example 1
The embodiment provides an encryption method of an external mobile storage medium.
An encryption method for an external mobile storage medium, comprising:
selecting a reserved sector according to the attribute of the mobile storage medium;
writing the encrypted registration information of the mobile storage medium and the encrypted secret key into a reserved sector;
respectively calculating a check code of the encrypted registration information and a check code of the encrypted key, and writing the check codes into a reserved sector;
and encrypting the subareas except the reserved sector in the mobile storage medium, and registering successfully after the subarea is successfully encrypted.
The encryption process described in this embodiment occurs in the registration process, as shown in fig. 1, and the specific steps include:
step 1: inserting removable storage media into a system, a device node is generated on the system
/dev/sd*。
Step 2: the device node of the removable storage media on the system is acquired through a UDEV event.
Step 3: the device node obtains the attribute of the inserted mobile storage medium, including partition table type GPT or MBR, partition table starting position and partition size.
Step 4: and selecting reserved sectors according to the attributes of the mobile storage medium obtained in the step 3. The reason for selecting the reserved sector is that the reserved sector cannot be used by the partition, so that registration information loss caused by encrypting the partition in the follow-up process is avoided.
Step 5: registration information is cryptographically written to the reserved sector. The registration information is encrypted using the AES algorithm.
Step 6: after the registration information (including the user identification code, the security class, etc.) is successfully written, the user writes a key into the reserved sector, and the key is encrypted in the writing process, so that leakage is avoided. And encrypting the key by adopting an AES algorithm, and writing the encrypted key into the reserved sector. The key here refers to a key manually input by a user, which is a combination of a plurality of characters, and the partition is encrypted with the key.
Step 7: after the registration information and the key are written, a crc check code is generated and written into the reserved sector. After the registration information and the secret key are written into the reserved sector, the verification codes of the encrypted registration information and the encrypted secret key are calculated through a crc algorithm and written into the reserved sector for verification during carrier identification. The encrypted registration information and the encrypted secret key can generate two check codes by using a crc algorithm, and when the two check codes are read, whether at least one of the crc check key and the registration information is tampered or not can be judged first, and if the at least one of the crc check key and the registration information is not tampered, the reading and the use are continued.
Step 8: after successful key writing to the sectors, each partition in the removable storage media is encrypted using the cryptosetup and the incoming key. The key is a key manually input by a user in step 6, all keys in the document refer to the same key, the key is used for encrypting and decrypting the partition, and the cryptosetup is a partition encryption tool under linux, and the encryption and decryption of the partition can be performed through the input key and the partition address.
Step 9: and after the partition encryption is successful, returning registration success.
Example two
The embodiment provides an encryption system externally connected with a mobile storage medium.
An encryption system for an external removable storage medium, comprising:
a sector selection module configured to: selecting a reserved sector according to the attribute of the mobile storage medium;
a first write module configured to: writing the encrypted registration information of the mobile storage medium and the encrypted secret key into a reserved sector;
a second write module configured to: respectively calculating a check code of the encrypted registration information and a check code of the encrypted key, and writing the check codes into a reserved sector;
an encryption module configured to: and encrypting the subareas except the reserved sector in the mobile storage medium, and registering successfully after the subarea is successfully encrypted.
Here, the sector selection module, the first writing module, the second writing module, and the encryption module are the same as the examples and application scenarios implemented by the steps in the first embodiment, but are not limited to the disclosure of the first embodiment. It should be noted that the modules described above may be implemented as part of a system in a computer system, such as a set of computer-executable instructions.
Example III
The embodiment provides a decryption method of an external mobile storage medium.
A decryption method of an external mobile storage medium comprises the following steps:
selecting a reserved sector of the mobile storage medium according to the attribute of the mobile storage medium;
finding out the encrypted registration information, the encrypted secret key and the storage position of the check code in the reserved sector, and decrypting the encrypted registration information to obtain the registration information when the check code is judged to be correct;
comparing the decrypted registration information with the local registration information accessed by the mobile storage medium, and reading the encrypted key and decrypting when the registration information is consistent;
and decrypting the partition data of the mobile storage medium through the decrypted key, and mounting the partition data on a system.
The encryption process described in this embodiment occurs in the carrier identification process, as shown in fig. 2, and the specific steps include:
step 1: inserting removable storage media into a system, a device node is generated on the system
/dev/sd*。
Step 2: the device node of the removable storage media on the system is obtained through a UDEV event of the system.
Step 3: the device node obtains the attribute of the inserted mobile storage medium, including the partition table type, the start position of the partition table, the partition size and the like.
Step 4: searching a reserved sector of the mobile storage medium, finding a storage position of the registration information, reading the registration information, and decrypting. Reading a reserved sector of the mobile storage medium, finding the registration information, the key and the position of the crc check code, checking that the data is correct through the crc, and decrypting the registration information part through an AES algorithm. There are two crc check codes, one is the check code of the encrypted registration information and the check code of the encrypted key.
Step 5: and (3) reading the registration information of the local machine in the system, and comparing the registration information obtained in the step (4) with the security level (the registration information comprises the security level and the user identification code).
Step 6: if the step 5 is consistent, the key data is continuously read, if the key data is inconsistent, the key data is directly returned, and the identification is refused.
Step 7: after reading the key, the key is decrypted.
Step 8: and decrypting the partition data in the mobile storage medium through the secret key and mounting the partition data on a system to complete the whole identification process. After the key is obtained, the encryption key is transmitted to each partition by using the encryption key instruction, and the encryption key is decrypted and mounted on the operating system.
Example IV
The embodiment provides a decryption system externally connected with a mobile storage medium.
A decryption system for an external removable storage medium, comprising:
a reserved sector selection module configured to: selecting a reserved sector of the mobile storage medium according to the attribute of the mobile storage medium;
a first decryption module configured to: finding out the encrypted registration information, the encrypted secret key and the storage position of the check code in the reserved sector, and decrypting the encrypted registration information to obtain the registration information when the check code is judged to be correct;
an alignment module configured to: comparing the decrypted registration information with the local registration information accessed by the mobile storage medium, and reading the encrypted key and decrypting when the registration information is consistent;
a second decryption module configured to: and decrypting the partition data of the mobile storage medium through the decrypted key, and mounting the partition data on a system.
It should be noted that, the above-mentioned reserved sector selection module, the first decryption module, the comparison module, and the second decryption module are the same as the examples and application scenarios implemented by the steps in the third embodiment, but are not limited to those disclosed in the third embodiment. It should be noted that the modules described above may be implemented as part of a system in a computer system, such as a set of computer-executable instructions.
Example five
The present embodiment provides a computer-readable mobile storage medium, on which a computer program is stored, which when executed by a processor, implements the steps in the encryption method of an external mobile storage medium as described in the first embodiment, or implements the steps in the decryption method of an external mobile storage medium as described in the third embodiment.
Example six
The embodiment provides a computer device, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor executes the program to implement steps in the encryption method of the external mobile storage medium according to the first embodiment, or implement steps in the decryption method of the external mobile storage medium according to the third embodiment.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable removable storage media (including, but not limited to, magnetic disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Those skilled in the art will appreciate that all or part of the processes in the methods of the above embodiments may be implemented by a computer program for instructing relevant hardware, where the program may be stored on a computer readable removable storage medium, and where the program, when executed, may include processes in the embodiments of the methods described above. The mobile storage medium may be a magnetic disk, an optical disc, a Read-Only Memory (ROM), a Random access Memory (Random AccessMemory, RAM), or the like.
The above description is only of the preferred embodiments of the present invention and is not intended to limit the present invention, but various modifications and variations can be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (10)
1. An encryption method for an external mobile storage medium, comprising:
selecting a reserved sector according to the attribute of the mobile storage medium;
writing the encrypted registration information of the mobile storage medium and the encrypted secret key into a reserved sector;
respectively calculating a check code of the encrypted registration information and a check code of the encrypted key, and writing the check codes into a reserved sector;
and encrypting the subareas except the reserved sector in the mobile storage medium, and registering successfully after the subarea is successfully encrypted.
2. The encryption method of the external mobile storage medium according to claim 1, wherein the process of obtaining the mobile storage medium comprises: acquiring equipment nodes generated when a mobile storage medium is accessed to a system through a UDEV event; and acquiring the attribute of the mobile storage medium through the equipment node.
3. The encryption method of external mobile storage media of claim 1, wherein the attributes include partition table type GPT or MBR, partition table start position and partition size.
4. An encryption system for externally connecting a removable storage medium, comprising:
a sector selection module configured to: selecting a reserved sector according to the attribute of the mobile storage medium;
a first write module configured to: writing the encrypted registration information of the mobile storage medium and the encrypted secret key into a reserved sector;
a second write module configured to: respectively calculating a check code of the encrypted registration information and a check code of the encrypted key, and writing the check codes into a reserved sector;
an encryption module configured to: and encrypting the subareas except the reserved sector in the mobile storage medium, and registering successfully after the subarea is successfully encrypted.
5. A decryption method for an external mobile storage medium, comprising:
selecting a reserved sector of the mobile storage medium according to the attribute of the mobile storage medium;
finding out the encrypted registration information, the encrypted secret key and the storage position of the check code in the reserved sector, and decrypting the encrypted registration information to obtain the registration information when the check code is judged to be correct;
comparing the decrypted registration information with the local registration information accessed by the mobile storage medium, and reading the encrypted key and decrypting when the registration information is consistent;
and decrypting the partition data of the mobile storage medium through the decrypted key, and mounting the partition data on a system.
6. The method of claim 5, wherein the process of obtaining the removable storage medium comprises: acquiring equipment nodes generated when a mobile storage medium is accessed to a system through a UDEV event; and acquiring the attribute of the mobile storage medium through the equipment node.
7. The method of claim 5, wherein the attributes include partition table type GPT or MBR, partition table start position and partition size.
8. A decryption system for externally connecting a removable storage medium, comprising:
a reserved sector selection module configured to: selecting a reserved sector of the mobile storage medium according to the attribute of the mobile storage medium;
a first decryption module configured to: finding out the encrypted registration information, the encrypted secret key and the storage position of the check code in the reserved sector, and decrypting the encrypted registration information to obtain the registration information when the check code is judged to be correct;
an alignment module configured to: comparing the decrypted registration information with the local registration information accessed by the mobile storage medium, and reading the encrypted key and decrypting when the registration information is consistent;
a second decryption module configured to: and decrypting the partition data of the mobile storage medium through the decrypted key, and mounting the partition data on a system.
9. A computer readable removable storage medium having stored thereon a computer program, characterized in that the program when executed by a processor realizes steps in the encryption method of an external removable storage medium according to any one of claims 1-3 or realizes steps in the decryption method of an external removable storage medium according to any one of claims 5-7.
10. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor, when executing the program, implements the steps of the encryption method of an external mobile storage medium according to any one of claims 1-3 or the steps of the decryption method of an external mobile storage medium according to any one of claims 5-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311549247.4A CN117592069A (en) | 2023-11-17 | 2023-11-17 | Encryption and decryption method and system for external mobile storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311549247.4A CN117592069A (en) | 2023-11-17 | 2023-11-17 | Encryption and decryption method and system for external mobile storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117592069A true CN117592069A (en) | 2024-02-23 |
Family
ID=89912742
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311549247.4A Pending CN117592069A (en) | 2023-11-17 | 2023-11-17 | Encryption and decryption method and system for external mobile storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117592069A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118246081A (en) * | 2024-05-30 | 2024-06-25 | 深圳市铨兴科技有限公司 | Solid state disk-based security management method, system and medium |
-
2023
- 2023-11-17 CN CN202311549247.4A patent/CN117592069A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118246081A (en) * | 2024-05-30 | 2024-06-25 | 深圳市铨兴科技有限公司 | Solid state disk-based security management method, system and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105678192B (en) | A kind of key application method and application apparatus based on smart card | |
JP2008527532A (en) | Method for assigning security area to non-security area and portable storage device | |
KR102030858B1 (en) | Digital signing authority dependent platform secret | |
KR20040041642A (en) | Method and device for encryption/decryption of data on mass storage device | |
CN105701410B (en) | The method, apparatus and system of information in a kind of acquisition source code | |
WO2019109968A1 (en) | Method for unlocking sim card and mobile terminal | |
CN101103404A (en) | Method and portable storage device for allocating secure area in insecure area | |
WO2011134207A1 (en) | Method for protecting software | |
EP2835997A1 (en) | Cell phone data encryption method and decryption method | |
US20220366030A1 (en) | Password Management Method and Related Apparatus | |
CN110188555A (en) | A kind of hard disk data protection method, system and associated component | |
KR20180117278A (en) | Method of deleting data for mobile device | |
CN106100851B (en) | Password management system, intelligent wristwatch and its cipher management method | |
JP2016519544A (en) | Self-authentication device and self-authentication method | |
CN111566989B (en) | Key processing method and device | |
CN117592069A (en) | Encryption and decryption method and system for external mobile storage medium | |
CN110008724B (en) | Solid state hard disk controller safe loading method and device and storage medium | |
US8798261B2 (en) | Data protection using distributed security key | |
CN110287208A (en) | The method and apparatus of database field encryption, storage medium | |
US12197563B2 (en) | Apparatus and method for protecting shared objects | |
CN115221183A (en) | Data processing method and device | |
CN110032529B (en) | Memory management method and related device | |
CN110855429A (en) | Software key protection method based on TPM | |
CN103870769A (en) | Method and system for protecting magnetic disk | |
CN110737910B (en) | Android log decryption management method, device, equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |