+

CN1328671C - Method for activating virtual hard disk in computer platform and portable key thereof - Google Patents

Method for activating virtual hard disk in computer platform and portable key thereof Download PDF

Info

Publication number
CN1328671C
CN1328671C CNB021557594A CN02155759A CN1328671C CN 1328671 C CN1328671 C CN 1328671C CN B021557594 A CNB021557594 A CN B021557594A CN 02155759 A CN02155759 A CN 02155759A CN 1328671 C CN1328671 C CN 1328671C
Authority
CN
China
Prior art keywords
hard disk
computer
password
virtual hard
management module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB021557594A
Other languages
Chinese (zh)
Other versions
CN1506854A (en
Inventor
颜骏声
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNB021557594A priority Critical patent/CN1328671C/en
Publication of CN1506854A publication Critical patent/CN1506854A/en
Application granted granted Critical
Publication of CN1328671C publication Critical patent/CN1328671C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

A method for activating virtual hard disk in computer platform includes carrying a cipher on computer platform and connecting portable key separately to computer platform, setting partial sector in hard disk of computer to be a virtual hard disk by hard disk management module according to cipher and displaying or hiding said virtual hard disk according to whether portable key is detected or not.

Description

Make virtual hard disk activates in the computer platform method and portable key thereof
[technical field]
The present invention relates to a kind of method and portable key thereof that virtual hard disk in the computer platform is activated, particularly relate to and a kind ofly need not memory cipher and can be easy to use and method and the portable key thereof that virtual hard disk activates in the computer platform that make that high security is provided.
[background technology]
In recent years computing machine with its powerful computing ability and with user-friendly operating system design, become the indispensable instrument of modern offices and family.And from computer and network online after, the inquiry of data, see list, news and weather, tourism, seminar is to transmitting Email, more none is not dependent on it.Yet along with people increase day by day to the dependence of computing machine, there be security and the confidentiality on the computing machine in important data file, but forms a secret worry.
Because computing machine is positioned in usually for the individual and uses, the design of operating system just requires simple and easy as far as possible and is convenient, also sacrifices the Consideration of many secure contexts synchronously.So, the people who is sitting in before the computing machine promptly is assumed to be it is the supvr (Administrator) of total system, can instruct any work easily, comprise read, write, change, deletion etc.Even the small routine that can put into " Te Luoyi wooden horse " (Trojan Horse) in computing machine steals confidential data, or puts into some Viruses and destroy total systems.And the dismounting of computer hardware and install and all to make every effort to convenient, also simple than general work station computing machine on the hardware setting, unauthorised broken person directly steals the hard disk that calculator memory is put confidential data probably, installs to other computing machine and reads.Put important more data at calculator memory, the problem of safety becomes irritating thing.
Along with computing machine is popularized, the safety problem of aforementioned calculation machine increases gradually.For instance, in the general office environment, because operational needs, often there are the personnel of different departments to use computing machine or copy archives,, just can worry to be stolen and get or expose if the secret of a guy or company leaves in the computing machine.In University Affairs Office or breadboard environment, share or to use the situation of computing machine mutually more general.On the other hand; frequent computed user; one permanently has many data that belong to individual privacy; as letter, paper studies, person-to-person communication book, telephone directory, management of personal money information, program etc.; leave in the computing machine; for preventing to be seen by other people or change, just need suitable method and protect these data.In addition, for example in business application, also can keep in many clients' basic document in the employed computing machine of bank clerk, similarly be deposit account, deposit number, fiscard or credit card number, and security password etc.These data will cause company and client's heavy losses if being had the inclination the personage steals.Also, also often be stored in staff's oneself computing machine just like the secret official document of doctor's medical history information, teacher's exam question and list of results, government bodies and affairs of household registration's data or the like.More than all, suffering to invade when distorting or revealing, all can cause suitable puzzlement of litigant and risk, make the protection data security become the problem that must especially note.
In view of computing machine may store data important in a large number and that need maintain secrecy, and operating system does not have very strong safety guard mechanism at present.Therefore, there is the method for many protection to be suggested successively, for example the access control of pass code, collapse directories or archives, encryption technology or the like.The access control of pass code is meant that client will key in correct password (password) earlier and just be entered system or watch archives.Yet this defence measure but is easy to be invaded by the people under the open environment of computing machine, and for example illegal invasion person can skip the boot program (for example using the disk start) of having set pass code very much, or tries every possible means to remove performed protection software.Collapse directories or archives are the attributes that utilize setting file or catalogue, and archives or catalogue are stashed, and other user can't be seen.In addition, when many archives or catalogue are all used concealed storage, user oneself may forget title and the position that hides archives or catalogue, causes the puzzlement in the user management.Encryption technology is important archives to be converted to ciphertext by cryptographic encryption technology deposit in the hard disc of computer; illegal user is not because of there being user " secret key "; just can't be from the plaintext of deciphering originally; though the security of this kind mode is high; but because of " secret key " generally also is stored in the hard disc of computer; still have by the possibility that other people steal, cause some technology more applied cryptography protect secret key, to improve security.
Recently a kind of virtual hard disk technology that proposes is to integrate the notion of aforementioned pass code and hiding archives, and the part sector in the planning computer hard disk becomes a virtual hard disk, for storing archives and the program that need maintain secrecy.This virtual hard disk is concealed format at ordinary times, and other people can't be from the directly existence of this virtual hard disk of discovery on the computing machine.When desire is used, then need input " password " and after checking is errorless, just allow virtual hard disk interior archives or program display.All be stored in the virtual hard disk because hide archives and program, any user can't utilize and skip the pass code mode and carry out virtual hard disk, effectively solves the problem when pass code and hiding archives were distinctly used in the past.Yet, this virtual hard disk is that the application software mode is reached, as long as anyone key in, and proper password just is regarded as legal user, and the content that can carry out or check virtual hard disk, so the user need set the password that is difficult to guess (for example with individual's birthday, identification card number, irrelevant character string or the numeral of name) and mode such as new password more regularly, prevent that other people from knowing password easily.But set tediously long or difficult password or new password more constantly, not only become illegal invasion person's obstruction, and can improve security, sometimes also form a kind of white elephant for user itself, in case forget tediously long and insignificant password, will be refused to use virtual hard disk by the setting of oneself in outdoors, if password is written on the paper, can cause safety to go up leak on the contrary for remembering conveniently.
Though the safeguard procedures of correct applying virtual hard disk can be brought safe and file administration advantage easily, the memory of password causes burden and inconvenience to the user.Therefore, the inventor thinks to reach if the activation energy of virtual hard disk utilizes key operated door as people, then people need not memory cipher and can directly utilize the external hardware that has password in one directly to activate virtual hard disk, to solve the difficult shortcoming of cipher memory in the past, and can carry because of the external hardware that is loaded with password, also can avoid unworthy personage take advantage of the user not the time steal archives.
[summary of the invention]
A purpose of the present invention is to provide a kind of method and portable key thereof that virtual hard disk activates in the computer platform that make, to reach effect easy to use.
Another object of the present invention is to provide a kind of method and portable key thereof that virtual hard disk activates in the computer platform that make, to reach the effect of high security.
So, a kind of method that virtual hard disk activates in the computer platform that makes of the present invention, this computer platform cooperates a portable key to use, this computer platform has a hard disk, one first transmission interface and a hard disk management module, this portable key has a microcontroller and second transmission interface that matches with this first transmission interface, this microcontroller stores one group of read-only password and controls this second transmission interface, so that this password can be imported this computer platform through this second and first transmission interface, this hard disk management module is can carry out and comply with this password in this computer platform to plan that the part sector in the hard disk of this computing machine is a virtual hard disk, and the method includes the steps of:
A) when this hard disk management module when this first transmission interface detects this portable key, then this hard disk management module reads the password of this portable key;
B) this hard disk management module shows and this password corresponding virtual hard disk, for carrying out data access at this virtual hard disk; And
C) when this hard disk management module detects this portable key and do not existed, then end the demonstration of this virtual hard disk.
[description of drawings]
The present invention is described in detail below in conjunction with drawings and Examples, in the accompanying drawing:
Fig. 1 is the synoptic diagram of preferred embodiment of the present invention.
Fig. 2 is the process flow diagram of hard disk management module in the preferred embodiment of Fig. 1.
Fig. 3 is the file administration process flow diagram of the hard disk management module of preferred embodiment among Fig. 1.
[embodiment]
As Fig. 1, the embodiment of the method that virtual hard disk activates in the computer platform that makes of the present invention realizes in a computer platform.This embodiment comprises a computer platform 1 and a portable key 2.
This computer platform 1 is general computing machine, and has a casing 10 at least, the power supply (figure does not show) that 1 work of one supply computer platform is required, one is placed in the hard disk 11 in the casing, the microprocessor of one control computer work (figure does not show), one for the be interconnected motherboard (scheming not show) of usefulness of microprocessor and other member, one internal memory (figure does not show) for temporal data, one in order to and external device between transmit or receive the transmission interface set (figure does not show) of data, one display 12 by transmission interface set connection motherboard, one gives the input media 13 of computing machine 1 (as keyboard by transmission interface set for user's input control order, mouse).It [is the connecting hole that expose at casing 10 back sides that the transmission interface set has a plurality of transmission interfaces, claim transmit port (Port) again], these transmission interfaces can be respectively the transmission interface of different transmission standards, as USB (universal serial bus) (Universal Serial Bus, USB) 14, parallel port, serial port or the like, for the device that connects different transmission standards, be to be used as first transmission interface in this example, to connect portable key 2 with USB (universal serial bus) 14.In addition, store in the hard disk of computer platform 1 11 operating systems (Operating System, OS), for example Windowns system, Linux or the like.Those skilled in the art should be appreciated that the computer platform 1 of present embodiment also can comprise other and be common in member or software in the previous calculation machine, and such as modulator-demodular unit, floppy disk or the like, it is described should not to be subject to present embodiment.It should be noted that, the computer platform 1 of present embodiment is to be loaded with in the computer platform 1 a hard disk management module 16 with previous calculation machine platform difference, this hard disk management module 16 be the part sector in a program and the hard disk 11 with planning computer 1 be a virtual hard disk 15, in good time show or hide virtual hard disk 15, read-write archives in virtual hard disk 15, with managing virtual hard disk 15 in the function of archives or the like.When hard disk management module 16 detects password from portable key 2, then show archives and program in the virtual hard disk 15, and when not detecting password, then make virtual hard disk 15 hide and can't show, with the secret data that are stored in the virtual hard disk 15, and then avoid checking and stealing of illegal user.
Portable key 2 has the housing 23 of a microcontroller 21, second transmission interface 22 that matches with first transmission interface 14 and a ccontaining microcontroller 21 and second transmission interface 22.Microcontroller 21 is an integrated circuit (Integrated Circuit, IC, claim chip again) and required program and the one group of read-only password of storage work, this program is used so that the password that is stored in the microcontroller 21 can be via 22 outputs of second transmission interface, and program and password are to record in microcontroller 21 by the burning chip machine burning.In this example, second transmission interface 22 is the USB (universal serial bus) with first transmission interface, 14 correspondences, and program is password to be converted to the data that meet universal serial bus standard, with in second, first transmission interface, 22,14 input computer platforms 1.The password of each portable key 2 is the tediously long character string of 16 bytes (each byte has 8) data and because it may change and has 2128 kinds in this example, can not use up at short notice, so each group password all is exclusive and unique, and hard disk management module 16 is to form virtual hard disk 15 according to password.So, the portable key 2 that hard disk management module 16 can corresponding be loaded with different passwords forms each other virtual hard disk 15, so that can form exclusive virtual hard disk 15 respectively for the different users in the same computer platform 1, and because of the password difference in the portable key 2, even if having the different users of portable key 2 equally, it can only read and write the virtual hard disk 15 of corresponding its portable key that has 2, can't read other people's virtual hard disk 15, to reach the high advantage of security and confidentiality.In addition, first, second transmission interface 14,22 can be the transmission interface of other standard, and for example IEEE 1394, infrared ray, blue bud or the like should not be subject to the explanation of present embodiment.
According to aforesaid member and function, be easier to understand for making present embodiment, hereinafter cooperate Fig. 2 and Fig. 3 that the operating process of present embodiment is explained.
At first, step 31 is the software of hard disk management module 16 to be installed in computer platform 1 and can be set at resident program, to continue carry out step 32.In the step 32, hard disk management module 16 can detect first transmission interface 14 and whether be inserted with portable key 2.If sometimes, then skip to step 33, to read the password in the portable key 2.If when no, then keep step 32, continue to detect portable key 2 and whether insert first transmission interface 14.
In step 33, hard disk management module 16 can make microcontroller 12 that password is translated into the form that meets USB (universal serial bus), and reads password through first, second transmission interface 14,22.In addition, microcontroller 21 also can store some relevant informations, as identification symbol, supplier number etc., to be sent to computer platform 1 in the lump together with password, makes hard disk management module 16 can obtain these relevant informations.Secondly, in step 34, hard disk management module 16 can be temporary in password in the internal memory, uses for program execution subsequently.
And then, in step 35, if first the activation, then hard disk management module 16 can be encoded and forms an image (Image) file according to being temporary in the internal memory password, and corresponding sector with image file is a virtual hard disk 15 in the planning hard disk 11.And if when activating once more, then hard disk management module 16 can the footpath self-activations with by the image file corresponding virtual hard disk 15 of Cryptographic when first activation (this virtual hard disk 15 in formed).Then, in step 36, the read-write (repeating after the appearance) of hard disk management module 16 archives good at managing or program with show the inventory be stored in archives in the virtual hard disk 15 or program, to reach when portable key 2 is plugged in first transmission interface 14, the effect that makes virtual hard disk 15 contents show.
Secondly, in step 37, hard disk management module 16 still can continue regularly (for example per 3~5 minutes) detection portable key 2 and whether still be plugged in first transmission interface 14.If exist, rebound step 36 then, hard disk management module 16 continues managing virtual hard disks 15.During if do not existed, then skip to step 38,, and export a forced termination order, make the 16 end virtual hard disks management of hard disk management module and hide virtual hard disk 15, virtual hard disk 15 is no longer shown by the password in the hard disk management module 16 removing scratch-pad memories.Because of whether hard disk management module 16 can exist with portable key 2, the show or hide virtual hard disk 15 voluntarily, the user is as long as insert portable key 2, do not need the password of 128 of hypermnesias can activate virtual hard disk, and when leaving or do not use, pull away portable key 2, just hide virtual hard disk 15 in real time, reach effect easy to use really.
In addition, cooperate Fig. 3 to come the archives read-write management of hard disk management module 16 is explained.Hard disk management module 16 is after portable key 2 inserts, and begins to carry out management (being abovementioned steps 36).At first in step 41, hard disk management module 16 can detect the user and whether import write command for writing data to virtual hard disk 15.If have, then enter step 42, hard disk management module 16 after writing digital coding, in virtual hard disk 15, and enters step 43 to the data storing of coding encrypting according to password.If when no, then jump directly to step 43.
In the step 43, hard disk management module 16 can detect whether users import reading order and reading of data in the self-virtualizing hard disk 15, if have, just execution in step 44, hard disk management module 16 can according to password the data decoding in the acquisition self-virtualizing hard disk 15 (i.e. deciphering) after, export computer platform to and handle, and be shown on the display 12 and watch for the user.If do not have, then skip to step 45.
In step 45, whether hard disk management module 16 can detect forced termination order input (for example portable key 2 is pulled away) at last.If have, then finish and carry out abovementioned steps 38.If do not have, then rebound step 41 continues the read-write management.So, hard disk management module 16 is further encrypted before data write virtual hard disk 15 in advance, even the data in the virtual hard disk 15 are stolen, if the password in the no key cooperates deciphering, still is mess code, fully reaches the effect that security of data storage is provided.Moreover, it will be recognized by those skilled in the art that the input whether judgement order of step 41,43,45 write command, reading order and forced termination order, the adjustment that can need according to design or judge synchronously.
Conclude above-mentionedly, the present invention is with the software and hardware collocation mode, and burning read-only password and cooperate the management of hard disk management module in portable key 2 is different from pure software way to manage in the past.So, the user need not to input password, only needs to utilize plug portable key 2 in the simple motion of first transmission interface 14, can make virtual hard disk 15 show or hides, and reach the effect of being convenient to operate.Than prior art and since password be burning in portable key 2, the user need not remember redundant cipher or new password more constantly, and then can reach effect easy to use.In addition, because the user is when using virtual hard disk 15, burning has the portable key 2 of password to be removed, and no longer includes any code data in the computing machine, reduces the probability that password is stolen by unworthy personage.Particularly, data are to be stored in the virtual hard disk 15 after encoded again, even if illegal user directly steals hard disk, because data without decoding, can only obtain the mess code data and can't use, and then can improve the confidentiality of data.

Claims (9)

1.一种使计算机平台中虚拟硬盘激活的方法,该计算机平台配合便携式钥匙使用,而该计算机平台具有一硬盘、一第一传输接口与一硬盘管理模块,该便携式钥匙具有一微控制器及与该第一传输接口相配合的第二传输接口,该微控制器储存一组只读密码并控制该第二传输接口以使该密码可经该第二与第一传输接口输入该计算机平台,该硬盘管理模块是可于该计算机平台执行并依该密码来规划该计算机的硬盘中的部分扇区为一虚拟硬盘,其特征在于该方法包含以下步骤:1. A method for activating a virtual hard disk in a computer platform, the computer platform is used with a portable key, and the computer platform has a hard disk, a first transmission interface and a hard disk management module, and the portable key has a microcontroller and a second transmission interface matched with the first transmission interface, the microcontroller stores a set of read-only passwords and controls the second transmission interface so that the passwords can be input into the computer platform through the second and first transmission interfaces, The hard disk management module can be executed on the computer platform and plan some sectors in the hard disk of the computer as a virtual hard disk according to the password, and the method is characterized in that the method includes the following steps: A)当该硬盘管理模块经该第一传输接口检测到该便携式钥匙时,则该硬盘管理模块读取该便携式钥匙的密码;A) When the hard disk management module detects the portable key via the first transmission interface, the hard disk management module reads the password of the portable key; B)该硬盘管理模块显示与该密码对应的虚拟硬盘,以供在该虚拟硬盘进行数据存取;及B) The hard disk management module displays the virtual hard disk corresponding to the password for data access on the virtual hard disk; and C)当该硬盘管理模块检测到该便携式钥匙不复存在时,则中止该虚拟硬盘的显示。C) When the hard disk management module detects that the portable key no longer exists, it stops displaying the virtual hard disk. 2.如权利要求1所述的使计算机中虚拟硬盘激活的方法,其特征在于:2. The method for activating a virtual hard disk in a computer as claimed in claim 1, wherein: 该步骤C)中该硬盘管理模块是定时检测该便携式钥匙是否存在。In the step C), the hard disk management module regularly detects whether the portable key exists. 3.如权利要求1所述的使计算机中虚拟硬盘激活的方法,其特征在于该步骤B)中在该虚拟硬盘显示后具有以下子步骤:3. The method for activating the virtual hard disk in the computer as claimed in claim 1, characterized in that the step B) has the following sub-steps after the virtual hard disk is displayed: B-1)若该硬盘管理模块收到一写入选定数据用的写入命令,则依该密码编码该选定数据后储存于该虚拟硬盘中;及B-1) If the hard disk management module receives a write command for writing selected data, the selected data is encoded according to the password and stored in the virtual hard disk; and B-2)若该硬盘管理模块收到一自该虚拟硬盘中读取选定数据的读取命令时,则依该密码译码该选定数据始传送至该计算机平台。B-2) If the hard disk management module receives a read command to read selected data from the virtual hard disk, it decodes the selected data according to the password before sending it to the computer platform. 4.如权利要求1所述的使计算机中虚拟硬盘激活的方法,其特征在于:4. The method for activating a virtual hard disk in a computer as claimed in claim 1, wherein: 在该步骤A)中,该计算机平台自该便携式钥匙读取该密码后,会暂存该密码于该计算机平台中,直至该硬盘管理模块于该步骤C)中不再检测到该便携式钥匙。In the step A), after the computer platform reads the password from the portable key, it temporarily stores the password in the computer platform until the hard disk management module no longer detects the portable key in the step C). 5.如权利要求1所述的使计算机中虚拟硬盘激活的方法,其特征在于:5. The method for activating a virtual hard disk in a computer as claimed in claim 1, wherein: 该第一与第二传输接口是通用串行总线接口。The first and second transmission interfaces are Universal Serial Bus interfaces. 6.如权利要求1所述的所述的使计算机中虚拟硬盘激活的方法,其特征在于:6. The method for activating a virtual hard disk in a computer as claimed in claim 1, wherein: 该密码是一个16字节数据。The password is a 16-byte data. 7.一种使计算机中虚拟硬盘激活的便携式钥匙,它搭配一计算机使用且该计算机内备有一第一传输接口、一硬盘及一硬盘管理模块,该硬盘管理模块用以规划该计算机的硬盘中的部分扇区为一虚拟硬盘并检测该便携式钥匙是否存在,该便携式钥匙包括:7. A portable key for activating a virtual hard disk in a computer. It is used with a computer and the computer is equipped with a first transmission interface, a hard disk and a hard disk management module. The hard disk management module is used to plan the hard disk of the computer. Part of the sector is a virtual hard disk and detects whether the portable key exists. The portable key includes: 一微控制器,它预存一组只读的密码并控制储存于该微控制器中的密码的输出;A microcontroller, which pre-stores a set of read-only passwords and controls the output of the passwords stored in the microcontroller; 一第二传输接口,是与该第一传输接口相符并受该微控制器的控制以把该密码经该第二传输接口传送给该计算机;及a second transmission interface corresponding to the first transmission interface and controlled by the microcontroller to transmit the password to the computer via the second transmission interface; and 一壳体,是用以容置该微控制器与该传输接口;a housing for accommodating the microcontroller and the transmission interface; 由此,当该计算机的硬盘管理模块通过所述传输接口而收到该便携式钥匙的该密码时,则显示该虚拟硬盘,并于未检测到该密码时,实时隐藏该虚拟硬盘。Thus, when the hard disk management module of the computer receives the password of the portable key through the transmission interface, the virtual hard disk is displayed, and when the password is not detected, the virtual hard disk is hidden in real time. 8.如权利要求7所述的使计算机中虚拟硬盘激活的便携式钥匙,其特征在于:8. The portable key for activating the virtual hard disk in the computer as claimed in claim 7, characterized in that: 所述第二传输接口是通用串行总线接口。The second transmission interface is a universal serial bus interface. 9.如权利要求7所述的使计算机中虚拟硬盘激活的便携式钥匙,其特征在于:9. The portable key for activating the virtual hard disk in the computer as claimed in claim 7, characterized in that: 该密码是一个16字节数据。The password is a 16-byte data.
CNB021557594A 2002-12-06 2002-12-06 Method for activating virtual hard disk in computer platform and portable key thereof Expired - Fee Related CN1328671C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB021557594A CN1328671C (en) 2002-12-06 2002-12-06 Method for activating virtual hard disk in computer platform and portable key thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB021557594A CN1328671C (en) 2002-12-06 2002-12-06 Method for activating virtual hard disk in computer platform and portable key thereof

Publications (2)

Publication Number Publication Date
CN1506854A CN1506854A (en) 2004-06-23
CN1328671C true CN1328671C (en) 2007-07-25

Family

ID=34236056

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB021557594A Expired - Fee Related CN1328671C (en) 2002-12-06 2002-12-06 Method for activating virtual hard disk in computer platform and portable key thereof

Country Status (1)

Country Link
CN (1) CN1328671C (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101464934B (en) * 2007-12-18 2010-12-22 中国长城计算机深圳股份有限公司 Mutual binding and authenticating method for computer platform and storage device, and computer thereof
US8615544B2 (en) * 2011-02-25 2013-12-24 Wyse Technology Inc. System and method for unlocking a device remotely from a server

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2676291B1 (en) * 1991-05-06 1995-02-24 Bull Sa
CN1292528A (en) * 1999-10-11 2001-04-25 三星电子株式会社 Portable integrated circuit memory devices for use with the universal serial bus
US6351813B1 (en) * 1996-02-09 2002-02-26 Digital Privacy, Inc. Access control/crypto system
CN1381787A (en) * 2001-04-20 2002-11-27 宏碁股份有限公司 Computer Hard Disk Protection Method and Protection System

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2676291B1 (en) * 1991-05-06 1995-02-24 Bull Sa
US6351813B1 (en) * 1996-02-09 2002-02-26 Digital Privacy, Inc. Access control/crypto system
CN1292528A (en) * 1999-10-11 2001-04-25 三星电子株式会社 Portable integrated circuit memory devices for use with the universal serial bus
CN1381787A (en) * 2001-04-20 2002-11-27 宏碁股份有限公司 Computer Hard Disk Protection Method and Protection System

Also Published As

Publication number Publication date
CN1506854A (en) 2004-06-23

Similar Documents

Publication Publication Date Title
US7257717B2 (en) Method with the functions of virtual space and data encryption and invisibility
US7747797B2 (en) Mass storage device with near field communications
CN100583036C (en) Computer safety control method based on USB flash memory disc
JP2009518702A (en) Devices that use virtual interfaces to provide a safe working environment
US20090222500A1 (en) Information storage device and method capable of hiding confidential files
JP2002318788A (en) Network terminal
US7412603B2 (en) Methods and systems for enabling secure storage of sensitive data
CN101114256B (en) Real-time data privacy method
CN100552690C (en) data management method
US20060107317A1 (en) Selective protection of files on portable memory devices
US20090067624A1 (en) System and method of protecting content of an electronic file using a computer
CN110402440A (en) segmented key authentication system
CN101271496B (en) Password output method and device
CN1328671C (en) Method for activating virtual hard disk in computer platform and portable key thereof
CN101165697A (en) Individual information fingerprint protection and management system
US20090077377A1 (en) System and method of protecting content of an electronic file for sending and receiving
TW200513086A (en) Internet passing security authentication system and method, and IC card authentication hardware
JP2007094879A (en) Authentication system for basic program for operating system, computer used therefor, and computer program
TW200513087A (en) Mail server login security authentication system and method, and IC card authentication hardware
US20090070580A1 (en) Portable electronic file protection system
JP2007012022A (en) Security program and security system
JP2003150559A (en) Key system for preventing illicit use and keeping secrecy
JP5372843B2 (en) Content utilization apparatus and program
Hoepman et al. Offering'Home'Protection to Private Digital Storage Spaces
David Security in a Flash

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070725

Termination date: 20141206

EXPY Termination of patent right or utility model
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载