CN100533459C - Data safety reading method and safety storage apparatus thereof - Google Patents
Data safety reading method and safety storage apparatus thereof Download PDFInfo
- Publication number
- CN100533459C CN100533459C CNB2007101763166A CN200710176316A CN100533459C CN 100533459 C CN100533459 C CN 100533459C CN B2007101763166 A CNB2007101763166 A CN B2007101763166A CN 200710176316 A CN200710176316 A CN 200710176316A CN 100533459 C CN100533459 C CN 100533459C
- Authority
- CN
- China
- Prior art keywords
- data
- safety storage
- storage apparatus
- unit
- key module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 230000008569 process Effects 0.000 claims abstract description 8
- 238000004891 communication Methods 0.000 claims description 37
- 238000013500 data storage Methods 0.000 abstract description 13
- 230000005540 biological transmission Effects 0.000 abstract description 8
- 238000012795 verification Methods 0.000 description 10
- 230000006870 function Effects 0.000 description 7
- 230000008859 change Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 2
- 230000008676 import Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to the field of information security, and belongs to a method to meet the requirement of protecting data acquisition security; a safety storage device receives a data acquisition command from the host end; any one or two of smart key modules certify the validity of the opposite one; after the safety storage device or/and the smart key modules are certified as valid, the safety storage device is allowed to use a fixed key to perform deciphering for cipher text data that is stored in the safety storage device, and transmit to the host end. The invention also requires protecting a data storage security device that comprises a safety storage device and a smart key module; after any one or two of the safety storage device and the smart key module pass a validity certification, a deciphering operation is allowed to add; moreover, use the fixed key and a conversation key to perform deciphering and encryption process in sequence for the cipher text data; the invention can guarantees the data being transmitted between the host computer and the safety storage device in the form of cipher texts, so as to increases reliability in data transmission process.
Description
Technical field
The present invention relates to information security field, particularly a kind of data safe reading method and safe storage device thereof.
Background technology
Safety storage apparatus is a kind of small hardware device that has processor and storer, and it can be connected with computing machine by the data communication interface of computing machine.Secure storage module of the prior art adopts the legitimacy of PIN code identifying user identity, when carrying out authentication, secure storage module is linked to each other with computing machine, the user imports PIN code on computers, the correctness of automatic this PIN code of verification of secure storage module meeting, when having only the PIN code of importing as the user correct, just allow user's handling safety memory module.Secure storage module has the key systematic function, but and safe storage key and preset cryptographic algorithm.The computing that secure storage module is relevant with key is being installed internal operation fully.Because secure storage module has the characteristic of high safety, thus much require the higher field of security all to adopt secure storage module to carry out authentication, to guarantee the security of operation.For example the computer booting protection system often utilizes secure storage module to confirm user's identity.
Yet still there are many deficiencies in existing secure storage module aspect security and the ease for use.From secure storage module and authentication among users aspect, at first, because many users are in order to prevent to forget PIN code, often employing such as own or household's birthday, telephone number etc. are as password, these significant character strings are guessed by other people easily, perhaps adopt password copied at one and oneself think safe place, this also exists potential safety hazard, very easily causes password to reveal.Existing secure storage module had both had key and had also had user profile simultaneously, if not the method molecule has been stolen this device, just probably obtain the PIN code that the user sets by the password conjecture, in case this situation takes place, illegal molecule finally reaches the purpose of stealing the inner private information of secure storage module just very easily by authentication.
Secondly, in the prior art, except the static password authentication mode, the mode of using the user biological characteristic information to replace password to authenticate in addition promptly deposits the biological information of validated user in device inside initialized the time, the user in use, need the correct biological information of one or many input can pass through authentication, this authentication mode high safety, but cost is higher usually, comparatively loaded down with trivial details during use.
From the communication aspects between external unit and the computing machine, the process that outside secure storage module and main frame carry out data communication in the prior art often adopts storage encryption or authenticating user identification device to guarantee safety of data in the secure storage module, and the control disabled user monitors or intercept and capture sensitive information.For example utilize various key mechanisms to realize the encryption of data in the equipment is stored, perhaps utilize the double factor authentication pattern to come the identity of authenticated.Yet, the disabled user can intercept and capture the data that secure storage module and computing machine communicate by third party software, and characteristic information cracked analysis, reach the purpose of stealing the device interior data, thereby bring potential safety hazard for external security memory module and compunication.
Summary of the invention
The present invention has overcome above-mentioned shortcoming, and low, safe data safe reading method of a kind of application cost and safe storage device thereof are provided.
The present invention solves the technical scheme that its technical matters takes: a kind of data safe reading method, and the fixed key that stores encrypt data in the described safety storage apparatus and be used to decipher described encrypt data, the process of reading comprises the steps:
Authenticate the legitimacy of authentication information in the described intelligent key module;
Safety storage apparatus receives the data read command that host side is sent;
Either party or mutual authentication the other side's validity in safety storage apparatus and the intelligent key module;
At the described safety storage apparatus of authentication or/and intelligent key module effectively after, allow described safety storage apparatus to utilize described fixed key that described encrypt data is decrypted, and mail to host side;
Perhaps comprise the steps:
Authenticate the legitimacy of authentication information in the described intelligent key module;
Safety storage apparatus receives the data read command that host side is sent;
Either party or mutual authentication the other side's validity in safety storage apparatus and the intelligent key module;
At the described safety storage apparatus of authentication or/and intelligent key module effectively after, allow described safety storage apparatus to utilize described fixed key that described encrypt data is decrypted, and mail to host side.
At the described safety storage apparatus of authentication or/and intelligent key module effectively after, described intelligent key module and main frame can carry out key agreement and generate session key and send to described safety storage apparatus, described safety storage apparatus utilizes the data after described session key will be deciphered to encrypt, and mails to host side.
Described key agreement can intelligent key module running time, number of operations, authentication information or/and the validity authentication information is a seed.
Described authentication information can be self-defined password or biological information.
The validity authentication information of described safety storage apparatus or intelligent key module can be sequence number or hardware identifier.
Write down Operation Log after also can being included in the validity authentification failure.
Described safety storage apparatus can and intelligent key module between adopt contactless communication to realize read-write operation.
A kind of data safety storage device comprises safety storage apparatus and intelligent key module, is contactless communication between described safety storage apparatus and the described intelligent key module,
Described safety storage apparatus comprises:
Interface unit is used to realize the data communication between microprocessor unit and main frame;
The ciphertext storage unit, the fixed key that is used to store encrypt data and the described encrypt data of deciphering;
Communication unit is used to realize that microprocessor unit is set up with described intelligent key module communicates by letter;
Authentication ' unit is used for through described microprocessor unit and described communication unit, receives the validity authentication information of sending from intelligent key module, carries out the validity authentication;
Microprocessor unit, be used for to authentication ' unit carry out validity authentication control, be used for to described ciphertext storage unit realize data write control, be used to resolve described communication unit communication interface standard, be used to control the encryption and decryption of ciphertext storage unit to encrypt data;
Described intelligent key module comprises:
Communication unit is used to realize that micro controller unit is set up with described safety storage apparatus communicates by letter;
Authentication ' unit is used for the communication unit through described micro controller unit and intelligent key module, receives validity authentication information that safety storage apparatus sends or/and authentication information authenticates;
Micro controller unit is used for resolving the communication interface standard of the described communication unit of intelligent key module, the described authentication ' unit that is used for controlling intelligent key module is carried out the validity authentication or/and authentication.
Described intelligent key module also can comprise the key generation unit, is used for carrying out key agreement under the control of described micro controller unit, generates session key.
The present invention is by either party in safety storage apparatus and intelligent key module or mutual authentication the other side's validity, allowing the encryption and decryption operation by the authentication back, and can use fixed key and session key successively to finish deciphering to encrypt data, ciphering process, can guarantee that data form with ciphertext between main frame and equipment transmits, in the case, even trojan horse program has been intercepted and captured the data in the transmission course, owing to there is not key, therefore can't be decrypted it, finally can not obtain cleartext information, this has improved the reliability in the data transmission procedure to a certain extent.
Description of drawings
Fig. 1 is the control flow chart of the embodiment of the invention one;
Fig. 2 is the theory diagram of the embodiment of the invention two.
Embodiment
Embodiment one: present embodiment is a kind of data safe reading method, the fixed key that at first encrypt data and being used to will be deciphered described encrypt data leaves in the same or different memory areas of safety storage apparatus, also stores the information as the validity authentication in safety storage apparatus and the intelligent key module respectively.The process that reads of data as shown in fig. 1,
Step 101, safety storage apparatus work on power, and connect with main frame;
Step 102, intelligent key module are imported authentication information by safety storage apparatus and main frame prompting user, as User Defined password or biological information;
Step 103, described authentication information is sent in the described intelligent key module by main frame and safety storage apparatus;
Whether the authentication information of step 104, intelligent key module internal verification user input is legal, the authentication information that is about to the validated user of intelligent key module stored is compared with the information of user's input, judge whether the two is consistent, if it is consistent, show that then the user who imports authentication information is the legal holder of described intelligent key module, then execution in step 106, otherwise think that the user is the illegal holder of intelligent key module, and then execution in step 105;
Step 105, by safety storage apparatus error message is sent in the main frame, main frame is to the user prompt error message;
Step 106, send data read command to safety storage apparatus, read and to rewrite the data that exclusive disjunction is handled by main frame;
Step 107, safety storage apparatus send the validity authentication command to intelligent key module;
Step 108, safety storage apparatus read the sequence number as the validity authentication information from intelligent key module, send the hardware identifier information as the validity authentication information of safety storage apparatus simultaneously to intelligent key module;
The intelligent key module that the checking of step 109, safety storage apparatus is read from intelligent key module sequence number, compare with the information of the legal intelligent key module of storage inside, judge whether whether intelligent key module is effective, the hardware identifier information of the legal safety storage apparatus of intelligent key module and storage inside compares simultaneously, whether whether the consistent intelligent key module of verifying is effective by judging the two, and described hardware identifier information also can be the hardware sequence number of safety storage apparatus;
Step 110, the sequence number of the intelligent key module that the safety storage apparatus internal verification reads from intelligent key module is an invalid information, or the hardware identifier information that intelligent key module internal verification safety storage apparatus sends is invalid information, or the hardware identifier information that the sequence number of the intelligent key module that reads from intelligent key module of safety storage apparatus internal verification and intelligent key module internal verification safety storage apparatus send is invalid information, safety storage apparatus internal record Operation Log then, safety storage apparatus is sounded, to the user prompt error message;
Step 111, by after the validity authentication, the encrypt data memory block of safety storage apparatus inside is activated, and allows user's memory device internal fixation safe in utilization key that encrypt data is carried out the enciphering/deciphering operation.A variable for example is set in the random memory unit of safety storage apparatus microprocessor, the internal processes of safety storage apparatus determines whether allowing encrypt data is operated according to the value of this variable, have only when intelligent key module and safety storage apparatus all authenticate by validity, inner this variate-value of just revising of safety storage apparatus, open the permission of manipulating of encrypt data storage unit and fixed key, the lock-out state of inner encrypt data storage unit is revised as duty, allows the fixed key of user's memory device safe in utilization inside that the encrypt data in the encrypt data memory block is carried out the enciphering/deciphering operation; Otherwise, then forbid described encrypt data storage unit is operated.
Step 112, safety storage apparatus send key to intelligent key module and generate order, and intelligent key module and main frame carry out key agreement and generate session key;
After the both sides that described key agreement typically refers to communication link foundation, send handshake request message, this message the inside has comprised the message of own attainable algorithm list and some other needs, one side of communication can respond one and determine this needed algorithm of communicating by letter, and sends out over oneself certificate (the inside has comprised identity and the PKI of oneself) then.The opposing party of communication can generate a classified information after receiving this message, with biography behind the other side's the public key encryption in the past, after the private key deciphering of the other side with oneself, the session key agreement success, both sides can be with having communicated by letter with a session key.
Step 113, safety storage apparatus read the session key of generation from intelligent key module;
Step 114, safety storage apparatus utilize the fixed key of its storage inside that the be read data of its inside with the storage of ciphertext form are decrypted;
Data after step 115, safety storage apparatus utilize described session key to deciphering are encrypted, and data send to main frame after will encrypting;
The session key that step 116, main frame inner utilization and intelligent key module generate is decrypted the encrypt data that receives, and realizes that main frame reads the safety of data;
Step 117, the inner response of main frame user's operational order is carried out the operation of rewriting exclusive disjunction to the data after the deciphering;
Step 118, host computer using session key are encrypted revised data, and send in the safety storage apparatus;
Step 119, safety storage apparatus inner utilization session key are decrypted the encrypt data that receives;
Step 120, safety storage apparatus utilize the fixed key of its storage inside that the data after the session key deciphering in the step 119 are encrypted and stored, and wait for data read next time.
Embodiment two:
Present embodiment is a kind of device of guaranteeing data security transmission and storage, comprise safety storage apparatus and intelligent key module, secure storage module can be USB Key or USB Token or IC-card etc., it is a kind of portable safe memory apparatus of USB interface, interior tape handling device and mass storage, the data communication interface that can either cross computing machine is connected with computing machine, the function that has Non-contact Media Reader again, can and non-contact IC card between carry out data interaction, described intelligent key module can be non-contact IC card, present embodiment as shown in Figure 2:
Microprocessing unit 201 among the wherein said USB Key 2 is connected with authentication ' unit 202, radio frequency unit 203, fixed key storage unit 205, encrypt data storage unit 206, verify data storage unit 207, program storage unit (PSU) 208, usb interface unit 209, phonation unit 210 respectively, wherein:
Microprocessor unit 201 is used for coordinating data communication control between USB Key 2 each unit and the data communication between USB Key 2 and the main frame 1;
Authentication ' unit 202 is used to finish user identity identification and to the authentication of non-contact IC card 3;
Radio frequency unit 203 is used to realize modulation/demodulation function, the electromagnetic wave signal that receives from antenna element 204 can be converted to the numerical information that microprocessor unit 201 can be discerned, and the numerical information after will handling is converted to electromagnetic wave signal and sends to non-contact IC card 3 by antenna element 5;
Antenna element 204 is a pickup coil, is used to respond to and receive the information that non-contact IC card 3 sends, and to non-contact IC card 3 transmission information; Described radio frequency unit 203 and antenna element 204 constitutes communication units, realize with non-contact IC card 3 between communicate by letter and recording operation daily record when authentification failure.
Fixed key storage unit 205 is used for storing the enciphering/deciphering key of encrypt data storage unit 206 encrypt datas;
Encrypt data storage unit 206 is used for the session key storing fixed key and read from non-contact IC card, cipher-text information such as digital certificate; But described fixed key storage unit and encrypt data storage unit common storage are in a ciphertext storage unit;
Verify data storage unit 207 is used to store the User Defined password, the hardware information of USB Key 2, the authentication information of validated user, IC-card identification information and the authentication information that reads from non-contact IC card;
Program storage unit (PSU) 208 is used to deposit firmware program, enciphering/deciphering program, said procedure is mainly used in realizes communicating by letter of USB Key 2 and 3 of main frame 1 and non-contact IC cards, the information that main frame 1 sends is resolved, handled, the user is carried out identification, non-contact IC card 3 is authenticated, realize user authority management, revise the state representation position of status indicator unit 2011, finish data incoming/outgoing management, command information is handled and generated to the encrypt data enciphering/deciphering encrypt data storage unit 206;
The card authentication information that phonation unit 210 is used for reading from non-contact IC card when USB Key internal verification is an invalid information, or the hardware identifier information that non-contact IC card internal verification USB Key sends is to be invalid information, or the hardware identifier information that sends of the card authentication information that from non-contact IC card, reads of USB Key internal verification and non-contact IC card internal verification USB Key when being invalid information to the user prompt error message.
Described microprocessor unit 201 also can further comprise status indicator unit 2011, is used for by the change status indicator, allows or forbids the deciphering of fixed key to encrypt data.
In non-contact IC card 3, micro controller unit 301 be used for coordinating between non-contact IC card 3 each unit data communication and and USB Key 2 between data communication;
Authentication ' unit 302 is used to finish the authentication to USB Key 2, to activate fixed key storage unit 205 and the encrypt data storage unit 206 among the USB Key 2;
Radio frequency unit 303 is used for modulation/demodulation function, the electromagnetic wave signal that receives from USB Key 2 can be converted to the numerical information that non-contact IC card 3 can be discerned, and the numerical information after will handling is converted to electromagnetic wave signal and sends to USBKey 2 by antenna element 304;
Antenna element 304 is a pickup coil, is used to respond to and receive the information that portable safe memory apparatus 2 sends, and to USB Key 2 transmission information; Described radio frequency unit 303 and antenna element 304 constitutes communication units, realize with USB Key 2 between communicate by letter.
Key generation unit 306 is used for and the main frame 1 generation session key of holding consultation.
In main frame 1, host interface unit 11 is connected with usb interface unit 209, is used to realize the data communication between main frame 1 and the USB Key 2; Data processing unit 12 is used to respond user's operational order to be handled data; Key generation unit 13 is used for carrying out key agreement with non-contact IC card 3 and generates session key.
Can use fixed key and session key successively to finish deciphering, ciphering process in the present invention to encrypt data, can guarantee that data form with ciphertext between main frame and equipment transmits, in the case, even trojan horse program has been intercepted and captured the data in the transmission course, owing to there is not key, therefore can't be decrypted it, finally can not obtain cleartext information, this has improved the reliability in the data transmission procedure to a certain extent; Fixed key and session key leave in respectively in two physical equipments in method and system provided by the invention, and session key is interim the generation, therefore illegal molecule has only has stolen secure storage module, contactless security module at the same time, and possess the operating right that could obtain under the situation of the legal holder's identity of secure storage module encrypt data, this has improved the security of data storage to a great extent; Method and system provided by the invention have log recording function, make things convenient for user inquiring use historical record in the past; Method provided by the invention and device have been introduced contactless technology, so have on the basis of function, increased its contactless read/write function at secure storage module, because contactless device has not easy to wear, characteristics such as convenience is easy-to-use, thus significant benefits brought to the present invention.
More than data safe reading method provided by the present invention and safe storage device thereof are described in detail, used specific case herein principle of the present invention and embodiment are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, the part that all can change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention.
Claims (9)
1. data safe reading method is characterized in that: the fixed key that stores encrypt data and be used to decipher described encrypt data in safety storage apparatus, the process of reading comprises the steps:
Authenticate the legitimacy of authentication information in the described intelligent key module;
Safety storage apparatus receives the data read command that host side is sent;
Either party or mutual authentication the other side's validity in safety storage apparatus and the intelligent key module;
At the described safety storage apparatus of authentication or/and intelligent key module effectively after, allow described safety storage apparatus to utilize described fixed key that described encrypt data is decrypted, and mail to host side;
Perhaps comprise the steps:
Safety storage apparatus receives the data read command that host side is sent;
Authenticate the legitimacy of authentication information in the described intelligent key module;
Either party or mutual authentication the other side's validity in safety storage apparatus and the intelligent key module;
At the described safety storage apparatus of authentication or/and intelligent key module effectively after, allow described safety storage apparatus to utilize described fixed key that described encrypt data is decrypted, and mail to host side.
2. data safe reading method according to claim 1, it is characterized in that: at the described safety storage apparatus of authentication or/and intelligent key module effectively after, described intelligent key module and main frame carry out key agreement and generate session key and send to described safety storage apparatus, described safety storage apparatus utilizes the data after described session key will be deciphered to encrypt, and mails to host side.
3. data safe reading method according to claim 2 is characterized in that: described key agreement with running time of intelligent key module, number of operations, authentication information or/and the validity authentication information is a seed.
4. data safe reading method according to claim 3 is characterized in that: described authentication information is self-defined password or biological information.
5. according to claim 1 or 2 or 3 described data safe reading methods, it is characterized in that: the validity authentication information of described safety storage apparatus or intelligent key module is sequence number or hardware identifier.
6. according to claim 1 or 2 or 3 described data safe reading methods, it is characterized in that: write down Operation Log after also being included in the validity authentification failure.
7. according to claim 1 or 2 or 3 described data safe reading methods, it is characterized in that: adopt contactless communication to realize read-write operation between described safety storage apparatus and the intelligent key module.
8. data safety storage device is characterized in that: comprising safety storage apparatus and intelligent key module, is contactless communication between described safety storage apparatus and the described intelligent key module,
Described safety storage apparatus comprises:
Interface unit is used to realize the data communication between microprocessor unit and main frame;
The ciphertext storage unit, the fixed key that is used to store encrypt data and the described encrypt data of deciphering;
Communication unit is used to realize that microprocessor unit is set up with described intelligent key module communicates by letter;
Authentication ' unit is used for through described microprocessor unit and described communication unit, receives the validity authentication information of sending from intelligent key module, carries out the validity authentication;
Microprocessor unit, be used for to authentication ' unit carry out validity authentication control, be used for to described ciphertext storage unit realize data write control, be used to resolve described communication unit communication interface standard, be used to control the encryption and decryption of ciphertext storage unit to encrypt data;
Described intelligent key module comprises:
Communication unit is used to realize that micro controller unit is set up with described safety storage apparatus communicates by letter;
Authentication ' unit is used for the communication unit through described micro controller unit and intelligent key module, receives validity authentication information that safety storage apparatus sends or/and authentication information authenticates;
Micro controller unit is used for resolving the communication interface standard of the described communication unit of intelligent key module, the described authentication ' unit that is used for controlling intelligent key module is carried out the validity authentication or/and authentication.
9. data safety storage device according to claim 8 is characterized in that: described intelligent key module also comprises the key generation unit, is used for carrying out key agreement under the control of described micro controller unit, generates session key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2007101763166A CN100533459C (en) | 2007-10-24 | 2007-10-24 | Data safety reading method and safety storage apparatus thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2007101763166A CN100533459C (en) | 2007-10-24 | 2007-10-24 | Data safety reading method and safety storage apparatus thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101140605A CN101140605A (en) | 2008-03-12 |
CN100533459C true CN100533459C (en) | 2009-08-26 |
Family
ID=39192554
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2007101763166A Expired - Fee Related CN100533459C (en) | 2007-10-24 | 2007-10-24 | Data safety reading method and safety storage apparatus thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100533459C (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11056173B2 (en) | 2017-12-21 | 2021-07-06 | Samsung Electronics Co., Ltd. | Semiconductor memory device and memory module including the same |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10181055B2 (en) | 2007-09-27 | 2019-01-15 | Clevx, Llc | Data security system with encryption |
CN102831731A (en) * | 2011-06-16 | 2012-12-19 | 王海泉 | Online banking payment method and system with radio frequency input |
CN102279814B (en) * | 2011-08-19 | 2014-03-05 | 北方工业大学 | Encryption anti-copy system and anti-copy method thereof |
CN104252874B (en) * | 2013-06-27 | 2017-05-24 | 苏州四维空间智能科技有限公司 | Mobile memory |
CN104715207B (en) * | 2013-12-16 | 2018-09-18 | 航天信息股份有限公司 | Pass through the method for cipher key storage file under a kind of Android platform |
CN104346556A (en) * | 2014-09-26 | 2015-02-11 | 中国航天科工集团第二研究院七〇六所 | Hard disk security protection system based on wireless security certification |
CN105787376A (en) * | 2014-12-26 | 2016-07-20 | 深圳市中兴微电子技术有限公司 | Data security access method and apparatus |
KR102054711B1 (en) * | 2016-01-04 | 2019-12-11 | 클레브엑스 엘엘씨 | Data security system using encryption |
CN105721443B (en) * | 2016-01-25 | 2019-05-10 | 飞天诚信科技股份有限公司 | A kind of link session cipher negotiating method and device |
CN108021051A (en) * | 2016-10-31 | 2018-05-11 | 无锡云汇科技有限公司 | Industrial control unit (ICU) |
US10929572B2 (en) * | 2017-04-10 | 2021-02-23 | Nyquist Semiconductor Limited | Secure data storage device with security function implemented in a data security bridge |
CN110119946B (en) * | 2018-02-05 | 2022-12-13 | 库币科技有限公司 | Pairing authentication method for electronic transaction device |
KR102499614B1 (en) * | 2018-10-30 | 2023-02-13 | 삼성전자주식회사 | A host device, a storage device, a VUC authentication system including them, and a VUC authentication method |
CN111758243A (en) * | 2019-12-18 | 2020-10-09 | 深圳市汇顶科技股份有限公司 | Mobile storage device, storage system and storage method |
CN112052201A (en) * | 2020-09-27 | 2020-12-08 | 中孚安全技术有限公司 | USB device management and control method and system based on Linux kernel layer |
-
2007
- 2007-10-24 CN CNB2007101763166A patent/CN100533459C/en not_active Expired - Fee Related
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11056173B2 (en) | 2017-12-21 | 2021-07-06 | Samsung Electronics Co., Ltd. | Semiconductor memory device and memory module including the same |
Also Published As
Publication number | Publication date |
---|---|
CN101140605A (en) | 2008-03-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100533459C (en) | Data safety reading method and safety storage apparatus thereof | |
US11664997B2 (en) | Authentication in ubiquitous environment | |
CA2838763C (en) | Credential authentication methods and systems | |
CN1913427B (en) | System and method for encrypted smart card PIN entry | |
CN101122942B (en) | Data safe reading method and its safe storage device | |
US7861015B2 (en) | USB apparatus and control method therein | |
US20070223685A1 (en) | Secure system and method of providing same | |
CN101483654A (en) | Method and system for implementing authentication and data safe transmission | |
CN101770619A (en) | Multiple-factor authentication method for online payment and authentication system | |
US9361566B2 (en) | Method for reading an RFID token, RFID card and electronic device | |
CN112352410B (en) | Method and apparatus for using smart card as security token, readable storage medium | |
CN103812649A (en) | Method and system for safety access control of machine-card interface, and handset terminal | |
CN101841418A (en) | Handheld multiple role electronic authenticator and service system thereof | |
CN109903052A (en) | A kind of block chain endorsement method and mobile device | |
CN108768941B (en) | Method and device for remotely unlocking safety equipment | |
KR100548638B1 (en) | Creating and authenticating one time password using smartcard and the smartcard therefor | |
CN104333452A (en) | Multi-account encryption method for file data | |
Otterbein et al. | The German eID as an authentication token on android devices | |
CN113595714A (en) | Contactless card with multiple rotating security keys | |
US20240129139A1 (en) | User authentication using two independent security elements | |
CN105072136A (en) | Method and system for security authentication between devices based on virtual drive | |
CN106357624B (en) | A kind of security setting terminal system time method and system | |
KR101471006B1 (en) | Method for Operating Certificate | |
Salaiwarakul et al. | Verification of integrity and secrecy properties of a biometric authentication protocol | |
KR101519580B1 (en) | Method for Operating Certificate |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C56 | Change in the name or address of the patentee |
Owner name: FEITIAN TECHNOLOGIES CO., LTD. Free format text: FORMER NAME: BEIJING FEITIAN CHENGXIN TECHNOLOGY CO., LTD. |
|
CP03 | Change of name, title or address |
Address after: 100085 Beijing city Haidian District Xueqing Road No. 9 Ebizal building B block 17 layer Patentee after: Feitian Technologies Co.,Ltd. Address before: 100083, Haidian District, Xueyuan Road, Beijing No. 40 research, 7A building, 5 floor Patentee before: FEITIAN TECHNOLOGIES Co.,Ltd. |
|
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20090826 |