New Development of Mobile Safe Technology

With the popularization of various dedicated and non-dedicated mobile storage devices, how to protect the stored data and prevent it from unauthorized operations such as encryption, decryption, deletion, and modification has become a technical problem that needs to be solved urgently. In view of the defects existing in the existing technologies, enterprises in China have developed new products with independent intellectual property rights. The mobile safe technology used in the company can create virtual encrypted disks exclusively for users that require encryption protection data in mobile storage devices.
In the narrow sense, mobile storage devices mainly include special removable storage devices such as flash disks and mobile hard disks. Among them, the flash disk uses a flash memory medium (Flash Memory) and a Universal Serial Bus (USB) interface, and can be used to store data files of any format, and can easily exchange data with a computer. Flash memory storage capacity can reach 2GB, far more than the floppy disk. Flash disk with USB interface, read and write speed far more than floppy disk. Moreover, flash drives do not have mechanical read/write devices and are not vulnerable to damage. The mobile hard disk is based on the hard disk as a storage medium, and the storage space far exceeds the flash disk. The mobile hard disk uses USB, IEEE1394, and other faster transmission interfaces to exchange data with the computer. In a broad sense, the mobile storage device not only includes the dedicated mobile storage device described above, but also includes mobile phones, voice recorders, digital cameras, MP3s, MP4s, and other electronic products having a mobile storage function. For example, some hard-disk-based MP4 players have a mobile storage space of up to 100 GB and can exchange large amounts of electronic data with any computer that is connected to it. With the popularity of various dedicated and non-dedicated mobile storage devices, how to protect the data it stores and prevent them from being subjected to unauthorized operations such as unauthorized encryption, decryption, deletion, modification, migration, copying, dissemination, and reading? The protection of data copied from the removable storage device to the hard disk of the local computer to prevent unauthorized operations such as encryption, decryption, deletion, modification, migration, copying, dissemination, and reading has become an urgent technical problem.
In the prior art, there are mainly two types of technologies for maintaining data security of a mobile storage device: First, a single file is encrypted and stored. According to this method, the user must encrypt each unencrypted file and copy it to the removable storage device. This method is very inconvenient to operate and is rarely used by users. Second, use a device driver to change the format of the data stored on the storage device. When installing a drive for a removable storage device, the operating system will first format the removable storage device and format it before it can be used. However, when the formatted removable storage device is connected to a computer that does not have the same program installed, the removable storage device will not be recognized by the computer. In this way, the data in the removable storage device will not be accessible by other computer systems. However, this method severely limits the plug-and-play adaptability of the mobile storage device, and it is inconvenient for the user to use any computer to operate the mobile storage device on the basis of maintaining data security. In addition, the above two methods are mainly used to protect data in a mobile storage device. They do not apply to the protection of data that is copied from the removable storage device to the local computer hard disk. In short, due to the lack of convenient and effective data protection technologies, most mobile storage devices currently maintain the convenience of plug-and-play, but at the expense of data security. Data leakage, damage, loss, etc. caused by using mobile storage devices are quite common. This has seriously affected the economic security of enterprises and institutions, and also threatened many individuals’ financial privacy and privacy.
Therefore, people urgently need a more secure and convenient data protection technology to protect data in mobile storage devices and ensure that data stored in mobile storage devices is not encrypted, deleted, modified, moved, and copied by unauthorized users. , spread, read, and other illegal operations. At the same time, it also provides protection for data that is copied from a removable storage device to the local computer's hard disk, preventing it from being subjected to unauthorized operations such as unauthorized encryption, decryption, deletion, modification, migration, copying, propagation, and reading. While ensuring data security, new technologies must ensure that legitimate users can conveniently, quickly, and safely perform a variety of legal operations such as encryption, decryption, deletion, modification, movement, copying, dissemination, and reading on a large number of files in various computer systems. In order to overcome the existing technical defects.
In response to these deficiencies, an enterprise in Beijing in China developed new products with independent intellectual property rights. It uses mobile safe technology, which enables people to use mobile safe system tools to create virtual encrypted disks (ie, mobile safes) for users who need encryption protection in mobile storage devices. The Mobile Safe exists as a file on the physical disk and can be opened by the user who created it. After it is opened, the mobile safe is mapped as a virtual disk, which is equivalent to an ordinary hard disk partition where users can create, modify, and delete files, and can drag and drop unencrypted protected data in the mobile storage device to the mobile safe. In the implementation of encryption, it is also possible to drag-and-drop the encrypted and protected data in the mobile safe to a public area that is not encrypted and protected in the mobile storage device to perform decryption. For legal users, there is no difference between the use of mobile safes and the use of common disk partitions. However, for other users who are not creators, Mobile Vault is always an encrypted disk file that cannot be opened or obtained.
Based on the above data security storage and processing methods, the above new products can be improved as follows, so that more technical means can be used to expand market supply. For example, a user can create one or more mobile safes on a mobile storage device and set different secret levels, respectively, or keep an unencrypted public data storage area; users can determine one or more safes according to their own needs. The size can be stored in a variety of formats in the safe and can be free to create a folder; in the case of the mobile safe is opened, the user can be set to automatically cut off the computer network port to prevent the Internet leak; the user can move insurance The cabinet is used together with the VPN gateway and VRC to obtain greater freedom of mobile storage on the basis of ensuring data security; the user can log on to the computer system with a smart key, and the mobile safe created with a specific key can be distributed on the local computer hard disk and On mobile storage devices, legitimate key users can freely operate the data in the mobile safe, and the data exchange between the mobile storage device and the computer can be performed between their mobile safes to protect data security; used to log on to the computer system The smart password key can be divided into many Levels, subordinate keys can be used to operate the mobile safe it creates itself. After the lower level key is lost or damaged, the superior key user can reissue the subordinate key, allowing the latter to freely operate the data in the mobile safe, moving the storage device and the computer. Data exchanges can be performed between their mobile safes to protect data security.
Compared with the prior art, the above new product has the following advantages: it does not need to encrypt a single file and store it on a mobile storage device, and can quickly encrypt and decrypt batch files; it does not change the original storage format of the mobile storage device, and does not Influencing the use of mobile storage devices in other computer systems; it uses dedicated encryption algorithms and technologies in mobile safes to encrypt and store data to ensure that unauthorized users cannot open encrypted files; after encryption, the storage space required for files does not expand. Both the plaintext and the ciphertext occupy the same disk space, and the encrypted data redundancy is zero; the processing speed is fast, and the ratio of the read/write data read/write and the plaintext read/write time is close to 11, and the general file processing does not have to wait. It can cooperate with the smart key and realize various extended data security operations. In short, this product is suitable for data storage and processing operations of various mobile storage devices, and is especially suitable for the safe operation of mobile storage devices after a user has enabled the login of a smart password key to a specific computer software and database system.

Want to learn more about the knowledge of the safe, all in the Chinese safe exchange network.

HUATAO GROUP is a professional enterprise specializing in the production of paper mchine clothings from China. The company has a professional, refined, vibrant first-class team to supply Spiral Dryer Canvas,poleyster spiral mesh, Papermaking Wire,sprial dryer fabric,for packing paper machine,craft paper machine,wrintting and printing paper machine,paperboard paper machine ect ,all kinds of dryer fabric for paper industry.

Spiral Dryer Screen

Dryer Fabrics,Dryer Screen,Spiral Dryer Canvas,Polyester Spiral Belt,Sldf,Spiral Dryer Fabric

HUATAO GROUP LTD , https://www.huataogroup.com

Posted on