CN101122938A - Data file safe treatment method and system - Google Patents

Data file safe treatment method and system Download PDF

Info

Publication number
CN101122938A
CN101122938A CN 200710122431 CN200710122431A CN101122938A CN 101122938 A CN101122938 A CN 101122938A CN 200710122431 CN200710122431 CN 200710122431 CN 200710122431 A CN200710122431 A CN 200710122431A CN 101122938 A CN101122938 A CN 101122938A
Authority
CN
China
Prior art keywords
file
index information
user
data
data file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200710122431
Other languages
Chinese (zh)
Other versions
CN100585608C (en
Inventor
李春华
郭宗明
黄峰
叶东富
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peking University
Peking University Founder Group Co Ltd
Beijing Founder Electronics Co Ltd
Original Assignee
Peking University
Peking University Founder Group Co Ltd
Beijing Founder Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University, Peking University Founder Group Co Ltd, Beijing Founder Electronics Co Ltd filed Critical Peking University
Priority to CN 200710122431 priority Critical patent/CN100585608C/en
Publication of CN101122938A publication Critical patent/CN101122938A/en
Application granted granted Critical
Publication of CN100585608C publication Critical patent/CN100585608C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a safe processing method and system for data files. The invention comprises: creating a file folder and save the necessary data files into the file folder; creating indexing information of saving position of the data files in the file folder; and when operation on the data files saved in the file folder is required, contents of the data files in the file folder are read out in accordance with the indexing information. When using the method provided in the invention, a user can only read or write to the files, while can not copy or rename the files. So the files can not be freely copied and spread, which protects benefits of the contents provider.

Description

A kind of security processing of data file and system
Technical field
The present invention relates to the data security field, particularly a kind of security processing of data file and system.
Background technology
Under the existing file system architecture, because file is visible to the user, the user can make amendment, copy file, so file can be replicated and propagate arbitrarily, even distorts.After the content provider can't guarantee that file arrives the user, the state of file was the state that is limited to use, and also just can not guarantee safety of files.
Prior art reaches purpose of safety by the user mode of restriction file, for example adopt DRM (Digital Rights Management, digital copyright management) technology, DRM adopts encryption technology to embed enciphered message in data file, and the user only could use file data after obtaining clear crytpographic key.And digital watermark technology is by at the inner embed watermark information of data, utilizes watermark information to prove the source of data, and plays the purpose of restriction file use by watermark information.
No matter but be DRM technology or digital watermark technology, the two common deficiency is: even the two has realized the restriction of file is used, but because file is still visible concerning the user, though the user can't not use because of there being password, but the user still can make amendment, duplicate file, and then crack, thereby cause safety of files to can not get ensureing.
Summary of the invention
The embodiment of the invention provides a kind of security processing and system of file, and data file exists the safety problem that can be modified or duplicate in the prior art in order to solve.
The embodiment of the invention provides a kind of security processing of data file, comprises the steps:
Create file, the data file that need are stored is stored in the file;
Set up the index information of described data file memory location in file;
When the data file of storing in to described file when need is operated, according to index information read data files content from file.
The embodiment of the invention also provides a kind of safe processing system of data file, comprising: file storage module, document control module, file operation module, wherein:
File storage module is used to create file, and the data file that need are stored is stored in the file;
The document control module is used for setting up the index information of described data file in the file memory location;
The file operation module is used in the time need operating the data file that described file is stored, according to index information read data files content from file.
Embodiment of the invention beneficial effect is as follows:
At first create file in the embodiment of the invention, the file storage that will store is in file then; And set up the index information of file memory location in file; Like this, the file of storing in to file when need carries out as duplicating, during operation such as read-write, can only reading file content from file according to index information.Because the corresponding relation of index information recording document memory location in file, the user only knows its position, but can not see file itself, therefore the file in the file is sightless for the user, that is to say, though the user can read the operation of file content, can not duplicate file itself, operation such as modification; And when reading file, read the file content that needs read-write according to index information, present to the user this moment is content after file is read, but file itself still is not reproducible, modification for the user.
Description of drawings
Fig. 1 is the implementing procedure synoptic diagram of data file security processing described in the embodiment of the invention;
Fig. 2 is that data file, file, memory bank concern synoptic diagram described in the embodiment of the invention;
Fig. 3 is the structural representation of data file safe processing system described in the embodiment of the invention.
Embodiment
Below in conjunction with accompanying drawing the specific embodiment of the present invention is described.
Fig. 1 is the implementing procedure synoptic diagram of data file security processing, as shown in the figure, can comprise the steps: when the data file is carried out safe handling
Step 101, establishment file, the data file that need are stored is stored in the file;
In this step, the file of establishment is a virtual file, and it logically is present on the memory bank; Simultaneously, in order to improve the efficient of using concurrent visit, virtual file can also provide shares read-write more, that is, file can be created as can be for the Shared Folders of multi-user access, and the data file that will store is stored in the file then.
Step 102, set up the index information of described data file memory location in file;
Step 103, index information is encrypted;
Step 104, according to the storage space setting threshold of data file and file, and adjust the storage space that file takies according to threshold value;
Step 105, user operate the data file of storing in the file, operation can comprise duplicate, read-write etc.;
Step 106, the user is carried out authentication;
When the user carries out when operation such as duplicating, reading the data file in the file in request, can carry out authentication to contents such as user's rights of using, user identity, so that determine whether the user has legal identity, authority to carry out institute's requested operation.
Step 107, after subscription authentication is passed through, with the key that the user provides index information is deciphered;
After authentication is passed through, can also require the user that key is provided, when being numeral or letter symbol as key, the key that the user should require input digit or letter symbol to represent; After the user provides key, with this key index information is decrypted, if can correctly decipher, represent that then the user is authorized to the user that can operate the data file.
Step 108, when the key that provides as the user can be deciphered index information, according to index information read data files content from file.
Again the enforcement of each link is described below.
In the step 101, any data file all needs the storage to data.Fig. 2 is that data file, file, memory bank concern synoptic diagram, entity shown in the solid line represents it is that entity shown in physically the entity, dotted line represents it is in logic entity among the figure, as shown in the figure, data file leaves in the file virtual, in logic, file is in the memory bank of physics, and data file is read and write in file.Obviously, the file that is used for storing data files among the embodiment can be created in local disk, also can be created in network disk or be created in database.
In the enforcement, the storage of data file is to black box of user Lai Shuoshi, be sealing with opaque.Because when application layer writes data by writing interface with data file, can create virtual, file in logic and be used to deposit the data file of required storage.This file will occupy a space of memory bank, and this space is independently for other system, program, and the space that file occupies can not be used by other system or program.
In step 102, owing to there are a plurality of data files can be written in virtual, the file in logic, in order to find each data file and interior data content, just need in file, create and the index information of service data file, set up data file index information of memory location in file and be and be used for determining that different data files operates on it realizing in the position of file.
Concrete, when need be in file virtual, in logic during the position of locator data file, can be by searching index information, the position of locator data file in file then, thus again file is operated.
In step 104, according to expection of the data file in the file and/or the default storage space setting threshold that takies, and adjust the storage space that file takies on memory bank according to threshold value, purpose is to improve the utilization ratio of memory bank, also guarantee simultaneously the storage of data file in the file, specifically can be set in the storage space that takies on the memory bank flexibly, such as always determining the storage space that on memory bank, takies by 150% threshold value of data file storage space by the required actual size of anticipatory data file; Can also get by the storage space that the preset data file takies and decide file occupation space on memory bank, take 10G as default file, it is 80% space that the preset data file takies threshold value, i.e. 8G, when data file surpasses 8G, adjust file occupation space on memory bank.Yi Zhi depending on the circumstances or the needs of the situation, also can be used in combination the two.
Purpose is and can safeguards automatically storage space, when the file storage has surmounted the storage size of described threshold setting, generates the storage space of new file automatically, makes the storage of data file unaffected.
Simultaneously, the storage space of file also can be provided with according to the use needs to storage space, thereby guarantees that file virtual, in logic does not occupy the storage space on the memory bank, makes the user increase the free space to memory bank.For example, when memory bank is when having the hard disk of 100G storage space, the storage space of file can be provided with on hard disk, as be set to 20G, guarantee that like this file does not occupy the 100G storage space on hard disk at once, make the user increase the free space of all the other 80G on hard disk such as other program, system.
In the enforcement, the authentication of step 106 in 108 and deciphering are in order to guarantee the safety of index information, and authentication and deciphering may be used alone, can also be used in combination in concrete the enforcement, as required can parallel processing during use, also can decipher authentication more earlier.
Further, in order to strengthen the difficulty that index information is cracked, can also carry out hash to index information handles, obtain a hashed value after earlier index information being handled by hashing algorithm, then hashed value is stored, when needs use index information, then need to calculate earlier corresponding hashed value, only after the hashing algorithm coupling, could obtain concrete index position.The memory location of index information can also be disperseed storage, search concrete index information position,, further strengthen the difficulty that obtains index information because index information has carried out disperseing storage by setting up index.Hash is handled and is set up the mode of disperseing storage behind the concordance list, can distinguish and use separately to improve security, also can be used in combination so that security is more abundant with means such as encryption and decryption, authentications.
At first create file among the embodiment, the file storage that will store is in file then; And set up the index information of file memory location in file; When the user need carry out corresponding operating to this document, on user terminal, choose the icon of this document, after this terminal is finished authentication to the user, (encrypt by this document index information that stores as index information, also need the user that decruption key is provided), find this document in respective memory regions, and present to the user.Like this, the file of storing in to file when need carries out as duplicating, during operation such as read-write, can only reading file content from file according to index information.Because the corresponding relation of index information recording document memory location in file, the user only knows its position, but can not see file itself, therefore the file in the file is sightless for the user, that is to say, though the user can read the operation of file content, can not duplicate file itself, operation such as modification; And when reading file, read the file content that needs read-write according to index information, present to the user this moment is content after file is read, but file itself still is not reproducible, modification for the user.
The present invention also provides a kind of safe processing system of data file, describes below in conjunction with the embodiment of accompanying drawing to native system.
Fig. 3 is a data file safe processing system structural representation, as shown in the figure, comprises in the safe processing system: file storage module, document control module, file operation module, wherein:
File storage module is created file, and the data file that need are stored is stored in the file; The document control module is set up the index information of data file memory location in file;
When the data file of storing in to described file when need was operated, the file operation module was according to index information read data files content from file.
Wherein, the file operation module can comprise: file read-write interface, positioning unit, reading unit, file read-write interface are used for providing application layer to read and write the interface of the data file that described file stores;
Positioning unit is according to index information specified data file; Reading unit reads positioning unit established data file content, and offers application layer by the file read-write interface.
Safe processing system is prevented and treated the purpose of duplicating, revising by making internal file to invisible the reaching of user.File storage module is created file in memory bank, and storing data files therein.Any file system all needs the storage to data.Storage folder can be local disk, also can be network disk, or database etc.
The storage of data file is to black box of user Lai Shuoshi in the security system, be sealing with opaque.When application layer by read-write interface when file system writes data, file storage module can be created virtual a, file in logic, the space that file occupies can not be used by other system or program.
In the enforcement, security system can also comprise the file maintenance module, is used for the storage space setting threshold according to data file and file, and adjusts the storage space that file takies according to threshold value.Purpose is to improve the utilization ratio of memory bank, also guarantees the storage of data file in the file simultaneously.
The document control module can provide the control to the data file of storage.When application layer was operated the data file by the file read-write interface, reading unit read the content of data file.
Because having a plurality of data files is written in the file, in order to find specific file and interior data, the document control module needs the index information of establishment hereof and maintenance documentation.
When the position that needs the locator data file in file, positioning unit is by searching index information, the position of locator data file in file, thus make document reading unit to read to this content data file.
File storage module can be shared read-write for file provides in the enforcement, in order to improve the efficient of using concurrent visit more.
Further, safe processing system can increase encryption and decryption module, authentication module, hash processing module, list block one of them or its combination in the enforcement, makes the user can only use specific client by the file system read-write interface file to be operated.Further improve security.
The encryption and decryption module is used for setting up described data file behind the index information of file memory location index information being encrypted; When the data file of storing in to described file as the user was operated, the key that provides with the user was decrypted index information; Index information read data files content from file that the file operation module goes out according to described encryption and decryption module decrypts.
Authentication module is used for when the data file that the user stores described file is operated the user being carried out authentication; The file operation module is passed through the back according to index information read data files content from file in described authentication module authentication.
The hash processing module is used for index information handled by hashing algorithm obtaining hashed value, and when the data file of storing in to described file as the user was operated, the hashing algorithm that provides with the user reverted to index information with hashed value; Described file operation module is further used for index information read data files content from file of recovering according to described hash processing module;
List block is used to set up the index of index information, and index information is disperseed storage, when the data file of storing in to described file as the user is operated, obtains index information according to index; Described file operation module is further used for index information read data files content from file of obtaining according to described list block.
By above-mentioned enforcement as can be seen, the existing file system, file is visible to the user, the user can make amendment to file, copy, so file can be replicated and propagate arbitrarily, even distort.The content provider can't guarantee that file reaches in user's hand and be limited to use.In order to improve the safety-type of data file, prevent that data file is replicated, revises, the embodiment of the invention is that sightless scheme realizes by making internal file to the user, and the user can only use specific client by the file system read-write interface data file content to be operated.The user can only read the data file content, can't copy and distort file itself, thereby make data file to be duplicated arbitrarily and to propagate, and has guaranteed content data file supplier's interests.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, if of the present invention these are revised and modification belongs within the scope of claim of the present invention and equivalent technologies thereof, then the present invention also is intended to comprise these changes and modification interior.

Claims (10)

1. the security processing of a data file is characterized in that, comprises the steps:
Create file, the data file that need are stored is stored in the file;
Set up the index information of described data file memory location in file;
When the data file of storing in to described file when need is operated, according to index information read data files content from file.
2. security processing as claimed in claim 1 is characterized in that, described establishment file is stored in step in the file with the data file of need storages, is specially:
Creating file is can be for the Shared Folders of multi-user access, and the data file that need are stored is stored in the file.
3. security processing as claimed in claim 1 is characterized in that, further comprises the steps:
Expect and/or the default storage space setting threshold that takies according to the data file in the described file, and adjust the storage space that file takies on memory bank according to threshold value.
4. as claim 1 or 2 or 3 described security processings, it is characterized in that, set up the index information of described data file memory location in file after, one of further comprise the steps or its combination:
Index information is encrypted, when the data file of storing in to described file as the user is operated, under the situation of key that can enough users provides, according to index information read data files content from file to the index information deciphering;
Index information is carried out the hash processing by hashing algorithm obtain hashed value, when the data file of storing in to described file as the user is operated, the hashing algorithm that provides the enough users of energy reverts to hashed value under the situation of index information, according to index information read data files content from file;
Set up the index of index information, index information is disperseed storage, when the data file of storing in to described file as the user is operated, obtain behind the index information read data files content from file according to index.
5. as claim 1 or 2 or 3 described security processings, it is characterized in that, when the data file of storing in the user needs described file is operated, further comprise the steps:
The user is carried out authentication;
After subscription authentication is passed through, according to index information read data files content from file.
6. the safe processing system of a data file is characterized in that, comprising: file storage module, document control module, file operation module, wherein:
File storage module is used to create file, and the data file that need are stored is stored in the file;
The document control module is used for setting up the index information of described data file in the file memory location;
The file operation module is used in the time need operating the data file that described file is stored, according to index information read data files content from file.
7. safe processing system as claimed in claim 6 is characterized in that, described file operation module comprises: file read-write interface, positioning unit, reading unit, wherein:
The file read-write interface is used for providing application layer to read the interface of the data file that described file stores;
Positioning unit is used for according to index information specified data file;
Reading unit is used to read described positioning unit established data file content, and offers application layer by described file read-write interface.
8. as claim 6 or 7 described safe processing systems, it is characterized in that, further comprise encryption and decryption module, hash processing module, list block one of them or its combination, wherein:
The encryption and decryption module is used for setting up described data file behind the index information of file memory location index information being encrypted; When the data file of storing in to described file as the user was operated, the key that provides with the user was decrypted index information; Described file operation module is further used for index information read data files content from file of going out according to described encryption and decryption module decrypts;
The hash processing module is used for index information handled by hashing algorithm obtaining hashed value, and when the data file of storing in to described file as the user was operated, the hashing algorithm that provides with the user reverted to index information with hashed value; Described file operation module is further used for index information read data files content from file of recovering according to described hash processing module;
List block is used to set up the index of index information, and index information is disperseed storage, when the data file of storing in to described file as the user is operated, obtains index information according to index; Described file operation module is further used for index information read data files content from file of obtaining according to described list block.
9. as claim 6 or 7 described safe processing systems, it is characterized in that, further comprise authentication module, be used for when the data file that the user stores described file is operated, the user being carried out authentication;
Described file operation module is further used for passing through the back according to index information read data files content from file in described authentication module authentication.
10. safe processing system as claimed in claim 6 is characterized in that, further comprises the file maintenance module, is used for the storage space setting threshold according to data file and file, and adjusts the storage space that file takies according to threshold value.
CN 200710122431 2007-09-25 2007-09-25 Data file safe treatment method and system Expired - Fee Related CN100585608C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200710122431 CN100585608C (en) 2007-09-25 2007-09-25 Data file safe treatment method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200710122431 CN100585608C (en) 2007-09-25 2007-09-25 Data file safe treatment method and system

Publications (2)

Publication Number Publication Date
CN101122938A true CN101122938A (en) 2008-02-13
CN100585608C CN100585608C (en) 2010-01-27

Family

ID=39085271

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200710122431 Expired - Fee Related CN100585608C (en) 2007-09-25 2007-09-25 Data file safe treatment method and system

Country Status (1)

Country Link
CN (1) CN100585608C (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236755A (en) * 2011-05-04 2011-11-09 山东超越数控电子有限公司 One-machine multi-user security access control method
CN102651036A (en) * 2012-04-14 2012-08-29 沈阳通用软件有限公司 Universal and reliable file coping operation identifying method
CN101674301B (en) * 2009-05-31 2012-09-05 飞天诚信科技股份有限公司 Method for storing certificate
CN103118135A (en) * 2013-02-28 2013-05-22 中国地质大学(武汉) Method and system for protecting user data privacy in cloud computing
CN103177026A (en) * 2011-12-23 2013-06-26 北京新媒传信科技有限公司 Data management method and data management system
CN103607418A (en) * 2013-07-25 2014-02-26 上海和辰信息技术有限公司 Large-scale data partitioning system and partitioning method based on cloud service data characteristics
CN106295262A (en) * 2015-05-18 2017-01-04 腾讯科技(深圳)有限公司 The processing method of a kind of executable file, device and system
CN106656496A (en) * 2017-02-22 2017-05-10 郑州云海信息技术有限公司 Data encryption method and apparatus
CN108199834A (en) * 2018-01-16 2018-06-22 飞天诚信科技股份有限公司 A kind of method and device of intelligent cipher key equipment work
CN108566397A (en) * 2018-04-19 2018-09-21 国网黑龙江省电力有限公司电力科学研究院 Data-oriented restores the special remote data transmission system and transmission method of business
CN110889125A (en) * 2019-11-15 2020-03-17 珠海豹趣科技有限公司 File protection method and device and electronic equipment
CN111061683A (en) * 2019-12-30 2020-04-24 成都定为电子技术有限公司 Method and device for storing and operating data stream at high speed
CN113283560A (en) * 2021-07-23 2021-08-20 成都先进功率半导体股份有限公司 Automatic reel replacement scanning comparison system and method

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101674301B (en) * 2009-05-31 2012-09-05 飞天诚信科技股份有限公司 Method for storing certificate
CN102236755A (en) * 2011-05-04 2011-11-09 山东超越数控电子有限公司 One-machine multi-user security access control method
CN103177026A (en) * 2011-12-23 2013-06-26 北京新媒传信科技有限公司 Data management method and data management system
CN102651036A (en) * 2012-04-14 2012-08-29 沈阳通用软件有限公司 Universal and reliable file coping operation identifying method
CN102651036B (en) * 2012-04-14 2013-11-06 沈阳通用软件有限公司 Universal and reliable file coping operation identifying method
CN103118135A (en) * 2013-02-28 2013-05-22 中国地质大学(武汉) Method and system for protecting user data privacy in cloud computing
CN103607418A (en) * 2013-07-25 2014-02-26 上海和辰信息技术有限公司 Large-scale data partitioning system and partitioning method based on cloud service data characteristics
CN103607418B (en) * 2013-07-25 2016-12-28 上海和辰信息技术有限公司 Large-scale data segmenting system based on cloud service data characteristics and dividing method
CN106295262A (en) * 2015-05-18 2017-01-04 腾讯科技(深圳)有限公司 The processing method of a kind of executable file, device and system
CN106295262B (en) * 2015-05-18 2021-08-03 腾讯科技(深圳)有限公司 Method, device and system for processing executable file
CN106656496A (en) * 2017-02-22 2017-05-10 郑州云海信息技术有限公司 Data encryption method and apparatus
CN108199834A (en) * 2018-01-16 2018-06-22 飞天诚信科技股份有限公司 A kind of method and device of intelligent cipher key equipment work
CN108566397A (en) * 2018-04-19 2018-09-21 国网黑龙江省电力有限公司电力科学研究院 Data-oriented restores the special remote data transmission system and transmission method of business
CN108566397B (en) * 2018-04-19 2020-12-01 国网黑龙江省电力有限公司电力科学研究院 Special remote data transmission system and transmission method for data recovery service
CN110889125A (en) * 2019-11-15 2020-03-17 珠海豹趣科技有限公司 File protection method and device and electronic equipment
CN110889125B (en) * 2019-11-15 2024-01-23 珠海豹趣科技有限公司 File protection method and device and electronic equipment
CN111061683A (en) * 2019-12-30 2020-04-24 成都定为电子技术有限公司 Method and device for storing and operating data stream at high speed
CN111061683B (en) * 2019-12-30 2023-03-21 成都定为电子技术有限公司 Method and device for storing and operating data stream at high speed
CN113283560A (en) * 2021-07-23 2021-08-20 成都先进功率半导体股份有限公司 Automatic reel replacement scanning comparison system and method

Also Published As

Publication number Publication date
CN100585608C (en) 2010-01-27

Similar Documents

Publication Publication Date Title
CN100585608C (en) Data file safe treatment method and system
CN102882923B (en) Secure storage system and method for mobile terminal
CN101853363B (en) File protection method and system
CN101729550B (en) Digital content safeguard system based on transparent encryption and decryption, and encryption and decryption method thereof
CN110784463B (en) File storage and access method based on block chain
US8200931B2 (en) Memory card with embedded identifier
CN104160407B (en) Using storage control EBI guaranteeing the data transmission security between storage device and main frame
CN103530570A (en) Electronic document safety management system and method
CN101233525A (en) Data processing device
CN101847184A (en) Method for encrypting files by adopting encryption sandbox
CN103581196A (en) Distributed file transparent encryption method and transparent decryption method
CN201682524U (en) Document transfer authority control system based on document filtering driver
CN103955654A (en) USB (Universal Serial Bus) flash disk secure storage method based on virtual file system
CN104361291B (en) Data processing method and device
CN105740725A (en) File protection method and system
CN107508801A (en) A kind of file tamper-proof method and device
CN104484628B (en) It is a kind of that there is the multi-application smart card of encrypting and decrypting
KR20210078437A (en) System, apparatus, and method for secure deduplication
CN104778954A (en) Optical disc partition encryption method and system
CN100452076C (en) Method for constructing transparent coding environment
US9076007B2 (en) Portable data support with watermark function
CN101604296A (en) Disk-data sector-level encryption method
CN101901320A (en) Data leakage prevention method for electronic book reader
CN210691364U (en) Encrypted USB flash disk
AU2008344947B2 (en) System and method for securely storing information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100127

Termination date: 20190925