Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Anti-copy delete encrypted USB disk

2025-04-06 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Using Tsinghua Tongfang TF32A09 security chip, as a fully state-owned intellectual property chip, this chip has passed the security certification of the State password Bureau, meets the relevant national technical requirements, and fully meets the product requirements of the government and the army.

The chip not only has rich interfaces, but also has two USB-OTG interfaces. This technology is pioneered by Tongfang and provides a more flexible platform for the application of the chip. The key is stored in the chip, and the password authentication is also carried out in the chip, which has a strong anti-cracking ability. With the integration of multiple communication interfaces and multiple information security algorithms (SM1, SM2, SM3, SM4, 3DES, RSA, etc.), a highly integrated single chip solution can be realized.

2) functional modularization not only provides customers with development tools for encrypted U disk, mature API interface, and a large number of functional Demo programs, but also modularizes many common functions of encrypted U disk to form different function packages. Users can choose function packages according to their needs and combine them into their own products. This way can help users save a lot of research and development and testing time, quickly form products and occupy the market. 3) there are two main factors that affect the read and write speed of encrypted U disk: the read and write speed of storage and the encryption and decryption speed of encryption chip. The encryption and decryption speed of TF32A09 chip ≥ 25MB/s is much higher than the current storage speed, which will not affect the performance of the whole scheme. 4) A variety of schemes can be selected to use a special encrypted U disk with a special anti-disclosure program to realize the comprehensive protection of the issued documents by the combination of software and hardware. The anti-disclosure program is built into the encrypted U disk in the form of burning, and the program itself cannot be tampered with. To access the data in the encrypted U disk, the password must be verified by the anti-disclosure program. At the same time, it automatically starts the protection function to prevent documents from being leaked by printing, copying, saving, screenshot, mail, networking, memory theft and so on. Under the diagram of a typical scenario:

Features:

1. Plug and play 2. Using standard USB2.0 interface, there is no hardware compatibility problem. 3. When opening the flash drive, enter the authentication password to protect the security of the flash drive 4. It has ways to prevent leakage of secrets, such as printing, copying, saving, screenshot, mail, networking, memory theft and so on. 5. Prevent files from being deleted at will.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report