[go: up one dir, main page]

WO2024204940A1 - Procédé et appareil de reconnaissance de disque de sécurité pour empêcher un piratage de disque - Google Patents

Procédé et appareil de reconnaissance de disque de sécurité pour empêcher un piratage de disque Download PDF

Info

Publication number
WO2024204940A1
WO2024204940A1 PCT/KR2023/017461 KR2023017461W WO2024204940A1 WO 2024204940 A1 WO2024204940 A1 WO 2024204940A1 KR 2023017461 W KR2023017461 W KR 2023017461W WO 2024204940 A1 WO2024204940 A1 WO 2024204940A1
Authority
WO
WIPO (PCT)
Prior art keywords
disk
connection
storage device
mcu
wireless communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
PCT/KR2023/017461
Other languages
English (en)
Korean (ko)
Inventor
윤동구
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of WO2024204940A1 publication Critical patent/WO2024204940A1/fr
Anticipated expiration legal-status Critical
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/0482Interaction with lists of selectable items, e.g. menus
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range

Definitions

  • the present invention relates to a method and device for determining a secure disk for determining whether an embedded storage device connected to a disk security connection/blocking control device when booting a computer is a storage device directly connected to the motherboard of the computer or a storage device connected via the disk security connection/blocking control device, and to creating a virtual disk for making the secure disk appear as if it is exposed even when it is blocked.
  • the present invention relates to determining, when a portable storage device connected to a disk security connection/blocking control device is connected to a USB port and recognized as a storage device by an operating system after the computer has completed booting, whether it is a secure disk storage device connected to the disk security connection/blocking control device or a general storage device directly connected to the USB port.
  • the present invention relates to a method for protecting disk data of a storage device by maintaining a blocked state when the built-in or external storage device connected to a computer is in a disk standby state when not in use through a disk security connection/blocking control device, thereby causing the operating system to make the disk volume of the storage device disappear, thereby protecting the disk from hacking attempts made through a network, and when an attempt to access the storage device through a network is detected in conjunction with network intrusion detection software when the storage device is in use, immediately switching the interface signal of the storage device to a blocked state.
  • the device driver for a disk security connection/blocking control device reads disk attribute information from a physical disk of the storage device when the recognized storage device is determined to be a secure disk connected through the disk security connection/blocking control device, creates a virtual disk having the same explorer tree as the physical disk, and assigns the same disk volume label as the physical disk, and causes the volume label of the physical disk recognized as a secure disk or the virtual disk corresponding thereto to be directly reflected in the volume label provided on the smartphone app side through the disk security connection/blocking control device.
  • Patent application No. 110-2018-0116083 (filing date: September 28, 2018) filed by the applicant of the present invention relates to “Data storage means control device and method having a data protection function through wireless communication with a smartphone” and has the configuration illustrated in the attached drawing 1.
  • FIG. 1 is a block diagram (50) of an SSD doubler having a connector section for a main data bus in which a bus switch is controlled by a wireless communication section according to a conventional invention, characterized in that the main data bus between the first connector section (11) and the control section (21) is connected or blocked by controlling the bus switch (19).
  • the wireless communication unit (51) is connected to the user's smartphone (not shown) via wireless communication such as a Bluetooth or Wifi interface, and is connected to the ON/OFF control pin of the bus switch (19) connected to any output pin of the wireless communication unit (51) according to a control signal transmitted from the user's smartphone (not shown).
  • wireless communication such as a Bluetooth or Wifi interface
  • first connector section (11) and the control section (21) are connected to the main data bus or if a bus switch (23) is provided between the control section (21) and the first storage media (41) and the second storage media (43), access control to the first storage media (41) and the second storage media (43) is performed by the bus switch ON/OFF output signal of the wireless communication section (51).
  • the effect of connecting or blocking the main data bus can be replaced by turning ON/OFF a specific power source (33) supplied separately for each configuration block to be applied to the first storage media (41), the second storage media (43) or the control unit (21).
  • a computer system is equipped with various storage devices with interfaces, including storage devices with an operating system installed, connected internally and externally.
  • USB interface-based external storage devices including USB memory, which are widely used as portable storage devices, are recognized as removable disk devices as soon as they are connected to a USB port after the computer boots up.
  • the present invention proposes a method for recognizing a storage device as a secure disk, which has the characteristic of causing an operating system to recognize a storage device as a disk device during the computer booting process prior to performing connection/blocking control, creating a virtual disk, and linking network intrusion detection software for a storage device connected to various types of disk security connection/blocking control devices during the computer system booting process, and then performing an operation of connecting or blocking an interface signal to the storage device connected to the disk security connection/blocking control device even after the booting is completed, thereby causing the operating system to recognize the storage device as a disk device or make it disappear.
  • a storage device connection port for connecting to a portable storage device and a low-speed USB interface signal; a low-speed USB connection/disconnection means connected to the storage device connection port and the low-speed USB interface signal; an MCU (Micro Controller Unit) or a wireless communication unit having a built-in MCU connected to the low-speed USB connection/disconnection means and performing connection or disconnection control for the low-speed USB connection/disconnection means; a power ON/OFF driving unit supplying power to or cutting off power to the storage device connection port according to the control of the MCU or the wireless communication unit having a built-in MCU; and a printed circuit board on which various components constituting the functional blocks are mounted; is formed to enable the low-speed USB connection/disconnection means to be connected or cut off according to the control of the MCU or the wireless communication unit having a built-in MCU.
  • MCU Micro Controller Unit
  • a wireless communication unit having a built-in MCU connected to the low-speed USB connection/disconnection means and performing connection or dis
  • the external security USB dongle which is connected between a user's smartphone and a computer by wireless communication and operates in a manner according to low-speed and/or high-speed USB interface control, and the main components constituting the same are built into the computer motherboard, including a storage device connection port for connecting a portable storage device with a low-speed USB interface signal; a low-speed USB connection/disconnection means connected to the storage device connection port with a low-speed USB interface signal; an MCU (Micro Controller Unit) or a wireless communication unit having an MCU built in that is connected to the low-speed USB connection/disconnection means and performs connection or disconnection control for the low-speed USB connection/disconnection means; a power ON/OFF driving unit that supplies or disconnects power to the storage device connection port according to the control of the MCU or the wireless communication unit having an MCU built in; and a printed circuit board on which various components constituting the functional blocks are mounted; thereby forming a motherboard or disk security connection/disconnection control board, so that the low-
  • the present invention relates to an external security USB dongle which operates in a manner based on low-speed USB interface control rather than through wireless communication between a user's smartphone and a computer, comprising: a storage device connection port for connecting to a portable storage device with a low-speed USB interface signal; a low-speed USB connection/disconnection means connected to the storage device connection port with a low-speed USB interface signal; a computer-side connection port connected to the low-speed USB connection/disconnection means and used to connect with the low-speed USB interface signal; an MCU (Micro Controller Unit) which is connected to the low-speed USB connection/disconnection means and performs connection or disconnection control for the low-speed USB connection/disconnection means; a power ON/OFF driving unit which supplies or cuts off power input through the computer-side connection port to the storage device connection port according to the control of the MCU;
  • a disk security connection/disconnection control board is formed by a printed circuit board that mounts various components constituting the above-mentioned functional blocks, so
  • a user interface such as a menu configuration and arrangement, interconnection, etc. of a smartphone app corresponding to a mobile application for disk hacking prevention and disk management, and wirelessly interconnected with at least one or more disk security connection/blocking control devices having an MCU having a built-in wireless communication unit or a wireless communication unit having an MCU built-in, and a smartphone app installed on a user's smartphone;
  • the smartphone app has a device tab that is sequentially arranged in response to the corresponding device whenever the disk security connection/blocking control device is detected by wireless communication; a disk button that is created when the device tab is activated and disappears when it is deactivated;
  • This is a smartphone app characterized in that when the disk button is switched to a connected state by a user, the connected state is displayed and a value corresponding to the connected state of the disk button is transmitted to a disk security connection/blocking control device that has established a connection relationship with a device tab corresponding to the disk button via wireless communication, and when the disk button is switched to
  • the storage device connected to the disk security connection/blocking control device of the present invention is determined to be a secure disk or a general storage device directly connected to the motherboard of the computer. If the storage device is recognized as a connected storage device through the disk security connection/blocking control device, the storage device is regarded as a secure disk, and connection/blocking control is performed only on the user's smartphone through a smartphone app installed on the user's smartphone.
  • disk property information is read for the secure disk in the physical disk unit to create a virtual disk that configures the same explorer tree as the physical disk, but data stored on the physical disk can be accessed only when the disk security connection/blocking control device is connected.
  • the state is immediately switched to a blocking state to prevent data on the secure disk from being leaked through the network, thereby providing a disk data hacking prevention environment.
  • FIG. 1 is a block diagram of an SSD doubler having a connector section for one main interface in which a bus switch is controlled by a wireless communication section according to a prior art invention.
  • FIG. 2 is a disk security connection/blocking control device for desktop PC users of a PCIe Add-in card type equipped with a wireless communication unit according to a conventional invention.
  • FIG. 3 is a flow chart illustrating the secure disk recognition method of the present invention, connection with a device driver through an API (Application Programming Interface) with network intrusion detection software, and linkage operation with a disk security connection/blocking control device.
  • API Application Programming Interface
  • FIG. 4 is a user interface means for a disk security connection/blocking control device consisting of a main menu window, a security status display logo, and an access registration auxiliary menu window as a smartphone app of the present invention.
  • FIG. 5 is a user interface means consisting of a series of additional auxiliary menu windows applied to the smartphone app of FIG. 5 of the present invention, including recognition settings, volume label designation, color settings, timer settings, and other settings.
  • FIG. 6 is a block diagram of a security USB dongle and an internal circuit of the security USB dongle for enabling a USB storage device used in a notebook PC or desktop PC according to the present invention to be used as a security disk.
  • FIG. 8 is a disk security connection/blocking control device having a PCIe-USB bus converter and a bus conversion control unit of a PCIe Add-in card type for desktop PC users according to the present invention.
  • FIG. 9 is a disk security connection/blocking control device having a built-in PCIe-SATA bus conversion control unit of a PCIe Add-in card type for desktop PC users according to the present invention.
  • FIG. 10 is an exemplary embodiment for explaining a secure disk detection method of the present invention, and is a user-configurable SSD external view in which four SSD Bays are provided in the PCIe Add-in card itself based on the disk security connection/blocking control device of FIG. 9 so that the user can arbitrarily mount and use an SSD.
  • FIG. 11 is an exploded view of a smartphone-independent security USB dongle for excluding an environment in which the security USB dongle of FIG. 6 according to the present invention must be used by being connected to a user's smartphone based on wireless communication.
  • FIG. 2 is a disk security connection/blocking control device (60) for a desktop PC (not shown) user of a PCIe Add-in card type equipped with a wireless communication unit (62) according to a conventional invention, which is connected to a SATA connector (67), which is one port of a built-in storage device (not shown) such as a 3.5-inch hard disk drive (HDD) or a 2.5-inch SSD, excluding a storage device on which an operating system is installed, through a separate SATA cable (not shown), and a SATA connector (66), which is the other port connected to a motherboard, is connected to each of the built-in storage device and a SATA connector (not shown) equipped on the motherboard through separate SATA cables (not shown).
  • a SATA connector 67
  • a built-in storage device such as a 3.5-inch hard disk drive (HDD) or a 2.5-inch SSD, excluding a storage device on which an operating system is installed
  • the SATA connector (67) of the built-in storage device connection port and the SATA connector (66) of the motherboard-side connection port are connected through a bus switch (61), and the bus switch (61) is connected to an output pin provided in the wireless communication unit (62).
  • the wireless communication unit (62) has an MCU (Micro Controller Unit) built in internally or has a wireless communication block built into the MCU, and is connected to the wireless communication unit (62) using an antenna (63) protruding outside of a PCIe Bracket (64) equipped on a disk security connection/blocking control device (60) of the PCIe Add-in card type and a separate wire harness for antenna connection.
  • MCU Micro Controller Unit
  • the wireless communication unit (62) has an MCU (Micro Controller Unit) built in internally or has a wireless communication block built into the MCU, and is connected to the wireless communication unit (62) using an antenna (63) protruding outside of a PCIe Bracket (64) equipped on a disk security connection/blocking control device (60) of the PCIe Add-in card type and a separate wire harness for antenna connection.
  • MCU Micro Controller Unit
  • the wireless communication unit (62) equipped in the disk security connection/blocking control device (60) is connected by wireless communication such as Bluetooth or WiFi provided by the user's smartphone (124), and ON/OFF control of the bus switch (61) is performed according to the user's control using a disk connection/blocking control means such as a disk button (74-1) equipped in a smartphone app (70) installed on the smartphone.
  • a disk connection/blocking control means such as a disk button (74-1) equipped in a smartphone app (70) installed on the smartphone.
  • the antenna (63) protruding outward can be connected to the user's smartphone (124) via a communication method such as WiFi or Bluetooth, but due to the characteristics of the disk security connection/blocking control device (60), a connection method using Bluetooth communication, which reflects a standard that not only differs from a computer connected to the same network equipment for security purposes but also automatically switches to a blocking state when the user moves away from it by a certain distance, is more preferable.
  • a disk security connection/blocking control device (60) installed in a desktop PC (not shown) is installed by inserting the PCIe Edge-Finger portion (65) into one of the arbitrary PCIe Slots provided on the motherboard of the desktop PC while the antenna is vertically raised with respect to the PCIe Bracket surface, and fixing the fixing groove (not shown) provided on the top of the PCIe Bracket to the desktop PC using a separate fixing bolt (not shown).
  • FIG. 3 is a flow chart illustrating a method related to disk security by means of a connection operation between a device driver and network intrusion detection software or disk multi-access monitoring software and a disk security connection/blocking control device, in which a storage device connected to the disk security connection/blocking control device (60) of FIG. 2 according to the above-described conventional invention is recognized as a secure disk, and a disk security connection/blocking control device is connected by means of a connection operation operation for retrieving attribute information on a physical disk to determine whether a virtual disk is created.
  • the operation of each step of the flow chart illustrated in FIG. 3 is as follows.
  • a desktop PC having a disk security connection/blocking control device (60) of the prior art according to FIG. 2 installed is turned on (S1, S3)
  • a ROM BIOS (not shown) on a motherboard equipped with the desktop PC performs a Plug-And-Play (PNP or P&P) operation while searching for various devices connected to the motherboard (Device ID, Vender ID) (S5) and simultaneously allocates resources (I/O Map Address, Memory Map Address, Interrupt, etc.) to the searched devices, and uploads an operating system from a boot disk detected in this process to a RAM memory module equipped on the motherboard (S7).
  • PNP or P&P Plug-And-Play
  • the disk security connection/blocking control device (60) of the conventional invention maintains the bus switch (61) in a connected state for a preset period of time (S6) according to the firmware program control of the MCU (in some cases, the MCU may be provided with a wireless communication unit) provided inside the wireless communication unit (62) for recognizing the secure disk of the present invention, and accordingly, the built-in storage device (not shown) connected to the SATA connector (67) corresponding to the storage device-side connection port of the disk security connection/blocking control device (60) is searched during the Plug-And-Play operation and the search operation for the peripheral device by the ROM BIOS through the connection relationship by the SATA connector (66) corresponding to the motherboard-side connection port via the bus switch (61). (S5)
  • the wireless communication unit (62) equipped on the above disk security connection/blocking control device (60) switches the bus switch (61) from being connected for a certain period of time to being blocked for a sufficient period of time until the progress of Step 8 (S8) is completed so that the storage device connected to the above disk security connection/blocking control device (60) is recognized as a disk device by the operating system. (S9)
  • the network is activated during the booting operation of the desktop PC, so that the bus switch (61) needs to be blocked before the storage device connected to the disk security connection/blocking control device (60) is exposed to the network.
  • the bus switch (61) needs to be blocked before the storage device connected to the disk security connection/blocking control device (60) is exposed to the network.
  • This will be described later in the auxiliary menu window (80) of the recognition setting 1 related to the built-in storage device of FIG. 5.
  • the bus switch (61) that was already blocked in Step S9 is switched back to the connected state (S13) so that the storage device corresponding to the physical disk (not shown) connected to the disk security connection/blocking control device (60) is detected again by the operating system, and then the activated device driver reads the disk attribute information that can configure an explorer window tree for the physical disk and the disk volume label information for the physical disk and creates a virtual disk based on this (S15).
  • the device driver does not immediately switch to a physical disk, but, for example, passes through the signal flow (USB connector (95) ⁇ bidirectional MUX/DEMUX (96) ⁇ low-speed USB signal converter (103) ⁇ wireless communication unit (105)) in the block diagram (93) of the internal circuit of the security USB dongle of FIG.
  • the step of creating a virtual disk after the storage device connected to the disk security connection/blocking control device (60) is recognized as a secure disk is described in detail about creating a virtual disk corresponding to the physical disk of the storage device in Step 15 (S15) between Step 13 (S13) and Step 17 (S17).
  • this is not a mandatory aspect of the present invention, and it is explained that a virtual disk can be created for the convenience of the user as needed.
  • Step 13 (S13) it may be a trigger to suggest to a hacker who has intruded through the network that there may be a physical disk linked to the virtual disk, and therefore, from the perspective of security, it may be desirable not to go through the steps from Step 13 (S13) to Step 17 (S17).
  • a virtual disk when a virtual disk is created by the device driver or a user switches the disk button (74-1) to a connected state for disk access to a storage device connected to a disk security connection/blocking control device (60), and this state switching value is transmitted to an MCU provided within a wireless communication unit (62) provided in the disk security connection/blocking control device (60), and while the bus switch (61) connected to the MCU is maintained in a connected state, the storage device is exposed to the network as it is, and there is a possibility that data may be leaked to a hacker who has intruded through the network.
  • the present invention installs network intrusion detection software (or, EDR software; Endpoint Detection and Response software) that resides and operates in the kernel of an operating system, and then connects with the device driver through an API (Application Programming Interface) (S21) to detect whether an unauthorized access attempt has occurred to a storage device (i.e., a secure disk) connected to the disk security connection/blocking control device (60).
  • network intrusion detection software or, EDR software; Endpoint Detection and Response software
  • S21 Application Programming Interface
  • disk multi-access monitoring software may be used instead of the above network detection software and API.
  • Disk multi-access monitoring software is a software that is stored in advance in a storage device on which an operating system is installed, such as a Trojan horse or ransomware, without the user's knowledge, by means such as an e-mail attachment, and then is started at any time so that the user can access the storage device while the secure disk, which is a storage device connected to the disk security connection/blocking control device (60) of the present invention, is switched to a connected state to the PC, and the storage device is being accessed. If the disk multi-access monitoring software determines that multiple access has occurred.
  • an operating system such as a Trojan horse or ransomware
  • disk multi-access monitoring software When disk multi-access monitoring software is used, it can be connected to the device driver via API, just like when using network intrusion detection software, depending on how the program is processed, or it can be configured only with the device driver by integrating the disk multi-access monitoring function into the device driver itself, thereby excluding the connection via a separate API.
  • the bus switch (61) of the disk security connection/blocking control device (60) is maintained in a connected state so that the user can perform disk access operations to the secure disk with confidence. If an unauthorized access attempt occurs or it is detected that the range of allowable multiple access allowed in advance by the user has been exceeded, the volume label of the secure disk is transmitted to the smartphone app (70) installed on the smartphone (124) through the API ⁇ device driver ⁇ disk security connection/blocking control device (60) and the wireless communication unit (62) provided therein.
  • the bus switch (61) of the disk security connection/blocking control device (60) is to be set to a blocking state or a connecting state depending on whether the user has exceeded the range of allowable multiple accesses set in advance through a smartphone app.
  • the bus switch (61) of the disk security connection/blocking control device (60) is to be set to a blocking state or a connecting state depending on whether the user has exceeded the range of allowable multiple accesses set in advance through a smartphone app.
  • multi-access monitoring software monitors multiple accesses to the secure disk and detects information such as whether an explorer window is opened, whether the opened explorer window is activated, and whether the mouse is located within the explorer window's area range. If it determines that the access is normal by the user, it allows multiple accesses to be made and maintains the connection.
  • the detection result of the disk multiple access monitoring software for the security disk is determined to be a single access, the result is transmitted to the MCU with the built-in wireless communication unit or the wireless communication unit (105) with the MCU built-in by the device driver to maintain the connected state of the disk security connection/blocking means (90, 125, 130) as it is, and if it is determined that multiple accesses have occurred, the result is transmitted to the MCU with the built-in wireless communication unit or the wireless communication unit (105) with the MCU built-in by the device driver to change the connected state of the disk security connection/blocking means (90, 125, 130) to a blocked state. (S25)
  • the security disk app (70) of the smartphone (124) receives the results of intrusion detection and blocking/connection operations for the security disk from the network intrusion detection software or the disk multi-access monitoring software, and if it detects that the security disk has been stored in a random storage device without the user's prior knowledge and then started at any time to attempt multi-access to the security disk, it changes the background color of the disk button (74-1) or the corresponding device tab (73-1) to a color indicating a warning by referring to the volume label corresponding to the security disk, and displays a warning phrase in text or displays it on the security status display logo (71), and at the same time, displays the blocking result for the security disk according to the detection result of the network intrusion detection software in the disk button area (74-3) of the disk button (74-1) indicating that it is blocked (OFF). (S27)
  • the user can monitor the disk button (74-1) or the corresponding device tab (73-1) to see if the intrusion detection attempt has disappeared through the security disk app of the smartphone (124) and perform a connection or blocking operation for the disk button (74-1) again.
  • S29 the user can monitor the disk button (74-1) or the corresponding device tab (73-1) to see if the intrusion detection attempt has disappeared through the security disk app of the smartphone (124) and perform a connection or blocking operation for the disk button (74-1) again.
  • FIG. 4 shows a smartphone app (also known as a security disk app or disk hacking prevention app) of the present invention.
  • the main screen (or main menu) (70) of the smartphone app provided on the user's smartphone (124) is composed of a Bluetooth connection status icon (71-5), a security status display logo (71), a settings menu icon (71-7), a disk button (74-1), and a disk security connection/blocking control device image display unit (75-1, 75-3).
  • the access registration menu (76) which is one of the various types of auxiliary menu screens, appears for the first time, and depending on the auxiliary menu to be moved to in the auxiliary menu selection window (76-3, 81-1), the auxiliary menu window is configured with the recognition setting 1 menu (80), recognition setting 2 menu (83), volume label menu (86), color setting menu (87), timer menu (88), and other setting menus (89) of FIG. 6 in addition to the access registration menu (76) of FIG. 5.
  • the user touches the execution icon (not shown) installed on the desktop of the smartphone (124) to start it, and then after going through the intro screen, the disk security connection/blocking control devices (60, 90, 125, 130) are detected by wireless communication, and before moving to the main screen, the initial screen (not shown) is displayed.
  • the initial screen (not shown) lists product images of the disk security connection/blocking control devices (60, 90, 125, 130) supported by the smartphone app (70) of the present invention by type.
  • the initial screen setting (not shown) is such that when the smartphone app (70) is started and the main menu screen is displayed, if the disk security connection/blocking control device (60, 90, 125, 130) is not detected, the device tab (73-1), the disk button (74-1) and the disk security connection/blocking control device image (75-1) that are not displayed are arranged in the space area, and then when the user touches any product image, the user manual of the corresponding product is displayed, the initial screen (not shown) linked to the product's homepage is displayed, the security news screen is displayed, a user-defined image (not shown) is displayed, or the screens listed above are displayed at regular intervals, so that even if the disk security connection/blocking control device (60, 90, 125, 130) is not searched, the smartphone app (70) does not give an empty feeling to the opened screen. It is used to prevent this.
  • the smartphone app (70) performs authentication based on the registered phone number and password described later in the access setting menu (76) window of Fig. 4.
  • the authentication operation is performed by storing the phone number and password in the smartphone app (70) and the disk security connection/blocking control device (60, 90, 125, 130) respectively during the phone number and password registration process, and when the device is detected, the phone number and password stored in the smartphone are transmitted to the disk security connection/blocking control device (60, 90, 125, 130), and a comparison is performed within the wireless communication unit (62, 105, 139) having the MUC of the disk security connection/blocking control device (60, 90, 125, 130), and the result is returned to the smartphone app (70), and the smartphone app (70) determines the returned value, and if it is determined that the results of the user authentication operation for the phone number and password match, it considers the user as a normal user and leaves the corresponding device tab (73-1) and allows the use of the corresponding device, and if it is determined that the results of the authentication operation do not match, it considers the user as not a normal user and when the preset device tab (73-1) retention time has e
  • a security status logo (71) indicating the current security status is located at the top center of the main screen (70) of the smartphone app.
  • the above security status display logo (71) presents a series of security status display logos (71) of an embodiment consisting of three cases: a logo (71-1) indicating a perfect security status, a logo (71-2) indicating a vulnerable security status, and a logo (71-3) indicating an unlocked security status.
  • a logo (71-1) indicating a perfect security status
  • a logo (71-2) indicating a vulnerable security status
  • a logo (71-3) indicating an unlocked security status.
  • separate security status display logos (not shown) appropriate for each situation, such as when a network intrusion is not detected and when an intrusion is detected, may be additionally added.
  • the number of the device tab (73-1) that is connected to these devices via wireless communication is used at the bottom of the security status display logo (71) to display the status of unregistered phone numbers and passwords as text, such as PN1 and PW2.
  • the Bluetooth connection status icon (71-5) indicates the Bluetooth ON/OFF status depending on the Bluetooth connection status with the disk security connection/blocking control device (60, 90, 125, 130).
  • the settings menu icon (71-7) can be moved to the sub-menu by pressing this icon, and after moving, the main menu screen (70) can be returned to by pressing the sub-menu exit button (76-1).
  • the device tab (or device selection button) (73-1, 78-1, 83-1, 83-5, 86-1, 87-1, 88-1) indicates that the secure disk app (70) installed on the user's smartphone (124) is connected to a disk security connection/blocking control device (60, 90, 125, 130) recognized via wireless communication, and one device tab button is linked via wireless communication with one of various types of disk security connection/blocking control devices (60, 90, 125, 130).
  • the height of the disk button (74-1) corresponding to the disk security connection/blocking control device (60, 90, 125, 130) displayed on the main menu screen of the smartphone app (70) varies depending on the number of activated device tabs (73-1). As the number increases, the height of the disk button (74-1) decreases, and as the number decreases, the height of the disk button (74-1) increases.
  • product images (75-1, 75-3) of the disk security connection/blocking control device provided at the bottom are listed in cascade mode according to the number of detected devices.
  • the product itself has a structure in which four 2.5-inch SSD Bays are provided, unlike other disk security connection/blocking control devices (60, 90, 125), such as the user-configurable disk security connection/blocking control device (130) of the PCIe Add-in card type of Fig. 10, even if multiple device tabs (73-1) are selected, the product image of the disk security connection/blocking control device (130) of Fig. 10 and the corresponding disk buttons (74-1) appear as many as the number of SSD Bays provided in the device at the moment when the user-configurable security disk (130) of the PCIe Add-in card type of Fig.
  • the product images of other disk security connection/blocking control devices (60, 90, 125) are sequentially arranged from top to bottom according to the number of device tabs selected according to the order in which the device tabs (73-1) are pressed, and at the same time, the image (75-1) of the corresponding product is displayed from the back to the front. It is displayed in cascade mode.
  • the location of the disk button (74-1) and the location of the disk security connection/blocking control device (60, 90, 125, 130) corresponding to the activated device tab (73-1) of the changed location order are also changed in conjunction with the changed location of the corresponding device tab.
  • the device tabs are not aligned as they were before the app (70) was terminated. This is because the wireless communication connection between the smartphone and the disk security connection/blocking control device (60, 90, 125, 130) is connected in a random order.
  • the MAC address (MAC. ADDRESS) corresponding to the unique physical address of the wireless communication unit (62, 105, 139) equipped in each of the disk security connection/blocking control devices (60, 90, 125, 130) connected to the wireless communication is read for each device tab (73-1) according to the arrangement order of the arranged device tabs (73-1) and stored together with the number of the arranged device tab.
  • the smartphone app (70) performs an authentication operation on the device even if the disk security connection/blocking control devices (60, 90, 125, 130) are detected by wireless communication in a random order.
  • the device tabs (73-1) that were previously stored are rearranged in the order in which the MAC addresses were stored in the sort information of the device tabs (73-1), so that even when the app is closed and then reopened, the disk buttons (74-3) in the order specified by the user at the time of previous use and the product images of the disk security connection/blocking control devices (60, 90, 125, 130) that correspond thereto are always displayed in the same state as before.
  • the disk button (74-1) is divided into a disk button area (74-3) and a property button (74-5) area.
  • the property button (74-5) is used as a lock button to change or fix the current state of the normal disk button area (74-3), and depending on pressing this part, the locked and unlocked states are displayed in the shape of a lock.
  • the property button (74-5) is used for the purpose of use, for example, when the USB power control (85-9) in the recognition setting menu #2 (83) is selected as the battery maximum charge level mode (85-15), the property button (74-5) is divided into upper and lower halves, and the battery maximum charge level setting value (not shown) is displayed at the bottom as if displaying a fraction, and the current remaining battery capacity of the smartphone (not shown) is displayed at the top.
  • the set timer value is displayed at the bottom of the corresponding disk button (74-1), but when the disk button (74-1) is pressed, the timer starts at the same time as it switches to the connected state, and the timer progresses in a counterclockwise direction starting from the vertex of the circle forming the property button (74-5) with a thick line corresponding to a complementary color to the background color of the disk button (74-1) so that the change in the length of the arc indicates the progress of the timer, and the center of the property button is used to display the progress rate of the timer in percent units.
  • the disk button area (74-1) displays information such as the volume label of the storage device connected to the disk security connection/blocking control device (60, 90, 125, 130) connected to the corresponding device tab (73-1), the disk ON/OFF status, the timer value, and background colors for distinguishing between multiple devices in use.
  • the outline of the disk button (74-1) connected to the corresponding device is displayed as a bold line (alternating between bold and thin lines, dark and light lines, solid and dotted lines, or lines of different colors), so that the user can easily check which storage device connected to which device is mapped to which disk button (74-1) in an environment where multiple disk security connection/block control devices (60, 90, 125, 130) are used.
  • the Tact switch (109) in the security USB dongle (90) when not used in conjunction with the user's smartphone can be used as an ON/OFF switch in place of the disk button (74-1), and detailed operation thereof will be described later in FIG. 11.
  • the product images (75-1, 75-3) of the disk security connection/blocking control device are displayed in a manner that the Device ID stored in the non-volatile memory of the MCU provided in the register (not shown) of the wireless communication unit (62, 105, 139) provided on each disk security connection/blocking control device (60, 90, 125, 130) is read while the user's smartphone (124) is connected to the disk security connection/blocking control device (60, 90, 125, 130) via a Bluetooth interface, and the product image of the disk security connection/blocking control device corresponding to the Device ID of each device is displayed at the bottom of the main menu screen.
  • the access registration menu (76) is used to prevent mixing with disk security connection/blocking devices used by others before using the disk security connection/blocking control device (60, 90, 125, 130).
  • the topmost part is composed of a security status display logo (71-1 to 71-3) and an auxiliary menu exit button (76-1) similar to the main menu screen, and below that, a auxiliary menu selection window (76-3) for selecting an auxiliary menu is followed by a device tab (78-1) for selecting a specific device among a number of disk security connection/blocking control devices (60, 90, 125, 130).
  • sub-menu information button (78-3) that contains a description of the selected sub-menu.
  • this button is pressed, a separate pop-up window appears, displaying a detailed description of the purpose and use of the sub-menu.
  • the core function of the access registration menu (76) consists of the following buttons for the purpose of allowing only the user to access his/her own disk security connection/blocking control device (60, 90, 125, 130) and preventing or allowing access by others in a usage environment such as home or office.
  • the password and phone number reset button (79-1) is used to reset the user's phone number and the registered password when the user forgets the password by entering the e-mail address of a user or administrator registered in advance and confirming that it matches the e-mail address registered in advance.
  • the user In this state, the user must re-register the phone number and/or password so that when the smartphone app (70) of the present invention is restarted, authentication is performed based on this, thereby enabling use of the device again.
  • a phone number is a number used by others other than the user, so when it is necessary to allow others to use a storage device connected to a disk security connection/blocking control device (60, 90, 125, 130), it can be used by registering only a phone number without registering a separate password.
  • the password registration button (79-5) is used to strongly prevent access by others to a storage device connected to a disk security connection/blocking control device (60, 90, 125, 130).
  • the security disk app can perform an authentication operation for the disk security connection/blocking control device (60, 90, 125, 130) to block access to the device by those around the user.
  • the Change Phone Number button (79-7) When you press the Change Phone Number button (79-7), the phone number field before the change and the phone number field to be changed appear, and the phone number to be changed is registered as the new phone number only when the phone number before the change matches the phone number saved in the selected device.
  • the value set to the disk security connection/blocking control device (60, 90, 125, 130) is not transmitted and is only applied to the smartphone app (70).
  • the recognition setting menu #1 (80) is used to enable the built-in storage device connected to the disk security connection/blocking control device (60, 125, 130) to be recognized as a secure disk during the booting process of the desktop computer, and the upper part configuration up to the device tab (83-1) has the same configuration as the access registration menu (76) described above.
  • the boot time for desktop computers varies greatly depending on whether the storage media on which the operating system is installed is a hard disk drive (HDD) or a solid-state drive (SSD).
  • HDD hard disk drive
  • SSD solid-state drive
  • the disk recognition time value set as the initial value is stored in the non-volatile memory of the MCU equipped in the wireless communication unit (62, 139) of the disk security connection/blocking control device (60, 125, 130), so that when booting for the first time, the storage device connected to the disk security connection/blocking control device (60, 125, 130) maintains the connection state by this initial value.
  • the disk recognition time value is increased or decreased at each boot through several computer boot and reboot processes to find the optimal value.
  • the disk recognition time value at booting decreases, a value that is larger than the value just before the storage device connected to the disk security connection/blocking control device (60, 125, 130) is not detected as a secure disk is used as an approximate value for stable detection of a secure disk by a certain margin, and on the contrary, if the disk recognition time value at booting increases, several booting and rebooting operations are performed until the state where the device is not detected as a secure disk is detected, and a value that is larger than the time at the stage where the disk is detected is used as an approximate value for stable detection of a secure disk by a larger margin, and then the operating system confirms through the device driver that the network is not connected, and then considers it as an optimized disk recognition time value suitable for the user's computer environment.
  • the optimized boot disk recognition time value detected through this process is applied to the boot disk recognition time value (85-1) provided in the recognition setting menu (80) of the smartphone (124) app (70) so that it can be used when the computer boots normally thereafter.
  • the recognition setting menu (80) of the smartphone app (70) must have a checkbox (not shown) for automatically finding the optimized disk recognition time value at boot time, and when this checkbox is checked and the apply button (85-5) is pressed, the value must be transmitted to the device driver, and accordingly, the device driver performs an operation to find the optimized value through several reboot processes in the process of finding the optimized disk recognition time at boot time, and when the operation of finding the optimized disk recognition time value at boot time is finally completed, the checkbox (not shown) for automatically finding the disk recognition time value is switched to an unchecked state along with a completion message.
  • Connection control (85-2, 85-19) is used to select whether to block the connection status of a storage device connected to a disk security connection/blocking control device (60, 90, 125, 130) or maintain the connection status when the secure disk app installed on the smartphone is closed by the user while in use or when the smartphone goes out of the range where wireless communication is possible from the disk security connection/blocking control device (60, 90, 125, 130) while in use.
  • disk connection blocking (85-3) is selected, when the above conditions occur, the storage device connected to the disk security connection/blocking control device (60, 90, 125, 130) is switched to the blocked state, and if current state maintenance (85-4, 85-23) is selected, if the current storage device is connected, it is maintained in the connected state.
  • USB Power Control (85-9) in the Recognition Setting Menu #2 (83), the check box (83-7) linked to the Device tab (83-5) must be checked.
  • USB power always-on connection (85-11) mode When the USB power always-on connection (85-11) mode is selected, the USB storage device connected to the disk security connection/block control device (90) is constantly supplied with USB power, and when the disk button-linked USB power control (85-13) mode is selected, USB power is supplied to the USB storage device connected to the disk security connection/block control device (90) only when the disk button (74-1) is in the connected state.
  • the property button (74-5) is split in half, with the battery maximum charge level setting value displayed at the bottom and the current remaining battery capacity value at the top.
  • the USB power is kept connected so that charging proceeds. If the remaining battery capacity of the smartphone is higher than the set maximum charge level value, the USB power is switched to the disconnected state so that the smartphone battery is no longer charged.
  • the set mode value and the value set as the maximum charge level of the battery are transmitted sequentially to the disk security connection/blocking control device (90), and then the remaining battery level of the smartphone (124) is transmitted periodically or only when a change occurs in the remaining level value is transmitted to the disk security connection/blocking control device (90).
  • the slide bar (85-17) for setting the maximum battery charge level can be moved left and right to set a battery charge level of 70% at the left end and a battery charge level of 100% at the right end.
  • the setting range of the battery charge level can be adjusted to an appropriate range during the process of implementing the smartphone app (70).
  • the user can press the device tab (86-1) to display the corresponding disk, and if the disk selection checkbox (86-2, 86-4, 86-6, 86-8) is checked, the alphabet for displaying the volume label displayed in the volume label field of the corresponding disk can be accepted as is or can be displayed by entering an arbitrary entry.
  • the volume label information obtained together with the disk attribute information for the physical disk of the storage device is transmitted to a smartphone (124) via a wireless communication unit (62, 139), and the text corresponding to the volume label transmitted from the smartphone app (70) is reflected as it is in the volume label field (86-3, 86-5, 86-7, 86-9) and entered.
  • the disk security connection/blocking control device (60, 90, 125-1, 125-2) is in the form of a PCIe Add-in card (or a security disk card) that connects a single storage device or a security USB dongle (90) that connects a single USB storage device and is used
  • the volume label field displayed in addition to the disk number is sequentially assigned alphabets such as ‘D’, ‘E’, ‘F’, ‘G’, etc. when the device tab (86-1) is pressed
  • the disk security connection/blocking control device (130) is a PCIe Add-in card (or an SSD Slide-Stacker) of the form shown in Fig.
  • the corresponding volume label field is assigned the same alphabets and numbers such as ‘D1’, ‘D2’, ‘D3’, ‘D4’. It is displayed in a combined form.
  • volume label menu (86) window of the embodiment of the above Fig. 5 a ‘merge disks’ button (not shown) is provided at the top of the apply button (86-10), and the volume labels for each disk with a check mark in the disk selection checkbox (86-2) corresponding to each activated device tab can be merged and displayed as a single volume label.
  • a merged volume label is necessary is that when a RAID configuration is made for storage devices connected to a disk security connection/block control device (90, 125-1, 125-2, 130) using the RAID (Redundant Array of Inexpensive/Independent Disk) function supported by the motherboard equipped with a desktop computer, storage devices configured as RAID must be connected or blocked at the same time.
  • RAID Redundant Array of Inexpensive/Independent Disk
  • the color setting menu (87) is used to display a color set through the color table (87-7) of the color setting menu (87) as a background color in the disk button area (74-3) of the disk button (74-1) and/or the disk property button (74-5) by setting a color in advance to indicate which storage device is mapped to which disk button among storage devices connected to at least one or more disk security connection/blocking control devices (90, 125-1, 125-2, 130).
  • the configuration from the security status display logo (71) at the top to the device tab (87-1) is the same as the configuration of other auxiliary menu windows described above.
  • the background color of the disk button area (74-3) can be specified.
  • the background color of the disk button area (74-3) and the property (or lock) button (74-5) area can be specified simultaneously with a single color by touching the color tab (87-9).
  • the color table (87-5) has unit color tabs (87-9) arranged in a circle, each of which has its own color value, and a white color tab is located at the center of the arrangement.
  • the color of the touched color tab (87-9) is displayed in the disk connection/disconnection button area color display section (87-11) and/or the disk property area color display section (87-13) depending on the checked state of the check box for the disk ON/OFF button color (87-3) and the check box for the lock button color (87-5).
  • the color value of the color displayed in the color selection display window (87-7) is applied as the background color of the disk button (74-1) and/or the property (or lock) button (87-5), and at the same time, when the disk security connection/disconnection control device (90) is a security USB dongle, the color value specified in the disk button area (74-3) is transmitted to the security USB dongle (90) side so that when the disk button (74-1) is switched to the connected state, the Full-Color LED equipped at the center of the upper part of the printed circuit board of the security USB dongle (90) lights up in a color similar to the color specified in the disk button area (74-3).
  • the timer menu (88) is used to switch the corresponding disk button (74-1) to the blocking state immediately after the time set by the timer menu (88) has elapsed when the recognized disk security connection/blocking control device (60, 90, 125, 130) has switched to the connected state.
  • a timer checkbox (88-2) corresponding to the device tab appears, and a timer value can be set for the storage device connected to the corresponding disk security connection/blocking control device (60, 90, 125, 130).
  • the timer value setting consists of an hour unit setting slide bar (88-3), a minute unit setting slide bar (88-5), and a second unit setting slide bar (88-7). As each slide bar is moved left/right, the hour, minute, and second display sections provided at the right end display the time corresponding to each slide bar position.
  • the disk security connection/blocking control device (60, 90, 125, 130) is a user-configurable security disk (aka SSD Slide-Stacker) (130) of the PCIe Add-in card type having four 2.5-inch SSD Bays as shown in FIG. 10, four disk buttons (74-1) corresponding to each 2.5-inch disk bay are arranged vertically, and each disk button (74-1) displays a timer value for each disk bay set in the timer setting menu (88) in an arbitrary area inside.
  • an arbitrary timer value is set in advance, and if the password to be registered is a password that starts or ends with the special symbol ‘$’ (Security), the set timer value can be used as the maximum set time that can be maintained in a connected state when the user presses the disk button (74-1) to call a connected state.
  • the situation can be transmitted to the administrator by a transmission method previously specified in the administrator administrator settings of the other settings menu (89) described later.
  • the Other Settings menu (89) is used to select language, select the Bluetooth connection blocking time when authentication fails, select administrator settings, and select the initial screen settings for the main menu screen.
  • the language setting is used to select the language displayed on the smartphone app main screen (70) and auxiliary screens (76, 80. 83, 86, 87, 88, 89).
  • a radio button that the user can easily select is provided to the left of the language so that a language such as ‘Korean’ or ‘English’ can be selected.
  • a language such as ‘Korean’ or ‘English’ can be selected.
  • it may also be considered to list the supported languages vertically in the form of a list box and then allow the user to select an arbitrary language.
  • the Bluetooth connection blocking time selection when authentication fails (89-3) is used to select the time for which the unauthenticated device tab remains on the user's smartphone app (70) when an unauthenticated device is detected and appears in the array area of the device tabs (73-1, 78-1, 83-1, 83-5, 86-1) and is detected as another person's device other than the user's own disk security connection/blocking control device (60, 90, 125, 130) that has already been authenticated or is the target of authentication.
  • the radio button for “5 seconds later” the device will remain on the user’s smartphone (124) for only 5 seconds after the non-authenticated device tab (73-1, 78-1, 83-1, 83-5, 86-1) appears.
  • the radio button for “5 seconds later” select the radio button for “immediately” to enable quick connection to the smartphone of another user.
  • Administrator settings are displayed in the same way as the password change button (79-9) provided in the access registration menu (76) of Fig. 4 when the administrator clicks on administrator settings before distributing the disk security connection/blocking control device (60, 90, 125, 130) to users.
  • the administrator logs in by entering the same password that was registered through password registration (79-5) of Fig. 4 in the password field before change (not shown) and the password field after change (not shown), and then pressing the password and phone number initialization button (79-1) of Fig. 4 causes an e-mail address similar to the one registered to appear in the e-mail address field (not shown).
  • a user is using a disk security connection/blocking control device (60, 90, 125, 130) by maintaining a connected state exceeding the connection allowance time of a disk button (74-1) set in advance by an administrator, and a warning display check box (not shown) is checked, a warning display (alarm sound, vibration, flashing of the outline of the corresponding disk button in thick and thin lines, etc.) is provided to the user before the set time of the connection time of the aforementioned preset disk button (74-1), and if the set time has elapsed, a message is sent to the address entered in the configured e-mail field to notify that the corresponding disk button (74-1) has maintained a connected state exceeding the allowed time.
  • a warning display alarm sound, vibration, flashing of the outline of the corresponding disk button in thick and thin lines, etc.
  • notification message is sent to an e-mail address registered in the e-mail address field provided in the administrator settings.
  • SNS Social Network Service
  • FIG. 6 is a block diagram (93) of a security USB dongle (90) for a notebook PC user according to the present invention and an internal circuit of the security USB dongle, the detailed configuration of which is as follows.
  • the security USB dongle (90) is externally composed of an upper cover (91) and a lower cover (92), and has a USB connector (95) in the form of a Type-C, which is connected to a motherboard-side connection port that is connected to any USB port provided on a motherboard (not shown) of a desktop PC or notebook PC (120), and a USB connector (99) that can be used as a security disk by connecting a portable USB storage device (123) as the Type-C USB connector, and is arranged on the upper and lower sides of a printed circuit board (94) so that the wiring of corresponding power, ground, and USB-related signals between the two USB connectors (95, 99) does not intersect but is structured to be parallel wiring.
  • a boundary structure with a natural step is formed on both sides of the upper cover (91) and the lower cover (92), so that a fixing groove is provided on the inner side of the side with a high height, and a fixing projection is provided on the side with a low step height, so that a cover joining structure that can be joined without using a separate bolt is naturally derived.
  • the switch (109) can be provided at a location adjacent to the USB connector (95) used as a motherboard-side connection port or the USB connector (99) to which a USB storage device is connected during the process of implementing the block diagram (93) of the security USB dongle into a printed circuit board, and a Tact Switch is commonly used.
  • the purpose of this is to determine which security USB dongle (90) is mapped to the device tab (73-1), disk button (74-1) and disk security connect/disconnect control device image (75) provided on the user's smartphone app (70) when multiple security USB dongles (90) are connected to the USB ports of a notebook PC or desktop PC.
  • Any input port of the MCU or MCU built-in wireless communication unit (or MCU with built-in wireless communication unit) (105) to which the switch (109) is connected is used as an interrupt signal, and when the MCU or MCU built-in wireless communication unit (105) is in a pressed state, the ON/OFF state of the switch (109) is transmitted to the user's smartphone app according to internal interrupt signal processing, and the contents of the smartphone app (70) operating in conjunction with this are the same as those in the above-described FIG. 4.
  • the device tab, disk button (74-1) equipped on the smartphone app (70) and the outline of the product image of the security USB dongle are displayed alternately in thin and thick lines (or lines of dark brightness and lines of light brightness, or lines of different colors) or in the colors of the background screen at regular intervals, thereby confirming that the volume label of the security disk corresponding to the storage device connected to the security USB dongle (90) while the switch (109) is pressed and the volume label displayed on the disk button (74-1) equipped on the smartphone app (70) are mutually consistent, so that the user can visually confirm which security USB dongle (90) is mapped to which disk button (74-1) on the smartphone app (70) and whether it matches the volume displayed inside the corresponding disk button (74-1).
  • the block diagram (93) for the security USB dongle of Fig. 6 is as follows.
  • a bidirectional MUX/DEMUX (96) for low-speed USB and a bus switch section (97) for high-speed USB are provided, through which low-speed USB signals and high-speed USB signals are connected from the USB connectors (95, 99) on both sides, and the cable connection status detection signal (CC1, CC2) and side-band signals (SBU1, SBU2) (not shown) are directly connected to the respective USB connectors (95, 99).
  • the MCU or MCU built-in wireless communication unit (105) can monitor the high-speed USB GOOD signal and the low-speed USB GOOD signal to determine whether the USB storage device currently connected to the storage device-side USB connector (99) supports the high-speed USB interface or only supports the low-speed USB interface.
  • connection/disconnection status of the disk button (74-1) is output as a connection status (ON) through the MCU or the MCU built-in wireless communication unit (105) according to the user's manipulation of the disk button (74-1) equipped in the smartphone app (70)
  • the USB storage device connected to the storage device-side USB connector (99) supports a high-speed USB interface
  • the left/right USB connectors (95, 99) are respectively connected through the high-speed USB bus switch unit (97) and the low-speed USB bidirectional MUX/DEMUX (96) is maintained in a disconnected state
  • the connection through the high-speed USB bus switch unit (97) is blocked and the left/right USB connectors (95, 99) are maintained in a connected state through the low-speed USB bidirectional MUX/DEMUX (96).
  • the bus switch unit (97) for high-speed USB is switched to a blocking state, and the other port of the bidirectional MUX/DEMUX (96) for low-speed USB is connected to a low-speed USB signal converter (103).
  • the USB signal converted through the low-speed USB signal converter (103) is connected to the MCU or the MCU built-in wireless communication unit (105) as a serial communication signal such as I2C or UART, and at this time, the device driver installed in the computer (120) through the USB connector (95) connected to the motherboard maintains a state in which it can communicate with the smartphone app (70) installed in the user's smartphone (124) through the data path from the USB connector (95) to the low-speed USB bidirectional MUX/DEMUX (96) to the MCU or the MCU built-in wireless communication unit (105).
  • a serial communication signal such as I2C or UART
  • the network intrusion detection software (EDR; End-Point Detection and Response) installed together with the device driver on the computer (120) is connected to the device driver through the API, and when the disk of the volume label specified on the volume label menu (86) of the smartphone app (70) is switched to the connected state by the user pressing the disk button (74-1), the data is transmitted to the network intrusion detection software through the device driver via the data path mentioned above, and the network intrusion detection software intensively performs detection operations to determine whether an attempt to access the disk of the volume label via the network has occurred.
  • EDR End-Point Detection and Response
  • the MCU or the MCU's built-in wireless communication unit (105) immediately switches the bus ON/OFF signal for the disk of the corresponding volume label to a blocking state, and at the same time switches the disk button (74-1) that has been maintained in a connected state in the user's smartphone app (70) to a blocking state, and at the same time displays the fact that there has been an attempt to access the disk volume label that has not been authorized from the network through a security status display logo, and updates and saves a log file containing information such as the time of occurrence along with the volume label for the disk as a status log.
  • the reset signal generating unit (98) supplies the VBUS voltage to the power pin (not shown) of the USB connector (95) corresponding to the motherboard-side connection port from the motherboard (not shown) of the notebook PC (124) and generates a reset signal for a short period of several tens to several hundred milliseconds at the same time, thereby applying the reset signal to the circuit elements on the block diagram (93) of the security USB dongle that require a reset signal, such as the bidirectional MUX/DEMUX (96) for low-speed USB, the bus switch unit (97) for high-speed USB, the low-speed USB signal converter (103), the MCU or the wireless communication unit (105) built into the MCU, and the cable direction detector (114).
  • a reset signal such as the bidirectional MUX/DEMUX (96) for low-speed USB, the bus switch unit (97) for high-speed USB, the low-speed USB signal converter (103), the MCU or the wireless communication unit (105) built into the MCU, and the cable direction detector (114).
  • the internal power supply (111) receives VBUS power supplied from the motherboard (not shown) through a USB connector (95) used as a motherboard-side connection port and generates internal power required for the operation of the security USB dongle (90).
  • the LED display unit (113) is positioned at the exact center on a printed circuit board (94) that mounts components on a block diagram (93) of a security USB dongle that constitutes a security USB dongle (90), and is equipped with a bi-color LED or a full-color LED having at least one or more unit LEDs in a single LED package, and an ON/OFF control signal for each unit LED is connected to the MCU or the MCU built-in wireless communication unit (105), so that when the bus switch (97) is connected, the LED turns on according to a color specified in advance, and when the bus switch (97) is cut off, the LED turns off.
  • the cable direction detector (114) detects whether the cable is connected in a normal direction or in a twisted direction for the entire path from the computer (120) to the security USB dongle (90) to the USB storage device (123) for each cable connected to the USB connector (95, 99) provided in the security USB dongle (90) through the CC1 signal and the CC2 signal, and inputs the FLIP signal, which is the result of the detection, to the high-speed USB bus switch unit (97).
  • the high-speed USB bus switch unit (97) considers the cable to be twisted and internally arranges the high-speed USB signal in the twisted direction so that the high-speed USB signal as a whole becomes a signal in the normal direction.
  • the power ON/OFF control unit (115) transmits or blocks power input through the USB connector (95) used as the motherboard side connection port to the power pin side of the USB connector (99) used as the storage device side connection port, and is driven by a separate power ON/OFF signal output from the MCU or the MCU built-in wireless communication unit (105).
  • the power ON/OFF control unit (115) receives the remaining battery level value from the smartphone app (70) for the smartphone (124) connected to the security USB dongle (90) when the USB power control (85-9) of the recognition setting menu #2 (83) of the smartphone app (70) is set to the battery maximum charge level mode (85-15), thereby preventing the smartphone battery (not shown) from being overcharged beyond the preset battery maximum charge level.
  • Connectors (101, 107) are used to supply various signals and power and to physically support the upper board (205) and a separate touchpad or a touchpad-embedded display (207) at the bottom of the upper cover (22) of the security USB dongle (90) of Fig. 11.
  • FIG. 7 is a drawing showing the connection relationship between a security USB dongle (90) according to the present invention, a user's notebook PC (120), a portable USB storage device (123), and a user's smartphone (124).
  • the drawing shows a usage environment in which a USB storage device (123) is connected to a security USB dongle (90) and the user's smartphone (124) is connected via wireless communication such as Bluetooth and an MCU-embedded wireless communication unit (105) provided on the block diagram (93) of the security USB dongle.
  • the user's smartphone (124) is connected to the security USB dongle (90) and a separate USB cable (not shown) instead of the USB storage device (123).
  • FIG. 8 is a disk security connection/blocking control device (125-1) having a PCIe-USB bus converter (126) of the PCIe Add-in card type for desktop PC users according to the present invention as a bus conversion control unit.
  • the basic configuration is similar to the disk security connection/blocking control device (60) of FIG. 2 of the conventional invention, but is characterized in that a low-speed USB signal converted through a PCIe-USB bus converter (126) connected to a PCIe Edge-Finger unit (65) between a desktop PC and a user's smartphone is connected to a wireless communication unit (62) through a low-speed USB signal converter (127) as an I2C signal or serial communication such as UART.
  • the built-in storage device (not shown) connected to SATA connector #1 (67) corresponding to the storage device side connection port by the bus switch (61) connection/disconnection signal output from the wireless communication unit (62) forms a main data path connected to a SATA port connector (not shown) provided on the motherboard through the bus switch (61) and SATA connector #2 (66) corresponding to the motherboard side connection port.
  • the bus switch (61) When the computer boots, under the control of the wireless communication unit (62), the bus switch (61) is kept in a connected state for a time set as a default value in the program of the MCU built into the wireless communication unit (62) or for a time set in advance by the slide bar (85-1) for setting the disk recognition time at boot time provided in the recognition setting menu #1 (80) of FIG. 5, so that the operating system recognizes the connected built-in storage device as a disk device, and then the bus switch (61) is switched back to a blocked state to prevent exposure of the storage device to the network.
  • the device driver reads the Device ID from the disk connection status information register inside the wireless communication unit (62) through the connection between the PCIe Edge-Finger unit (65) ⁇ the PCIe-USB bus converter (126) ⁇ the low-speed USB signal and the wireless communication unit (62) via the low-speed USB signal converter (127) and determines which disk security connection/blocking control device (125-1) it is. It is also possible to compare it with the initial disk information recognized by the operating system when the bus switch (61) is connected under the control of the wireless communication unit (62).
  • FIG. 9 is a disk security connection/blocking control device (125-2) having a built-in PCIe-SATA bus conversion control unit (129) of a PCIe Add-in card type for desktop PC users according to the present invention.
  • the bus conversion control unit (129) has a built-in PCIe signal expansion unit (128) function, it is directly connected to the PCIe Edge-Finger unit (65) or connected through a separate PCIe signal expansion unit (128).
  • the PCIe-SATA bus conversion control unit (129) generates at least one or more SATA interface signals, and each SATA interface signal is connected to a SATA connector (66-69) corresponding to a storage device-side connection port through each bus switch (61).
  • the bus switch (61) is directly connected to the PCIe signal expansion unit (128) with the bus conversion control unit (129) removed.
  • a low-speed USB signal converter (127) is positioned between a wireless communication unit (62) and a PCIe signal extension unit (128) and can be connected to a device driver installed in a desktop PC (not shown).
  • the device driver terminal is connected to a network intrusion detection software and an interface through an API, and is ultimately connected to an app (70) of the present invention installed in a user's smartphone (124).
  • bus conversion control unit (129) supports the PCIe interface and has the function of a low-speed USB converter (127) built in, a separate PCIe signal expansion unit (128) is not required.
  • the bus conversion control unit (129) of the disk security connection/blocking control device (125-2) installed in a desktop PC causes the wireless communication unit (62) to maintain the bus switch (61) in a connected state along with booting, thereby causing the operating system of the desktop PC to recognize the storage devices connected to the SATA connectors (66 to 69) and output an Activity LED signal for each storage device, and the main data path is SATA connectors (66 to 69) ⁇ bus switch (61) ⁇ bus conversion control unit (129) ⁇ PCIe Edge-Finger unit (65).
  • the wireless communication unit (62) receives the Activity LED signal output from the bus conversion control unit (129) to recognize which of the SATA connectors (66 to 69) has the built-in storage device connected or not, and stores this in the disk connection status information register within the wireless communication unit (62).
  • the disk connection status information register of the wireless communication unit (62) can be accessed by the device driver through the low-speed USB signal converter (127) to the PCIe signal extension unit (128) as in the above-mentioned FIG. 8, and in a structure in which the low-speed USB signal converter (127) is functionally incorporated into the bus conversion control unit (129), it is possible for the device driver to directly access the disk connection status information register in the wireless communication unit (62) through the bus conversion control unit (129).
  • the power supply unit (111) shown in FIGS. 8 and 9 generates power used inside the disk security connection/blocking control device (125) and supplies it to each functional block.
  • FIG. 10 is an external view of a user-configurable SSD based on the disk security connection/blocking control device (125-2) of FIG. 9 of the present invention, in which four SSD Bays are provided in the PCIe Add-in card itself so that the user can arbitrarily mount and use an SSD.
  • the main configuration excluding the duplicate configuration of the same function mentioned in the descriptions of FIG. 2, FIG. 8, and FIG. 9, is as follows.
  • the DIP switch (135) provided inside the rectangular punch hole of the PCIe bracket (133) is connected to the control signal of the bus switch (BS1 to BS4) respectively connected to the wireless communication unit (139), and even if the control signal of the bus switch (BS1 to BS4) output from the wireless communication unit (139) is in a state where the bus switch (BS1 to BS4) is kept in a cut-off state, the DIP switch (135) corresponding to each bus switch (BS1 to BS4) is used to fix the bus switch (BS1 to BS4) in a connected state regardless of the control signal voltage level of the bus switch (BS1 to BS4) of the wireless communication unit (139) if the respective unit knobs corresponding to the bus switch (BS1 to BS4) are in the ON state.
  • the PCIe to SATA conversion IC (145) is connected to the PCIe Edge-Finger section (141) and the PCIe interface signal, and in Fig. 10, each PCIe signal is converted into five separate SATA signals.
  • the Activity LED signal can be utilized as a signal output from an SSD mounted in each SSD Bay, or as a signal output from a PCIe to SATA conversion IC.
  • the wireless communication unit (62) must keep the bus switch (61) connected for a certain period of time.
  • FIG. 11 is an exploded view of a smartphone (124) standalone security USB dongle (200) that excludes an environment in which the security USB dongle of FIG. 6 according to the present invention must be used based on wireless communication of Bluetooth communication or wireless communication of WiFi communication with the user's smartphone (124), and the detailed configuration is as follows.
  • the upper surface of the top cover (201) forms an opening hole to expose the touchpad-integrated display (207).
  • a security USB dongle (200) is also possible in which an LED (113) is provided in the center of the upper surface of the printed circuit board (94) at the center or bottom of the touchpad so that the ON/OFF operation of the disk button (74-1) in the smartphone app (70) is linked to the ON/OFF of the LED (113) when the touchpad is touched.
  • the pressing position is limited to the switch button area on the front, so there is a problem that the touch area is limited and the touch is not as natural as when a touch pad is applied.
  • FIGS. 2, 8 and 9 have been described in detail with respect to a disk security connection/blocking control device (60, 125-1, 125-2) in the form of a PCIe Add-in card having a PCIe Edge-Finger portion and a PCIe Bracket.
  • a SATA connector #1 (66) or SATA connector #2 provided in the disk security connection/blocking control device (60, 125-1) and connected to the motherboard of the computer is replaced with a SATA connector provided on the motherboard, then in the form of FIG. 2, a bus switch (61) and a wireless communication portion (62) are provided on the motherboard, and in the form of FIG.
  • a low-speed USB signal converter (127) and a PCIe-USB bus converter (126) are provided on the motherboard, so that a separate PCIe Add-in card-type disk security connection/blocking control device (60, 125-1) can be integrated into the motherboard.
  • the interface signal may be switched to the blocking state (or, High Impedance state, Tri-State state).
  • the USB connector (99) to which the external USB storage device is connected is replaced with a USB connector (not shown) provided on the motherboard of the computer (120), so that the high-speed USB bus switch unit (97) and the low-speed USB bidirectional MUX/DEMUX (96) are connected, and then the low-speed USB signal converter (103), the MCU built-in wireless communication unit (105), the cable direction detector (114), and the power ON/OFF control unit (115) are integrated into the motherboard.
  • a hardware-based security product that electrically blocks the interface signal connecting the built-in disk device to the motherboard is expected to have industrial applicability, thereby preventing the operating system from displaying the built-in disk device in the Device Manager and Explorer windows.
  • USB memory even if important data such as financial certificates are stored, existing computer operating systems detect the USB memory when it is inserted and display the storage device for the USB memory with a disk volume label in the explorer window, but this is not desirable from a security perspective.
  • the user presses the disk button to connect only when he or she wants to use the built-in storage device or portable USB storage device through an app installed on a smartphone, and switches to a blocked state when not in use.
  • a method and device for allowing or blocking access to the storage device in conjunction with software such as network intrusion detection software will open a new paradigm in computer security in the industrial sector.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Storage Device Security (AREA)

Abstract

Après la reconnaissance de ce dispositif de stockage intégré pour des données d'utilisateur, dans lequel un système d'exploitation n'est pas installé, en tant que dispositif de disque pendant un processus de démarrage de PC, le dispositif de stockage intégré maintient un état dans lequel un signal d'interface est bloqué pendant un état de veille de disque et maintient un état connecté pendant l'utilisation. Un utilisateur appuie sur un bouton de disque pour une connexion uniquement lorsque l'utilisateur souhaite utiliser le dispositif de stockage intégré ou un dispositif de stockage USB portable par le biais d'une application installée dans un smartphone, et le dispositif de stockage intégré ou le dispositif de stockage USB portable commute vers un état bloqué lorsqu'il n'est pas utilisé. L'invention concerne également un procédé et un appareil pour autoriser ou bloquer un accès au dispositif de stockage en association avec un logiciel tel qu'un logiciel de détection d'intrusion de réseau ou similaire.
PCT/KR2023/017461 2022-11-03 2023-11-03 Procédé et appareil de reconnaissance de disque de sécurité pour empêcher un piratage de disque Pending WO2024204940A1 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
KR20220145156 2022-11-03
KR1020230039818A KR20240063736A (ko) 2022-11-03 2023-03-27 디스크 해킹 방지를 위한 보안 디스크 인식 방법 및 장치
KR10-2023-0039818 2023-03-27

Publications (1)

Publication Number Publication Date
WO2024204940A1 true WO2024204940A1 (fr) 2024-10-03

Family

ID=91072438

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2023/017461 Pending WO2024204940A1 (fr) 2022-11-03 2023-11-03 Procédé et appareil de reconnaissance de disque de sécurité pour empêcher un piratage de disque

Country Status (2)

Country Link
KR (1) KR20240063736A (fr)
WO (1) WO2024204940A1 (fr)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12461863B2 (en) 2023-06-28 2025-11-04 SanDisk Technologies, Inc. Method and device for facilitating secure data transfer and storage
US12353765B2 (en) * 2023-06-28 2025-07-08 SanDisk Technologies, Inc. Method and device for secure data transfer and storage
CN119788441B (zh) * 2025-03-12 2025-06-20 深圳源创存储科技有限公司 一种基于双鱼算法实现SATA - PCIe混插数据的加密方法及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120066231A (ko) * 2010-12-14 2012-06-22 이승현 스마트폰과 외부 저장장치의 연결 시스템 및 그 방법
KR20160141151A (ko) * 2015-05-28 2016-12-08 주식회사 이노피아테크 소형화된 동글형 미디어 디바이스
KR20190012093A (ko) * 2017-07-26 2019-02-08 주식회사 스토리지안 데이터 보호 기능을 갖는 ssd 기반의 저장미디어
KR20200036453A (ko) * 2018-09-28 2020-04-07 주식회사 스토리지안 스마트폰과의 무선 통신에 의하여 데이터 보호 기능을 갖는 데이터 저장 수단 제어 장치 및 방법
KR102189361B1 (ko) * 2019-12-02 2020-12-09 주식회사 파고네트웍스 엔드포인트에 기반한 관리형 탐지 및 대응 시스템과 방법

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3205522B1 (fr) 2016-02-09 2018-10-10 Webasto SE Mécanisme d'entraînement pour un véhicule et procédé pour déplacer des panneaux pour un véhicule
JP2018181650A (ja) 2017-04-14 2018-11-15 住友化学株式会社 非水電解液二次電池用絶縁性多孔質層

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120066231A (ko) * 2010-12-14 2012-06-22 이승현 스마트폰과 외부 저장장치의 연결 시스템 및 그 방법
KR20160141151A (ko) * 2015-05-28 2016-12-08 주식회사 이노피아테크 소형화된 동글형 미디어 디바이스
KR20190012093A (ko) * 2017-07-26 2019-02-08 주식회사 스토리지안 데이터 보호 기능을 갖는 ssd 기반의 저장미디어
KR20200036453A (ko) * 2018-09-28 2020-04-07 주식회사 스토리지안 스마트폰과의 무선 통신에 의하여 데이터 보호 기능을 갖는 데이터 저장 수단 제어 장치 및 방법
KR102189361B1 (ko) * 2019-12-02 2020-12-09 주식회사 파고네트웍스 엔드포인트에 기반한 관리형 탐지 및 대응 시스템과 방법

Also Published As

Publication number Publication date
KR20240063736A (ko) 2024-05-10

Similar Documents

Publication Publication Date Title
WO2024204940A1 (fr) Procédé et appareil de reconnaissance de disque de sécurité pour empêcher un piratage de disque
WO2018012749A1 (fr) Dispositif électronique supportant une interface usb et procédé de commande d'une interface usb
WO2021025482A1 (fr) Dispositif électronique et procédé pour générer un certificat d'attestation sur la base d'une clé fusionnée
WO2017123077A1 (fr) Dispositif électronique, et procédé associé d'exécution d'un processus basé sur le résultat de diagnostic d'un matériel
WO2018026135A1 (fr) Dispositif électronique comportant un capteur d'empreintes digitales
WO2015163736A1 (fr) Procédés de fourniture de service de réseau social, et serveur les exécutant
EP3887929A1 (fr) Dispositif électronique et procédé de commande et d'exploitation d'écran pliable
WO2020218742A1 (fr) Dispositif électronique pliable et son procédé de fonctionnement
WO2016056858A2 (fr) Procédé pour partager un écran et dispositif électronique associé
WO2020067660A1 (fr) Appareil et procédé de commande de moyen de stockage de données ayant une fonction de protection de données en utilisant une communication sans fil avec un téléphone intelligent
WO2018008820A1 (fr) Dispositif électronique comprenant un capteur et procédé permettant de faire fonctionner ce dernier
WO2020246822A1 (fr) Dispositif électronique et procédé pour faire basculer un dispositif électronique entre un mode double veille et un mode simple veille
WO2017023014A1 (fr) Dispositif électronique contenant un appareil de saisie
WO2017191957A1 (fr) Procédé d'affichage d'écran et dispositif électronique prenant en charge ledit procédé d'affichage d'écran
WO2016167620A1 (fr) Appareil et procédé destinés à la fourniture d'informations par l'intermédiaire d'une partie d'affichage
EP3610406A1 (fr) Procédé et dispositif électronique pour commander l'autorisation d'un programme d'application
WO2016064156A1 (fr) Procédé de commande de la sécurité et dispositif électronique associé
WO2020171571A1 (fr) Dispositif électronique et procédé de gestion de base de données
WO2016133367A1 (fr) Dispositif électronique comprenant des connecteurs, et son procédé de fonctionnement
WO2016143962A1 (fr) Terminal et procédé pour faire fonctionner ce terminal
WO2015102220A1 (fr) Système de stockage ayant un dispositif de stockage de sécurité et procédé de gestion correspondant
EP3539046A1 (fr) Dispositif électronique et procédé pour gérer un de données dans le dispositif électronique
WO2021020801A1 (fr) Dispositif électronique pliable dont la forme change en fonction d'un événement et procédé pour changer la forme d'un dispositif électronique pliable
EP3646155A1 (fr) Appareil électronique comprenant un capteur de force et procédé de commande d'appareil électronique associé
WO2017061771A1 (fr) Doubleur de ssd, système de baies multi-dispositifs et système informatique associé

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23931050

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE