The “Defender” Sun Moon Secure Portable Hard Disk (hereinafter referred to as the “Sun Moon Disk”) is an information security storage solution launched around the core technology system of “data granulation” and drawing on the ancient Chinese concept of “tiger symbols”. This system is a highly secure mobile storage device used for sensitive data protection. It encrypts user data and stores it randomly in daily and monthly disks, and uses UKey for identity authentication and key storage to achieve physical isolation between data, keys, and data fragments. Only when correctly combined can user data be recovered, effectively solving security issues such as theft and loss of sensitive data during the outbound process.
2. Functional features:
(1) Data fragmentation, using our unique particle technology to process user data into particles, resulting in data fragments that are stored separately in daily and monthly disks.
(2) Hardware encryption, using hardware encryption chips to encrypt data processing;
(3) Split and carry, structurally divided into three parts, only when the three parts are correctly combined can the data be decrypted.
]]>The “Defender” data security disk (hereinafter referred to as the security disk) is an information security storage solution launched around the core technology system of “data granulation”, drawing on the ancient Chinese concept of “tiger symbols”. This system is used to protect the security of PC data, including local encryption system software and mobile encryption devices. It adopts a unique data “particle” technology to “particle” split the files in the computer, and randomly store them in the computer hard disk and external encryption disk. This product uses national commercial cryptographic chips.
2. Functional features:
(1) Mainly used to ensure the security of data stored in computer memory;
(2) The system is equipped with high-strength national security authentication encryption and provides complete log audit functions for data content;
(3) From the perspective of product structure, it can be divided into two parts: local encrypted disk system software and mobile encrypted disk devices;
(4) When in use, store the files separately on the computer’s hard drive and removable key drive according to a custom ratio;
(5) The system automatically establishes a “My Secret Disk” partition, and the data is placed in that partition, automatically achieving “data granularity” protection.
]]>“Tiger?seal”?secure?mobile?hard?disk?is?a?mobile?secure?storage?product?that?protects?the?security?of?users’?static?data.
This?product?focuses?on?our?company’s?core?technology?system?of?“data?particle”?and?draws?lessons?from?the?concept?of?“tiger?symbol”?in?ancient?China?to?launch?an?information?security?storage?solution.
When?data?enters?the?device,?use?the?default?algorithm?to?encrypt?the?data,?and?then?use?the?special?algorithm?independently?designed?by?our?company?to?distribute?the?ciphertext?data,
Two?independent?data?fragments?are?obtained?and?stored?in?different?physical?carriers?respectively,
This?improves?the?security?of?static?data?from?the?two-dimensional?plane?of?“algorithm-key”?to?the?three-dimensional?structure?of?“algorithm-key-data?Fragment”,?solves?the?security?problem?from?the?data?source,?and?reaches?the?level?of?data?intrinsic?security.
2.?Features:
The?system?is?divided?into?control?operation?software?and?storage?control?carrier.
The?control?software?is?responsible?for?user?permission?control?and?basic?operations;?The?storage?control?carrier?is?responsible?for?core?functions?such?as?data?encryption?and?decryption,?data?dispersion,?and?sub-media?storage.
Sensitive?data?such?as?user?passwords?and?keys?are?stored?in?security?chips?certified?by?the?state?password?administration.
]]>