在线观看主女国产,毛基地网站 http://m.otdrtraining.com Dedicated information security products and high security software service providers Mon, 21 Oct 2024 08:39:38 +0000 en-US hourly 1 https://wordpress.org/?v=4.2.38 “Defender” Sun Moon Safe Portable Hard Drive http://m.otdrtraining.com/?p=6929&lang=en http://m.otdrtraining.com/?p=6929&lang=en#comments Thu, 22 Dec 2022 05:08:09 +0000 http://m.otdrtraining.com/?p=6929 1. Product Overview:

The “Defender” Sun Moon Secure Portable Hard Disk (hereinafter referred to as the “Sun Moon Disk”) is an information security storage solution launched around the core technology system of “data granulation” and drawing on the ancient Chinese concept of “tiger symbols”. This system is a highly secure mobile storage device used for sensitive data protection. It encrypts user data and stores it randomly in daily and monthly disks, and uses UKey for identity authentication and key storage to achieve physical isolation between data, keys, and data fragments. Only when correctly combined can user data be recovered, effectively solving security issues such as theft and loss of sensitive data during the outbound process.

2. Functional features:

(1) Data fragmentation, using our unique particle technology to process user data into particles, resulting in data fragments that are stored separately in daily and monthly disks.

(2) Hardware encryption, using hardware encryption chips to encrypt data processing;

(3) Split and carry, structurally divided into three parts, only when the three parts are correctly combined can the data be decrypted.

]]>
http://m.otdrtraining.com/?feed=rss2&p=6929&lang=en 0
“Defender” data security disk http://m.otdrtraining.com/?p=6924&lang=en http://m.otdrtraining.com/?p=6924&lang=en#comments Thu, 22 Dec 2022 04:50:32 +0000 http://m.otdrtraining.com/?p=6924 1. Product Overview:

The “Defender” data security disk (hereinafter referred to as the security disk) is an information security storage solution launched around the core technology system of “data granulation”, drawing on the ancient Chinese concept of “tiger symbols”. This system is used to protect the security of PC data, including local encryption system software and mobile encryption devices. It adopts a unique data “particle” technology to “particle” split the files in the computer, and randomly store them in the computer hard disk and external encryption disk. This product uses national commercial cryptographic chips.

2. Functional features:

(1) Mainly used to ensure the security of data stored in computer memory;

(2) The system is equipped with high-strength national security authentication encryption and provides complete log audit functions for data content;

(3) From the perspective of product structure, it can be divided into two parts: local encrypted disk system software and mobile encrypted disk devices;

(4) When in use, store the files separately on the computer’s hard drive and removable key drive according to a custom ratio;

(5) The system automatically establishes a “My Secret Disk” partition, and the data is placed in that partition, automatically achieving “data granularity” protection.

]]>
http://m.otdrtraining.com/?feed=rss2&p=6924&lang=en 0
“Tiger seal” secure mobile hard disk http://m.otdrtraining.com/?p=6315&lang=en http://m.otdrtraining.com/?p=6315&lang=en#comments Fri, 02 Dec 2022 16:58:41 +0000 http://m.otdrtraining.com/?p=6315 1.?Product?overview:

“Tiger?seal”?secure?mobile?hard?disk?is?a?mobile?secure?storage?product?that?protects?the?security?of?users’?static?data.

This?product?focuses?on?our?company’s?core?technology?system?of?“data?particle”?and?draws?lessons?from?the?concept?of?“tiger?symbol”?in?ancient?China?to?launch?an?information?security?storage?solution.

When?data?enters?the?device,?use?the?default?algorithm?to?encrypt?the?data,?and?then?use?the?special?algorithm?independently?designed?by?our?company?to?distribute?the?ciphertext?data,

Two?independent?data?fragments?are?obtained?and?stored?in?different?physical?carriers?respectively,

This?improves?the?security?of?static?data?from?the?two-dimensional?plane?of?“algorithm-key”?to?the?three-dimensional?structure?of?“algorithm-key-data?Fragment”,?solves?the?security?problem?from?the?data?source,?and?reaches?the?level?of?data?intrinsic?security.

2.?Features:

The?system?is?divided?into?control?operation?software?and?storage?control?carrier.

The?control?software?is?responsible?for?user?permission?control?and?basic?operations;?The?storage?control?carrier?is?responsible?for?core?functions?such?as?data?encryption?and?decryption,?data?dispersion,?and?sub-media?storage.

Sensitive?data?such?as?user?passwords?and?keys?are?stored?in?security?chips?certified?by?the?state?password?administration.

]]>
http://m.otdrtraining.com/?feed=rss2&p=6315&lang=en 0