|Origin:||Made In China|
|Category:||Computers & AV Digital / Computer Components / Memory|
|Label:||encryption micro sd , security micro sd , anti-copy sd card|
|Min. Order:||100 pc|
Encryption Micro SD Card
Copy protection Micro SD card adopts high-performance 32bits SD card security chip, combined with the security encryption technology in chip, to prevent illegal copying data files, especially suitable for smart phones, audio and video multimedia on tablets, educational materials etc software vendors.
Copy protection Micro SD card supports multiple encryption algorithms, while providing up to 64KB storage space in the chip, because this storage space is in the chip, so can completely prevent the dada be copied. For normal Micro SD card, all data be saved in flash, it is easy to be copied, but the copy protection Micro SD card provides a secure encrypted storage space for various application software to store core data, such as encryption keys, system password etc.
1.1 Storage Structure
As shown above, the copy protection Micro SD card storage structure is divided into 2 parts:
1.2 Access Mode
Copy protection Micro SD card storage structure is divided into security partition and public partition, and there is big difference between their data access methods, details as follows:
1.3 How to make data file with copy protection function?
Currently software developers when use normal Micro SD card to store data file, can’t completely eliminate the data be copied, but the copy protection Micro SD card based on the storage structure and access method principles, the application software developers only need to put the data file encryption key into security area, and then saved the encrypted data file into public area, when using the public area encrypted file, first read the security area key to decrypt the data file which in public area to get the original data;
And when the public area data file been copied to other Micro SD card, because the security area key data can’t be copied, when using other Micro SD card, without key, the encrypted data file can’t be decrypted.
Through the above methods, the application software can realize data file with copy protection function, then protect the intellectual property rights effectively.
2. Products Specifications
3. Technical Specifications