Unlock instant, AI-driven research and patent intelligence for your innovation.

Dynamic key based hardware data enciphering method and device thereof

A hard disk and key technology, applied in the computer field, can solve problems such as loss, hard disk data can no longer be decrypted and read, damaged, etc., to achieve the effect of improving security, improving reliability and ease of use, and preventing illegal copying

Inactive Publication Date: 2008-07-16
XI AN JIAOTONG UNIV +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] If the key is stored on the medium, there is always the possibility of loss or damage. If the key is not backed up, the data on the hard disk cannot be decrypted and read

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic key based hardware data enciphering method and device thereof
  • Dynamic key based hardware data enciphering method and device thereof
  • Dynamic key based hardware data enciphering method and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Before the system is used for the first time, divide the hard disk into several partitions according to the sector LBA address, and then use software to generate a master key and a group of partition keys.

[0028] The method of generating the master key is to run the key generation program on the host, and according to the screen prompt information, the user enters a string of arbitrary characters, and the key generation program uses a general Hash algorithm (such as MD5, SHA-1, etc.) to Hash operation is performed on the characters input by the user and the real-time clock of the host, and the result of the Hash operation is used as the master key;

[0029] The partition key is generated by running a key generation program on the host, prompting the user to input another string of arbitrary characters, and the key generation program uses a general Hash algorithm (such as MD5, SHA-1, etc.) The character and the real-time clock of the host computer perform Hash operatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to dynamic keys hardware data method and its device, wherein, the method has main and sub keys and when needing to code certain fan data and computing the main and sub and fan LBA address mixture data and using the results as coding key by sets. The device is connected between the host board and hardware composed of coding card and electrical keys and coding card is composed of single machine and FPGA chip and coding the hardware data and reading the data from hardware.

Description

technical field [0001] The invention belongs to the technical field of computers, and relates to a dynamic key-based hard disk data encryption method and a device thereof. Background technique [0002] While information technology has brought great convenience to people, the problem of information security has become increasingly prominent. As the main external memory of the computer, the hard disk usually stores a large amount of user information. Encrypting hard disk data is the basic way to ensure the confidentiality of hard disk data. Because software encryption systems have insurmountable performance and security problems, it is of great significance to study hard disk encryption systems based on hardware. [0003] Patent No. 99113164.9, "A Computer Hard Disk Encryption Device", proposes a selective encryption device. The key of this device needs to be manually input by the user using a keyboard. Due to the limitation of human memory, the length of the key is limited....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14G06F21/00G06F21/72G06F21/80
Inventor 伍卫国王本中刘轶李思张群钱德沛田敏
Owner XI AN JIAOTONG UNIV