Dynamic key based hardware data enciphering method and device thereof
A hard disk and key technology, applied in the computer field, can solve problems such as loss, hard disk data can no longer be decrypted and read, damaged, etc., to achieve the effect of improving security, improving reliability and ease of use, and preventing illegal copying
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] Before the system is used for the first time, divide the hard disk into several partitions according to the sector LBA address, and then use software to generate a master key and a group of partition keys.
[0028] The method of generating the master key is to run the key generation program on the host, and according to the screen prompt information, the user enters a string of arbitrary characters, and the key generation program uses a general Hash algorithm (such as MD5, SHA-1, etc.) to Hash operation is performed on the characters input by the user and the real-time clock of the host, and the result of the Hash operation is used as the master key;
[0029] The partition key is generated by running a key generation program on the host, prompting the user to input another string of arbitrary characters, and the key generation program uses a general Hash algorithm (such as MD5, SHA-1, etc.) The character and the real-time clock of the host computer perform Hash operatio...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 