Ciphering transmission method of hard disk ATA instruction

A hard disk encryption and encrypted transmission technology, which is applied in the field of computer security, can solve the problems of malicious destruction and tampering of ATA commands, and the inability to ensure safe communication between the computer host system and hard disk, and achieve the effect of ensuring safe communication

Active Publication Date: 2009-05-27
CHINA GREATWALL TECH GRP CO LTD
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiment of the present invention is to provide a method for encrypted transmission of hard disk ATA commands, aiming to solve the problem of malicious damage and tampering after the ATA commands between the computer host system and the hard disk may be intercepted and analyzed during the transmission process in the prior art , so that the problem of secure communication between the host computer system and the hard disk cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphering transmission method of hard disk ATA instruction
  • Ciphering transmission method of hard disk ATA instruction
  • Ciphering transmission method of hard disk ATA instruction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0025] In the embodiment of the present invention, the computer system encrypts the special ATA command for accessing the protected partition of the hard disk, and encrypts the encryption key again through the TPM. When there is a communication request between the host computer system and the protected partition of the hard disk, the BIOS sends the The special ATA command sent to the hard disk, using the TPM to check the integrity of the command to access the hard disk protection partition during the transmission process and the communication command between BIOS and TPM, if it is complete, take out...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is suitable for the computer field and provides a method for encrypted transmission of an ATA instruction of a hard disk. The method comprises the following steps: a special ATA instruction is encrypted; an encrypted encryption key is re-encrypted through TPM; produced cryptograph is stored in a protective subarea of the hard disk; the special ATA instruction is the ATA instruction for communication between a mainframe system and the protective subarea of the hard disk; when a communication request is emitted, BIOS sends the special ATA instruction to a hard disk management system of the hard disk; the BIOS transfers the TPM and carries out integrated verification on a common ATA instruction transferring the special ATA instruction and a communication instruction between the BIOS and the TPM through the TPM; if the instructions are integrated, the encrypted cryptograph of the encryption key is taken out from the protective subarea of the hard disk through the BIOS, and the TPM is transferred to decrypt the encrypted cryptograph to obtain the encryption key; and the TPM sends a digital signature certificate and the encryption key to a hard disk encryption system, the special ATA instruction is decrypted through the hard disk encryption system, and the protective subarea of the hard disk is opened to execute the communication request.

Description

technical field [0001] The invention belongs to the field of computer security, in particular to an encrypted transmission method of hard disk ATA commands. Background technique [0002] In recent years, with the rapid development of the concept of "trusted computing" and its spread in China, the traditional computer architecture has been severely challenged by security. The new generation of computer software and hardware platforms that can provide trusted computing services, namely the trusted computing platform, has Started to develop, and gradually matured and standardized. It is based on the Trusted Platform Module (TPM), supported by cryptographic technology, with a secure operating system as the core, from the TPM, computer motherboard and other hardware structures and basic input and output System (BasicInput Output System, BIOS) and operating system and other underlying software, adding an independent monitoring computer to the entire computer system to ensure that ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F3/06G06F21/02G06F21/79
Inventor 贾兵林诗达石明张拥军姚文泽宋靖
Owner CHINA GREATWALL TECH GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products