Memory encryption method, apparatus and system

An encrypted storage and storage module technology, applied in the storage field, can solve problems such as security, ciphertext cannot be decrypted, hidden dangers, etc., and achieve the effect of security protection and security sharing

Inactive Publication Date: 2009-07-22
HUAWEI DIGITAL TECH (CHENGDU) CO LTD
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The change or loss of data read and write keys will cause the ciphertext to never be decrypted
[0003] During the research and practice of the existing technology, the inventor found that the existing technology has at least the following disadvantages: once the user passes the authentication and obtains the data read-write key, he can access the entire storage medium, which has potential security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory encryption method, apparatus and system
  • Memory encryption method, apparatus and system
  • Memory encryption method, apparatus and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] see figure 1 It is a flowchart of an encrypted storage method according to an embodiment of the present invention;

[0027] Step 101. Obtain a user ID and a key corresponding to the user ID;

[0028] In the embodiment of the present invention, the storage unit is divided into multiple user partitions, each user partition corresponds to a user ID, and each user ID corresponds to a key, that is, each user partition can use a different key to encrypt the stored data or decrypt.

[0029] When the storage unit needs to be read and written, the user ID of the current user is first obtained, and the corresponding key is obtained according to the user ID, and the storage unit can be read and written using the user’s key, for example, the input plaintext information Write it into the storage unit to become ciphertext, or read and encrypt the ciphertext stored in the storage unit to obtain plaintext data.

[0030] Further, when the user ID is obtained, but the key correspondin...

Embodiment 2

[0049] see figure 2 It is a structural diagram of an encrypted storage device according to an embodiment of the present invention;

[0050] The first acquiring unit 202 is configured to acquire a user identifier and a key corresponding to the user identifier;

[0051] After the first acquiring unit 202 acquires the user identifier, it acquires a corresponding key according to the user identifier.

[0052] The storage control unit 203 is configured to access the user partition corresponding to the user identifier according to the key.

[0053] see image 3 , the first acquisition unit 202 may include:

[0054] The key allocation unit 2021 is configured to allocate a key to the current user when the user ID has not allocated a key.

[0055] After the user ID is obtained, if the user ID has not been assigned a key, a key may be assigned to the user ID, which is equivalent to assigning a key to a new user.

[0056] If data needs to be written and encrypted, the device may al...

Embodiment 3

[0070] see Figure 4 It is a structural diagram of a data processing system of the present invention;

[0071] The host 401 is configured to send a read operation request or a write operation request to the control module;

[0072] The storage module 402 is used to store user data, and the storage module includes multiple user partitions, each partition corresponds to a user ID, and each user ID corresponds to a key.

[0073] The control module 403 is configured to receive the read operation request after obtaining the user ID of the current user and the key corresponding to the user ID, and access the corresponding user partition according to the key, and use the current user's key to key to encrypt the input information of the current user and store it in the current user partition of the storage module, or,

[0074] The write operation request is received, the data requested by the current user is obtained from the current user partition of the storage module, and the obt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an encryption storage method and comprises the steps as follows: a user identification and a key corresponding to the user identification are obtained; and a user partition corresponding to the user identification is accessed with the key. The embodiment of the invention also provides a corresponding encryption storage device. Different users of the same storage device own respective different keys, and each key only can decrypt a corresponding encryption partition, so that the technical proposal of the invention can carry out safer protection towards a storage medium. Different keys are used for realizing the safety share of different users for different encryption partitions on the same medium.

Description

technical field [0001] The invention relates to the technical field of storage, in particular to an encrypted storage method and device. Background technique [0002] With the wide application of computer technology, data security is facing great challenges. Data can be encrypted and stored using encryption technology, which is also to encrypt and encode the data written into the storage media system. Even if the data is lost, it cannot be interpreted to meaningful content, thereby reducing the loss caused by data loss. The principle of existing data encryption: when writing data, call the encryption algorithm, use the key to convert plaintext data into ciphertext data; when reading data, call the decryption algorithm, use the key to restore the ciphertext data to plaintext data. The encryption and decryption algorithms are arranged in the non-detachable control chip of the storage device itself, which is a kind of hardware encryption integrated into the device itself. The...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14
Inventor 陈云昊
Owner HUAWEI DIGITAL TECH (CHENGDU) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products