Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for securing data

A data and data block technology, applied in file system, digital data protection, electronic digital data processing, etc., can solve the problem that data recovery is not easy

Active Publication Date: 2012-11-14
信特尼公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] But it is not easy to combine further data recovery against corruption due to sudden service interruptions with protection of said data against replay

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for securing data
  • System and method for securing data
  • System and method for securing data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In the present invention, any data is considered reliable if it allows to ensure that said data has not been illegally altered or replaced by a third party. The data is authenticated in particular by a cryptographic algorithm giving encrypted data called MAC (Message Authentication Code). Such algorithms use secret keys and operate on data for protection. The algorithm can only be verified by providing the appropriate secret key. The algorithm generates a generally short authentication code that ensures the origin and integrity of the data. A single change to the data will cause the code to change.

[0030] The invention relates to a system 10 for securing data. In one example, said system is a system embedded in a device of the mobile telephone type, comprising, inter alia, equipped with a keypad, a screen, a microphone, a loudspeaker, an electronic card, a data transmitting and receiving module, a Subscriber Identity Module (SIM) and The housing for the battery th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a system and method for securing data. According to the invention, the system is characterised in that it consists of: a monotonic counter; a computing entity; a physical data medium including one or more data blocks (DBk1, DBk2, DBk3, DBk4), a first master block (MBk1) comprising the last value (Vlast) retrieved from the monotonic counter, an identifier (IDlast) of the last data block (DBk) written on the medium, a first authentication code (Auth_A) guaranteeing the authenticity of the written data block(s), a second authentication code (Auth_B) calculated from the last written data block, the data being fixed to a neutral value, and a third authentication code (Auth_C) guaranteeing the authenticity of the first master block (MBk1), and a second master block (MBk2) forming a replica of the first master block (MBk1); and an authentication key (15). The invention is particularly suitable for securing data against playback and sudden interruptions in service in embedded systems.

Description

technical field [0001] The present invention relates to a system and method for securing data stored on physical media. More specifically, the present invention relates to such a system and such a method in which data are made safe on the one hand for playback and on the other hand against damage or alteration caused especially by sudden service interruptions. It's safe to say. Background technique [0002] Replays are used to fraudulently access data by illegally copying previous contents of the data management system. For example, if it is assumed that system S0 has the rights to read file F at time t0, at time t after t0 these rights are consumed with the contents of said system equal to S, and then replay is allowed to read at time t The fetched file F is fraudulently accessed by copying the contents of system S0 into system S in order to obtain a system containing S0 that is confirmed to be valid at time t. [0003] Data in prior art systems has traditionally been pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/24G06F21/64
CPCG06F21/64G06F16/10G06F12/06G06F21/00G06F21/60H04L9/14G06F11/1441
Inventor A·阿普夫里尔A·弗里C·科拉斯
Owner 信特尼公司