Solid state hard disk secure encryption system

A solid-state hard disk, security encryption technology, applied in the field of computer security, can solve problems such as being unfavorable for multi-user use, and achieve the effect of improving security and safety

Inactive Publication Date: 2010-07-28
WUHAN SOLIC CZECHOSIOVAKIA DATA SCI & TECH
View PDF0 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are also some defects in the existing solid-state hard disk security encryption system: 1. Since the key is also stored in the solid-state hard disk, it is easy to have problems in the storage, management and transmission of the key. The storage medium of the key is used to obtain the key by illegal means, so as to realize the cracking of the ciphertext
2. The key is unique, which is not conducive to multi-user use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Solid state hard disk secure encryption system
  • Solid state hard disk secure encryption system
  • Solid state hard disk secure encryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The technical solutions of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention and the accompanying drawings. Apparently, the described embodiments are some examples of the present invention, not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present invention.

[0043] Such as figure 1 Shown embodiment of the present invention, it is the safe encryption system of solid-state hard disk, and it comprises main frame, the solid-state hard disk that is arranged on main frame, key and identity authentication system; Solid-state hard disk comprises encryption and decryption module, solid-state hard disk control module, storage module ; The identity (user) authentication system is stored in the storage module, and the key is stored on a ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a solid state hard disk secure encryption system. The encryption system comprises a main engine, a solid state hard disk, and a key and identity authentication system, wherein the solid state hard disk, the key and identity authentication system are arranged on the main engine; the solid state hard disk comprises an encryption and decryption module, a solid state hard disk control module and a storage module; the identity authentication system is stored in the storage module; and the key is stored on key storage media except the solid state hard disk. Compared with the prior art, in the system, the key of the invention is stored on the key storage media (such as USB KEY, other storage devices or servers and the like) except the solid state hard disk, so that the key, the main engine and the solid state hard disk are separated, and the media for storing the key can be stored into other places, thereby improving the security of the solid state hard disk secure encryption system.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a solid-state disk encryption system. Background technique [0002] Current computer security systems generally include the following two types, one is to control user access rights through software; the other is to encrypt data in solid-state drives. [0003] The method of managing and controlling user access rights through software is simple, easy to crack, and has poor confidentiality. Therefore, most computer security systems use encryption for data in solid-state drives, that is, solid-state drive security encryption systems. [0004] Existing security encryption systems for solid-state hard disks generally include solid-state hard disks, keys and identity authentication systems; solid-state hard disks include encryption and decryption modules, solid-state hard disk control modules, and storage modules; keys and identity authentication systems are stored in the sto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14
Inventor 王亚轩吴非陈祥王亮
Owner WUHAN SOLIC CZECHOSIOVAKIA DATA SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products