Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for full-disk encryption based on trusted cryptography module

A cryptographic module and full-disk encryption technology, applied in the field of information security, can solve the problems of low encryption and decryption efficiency, inconvenient use, etc., and achieve the effect of improving encryption and decryption efficiency, encryption efficiency, and security.

Active Publication Date: 2012-08-22
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF7 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disk encryption system uses various encryption technologies to realize the ciphertext storage of important data, which ensures data security to a certain extent. The current disk encryption system is divided into two technical implementation methods: application layer encryption and driver layer encryption. The application layer encryption system requires users to The files to be protected are operated separately, the efficiency of encryption and decryption is not high, and it is inconvenient to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for full-disk encryption based on trusted cryptography module
  • Method for full-disk encryption based on trusted cryptography module
  • Method for full-disk encryption based on trusted cryptography module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] A full-disk encryption method based on a trusted cryptographic module provided by the present invention will be described in detail below in conjunction with the accompanying drawings.

[0031] as attached figure 1 As shown, a method for full-disk encryption based on a trusted cryptographic module is now provided, including an encryption management module, a startup verification module, a file system filtering encryption module, and a trusted cryptographic module, wherein:

[0032] The encryption management module is used to generate encryption keys and encrypt MBR data and write them into the target disk to complete the establishment of the full disk encryption system, bootloader loading and key management functions.

[0033] The boot verification module is a boot boot program, which is loaded before the operating system starts, and communicates with the TCM to call the TCM hash cipher algorithm to perform login authentication and MBR integrity verification.

[0034] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for full-disk encryption based on a trusted cryptography module. A logging-in key and a storage key are protected by a trusted cryptography module, a file system is designed for filtering and driving an encryption module to encrypt or decrypt the I / O data of a disk, the real-time transparent encryption of full-disk data is realized, the trusted cryptography module (TCM) is invoked to carry out authentication and integrality verification on an encryption system by adding a starting and verifying module into a first magnetic track of the disk, and the keys and integrality verification information are stored in the TCM. Compared with the prior art, the operation of storage is not carried out in the disk according to the method for the full-disk encryption based on the trusted cryptography module, so that the safety is high; and TCM authentication and integrality inspection are needed for logging in a system, so that the condition that a user password is intercepted by implanting a malicious program can be prevented.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a full-disk encryption method based on a trusted cryptographic module. Background technique [0002] Enterprises, governments, and especially secret-related organizations often carry a large amount of secret-related data, and the storage security of these data has become more and more prominent with the development of information technology. In a complex network environment, data leaks occur frequently, and users urgently need a safe and effective data protection system. The disk encryption system uses various encryption technologies to realize the ciphertext storage of important data, which ensures data security to a certain extent. The current disk encryption system is divided into two technical implementation methods: application layer encryption and driver layer encryption. The application layer encryption system requires users to The files to be protected are o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/00G06F21/72G06F21/78
Inventor 赵斌
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products