Check patentability & draft patents in minutes with Patsnap Eureka AI!

A method of full-disk encryption based on trusted cryptographic modules

A cryptographic module and full-disk encryption technology, which is applied in the field of information security, can solve the problems of inconvenient use and low encryption and decryption efficiency, achieve high encryption efficiency, improve encryption and decryption efficiency, and prevent malicious tampering and illegal data theft of the encryption system

Active Publication Date: 2016-06-15
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disk encryption system uses various encryption technologies to realize the ciphertext storage of important data, which ensures data security to a certain extent. The current disk encryption system is divided into two technical implementation methods: application layer encryption and driver layer encryption. The application layer encryption system requires users to The files to be protected are operated separately, the efficiency of encryption and decryption is not high, and it is inconvenient to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of full-disk encryption based on trusted cryptographic modules
  • A method of full-disk encryption based on trusted cryptographic modules
  • A method of full-disk encryption based on trusted cryptographic modules

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The following is a detailed description of a method for full disk encryption based on a trusted cryptographic module provided by the present invention with reference to the accompanying drawings.

[0031] As attached figure 1 As shown, a full-disk encryption method based on a trusted cryptographic module is now provided, including an encryption management module, a startup verification module, a file system filtering encryption module, and a trusted cryptographic module, where:

[0032] The encryption management module is used to generate encryption keys and encrypt MBR data and write them to the target disk, complete the establishment of a full disk encryption system, start boot program loading, and key management functions.

[0033] The start-up verification module is a boot-up program, which is loaded before the operating system starts. It communicates with the TCM to call the TCM hash password algorithm to perform login authentication and MBR integrity verification.

[0034]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a full-disk encryption method based on a trusted cipher module, which protects the login key and the storage key through the trusted cipher module, designs a file system to filter and drive the encryption module to encrypt and decrypt disk I / O data, and realizes real-time transparency of the full-disk data Encryption, by adding a startup verification module to the first track of the disk, calling TCM to perform authentication and integrity verification on the encryption system, and the key and integrity verification information are stored in the TCM. Compared with the prior art, the full-disk encryption method based on the trusted cryptographic module is not stored in the disk, and has high security. The system login requires TCM authentication and integrity inspection, which can prevent malicious programs from implanting and intercepting user passwords.

Description

Technical field [0001] The invention relates to the technical field of information security, in particular to a method for full disk encryption based on a trusted cryptographic module. Background technique [0002] Enterprises, governments, and especially secret-related organizations often carry a large amount of secret-related data. The storage security of these data has become more prominent with the development of information technology. In a complex network environment, data leaks frequently occur, and users urgently need a safe and effective data protection system. The disk encryption system uses various encryption technologies to realize the ciphertext storage of important data, ensuring data security to a certain extent. The current disk encryption system is divided into application layer encryption and drive layer encryption. The application layer encryption system requires users to The files to be protected are operated separately, the encryption and decryption efficien...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14G06F21/72G06F21/80G06F21/78
Inventor 赵斌
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More