Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A computer with data security function and its data encryption and hiding method

A data security and data encryption technology, which is applied in the direction of internal/peripheral computer component protection, digital data authentication, etc., can solve the problems of high cost, CPU resource occupation, unusability, etc., to achieve no CPU resource consumption, high data concealment, Maintain the effect of high-speed reading and writing

Active Publication Date: 2017-08-29
SAGE MICROELECTRONICS CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Hardware-based data encryption overcomes some shortcomings of the module method, such as completing data encryption and decryption operations by itself, but there are still some defects: because the encryption and decryption of the entire hard disk data affects the startup and operation performance of the computer, it is only suitable for low-speed Mechanical hard disk; users need to configure an additional encryption board, which is expensive; the application range is narrow, and cannot be used for small computer equipment such as notebook computers and tablet computers; in addition, with computer hardware equipment (such as CPU, motherboard, hard disk, etc.), peripheral communication There are performance upgrades in terms of protocols and operating systems, and there are also upgrade issues in the performance and compatibility of encryption boards, etc.
In general, the hidden partition at the application level is not thorough enough, and theoretically it can be cracked by an illegal intruder who is familiar with the file format of the operating system
[0006] In short, the existing computer hard disk data encryption and hiding technologies have problems or defects such as occupying CPU resources, relying on the operating system, relying on external encryption and decryption boards, reducing the read and write speed of the hard disk, hidden dangers of cracking, and limited user use.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A computer with data security function and its data encryption and hiding method
  • A computer with data security function and its data encryption and hiding method
  • A computer with data security function and its data encryption and hiding method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0083] Figure 4 Shows a flow chart of a computer data encryption and hiding method of the present invention, now in conjunction with Figure 4 , figure 2 with image 3 , a preferred embodiment of the present invention is described as follows:

[0084] 1) Install and run the identity information collection and man-machine interface module (24) on the computer host (1), which comes with an AES encryption module (241);

[0085] 2) The user inputs the user's digital password through the keyboard (31) on the identity information collection and man-machine interface module (24), and uses the digital password as identity information;

[0086] 3) the identity information collection and man-machine interface module (24) converts the identity information input by the user into an ASCII code, and sends an identity verification information command to the processor (51) of the solid state disk (5);

[0087] 4) The processor (51) of the hard disk obtains a temporary random number by t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a computer with a data privacy function and a data encryption and hiding method thereof. The computer comprises a computer host, a solid-state drive and an identity information input device, wherein an identity information collection and man-machine interface module is built in the computer host; the solid-state drive is connected with the computer host; the identity information input device is connected with the identity information collection and man-machine interface module; the solid-state drive comprises a public storage region and an encrypted storage region; the identity information input device is used for collecting the identity information of a user; the identity information collection and man-machine interface module is used for receiving the identity information collected by the identity information input device, processing the identity information and sending the processed identity information to the solid-state drive; the solid-state drive receives the identity information sent by the identity information collection and man-machine interface module and authenticates the identity information, and the computer can display, read and write the encrypted storage region only after the identity information authentication is passed, and otherwise, only the public storage region can be displayed, read and written. When the technical scheme is adopted, the relying on the computer host and other peripheral equipment is avoided, and a security computer based on hard disc data encryption and hiding can be conveniently built.

Description

technical field [0001] The invention relates to the field of computer data storage and data security, in particular to a computer with data security function and a data encryption and hiding method thereof. Background technique [0002] For a long time, the security of computers (commonly known as computers) has attracted much attention. Whether it is economic or military, whether it is a country, an enterprise or an individual, and whether it is a computer equipment manufacturer, designer, or user, there are computer security issues. aspects of product demand. There are many ways to build a secure computer. One of the important directions is the security protection of computer hard disk data, that is, by encrypting the hard disk data, unauthorized operations or illegal cracking can be prevented, thereby forming a secure computer. . [0003] The security protection of computer hard disk data includes two aspects: storage area data encryption and hiding. Traditional hard d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/78
CPCG06F21/31G06F21/32G06F21/78
Inventor 车嵘
Owner SAGE MICROELECTRONICS CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products