Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for protecting confidentiality and integrity of data in memory

A memory storage, confidentiality technology, applied in the direction of digital data protection, prevention of unauthorized use of memory, protection of internal/peripheral computer components, etc., can solve problems such as occupation, multi-system computing resources, etc., to reduce storage space consumption, performance Low consumption, eliminating the effect of counter overflow

Inactive Publication Date: 2015-05-20
DALIAN UNIV OF TECH
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, counter overflow will cause the system to suspend ongoing tasks, assign new keys and counters, and re-encrypt, occupying a lot of system computing resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting confidentiality and integrity of data in memory
  • Method for protecting confidentiality and integrity of data in memory
  • Method for protecting confidentiality and integrity of data in memory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described below in conjunction with the accompanying drawings. The specific implementation process is as follows, combined with figure 1 , 2 and 3:

[0033] When the CPU reads a block of data from memory:

[0034] ①The CPU reads the required data block from the memory;

[0035] ② Check the counter corresponding to this data block use Whether it is in the counter cache;

[0036] ③If counter use In the counter cache, go to ⑥;

[0037] ④If counter use Not in the counter cache, read the counter allocated by the system for this data block from the memory assigned ;

[0038] ⑤ Use the obtained counter assigned And the physical address of the data block is used as the input of the MAC function with the key to calculate the counter use ;

[0039] ⑥Use the calculated counter use Calculate the remainder of the number of keys available in the system to determine the key used for encryption and decryption operations use ;

[0040...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a scheme for protecting the confidentiality and integrity of data in a memory. The implementation method of the scheme includes the following steps a counter<assigned> allocated by a system for a data block and the address of the data block serve as input of an MAC function with keys, a counter<use> used in the encryption and decryption process is worked out, and the key<use> used during current encryption and decryption is worked out according to the worked-out counter<use>. Compared with traditional counter mode encryption methods, the method has the advantages that influences of counter overflow on system computing resource occupancy can be smoothly eliminated, the system is allowed to allocate the short counter for the data block, the storage space occupied by the counters is reduced, the advantages of counter mode encryption methods in the system performance aspect are reserved at the same time, and the integrity of the data in the memory is protected.

Description

technical field [0001] The invention belongs to the technical field of computer data storage protection, and relates to a method for protecting the confidentiality and integrity of memory storage data. Background technique [0002] With the development of science and technology, more and more data stored in computer memory are becoming more and more important, and the memory is subject to more and more attacks. Therefore, it is necessary to protect its confidentiality and prevent information leakage. The most commonly used encryption method in the field of memory data confidentiality protection is counter-mode encryption, because without considering counter overflow, counter-mode encryption will only add a delay caused by an XOR operation on the critical path of the data. However, counter overflow will cause the system to suspend ongoing tasks, assign new keys and counters, and perform re-encryption, occupying a lot of system computing resources. Contents of the invention ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/60G06F21/78
Inventor 姚念民李侠虎谭国真高振国卢志茂陈炳才
Owner DALIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products