Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Protective method for solid-state disk encryption key

A solid-state hard disk and encryption key technology, applied in the field of information security, can solve the problems of easy cracking and low complexity of encryption key security protection, and achieve the effect of improving security

Inactive Publication Date: 2015-05-20
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, it has the following defects: the security protection complexity of the encryption key is not high, and the key usage authority is obtained only through the BIOS password authentication method, which is easy to be cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protective method for solid-state disk encryption key
  • Protective method for solid-state disk encryption key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] Such as figure 1 Shown, a kind of protection method of solid-state disk encryption key, described method comprises steps as follows:

[0022] The user authenticates the password through the management program;

[0023] The solid-state disk security module calculates a hash value for the authentication password and stores the hash value in the solid-state disk, which is used to verify the user password during daily use;

[0024] The security module encrypts the encryption key with the authentication password;

[0025] The solid-state drive stores the encryption key ciphertext.

[0026] Only the hash value of the authentication password is stored inside the solid state disk, and the authentication password is not stored. The user authentication password and the encryption key ciphertext are stored separately, realizing the physical separation of the key and the protected data.

[0027] The encryption key is encrypted by using the user authentication password, so to pa...

Embodiment 2

[0029] On the basis of Embodiment 1, the management program described in this embodiment is a setting program built into the solid-state hard disk, and when powered on, the program is loaded into the internal memory as a user management setting terminal.

Embodiment 3

[0031] On the basis of Embodiment 1 or 2, the security module described in this embodiment is a security function processing module built in a solid-state hard disk, which realizes functions such as encryption key protection / storage, authentication password verification, and data encryption / decryption.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a protective method for a solid-state disk encryption key. The protective method comprises the following steps: a user passes a management procedure authentication password; a solid-state disk safety module calculates a hash value for the authentication password and stores the hash value into a solid-state disk for authenticating a user password in a daily using process; the safety module encrypts the encryption key by using the authentication password; the solid-state disk stores a ciphertext of the encryption key. According to the technical scheme adopted by the invention, the authentication password hash value is stored in the solid-state disk and encryption protection is performed on the encryption key by using the authentication password, so that the safe separation of the protected encryption key and the protected data is achieved while the user's identity is effectively authenticated, and the safety of the encryption key is improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for protecting an encryption key of a solid state disk. Background technique [0002] With the rapid development of data storage technology, solid state drives (Solid State Drive, referred to as SSD) due to its fast read and write speed, low power consumption, no noise, anti-vibration, low heat, small size, wide operating temperature range, etc., have become It is widely used in military, vehicle, industry, medical, aviation and other fields. Today, data is the core asset, and the hard disk, as data storage space, is the last line of defense for data protection. Cryptography has been recognized as the most economical and powerful tool to ensure information security. Encrypted solid-state drives, as the basic equipment for secure information storage, are also facing increasingly stringent security requirements. [0003] Users of traditional SSDs enter pass...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 刘强曹刚秦刚李婷
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products