Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A secure hard disk based on bios encryption, data encryption and decryption method

An encryption key and hard disk technology, applied in digital data protection, electronic digital data processing, computer security devices, etc., can solve the problems of being easily infected by computer viruses, unable to encrypt the system disk, and low password security

Active Publication Date: 2018-03-23
SAGE MICROELECTRONICS CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Since the password input software needs to be fully activated after the system disk can be run normally, that is, the password input software can only input the password after the system disk is fully activated, so that the system disk does not need and cannot be decrypted during startup.
Since the decryption process cannot be performed, it means that the system disk cannot be encrypted in advance. It can be seen that the password input software in the prior art cannot realize the data encryption and decryption process on the system disk, thus the data security in the system disk cannot be guaranteed.
[0004] In addition, because password input software is a kind of software, it is easy to be infected by computer viruses. At the same time, the password input program corresponding to the password input software also has the possibility of being decompiled. It can be seen that when data is encrypted in the prior art, Passwords are less secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure hard disk based on bios encryption, data encryption and decryption method
  • A secure hard disk based on bios encryption, data encryption and decryption method
  • A secure hard disk based on bios encryption, data encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0037] The embodiment of the invention discloses a secure hard disk based on BIOS encryption, which is applied to computers equipped with BIOS. see figure 1 As shown, the secure hard disk 10 includes a first password receiving module 101, a second password receiving module 102, a key generation module 103, a key storage module 104, a data receiving module 105 and a data storage module 106;

[0038] The first password receiving module 101 is used to receive an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a BIOS encryption-based safety hard disk, and a data encryption and decryption method, and the safety hard disk is applied to a computer with BIOS, and comprises a first password receiving module, a second password receiving module, a key generation module, a key storage module, a data receiving module and a data storage module. In the application, a user password and a data reading password are input by the BIOS of the computer, which means that the user password and the data reading password are input before complete starting up of the system, so the aim of decrypting encrypted data in the safety hard disk before the complete starting up of the system is achieved. In this way, the safety hard disk can be used as a system disk for realizing data encryption and the data safety of the system disk is improved. Meanwhile, as the system is not completely started up, virus software cannot be operated, the condition that the passwords are infected and decompiled by virus is avoided and password safety is improved.

Description

technical field [0001] The invention relates to the technical field of data hard disks, in particular to a secure hard disk based on BIOS encryption and data encryption and decryption methods. Background technique [0002] Currently, a computer generally includes two types of hard disks, one is a system disk, and the other is a data disk. When the data in the computer needs to be encrypted and decrypted, the data is usually encrypted and decrypted using the password input by the password input software. [0003] Because the password input software needs to run normally after the system disk is fully started, that is, the password input software needs to be able to input the password after the system disk is fully started, so that the system disk does not need and cannot be decrypted when starting. Since the decryption process cannot be performed, it means that the system disk cannot be encrypted in advance. It can be seen that the password input software in the prior art ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/78G06F21/60
CPCG06F21/602G06F21/78
Inventor 陶航
Owner SAGE MICROELECTRONICS CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products