System and method for full disk encryption based on hardware

A technology of full disk encryption and encryption key, which is applied in the field of information security and can solve problems such as leakage of sensitive data

Inactive Publication Date: 2015-09-30
INST OF INFORMATION ENG CAS
View PDF4 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Regardless of the attack method, it will eve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for full disk encryption based on hardware
  • System and method for full disk encryption based on hardware
  • System and method for full disk encryption based on hardware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Aiming at the problems and loopholes in the existing full-disk encryption system solutions, the present invention proposes a hardware-based full-disk encryption scheme in which encryption keys and encrypted hard disks are physically separated. The present invention will be further described below in conjunction with the accompanying drawings.

[0048] Such as figure 1 Shown is a schematic structural diagram of a hardware-based full-disk encryption system. The hardware-based full-disk encryption system includes encrypted hard disks and authenticated UKeys. The encrypted hard disk includes a hard disk interface, an interface controller, a buffer memory, a microcontroller, an encryption and decryption module, a data transmission chip, a hard disk drive chip, a spindle motor, an encrypted data storage area and a reserved area. The hard disk interface is connected to the main board of the computer, and is used to provide an external system for reading / writing the hard disk...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system and method for full disk encryption based on hardware. The method comprises the following steps: (1) performing registration and binding on a blank encryption hard disk of a host and a certification UKey through a registration center; storing a certification program and an identity key to a reserved area of the encryption hard disk; storing the identity key, an encryption Key and the certification program through the UKey; (2) prior to electrification of the host, inserting the UKey in the host; (3) after electrification, executing encryption hard disk and UKey mutual authentication; (4) after the authentication is successful, through the encryption hard disk, storing the Key obtained from the UKey in a buffer area memory undergoing power down loss; through an encryption and decryption module, using the Key to decrypt data and starting an operating system of the host; and (5) after the operating system is started, through the encryption and decryption module, utilizing the Key to decrypt read data, encrypt read-in data and then store the read-in data to an encrypted data storage area of the encryption hard disk. The system and method for full disk encryption based on the hardware greatly improves hard disk data security.

Description

technical field [0001] The invention relates to the field of information security. The hardware-based full-disk encryption system uses hardware to encrypt data on the entire hard disk, preventing unauthorized access to data on the hard disk. Background technique [0002] In today's society, with the increasing degree of informatization, the sensitive data of units or institutions is stored in an increasing proportion of information devices, and the security of these data has become a concern for everyone. According to the actual application environment, we divide the information devices that store sensitive data into two categories according to their mobility: one is sensitive data stored on fixed information devices within the organization, and the other is stored on removable and portable storage media of sensitive data. Both types of sensitive data storage methods have different degrees of leakage risk. [0003] Sensitive data stored on fixed information devices within...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14
Inventor 荆继武夏鲁宁王平建刘宗斌马存庆韩晔
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products