Access management method and system for storage data

A technology for access management and data access, which is applied in the field of access management methods and systems for stored data, and can solve problems such as increasing data encryption and decryption time, implementation cost, time-consuming, and hardware implementation difficulty

Active Publication Date: 2017-05-10
HUNAN GOKE MICROELECTRONICS
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, because it usually takes a certain amount of time to collect identity information for applications that access encrypted data, it also brings certain difficulties to hardware implementation, which in tu...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access management method and system for storage data
  • Access management method and system for storage data
  • Access management method and system for storage data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0045] The access management method and system for storing data provided by the embodiments of the present invention can be used in intelligent security chips. A double matching of the access address and the identity information is requested, and after the double matching is successful, data access is performed on the storage module of the chip according to the storage access request.

[0046] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an access management method and system for storage data. The method comprises the steps that an access storage request is received, wherein the access storage request includes an access address and identity information; whether a storage unit which matches the access address exists is determined; if a storage unit which matches the access address exists, whether the identity information has the access right of the storage unit is determined; and if the identity information has the access right of the storage unit, data access is carried out on the storage unit according to the access storage request. According to the embodiment of the invention, a storage module does not need to take the initiative to collect the identity of a data access side, which reduces the hardware implementation cost and improves the efficiency of data access; whether the data access side can carry out data access is determined by double matching the storage unit and the access right; and the safety of the storage data can be effectively protected.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to an access management method and system for storing data. Background technique [0002] As information security is paid more and more attention by people, the encryption and decryption transmission of various application data in terminal equipment has become an important means to ensure information security. Encryption and decryption transmission refers to the use of encryption and decryption devices to encrypt the data of different application categories at the chip sending end in the terminal equipment, and send the encrypted data to the chip receiving end, and the chip receiving end uses the encryption and decryption device to decrypt the received encrypted data. The restored application data is obtained, and the restored application data is stored in the memory module of the chip for reading and consumption by the relevant application consumption module. In order to pre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/08H04L63/10
Inventor 欧阳邦见华力唐伟曹祥荣朱健余方桃黄新军
Owner HUNAN GOKE MICROELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products