Pluggable type hardware encryption storage method and system

A hardware encryption and storage system technology, applied in the field of storage information security, can solve the problems of complex cryptographic operations, insecure information storage, easy to crack encryption methods, etc., to achieve broad application prospects, ensure security, and highlight substantial characteristics. Effect

Inactive Publication Date: 2017-05-31
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to solve the problems existing in the above-mentioned prior art, such as insecure information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pluggable type hardware encryption storage method and system
  • Pluggable type hardware encryption storage method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Below in conjunction with accompanying drawing, the present invention is described in further detail:

[0030] Such as figure 1 As shown, a pluggable hardware encryption storage method provided by the present invention includes the following steps:

[0031] (1) According to storage encryption requirements, the data to be stored is divided into several data packets. The higher the encryption level, the larger the number of data packets and the smaller the capacity of the data packets. In this embodiment, the metadata size is M bits, The size of each packet is m bits, and the number of splits is N; in this embodiment, M is divisible by m, so N=M / m. In other embodiments of the present invention, when M is not divisible by m, the quotient obtained is N-1, and the remaining part becomes a data packet.

[0032] (2) Mark the split data packet with a sequence number to record the order of the information in the data packet in the original data, and then randomly store the dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a pluggable type hardware encryption storage method and system. The method includes the following steps that (1) metadata needing to be stored is split into a number of data packets; (2) the data packets are stored randomly, and a key file is formed; (3) the key file is stored in pluggable type hardware; (4) the pluggable type hardware is pulled out, and encryption is achieved. The storage system includes a mainframe, a solid-state hard disk, a secret key and a pluggable type hardware, wherein the solid-state hard disk, the secret key and the pluggable type hardware are arranged on the mainframe. According to the method and the system, information separation storage of a header file and actual data can be achieved, when the pluggable type hardware is pulled out, the specific location in which the data is located and the corresponding order of data is not found, and data information can not be obtained, the encryption function is achieved, conditions are provided for the safety of the solid-state hard disk and the multi-user use, and when the system is used by multiple users, the safety of the data of each user can be effectively ensured.

Description

technical field [0001] The invention belongs to the technical field of storage information security, and in particular relates to a pluggable hardware encryption storage method and system. Background technique [0002] With the continuous improvement of social informatization, information leakage has become a great hidden danger in people's lives. In the process of using the server, users increasingly hope that the data stored in them will be more secure, and various encryption methods have emerged as the times require. [0003] Common computer encryption methods include biometric encryption, system built-in encryption, and software encryption. Among them, software encryption is to call the information security module to encrypt the information before the user sends the information, and then send it. After reaching the recipient, the user uses the corresponding decryption software to decrypt and restore it. However, the use of software encryption is easy to be cracked by a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/78G06F21/62
CPCG06F21/78G06F21/6227
Inventor 张曼曼李鹏黄家明乔英良曹光耀
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products