Disk decoding method and device of electronic equipment

A technology of electronic equipment and disk, applied in the protection of internal/peripheral computer components, digital data authentication, etc., can solve the problems of cumbersome disk decryption process, achieve the effect of ensuring safety and simplifying manual operation

Active Publication Date: 2017-11-03
BEIJING BANGCLE TECH CO LTD
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But every time it is turned on, the user needs to manually enter the key, etc., which makes the disk decryption process more cumbersome. Therefore, it is necessary to provide a simple and safe electronic device disk decryption solution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Disk decoding method and device of electronic equipment
  • Disk decoding method and device of electronic equipment
  • Disk decoding method and device of electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0047] In order to describe in detail the disk decryption method of the electronic device provided in Embodiment 1, a specific implementation example will be described below. The electronic device in this embodiment is specifically a server, and an applicable scenario of the present application is briefly introduced below. Such as figure 2 as shown, figure 2 The outermost among them is server 10, and Ubuntu server system 20 is installed on server 10, can simulate a plurality of virtual machines 30 (Virtual Box) on above-mentioned server 10 usually, promptly on the disk of this server 10, for every virtual machine 30 divides a section of disk storage space, and the Ubuntu system 40 is also running in the virtual machine 30. Generally, a service program (not shown) is running in the Ubuntu system 40. These service programs can respond to the operation of the client (not shown), Provide services to clients. In addition, a ukey device (not shown) can be connected to the above...

Embodiment 1

[0069] The disk decryption method provided in Embodiment 1 is executed in the electronic device, and the disk decryption scheme is also executed on the side of the ukey device. Based on this, this embodiment 3 provides a disk decryption method of the electronic device, which is applied to the ukey device, such as image 3 As shown, it specifically includes the following steps:

[0070] Step S31: Receive the authentication information sent by the electronic device, wherein the received authentication information is generated by the electronic device after detecting that the ukey device is connected under the trigger of the detection trigger condition, and the generated authentication information corresponds to the detection trigger condition .

[0071] The detection trigger condition in this step includes: a first detection trigger condition and a second detection trigger condition; the ukey device stores: a first key corresponding to the first detection trigger condition, and,...

Embodiment 4

[0077] Corresponding to the disk decryption method for electronic equipment provided in Embodiment 1, the present application also provides a disk decryption device, which can be applied on the electronic equipment side, and is used to simplify the manual work required for disk decryption under the premise of ensuring the safety of the electronic equipment. Operation, the device may include:

[0078] An authentication information generating module, configured to generate authentication information corresponding to the detection trigger condition when the ukey device is detected to be connected under the trigger of the detection trigger condition;

[0079] An authentication information sending module, configured to send the authentication information to the ukey device, so that the ukey device generates verification information after calculating the authentication information according to the stored key corresponding to the detection trigger condition;

[0080] The verification...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a disk decoding method and device of electronic equipment. The disk decoding method and device are used for simplifying artificial operation needed for disk decoding on the premise that the safety of the electronic equipment is guaranteed. The method comprises the steps that it is detected that authentication information corresponding to detection triggering conditions are generated when ukey equipment is connected triggered by the detection triggering conditions; the authentication information is sent to the ukey equipment, so that the ukey equipment conducts operation on the authentication information and afterwards generates verification information according to a stored secrete key corresponding to the detection triggering conditions; the verification information is obtained, and when it is verified that the verification information is correct, a disk corresponding to the detection triggering conditions is decoded.

Description

technical field [0001] The present application relates to the technical field of computers and information processing, and in particular to a disk decryption method and device for electronic equipment. Background technique [0002] In order to improve the safety of electronic devices and avoid leakage of data stored in the electronic devices, users usually encrypt the disks of the electronic devices, so that the electronic devices need to decrypt the disks every time they are turned on before performing subsequent operations. [0003] At present, when the disk is decrypted, the key is generally manually input by the user when the electronic device is started. When the key entered by the user is verified, the disk is allowed to be decrypted. However, the user is required to manually input a key every time it is turned on, which makes the disk decryption process more cumbersome. Therefore, it is necessary to provide a simple and safe electronic device disk decryption solution...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/34G06F21/80
Inventor 阚志刚陈彪尉爽生卢佐华方宁付杰
Owner BEIJING BANGCLE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products