A method for realizing encrypted volume conversion based on encryption machine

An encryption machine and encryption volume technology, which is applied in the usage of multiple keys/algorithms, encryption devices with shift registers/memory, computer security devices, etc., can solve the problem of increasing the risk of confidential data being stolen and reducing security, etc. problems, to achieve the effect of improving data security, solving security problems, and realizing data migration

Active Publication Date: 2020-09-25
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The transfer of plaintext data through the terminal greatly increases the risk of confidential data being stolen, and the security is greatly reduced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for realizing encrypted volume conversion based on encryption machine
  • A method for realizing encrypted volume conversion based on encryption machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions protected by the present invention will be clearly and completely described below using specific embodiments and accompanying drawings. Obviously, the implementation described below Examples are only some embodiments of the present invention, but not all embodiments. Based on the embodiments in this patent, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this patent.

[0040] This embodiment provides a method for converting an encrypted volume based on an encryption machine, such as figure 1 As shown, the methods include:

[0041] S1, create a logical unit volume on the storage system;

[0042] S2, mapping the logical unit volume to the encryption machine;

[0043] S3, the encryption machine decrypts the encrypted data to be decrypted, and writes the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for converting an encrypted volume based on an encryption machine. The method includes: creating a logical unit volume on a storage system; mapping the logical unit volume to the encryption machine; the encryption machine decrypts the encrypted data to be decrypted, and the decrypted The data is written into the logical unit volume; the encryption machine encrypts the unencrypted data, and the encrypted data is written into the logical unit volume. Through the direct encryption, decryption, reading and writing of the encryption card inside the encryption machine, it provides a method that can realize the direct conversion of encrypted volumes and non-encrypted volumes in the encryption machine without going through the server terminal, which improves data security and realizes the data of encrypted volumes at the same time. migrate. In the encrypted data business, it solves the security problem of data on the client side and the data migration problem limited by the encryption feature.

Description

technical field [0001] The invention relates to the field of storage system data encryption, in particular to a method for converting encrypted volumes based on an encryption machine. Background technique [0002] With the advent of the era of big data, data has become the most important wealth of enterprises, institutions and individuals. Data centralization has become the general trend, and more and more enterprises choose to build their own storage systems, or directly migrate data to the cloud. Such a result, while bringing convenience, also brings hidden dangers to data security. [0003] At present, all storage encryption machines can only encrypt the data written in the server terminal, decrypt the ciphertext written in the storage and read it out to the server terminal, and cannot directly convert between encrypted volumes and unencrypted volumes. The storage system can only read the data through the server terminal, and then manually write the data into the storag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62H04L9/06H04L9/14H04L9/30H04L29/08
CPCH04L9/0631H04L9/14H04L9/302G06F21/602G06F21/6209H04L67/563
Inventor 李顺歌
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products