Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method and device and decryption method and device

An encryption method and encryption and decryption technology, applied in the fields of devices and decryption methods, devices, and encryption methods, can solve problems such as leakage, page theft, and page incompleteness

Active Publication Date: 2018-01-09
HYGON INFORMATION TECH CO LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides an encryption method, device, and decryption method and device to solve the problem that the page is stolen or leaked when the page is swapped out from the memory to the Swap space, and when the page is swapped into the memory from the Swap space, the page incomplete question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and device and decryption method and device
  • Encryption method and device and decryption method and device
  • Encryption method and device and decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the drawings and embodiments of the embodiments of the present invention.

[0028] figure 1 A schematic diagram of generating a swap page root key (SwapRootKey) provided by an embodiment of the present invention. Such as figure 1 As shown, when the computer is just started, a one-time key, namely SwapRootKey, is generated in the computer and stored in the encryption and decryption hardware. The encryption and decryption hardware can be a secure processor (Secure Processor), and this SwapRootKey only The hardware is ready to use, and every time the computer is restarted, a new SwapRootKey is generated.

[0029] The encryption and decryption hardware provides the interface ENCRYPT_FOR_PAGE_OUT, which can also be implemented by directly ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention relate to an encryption method and device and a decryption method and device. The encryption method comprises the following steps of: receiving a physical address and PageAttribute of a first page sent by OS by encryption / decryption hardware; generating a first random number after trigger is carried out through the physical address and the PageAttribute; generating a first secret key and a second secret key according to a pre-stored SwapRootKey and the first random number; encrypting the first page according to the first secret key so as to generate encrypted content of the first page; and generating an MAC of the first page according to the second secret key, the first random number, a second random number, an IV, the encrypted content of the first page and the PageAttribute, wherein the first random number, the second random number, the IV, the PageAttribute, the MAC and the encrypted content of the first page form encrypt-facility-info. Therefore, the page is prevented from stolen or leaked when the page is changed from an internal memory to a Swap space.

Description

technical field [0001] The invention relates to the field of computer security, in particular to an encryption method and device, and a decryption method and device. Background technique [0002] During the operation of the computer server system, for some reason, such as insufficient physical memory, some pages (Page) in the memory need to be swapped out to the swap (Swap) space, so as to give the physical page to the virtual machine or other virtual machine use. [0003] When the server operating system (Operating System, OS) in the computer is performing Swap processing, for example, in Advanced Micro Devices (Advanced Micro Devices, AMD) Secure Encrypted Virtualization (Secure Encrypted Virtualization, SEV) encryption, Secure Storage Encryption (Secure In the Memory Encryption (SME) scheme, when the physical page is swapped out to the Swap space, it is not encrypted, that is, the content stored in the Swap space is not encrypted. At this time, hackers or criminals can s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F12/14G06F12/1009H04L9/08
CPCG06F21/602G06F21/64G06F12/1408G06F12/1009H04L9/3242H04L9/14H04L9/0869
Inventor 张宗耀应志伟杜朝晖
Owner HYGON INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products