Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption method, device and decryption method, device

An encryption method and encryption and decryption technology are applied in the fields of encryption methods, devices, devices and decryption methods, and can solve problems such as leakage, incomplete pages, and page theft.

Active Publication Date: 2019-11-22
HYGON INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides an encryption method, device, and decryption method and device to solve the problem that the page is stolen or leaked when the page is swapped out from the memory to the Swap space, and when the page is swapped into the memory from the Swap space, the page incomplete question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method, device and decryption method, device
  • Encryption method, device and decryption method, device
  • Encryption method, device and decryption method, device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the drawings and embodiments of the embodiments of the present invention.

[0028] figure 1 A schematic diagram of generating a swap page root key (SwapRootKey) provided by an embodiment of the present invention. Such as figure 1 As shown, when the computer is just started, a one-time key, namely SwapRootKey, is generated in the computer and stored in the encryption and decryption hardware. The encryption and decryption hardware can be a secure processor (Secure Processor), and this SwapRootKey only The hardware is ready to use, and every time the computer is restarted, a new SwapRootKey is generated.

[0029] The encryption and decryption hardware provides the interface ENCRYPT_FOR_PAGE_OUT, which can also be implemented by directly ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention relates to an encryption method, device, and decryption method and device. The encryption method includes: the encryption and decryption hardware receives the physical address and PageAttribute of the first page sent by the OS; and generates the second page after being triggered by the physical address and PageAttribute. A random number; according to the pre-stored SwapRootKey and the first random number, generate a first key and a second key; according to the first key, encrypt the first page to generate the encrypted content of the first page; key, the first random number, the second random number, IV, the encrypted content of the first page and PageAttribute, and generate the MAC of the first page; wherein, the first random number, the second random number, IV, PageAttribute, MAC and the first The encrypted content of the page, which constitutes encrypt_facility_info. In this way, the page is prevented from being stolen or leaked when the page is swapped out from the memory to the Swap space.

Description

technical field [0001] The invention relates to the field of computer security, in particular to an encryption method and device, and a decryption method and device. Background technique [0002] During the operation of the computer server system, for some reason, such as insufficient physical memory, some pages (Page) in the memory need to be swapped out to the swap (Swap) space, so as to give the physical page to the virtual machine or other virtual machine use. [0003] When the server operating system (Operating System, OS) in the computer is performing Swap processing, for example, in Advanced Micro Devices (Advanced Micro Devices, AMD) Secure Encrypted Virtualization (Secure Encrypted Virtualization, SEV) encryption, Secure Storage Encryption (Secure In the Memory Encryption (SME) scheme, when the physical page is swapped out to the Swap space, it is not encrypted, that is, the content stored in the Swap space is not encrypted. At this time, hackers or criminals can s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F12/14G06F12/1009H04L9/08
CPCG06F21/602G06F21/64G06F12/1408G06F12/1009H04L9/3242H04L9/14H04L9/0869
Inventor 张宗耀应志伟杜朝晖
Owner HYGON INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More