Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for verifying the authenticity of data encrypted by an encryption device

A technology for encrypting equipment and encrypting data, applied in database model, database update, database index, etc., it can solve the problems such as the lack of universality and generalizability of the test solution, the inability to meet the needs of customers on the existing network, and the poor user experience.

Active Publication Date: 2021-07-06
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the field of data encryption in the current storage system, the verification scheme for the authenticity of the encryption requires special supporting tools, and the test scheme does not have universality and scalability.
Moreover, the existing encryption authenticity verification methods do not take into account the diversity and compatibility of live network application scenarios, the user experience is relatively poor, and cannot meet the needs of customers on the live network, nor can they ensure that the functions are truly usable in the live network application environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for verifying the authenticity of data encrypted by an encryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the technical solution and advantages of the present invention clearer, the technical solution of the present invention will be clearly and completely described below in conjunction with the accompanying drawings.

[0055] The invention provides a specific implementation manner of a method for verifying the authenticity of data encrypted by an encryption device. In this embodiment, the method for verifying the authenticity of the encrypted data of the encryption device includes the following steps s1 to s14, which are used to verify the authenticity of the encryption function in the storage system.

[0056] Step s1, the oracle database is installed on the target non-encrypted disk, and the oracle control file and associated file paths are set to be respectively located on the target non-encrypted disk; the target non-encrypted disk is a preset non-encrypted disk of the target host , the target host is a host on which the authenticity of encrypted data o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and system for verifying the authenticity of encryption data encrypted by an encryption device, all by deploying an oracle database on a target non-encrypted disk, creating an oracle data table on a target non-encrypted disk and a target encrypted disk of a target host, and combining The connection relationship between the target encryption disk and the encryption device and the operation of adding, deleting, modifying and checking the data in the built data table have realized the verification of the authenticity and completeness of the storage encryption function. The present invention not only satisfies the existing network requirements of customers, but also increases user experience to a certain extent, is simple and easy to use, and increases the universality and generalizability of the verification scheme.

Description

technical field [0001] The invention relates to the field of storage system data encryption, in particular to a method and system for verifying the authenticity of encryption data encrypted by an encryption device. Background technique [0002] With the advent of the era of big data, data has become the most important wealth of enterprises, institutions and individuals. Centralized data storage has become the general trend, and more and more enterprises choose to build their own (cloud) storage systems, or directly migrate data to the cloud. [0003] In order to reduce the potential safety hazard of data storage, in the prior art, corresponding encryption equipment, such as an encryption machine, an encryption card, etc., is usually first used to encrypt and decrypt the data in the storage system. [0004] However, in the field of data encryption in the current storage system, the verification scheme for the authenticity of the encryption requires special supporting tools, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/22G06F16/22G06F16/23G06F16/28
CPCG06F11/2273G06F21/602G06F21/6227
Inventor 李顺歌庄甲平张超凡徐艳秋
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products