Method, device and electronic equipment for encrypting and decrypting data based on microkernel
A microkernel, encryption and decryption technology, applied in the field of microkernel, can solve the problems of decryption data encryption and decryption cost, unable to encrypt data, etc., and achieve the effect of reducing costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0036] The embodiment of the present application provides a method for encrypting and decrypting data based on a microkernel, such as figure 2 As shown, the method includes:
[0037] Step S201 , when it is detected that the storage domain receives the first preset operation request, obtain corresponding data through the storage domain based on the first preset operation request.
[0038] The first preset operation request includes: a first data write request or a first data read request, and the storage domain is a domain created based on the microkernel for storage.
[0039]For this embodiment of the present application, before step S201, the method further includes: creating a storage domain in advance. In this embodiment of the present application, the storage domain is used to obtain the data to be written from the buffer, and encrypt the data to be written, or is used to temporarily store the data read from the storage hardware after decrypting the data to be written in...
Embodiment 2
[0048] The embodiment of the present application provides another possible implementation manner. On the basis of the first embodiment, the method shown in the second embodiment is also included, wherein,
[0049] Detecting that the storage domain receives the first preset operation request, it also includes steps S301 (not marked in the figure) and S302 (not marked in the figure), wherein
[0050] Step S301 , when it is detected that any operating system receives the second preset operation request sent by the upper-layer application, based on the second preset operation request, determine the corresponding first preset operation request.
[0051] Wherein, the second preset operation request includes: a second data write request or a second data read request.
[0052] For this embodiment of the present application, the first data writing request and the second data writing request may use the same communication protocol, or may use different communication protocols. In this ...
Embodiment 3
[0060] Another possible implementation manner of the embodiment of the present application further includes the operation shown in the third embodiment on the basis of the second embodiment, wherein,
[0061] Step S301-step S302 includes step S401 (not marked in the figure)-step S402 (not marked in the figure); step S201 includes step S403 (not marked in the figure); in step S202, the obtained data is encrypted by the storage domain , obtain the encrypted data, including step S404 (not marked in the figure), wherein,
[0062] Step S401 , when it is detected that any operating system receives the second data write request sent by the upper-layer application, based on the second data write request, determine the corresponding first data write request.
[0063] For this embodiment of the present application, step S401 may include: when it is detected that any operating system receives the second data write request sent by the upper-layer application, the operating system that sen...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



