Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encrypted data storage system and method based on remote storage of key

A storage system and technology for encrypting data, applied in the fields of information transmission and storage and information security, can solve the problems of safe separation and storage of encryption keys and ciphertext data, achieve unconditional security, low power consumption, and improve data security protection level Effect

Active Publication Date: 2021-04-13
ANHUI QASKY QUANTUM SCI & TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention is to provide an encrypted data storage system and method based on remote storage of keys for the above-mentioned deficiencies in the prior art. Unable to solve the problem of how to securely separate and store the encryption key and ciphertext data, the present invention can solve the problem of key security in the process of structured and unstructured data storage, database storage, data backup, cloud storage and cloud computing Storage and ciphertext data encryption and decryption storage problems, because the amount of encrypted keys can be many times smaller than the stored data, storing and managing the key store (key storage device) in different places is much less difficult than strictly managing data, so it can be effectively solved Security issues in the storage and computing process of various structured and unstructured data storage and databases, cloud storage and cloud computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted data storage system and method based on remote storage of key
  • Encrypted data storage system and method based on remote storage of key
  • Encrypted data storage system and method based on remote storage of key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0096] Example 1: see figure 2 , figure 2 Only the basic structure of the key off-site storage system 2 and the data encryption and decryption storage system 3 in the database system application is illustrated, that is, the basic security principles for establishing database encryption storage and access, and database security backup are illustrated, and the key-based off-site storage is completed. The encrypted data storage system in the database system is combined with various security control devices in the database system to improve the security of the data. The specific structure is as follows.

[0097] The encrypted data storage system based on key off-site storage is in the database application system, the database application system refers to a structured database application system, or an unstructured database application system, or a cloud storage application system. Key offsite storage system 2 , data encryption and decryption storage system 3 , data security sto...

Embodiment 2

[0101] Example 2: see image 3 , image 3 Only the basic structure and principle of the encrypted data storage system based on key off-site storage in the database active-active application is shown, and the combination of the encrypted data storage system based on key off-site storage and the database active-active system encryption device is completed, which greatly improves the database. The security of the active-active system and the high reliability guarantee of the active-active database application are improved. The specific structure is as follows.

[0102] The database active-active system of the encrypted data storage system based on key off-site storage, wherein the database application system can be a structured database application system, an unstructured database application system, or an active-active or multi-active database system of a cloud storage application system , the system structure includes a control center, an off-site key storage system 2 , a firs...

Embodiment 3

[0105] Embodiment 3: see Figure 4 , Figure 4 It only illustrates the basic structure and principle of the application of the dual-key remote storage system 2 based on the encrypted data storage system stored in different places, which realizes multiple remote storage of keys and improves the efficiency and security of key storage. The dual-key off-site storage system 2 includes a key control center 1, a data security storage system 15, a first key off-site storage system 25, and a second key off-site storage system 26; the data security storage system 15 includes a data encryption and decryption storage system 3;

[0106] The key control center 1 controls the data encryption and decryption storage system 3, the first key remote storage system 25 and the second key remote storage system 26 to work, and the specific encryption method and decryption method are the same as figure 1 The encryption method and decryption method in the structure are basically the same, the differe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encrypted data storage system and method based on key remote storage, including a key control center, a key remote storage system, and a data encryption and decryption storage system. The key remote storage system includes a first key control device, The key storage device and the first quantum key distribution device, the data encryption and decryption storage system includes the second key control device, the data encryption and decryption storage device and the second quantum key distribution device, the first quantum key distribution device and the second The quantum key distribution device is connected by quantum communication, the first key control device is respectively connected with the key storage device and the first quantum key distribution device, and the second key control device is respectively connected with the data encryption and decryption storage device and the second quantum encryption device. The key distribution device is connected by communication; the present invention can safely and reliably set the remote key storage system and the data encryption and decryption storage system to be separated at any distance, so as to realize the separate safe storage of the encryption and decryption key and the data.

Description

technical field [0001] The invention relates to the fields of information transmission and storage and information security, in particular to an encrypted data storage system and method based on key remote storage. Background technique [0002] Information is an important strategic resource for social development. From national security to personal privacy protection, all levels are related to information security. Among them, under the promotion of digital technology, the storage and flow transmission of information into data are two crucial links in the process of information flow and use. In these two links, information and data are safe from eavesdropping and theft. Therefore, how to protect the security of information and data is an eternally important topic. [0003] In the field of data storage, with the accumulation of current data volume and the substantial expansion of data applications, in addition to personal computers, enterprise servers and storage centers, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L9/0819H04L9/0852H04L63/062H04L67/1097H04L9/0894H04L9/0822G06F21/602G06F21/6218H04L63/0428G06F11/1451G06F11/1464G06F11/1469G06F21/78
Inventor 韩正甫王剑锋苗春华尹凯刘婧婧刘云
Owner ANHUI QASKY QUANTUM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products