Supercharge Your Innovation With Domain-Expert AI Agents!

Generation protection method and system of encrypted storage key, terminal and readable storage medium

A technology of encrypted storage and encryption algorithm, which is applied in key distribution, can solve problems such as hidden dangers of data security, loss of data protection, insufficient key strength, etc., and achieve the effect of improving protection strength

Inactive Publication Date: 2019-07-30
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, when user data is stored, most of them use passwords, fingerprints, finger veins, etc. for access control, while most of the data is encrypted and protected by using pseudo-random numbers as protection keys when prefabricated or initialized by hard disk manufacturers. Insufficient, data security has great security risks, and it is easy to be cracked, resulting in the loss of effective protection of data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generation protection method and system of encrypted storage key, terminal and readable storage medium
  • Generation protection method and system of encrypted storage key, terminal and readable storage medium
  • Generation protection method and system of encrypted storage key, terminal and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions protected by the present invention will be clearly and completely described below using specific embodiments and accompanying drawings. Obviously, the implementation described below Examples are only some embodiments of the present invention, but not all embodiments. Based on the embodiments in this patent, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this patent.

[0058] The invention provides a method for generating and protecting encrypted storage keys, such as figure 1 As shown, the methods include:

[0059] S1, perform power-on initialization configuration on the security module;

[0060]The security module may be software and / or firmware executed by processing circuitry including one or more processors, such as one or more digital signal proc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a generation protection method and system of an encrypted storage key, a terminal and a readable storage medium. The generation protection method comprises the following steps:encrypting a preset protection key and a working key by adopting a preset encryption algorithm, and storing a ciphertext; the user setting a user password through the upper management server and binding the user password to the password device; synthesizing the temporary master key and a preset user password into a preset user password master key; a security module generating a first random number, and performing XOR operation on the first random number and a preset protection key to form a first protection key; comparing the input user password master key with a preset user password master key stored in a security module; if the comparison is passed, passing identity authentication. According to the method and the system, the user identity is discriminated, one-time encryption of the protection key is realized, and the protection strength of the storage protection key is greatly improved. The security module supports safe storage of random number generation, a symmetric cryptographicalgorithm, an asymmetric encryption algorithm and a secret key.

Description

technical field [0001] The invention relates to the technical field of data encryption, in particular to a method for generating and protecting an encrypted storage key, a system, a terminal and a readable storage medium. Background technique [0002] In information systems, whether user data is stored in local storage or cloud storage, there is a risk of data theft and abuse when the protection strength is relatively low. Data is the core asset, and the hard disk, as the final carrier of data storage, is the last line of defense for data protection. Storage security faces increasingly stringent security requirements. [0003] At present, when user data is stored, most of them use passwords, fingerprints, finger veins, etc. for access control, while most of the data is encrypted and protected by using pseudo-random numbers as protection keys when prefabricated or initialized by hard disk manufacturers. Insufficient, data security has great security risks, and it is easy to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/06H04L9/32
CPCH04L9/0618H04L9/0822H04L9/0825H04L9/0869H04L9/3226H04L9/3234
Inventor 李婷孙大军马双涛刘凯
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More