Supercharge Your Innovation With Domain-Expert AI Agents!

Security data storage management method and system and security storage management module

A technology for secure storage and management modules, which is applied in the field of secure data storage management and secure storage management modules, can solve problems such as illegal access, data leakage, and system crashes, and achieve improved confidentiality, confidentiality, confidentiality and The effect of completeness

Active Publication Date: 2019-11-12
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the process of data storage and access, if there is no safe and reliable management mechanism, it is very vulnerable to attacks such as replay, tampering, and eavesdropping, resulting in data leakage, disorder, loss, and even system crashes
[0003] Usually, when the data access subject initiates an access request, the traditional access control method only judges according to whether the access subject has authority, and cannot know whether the requesting access subject is in a safe operating environment
Even if the access subject has legal authority, if the access subject in a malicious environment accesses the data, it will still cause data leakage and illegal access. For example, after the access subject passes the access control verification and obtains the data, the malicious program can attack and intercepted data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security data storage management method and system and security storage management module
  • Security data storage management method and system and security storage management module
  • Security data storage management method and system and security storage management module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] The core of the present application is to provide a safe data storage management method, system and safe storage management module, which are used to ensure the confidentiality, integrity and availability in the process of data storage.

[0071] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0072] Please refer to figure 1 , figure 1 It is a flowchart of a method for secure data storage manageme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure data storage management method. The method comprises the steps of sending a storage space application request; decrypting the storage space application request by using the private key to obtain a first access certificate and application information; randomly generating a second access certificate, determining an initial address of the storage space, and then allocating the storage space; encrypting the second access certificate to obtain encrypted information, and sending the encrypted information to the process or the equipment; and enabling the process or the equipment to store the to-be-stored data into the storage space. According to the method, the storage space application request sent by the process or the equipment is encrypted, decrypted and verified in combination with the asymmetric password, so that attacks such as replay and tampering in data storage and access processes are effectively resisted, and the confidentiality and integrity of data are ensured; and the confidentiality, the integrity and the availability in the data storage and access process are improved. The invention further provides a security data storage management system and a security storage management module, which have the above beneficial effects.

Description

technical field [0001] The present application relates to the field of data storage, in particular to a method and system for secure data storage management and a secure storage management module. Background technique [0002] In the process of data storage and access, if there is no safe and reliable management mechanism, it is very vulnerable to attacks such as replay, tampering, and eavesdropping, resulting in data leakage, disorder, loss, and even system crashes. [0003] Usually, when the data access subject initiates an access request, the traditional access control method only judges according to whether the access subject has authority, and cannot know whether the requesting access subject is in a safe operating environment. Even if the access subject has legal authority, if the access subject in a malicious environment accesses the data, it will still cause data leakage and illegal access. For example, after the access subject passes the access control verification ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/78G06F21/44
CPCG06F21/602G06F21/604G06F21/78G06F21/44G06F2221/2141
Inventor 洪超明哲许爱东陈华军丁伟戴涛
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More