Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key management method and system

A key management and processing subsystem technology, applied in the field of key management, can solve problems such as hidden dangers of information security, and achieve the effect of reducing the risk of leakage

Active Publication Date: 2022-04-22
BEIJING STARBLAZE TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The software run by the control part of the existing storage device has the opportunity to access the data key used for encryption or decryption, resulting in the storage device supplier having the opportunity to access the user's sensitive information, which brings hidden dangers to information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management method and system
  • Key management method and system
  • Key management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The technical solutions in the embodiments of the present application are clearly and completely described below in combination with the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of this application.

[0061] figure 2 is a schematic diagram of a key management system according to an embodiment of the present application.

[0062] According to the embodiment of the present application, the host 210 accesses the storage device through the host interface 221 . The control unit 220 includes a command processing unit 222 and a key management unit 223 . The command processing unit 222 acquires and processes commands provided by the host 210 . The commands provided by the host 210 in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a key management method and system, and relates to the field of information security. The main technical solution of this application is: receiving the input user key, performing hash operation on the user key to obtain the hash value of the user key; reading the encrypted value of the data key from the storage medium, using the user key The key hash value decrypts the encrypted value of the data key to obtain the data key, and uses the data key to encrypt or decrypt user data. By adopting the key management method and system provided by this application, the software running on the storage device cannot directly access the key for encrypting and decrypting data, thereby achieving hardware-level protection of the key and reducing the risk of leakage.

Description

technical field [0001] The present application relates to the field of information security, in particular to a key management method and system for data encryption or decryption of storage devices. Background technique [0002] figure 1 A block diagram showing the memory device. The storage device 102 is coupled with the host, and is used to provide storage capabilities for the host. The host and the solid-state storage device 102 can be coupled in various ways, including but not limited to SATA (Serial Advanced Technology Attachment, serial advanced technology attachment), SCSI (SmallComputer System Interface, small computer system interface), SAS (Serial Attached SCSI, serial connection SCSI), IDE (Integrated Drive Electronics, integrated drive electronics), USB (Universal SerialBus, universal serial bus), PCIE (Peripheral Component Interconnect Express, PCIe, high-speed peripheral component interconnection), NVMe (NVM Express, high-speed non-volatile storage), Etherne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32H04L9/08H04L9/06
CPCH04L9/08H04L9/0643H04L63/06H04L9/3236H04L9/0822
Inventor 王祎磊黄好城傅海龙其他发明人请求不公开姓名
Owner BEIJING STARBLAZE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products