Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and system for storing/reading data

A technology for storing and reading data, which is applied in the field of information security, can solve problems such as inconvenience, key theft management, etc., and achieve the effect of simple and novel methods and difficult storage management

Pending Publication Date: 2020-06-23
SUZHOU INST OF NANO TECH & NANO BIONICS CHINESE ACEDEMY OF SCI
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the key data used for encryption and decryption needs additional storage and management, in practical applications, the key has a great risk of being stolen and many management inconveniences

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for storing/reading data
  • Method, device and system for storing/reading data
  • Method, device and system for storing/reading data

Examples

Experimental program
Comparison scheme
Effect test

no. 1 approach

[0049] image 3 is a flowchart of a method for storing / reading data according to an embodiment of the present invention. Wherein, the method for storing / reading data according to the embodiment of the present invention is applied in the system 1 . It should be noted that, in this embodiment, according to different requirements, image 3 The order of execution of the steps in the flowcharts shown may be changed, and / or certain steps may be omitted.

[0050] refer to image 3 , the method for storing / reading data according to an embodiment of the present invention includes steps:

[0051] S310, using the superlattice cryptographic device 20 to generate a physical random signal.

[0052] Specifically, in order to ensure that the keys generated by the first device 12 and the second device 13 are the same (or the same as possible to the greatest extent possible), so that there is no need to transfer the keys between the storage party and the reader, it is necessary Ensure that...

no. 2 approach

[0077] Figure 5 is a flowchart of a method for storing data according to an embodiment of the present invention. In the detailed description of this embodiment, the storage side (that is, the first device 12) is taken as the starting point. refer to Figure 5 , the method for storing data according to an embodiment of the present invention includes steps:

[0078] S510, the superlattice cryptographic device 20 of the first device 12 generates a first physical random signal.

[0079] Here, the superlattice cryptographic device 20 of the first device 12 can generate a first physical random signal driven by a signal of a specific form, and the first physical random signal is a true random signal.

[0080] S520, the first device 12 encrypts the data to be stored according to the first physical random signal to generate encrypted data.

[0081] Specifically, first, the key generation module 21 of the first device 12 generates a random encryption key and configuration informati...

no. 3 approach

[0085] Figure 6 is a flowchart of a method for reading data according to an embodiment of the present invention. In the detailed description of this embodiment, the reader (namely the first device 13) is taken as the starting point. refer to Figure 6 , the method for reading data according to an embodiment of the present invention includes steps:

[0086] S610, the writing and reading module 23 of the second device 13 reads encrypted data from the storage medium 2 .

[0087] Of course, here, as mentioned above, the first device 12 encrypts the data according to the first physical random signal generated by its superlattice cryptographic device 20 to obtain encrypted data, and writes the encrypted data into the storage medium 2. For details, please refer to the above describe.

[0088] S620, the superlattice cryptographic device 20 of the second device 13 generates a second physical random signal.

[0089] Here, the specific form of the signal that drives the superlattic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for storing / reading data. The method comprises the following steps: generating a physical random signal by using a superlattice cipher device; and encrypting and storing to-be-stored data according to the physical random signal, or reading and decrypting the encrypted and stored data. The invention further discloses a device and a system. The method for storing and / or reading the data is simple and novel, the characteristics of the superlattice device based on an intrinsic physical security mechanism and the advantage of high bandwidth of the superlattice device are brought into full play, the problem that a secret key is difficult to store and manage in data encryption protection is solved, and the method has the advantages of high reliability, unconditional security of stored data and the like.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular, to a method, device and system for storing / reading data. Background technique [0002] Information security is a fundamental requirement of the information society. Especially since the 21st century, with the development of Internet finance, mobile payment, mobile office, cloud computing and other services, the importance of information security has become more prominent. In order to protect key business data and reduce the risk of data being copied and stolen in storage media, data systems now use encryption technology to varying degrees. [0003] In the current data storage encryption technology, the security of data largely depends on the security of the key. Since the key data used for encryption and decryption needs to be additionally stored and managed, in practical applications, the key has a great risk of being stolen and many inconveniences in managem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/78
CPCG06F21/602G06F21/78
Inventor 吴涵殷志珍宋贺伦刘佩华张耀辉
Owner SUZHOU INST OF NANO TECH & NANO BIONICS CHINESE ACEDEMY OF SCI