Method, device and system for storing/reading data
A technology for storing and reading data, which is applied in the field of information security, can solve problems such as inconvenience, key theft management, etc., and achieve the effect of simple and novel methods and difficult storage management
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 approach
[0049] image 3 is a flowchart of a method for storing / reading data according to an embodiment of the present invention. Wherein, the method for storing / reading data according to the embodiment of the present invention is applied in the system 1 . It should be noted that, in this embodiment, according to different requirements, image 3 The order of execution of the steps in the flowcharts shown may be changed, and / or certain steps may be omitted.
[0050] refer to image 3 , the method for storing / reading data according to an embodiment of the present invention includes steps:
[0051] S310, using the superlattice cryptographic device 20 to generate a physical random signal.
[0052] Specifically, in order to ensure that the keys generated by the first device 12 and the second device 13 are the same (or the same as possible to the greatest extent possible), so that there is no need to transfer the keys between the storage party and the reader, it is necessary Ensure that...
no. 2 approach
[0077] Figure 5 is a flowchart of a method for storing data according to an embodiment of the present invention. In the detailed description of this embodiment, the storage side (that is, the first device 12) is taken as the starting point. refer to Figure 5 , the method for storing data according to an embodiment of the present invention includes steps:
[0078] S510, the superlattice cryptographic device 20 of the first device 12 generates a first physical random signal.
[0079] Here, the superlattice cryptographic device 20 of the first device 12 can generate a first physical random signal driven by a signal of a specific form, and the first physical random signal is a true random signal.
[0080] S520, the first device 12 encrypts the data to be stored according to the first physical random signal to generate encrypted data.
[0081] Specifically, first, the key generation module 21 of the first device 12 generates a random encryption key and configuration informati...
no. 3 approach
[0085] Figure 6 is a flowchart of a method for reading data according to an embodiment of the present invention. In the detailed description of this embodiment, the reader (namely the first device 13) is taken as the starting point. refer to Figure 6 , the method for reading data according to an embodiment of the present invention includes steps:
[0086] S610, the writing and reading module 23 of the second device 13 reads encrypted data from the storage medium 2 .
[0087] Of course, here, as mentioned above, the first device 12 encrypts the data according to the first physical random signal generated by its superlattice cryptographic device 20 to obtain encrypted data, and writes the encrypted data into the storage medium 2. For details, please refer to the above describe.
[0088] S620, the superlattice cryptographic device 20 of the second device 13 generates a second physical random signal.
[0089] Here, the specific form of the signal that drives the superlattic...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


