Decryption method, device and system, medium and equipment

A device and protocol technology, applied in the field of decryption, which can solve the problems of data theft and the system being easily accessed by lawbreakers

Active Publication Date: 2020-12-22
GUIZHOU BAISHANCLOUD TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] As can be seen from the above description, for an attacker who can access the physical server, while the hard disk password is set to be automatically decrypted, which is convenient for management, there is also a risk that the system is easily accessed by criminals, resulting in data theft.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decryption method, device and system, medium and equipment
  • Decryption method, device and system, medium and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050]In order to make the purpose, technical solutions and advantages of the embodiments of this paper clearer, the technical solutions in the embodiments of this paper will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of this paper. Obviously, the described embodiments are the Some, but not all, embodiments. Based on the embodiments herein, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts fall within the scope of protection herein. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0051] According to the description in the background technology, when the device is in an unsafe environment, for an attacker who can access the physical server, among the various passwords set by the system, the hard disk password is very important, but fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a decryption method, device and system, a medium and equipment. The decryption method comprises the following steps: receiving a decryption request which is sent by first equipment and comprises authentication information; judging whether the decryption request is allowed or not based on the authentication information; and if the decryption request is allowed, sending thedecryption request to second equipment to enable the second equipment to send decryption information to the first equipment so as to enable the first equipment to execute decryption operation. On thebasis of an automatic decryption technology, a decryption verification step is added, and a decryption request is authenticated; and meanwhile, the decryption request and the decryption information are sent in an https protocol mode, so that the safety of the decryption information and the reliability of a decryption system are improved while automatic decryption of the hard disk is realized and the safety of data in the hard disk is ensured.

Description

technical field [0001] This article relates to the field of network security, especially a decryption method. Background technique [0002] When the physical server is in an unsafe environment, in order to ensure data security, there is a need for system disk encryption. However, after the system disk is encrypted, each time the server is restarted, a password must be entered to decrypt the hard disk before re-entering the system. Moreover, when entering the password, it is necessary to manually connect the monitor and keyboard to operate, and this method of operation not only increases the risk of password leakage, but also becomes inoperable when there are many servers. In view of the above deficiencies, the automatic decryption technology is introduced, that is, the auxiliary decryption information is placed on the web server. When the encrypted server needs to be decrypted, the auxiliary decryption information is obtained from the web server, and the auxiliary decryption...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/0428H04L69/08H04L63/168
Inventor 高旦蔡少君吴少洪张金水
Owner GUIZHOU BAISHANCLOUD TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products