Mass storage device encryption method, main controller and access device

A mass storage and encryption method technology, which is applied in the field of information security, can solve the problems of affecting the transmission speed of equipment and low applicability, and achieve the effects of reducing encryption costs, improving security, and saving the analysis process

Active Publication Date: 2021-03-02
HYGON INFORMATION TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, by installing encryption software to implement device encryption, since specific software needs to be installed for operation, the transmission speed of the device will be affected
However, the specially produced mass storage devices with encryption and decryption functions have the problem of low applicability due to the need for special production.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mass storage device encryption method, main controller and access device
  • Mass storage device encryption method, main controller and access device
  • Mass storage device encryption method, main controller and access device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] The embodiment of this application provides an encryption method for mass storage devices applied to the main controller of the access device, which can be found in figure 1 shown, including:

[0043] S101: Obtain characteristic information of mass storage devices.

[0044] In the embodiment of this application, after the mass storage device is connected to the access device, the main controller of the access device can analyze the control transmission with the mass storage device, so as to obtain the characteristics of the mass storage device. information.

[0045] In this embodiment of the present application, the characteristic information of a mass storage device refers to information that can uniquely identify a mass storage device, such as a device descriptor of a mass storage device.

[0046] It should be understood that the device descriptor of a mass storage device consists of 14 fields. Each of its fields can independently reflect certain information of mas...

Embodiment 2

[0088] This embodiment provides a main controller and an access device.

[0089] see figure 2 As shown, the main controller may include an electrically connected parser controller (Parser Control, also called Parser_Ctrl) and an encryption and decryption module. in:

[0090] The analysis controller is used to obtain the characteristic information of the mass storage device, and distinguish the common data transmitted to the mass storage device;

[0091] The encryption and decryption module is used to generate a key according to the feature information of the mass storage device, and use the key to encrypt ordinary data transmitted to the mass storage device.

[0092] Wherein, the encryption and decryption module can be realized by selecting a corresponding algorithm circuit according to the difference of the adopted encryption and decryption algorithms. For example, when sm3 is used to generate a key, and sm4 is used for encryption and decryption, the encryption and decryp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mass storage type device encryption method, a main controller and an access device. The method comprises the steps of obtaining feature information of a mass storage type device; generating a secret key according to the feature information of the mass storage type equipment; and encrypting the common data transmitted to the mass storage type equipment by using the secret key. Therefore, the secret key is generated by utilizing the feature information of the mass storage type equipment, so that the secret key is used for encrypting the common data transmitted to the mass storage type equipment, and the data security in the mass storage type equipment is improved. Moreover, the secret key is generated by utilizing the characteristic information of the mass storage type equipment, so that the encryption cost can be reduced, and the influence of encryption on the transmission speed of the equipment is reduced. Besides, the scheme of the embodiment of the inventiondoes not need to specially change the mass storage equipment side, namely does not need specially manufactured mass storage equipment with encryption and decryption functions, and has universality.

Description

technical field [0001] The present application relates to the technical field of information security, and specifically relates to an encryption method for a mass storage device, a main controller and an access device. Background technique [0002] Mass storage devices (such as U disk, mobile hard disk, etc.) are favored by users for their convenience and portability. But at the same time, because mass storage devices undertake the function of carrying and transporting data, users may record sensitive or private information in such storage devices. If the device is accidentally lost, it is easy to cause information leakage. [0003] At present, in the field of encryption of mass storage devices, device encryption is mostly implemented by installing encryption software, or using specially made mass storage devices with encryption and decryption functions. However, to implement device encryption by installing encryption software, since specific software needs to be installed...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6218
Inventor 李健
Owner HYGON INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products