Unlock instant, AI-driven research and patent intelligence for your innovation.

Disk encryption method and system capable of being updated in real time by using License

A technology of real-time update and encryption method, applied in the protection of internal/peripheral computer components, etc., can solve the problems of inflexible security factor, encryption, insecurity, etc., to improve the efficiency of data reading and writing, solve forgotten passwords, and have high security requirements Effect

Active Publication Date: 2021-04-02
南京道熵信息技术有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the random characters used in encryption are difficult to remember; and when we use encrypted disks, when the encrypted string is lost or omitted, we can only rely on professional technicians to restore it on site, and even professional operation may cause the risk of data loss; Moreover, the strings of existing encryption technologies are randomly generated, which cannot cover some useful information, which is a technical bottleneck
[0003] Current disk encryption has many deficiencies, not flexible enough and low safety factor, which is not safe for users with strong safety factor (such as army / bank / government); the disadvantages mainly include the following aspects: 1. Disk encryption cannot limit the time. After encryption, the disk will always be encrypted. This is not friendly to scenarios that only need to be encrypted for a certain period of time. It may only be necessary to encrypt the data disk within a certain period of time; 2. Full-disk encryption affects efficiency. Every read and write needs to be encrypted before being placed on the disk, which is not suitable for high-security and high-performance scenarios
3. Unable to limit the disk size and type to encrypt; different encryption methods are used for different disks, such as virtual disk encryption; 4. It cannot be updated regularly, and theoretically it can be cracked by brute force method; 5. All use fixed characters string as the encryption key, once you forget it, you can no longer open the old encrypted disk, and if you forget the password, you can no longer decrypt it, you can only format it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Disk encryption method and system capable of being updated in real time by using License
  • Disk encryption method and system capable of being updated in real time by using License

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings and specific embodiments.

[0029] The embodiment of the present invention adopts License to encrypt and map the disk based on the new encryption idea, and through the special software HCS (HorebCryptSetup, the main responsibility of the software is to generate the host signature, interpret, verify, and transmit the License, etc.) developed by the present invention, combined with the existing disk The encryption software CryptSetup realizes the function of the present invention. like figure 1 As shown, the embodiment of the present invention discloses a disk encryption method that uses a license that can be updated in real time. First, a host signature is generated according to the disk uuid of the user host, and sent to the license provider; then the license provider adds information related to user requirements to the license a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a disk encryption method and system capable of being updated in real time by using License, and the method comprises the steps: generating a host signature according to a diskuuid of a user host, adding user demand related information including encryption time, the host signature and capacity limitation into the License, and encrypting the License to obtain a ciphertext; verifying the License when the disk encryption software requests a key, generating a host signature, reading system time, and comparing the system time with information in the License to determine whether encryption can be performed or not; if the verification is passed, sending a secret key related to the host signature to the disk encryption software, and mapping the disk needing to be encrypted.According to the method, a new encryption idea is no longer limited to a fixed character string as an encryption key, so that the disk encryption process is safer and more reliable, the process is completely controllable, and the awkward situation that a password is forgotten can be solved.

Description

technical field [0001] The invention relates to a disk encryption method, in particular to a disk encryption method and system using a License that can flexibly encrypt and decrypt a disk with high security requirements, and belongs to the field of software encryption authentication. Background technique [0002] The current disk encryption technology mainly adopts device-map technology. When the disk is mapped, it is encrypted. The main technology is DriveCrypt. Although the encryption program provides an extremely reliable real-time encryption function, it can ensure data security and avoid data loss. However, the random characters used in encryption are difficult to remember; and when we use encrypted disks, when the encrypted string is lost or omitted, we can only rely on professional technicians to restore it on site, and even professional operation may cause the risk of data loss; Moreover, the strings of the existing encryption technology are randomly generated, which...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/80
CPCG06F21/80
Inventor 周林
Owner 南京道熵信息技术有限公司