Supercharge Your Innovation With Domain-Expert AI Agents!

Hard disk encryption equipment and encryption use method

A technology of hard disk encryption and data encryption key, which is applied in the directions of digital data authentication, digital data protection, program control devices, etc., can solve the problems of unprotected data, complicated operation, etc. safety effect

Pending Publication Date: 2022-04-29
黄河科技集团信息产业发展有限公司 +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of computers, more and more attention has been paid to the data storage security of storage devices; network storage devices are facing the threat of network intrusion and theft of confidential information. Data encryption technology is an important means of information confidentiality to protect stored data from leakage For unauthorized users, it plays an important role in protecting personal private information, military, and commercial confidential information; most of the existing hard disk encryption methods use hard disk password locks, and users can set access to hard disks through BIOS options. Password, when the user starts the computer to access the hard disk each time, the BIOS needs to verify whether the password entered by the user is the same as the access password, and authenticate the user's identity. However, when this method is used, it only restricts data access , the data itself is still not protected, and the hard disk password lock needs to enter the password every time you log in, and the operation is cumbersome; therefore, in order to solve the above problems, a hard disk encryption device with reasonable design and good security and encryption usage necessary

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hard disk encryption equipment and encryption use method
  • Hard disk encryption equipment and encryption use method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0011] Example: such as figure 1 , figure 2 As shown, a hard disk encryption device includes an encrypted hard disk and a customized BIOS. The customized BIOS is installed in a computer as software, and the customized BIOS can verify user passwords and passwords on its BIOS input interface after the computer is turned on. It is the power-on password set by the user in the BIOS. This process does not require the participation of the encrypted hard disk; the encrypted hard disk is connected to the connection port of the computer through a data transmission wire, so as to realize data transmission between them, and the encrypted hard disk and the inside of the customized BIOS Two sets of keys are stored, one of which is an external authentication key PIK, and the other is a data encryption key DEK. The external authentication key PIK can compare and authenticate the identity of the encrypted hard disk and the customized BIOS; The data encryption key DEK can encrypt the data in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a hard disk encryption device and an encryption use method, the hard disk encryption device comprises an encrypted hard disk and a customized BIOS, the customized BIOS is used as software to be installed in a computer, the customized BIOS can check a user password on a BIOS input interface after the computer is started, the password is a power-on password set by a user in the BIOS, and the process does not need the participation of the encrypted hard disk; the encrypted hard disk is connected with the customized BIOS through a connecting port on a computer, so that data transmission between the encrypted hard disk and the customized BIOS is realized, two sets of keys are stored in the encrypted hard disk and the customized BIOS, one set is an external authentication key PIK, and the other set is a data encryption key DEK; the external authentication key PIK can perform comparison authentication on the identity of the encrypted hard disk and the identity of the customized BIOS; the data encryption key DEK can encrypt data in the encryption hard disk through a symmetric algorithm; the device has the advantages of being reasonable in design and high in safety.

Description

technical field [0001] The invention belongs to the technical field of hard disk encryption, and in particular relates to a hard disk encryption device and an encryption use method. Background technique [0002] With the rapid development of computers, the data storage security of storage devices has attracted more and more attention; network storage devices are facing the threat of network intrusion and stealing confidential information. Data encryption technology is an important means of information confidentiality to protect stored data from leakage For unauthorized users, it plays an important role in protecting personal private information, military, and commercial confidential information; most of the existing hard disk encryption methods use hard disk password locks, and users can set access to hard disks through BIOS options. Password, when the user starts the computer to access the hard disk every time, the BIOS needs to verify whether the password entered by the us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/31G06F9/4401
CPCG06F21/602G06F21/31G06F9/4411
Inventor 郑文青于凡杨鹏飞李磊袁锐
Owner 黄河科技集团信息产业发展有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More