Unlock instant, AI-driven research and patent intelligence for your innovation.

Data encrypting/de-encrypting method and device

A data encryption and data technology, which is used in electrical digital data processing, computer security devices, internal/peripheral computer component protection, etc.

Active Publication Date: 2006-10-11
INTELLECTUAL VENTURES ASSETS 4 LLC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when reading and writing data through the aforementioned non-volatile memory interface, the traditional approach has not gone through a proper security encryption mechanism to prevent data from being stolen
Once the data in the non-volatile memory is obtained, the painstakingly developed peripheral device add-in cards and matching drivers or application programs and other software and hardware intelligence crystals will be easily illegally copied and copied in large quantities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encrypting/de-encrypting method and device
  • Data encrypting/de-encrypting method and device
  • Data encrypting/de-encrypting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The feature of the present invention is that when the user wants to store the original data to the storage device, it is necessary to encrypt the specific code and the original data in the storage device before storing the encrypted data in the storage device; if the user wants to read the original data from the storage device For data, the original data can only be obtained after decrypting the specific code and the encrypted data in the storage device.

[0025] figure 1 A flow chart of a possible method for storing data in a storage device is shown. When the user wants to store an original data in the storage device, firstly, a specific code in the storage device is taken out (step 110). Before the storage device leaves the factory, the manufacturer will store a specific code in the storage device, and the specific code can be used to represent the serial number or the date of manufacture of the storage device and other related data. Storage devices manufactured by ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A data encryption / decryption method is applicable to a storage device; when data is to be written into the storage device, a specific code in the storage device and the data to be written are first encrypted, and then the encrypted data is written into the storage device, It is used to reduce the probability of the data stored in the storage device being stolen.

Description

technical field [0001] The invention relates to a data encryption / decryption method, in particular to a data encryption / decryption method of a storage device. Background technique [0002] Generally speaking, the control chip on the add-on card of the peripheral device has a driver or application program related to it on the main system to work with the operating system so that the add-on card of the peripheral device can play the best function. In addition, the current chip design has developed towards the trend of multi-functional and systematic integration. In order to meet the different needs of different customers as far as possible in application, the control chips on many peripheral equipment add-on cards provide read-write interface to volatile memory. [0003] In this way, the above-mentioned driver or application program can instruct the control chip to read and write the necessary or engraved specific data stored in the non-volatile memory through this interface,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14G06F21/00
CPCG06F12/1408G06F21/79G06F2221/2107
Inventor 苏浩坤胡培杰朱孟煌
Owner INTELLECTUAL VENTURES ASSETS 4 LLC