Hard-disc fan-area data enciphering and deciphering method and system

A data encryption and sector-level technology, which is applied in the field of storage security in computer technology, can solve problems such as low security and slow encryption/decryption speed, and achieve the effects of improving security, increasing difficulty, and increasing flexibility

Inactive Publication Date: 2007-03-28
ZHEJIANG XUNBO INFORMATION ENG
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to overcome the disadvantages of slow encryption / decryption speed and relatively low security when implementing data encryption operations at the application layer or operating system layer in the prior art, and provide a hard disk sector-level data encryption method and structure, improving the security of the storage system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hard-disc fan-area data enciphering and deciphering method and system
  • Hard-disc fan-area data enciphering and deciphering method and system
  • Hard-disc fan-area data enciphering and deciphering method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0046] In general, storage systems can be divided into application layer, operating system layer, storage protocol and device model layer, and physical layer. The hard disk sector-level data encryption method of the present invention realizes encryption and decryption of data at the device model layer and the physical layer of the storage protocol.

[0047] The hard disk sector-level data encryption method of the present invention includes an improved AES encryption algorithm, a data transmission method that synchronizes data transmission and data encryption / decryption, and an online key revocation mechanism based on a key revocation bitmap , a low-density encryption method and a key strategy based on I2C bus.

[0048] The hard disk sector-level data encryption and decryption method of the present invention realizes the encryption and decrypti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses an encryption and decryption method for data in hardware. It consists of several steps: obtain the key by reading data from the ROM; obtain the original key by the expending mechanism; operate the logic address and the sequence number and shift the result to get the address key; encryption on the address key by the original key to form a key flow; encryption and decryption on transmitting data. This invention could enhance data security on storage device and protect them from missing.

Description

technical field [0001] The invention relates to the storage security field in computer technology, in particular to a hard disk sector-level storage security method and structure. Background technique [0002] The two forms of data, data in transmission (Data-in-Flight) and data in storage (Data-in-Rest), determine that data security includes two major areas: network security and storage security. Compared with storage security, there have been a lot of research results on network security, including IPSec (IP Layer Security Protocol), SSL (Secure Sockets Layer), PPTP (Point-to-Point Tunneling Protocol), PEM ( Secret Enhanced Mail) and PGP (Perfect Precision Privacy), etc. In recent years, as more and more information exists in the form of storage, especially with the development of network storage (SAN and NAS), people gradually realize the importance of storage security. In addition to performance, capacity, and reliability, security has become an important feature of st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14H04L9/00
Inventor 马士超王贞松
Owner ZHEJIANG XUNBO INFORMATION ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products