Storage medium and method and apparatus for separately protecting data in different areas of the storage medium
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
second embodiment
[0068]FIG. 7 is a flowchart showing a writing process in the present invention. Referring to FIG. 7, the writing process to the medium will be explained. The process in the case of creating the logical format of the medium is executed in the same way as done in the embodiment in FIG. 2, the encrypted key data of each logic sector is stored on the storage medium 1.
[0069] (S30) It is presumed that there occurs a request for writing to a position where the logical block address (sector number) LBA is [S0]. The sector number LBA requested is changed to [S1] so that the write request position is not overlapped with the region L1. Herein, as shown in FIG. 4, the size [a] of the region L1 as added to the sector number [S0] thereby obtaining the changed sector number [S1].
[0070] (S31) The CPU 2 judges whether or not the data (encrypted key data) in the region L1 on the optical disk 1 have already been read out. If already read out, since the key data are developed in the operation region o...
first embodiment
[0078] Note that the reading process is the same as in the first embodiment in FIG. 6, so that its explanation is omitted.
[0079]FIG. 8 is a flowchart showing a writing process in a third embodiment of the present invention. FIG. 9 is an explanatory diagram showing the key data in the third embodiment of the present invention. FIG. 10 is a flowchart showing the reading process in the third embodiment of the present invention.
[0080] When in a medium logical formatting process, as in the first embodiment shown in FIG. 2, the region L1 on the optical disk 1 is stored with encrypted key data PS′[1]-PS′[512]. Herein, however, the encrypted data is not stored per logic sector. For example, it is assumed that a capacity of the region L1 be 4 KB. Then, supposing that the password be an 8-byte / entry, as shown in FIG. 9, 512-pieces of key words (entries) PS[1]-PS[512] are generated. Subsequently, the region, L1 is stored with the 512-pieces of encrypted key words PS′[1]-PS′[512].
[0081] The w...
third embodiment
[0101] When creating the logical format of the storage medium, as in the third embodiment, what is obtained by encrypting the random number data with the user password PW1 is written to the region L1.
[0102] In addition, an authentication character string DC1 of the password is generated, and what is obtained by encrypting the character string DC1 with the password PW1 is written to the region C1. Further, what is obtained by encrypting the password PW1 with PW2 is written to the region L2, and what results from encryption of the password PW1 with PWn is written to the region Ln.
[0103] Moreover, what is acquired by encrypting an authentication character string DC2 of the password PW2 with the password PW2, is written to the region C2. Hereinafter, what results from encryption of the authentication character string DCn of the password PWn with the password PWn, is written to the region Cn.
[0104] The authentication character string of each password serves to authenticate whether the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com