CN102385891A - Bright and dense double-channel anti-leakage security burner - Google Patents

Bright and dense double-channel anti-leakage security burner Download PDF

Info

Publication number
CN102385891A
CN102385891A CN2011103353533A CN201110335353A CN102385891A CN 102385891 A CN102385891 A CN 102385891A CN 2011103353533 A CN2011103353533 A CN 2011103353533A CN 201110335353 A CN201110335353 A CN 201110335353A CN 102385891 A CN102385891 A CN 102385891A
Authority
CN
China
Prior art keywords
data
writer
imprinting
encryption
safe
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011103353533A
Other languages
Chinese (zh)
Other versions
CN102385891B (en
Inventor
张冰
陈郁虹
张帆
唐小卫
宋凭
林少锋
刘洁文
徐志祥
李占芹
赵晨希
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
No55 Institute Of Headquarter Of General Staff
Original Assignee
No55 Institute Of Headquarter Of General Staff
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by No55 Institute Of Headquarter Of General Staff filed Critical No55 Institute Of Headquarter Of General Staff
Priority to CN201110335353.3A priority Critical patent/CN102385891B/en
Publication of CN102385891A publication Critical patent/CN102385891A/en
Application granted granted Critical
Publication of CN102385891B publication Critical patent/CN102385891B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

The invention relates to a bright and dense double-channel anti-leakage security burner. The burner comprises a hardware encryption/decryption member and a disc-carving member, wherein the hardware encryption/decryption member further comprises FPGA (Field Programmable Gate Array) chips, a control processor and a serial flash configuration chip; the FPGA chips are connected with a computer, the control processor, the serial flash configuration chip and an ordinary SATA (Serial Advanced Technology Attachment) port burner and are used for encrypting/decrypting data which enters into the chips; the control processor is used for judging whether a data stream which enters into the hardware encryption/decryption member needs to be encrypted/decrypted; if the data stream is ordinary data without a need of encryption/decryption, the control processor is used for directly sending plaintext data to the ordinary SATA port burner to be burned or sending the plaintext data to the computer for data reading; and if the data stream is confidential data needing to be encrypted, the control processor is used for sending the confidential data into a plurality of the FPGA chips for the encryption/decryption; and the serial flash configuration chip is used for initially configuring the FPGA chips. With the adoption of the burner, the security of burnt information can be effectively ensured.

Description

The anti-safe CD writer of divulging a secret of bright close binary channels
Technical field
The present invention relates to CD writer, be specifically related to a kind of anti-safe CD writer of divulging a secret that can ensure information security.
Background technology
The CD writer of widespread usage mainly is two types at present, and one type is the normal optical disk CD writer that data are not encrypted; Another kind of is the safe CD writer that data is carried out software cryptography.
Wherein, the main normal optical disk recording device of using does not possess data encryption feature, can only realize the direct imprinting of data and reads, if use common CD writer to scribe classified information, in case CD is lost, will cause the mistake of information to be divulged a secret.
Existing in the market safe CD writer adopts the mode of software cryptography mostly.Software cryptography is meant and does not rely on special hardware to realize Data Protection such as software, music, film technology.The maximum bright spot of soft encryption is extremely low encryption cost, only need encrypt data through encryption software, need not metal negative is carried out hardware encipher, just can reach the purpose of protection data of optical disk.The software cryptography means mainly contain three kinds: cipher code method, computer hardware check addition and key floppy disc method.The method of software cryptography is fairly simple, implement both economical, but the intrinsic deficiency of software cryptography itself makes it be difficult to be applied to the field that needs advanced security and big data quantity to encrypt.Mainly contain following three kinds of reasons: 1) the software cryptography mode that generally adopts user name to add password is carried out identification; The drive software that confirms password generally is stored on the CD in order to calling; Therefore general user's name and password are not very long, are guessed easily perhaps by Brute Force; In case CD-enciphering is lost, and relatively easily obtains enciphered message through some software processes.Simultaneously, during software cryptography, user's key or password are to be input in the encryption software with expressly mode to go, and the encrypting and decrypting algorithm all will move in this machine internal memory, are easy to receive the tracing and monitoring of trojan horse program or other people stealing.Though so but the convenient and simple poor stability of software cryptography, the encrypt file easy crack is inappropriate for security requirements than higher application scenario.2) all implementations of software cryptography are all accomplished through the CPU operating instruction.
Because the operation of each instruction all will take the processing time of CPU, serious occupying system resources during with the software cryptography heap file directly causes the system resource anxiety, influences work efficiency.3) encryption software all is to depend on certain operating system, and this transplanting for system causes certain difficulty.
The present invention is directed to the problem that can't protect concerning security matters imprinting information preferably that current common CD writer and software cryptography CD writer exist; A kind of feasible, safe hardware encipher imprinting scheme has been proposed; Realize the bright close binary channels imprinting of CD; When effectively guaranteeing the high security of classified information cryptographic means, also played the effect of CD camouflage.Hardware encipher is between host side and optical disk medium, to add a hardware encryption module; AES moves in this hardware encryption module fully; Simultaneously, host side is required to have authentication, accomplish the isolation fully of enciphered data and main frame; All reveal so long as not authentication identifier, encrypting module, CD media, be difficult to the enciphered data that is cracked.Simultaneously, during hardware encipher can to the information of imprinting CDs carry out special transformation (change deposit data true path, hide main catalogue of CD or file), prevent the purpose of duplicating to reach protected data.Simultaneously, the present invention considers the backwards compatibility of product, has adopted two kinds of Peripheral Interfaces of USB2.0 and SATA2.0.On portable equipments such as notebook, use the USB2.0 interface; On the desktop computer that confidentiality is had relatively high expectations, adopt the SATA2.0 interface.Can satisfy the current and future design requirement of safe CD writer preferably.
Summary of the invention
In order to overcome the above-mentioned defective of prior art; The present invention starts with from software and hardware two aspects; Utilize exploitation, the certificate of design, high-speed hardware encryption and decryption technology, SATA2.0 agreement, USB2.0 agreement, system bottom driver and servo-drive system of design, the high capacity FPGA of high speed multi-layer PCB to distribute and technology such as management of database, upper strata imprinting software program development, a kind of ciphering type CD writer that is used for bright, the close binary channels data of imprinting is provided.
The anti-safe CD writer of divulging a secret of bright close binary channels of the present invention; Comprise hardware enciphering/deciphering parts and imprinting parts; Wherein hardware enciphering/deciphering parts further comprise: fpga chip; Be connected with computing machine, processor controls, serial flash configuring chip and common SATA interface CD writer, be used for that the data that get into this chip are carried out enciphering/deciphering and handle; Processor controls; Being used for that the data stream that gets into hardware enciphering/deciphering parts is judged whether to carry out enciphering/deciphering handles; If need not the physical data of enciphering/deciphering; Then directly clear data is delivered to common SATA interface CD writer and carry out imprinting or deliver to computing machine and carry out data and read,, then it is delivered to several fpga chips and carry out enciphering/deciphering and handle if need the confidential data encrypted; Serial flash configuring chip is used for fpga chip is carried out initial configuration.
Utilize CD writer of the present invention, reach the purpose that the particular profile on the CD is left in effective protection in, guarantee the security and the disguise of optical disc information, for the protection of important information provides a kind of effective way.Safe CD writer software and hardware system can dock with desktop computer SATA2.0 interface or notebook computer USB2.0 interface.
Description of drawings
Fig. 1 is the general principles figure of safety CD writer of the present invention;
Fig. 2 is the present invention's zoned format synoptic diagram of imprinting CDs;
Fig. 3 is the structured flowchart of safe CD writer of the present invention;
Fig. 4 is the fundamental diagram of safety CD writer of the present invention;
Fig. 5 is the imprinting of safe CD writer and reads process flow diagram.
Embodiment
For making the object of the invention, technical scheme and advantage clearer, below in conjunction with specific embodiment, and with reference to accompanying drawing, to further explain of the present invention.
Fig. 1 is the general principles figure of safety CD writer of the present invention.This safe CD writer mainly comprises hardware enciphering and deciphering parts and imprinting parts.Wherein, Imprinting and reading software operation are on computers; Safe CD writer provides SATA2.0/USB2.0 translation interface to last (computing machine), to following (imprinting parts) SATA2.0 is provided translation interface, and the enciphering and deciphering algorithm of data and authentication etc. will move in the hardware enciphering and deciphering parts fully.
Fig. 3 is the structured flowchart of safe CD writer of the present invention.With reference to Fig. 3; Safe CD writer comprises, hardware enciphering/deciphering parts and imprinting parts, wherein; Hardware enciphering/deciphering parts are mainly realized the storage of the control of SATA and USB interface, certificate and the checking of identity, the control of encryption and decryption data stream, the processing and the operation of enciphering and deciphering algorithm, the functions such as startup of tearing the shell testing circuit open; Handle and respond all affairs of safe CD writer in real time, the imprinting parts are at the preferred common SATA interface of the present invention CD writer.
Hardware enciphering/deciphering parts further comprise fpga chip, processor controls, serial flash configuring chip, tear shell testing circuit, cert store, noise source generator and power supply and Clock management parts composition open.Wherein fpga chip is connected with computing machine (can be notebook or desktop computer), processor controls, serial flash configuring chip and common SATA interface CD writer, processor controls with tear shell testing circuit, cert store, noise source generator open and be connected.Other all parts of power supply and Clock management parts and CD writer are connected, and realize power supply and Clock management to miscellaneous part.
Fpga chip further comprises USB/SATA control module and SATA control module, data enciphering/deciphering unit again.Fpga chip is connected with computing machine through the USB/SATA control module, is connected with common SATA interface CD writer through the SATA control module.The USB/SATA control module is used for the data stream that gets into hardware enciphering/deciphering parts is gone here and there and changed.
Serial flash configuring chip is used at the beginning of equipment operation, at first fpga chip is carried out initial configuration.When data stream gets into hardware enciphering/deciphering parts, at first go here and there and change through the SATA/USB controller.
Processor controls judges whether to carry out the enciphering/deciphering processing to going here and there through the SATA/USB controller and changing data stream afterwards; If need not the physical data of enciphering/deciphering, then directly clear data is delivered to CD writer and carry out imprinting or deliver to computing machine and carry out data and read.If need the confidential data of encryption, then processor controls notice noise source generator produces 256 random numbers, generates data encryption key, obtains take over party's PKI from cert store simultaneously.
The data that ciphering unit in the data enciphering/deciphering unit is encrypted needs in FPGA with the data encryption key of above-mentioned generation is carried out the hardware encipher processing, for example uses symmetric cryptographic algorithm, generates encrypting traffic; With take over party's PKI the data encryption key is carried out rivest, shamir, adelman simultaneously and carry out encryption, realize the protection of encryption key; At last the key after encrypting traffic and the encryption is sent to imprinting parts (being common SATA interface CD writer) through the SATA interface conversion together and carries out the ciphertext imprinting.
Decrypting device in the data enciphering/deciphering unit utilizes processor controls from take over party's private key that cert store obtained, and carries out asymmetric cryptographic algorithm and solves data encryption key; Solve required clear data with this data encryption key utilization symmetric cryptographic algorithm again; Flow through USB or SATA interface conversion of clear data after will deciphering at last delivered to computing machine.
Tear the shell testing circuit open, stolen or loss is used for tearing the process of shell open when the safety CD writer, and processor controls receives the shell information of tearing open of tearing shell testing circuit feedback open, will start self-destroying function, and critical data is damaged, and prevents to crack enciphered data.
Fig. 4 is the fundamental diagram of safety CD writer of the present invention.Fig. 5 is the imprinting of safe CD writer and reads process flow diagram.With reference to Fig. 4 and Fig. 5, move imprinting software on computers after, when need opening encryption burning equipment, the CD writer equipment through user's PIN code authentication mode and access connects, and can open recording device behind the authentication success.Before each recording device starts all important affair carry out the PIN code authentication earlier, to confirm imprinting and to read authority.
As shown in Figure 2, when scribing CD, at first specify the particular profile of wanting imprinting and the physical data that is used as camouflage by the person of scribing.For example, confidential document is a particular profile, and available novel text is as the physical data of camouflage usefulness.Imprinting software is the storage space of statistics file on this basis, and writes down the start address of the bright ciphertext of its corresponding CD, divides non-encrypted area and encrypted area, and foregoing novel text is carved into non-encrypted area, and confidential document is carved into encrypted area.So just realized the bright close binary channels imprinting of CD, expressly the imprinting mode is identical with common recording mode, and ciphertext adopts the hardware encipher imprinting mode that the present invention designed.This just makes CD on common CD writer, can only read the novel text, looks like a normal optical disk, has realized camouflage, only on CD writer of the present invention, just can read the encrypted area data.
Imprinting software is handled the general data of non-encrypted area earlier, produces the ISO9660 compact disk file system of a standard, and the necessary information that comprises this imprinting information is provided.This CD writer carries out transparent transmission to data, and writes the optical disc information district to its phase related control information, again with the data CD non-encrypted area that writes direct of camouflage.
At last, the data that the imprinting software processes is to be encrypted, notice CD writer log-on data encryption/decryption element is carried out hardware-level data symmetric cryptography (AES 256) to data.Encryption key K1 is that 256 pseudo-random codes and the take over party's PKI digital certificate that noise source produces carries out 256 binary codes that functional operation obtains; Guaranteed one-time pad, used public-key cryptography K2 (1024) in take over party's PKI digital certificate that the data encryption key is carried out rivest, shamir, adelman (RSA Algorithm) again and encrypt.During each CD-enciphering, preferably select different non-encrypted data (the easiest method: increase or reduce file, also can select alternative document) to pretend.
After CD purpose recipient receives CD; When reading CD, after the user right authentication is passed through, with selecting digital certificate rank that adopts and the bright close regional address of reading to tell slave computer CD writer processor controls; Transmit for the data transparency in the address, area pellucida; And, from keeper UK, import the private key digital certificate earlier to obtain private cipher key K3 to the data in the close regional address, with K3 (1024) the data encrypted key is carried out decrypt operation (RSA Algorithm); Obtain data decryption key K1, utilize K1 just can carry out hardware-level data deciphering (AES 256) at last and obtain expressly the encrypted area data.
Read CD, must use the safe CD writer of a model of the same race and supporting reading software, otherwise the physical data that can only read non-encrypted area.
The special-purpose imprinting that the groundwork of the imprinting software that safe CD writer of the present invention uses comprises bright close binary channels imprinting and reads to coil CD burning software development in one, SATA/USB host computer bsp driver, CD writer management software, exclusiveness reads to coil submodules such as function design.
Bright close binary channels imprinting and read to coil software development through calling bottom NERO SDK program development bag, realizes the CD burning technology.
SATA host computer bsp driver is used for host computer identification, initialization safety CD writer equipment and bottom and sets up communication mechanism, to application layer interface function is provided.
The CD writer management software mainly comprises following functional module: latching, removing user/authorized, administrator configurations module etc. when audit, free time are uploaded in the PIN code authentication of opening of device, imprinting log saving and protection, imprinting daily record.Can more safe and effective management recording device through this management software.At first, need the authentication of pc client PIN code could start recording device.The preservation of imprinting daily record and protection, upload audit function and be keeper's monitoring equipment at any time, in time scenting a hidden danger provides safeguard.In addition, the relevant supplementary information that this imprinting software also allows the user to select to fill in the imprinting file is like theme (file name), addresser, receiver, collection of letters unit etc., so that keeper's audit work in the future.Information such as imprinting time, file size are directly obtained from computerized information by software, need not the user fill in.Certainly, the user also can select not fill in above information based on the consideration of each side factor, can carry out imprinting work equally.These information will generate the Excel document, have only the keeper just to have authority to open the document.Latching behind the device free certain hour, the personnel of preventing equipment under the situation such as leave and problem such as falsely use.When some special circumstances (like the bad log record of certain validated user, the user of service leaves under order, changes keeper etc.) occurring, can realize removing user/authorized, further guarantee the security of recording device.The administrator configurations module can be used for the rights of using of this software of keeper's flexible configuration and supporting safe CD writer.Need not dispose for domestic consumer, be configured to have bright close binary channels imprinting function under the default situations; And, can only carry out encryption burning for the higher department of security requirements, and technical the bright imprinting channel function of software option is limited, if desired, agreeing through the keeper also can be through open this function of configuration.
Safety management for the keeper; Adopt keeper specialized hardware USB KEY (UK) dish to authorize the mode of using; Deposit administrator certificate in the UK; The keeper will insert computing machine with this UK during use, and corresponding menu is imported corresponding administrator password in software, can carry out relevant configuration and audit management etc. is uploaded in daily record.
The special-purpose imprinting of exclusiveness reads to coil function design, mainly in order to evade the problem of divulging a secret of using other imprinting software that has potential safety hazard such as leak and general CD writer and producing non-subjectivity.The INTERFACE DESIGN imitation is stable and reliable for performance, the NERO imprinting software of friendly interface, calls NERO SDK program development bag and designs.The one, repel other imprinting softwares and use the safety CD writer, adopt the mechanism of PIN code authentication opening device, the PIN identification code of distributing a correspondence for this software and hardware, have only the PIN code authentication to pass through after, imprinting software could start safe CD writer and carry out imprinting.The 2nd, repel other general CD writers; Our self-designed software and hardware management is comparatively convenient; Seal other CD writer hardware; Information such as our through detecting general CD writer ID number, manufacturer, device number are verified, just seal this equipment if not our equipment not allow it to be identified as available devices, cause the method that can't use to realize.Logon service processes of carry, start AutoBackground real time execution monitoring CD writer port is made judgement according to actual conditions, carries out corresponding actions.The 3rd, cause technology to divulge a secret for fear of this safe CD writer because of losing; We require main frame and equipment to be associated; Collect computer related information (CPU, MAC, hard disk sequence number) by the user when promptly this equipment is allotted and submit to the keeper, the keeper is handed down to safe CD writer with configuration information and is stored in the nonvolatile memory through disposing safe CD writer interface.The hardware information that can collect during software startup in the main frame is passed to safe CD writer according to predetermined protocol format, if coupling is just opened imprinting and read to coil function.Make troubles for avoiding the user to collect computing machine related hardware information; We will provide little software to supply to obtain the sequence number of related hardware and be stored as set form to the user of the safe CD writer of application, the user only need submit to this formatted file to be used to dispose slave computer to the keeper.
Safe CD writer of the present invention selects for use the FPGA that is difficult for cracking to carry out safe CD writer design, though these are high more a lot of on design difficulty than selecting some ready-made integrated IC for use, safe and secret work has very important meaning to data.The FPGA that the present invention uses is Altera Cyclone II low-power consumption high performance series chip.For example can select EP2C50 for use, adopt the BGA encapsulation, built-in 129xM4K RAM piece, 4 independent PLL.The FPGA configuring chip can adopt specialized configuration chip EPCS4, is designed with AS (active arrangement mode), two kinds of configuration modes of JTAG, and JTAG is used for the in-circuit emulation debugging, and AS is used for the burning of final FPGA program.
Use safe CD writer of the present invention to have the following advantages: 1. the data of CD non-encrypted area can normally be read on common CD-ROM drive, and letting the people take for this easily is a normal optical disk, can play the effect to the CD camouflage; Cdrom encryption district reference position changes according to different depositing expressly, and key does not leave on the CD, must have identical safe CD writer and respective certificate and just can crack; The particular profile in cdrom encryption district is with a kind of off-gauge file layout tissue, and common CD writer can't obtain fileinfo, and the Windows/DOS system can not show encrypted file; The data in cdrom encryption district adopts hardware data stream rank to carry out once encrypting, and has guaranteed one-time pad; The data encryption key is carried out the RSA Algorithm asymmetric encryption; Adopt 1024 RSA keys; By present computer level, crack this type key and need hundreds of years, promptly guaranteed the security of data key; Reduce the link of artificial Data transmission key again, avoided the potential safety hazard that possibly exist; Common CD-ROM drive can't be seen the particular profile of encrypted area, just can't read the particular profile on the CD, must use this programme encryption and decryption CD writer and supporting reading software; Owing to adopted advanced hardware enciphering and deciphering algorithm and corresponding protection measure, data stream is carried out real-time encryption and decryption, improved optical disc data security and the anti-ability that cracks greatly.Use the dedicated encrypted algorithm that data stream is encrypted; Do not knowing under the situation of key; To correctly read the particular profile on the CD; Not this safe CD writer software and hardware system and supporting certificate, this almost is an impossible mission, even very the personnel that crack of specialty also will spend the many decades time even longer.
Above-described specific embodiment; The object of the invention, technical scheme and beneficial effect have been carried out further explain, and institute it should be understood that the above is merely specific embodiment of the present invention; Be not limited to the present invention; All within spirit of the present invention and principle, any modification of being made, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (9)

1. the anti-safe CD writer of divulging a secret of bright close binary channels comprises hardware enciphering/deciphering parts and imprinting parts, and wherein hardware enciphering/deciphering parts further comprise:
Fpga chip is connected with computing machine, processor controls, serial flash configuring chip and imprinting parts, is used for that the data that get into this chip are carried out enciphering/deciphering and handles;
Processor controls; Being used for that the data stream that gets into hardware enciphering/deciphering parts is judged whether to carry out enciphering/deciphering handles; If need not the physical data of enciphering/deciphering; Then directly clear data is delivered to the imprinting parts and carry out imprinting or deliver to computing machine and carry out data and read,, then it is delivered to fpga chip and carry out enciphering/deciphering and handle if need the confidential data encrypted;
Serial flash configuring chip is used for fpga chip is carried out initial configuration;
The imprinting parts are used for data are carried out imprinting.
2. safe CD writer as claimed in claim 1; It is characterized in that; Said fpga chip further comprises USB/SATA control module, SATA control module, data encryption/decryption unit, and this fpga chip is connected with computing machine through the USB/SATA control module, is connected with the imprinting parts through the SATA control module; And the USB/SATA control module is used for the data stream that gets into hardware enciphering/deciphering parts is gone here and there and changed, and the data encryption/decryption unit is used for that data stream is carried out enciphering/deciphering to be handled.
3. safe CD writer as claimed in claim 2; It is characterized in that; Said processor controls to go here and there through the SATA/USB controller and change after data stream judge whether to carry out encryption, the upstream of SATA control module is judged whether to carry out decryption processing.
4. safe CD writer as claimed in claim 3; It is characterized in that further comprising the cert store and the noise source generator that are connected with processor controls; When processor controls judgment data stream is the confidential data that needs encryption; Then processor controls notice noise source generator produces random number, generates data encryption key, obtains take over party's PKI from cert store simultaneously.
5. safe CD writer as claimed in claim 4; It is characterized in that; The data that the data encryption/decryption unit is encrypted needs with the data encryption key of above-mentioned generation is carried out the hardware encipher processing, generates encrypting traffic, with take over party's PKI the data encryption key is carried out rivest, shamir, adelman to carry out encryption simultaneously; Realize the protection of encryption key, at last the key after encrypting traffic and the encryption is sent to the imprinting parts through the SATA interface conversion together and carries out the ciphertext imprinting.
6. safe CD writer as claimed in claim 5; It is characterized in that; If the processor controls judgement needs data decryption, then obtain take over party's private key from cert store, this private key is reached FPGA carry out asymmetric cryptographic algorithm and solve data encryption key; Solve required clear data with this data encryption key utilization symmetric cryptographic algorithm again, flow through USB or SATA interface conversion of the clear data after will deciphering at last delivered to computing machine.
7. like each described safe CD writer of claim 1-6; It is characterized in that this CD writer further comprises: tear the shell testing circuit open, be used for tearing the process of shell open; Processor controls receives the shell information of tearing open of tearing shell testing circuit feedback open; To start self-destroying function, critical data will be damaged, prevent to crack enciphered data.
8. safe CD writer as claimed in claim 7; It is characterized in that, move imprinting software on computers after, when need opening encryption burning equipment; CD writer equipment through user's PIN code authentication mode and access connects; Can open recording device behind the authentication success, before each recording device starts all important affair carry out the PIN code authentication earlier, to confirm imprinting and to read authority.
9. safe CD writer as claimed in claim 7 is characterized in that, when scribing CD; Specify the particular profile of wanting imprinting and the physical data that is used as camouflage in advance; CD writer is handled the general data of non-encrypted area earlier, and the data of pretending are write the CD non-encrypted area, handles data to be encrypted then; The data encryption/decryption unit carries out the hardware-level data symmetric cryptography to data.
CN201110335353.3A 2011-10-28 2011-10-28 Bright and dense double-channel anti-leakage security burner Active CN102385891B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110335353.3A CN102385891B (en) 2011-10-28 2011-10-28 Bright and dense double-channel anti-leakage security burner

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110335353.3A CN102385891B (en) 2011-10-28 2011-10-28 Bright and dense double-channel anti-leakage security burner

Publications (2)

Publication Number Publication Date
CN102385891A true CN102385891A (en) 2012-03-21
CN102385891B CN102385891B (en) 2014-07-16

Family

ID=45825241

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110335353.3A Active CN102385891B (en) 2011-10-28 2011-10-28 Bright and dense double-channel anti-leakage security burner

Country Status (1)

Country Link
CN (1) CN102385891B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103200007A (en) * 2013-02-21 2013-07-10 无锡众志和达存储技术股份有限公司 Serial advanced technology attachment (SATA) data asymmetrical encryption hardware achieving system based on field programmable gate array (FPGA)
CN104253694A (en) * 2014-09-27 2014-12-31 杭州电子科技大学 Encrypting method for network data transmission
CN107170470A (en) * 2017-03-29 2017-09-15 山东超越数控电子有限公司 A kind of CD-ROM drive and imprinting, read method with hardware encrypting

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101442409A (en) * 2007-11-23 2009-05-27 东方钢铁电子商务有限公司 Encipher method and system for B2B data exchange
CN201577098U (en) * 2009-09-28 2010-09-08 北京深思洛克软件技术股份有限公司 Information security verification equipment
CN102053798A (en) * 2009-10-27 2011-05-11 鸿富锦精密工业(深圳)有限公司 Virtual drive firmware and image document reading method thereof
CN102110201A (en) * 2009-12-28 2011-06-29 北京中讯锐尔科技有限公司 System for monitoring and auditing compact disc burning
CN102111263A (en) * 2011-02-21 2011-06-29 山东中孚信息产业股份有限公司 Data stream encryption method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101442409A (en) * 2007-11-23 2009-05-27 东方钢铁电子商务有限公司 Encipher method and system for B2B data exchange
CN201577098U (en) * 2009-09-28 2010-09-08 北京深思洛克软件技术股份有限公司 Information security verification equipment
CN102053798A (en) * 2009-10-27 2011-05-11 鸿富锦精密工业(深圳)有限公司 Virtual drive firmware and image document reading method thereof
CN102110201A (en) * 2009-12-28 2011-06-29 北京中讯锐尔科技有限公司 System for monitoring and auditing compact disc burning
CN102111263A (en) * 2011-02-21 2011-06-29 山东中孚信息产业股份有限公司 Data stream encryption method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103200007A (en) * 2013-02-21 2013-07-10 无锡众志和达存储技术股份有限公司 Serial advanced technology attachment (SATA) data asymmetrical encryption hardware achieving system based on field programmable gate array (FPGA)
CN103200007B (en) * 2013-02-21 2015-07-29 无锡众志和达数据计算股份有限公司 Based on the SATA data asymmetric cryptosystem system for implementing hardware of FPGA
CN104253694A (en) * 2014-09-27 2014-12-31 杭州电子科技大学 Encrypting method for network data transmission
CN104253694B (en) * 2014-09-27 2018-03-27 杭州电子科技大学 A kind of time slot scrambling for network data transmission
CN107170470A (en) * 2017-03-29 2017-09-15 山东超越数控电子有限公司 A kind of CD-ROM drive and imprinting, read method with hardware encrypting

Also Published As

Publication number Publication date
CN102385891B (en) 2014-07-16

Similar Documents

Publication Publication Date Title
CN102646077B (en) A kind of method of the full disk encryption based on credible password module
CN102624699B (en) Method and system for protecting data
CN101196855B (en) Mobile encrypted memory device and cipher text storage area data encrypting and deciphering processing method
CN202795383U (en) Device and system for protecting data
CN101102180B (en) Inter-system binding and platform integrity verification method based on hardware security unit
CN104253694A (en) Encrypting method for network data transmission
CN101593550B (en) High strength encrypting USB flash disk for police
CN101771699A (en) Method and system for improving SaaS application security
CN102196422A (en) Method for preventing leakage of lost file of handheld communication terminal
CN102930212B (en) For the anti-leakage of data method of office system
CN112560058B (en) SSD partition encryption storage system based on intelligent password key and implementation method thereof
CN102163267A (en) Solid state disk as well as method and device for secure access control thereof
CN102236756A (en) File encryption method based on TCM (trusted cryptography module) and USBkey
CN104270242A (en) Encryption and decryption device used for network data encryption transmission
CN112383391A (en) Data security protection method based on data attribute authorization, storage medium and terminal
JP2016523060A (en) Method and system for backing up private key of electronic signature token
CN101770559A (en) Data protecting device and data protecting method
CN201518127U (en) Encrypted mobile memory based on password authentication
CN108491724A (en) A kind of hardware based computer interface encryption device and method
JP2008005408A (en) Recorded data processing apparatus
CN102385891B (en) Bright and dense double-channel anti-leakage security burner
CN107911221B (en) Key management method for secure storage of solid-state disk data
WO2024011812A1 (en) Blockchain-based supervision system and method, device, and medium
CN201199439Y (en) Mobile storage apparatus
CN201498001U (en) Credible calculation platform based on symmetrical key codes

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant