CN112235102B - Hybrid key storage and management method and storage device - Google Patents

Hybrid key storage and management method and storage device Download PDF

Info

Publication number
CN112235102B
CN112235102B CN202011049940.1A CN202011049940A CN112235102B CN 112235102 B CN112235102 B CN 112235102B CN 202011049940 A CN202011049940 A CN 202011049940A CN 112235102 B CN112235102 B CN 112235102B
Authority
CN
China
Prior art keywords
key
area
storage
file
storage area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011049940.1A
Other languages
Chinese (zh)
Other versions
CN112235102A (en
Inventor
王辉
许晶
王振林
李艳超
袁艳芳
刘国营
张磊
侯战斌
庞振江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
Beijing Smartchip Microelectronics Technology Co Ltd
Beijing Smartchip Semiconductor Technology Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
Beijing Smartchip Microelectronics Technology Co Ltd
Beijing Smartchip Semiconductor Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Information and Telecommunication Co Ltd, Beijing Smartchip Microelectronics Technology Co Ltd, Beijing Smartchip Semiconductor Technology Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN202011049940.1A priority Critical patent/CN112235102B/en
Publication of CN112235102A publication Critical patent/CN112235102A/en
Application granted granted Critical
Publication of CN112235102B publication Critical patent/CN112235102B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Abstract

The embodiment of the invention relates to the technical field of storage, in particular to a hybrid key storage and management method, which comprises the following steps: responding to the key operation request; acquiring a key type of a key in the key operation request; determining a target area of the key operation request based on the key type; the target area at least comprises a first storage area and a second storage area; the first storage area and the second storage area have different storage formats. A corresponding memory device is also provided. According to the embodiment of the invention, the key access performance of the storage equipment such as the security chip can be improved, and the application scenes of the storage equipment such as the security chip are enriched.

Description

Hybrid key storage and management method and storage device
Technical Field
The present invention relates to the field of storage technologies, and in particular, to a hybrid key storage and management method and a storage device.
Background
The method of accessing keys through a key file is a common method, which has the following drawbacks: when the external equipment of the use scene of the security chip needs to perform security calculation quickly, the method cannot ensure the access efficiency of the secret key. For example, in a distribution feeder automation terminal, when one terminal fails, security failure information needs to be broadcast to other terminals within 20ms, and the time for the security chip to perform data security calculation must be ensured to be within 2 ms. At this time, the method of accessing the key using the key file cannot meet the performance requirement.
There are some solutions to this in the prior art, but there are still shortcomings. For example: by partitioning the storage table of the database, and the names of the partitioned storage table correspond to the key index values stored in the table, the scanning time required by key inquiry is reduced. The method is suitable for the situation that key data are particularly large, but in a security chip in the field of industrial control, the application of the key is generally limited to identity authentication, encryption and decryption of transmission data, integrity calculation/verification and other security calculation, and massive keys are not stored, so that the method of the index table of the patent is not suitable.
Also for example: the method is applied to a multi-application system by optimizing a dynamic key storage method and a read and delete method after storage, solves the limitation of rows and columns in a key index and the limitation of key groups, and greatly improves the utilization rate of relatively tense memory resources of the embedded equipment on the basis of meeting the requirement of the maximum application number of clients. The related disclosure of the search key system compares whether the key system is established, so that the search speed can be improved, and the utilization rate of a memory can be improved. The time requirements of some high performance scenarios are still not met.
Disclosure of Invention
In view of the above, the present invention aims to propose a hybrid key storage and management method and storage device to solve at least partially the above problems.
To achieve the above object, according to a first aspect of the present invention, there is provided a hybrid key storage and management method, the method comprising: responding to a key operation request, and acquiring a key type of a key in the key operation request; and determining a target area of the key operation request based on the key type, wherein the target area at least comprises a first storage area and a second storage area, and the first storage area and the second storage area have different storage formats.
Preferably, the storage format includes block storage and file storage.
Preferably, the first storage area includes a plurality of key storage blocks, each of the key storage blocks including: a key type area, a key version area and a plurality of key value recording areas; each of the key value recording areas includes: the created identification bits and key region; the key area is used for storing a key value of a key.
Preferably, the optional operation of the first storage area includes: creating a key: writing a key value of a key into a key area of a key value recording area in an empty key storage block, simultaneously writing corresponding attributes of the key into a key type area and a key version area in the key storage block respectively, and modifying the value of an established identification bit in the key value recording area; reading a key: determining a key value recording area of the key through the key type and the key ID of the key, and returning the key value stored in the key area in the key value recording area; updating the key: and updating the key in a batch updating mode.
Preferably, the second storage area includes a file system, and the file system includes a main file or further includes an application file created under the main file; the master file or the application file includes a key file including a key area for storing a key value of a key.
Preferably, the file system further comprises a main control key, wherein the main control key is used for controlling the read-write permission of the key stored in the file system.
Preferably, the optional operation of the second storage area includes: creating a key: creating a key file, writing a key value of a key into a key area of the key file, and simultaneously writing corresponding attributes of the key into corresponding areas of the key file respectively; reading a key: determining a key file in which the key is positioned in the file system through the key type and the key ID of the key, and returning a key value stored in a key area in the key file; updating the key: the key is updated using a file replacement.
Preferably, the method further comprises: acquiring an operation instruction in the key operation request; and executing the operation on the target area based on the operation instruction and the target area to realize the key operation request.
In a second aspect of the present invention, there is also provided a storage device including a storage area including at least a first storage area and a second storage area; the first storage area and the second storage area have different storage formats for storing key data of different key types, respectively.
Preferably, the storage device is an IC card or a security chip.
The present invention also provides a computer storage medium having stored thereon a computer program which when executed by a processor implements the hybrid key storage and management method described above.
The hybrid key storage and management method and the storage device have the following beneficial effects:
1) Different design methods of storage and access management strategies are adopted according to different key uses, so that the performance of key access is improved on the premise that a security chip type hardware platform is kept unchanged;
2) The access time of the high-performance key is greatly shortened, and the method is compatible with a common key management method, so that the application of the security chip is expanded, and the application scene of the security chip is enriched;
3) The key storage and management method based on the hybrid is suitable for the key management system design with both functions and performances.
Additional features and advantages of the invention will be set forth in the detailed description which follows.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention, illustrate and explain the invention and are not to be construed as limiting the invention. In the drawings:
FIG. 1 is a schematic diagram illustrating steps of a hybrid key storage and management method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a hybrid key storage and management method according to an embodiment of the present invention;
FIG. 3 is a schematic diagram illustrating a first storage area in a hybrid key storage and management method according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a structure of a second storage area in a hybrid key storage and management method according to an embodiment of the present invention.
Detailed Description
The following describes the detailed implementation of the embodiments of the present invention with reference to the drawings. It should be understood that the detailed description and specific examples, while indicating and illustrating the invention, are not intended to limit the invention.
Fig. 1 is a schematic diagram illustrating steps of a hybrid key storage and management method according to an embodiment of the present invention, as shown in fig. 1, a hybrid key storage and management method, where the method includes:
s11, responding to a key operation request;
for the storage device, the key operation request is from a read-write device, such as a card reader or a host, and when the method embodiment responds to the key operation request, a subsequent process is performed.
S12, acquiring a key type of a key in the key operation request;
in one embodiment, the key type is set by access efficiency. For example, in a distribution feeder automation terminal, when one terminal fails, security failure information needs to be broadcast to other terminals within 20ms, and the time for the security chip to perform data security calculation must be ensured to be within 2 ms. At this time, the method of accessing the key using the key file cannot meet the performance requirement, and in this scenario, differentiation is required according to the access efficiency. In other scenarios, the password type may be classified according to security requirements of the key, key format, encryption method, frequency of use, application range, and the like.
S13, determining a target area of the key operation request based on the key type;
in the distribution feeder automation terminal, if the method for accessing the secret key through the secret key file is connected, when the external equipment of the security chip usage scene needs to perform security calculation quickly, the method cannot guarantee the access efficiency of the secret key. Thus, the need for key storage, management, and access performance needs to be comprehensively considered. According to the embodiment, different storage areas are set, so that classified management of the keys is achieved, and different applications determined by the key types are achieved.
Fig. 2 is a schematic diagram of an implementation of a hybrid key storage and management method according to an embodiment of the present invention, as shown in fig. 2. In an embodiment, the target area includes at least a first storage area and a second storage area; when a type of key needs to be accessed quickly, the present embodiment defines such a type of key as a high-performance key and creates it in a specific memory area, i.e., the first memory area. Keys that do not relate to performance requirements, this scheme is called a normal key, which is created in the second storage area. The above storage area may be set corresponding to the key type, and may be more than two, and may be determined according to the password type in the previous step. This approach may not be a one-to-one correspondence, for example three key types may correspond to two storage areas.
The first storage area and the second storage area have different storage formats. The data is stored in a plurality of storage modes, each mode has advantages and disadvantages, and the storage formats of the storage areas are determined by different storage modes. By selecting different storage formats, the balance of performance references such as efficiency, safety and the like of data access is realized.
In one embodiment, the storage format includes block storage and file storage. The block storage can divide a logical volume on a bare disk, and the logical volume is formatted into any file system, which has the advantages that: and a plurality of file systems are supported, the transmission speed is high, and a hardware fault-tolerant mechanism is provided. The file storage is to store the file on a storage medium such as a formatted disk, and the storage efficiency is high and the manageability is good. But it needs to traverse the file system when it reads and writes.
Fig. 3 is a schematic diagram of a first storage area in a hybrid key storage and management method according to an embodiment of the present invention, as shown in fig. 3. In an embodiment, the first storage area includes a number of key storage blocks, each of the key storage blocks including: a key type area, a key version area and a plurality of key value recording areas; each of the key value recording areas includes: an identification bit and a key region have been created, the key region for storing a key value of a key. Specifically, each type of key is stored in a specific location, and the key type and key version information are recorded. Each type of key stores a plurality of keys, each key storing a flag bit that has been created and a key value of the key. Through the arrangement of the storage format, not only the necessary information of the key is recorded, but also the level of key storage is simplified, and the reading efficiency is improved.
In an embodiment, the optional operation of the first storage area includes: creating a key: writing a key value of a key into a key area of a key value recording area in an empty key storage block, simultaneously writing corresponding attributes of the key into a key type area and a key version area in the key storage block respectively, and modifying the value of an established identification bit in the key value recording area; reading a key: determining a key value recording area of the key through the key type and the key ID of the key, and returning the key value stored in the key area in the key value recording area; updating the key: and updating the key in a batch updating mode.
Specifically, when a high-performance key is created, a free storage block is found in a first storage area, the type and the initial version of the key are written into a designated area, namely, the key type of the key is written into a key type area of the key storage block at the same time, the version of the key is written into a key version area of the key storage block, a created key value is filled into a corresponding key value recording area, and whether a created flag bit is rewritten as created or not.
When accessing a high-performance key, the key is generally found by a key type and a key ID, and an encrypted key value is read and decrypted for use. When the high-performance key is accessed, the storage starting position of the key of the type can be quickly found through the key type in the first storage area, then specific offset relative to the storage starting position is carried out through the key ID, and after judging whether the key has the created flag bit, the key value can be found, so that the quick access of the key is realized.
When the high-performance key is updated, the key of the same type is updated simultaneously at one time in a batch key updating mode, and the key value and the corresponding flag bit are rewritten
Fig. 4 is a schematic diagram of a structure of a second storage area in a hybrid key storage and management method according to an embodiment of the present invention, as shown in fig. 4. In an embodiment, the second storage area includes a file system including a master file or further including an application file created under the master file; the master file or the application file includes a key file including a key area for storing a key value of a key. Specifically, the common key is stored in a key file, which is contained in the file system. When a file system and a key file are created, a main file is created first, the file content of the main file contains a main control key of a platform, and the main file has the authority of managing all keys of a key storage area and is used for protecting the reading and writing of all keys. Under the master file, a plurality of (0-N) application files, a plurality of (0-N) binary files, a key file may be created. Under an application file, multiple (0-N) binary files, one key file, may be created. The format of the key file includes type, ID, version, security access rights control, key value. Each time a key file is created, it is allocated a file space of a corresponding size.
In an embodiment, the main control key in the file system is used to control the read-write permission of the key stored in the file system, which is beneficial to further improving the read-write security of the file.
In an embodiment, the optional operation of the second storage area includes: creating a key: creating a key file, writing a key value of a key into a key area of the key file, and simultaneously writing corresponding attributes of the key into corresponding areas of the key file respectively; reading a key: determining a key file in which the key is positioned in the file system through the key type and the key ID of the key, and returning a key value stored in a key area in the key file; updating the key: the key is updated using a file replacement. Specifically, when storing a key, this is achieved by adding a key file. The storage area allocates a file space with a corresponding size for the storage area, and the type, ID, version, security access authority control, key value and other contents of the key are correspondingly written into the key file. The system looks up the key by key type and key ID when accessing the normal key. First, the file system is traversed to find the corresponding key file, and then the key type and key ID value of the key file are traversed to find the corresponding key. The encrypted key value can be accessed only by the authority defined by the key security access authority control field, and is used after decryption. When the common key is updated, a key file is found, and then a key address which needs to be updated is found through the key type and the key ID, and the key version and the key value are updated.
In an embodiment, the method further comprises: acquiring an operation in the key operation request; and executing the operation on the target area based on the operation and the target area to realize the key operation request. Operations generally include the aforementioned "create key", "read key", and "update key", which are performed in different details in the first storage area and the second storage area. And analyzing the received key operation request, determining the operation and the target area required to be executed by the key operation request, and referring to the execution details in the embodiment, completing the function realization and the feedback of the key operation request.
In an embodiment, there is also provided a storage device including a storage area including at least a first storage area and a second storage area; the first storage area and the second storage area have different storage formats for storing different types of key data, respectively. By selecting different storage formats, the balance of performance references such as efficiency, safety and the like of data access is realized. According to the characteristics of key storage and access in practical application, the embodiment adopts a key storage mode which mixes two modes, and stores a key with higher access performance requirement in a high-performance key storage area, namely a first storage area according to different requirements; and other common keys are stored in a common key storage area, namely a second storage area, with relatively saved space and clearer storage structure.
In an embodiment, the storage device is an IC card or a secure chip. The file structure and file access command format of the operating system (chip operation system, COS) on a contact IC card are described in the ISO7816 specification. In existing IC smart cards and security chips, the file structure is created and accessed in the manner described by the specification. When the memory device is an IC card or a secure chip, the memory device has a small memory capacity and a high access speed. The advantages of the classified storage in the embodiment of the invention can be better reflected relative to the disk storage.
The embodiment of the invention also provides a computer storage medium, on which a computer program is stored, which when executed by a processor, implements the method for accessing a usb disk according to the embodiment.
The foregoing details of the optional implementation of the embodiment of the present invention have been described in detail with reference to the accompanying drawings, but the embodiment of the present invention is not limited to the specific details of the foregoing implementation, and various simple modifications may be made to the technical solution of the embodiment of the present invention within the scope of the technical concept of the embodiment of the present invention, and these simple modifications all fall within the protection scope of the embodiment of the present invention.
In addition, the specific features described in the above embodiments may be combined in any suitable manner without contradiction. In order to avoid unnecessary repetition, various possible combinations of embodiments of the present invention are not described in detail.
Those skilled in the art will appreciate that all or part of the steps in implementing the methods of the embodiments described above may be implemented by a program stored in a storage medium, including instructions for causing a single-chip microcomputer, chip or processor (processor) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
In addition, any combination of different implementations of the embodiment of the present invention may be performed, so long as it does not deviate from the idea of the embodiment of the present invention, which should also be regarded as disclosure of the embodiment of the present invention.

Claims (6)

1. A hybrid key storage and management method, the method comprising:
responding to a key operation request, and acquiring a key type of a key in the key operation request; the key type is set through access efficiency and comprises a high-performance key and a common key;
determining a target area of the key operation request based on the key type, wherein the target area at least comprises a first storage area and a second storage area, and the first storage area and the second storage area have different storage formats; the storage format comprises block storage and file storage;
the first storage area comprises a plurality of key storage blocks, each key storage block comprises: a key type area, a key version area and a plurality of key value recording areas; each of the key value recording areas includes: the created identification bits and key region; the key area is used for storing a key value of a key;
the second storage area includes a file system including a master file or further including an application file created under the master file; the master file or the application file includes a key file including a key area for storing a key value of a key; the file system also comprises a main control key, wherein the main control key is used for controlling the read-write permission of the key stored in the file system;
determining a target area of the key operation request based on the key type, including: the target area of the high-performance key is the first storage area, and the target area of the common key is the second storage area.
2. The method of claim 1, wherein the selectable operation of the first storage area comprises:
creating a key: writing a key value of a key into a key area of a key value recording area in an empty key storage block, simultaneously writing corresponding attributes of the key into a key type area and a key version area in the key storage block respectively, and modifying the value of an established identification bit in the key value recording area;
reading a key: determining a key value recording area of the key through the key type and the key ID of the key, and returning the key value stored in the key area in the key value recording area;
updating the key: and updating the key in a batch updating mode.
3. The method of claim 1, wherein the optional operation of the second storage area comprises:
creating a key: creating a key file, writing a key value of a key into a key area of the key file, and simultaneously writing corresponding attributes of the key into corresponding areas of the key file respectively;
reading a key: determining a key file in which the key is positioned in the file system through the key type and the key ID of the key, and returning a key value stored in a key area in the key file;
updating the key: the key is updated using a file replacement.
4. A method according to claim 2 or 3, characterized in that the method further comprises:
acquiring an operation instruction in the key operation request;
and executing the operation on the target area based on the operation instruction and the target area to realize the key operation request.
5. A memory device comprising a memory area, characterized in that,
the storage area at least comprises a first storage area and a second storage area; the first storage area comprises a plurality of key storage blocks, each key storage block comprises: a key type area, a key version area and a plurality of key value recording areas; each of the key value recording areas includes: the created identification bits and key region; the key area is used for storing a key value of a key; the second storage area includes a file system including a master file or further including an application file created under the master file; the master file or the application file includes a key file including a key area for storing a key value of a key; the file system also comprises a main control key, wherein the main control key is used for controlling the read-write permission of the key stored in the file system;
the first storage area and the second storage area have different storage formats for storing key data of different key types, respectively, including: responding to a key operation request, and acquiring a key type of a key in the key operation request; the key type is set through access efficiency and comprises a high-performance key and a common key;
determining a target area of the key operation request based on the key type, including: the target area of the high-performance key is the first storage area, and the target area of the common key is the second storage area.
6. The memory device of claim 5, wherein the memory device is an IC card or a secure chip.
CN202011049940.1A 2020-09-29 2020-09-29 Hybrid key storage and management method and storage device Active CN112235102B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011049940.1A CN112235102B (en) 2020-09-29 2020-09-29 Hybrid key storage and management method and storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011049940.1A CN112235102B (en) 2020-09-29 2020-09-29 Hybrid key storage and management method and storage device

Publications (2)

Publication Number Publication Date
CN112235102A CN112235102A (en) 2021-01-15
CN112235102B true CN112235102B (en) 2023-07-21

Family

ID=74119479

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011049940.1A Active CN112235102B (en) 2020-09-29 2020-09-29 Hybrid key storage and management method and storage device

Country Status (1)

Country Link
CN (1) CN112235102B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103414555A (en) * 2013-08-15 2013-11-27 成都卫士通信息产业股份有限公司 Array key management method based on IO block encryption
CN103490878A (en) * 2013-10-15 2014-01-01 上海杉德金卡信息系统科技有限公司 Methods for dynamic secret key storing and stored secret key reading and deleting
US9209974B1 (en) * 2015-05-03 2015-12-08 Zeutro, Llc Functional encryption key management
CN106980676A (en) * 2017-03-29 2017-07-25 江西金格科技股份有限公司 File management method based on intelligent key disk
CN107609870A (en) * 2017-09-02 2018-01-19 福建新大陆支付技术有限公司 More application key management method, system and POS terminals for POS
CN107707346A (en) * 2017-04-10 2018-02-16 浙江九州量子信息技术股份有限公司 A kind of key storage based on database, acquisition methods
CN209402526U (en) * 2019-03-29 2019-09-17 北京智芯微电子科技有限公司 The key storage device of safety chip
KR20190136554A (en) * 2018-05-31 2019-12-10 (주)케이스마텍 Hotel smart key service method of hybrid security environment for different types of user terminals and hotel smart key management system for them

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070116288A1 (en) * 2005-11-18 2007-05-24 Oktay Rasizade System for managing keys and/or rights objects
US9576144B2 (en) * 2014-09-15 2017-02-21 Unisys Corporation Secured file system management
US10452858B2 (en) * 2016-03-31 2019-10-22 International Business Machines Corporation Encryption key management for file system
CN110414245B (en) * 2018-04-28 2023-09-22 伊姆西Ip控股有限责任公司 Method, apparatus and computer program product for managing encryption keys in a storage system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103414555A (en) * 2013-08-15 2013-11-27 成都卫士通信息产业股份有限公司 Array key management method based on IO block encryption
CN103490878A (en) * 2013-10-15 2014-01-01 上海杉德金卡信息系统科技有限公司 Methods for dynamic secret key storing and stored secret key reading and deleting
US9209974B1 (en) * 2015-05-03 2015-12-08 Zeutro, Llc Functional encryption key management
CN106980676A (en) * 2017-03-29 2017-07-25 江西金格科技股份有限公司 File management method based on intelligent key disk
CN107707346A (en) * 2017-04-10 2018-02-16 浙江九州量子信息技术股份有限公司 A kind of key storage based on database, acquisition methods
CN107609870A (en) * 2017-09-02 2018-01-19 福建新大陆支付技术有限公司 More application key management method, system and POS terminals for POS
KR20190136554A (en) * 2018-05-31 2019-12-10 (주)케이스마텍 Hotel smart key service method of hybrid security environment for different types of user terminals and hotel smart key management system for them
CN209402526U (en) * 2019-03-29 2019-09-17 北京智芯微电子科技有限公司 The key storage device of safety chip

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于可信计算平台的审计日志安全存储系统;成茂才;徐开勇;;计算机科学(第06期);全文 *
支持高并发的Hadoop高性能加密方法研究;金伟;余铭洁;李凤华;杨正坤;耿魁;;通信学报(第12期);全文 *

Also Published As

Publication number Publication date
CN112235102A (en) 2021-01-15

Similar Documents

Publication Publication Date Title
US7653796B2 (en) Information recording medium and region management method for a plurality of recording regions each managed by independent file system
KR100371124B1 (en) Storing data objects in a smart card memory
CN103617404A (en) Storing device of safety partitions
CN100419713C (en) Mothed of dividing large volume storage stocking device
US8312247B2 (en) Plural-partitioned type nonvolatile storage device and system
US8868929B2 (en) Method of mass storage memory management for large capacity universal integrated circuit cards
US20030126434A1 (en) File security system using a security class and method for managing an encryption key
RU2438173C1 (en) Method of managing access rights in smart card
US20030041253A1 (en) Recording apparatus, medium, method, and related computer program
US8200930B2 (en) Interacting with data in hidden storage
US20090164709A1 (en) Secure storage devices and methods of managing secure storage devices
CN111695163B (en) Storage device and control method
CN108595346B (en) Feature library file management method and device
CN103399823A (en) Method, equipment and system for storing service data
CN103136215A (en) Data read-write method and device of storage system
CN101430700A (en) File management device and storage device
CN113420308A (en) Data access control method and control system for encryption memory
KR20210027625A (en) Method for managing of memory address mapping table for data storage device
US10095706B2 (en) Data access system and data access method
CN110554911A (en) Memory access and allocation method, memory controller and system
CN114722379A (en) USB flash disk identification method, control method, system, electronic equipment and storage medium
CN103888424A (en) Cluster-type data encryption system and data processing method thereof
CN112235102B (en) Hybrid key storage and management method and storage device
CN105468999A (en) Data security method and mobile hard disk
KR100964374B1 (en) Device and Method for Managing Memory in RFID Tag

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant