CN112235102B - Hybrid key storage and management method and storage device - Google Patents
Hybrid key storage and management method and storage device Download PDFInfo
- Publication number
- CN112235102B CN112235102B CN202011049940.1A CN202011049940A CN112235102B CN 112235102 B CN112235102 B CN 112235102B CN 202011049940 A CN202011049940 A CN 202011049940A CN 112235102 B CN112235102 B CN 112235102B
- Authority
- CN
- China
- Prior art keywords
- key
- area
- storage
- file
- storage area
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
Abstract
The embodiment of the invention relates to the technical field of storage, in particular to a hybrid key storage and management method, which comprises the following steps: responding to the key operation request; acquiring a key type of a key in the key operation request; determining a target area of the key operation request based on the key type; the target area at least comprises a first storage area and a second storage area; the first storage area and the second storage area have different storage formats. A corresponding memory device is also provided. According to the embodiment of the invention, the key access performance of the storage equipment such as the security chip can be improved, and the application scenes of the storage equipment such as the security chip are enriched.
Description
Technical Field
The present invention relates to the field of storage technologies, and in particular, to a hybrid key storage and management method and a storage device.
Background
The method of accessing keys through a key file is a common method, which has the following drawbacks: when the external equipment of the use scene of the security chip needs to perform security calculation quickly, the method cannot ensure the access efficiency of the secret key. For example, in a distribution feeder automation terminal, when one terminal fails, security failure information needs to be broadcast to other terminals within 20ms, and the time for the security chip to perform data security calculation must be ensured to be within 2 ms. At this time, the method of accessing the key using the key file cannot meet the performance requirement.
There are some solutions to this in the prior art, but there are still shortcomings. For example: by partitioning the storage table of the database, and the names of the partitioned storage table correspond to the key index values stored in the table, the scanning time required by key inquiry is reduced. The method is suitable for the situation that key data are particularly large, but in a security chip in the field of industrial control, the application of the key is generally limited to identity authentication, encryption and decryption of transmission data, integrity calculation/verification and other security calculation, and massive keys are not stored, so that the method of the index table of the patent is not suitable.
Also for example: the method is applied to a multi-application system by optimizing a dynamic key storage method and a read and delete method after storage, solves the limitation of rows and columns in a key index and the limitation of key groups, and greatly improves the utilization rate of relatively tense memory resources of the embedded equipment on the basis of meeting the requirement of the maximum application number of clients. The related disclosure of the search key system compares whether the key system is established, so that the search speed can be improved, and the utilization rate of a memory can be improved. The time requirements of some high performance scenarios are still not met.
Disclosure of Invention
In view of the above, the present invention aims to propose a hybrid key storage and management method and storage device to solve at least partially the above problems.
To achieve the above object, according to a first aspect of the present invention, there is provided a hybrid key storage and management method, the method comprising: responding to a key operation request, and acquiring a key type of a key in the key operation request; and determining a target area of the key operation request based on the key type, wherein the target area at least comprises a first storage area and a second storage area, and the first storage area and the second storage area have different storage formats.
Preferably, the storage format includes block storage and file storage.
Preferably, the first storage area includes a plurality of key storage blocks, each of the key storage blocks including: a key type area, a key version area and a plurality of key value recording areas; each of the key value recording areas includes: the created identification bits and key region; the key area is used for storing a key value of a key.
Preferably, the optional operation of the first storage area includes: creating a key: writing a key value of a key into a key area of a key value recording area in an empty key storage block, simultaneously writing corresponding attributes of the key into a key type area and a key version area in the key storage block respectively, and modifying the value of an established identification bit in the key value recording area; reading a key: determining a key value recording area of the key through the key type and the key ID of the key, and returning the key value stored in the key area in the key value recording area; updating the key: and updating the key in a batch updating mode.
Preferably, the second storage area includes a file system, and the file system includes a main file or further includes an application file created under the main file; the master file or the application file includes a key file including a key area for storing a key value of a key.
Preferably, the file system further comprises a main control key, wherein the main control key is used for controlling the read-write permission of the key stored in the file system.
Preferably, the optional operation of the second storage area includes: creating a key: creating a key file, writing a key value of a key into a key area of the key file, and simultaneously writing corresponding attributes of the key into corresponding areas of the key file respectively; reading a key: determining a key file in which the key is positioned in the file system through the key type and the key ID of the key, and returning a key value stored in a key area in the key file; updating the key: the key is updated using a file replacement.
Preferably, the method further comprises: acquiring an operation instruction in the key operation request; and executing the operation on the target area based on the operation instruction and the target area to realize the key operation request.
In a second aspect of the present invention, there is also provided a storage device including a storage area including at least a first storage area and a second storage area; the first storage area and the second storage area have different storage formats for storing key data of different key types, respectively.
Preferably, the storage device is an IC card or a security chip.
The present invention also provides a computer storage medium having stored thereon a computer program which when executed by a processor implements the hybrid key storage and management method described above.
The hybrid key storage and management method and the storage device have the following beneficial effects:
1) Different design methods of storage and access management strategies are adopted according to different key uses, so that the performance of key access is improved on the premise that a security chip type hardware platform is kept unchanged;
2) The access time of the high-performance key is greatly shortened, and the method is compatible with a common key management method, so that the application of the security chip is expanded, and the application scene of the security chip is enriched;
3) The key storage and management method based on the hybrid is suitable for the key management system design with both functions and performances.
Additional features and advantages of the invention will be set forth in the detailed description which follows.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention, illustrate and explain the invention and are not to be construed as limiting the invention. In the drawings:
FIG. 1 is a schematic diagram illustrating steps of a hybrid key storage and management method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a hybrid key storage and management method according to an embodiment of the present invention;
FIG. 3 is a schematic diagram illustrating a first storage area in a hybrid key storage and management method according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a structure of a second storage area in a hybrid key storage and management method according to an embodiment of the present invention.
Detailed Description
The following describes the detailed implementation of the embodiments of the present invention with reference to the drawings. It should be understood that the detailed description and specific examples, while indicating and illustrating the invention, are not intended to limit the invention.
Fig. 1 is a schematic diagram illustrating steps of a hybrid key storage and management method according to an embodiment of the present invention, as shown in fig. 1, a hybrid key storage and management method, where the method includes:
s11, responding to a key operation request;
for the storage device, the key operation request is from a read-write device, such as a card reader or a host, and when the method embodiment responds to the key operation request, a subsequent process is performed.
S12, acquiring a key type of a key in the key operation request;
in one embodiment, the key type is set by access efficiency. For example, in a distribution feeder automation terminal, when one terminal fails, security failure information needs to be broadcast to other terminals within 20ms, and the time for the security chip to perform data security calculation must be ensured to be within 2 ms. At this time, the method of accessing the key using the key file cannot meet the performance requirement, and in this scenario, differentiation is required according to the access efficiency. In other scenarios, the password type may be classified according to security requirements of the key, key format, encryption method, frequency of use, application range, and the like.
S13, determining a target area of the key operation request based on the key type;
in the distribution feeder automation terminal, if the method for accessing the secret key through the secret key file is connected, when the external equipment of the security chip usage scene needs to perform security calculation quickly, the method cannot guarantee the access efficiency of the secret key. Thus, the need for key storage, management, and access performance needs to be comprehensively considered. According to the embodiment, different storage areas are set, so that classified management of the keys is achieved, and different applications determined by the key types are achieved.
Fig. 2 is a schematic diagram of an implementation of a hybrid key storage and management method according to an embodiment of the present invention, as shown in fig. 2. In an embodiment, the target area includes at least a first storage area and a second storage area; when a type of key needs to be accessed quickly, the present embodiment defines such a type of key as a high-performance key and creates it in a specific memory area, i.e., the first memory area. Keys that do not relate to performance requirements, this scheme is called a normal key, which is created in the second storage area. The above storage area may be set corresponding to the key type, and may be more than two, and may be determined according to the password type in the previous step. This approach may not be a one-to-one correspondence, for example three key types may correspond to two storage areas.
The first storage area and the second storage area have different storage formats. The data is stored in a plurality of storage modes, each mode has advantages and disadvantages, and the storage formats of the storage areas are determined by different storage modes. By selecting different storage formats, the balance of performance references such as efficiency, safety and the like of data access is realized.
In one embodiment, the storage format includes block storage and file storage. The block storage can divide a logical volume on a bare disk, and the logical volume is formatted into any file system, which has the advantages that: and a plurality of file systems are supported, the transmission speed is high, and a hardware fault-tolerant mechanism is provided. The file storage is to store the file on a storage medium such as a formatted disk, and the storage efficiency is high and the manageability is good. But it needs to traverse the file system when it reads and writes.
Fig. 3 is a schematic diagram of a first storage area in a hybrid key storage and management method according to an embodiment of the present invention, as shown in fig. 3. In an embodiment, the first storage area includes a number of key storage blocks, each of the key storage blocks including: a key type area, a key version area and a plurality of key value recording areas; each of the key value recording areas includes: an identification bit and a key region have been created, the key region for storing a key value of a key. Specifically, each type of key is stored in a specific location, and the key type and key version information are recorded. Each type of key stores a plurality of keys, each key storing a flag bit that has been created and a key value of the key. Through the arrangement of the storage format, not only the necessary information of the key is recorded, but also the level of key storage is simplified, and the reading efficiency is improved.
In an embodiment, the optional operation of the first storage area includes: creating a key: writing a key value of a key into a key area of a key value recording area in an empty key storage block, simultaneously writing corresponding attributes of the key into a key type area and a key version area in the key storage block respectively, and modifying the value of an established identification bit in the key value recording area; reading a key: determining a key value recording area of the key through the key type and the key ID of the key, and returning the key value stored in the key area in the key value recording area; updating the key: and updating the key in a batch updating mode.
Specifically, when a high-performance key is created, a free storage block is found in a first storage area, the type and the initial version of the key are written into a designated area, namely, the key type of the key is written into a key type area of the key storage block at the same time, the version of the key is written into a key version area of the key storage block, a created key value is filled into a corresponding key value recording area, and whether a created flag bit is rewritten as created or not.
When accessing a high-performance key, the key is generally found by a key type and a key ID, and an encrypted key value is read and decrypted for use. When the high-performance key is accessed, the storage starting position of the key of the type can be quickly found through the key type in the first storage area, then specific offset relative to the storage starting position is carried out through the key ID, and after judging whether the key has the created flag bit, the key value can be found, so that the quick access of the key is realized.
When the high-performance key is updated, the key of the same type is updated simultaneously at one time in a batch key updating mode, and the key value and the corresponding flag bit are rewritten
Fig. 4 is a schematic diagram of a structure of a second storage area in a hybrid key storage and management method according to an embodiment of the present invention, as shown in fig. 4. In an embodiment, the second storage area includes a file system including a master file or further including an application file created under the master file; the master file or the application file includes a key file including a key area for storing a key value of a key. Specifically, the common key is stored in a key file, which is contained in the file system. When a file system and a key file are created, a main file is created first, the file content of the main file contains a main control key of a platform, and the main file has the authority of managing all keys of a key storage area and is used for protecting the reading and writing of all keys. Under the master file, a plurality of (0-N) application files, a plurality of (0-N) binary files, a key file may be created. Under an application file, multiple (0-N) binary files, one key file, may be created. The format of the key file includes type, ID, version, security access rights control, key value. Each time a key file is created, it is allocated a file space of a corresponding size.
In an embodiment, the main control key in the file system is used to control the read-write permission of the key stored in the file system, which is beneficial to further improving the read-write security of the file.
In an embodiment, the optional operation of the second storage area includes: creating a key: creating a key file, writing a key value of a key into a key area of the key file, and simultaneously writing corresponding attributes of the key into corresponding areas of the key file respectively; reading a key: determining a key file in which the key is positioned in the file system through the key type and the key ID of the key, and returning a key value stored in a key area in the key file; updating the key: the key is updated using a file replacement. Specifically, when storing a key, this is achieved by adding a key file. The storage area allocates a file space with a corresponding size for the storage area, and the type, ID, version, security access authority control, key value and other contents of the key are correspondingly written into the key file. The system looks up the key by key type and key ID when accessing the normal key. First, the file system is traversed to find the corresponding key file, and then the key type and key ID value of the key file are traversed to find the corresponding key. The encrypted key value can be accessed only by the authority defined by the key security access authority control field, and is used after decryption. When the common key is updated, a key file is found, and then a key address which needs to be updated is found through the key type and the key ID, and the key version and the key value are updated.
In an embodiment, the method further comprises: acquiring an operation in the key operation request; and executing the operation on the target area based on the operation and the target area to realize the key operation request. Operations generally include the aforementioned "create key", "read key", and "update key", which are performed in different details in the first storage area and the second storage area. And analyzing the received key operation request, determining the operation and the target area required to be executed by the key operation request, and referring to the execution details in the embodiment, completing the function realization and the feedback of the key operation request.
In an embodiment, there is also provided a storage device including a storage area including at least a first storage area and a second storage area; the first storage area and the second storage area have different storage formats for storing different types of key data, respectively. By selecting different storage formats, the balance of performance references such as efficiency, safety and the like of data access is realized. According to the characteristics of key storage and access in practical application, the embodiment adopts a key storage mode which mixes two modes, and stores a key with higher access performance requirement in a high-performance key storage area, namely a first storage area according to different requirements; and other common keys are stored in a common key storage area, namely a second storage area, with relatively saved space and clearer storage structure.
In an embodiment, the storage device is an IC card or a secure chip. The file structure and file access command format of the operating system (chip operation system, COS) on a contact IC card are described in the ISO7816 specification. In existing IC smart cards and security chips, the file structure is created and accessed in the manner described by the specification. When the memory device is an IC card or a secure chip, the memory device has a small memory capacity and a high access speed. The advantages of the classified storage in the embodiment of the invention can be better reflected relative to the disk storage.
The embodiment of the invention also provides a computer storage medium, on which a computer program is stored, which when executed by a processor, implements the method for accessing a usb disk according to the embodiment.
The foregoing details of the optional implementation of the embodiment of the present invention have been described in detail with reference to the accompanying drawings, but the embodiment of the present invention is not limited to the specific details of the foregoing implementation, and various simple modifications may be made to the technical solution of the embodiment of the present invention within the scope of the technical concept of the embodiment of the present invention, and these simple modifications all fall within the protection scope of the embodiment of the present invention.
In addition, the specific features described in the above embodiments may be combined in any suitable manner without contradiction. In order to avoid unnecessary repetition, various possible combinations of embodiments of the present invention are not described in detail.
Those skilled in the art will appreciate that all or part of the steps in implementing the methods of the embodiments described above may be implemented by a program stored in a storage medium, including instructions for causing a single-chip microcomputer, chip or processor (processor) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
In addition, any combination of different implementations of the embodiment of the present invention may be performed, so long as it does not deviate from the idea of the embodiment of the present invention, which should also be regarded as disclosure of the embodiment of the present invention.
Claims (6)
1. A hybrid key storage and management method, the method comprising:
responding to a key operation request, and acquiring a key type of a key in the key operation request; the key type is set through access efficiency and comprises a high-performance key and a common key;
determining a target area of the key operation request based on the key type, wherein the target area at least comprises a first storage area and a second storage area, and the first storage area and the second storage area have different storage formats; the storage format comprises block storage and file storage;
the first storage area comprises a plurality of key storage blocks, each key storage block comprises: a key type area, a key version area and a plurality of key value recording areas; each of the key value recording areas includes: the created identification bits and key region; the key area is used for storing a key value of a key;
the second storage area includes a file system including a master file or further including an application file created under the master file; the master file or the application file includes a key file including a key area for storing a key value of a key; the file system also comprises a main control key, wherein the main control key is used for controlling the read-write permission of the key stored in the file system;
determining a target area of the key operation request based on the key type, including: the target area of the high-performance key is the first storage area, and the target area of the common key is the second storage area.
2. The method of claim 1, wherein the selectable operation of the first storage area comprises:
creating a key: writing a key value of a key into a key area of a key value recording area in an empty key storage block, simultaneously writing corresponding attributes of the key into a key type area and a key version area in the key storage block respectively, and modifying the value of an established identification bit in the key value recording area;
reading a key: determining a key value recording area of the key through the key type and the key ID of the key, and returning the key value stored in the key area in the key value recording area;
updating the key: and updating the key in a batch updating mode.
3. The method of claim 1, wherein the optional operation of the second storage area comprises:
creating a key: creating a key file, writing a key value of a key into a key area of the key file, and simultaneously writing corresponding attributes of the key into corresponding areas of the key file respectively;
reading a key: determining a key file in which the key is positioned in the file system through the key type and the key ID of the key, and returning a key value stored in a key area in the key file;
updating the key: the key is updated using a file replacement.
4. A method according to claim 2 or 3, characterized in that the method further comprises:
acquiring an operation instruction in the key operation request;
and executing the operation on the target area based on the operation instruction and the target area to realize the key operation request.
5. A memory device comprising a memory area, characterized in that,
the storage area at least comprises a first storage area and a second storage area; the first storage area comprises a plurality of key storage blocks, each key storage block comprises: a key type area, a key version area and a plurality of key value recording areas; each of the key value recording areas includes: the created identification bits and key region; the key area is used for storing a key value of a key; the second storage area includes a file system including a master file or further including an application file created under the master file; the master file or the application file includes a key file including a key area for storing a key value of a key; the file system also comprises a main control key, wherein the main control key is used for controlling the read-write permission of the key stored in the file system;
the first storage area and the second storage area have different storage formats for storing key data of different key types, respectively, including: responding to a key operation request, and acquiring a key type of a key in the key operation request; the key type is set through access efficiency and comprises a high-performance key and a common key;
determining a target area of the key operation request based on the key type, including: the target area of the high-performance key is the first storage area, and the target area of the common key is the second storage area.
6. The memory device of claim 5, wherein the memory device is an IC card or a secure chip.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011049940.1A CN112235102B (en) | 2020-09-29 | 2020-09-29 | Hybrid key storage and management method and storage device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011049940.1A CN112235102B (en) | 2020-09-29 | 2020-09-29 | Hybrid key storage and management method and storage device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112235102A CN112235102A (en) | 2021-01-15 |
CN112235102B true CN112235102B (en) | 2023-07-21 |
Family
ID=74119479
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011049940.1A Active CN112235102B (en) | 2020-09-29 | 2020-09-29 | Hybrid key storage and management method and storage device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112235102B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103414555A (en) * | 2013-08-15 | 2013-11-27 | 成都卫士通信息产业股份有限公司 | Array key management method based on IO block encryption |
CN103490878A (en) * | 2013-10-15 | 2014-01-01 | 上海杉德金卡信息系统科技有限公司 | Methods for dynamic secret key storing and stored secret key reading and deleting |
US9209974B1 (en) * | 2015-05-03 | 2015-12-08 | Zeutro, Llc | Functional encryption key management |
CN106980676A (en) * | 2017-03-29 | 2017-07-25 | 江西金格科技股份有限公司 | File management method based on intelligent key disk |
CN107609870A (en) * | 2017-09-02 | 2018-01-19 | 福建新大陆支付技术有限公司 | More application key management method, system and POS terminals for POS |
CN107707346A (en) * | 2017-04-10 | 2018-02-16 | 浙江九州量子信息技术股份有限公司 | A kind of key storage based on database, acquisition methods |
CN209402526U (en) * | 2019-03-29 | 2019-09-17 | 北京智芯微电子科技有限公司 | The key storage device of safety chip |
KR20190136554A (en) * | 2018-05-31 | 2019-12-10 | (주)케이스마텍 | Hotel smart key service method of hybrid security environment for different types of user terminals and hotel smart key management system for them |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070116288A1 (en) * | 2005-11-18 | 2007-05-24 | Oktay Rasizade | System for managing keys and/or rights objects |
US9576144B2 (en) * | 2014-09-15 | 2017-02-21 | Unisys Corporation | Secured file system management |
US10452858B2 (en) * | 2016-03-31 | 2019-10-22 | International Business Machines Corporation | Encryption key management for file system |
CN110414245B (en) * | 2018-04-28 | 2023-09-22 | 伊姆西Ip控股有限责任公司 | Method, apparatus and computer program product for managing encryption keys in a storage system |
-
2020
- 2020-09-29 CN CN202011049940.1A patent/CN112235102B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103414555A (en) * | 2013-08-15 | 2013-11-27 | 成都卫士通信息产业股份有限公司 | Array key management method based on IO block encryption |
CN103490878A (en) * | 2013-10-15 | 2014-01-01 | 上海杉德金卡信息系统科技有限公司 | Methods for dynamic secret key storing and stored secret key reading and deleting |
US9209974B1 (en) * | 2015-05-03 | 2015-12-08 | Zeutro, Llc | Functional encryption key management |
CN106980676A (en) * | 2017-03-29 | 2017-07-25 | 江西金格科技股份有限公司 | File management method based on intelligent key disk |
CN107707346A (en) * | 2017-04-10 | 2018-02-16 | 浙江九州量子信息技术股份有限公司 | A kind of key storage based on database, acquisition methods |
CN107609870A (en) * | 2017-09-02 | 2018-01-19 | 福建新大陆支付技术有限公司 | More application key management method, system and POS terminals for POS |
KR20190136554A (en) * | 2018-05-31 | 2019-12-10 | (주)케이스마텍 | Hotel smart key service method of hybrid security environment for different types of user terminals and hotel smart key management system for them |
CN209402526U (en) * | 2019-03-29 | 2019-09-17 | 北京智芯微电子科技有限公司 | The key storage device of safety chip |
Non-Patent Citations (2)
Title |
---|
基于可信计算平台的审计日志安全存储系统;成茂才;徐开勇;;计算机科学(第06期);全文 * |
支持高并发的Hadoop高性能加密方法研究;金伟;余铭洁;李凤华;杨正坤;耿魁;;通信学报(第12期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN112235102A (en) | 2021-01-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7653796B2 (en) | Information recording medium and region management method for a plurality of recording regions each managed by independent file system | |
KR100371124B1 (en) | Storing data objects in a smart card memory | |
CN103617404A (en) | Storing device of safety partitions | |
CN100419713C (en) | Mothed of dividing large volume storage stocking device | |
US8312247B2 (en) | Plural-partitioned type nonvolatile storage device and system | |
US8868929B2 (en) | Method of mass storage memory management for large capacity universal integrated circuit cards | |
US20030126434A1 (en) | File security system using a security class and method for managing an encryption key | |
RU2438173C1 (en) | Method of managing access rights in smart card | |
US20030041253A1 (en) | Recording apparatus, medium, method, and related computer program | |
US8200930B2 (en) | Interacting with data in hidden storage | |
US20090164709A1 (en) | Secure storage devices and methods of managing secure storage devices | |
CN111695163B (en) | Storage device and control method | |
CN108595346B (en) | Feature library file management method and device | |
CN103399823A (en) | Method, equipment and system for storing service data | |
CN103136215A (en) | Data read-write method and device of storage system | |
CN101430700A (en) | File management device and storage device | |
CN113420308A (en) | Data access control method and control system for encryption memory | |
KR20210027625A (en) | Method for managing of memory address mapping table for data storage device | |
US10095706B2 (en) | Data access system and data access method | |
CN110554911A (en) | Memory access and allocation method, memory controller and system | |
CN114722379A (en) | USB flash disk identification method, control method, system, electronic equipment and storage medium | |
CN103888424A (en) | Cluster-type data encryption system and data processing method thereof | |
CN112235102B (en) | Hybrid key storage and management method and storage device | |
CN105468999A (en) | Data security method and mobile hard disk | |
KR100964374B1 (en) | Device and Method for Managing Memory in RFID Tag |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |