CN109474429A - A kind of cipher key configuration strategy process towards FC storage encryption gateway - Google Patents

A kind of cipher key configuration strategy process towards FC storage encryption gateway Download PDF

Info

Publication number
CN109474429A
CN109474429A CN201811585322.1A CN201811585322A CN109474429A CN 109474429 A CN109474429 A CN 109474429A CN 201811585322 A CN201811585322 A CN 201811585322A CN 109474429 A CN109474429 A CN 109474429A
Authority
CN
China
Prior art keywords
key
encryption gateway
storage
disk array
lun
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811585322.1A
Other languages
Chinese (zh)
Other versions
CN109474429B (en
Inventor
辛建平
高克
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUXI TONGWEI TECHNOLOGY Co Ltd
Original Assignee
WUXI TONGWEI TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUXI TONGWEI TECHNOLOGY Co Ltd filed Critical WUXI TONGWEI TECHNOLOGY Co Ltd
Priority to CN201811585322.1A priority Critical patent/CN109474429B/en
Publication of CN109474429A publication Critical patent/CN109474429A/en
Application granted granted Critical
Publication of CN109474429B publication Critical patent/CN109474429B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of cipher key configuration strategy process towards FC storage encryption gateway, comprising the following steps: S1, is loaded into bright state working key table on FC storage encryption gateway;S2, FC store encryption gateway and pass through WWPN the and LUN information in the parsing extraction FC data frame to FC agreement;S3, key group number is obtained, key can only be extracted from corresponding key group to different storage disk arrays;S4, FC store encryption gateway by LUN information extraction Key Sequence Number, extract working key from corresponding key group.The present invention carries out data encrypting and deciphering using different encryption keys to the different storage volume of the same storage disk array; enhance the flexibility of FC storage encryption gateway cipher key configuration; the safety that will not influence other storage disk array key groups after one of storage disk array key group is given away secrets improves the safety of FC storage disk array data encryption and decryption protection.

Description

A kind of cipher key configuration strategy process towards FC storage encryption gateway
Technical field
The invention belongs to computer information safety technique fields, and in particular to a kind of key towards FC storage encryption gateway Configuration strategy method.
Background technique
With the universal of computer application, the development of internet and movable storage device, the raising of terminal intelligent degree is deposited The increase of capacity is stored up, people increasingly like saving some private datas in the terminal in the form of a file.In order to protect use The privacy at family, i.e., the safety of file stored in guarantee terminal, the processing such as being encrypted, decrypted to file seems increasingly important. How to effectively realize file and carry out unified security storage, centralized management and use, is just faced at present at electronic document tight High challenge.
Data in existing network transmission add/DecryptDecryption method be using plus/DecryptDecryption algorithm and plus/DecryptDecryption key pair Target data carries out plus/DecryptDecryption, data receiver receive this add/DecryptDecryption data after by plus/the algorithm of DecryptDecryption and plus/DecryptDecryption The key pair data be decrypted or encrypt, to achieve the purpose that transmitting network data, the characteristics of such way be as Fruit is that identical clear data just has identical ciphertext data, and the configuration of key is very single, and safety is low.
Summary of the invention
In order to solve the above-mentioned technical problems, the present invention provides a kind of cipher key configuration strategies towards FC storage encryption gateway Method.
In order to achieve the above object, technical scheme is as follows:
The present invention provides a kind of cipher key configuration strategy process towards FC storage encryption gateway, comprising the following steps:
S1, bright state working key table is loaded on FC storage encryption gateway;
S2, FC store encryption gateway and pass through WWPN the and LUN information in the parsing extraction FC data frame to FC agreement;
S3, key group number is obtained, key can only be extracted from corresponding key group to different storage disk arrays;
S4, FC store encryption gateway by LUN information extraction Key Sequence Number, extract working key from corresponding key group.
As a preferred option, in step S1 user first according to oneself needing to generate bright state working key table, bright state work Making key list is 32*2048 byte, and every 32 byte of working key, 2048 keys, correspond to 11 key list serial numbers altogether, and It is spare to import FC storage encryption gateway.
As a preferred option, the generating process of bright state working key table specifically includes in step S1:
S11, pass through the tactful mapping table set up between disk array and key group number;
S12, disk array and the mapping table of WWPN, LUN are set up by strategy;
S13, pass through the tactful mapping table set up between LUN and Key Sequence Number.
As a preferred option, the course of work for the WWPN and LUN information in FC data frame being extracted in step S2 is specifically wrapped It includes: obtaining WWPN, LUN from FC data frame to obtain corresponding disk array information.
As a preferred option, the course of work that key group number is obtained in step S3 specifically includes: from disk array and close Key group number is obtained in the mapping table of key group number.
As a preferred option, the Key Sequence Number course of work is extracted in step S4 to specifically include: according to LUN in Policy Table and The corresponding relationship of Key Sequence Number, index generate Key Sequence Number;
The working key course of work is extracted in step S4 to specifically include: bright state working key table is sequentially divided as unit of 32 bytes 2048 are segmented into, is indexed from cipher key store according to key list serial number and obtains 32 byte working keys, wherein high 16 byte is Key1, Low 16 byte is Key2.
Wherein, 2048 keys of user's arbitrary disposition, and be any storage disk array configuration key group, it is any storage A working key in volume configuration counterpart keys group.
The invention has the following advantages: user can add to FC storage encryption gateway setting as needed in the present invention Decruption key carries out data using different encryption key sets to the different storage disk arrays of FC storage encryption gateway connection and adds Decryption;Data encrypting and deciphering is carried out using different encryption keys to the different storage volume of the same storage disk array, is enhanced FC stores the flexibility of encryption gateway cipher key configuration, will not influence after one of storage disk array key group is given away secrets other The safety of storage disk array key group improves the safety of FC storage disk array data encryption and decryption protection.
Detailed description of the invention
Fig. 1 is a kind of process chart for the cipher key configuration strategy process that encryption gateway is stored towards FC of the present invention.
Specific embodiment
The preferred embodiment that the invention will now be described in detail with reference to the accompanying drawings.
In order to reach the purpose of the present invention, as shown in Figure 1, providing a kind of face in one of embodiment of the invention To the cipher key configuration strategy process of FC storage encryption gateway, comprising the following steps:
S1, bright state working key table is loaded on FC storage encryption gateway;
S2, FC store encryption gateway and pass through WWPN the and LUN information in the parsing extraction FC data frame to FC agreement;
S3, key group number is obtained, key can only be extracted from corresponding key group to different storage disk arrays;
S4, FC store encryption gateway by LUN information extraction Key Sequence Number, extract working key from corresponding key group.
Specifically, in step S1 user first according to oneself needing to generate bright state working key table, bright state working key table For 32*2048 byte, every 32 byte of working key, 2048 keys, correspond to 11 key list serial numbers, and import FC and deposit altogether It is spare to store up encryption gateway.
Specifically, the generating process of bright state working key table specifically includes in step S1:
S11, pass through the tactful mapping table set up between disk array and key group number;
S12, disk array and the mapping table of WWPN, LUN are set up by strategy;
S13, pass through the tactful mapping table set up between LUN and Key Sequence Number.
Specifically, the course of work that the WWPN and LUN information in FC data frame is extracted in step S2 specifically includes: from FC number According to acquisition WWPN, LUN in frame to obtain corresponding disk array information.
Specifically, the course of work that key group number is obtained in step S3 specifically includes: from disk array and key group number Key group number is obtained in mapping table.
Specifically, the Key Sequence Number course of work is extracted in step S4 to specifically include: according to LUN in Policy Table and Key Sequence Number Corresponding relationship, index generate Key Sequence Number;
The working key course of work is extracted in step S4 to specifically include: bright state working key table is sequentially divided as unit of 32 bytes 2048 are segmented into, is indexed from cipher key store according to key list serial number and obtains 32 byte working keys, wherein high 16 byte is Key1, Low 16 byte is Key2.
Wherein, 2048 keys of user's arbitrary disposition, and be any storage disk array configuration key group, it is any storage A working key in volume configuration counterpart keys group.
By above step, user neatly can store encryption gateway configuring cipher key strategy for FC, and store magnetic for FC Disk array provides safe and reliable data encrypting and deciphering protection.
By upper it will be seen that the present invention has the cipher key configuration of high efficient and flexible:
The present invention obtains WWPN, LUN from FC data frame to obtain corresponding storage disk array information, then from storage disk Key group number is obtained in array and the mapping table of key group number, can distribute 8 key groups in total.The present invention is according to LUN With the corresponding relationship of Key Sequence Number, index generates close 256 Key Sequence Numbers.Key list is divided into 2048, user can be with 2048 keys of arbitrary disposition, and be any storage disk array configuration key group, counterpart keys group is configured for any storage volume In a working key, thus improve FC storage encryption gateway cipher key configuration flexibility, when one of storage disk Array key group will not influence the safety of other storage disk array key groups after giving away secrets, improve FC storage disk number of arrays The safety protected according to encryption and decryption.
What has been described above is only a preferred embodiment of the present invention, it is noted that for those of ordinary skill in the art For, without departing from the concept of the premise of the invention, various modifications and improvements can be made, these belong to the present invention Protection scope.

Claims (7)

1. a kind of cipher key configuration strategy process towards FC storage encryption gateway, which comprises the following steps:
S1, bright state working key table is loaded on FC storage encryption gateway;
S2, FC store encryption gateway and pass through WWPN the and LUN information in the parsing extraction FC data frame to FC agreement;
S3, key group number is obtained, key can only be extracted from corresponding key group to different storage disk arrays;
S4, FC store encryption gateway by LUN information extraction Key Sequence Number, extract working key from corresponding key group.
2. the cipher key configuration strategy process according to claim 1 towards FC storage encryption gateway, which is characterized in that step For user first according to oneself needing to generate bright state working key table, bright state working key table is 32*2048 byte, every work in S1 Make 32 byte of key, altogether 2048 keys, corresponding 11 key list serial numbers, and it is spare to import FC storage encryption gateway.
3. the cipher key configuration strategy process according to claim 2 towards FC storage encryption gateway, which is characterized in that step The generating process of bright state working key table specifically includes in S1:
S11, pass through the tactful mapping table set up between disk array and key group number;
S12, disk array and the mapping table of WWPN, LUN are set up by strategy;
S13, pass through the tactful mapping table set up between LUN and Key Sequence Number.
4. the cipher key configuration strategy process according to claim 1 towards FC storage encryption gateway, which is characterized in that step The course of work that the WWPN and LUN information in FC data frame is extracted in S2 specifically includes: WWPN, LUN are obtained from FC data frame To obtain corresponding disk array information.
5. the cipher key configuration strategy process according to claim 1 towards FC storage encryption gateway, which is characterized in that step The course of work that key group number is obtained in S3 specifically includes: obtaining key from disk array and the mapping table of key group number Group number.
6. the cipher key configuration strategy process according to claim 1 towards FC storage encryption gateway, which is characterized in that step Extract the Key Sequence Number course of work in S4 to specifically include: according to the corresponding relationship of LUN in Policy Table and Key Sequence Number, index is generated Key Sequence Number;
The working key course of work is extracted in step S4 to specifically include: bright state working key table is sequentially divided as unit of 32 bytes 2048 are segmented into, is indexed from cipher key store according to key list serial number and obtains 32 byte working keys, wherein high 16 byte is Key1, Low 16 byte is Key2.
7. the cipher key configuration strategy process according to claim 6 towards FC storage encryption gateway, which is characterized in that user 2048 keys of arbitrary disposition, and be any storage disk array configuration key group, counterpart keys group is configured for any storage volume In a working key.
CN201811585322.1A 2018-12-24 2018-12-24 Key configuration strategy method facing FC storage encryption gateway Active CN109474429B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811585322.1A CN109474429B (en) 2018-12-24 2018-12-24 Key configuration strategy method facing FC storage encryption gateway

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811585322.1A CN109474429B (en) 2018-12-24 2018-12-24 Key configuration strategy method facing FC storage encryption gateway

Publications (2)

Publication Number Publication Date
CN109474429A true CN109474429A (en) 2019-03-15
CN109474429B CN109474429B (en) 2022-02-15

Family

ID=65677687

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811585322.1A Active CN109474429B (en) 2018-12-24 2018-12-24 Key configuration strategy method facing FC storage encryption gateway

Country Status (1)

Country Link
CN (1) CN109474429B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111556071A (en) * 2020-05-12 2020-08-18 深圳市汇智通咨询有限公司 Data encryption algorithm and system for computer

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090274300A1 (en) * 2008-05-05 2009-11-05 Crossroads Systems, Inc. Method for configuring the encryption policy for a fibre channel device
CN102521072A (en) * 2011-11-25 2012-06-27 成都市华为赛门铁克科技有限公司 Virtual tape library equipment and data recovery method
CN104363091A (en) * 2014-12-01 2015-02-18 国家计算机网络与信息安全管理中心 Encryption and decryption method capable of automatically retrieving keys and selecting algorithms
CN104580181A (en) * 2014-12-29 2015-04-29 华为技术有限公司 Device and method for data encryption and encryption accelerator engine
CN104699419A (en) * 2013-12-09 2015-06-10 陈勋元 Operation method of distributed memory disk cluster storage system
CN104769555A (en) * 2012-06-18 2015-07-08 艾克特菲欧有限公司 Enhanced data management virtualization system
US20150288664A1 (en) * 2014-04-04 2015-10-08 Zettaset, Inc. Method of securing files under the semi-trusted user threat model using symmetric keys and per-block key encryption
CN105337750A (en) * 2014-07-22 2016-02-17 华为技术有限公司 Fiber channel storage area network configuration method and apparatus
CN106130721A (en) * 2016-08-14 2016-11-16 北京数盾信息科技有限公司 A kind of express network storage encryption equipment
CN106254061A (en) * 2016-08-14 2016-12-21 北京数盾信息科技有限公司 A kind of express network storage encipher-decipher method
CN106330868A (en) * 2016-08-14 2017-01-11 北京数盾信息科技有限公司 Encrypted storage key management system and method of high-speed network
CN206759484U (en) * 2017-05-18 2017-12-15 无锡市同威科技有限公司 FC stores security gateway
CN109033849A (en) * 2018-06-29 2018-12-18 无锡艾立德智能科技有限公司 The encryption method and device encrypted to deposit data of magnetic disk array

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090274300A1 (en) * 2008-05-05 2009-11-05 Crossroads Systems, Inc. Method for configuring the encryption policy for a fibre channel device
CN102521072A (en) * 2011-11-25 2012-06-27 成都市华为赛门铁克科技有限公司 Virtual tape library equipment and data recovery method
CN104769555A (en) * 2012-06-18 2015-07-08 艾克特菲欧有限公司 Enhanced data management virtualization system
CN104699419A (en) * 2013-12-09 2015-06-10 陈勋元 Operation method of distributed memory disk cluster storage system
US20150288664A1 (en) * 2014-04-04 2015-10-08 Zettaset, Inc. Method of securing files under the semi-trusted user threat model using symmetric keys and per-block key encryption
CN105337750A (en) * 2014-07-22 2016-02-17 华为技术有限公司 Fiber channel storage area network configuration method and apparatus
CN104363091A (en) * 2014-12-01 2015-02-18 国家计算机网络与信息安全管理中心 Encryption and decryption method capable of automatically retrieving keys and selecting algorithms
CN104580181A (en) * 2014-12-29 2015-04-29 华为技术有限公司 Device and method for data encryption and encryption accelerator engine
CN106130721A (en) * 2016-08-14 2016-11-16 北京数盾信息科技有限公司 A kind of express network storage encryption equipment
CN106254061A (en) * 2016-08-14 2016-12-21 北京数盾信息科技有限公司 A kind of express network storage encipher-decipher method
CN106330868A (en) * 2016-08-14 2017-01-11 北京数盾信息科技有限公司 Encrypted storage key management system and method of high-speed network
CN206759484U (en) * 2017-05-18 2017-12-15 无锡市同威科技有限公司 FC stores security gateway
CN109033849A (en) * 2018-06-29 2018-12-18 无锡艾立德智能科技有限公司 The encryption method and device encrypted to deposit data of magnetic disk array

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
YI WANG, YAJUN HA: "FPGA BASED REKEYING FOR CRYPTOGRAPHIC KEY MANAGEMENT IN STORAGE AREA NETWORK", 《2013 23RD INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS》 *
刘青龙,谢军,季乔龙: "FC加密卡密钥管理系统设计与实现", 《电子技术应用》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111556071A (en) * 2020-05-12 2020-08-18 深圳市汇智通咨询有限公司 Data encryption algorithm and system for computer
CN111556071B (en) * 2020-05-12 2020-12-04 深圳市汇智通咨询有限公司 Data encryption algorithm and system for computer

Also Published As

Publication number Publication date
CN109474429B (en) 2022-02-15

Similar Documents

Publication Publication Date Title
CN109525386B (en) Paillier homomorphic encryption private aggregation and method based on Paillier
CN105610793B (en) A kind of outsourcing data encryption storage and cryptogram search system and its application process
CN103763319B (en) Method for safely sharing mobile cloud storage light-level data
CN104363215B (en) A kind of encryption method and system based on attribute
CN104158880B (en) User-end cloud data sharing solution
CN106254324A (en) A kind of encryption method storing file and device
CN105812126A (en) Lightweight back-up and efficient restoration method of health block chain data encryption keys
CN109951513B (en) Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card
US11444761B2 (en) Data protection and recovery systems and methods
CN106452770A (en) Data encryption method and apparatus, data decryption method and apparatus, and system
CN107465665A (en) A kind of file encryption-decryption method based on fingerprint identification technology
CN110519052B (en) Data interaction method and device based on Internet of things operating system
Shen et al. Toward data privacy preservation with ciphertext update and key rotation for IoT
Mo et al. Two-party fine-grained assured deletion of outsourced data in cloud systems
CN111224974A (en) Method, system, electronic device and storage medium for network communication content encryption
CN104144174B (en) Protect method, user equipment and the server of privacy of user data
CN108900540A (en) Service data processing method of power distribution terminal based on double encryption
Gowtham et al. Privacy enhanced data communication protocol for wireless body area network
CN108390755B (en) Safety input method of SIM (subscriber identity Module) film-pasting card based on built-in safety chip
CN104601820A (en) Mobile terminal information protection method based on TF password card
CN109474429A (en) A kind of cipher key configuration strategy process towards FC storage encryption gateway
Wanpeng et al. Adaptive and dynamic mobile phone data encryption method
CN103269301A (en) Desktop type IPSecVPN cryptographic machine and networking method
KR101760376B1 (en) Terminal and method for providing secure messenger service
CN101834852B (en) Realization method of credible OpenSSH for protecting platform information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant