CN109542340A - Storage method, device and device at host machine end with hidden partition - Google Patents

Storage method, device and device at host machine end with hidden partition Download PDF

Info

Publication number
CN109542340A
CN109542340A CN201811261721.2A CN201811261721A CN109542340A CN 109542340 A CN109542340 A CN 109542340A CN 201811261721 A CN201811261721 A CN 201811261721A CN 109542340 A CN109542340 A CN 109542340A
Authority
CN
China
Prior art keywords
storage device
subregion
user
hidden partition
host side
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811261721.2A
Other languages
Chinese (zh)
Inventor
黎剑坤
尚宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Dapu Microelectronics Co Ltd
Original Assignee
Shenzhen Dapu Microelectronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Dapu Microelectronics Co Ltd filed Critical Shenzhen Dapu Microelectronics Co Ltd
Priority to CN201811261721.2A priority Critical patent/CN109542340A/en
Publication of CN109542340A publication Critical patent/CN109542340A/en
Priority to PCT/CN2019/095070 priority patent/WO2020082811A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/0644Management of space entities, e.g. partitions, extents, pools
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • G06F3/0637Permissions

Abstract

The present invention relates to a kind of storage method with hidden partition, device and device at host machine end, and storage device is divided into and commonly shows subregion and hidden partition;When ordinary user accesses storage device by host side, storage device, which only shows, commonly shows subregion;When authorized user accesses storage device by host side, storage device, which shows, commonly shows subregion and hidden partition;The storage device management tool of host side carries out authentication to authorized user, and according to the subscriber identity information after being verified, notice storage equipment shows the corresponding hidden partition of storage device.The present invention can realize on a storage device commonly shows subregion and hidden partition, the use of more convenient user.

Description

Storage method, device and device at host machine end with hidden partition
Technical field
The present invention relates to a kind of storage method with hidden partition, device and device at host machine end.
Background technique
Scanning storage equipment, obtains the parameter of storage equipment after the operating system of host side powers on, and shows storage equipment Subregion.In the prior art, system memory devices and hiding storage equipment are physically two storage equipment, cause user only In the case where having system disk, hidden partition cannot be used;To use hidden partition, it is necessary in addition buy a band and hide function The storage equipment of energy.Moreover, existing hiding storage equipment usually require the support of special hardware, use cost and complexity compared with It is high.
Summary of the invention
Goal of the invention of the invention is to provide a kind of storage method with hidden partition, device and device at host machine end, It can realize on a storage device and commonly show subregion and hidden partition, the use of more convenient user.
Based on the same inventive concept, there are three independent technical solutions for present invention tool:
1, a kind of storage method with hidden partition, it is characterised in that: storage device is divided into and commonly shows subregion And hidden partition;
When ordinary user accesses storage device by host side, storage device, which only shows, commonly shows subregion;
When authorized user accesses storage device by host side, storage device, which shows, commonly shows subregion and hidden partition;
The storage device management tool of host side carries out authentication to authorized user, and according to the user after being verified Identity information, notice storage equipment show the corresponding hidden partition of storage device.
Further, the storage device management tool of host side to authorized user carry out authentication, and according to verifying after Subscriber identity information rescan storage device, device information is updated storage, to allow user to access and/or operation is corresponding Hidden partition.
Further, the method is realized by software or form of firmware.
Further, when user identity is the authorized user with administrator right, allow the user to repartition and deposit Storage device commonly shows the ratio between subregion and hidden partition.
Further, it is generated based on Digital Signature Algorithm unique between host side storage device management tool and storage device Corresponding key pair, and private key is held by host side storage device management tool, storage device holds public key;When user passes through master After the authentication of generator terminal storage device management tool, host side storage device management tool makes according to the different identity of user Visit order is digitally signed with corresponding private key, notice storage equipment shows the corresponding partitioned storage of storage device and sets Standby, storage device is verified with visit order of the corresponding public key to host side storage device management tool.
Further, when storage device powers on initial, default conditions are only to show commonly to show subregion.
2, a kind of storage device with hidden partition, the storage device include:
Subregion exposure module, subregion exposure module are divided accordingly for showing storage device according to the different identity of user Area, when ordinary user accesses storage device by host side, storage device, which only shows, commonly shows subregion;Authorized user passes through master When generator terminal accesses storage device, storage device, which shows, commonly shows subregion and hidden partition;The storage device of host side manages work Tool carries out authentication to authorized user, and according to the subscriber identity information after being verified, notice storage equipment shows storage The corresponding hidden partition of device.
Further, when user identity is the authorized user with administrator right, allow the user to repartition and deposit Storage device commonly shows the ratio between subregion and hidden partition.
Further, the default division proportion commonly shown between subregion and hidden partition of storage device.
Further, when storage device powers on initial, default conditions are only to show commonly to show subregion.
3, a kind of device at host machine end characterized by comprising
One or more processors;
Storage unit, for storing the program being managed to storage device;
It is performed by one or more processors above-mentioned method.
The invention has the benefit that
Storage device is divided by the present invention commonly shows subregion and hidden partition;It is stored when user is accessed by host side When device, host side storage device management tool carries out authentication to user to identify user identity, and not according to user Show the corresponding subregion of storage device with identity;For ordinary user, storage device, which only shows, commonly shows subregion;For authorization User, storage device, which shows, commonly shows subregion and hidden partition, and host side rescans storage device, updates storage device letter Breath, to allow user to access and/or operation hidden partition.The present invention, which realizes, to be realized commonly show point on a storage device The use cost and complexity of concealing device is effectively reduced in area and hidden partition, more convenient user, convenient for promoting.Meanwhile it is logical The scheme using pure software, firmware is crossed, can make to further reduce the cost, improves ease for use;It even can be by installing software And the mode of firmware is updated, so that the storage equipment for not having hidden function originally is possessed hidden function, further in rear dress market It is promoted.
The present invention allows the user to repartition storage dress when user identity is the authorized user with administrator right Set the ratio commonly shown between subregion and hidden partition, the use of more convenient user.
Inventive memory device includes subregion exposure module, and it is corresponding to show storage device for the different identity according to user Subregion, when ordinary user accesses storage device by host side, storage device, which only shows, commonly shows subregion;Authorized user is logical When crossing host side access storage device, storage device, which shows, commonly shows subregion and hidden partition;The storage device pipe of host side Science and engineering tool carries out authentication to authorized user, and according to the subscriber identity information after being verified, notice storage equipment shows The corresponding hidden partition of storage device.The present invention provides firmwares, the solution of software integration, are not required to other hardware branch It holds, effectively reduces the use complexity and use cost of storage equipment hidden function.
Detailed description of the invention
Fig. 1 is the flow diagram of the method for the present invention;
Fig. 2 is the hardware structural diagram of inventive memory device;
Fig. 3 is the flow chart that administrator of the present invention modifies partition holding ratio;
Fig. 4 is system program architecture diagram of the invention;
Fig. 5 is the interface routine architecture diagram of inventive memory device;
Fig. 6 is that inventive memory device subregion shows schematic diagram;
Fig. 7 is the process schematic of the signature and solution signature in digital signature.
Specific embodiment
In order to make it easy to understand, being illustrated first to concept involved in the embodiment of the present invention:
Digital signature:
As shown in fig. 7, being illustrated so that digest algorithm is hash algorithm as an example here, Fig. 7 is the signature in digital signature With the process schematic of solution signature verification.
Digital signature is the integrated use to asymmetric encryption techniques and digital digest technology, and transmitting terminal utilizes digest algorithm (such as hash algorithm) can be generated the corresponding informative abstract of original text, and be made a summary and be carried out to the communication information using the private key of transmitting terminal Signature, is then transferred to receiving end for the signing messages after signature, receiving end use is identical with transmitting terminal together with original text Hash algorithm adopts generation informative abstract 1 in a like fashion to the original text received, and decodes the label that are signed with using public key Name information obtains informative abstract 2, will compare with above- mentioned information abstract 1 with informative abstract 2, and if identical, illustrate to receive Terminating the original text received is completely, not distorted by third-party in transmission process, otherwise, illustrate original text by third Fang Xiugai.Wherein, above-mentioned original text refers to the unencryption raw information that transmitting terminal needs to send to receiving end.
Wherein, it should be noted that above-mentioned private key with public key is obtained by rivest, shamir, adelman, that is to say, that private Key and key are existing for pairing, specifically, in embodiments of the present invention, private key can be any character string, it schematically, can To be one 256 random numbers as private key, and public key is then the corresponding public affairs of private key generated using rivest, shamir, adelman Key, specifically herein without limitation.It is further to note that above-mentioned rivest, shamir, adelman can wrap in the embodiment of the present invention It includes, but is not limited to ed25519 algorithm, RSA Algorithm, DSA algorithm, Diffie-Hellman and ECC algorithm, the specific present invention Embodiment is also without limitation.
Thus, for each transmitting terminal, there is its distinctive private key, and be all pair in digital signature External world's secrecy, and by the relevant information of private key signature, it can only be decoded by its corresponding public key.Therefore, private key The identity of private key holder can be represented, the identity of private key owner can be verified by private key corresponding public key. By digital signature, then it is able to confirm that Content of Communication is that message sending end is signed and sended over, because other equipment are palmed off The not signature of message sending end, and different Content of Communication, summary info are multifarious, it, can also be really by digest algorithm The integrality of Content of Communication is protected, if Content of Communication is tampered halfway, corresponding digital signature will also change.Cause This, therefore digital signature is able to verify that the integrality of Content of Communication and the identity of transmitting terminal.
Embodiment one:
Storage method with hidden partition:
Storage device is divided into and commonly shows subregion and hidden partition;When user accesses storage device by host side When, host side storage device management tool carries out authentication to user to identify user identity, and according to the different bodies of user Part shows the corresponding subregion of storage device;For ordinary user, storage device, which only shows, commonly shows subregion;Authorization is used Family, storage device, which shows, commonly shows subregion and hidden partition, and host side rescans storage device, updates storage device letter Breath, to allow user to access and/or operation hidden partition.
As shown in Figure 1, passing through the host side storage device management tool of host side when user identity is authorized user (APP) storage device is accessed, after authentication, host side rescans storage device, obtains new device parameter, shows Storage device commonly shows subregion and hidden partition.
When ordinary user does not pass through authentication by host side access storage device or authorized user, storage device is only Show and commonly shows subregion.Ordinary user can also pass through host side by the operating system access storage device of host side Storage device management tool accesses storage device.
In the default division proportion commonly shown between subregion and hidden partition of storage device.Storage device powers on initially When, default conditions are only to show commonly to show subregion.
As shown in Fig. 2, storage device includes control unit, storage unit, wherein described control unit is chip DPU, institute Say that storage unit includes FLASH and DRAM.
DPU: it can be used for data storage control, management, optimization.
FLASH: being flash array, is basic storage medium.
DRAM: being memory grain, and important module in system stores program module, manages data-interface.
0 and port 1 of PCIE 3.0x4port: being the dual-port with host-side interface.
The user that system is supported includes ordinary user, authorized user, and wherein authorized user includes general authority user and pipe Reason person user, it is above-mentioned to access storage device with the host side storage device management tool that installed per family by host side, it can also Only pass through the operating system access storage device of host.Described storage device commonly shows between subregion and hidden partition two The logic isolation in region is that algorithm to realize (for example, can pass through sudden strain of a muscle in the flash controller (control unit) by storage device Deposit conversion layer, flash translation layer, or FTL is realized).
It is generated based on Digital Signature Algorithm unique corresponding close between host side storage device management tool and storage device Key pair, and private key is held by host side storage device management tool, storage device holds public key;When user is stored by host side After the authentication of device management tool, for host side storage device management tool according to the different identity of user, use is corresponding Private key is digitally signed visit order, and notice storage equipment shows the corresponding partitioned storage equipment of storage device, storage dress It sets and is verified with visit order of the corresponding public key to host side storage device management tool.
Physics, the biological information that user can be obtained by peripheral hardware, using physics, biological information as seed, base Private key is generated in one-way cipher hash function (cryptographic hash);Based on digital signature technology, generate and above-mentioned private The corresponding public key of key, and the public key is loaded into storage equipment.Described physical message include space index, distance, temperature, light, Sound, humidity, magnetic force, pressure, electric field, magnetic field etc.;Biological information includes sound, smell, color, behavior, face, refers to Line, palmmprint etc..
Embodiment two:
Storage method with hidden partition:
As shown in figure 3, allowing the user to repartition when user identity is the authorized user with administrator right and depositing Storage device commonly shows the ratio between subregion and hidden partition.
After the authorized user with administrator right passes through the management tool authentication of host side storage device, allow it It is issued by storage device management tool and repartitions storage device and commonly show proportional command between subregion and hidden partition, Storage device executes the resetting subregion ratio order.
Remaining workflow of embodiment two is the same as implementation one.
Embodiment three:
Storage device with hidden partition:
As shown in Fig. 2, storage device includes control unit, storage unit, wherein described control unit is chip DPU, institute Say that storage unit includes FLASH and DRAM.
DPU: it can be used for data storage control, management, optimization.
FLASH: being flash array, is basic storage medium.
DRAM: being memory grain, and important module in system stores program module, manages data-interface.
0 and port 1 of PCIE 3.0x4port: being the dual-port with host-side interface.
Storage unit includes following procedure module, is run by control unit.
Subregion exposure module, subregion exposure module are divided accordingly for showing storage device according to the different identity of user Area shows storage device only and commonly shows subregion when user identity is ordinary user;When user identity is authorized user When, show storage device and commonly show subregion and hidden partition, and triggers host side and rescan storage device, update storage Device information, to allow user to access and/or operation hidden partition.
Interface routine module, interface routine module (FTL mapping layer), for the operating system and host side with host side Host side storage device management tool is communicated.
When user identity is authorized user, pass through the host side storage device management tool access storage dress of host side It sets, after authentication, host side rescans storage device, obtains new device parameter, shows the common of storage device Show subregion and hidden partition.When ordinary user does not pass through authentication by host side access storage device or authorized user When, storage device, which only shows, commonly shows subregion.Ordinary user can by the operating system access storage device of host side, Storage device can be accessed by host side storage device management tool.
In the default division proportion commonly shown between subregion and hidden partition of storage device.Storage device powers on initially When, default conditions are only to show commonly to show subregion.
The user that system is supported includes ordinary user, authorized user, and wherein authorized user includes general authority user and pipe Reason person user, it is above-mentioned to access storage device with the host side storage device management tool that installed per family by host side, it can also Only pass through the operating system access storage device of host.Described storage device commonly shows between subregion and hidden partition two The logic isolation in region is that algorithm to realize (for example, can pass through sudden strain of a muscle in the flash controller (control unit) by storage device Deposit conversion layer, flash translation layer, or FTL is realized).
It is generated based on Digital Signature Algorithm unique corresponding close between host side storage device management tool and storage device Key pair, and private key is held by host side storage device management tool, storage device holds public key;When user is stored by host side After the authentication of device management tool, for host side storage device management tool according to the different identity of user, use is corresponding Private key is digitally signed visit order, and notice storage equipment shows the corresponding partitioned storage equipment of storage device, storage dress It sets and is verified with visit order of the corresponding public key to host side storage device management tool.
Physics, the biological information that user can be obtained by peripheral hardware, using physics, biological information as seed, base Private key is generated in one-way cipher hash function (cryptographic hash);Based on digital signature technology, generate and above-mentioned private The corresponding public key of key, and the public key is loaded into storage equipment.Described physical message include space index, distance, temperature, light, Sound, humidity, magnetic force, pressure, electric field, magnetic field etc.;Biological information includes sound, smell, color, behavior, face, refers to Line, palmmprint etc..
Example IV:
Storage device with hidden partition:
When user identity is the authorized user with administrator right, the user is allowed to repartition storage device common Show the ratio between subregion and hidden partition.
After the authorized user with administrator right passes through the management tool authentication of host side storage device, allow it It is issued by storage device management tool and repartitions storage device and commonly show proportional command between subregion and hidden partition, Storage device executes the resetting subregion ratio order.
Remaining structure, the working principle of example IV are same to implement three.
Embodiment five:
Device at host machine end:
Include:
One or more processors;
Storage unit, for storing the program (host side storage device management tool APP) being managed to storage device;
It is performed by one or more processors above-mentioned method.Described storage unit is slow by random access memory (RAM), high speed Deposit memory and hard disk drive composition.
The present invention is not only in the description and the implementation described, therefore for the personnel of familiar field Other advantage and modification is easily implemented, therefore in the essence without departing substantially from universal defined by claim and equivalency range In the case where mind and range, the present invention is not limited to specific details, representative equipment and diagrams shown and described herein Example.

Claims (11)

1. a kind of storage method with hidden partition, it is characterised in that: be divided into storage device and commonly show subregion and hidden Hide subregion;
When ordinary user accesses storage device by host side, storage device, which only shows, commonly shows subregion;
When authorized user accesses storage device by host side, storage device, which shows, commonly shows subregion and hidden partition;
The storage device management tool of host side carries out authentication to authorized user, and according to the user identity after being verified Information, notice storage equipment show the corresponding hidden partition of storage device.
2. the storage method according to claim 1 with hidden partition, it is characterised in that: the storage device pipe of host side Science and engineering tool carries out authentication to authorized user, and rescans storage device according to the subscriber identity information after verifying, updates Storage device information, to allow user to access and/or operate corresponding hidden partition.
3. the storage method according to claim 1 with hidden partition, it is characterised in that: the method is to pass through software Or form of firmware realization.
4. the storage method according to claim 1 with hidden partition, it is characterised in that: when user identity is that have pipe When the authorized user of reason person's permission, allows the user to repartition storage device and commonly show ratio between subregion and hidden partition Example.
5. the storage method according to claim 4 with hidden partition, it is characterised in that: raw based on Digital Signature Algorithm At corresponding key pair unique between host side storage device management tool and storage device, and managed by host side storage device Tool holds private key, and storage device holds public key;It is main after user passes through the authentication of host side storage device management tool Generator terminal storage device management tool is digitally signed visit order using corresponding private key according to the different identity of user, Notice storage equipment shows the corresponding partitioned storage equipment of storage device, and storage device stores host side with corresponding public key and fills The visit order for setting management tool is verified.
6. the storage method according to claim 1 with hidden partition, it is characterised in that: storage device powers on initially When, default conditions are only to show commonly to show subregion.
7. a kind of storage device with hidden partition, which is characterized in that the storage device includes:
Subregion exposure module, subregion exposure module is used to show the corresponding subregion of storage device according to the different identity of user, general When general family accesses storage device by host side, storage device, which only shows, commonly shows subregion;Authorized user passes through host side When accessing storage device, storage device, which shows, commonly shows subregion and hidden partition;The storage device management tool pair of host side Authorized user carries out authentication, and according to the subscriber identity information after being verified, notice storage equipment shows storage device Corresponding hidden partition.
8. storage device according to claim 7, it is characterised in that: when user identity is the authorization with administrator right When user, allows the user to repartition storage device and commonly show ratio between subregion and hidden partition.
9. storage device according to claim 7 or 8, it is characterised in that: storage device is default commonly to show subregion and hidden Hide the division proportion between subregion.
10. the storage device according to claim 9 with hidden partition, it is characterised in that: storage device powers on initially When, default conditions are only to show commonly to show subregion.
11. a kind of device at host machine end, it is characterised in that: include:
One or more processors;
Storage unit, for storing the program being managed to storage device;
Method described in 1 to 6 any one is required as one or more of processor perform claims.
CN201811261721.2A 2018-10-26 2018-10-26 Storage method, device and device at host machine end with hidden partition Pending CN109542340A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201811261721.2A CN109542340A (en) 2018-10-26 2018-10-26 Storage method, device and device at host machine end with hidden partition
PCT/CN2019/095070 WO2020082811A1 (en) 2018-10-26 2019-07-08 Storage method and apparatus having hidden partition, and host device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811261721.2A CN109542340A (en) 2018-10-26 2018-10-26 Storage method, device and device at host machine end with hidden partition

Publications (1)

Publication Number Publication Date
CN109542340A true CN109542340A (en) 2019-03-29

Family

ID=65845356

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811261721.2A Pending CN109542340A (en) 2018-10-26 2018-10-26 Storage method, device and device at host machine end with hidden partition

Country Status (2)

Country Link
CN (1) CN109542340A (en)
WO (1) WO2020082811A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020082811A1 (en) * 2018-10-26 2020-04-30 深圳大普微电子科技有限公司 Storage method and apparatus having hidden partition, and host device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105095945A (en) * 2014-05-07 2015-11-25 中兴软创科技股份有限公司 SD card capable of securely storing data
CN105740717A (en) * 2016-01-29 2016-07-06 四川效率源信息安全技术股份有限公司 Method and apparatus for performing electronic data file protection based on encrypted partition
CN108650271A (en) * 2018-05-17 2018-10-12 深圳大普微电子科技有限公司 A kind of method for managing user right and system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101308700A (en) * 2008-06-16 2008-11-19 南京金标尺软件有限公司 Divulging secret prevention U disk
CN101908361B (en) * 2010-09-14 2012-05-23 杭州电子科技大学 Method for hiding private information of U disk
CN102955746A (en) * 2011-08-18 2013-03-06 北京爱国者信息技术有限公司 Read-only mode mobile storage device and data access method thereof
CN109542340A (en) * 2018-10-26 2019-03-29 深圳大普微电子科技有限公司 Storage method, device and device at host machine end with hidden partition

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105095945A (en) * 2014-05-07 2015-11-25 中兴软创科技股份有限公司 SD card capable of securely storing data
CN105740717A (en) * 2016-01-29 2016-07-06 四川效率源信息安全技术股份有限公司 Method and apparatus for performing electronic data file protection based on encrypted partition
CN108650271A (en) * 2018-05-17 2018-10-12 深圳大普微电子科技有限公司 A kind of method for managing user right and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020082811A1 (en) * 2018-10-26 2020-04-30 深圳大普微电子科技有限公司 Storage method and apparatus having hidden partition, and host device

Also Published As

Publication number Publication date
WO2020082811A1 (en) 2020-04-30

Similar Documents

Publication Publication Date Title
JP6692234B2 (en) System and method for issuing security domain key management using global platform specifications
CN102945355B (en) Fast Data Encipherment strategy based on sector map is deferred to
US10116645B1 (en) Controlling use of encryption keys
CN102855452B (en) Fast Data Encipherment strategy based on encryption chunk is deferred to
US9798677B2 (en) Hybrid cryptographic key derivation
CN110460439A (en) Information transferring method, device, client, server-side and storage medium
WO2020042822A1 (en) Cryptographic operation method, method for creating work key, and cryptographic service platform and device
CN108345806A (en) A kind of hardware encryption card and encryption method
TW202036347A (en) Method and apparatus for data storage and verification
CN109558340B (en) Secure solid-state disk encryption system and method based on trusted authentication
US10003467B1 (en) Controlling digital certificate use
CN109800050A (en) A kind of EMS memory management process of virtual machine, device, relevant device and system
CN111264044A (en) Chip, method for generating private key and method for trustable certification
CN107911221B (en) Key management method for secure storage of solid-state disk data
CN107315966A (en) Solid state hard disc data ciphering method and system
CN114024711A (en) Data transmission method and device and computer readable storage medium
CN103605934A (en) Protection method and device for executable files
CN109542340A (en) Storage method, device and device at host machine end with hidden partition
KR20210095038A (en) Address decryption for memory storage
CN201498001U (en) Credible calculation platform based on symmetrical key codes
CN106845254A (en) A kind of encrypted data transmission line for computer
TWI789291B (en) Module and method for authenticating data transfer between a storage device and a host device
JP2024500822A (en) Key installation methods, systems, devices, equipment and computer programs
JP6203532B2 (en) Semiconductor memory device and data processing system
CN116383858B (en) Disk data processing method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190329

RJ01 Rejection of invention patent application after publication