CN109598157A - SSD data guard method and system - Google Patents

SSD data guard method and system Download PDF

Info

Publication number
CN109598157A
CN109598157A CN201811472776.8A CN201811472776A CN109598157A CN 109598157 A CN109598157 A CN 109598157A CN 201811472776 A CN201811472776 A CN 201811472776A CN 109598157 A CN109598157 A CN 109598157A
Authority
CN
China
Prior art keywords
ssd
key
password
summary info
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811472776.8A
Other languages
Chinese (zh)
Inventor
王猛
徐伟华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Union Memory Information System Co Ltd
Original Assignee
Shenzhen Union Memory Information System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Union Memory Information System Co Ltd filed Critical Shenzhen Union Memory Information System Co Ltd
Priority to CN201811472776.8A priority Critical patent/CN109598157A/en
Publication of CN109598157A publication Critical patent/CN109598157A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention discloses a kind of SSD data guard method and system, method is the following steps are included: SSD firmware loads the summary info H prestored from NAND;Receive input password d;Hash calculation is carried out using the private information and input password d of SSD firmware, the summary info h after output calculating;Judge whether summary info H and summary info h are equal;If unequal, denied access target data;If equal, allow access target data.Access password D and key e is not stored in NAND directly by this programme in the form of plaintext, mix by using the private information and access password of SSD firmware and is converted into summary info H using hash algorithm, key e is subjected to encryption by access key D and is converted into key information E, original access password D can not be obtained by obtaining summary info H in NAND and key information E, also key e can not be obtained, secure user data is improved, guarantees the safety of data.

Description

SSD data guard method and system
Technical field
The present invention relates to data security arts, a kind of SSD data guard method and system are especially related to.
Background technique
SSD (solid state hard disk) has been widely used in various occasions, since it is in performance, power consumption, environmental suitability etc. The outstanding index of aspect, just gradually replaces traditional hard disk.
For SSD, the safety of user data is a critically important topic.It generally can be right inside existing SSD The data of write-in are encrypted, while access password can also be arranged, and are accessed to avoid illegal user.These are for common use There is no problem for user data protection, but for the disk of user, genuine/technology fan may possibly still be present some special hands Duan Jinhang is cracked, to restore password/key, or is bypassed.For the scene relatively high for some security requiremenies, this meeting Cause great leaking data risk.
As shown in Fig. 1, the typical password of existing SSD and key management method, the specific steps are as follows:
1) user setting password (U_PWD), SSD firmware are written on NAND;
2) encryption key (U_KEY) that user data is generated inside SSD firmware, is written on NAND;
3) when SSD firmware powers on, user inputs access password: U_PWD ';
4) SSD firmware loads U_PWD, U_KEY from NAND;
5) U_PWD ' that user inputs is compared by SSD firmware with U_PWD, if it is inconsistent, authentification failure;
If 6) consistent;It is then subsequent that encryption and decryption is accessed to user data with U_KEY.
Wherein, above-mentioned U_PWD and U_KEY be in plain text deposit on NAND, can be illegally accessed and for not by The user data of protection accesses, and Information Security is low.
Summary of the invention
In order to solve the defect of the above-mentioned prior art, the object of the present invention is to provide a kind of SSD data guard method and it is System.
In order to achieve the above objectives, the technical scheme is that
A kind of SSD data guard method, comprising the following steps:
SSD firmware loads the summary info H prestored from NAND;
Receive input password d;
Hash calculation is carried out using the private information and input password d of SSD firmware, the summary info h after output calculating;
Judge whether summary info H and summary info h are equal;
If unequal, denied access target data;
If equal, allow access target data.
Further, after the permission access target data step, comprising the following steps:
SSD firmware loads encrypted key information E from NAND;
Key information E is decrypted using input password d, obtains key e;
Row encryption and decryption is write into using subsequent reads of the key e to target data.
It further, further include following step before the SSD firmware loads the summary info H step prestored from NAND It is rapid:
Setting access password D;
It is mixed with access password D according to setting rule using the private information of SSD firmware, and carries out Hash calculation and obtain To summary info H, summary info H is written on NAND.
Further, before the SSD firmware loads encrypted key information E step from NAND, including,
Key e is encrypted to obtain key information E using access password D, and key information E is written on NAND.
Further, the private information using SSD firmware and access password D are according to setting rule progress mixing step Suddenly, including,
It is mixed with access password D according to setting rule using the sequence number of the every disk of SSD firmware.
The invention also provides a kind of SSD data protection systems, comprising:
First loading unit, for loading the summary info H prestored from NAND by SSD firmware;
Password Input unit, for receiving input password d;
First conversion unit, private information and password d for using SSD firmware carry out Hash calculation, after output calculates Summary info h;
Judging unit, for judging whether summary info H and summary info h are equal;
Denied access unit is used for when determining unequal, denied access target data;
Allow access unit, for allowing access target data when determining equal.
Further, further includes: the second loading unit, for loading encrypted key from NAND by SSD firmware Information E;
Key acquiring unit obtains key e for key information E to be decrypted using input password d;
Data decryption unit, for writing into row encryption and decryption using subsequent reads of the key e to target data.
Further, further includes: password setting unit, for access password D to be arranged;
Second conversion unit is mixed with access password D according to setting rule for the private information using SSD firmware It closes, and carries out Hash calculation and obtain summary info H, summary info H is written on NAND.
It further, further include secret key encryption unit, for being encrypted to obtain key to key e using access password D Information E, and key information E is written on NAND.
Further, second conversion unit includes conversion module, and the conversion module is used to use the every disk of SSD firmware Sequence number with access password D according to setting rule mixed.
The beneficial effects of the present invention are: access password D and key e is not stored in directly by this programme in the form of plaintext In NAND, mixing is carried out by using the private information and access password of SSD firmware and is converted into abstract letter using hash algorithm H is ceased, key e is carried out by encryption by access key D and is converted into key information E, it can not be by obtaining the summary info H in NAND Original access password D is obtained with key information E, can not also obtain key e, improves secure user data, guarantees number According to safety.
Detailed description of the invention
Fig. 1 is the schematic diagram of a kind of existing SSD typical password and key management method;
Fig. 2 is a kind of schematic diagram of SSD data guard method of the present invention;
Fig. 3 is a kind of method flow diagram of SSD data guard method of one embodiment of the invention;
Fig. 4 is a kind of method flow diagram of SSD data guard method of another embodiment of the present invention;
Fig. 5 is the method and step flow chart before step S1 of the present invention;
Fig. 6 is a kind of structural block diagram of SSD data protection system of the present invention;
Fig. 7 is a kind of part-structure block diagram of SSD data protection system of the present invention;
Fig. 8 is a kind of structural block diagram of second conversion unit of the present invention.
Specific embodiment
To illustrate thought and purpose of the invention, the present invention is done further below in conjunction with the drawings and specific embodiments Explanation.
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiment is only a part of the embodiments of the present invention, instead of all the embodiments.Base Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts it is all its His embodiment, shall fall within the protection scope of the present invention.
It is to be appreciated that the directional instruction (up, down, left, right, before and after etc.) of institute is only used in the embodiment of the present invention It explains in relative positional relationship, the motion conditions etc. under a certain particular pose (as shown in the picture) between each component, if the spy When determining posture and changing, then directionality instruction also correspondingly changes correspondingly, and the connection, which can be, to be directly connected to, can also To be to be indirectly connected with.
In addition, the description for being such as related to " first ", " second " in the present invention is used for description purposes only, and should not be understood as Its relative importance of indication or suggestion or the quantity for implicitly indicating indicated technical characteristic.Define as a result, " first ", The feature of " second " can explicitly or implicitly include at least one of the features.In addition, the technical side between each embodiment Case can be combined with each other, but must be based on can be realized by those of ordinary skill in the art, when the combination of technical solution Conflicting or cannot achieve when occur will be understood that the combination of this technical solution is not present, also not the present invention claims guarantor Within the scope of shield.
Unless otherwise instructed, "/" herein represents meaning as "or".
Shown in Fig. 1 and 2, in which:
U_PWD represents access password, below to access password D replacement;
U_PWD ' represents input password, below to input password d replacement;
U_KEY represents encryption and decryption key, below with key e replacement;
U_KEY_E is represented using the access encrypted key information of password D, below with key information E replacement;
U_PWD_H represents the summary info being calculated according to access password D, below with summary info H replacement;
U_PWD_H ' represents the summary info being calculated according to input password d, below with summary info h replacement.
Wherein, " hash " is done in Hash calculation, Hash, general translation, and it is exactly any that also having direct transliteration, which is " Hash ", The input (be called and be preliminary mapping pre-image) of length is transformed into the output of regular length by hashing algorithm, which is exactly Hashed value.This conversion is a kind of compression mapping, it is, the space of hashed value is generally much less than the space inputted, it is different Input may hash to identical output, it is impossible to unique input value is determined from hashed value.Briefly it is exactly A kind of function of the eap-message digest of message compression by random length to a certain regular length.
NAND is a kind of nonvolatile storage technologies, that is, remains to save data after powering off.
Referring to Fig. 2-5, a specific embodiment of the invention proposes a kind of SSD data guard method, comprising the following steps:
S1, SSD firmware load the summary info H prestored from NAND.
S2, input password d is received.
S3, Hash calculation is carried out using the private information and input password d of SSD firmware, the summary info after output calculating h。
S4, judge whether summary info H and summary info h are equal.
If S5, unequal, denied access target data.
If S6, equal, allow access target data.
For step S1, summary info H is by the way that each disk of pre-set access password D and SSD firmware is own Private information integration after conversion obtain, and summary info H is stored in NAND, direct will access password different from existing D is directly stored in NAND in plain text, ensure that the safety of access password D.
It is further comprising the steps of before step S1 with reference to Fig. 5:
S11, setting access password D.
S12, it is mixed with access password D according to setting rule using the private information of SSD firmware, and carries out Hash meter Calculation obtains summary info H, and summary info H is written on NAND.
S13, key e is encrypted to obtain key information E using access password D, and key information E is written to NAND On.
For step S12, using SSD firmware private information and the access password D that sets according to setting rule into Row mixing, and mixed data are subjected to Hash calculation in HASH engine, obtain the summary info H of regular length, third party Even if obtaining summary info H by the means cracked, corresponding access password D can not be also got, guarantees the peace of data access Quan Xing.User only correctly inputs password d in input, and the private information that will input password d combination SSD firmware carries out Hash Calculate the just available summary info h equal with summary info H.
Wherein mixing rule can be user's sets itself and be also possible to set when SSD factory.
Wherein, " hash " is done in Hash calculation, Hash, general translation, and it is exactly any that also having direct transliteration, which is " Hash ", The input (be called and be preliminary mapping pre-image) of length is transformed into the output of regular length by hashing algorithm, which is exactly Hashed value.This conversion is a kind of compression mapping, it is, the space of hashed value is generally much less than the space inputted, it is different Input may hash to identical output, it is impossible to unique input value is determined from hashed value.Briefly it is exactly A kind of function of the eap-message digest of message compression by random length to a certain regular length.
Step S12 is specifically included: being mixed with access password D according to setting rule using the sequence number of the every disk of SSD firmware It closes.
The sequence number (SN, Serial Number) of the every disk of SSD firmware is only stored in SSD firmware, can not directly be obtained It takes.
For step S13, access password D is encrypted by step S12, even if so that third party obtains summary info H can not also get access password D therein, ensure that the safety of access password D, while using access password D to key e It is encrypted, guarantees that third party under the premise of not knowing access password, can not also be directly obtained key e, by that will access Password D and key e are stored encrypted in NAND, ensure that access password D and key e safety, and then ensure that data in SSD Safety.
The private information of input password d and SSD firmware is used after receiving input password d for step S2-S4 Mixed according to the rule of setting, Hash calculation carried out after mixing, obtain corresponding summary info h, if input password d and Access that password D is consistent, then the summary info h that calculates and the summary info H prestored can correspond to it is identical, so being plucked by judgement It wants information H and summary info h whether equal, that is, may know that whether input password is accurate and whether the user has data visit Ask permission.
For step S5 and S6, allowed according to the judgement result of step S4 or organizing user access SSD in data, protect Demonstrate,prove Information Security.
Access password D and key e is not stored in NAND directly by this programme in the form of plaintext, solid by using SSD The private information and access password of part mix and are converted into summary info H using hash algorithm, will be close by access key D Key e carry out encryption is converted into key information E, can not by obtain NAND in summary info H and key information E it is original to obtain Access password D, can not also obtain key e, improve secure user data, guarantee the safety of data.
It is further comprising the steps of after step S6 in another specific embodiment of the present invention with reference to Fig. 3:
S7, SSD firmware load encrypted key information E from NAND.
S8, key information E is decrypted using input password d, obtains key e.
S9, row encryption and decryption is write into using subsequent reads of the key e to target data.
Pre- storage is got from NAND after determining to allow to access the target data in SSD for step S7-S9 Key information E, key information E are that key e use is visited made of password D encryption, and is determining summary info H and summary info h Under the premise of consistent, just representative input password d is consistent with access password D, so can be by input password d to key information E It is decrypted, obtains corresponding key e, complete the safe transmission of data.
Specifically, access password D and key e is replaced simultaneously and is encrypted in deposit NAND when with changing access password D.
Access password D and key e is not stored in NAND directly by this programme in the form of plaintext, solid by using SSD The private information and access password of part mix and are converted into summary info H using hash algorithm, will be close by access key D Key e carry out encryption is converted into key information E, can not by obtain NAND in summary info H and key information E it is original to obtain Access password D, can not also obtain key e, improve secure user data, guarantee the safety of data.
With reference to Fig. 6-8, the invention also provides a kind of SSD data protection systems, comprising:
First load single 1, for loading the summary info H prestored from NAND by SSD firmware.
Password Input unit 2, for receiving input password d.
First conversion unit 3, private information and password d for using SSD firmware carry out Hash calculation, after output calculates Summary info h.
Judging unit 4, for judging whether summary info H and summary info h are equal.
Denied access unit 41 is used for when determining unequal, denied access target data.
Allow access unit 42, for allowing access target data when determining equal.
Second loading unit 5, for loading encrypted key information E from NAND by SSD firmware.
Key acquiring unit 6 obtains key e for key information E to be decrypted using input password d.
Data encrypting and deciphering unit 7, for writing into row encryption and decryption using subsequent reads of the key e to target data.
For the first loading unit 1, summary info H is by the way that pre-set access password D and SSD firmware is every Conversion obtains after the own private information integration of a disk, and summary info H is stored in NAND, directly will different from existing Access password D is directly stored in NAND in plain text, ensure that the safety of access password D.
Password Input unit 2, the first conversion unit 3 and judging unit 4 are used after receiving input password d Input password d is mixed with the private information of SSD firmware according to the rule of setting, and Hash calculation is carried out after mixing, is obtained pair The summary info h answered, if input password d is consistent with access password D, the summary info h calculated and the abstract prestored Information H can correspond to it is identical, so may know that whether input password by judge whether summary info H and summary info h equal Accurately and whether the user has data access authority.
For denied access unit 41 and allow access unit 42, is allowed according to the judgement result of judging unit 4 or group Knit the data in user's access SSD, assuring data security.
For the second loading unit 5, key acquiring unit 6 and data encryption/decryption element 7, determining to allow to access in SSD Target data after, get the key information E of pre- storage from NAND, key information E is that key e is encrypted using password D is visited Made of, and under the premise of determining summary info H and summary info h consistent, just represent input password d and access password D mono- It causes, so key information E can be decrypted by inputting password d, obtains corresponding key e, the safety for completing data passes It is defeated.
Specifically, access password D and key e is replaced simultaneously and is encrypted in deposit NAND when with changing access password D.
With reference to Fig. 7, a kind of SSD data protection system of the invention further includes password setting unit 8, the second conversion unit 9 With secret key encryption unit 10.
Password setting unit 8, for access password D to be arranged.
Second conversion unit 9 is mixed with access password D according to setting rule for the private information using SSD firmware It closes, and carries out Hash calculation and obtain summary info H, summary info H is written on NAND.
Secret key encryption unit 10, for being encrypted to obtain key information E to key e using access password D, and by key Information E is written on NAND.
For the second conversion unit 9, using the private information and the access password D that sets of SSD firmware according to setting Rule is mixed, and mixed data are carried out Hash calculation in HASH engine, obtains the summary info H of regular length, Even if third party, which passes through the means cracked, obtains summary info H, corresponding access password D can not be also got, guarantees that data are visited The safety asked.User only input correctly input password d, by input password d combination SSD firmware private information into The available summary info h equal with summary info H of row Hash calculation.
Wherein mixing rule can be user's sets itself and be also possible to set when SSD factory.
Wherein, " hash " is done in Hash calculation, Hash, general translation, and it is exactly any that also having direct transliteration, which is " Hash ", The input (be called and be preliminary mapping pre-image) of length is transformed into the output of regular length by hashing algorithm, which is exactly Hashed value.This conversion is a kind of compression mapping, it is, the space of hashed value is generally much less than the space inputted, it is different Input may hash to identical output, it is impossible to unique input value is determined from hashed value.Briefly it is exactly A kind of function of the eap-message digest of message compression by random length to a certain regular length.
With reference to Fig. 8, the second conversion unit 9 includes conversion module 91, and conversion module 91 is used for the sequence using the every disk of SSD firmware Row number is mixed with access password D according to setting rule.
For conversion module 91, the sequence number (SN, Serial Number) of the every disk of SSD firmware is to be only stored in SSD firmware It is interior, it can not directly be acquired.
For secret key encryption unit 10, the second 9 pairs of conversion unit access password D is encrypted so that third party i.e. so that Access password D therein can not be also got to summary info H, ensure that the safety of access password D, while close using accessing Code D encrypts key e, guarantees that third party under the premise of not knowing access password, can not also be directly obtained key e, It is stored encrypted in NAND by the way that password D and key e will be accessed, ensure that access password D and key e safety, and then guarantee The safety of data in SSD.
Access password D and key e is not stored in NAND directly by this programme in the form of plaintext, solid by using SSD The private information and access password of part mix and are converted into summary info H using hash algorithm, will be close by access key D Key e carry out encryption is converted into key information E, can not by obtain NAND in summary info H and key information E it is original to obtain Access password D, can not also obtain key e, improve secure user data, guarantee the safety of data.
The above description is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all utilizations Equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content is applied directly or indirectly in other correlations Technical field, be included within the scope of the present invention.

Claims (10)

1. a kind of SSD data guard method, which comprises the following steps:
SSD firmware loads the summary info H prestored from NAND;
Receive input password d;
Hash calculation is carried out using the private information and input password d of SSD firmware, the summary info h after output calculating;
Judge whether summary info H and summary info h are equal;
If unequal, denied access target data;
If equal, allow access target data.
2. SSD data guard method as described in claim 1, which is characterized in that the permission access target data step it Afterwards, comprising the following steps:
SSD firmware loads encrypted key information E from NAND;
Key information E is decrypted using input password d, obtains key e;
Row encryption and decryption is write into using subsequent reads of the key e to target data.
3. SSD data guard method as claimed in claim 2, which is characterized in that the SSD firmware is loaded from NAND to be prestored Summary info H step before, it is further comprising the steps of:
Setting access password D;
It is mixed with access password D according to setting rule using the private information of SSD firmware, and carries out Hash calculation and plucked Information H is wanted, summary info H is written on NAND.
4. SSD data guard method as claimed in claim 3, which is characterized in that the SSD firmware loads encryption from NAND Before key information E step afterwards, including,
Key e is encrypted to obtain key information E using access password D, and key information E is written on NAND.
5. SSD data guard method as claimed in claim 3, which is characterized in that the private information using SSD firmware with It accesses password D and carries out mixing step according to setting rule, including,
It is mixed with access password D according to setting rule using the sequence number of the every disk of SSD firmware.
6. a kind of SSD data protection system characterized by comprising
First loading unit, for loading the summary info H prestored from NAND by SSD firmware;
Password Input unit, for receiving input password d;
First conversion unit, private information and password d for using SSD firmware carry out Hash calculation, plucking after output calculating Want information h;
Judging unit, for judging whether summary info H and summary info h are equal;
Denied access unit is used for when determining unequal, denied access target data;
Allow access unit, for allowing access target data when determining equal.
7. SSD data protection system as claimed in claim 6, which is characterized in that further include:
Second loading unit, for loading encrypted key information E from NAND by SSD firmware;
Key acquiring unit obtains key e for key information E to be decrypted using input password d;
Data encrypting and deciphering unit, for writing into row encryption and decryption using subsequent reads of the key e to target data.
8. SSD data protection system as claimed in claim 7, which is characterized in that further include:
Password setting unit, for access password D to be arranged;
Second conversion unit is mixed with access password D according to setting rule for the private information using SSD firmware, and It carries out Hash calculation and obtains summary info H, summary info H is written on NAND.
9. SSD data protection system as claimed in claim 8, which is characterized in that further include secret key encryption unit, for using Access password D encrypts key e to obtain key information E, and key information E is written on NAND.
10. SSD data protection system as claimed in claim 8, which is characterized in that second conversion unit includes conversion mould Block, the conversion module are used to be mixed with access password D according to setting rule using the sequence number of the every disk of SSD firmware.
CN201811472776.8A 2018-12-04 2018-12-04 SSD data guard method and system Pending CN109598157A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811472776.8A CN109598157A (en) 2018-12-04 2018-12-04 SSD data guard method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811472776.8A CN109598157A (en) 2018-12-04 2018-12-04 SSD data guard method and system

Publications (1)

Publication Number Publication Date
CN109598157A true CN109598157A (en) 2019-04-09

Family

ID=65960734

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811472776.8A Pending CN109598157A (en) 2018-12-04 2018-12-04 SSD data guard method and system

Country Status (1)

Country Link
CN (1) CN109598157A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110210259A (en) * 2019-06-05 2019-09-06 深圳忆联信息系统有限公司 A kind of data guard method and its system of solid state hard disk

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101640682A (en) * 2009-06-04 2010-02-03 深圳市汇海科技开发有限公司 Method for improving safety of Web service
CN101673248A (en) * 2008-09-10 2010-03-17 群联电子股份有限公司 Storage system, controller and data protection method
CN105843701A (en) * 2015-01-14 2016-08-10 小米科技有限责任公司 Data backup method and device
CN107341405A (en) * 2017-06-30 2017-11-10 记忆科技(深圳)有限公司 A kind of encryption method of data transmission procedure

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101673248A (en) * 2008-09-10 2010-03-17 群联电子股份有限公司 Storage system, controller and data protection method
CN101640682A (en) * 2009-06-04 2010-02-03 深圳市汇海科技开发有限公司 Method for improving safety of Web service
CN105843701A (en) * 2015-01-14 2016-08-10 小米科技有限责任公司 Data backup method and device
CN107341405A (en) * 2017-06-30 2017-11-10 记忆科技(深圳)有限公司 A kind of encryption method of data transmission procedure

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110210259A (en) * 2019-06-05 2019-09-06 深圳忆联信息系统有限公司 A kind of data guard method and its system of solid state hard disk

Similar Documents

Publication Publication Date Title
CN109862041B (en) Digital identity authentication method, equipment, device, system and storage medium
EP2866166B1 (en) Systems and methods for enforcing third party oversight data anonymization
JP6275653B2 (en) Data protection method and system
US9141822B2 (en) Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method
JP4857283B2 (en) Multipurpose content control by partitioning
US20040098591A1 (en) Secure hardware device authentication method
CN1689269B (en) System and method for guaranteeing software integrity
JP2008520030A (en) Method, device and system for securely storing data
WO2012034250A1 (en) Secure data in removable storage devices via encryption token(s)
US20230216667A1 (en) Cryptographic systems and methods using distributed ledgers
CN109657479B (en) Data leakage prevention method and computer readable storage medium
CN116362747A (en) Block chain digital signature system
CN106055936A (en) Method and device for encryption/decryption of executable program data package
US20090064273A1 (en) Methods and systems for secure data entry and maintenance
US11706022B1 (en) Method for trusted data decryption based on privacy-preserving computation
US11615207B2 (en) Security processor configured to authenticate user and authorize user for user data and computing system including the same
US11232209B2 (en) Trojan detection in cryptographic hardware adapters
CN114662135A (en) Data access method, computer device and readable storage medium
CN114942729A (en) Data safety storage and reading method for computer system
CN100596058C (en) System and method for managing credible calculating platform key authorization data
CN109598157A (en) SSD data guard method and system
CN110661621A (en) Mixed encryption and decryption method based on HMAC, AES and RSA
CN111506915B (en) Authorized access control method, device and system
CN108345804B (en) Storage method and device in trusted computing environment
US11405201B2 (en) Secure transfer of protected application storage keys with change of trusted computing base

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190409

RJ01 Rejection of invention patent application after publication