CN110472445A - Data guard method, device, solid state hard disk and storage medium - Google Patents

Data guard method, device, solid state hard disk and storage medium Download PDF

Info

Publication number
CN110472445A
CN110472445A CN201910590550.6A CN201910590550A CN110472445A CN 110472445 A CN110472445 A CN 110472445A CN 201910590550 A CN201910590550 A CN 201910590550A CN 110472445 A CN110472445 A CN 110472445A
Authority
CN
China
Prior art keywords
data
encryption
encryption key
hmb
ciphertext data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910590550.6A
Other languages
Chinese (zh)
Inventor
李创锋
何坚柱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN TIGO SEMICONDUCTOR CO Ltd
Original Assignee
SHENZHEN TIGO SEMICONDUCTOR CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN TIGO SEMICONDUCTOR CO Ltd filed Critical SHENZHEN TIGO SEMICONDUCTOR CO Ltd
Priority to CN201910590550.6A priority Critical patent/CN110472445A/en
Publication of CN110472445A publication Critical patent/CN110472445A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories

Abstract

This application involves a kind of data guard method, device, solid state hard disk and storage mediums.The described method includes: being encrypted to the clear data according to predetermined encryption mode before clear data is written to host memory buffer area HMB, obtaining ciphertext data, the HMB is written into the ciphertext data.The application can be by encrypting clear data in solid state hard disk, HMB is written into encrypted ciphertext data again, since there is only ciphertext data in HMB, so even if the ciphertext data on HMB are stolen, also it can not decrypt to obtain correct clear data, ensure that the safety of clear data.

Description

Data guard method, device, solid state hard disk and storage medium
Technical field
This application involves solid state hard disk technical field more particularly to a kind of data guard method, device, solid state hard disk and deposit Storage media.
Background technique
Solid state drive (Solid State Drive, SSD), is commonly called as solid state hard disk, because solid state hard disk is needed in running A large amount of operations are handled, the memory (e.g. memory) configured in solid state hard disk, amount of capacity has the efficiency of solid state hard disk It is direct to influence.Host memory buffer area HMB (Host Memory Buffer) is one piece that system end is supplied to solid state hard disk Memory headroom solid state hard disk can freely be read and write, temporal data.In general, solid state hard disk is obtaining this additional memory of HMB Behind space, efficiency can all be promoted.
Solid state hard disk will do it a large amount of operations in running, need memory headroom come data required when accessing operation. Data include FTL (Flash Translate Layer), GC (garbage collection) etc., for solid state hard disk this A little data are all sensitive, and traditional application method of HMB is that solid state hard disk is directly deposited in data on HMB, exists and is hacked The risk that visitor steals.
Summary of the invention
In order to solve the above-mentioned technical problem or it at least is partially solved above-mentioned technical problem, this application provides a kind of numbers According to guard method, device, solid state hard disk and storage medium.
In a first aspect, this application provides a kind of data guard methods, which comprises
To host memory buffer area HMB be written clear data before, to the clear data according to predetermined encryption mode into Row encryption obtains ciphertext data;
The HMB is written into the ciphertext data.
Optionally, the clear data is encrypted according to predetermined encryption mode, obtains ciphertext data, comprising:
Determine the encryption key that encryption uses;
The clear data is encrypted using preset Encryption Algorithm and the encryption key, obtains ciphertext number According to;
The encryption key is locally stored.
Optionally it is determined that the encryption key that encryption uses, comprising:
Generate the first character string at random using random number generator;
First character string is determined as the encryption key.
Optionally it is determined that the encryption key that encryption uses, comprising:
Read the second character string at random from nand flash memory;
Second character string is determined as the encryption key.
Optionally it is determined that the encryption key that encryption uses, comprising:
After powering on every time/every by preset time period, redefine the encryption key that encryption uses.
Optionally, the method also includes:
After reading the ciphertext data from the HMB, to the ciphertext data according to the predetermined encryption mode Corresponding manner of decryption is decrypted, and obtains the clear data.
Optionally, place is decrypted according to manner of decryption corresponding with the predetermined encryption mode to the ciphertext data Reason, obtains clear data, comprising:
Determine decruption key corresponding with the encryption key that encryption uses;
Using the corresponding decipherment algorithm of the preset and described Encryption Algorithm and decruption key corresponding with the encryption key, The ciphertext data are decrypted, clear data is obtained.
Second aspect, this application provides a kind of data protecting device, described device includes:
Encrypting module is used for before clear data is written to host memory buffer area HMB, to the clear data according to pre- If cipher mode is encrypted, ciphertext data are obtained;
Writing module, for the HMB to be written in the ciphertext data.
The third aspect, this application provides a kind of solid state hard disk, including memory, processor and storage are on a memory simultaneously The computer program that can be run on a processor, the processor realize side described in first aspect when executing the computer program The step of method.
The third aspect, this application provides a kind of computer readable storage mediums, are stored thereon with computer program, described The step of method described in first aspect is realized when computer program is executed by processor.
Above-mentioned data guard method, device, solid state hard disk and storage medium, which comprises the embodiment of the present application is logical It crosses before clear data is written to host memory buffer area HMB, the clear data is encrypted according to predetermined encryption mode Processing, obtains ciphertext data, and the HMB is written in the ciphertext data.
The embodiment of the present application is write by encrypting in solid state hard disk to clear data, then by encrypted ciphertext data Enter HMB, since there is only ciphertext data in HMB, so can not also decrypt to obtain just even if the ciphertext data on HMB are stolen True clear data ensure that the safety of clear data.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, for those of ordinary skill in the art Speech, without any creative labor, is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow diagram of data guard method in the embodiment of the present invention;
Fig. 2 is a kind of schematic illustration of data guard method in the embodiment of the present invention;
Fig. 3 is a kind of flow diagram of Fig. 1 step S101 in the embodiment of the present invention;
Fig. 4 is the schematic illustration of another data guard method in the embodiment of the present invention;
Fig. 5 is a kind of structural block diagram of data protecting device in the embodiment of the present invention.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the application, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people Member's every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
Since solid state hard disk will do it a large amount of operations in running, need memory headroom come number required when accessing operation According to.Data include FTL (Flash Translate Layer), GC (garbage collection) etc., for solid state hard disk These data are all sensitive, and traditional application method of HMB is that solid state hard disk is directly deposited in data on HMB, exist by The risk that hacker steals.It is situated between for this purpose, the embodiment of the present application provides a kind of data guard method, device, solid state hard disk and storage Matter, as shown in Figure 1, in one embodiment, providing a kind of data guard method.The data guard method can be applied to In solid state hard disk, the solid state hard disk can be communicated with host memory buffer area HMB, referring to Figures 1 and 2, the data protection side Method specifically comprises the following steps:
Step S101 adds the clear data according to default before clear data is written to host memory buffer area HMB Close mode is encrypted, and obtains ciphertext data;
As shown in figure 3, the step S101 the following steps are included:
Step S201 determines the encryption key that encryption uses;
In practical applications, if encryption key remains constant, each identical clear data is after key encrypts Same ciphertext data can be obtained, hacker, which has an opportunity to penetrate, steals data for a long time to guess the content of plaintext.For this purpose, in the step In rapid, can after powering on every time/it is every by preset time period, redefine the encryption key that encryption uses.This Sample can shorten the term of validity of key, can reduce data and be stolen conjecture for a long time and crack acquisition in plain text.
In a kind of embodiment of the application, it can use random number generator and generate the first character string at random, by institute It states the first character string and is determined as the encryption key.
In the another embodiment of the application, the second character string can be read at random from nand flash memory, it will be described Second character string is determined as the encryption key.
Step S202 is encrypted the clear data using preset Encryption Algorithm and the encryption key, Obtain ciphertext data;
In the embodiment of the present application, Encryption Algorithm can be illustratively AES encryption algorithm or national secret algorithm etc..
The encryption key is locally stored step S203.
The HMB is written in the ciphertext data by step S102.
The embodiment of the present application is by pressing the clear data before clear data is written to host memory buffer area HMB It is encrypted according to predetermined encryption mode, obtains ciphertext data, the HMB is written into the ciphertext data.
The embodiment of the present application is write by encrypting in solid state hard disk to clear data, then by encrypted ciphertext data Enter HMB, since there is only ciphertext data in HMB, so can not also decrypt to obtain just even if the ciphertext data on HMB are stolen True clear data ensure that the safety of clear data.
Above-mentioned data guard method is derived using the technical characteristic of data guard method exclusive rights, and realization is able to solve The beneficial effect of technical problem proposed in background technique.
Fig. 1 is the flow diagram of data guard method in one embodiment.Although should be understood that the process of Fig. 1 Each step in figure is successively shown according to the instruction of arrow, but these steps are not the inevitable sequence indicated according to arrow Successively execute.Unless expressly stating otherwise herein, there is no stringent sequences to limit for the execution of these steps, these steps can To execute in other order.Moreover, at least part step in Fig. 1 may include multiple sub-steps or multiple stages, These sub-steps or stage are not necessarily to execute completion in synchronization, but can execute at different times, these Sub-step perhaps the stage execution sequence be also not necessarily successively carry out but can be with the son of other steps or other steps Step or at least part in stage execute in turn or alternately.
Fig. 3 is the flow diagram of data guard method in one embodiment.Although should be understood that the process of Fig. 3 Each step in figure is successively shown according to the instruction of arrow, but these steps are not the inevitable sequence indicated according to arrow Successively execute.Unless expressly stating otherwise herein, there is no stringent sequences to limit for the execution of these steps, these steps can To execute in other order.Moreover, at least part step in Fig. 3 may include multiple sub-steps or multiple stages, These sub-steps or stage are not necessarily to execute completion in synchronization, but can execute at different times, these Sub-step perhaps the stage execution sequence be also not necessarily successively carry out but can be with the son of other steps or other steps Step or at least part in stage execute in turn or alternately.
In the another embodiment of the application, as shown in figure 4, the method also includes:
After reading the ciphertext data from the HMB, to the ciphertext data according to the predetermined encryption mode Corresponding manner of decryption is decrypted, and obtains the clear data.
In this step, decruption key corresponding with the encryption key that encryption uses can be determined, utilization is preset And the corresponding decipherment algorithm of Encryption Algorithm and decruption key corresponding with the encryption key carry out the ciphertext data Decryption processing obtains clear data.
The embodiment of the present application solid state hard disk can using decipherment algorithm and decrypt the ciphertext data that are read from HMB of key pair into Row decryption processing is easy to use.
In the another embodiment of the application, a kind of data protecting device is also provided, as shown in figure 5, described device includes:
Encrypting module 11, for host memory buffer area HMB be written clear data before, to the clear data according to Predetermined encryption mode is encrypted, and obtains ciphertext data;
Writing module 12, for the HMB to be written in the ciphertext data.
In the another embodiment of the application, encrypting module 11 includes:
First determination unit, the encryption key used for determining encryption;
Encryption unit, for being carried out at encryption using preset Encryption Algorithm and the encryption key to the clear data Reason, obtains ciphertext data;
Storage unit, for the encryption key to be locally stored.
In the another embodiment of the application, determination unit is also used to:
Generate the first character string at random using random number generator;
First character string is determined as the encryption key.
In the another embodiment of the application, determination unit is also used to:
Read the second character string at random from nand flash memory;
Second character string is determined as the encryption key.
In the another embodiment of the application, determination unit is also used to:
After powering on every time/every by preset time period, redefine the encryption key that encryption uses.
In the another embodiment of the application, described device further include:
Deciphering module, for after reading the ciphertext data from the HMB, to the ciphertext data according to it is described The corresponding manner of decryption of predetermined encryption mode is decrypted, and obtains the clear data.
In the another embodiment of the application, deciphering module, comprising:
Second determination unit, for determining decruption key corresponding with the encryption key that encryption uses;
Decryption unit, for using preset decipherment algorithm corresponding with the Encryption Algorithm and with the encryption key pair The decruption key answered is decrypted the ciphertext data, obtains clear data.
In one embodiment, data protecting device provided by the present application can be implemented as a kind of shape of computer program Formula, computer program can be run in solid state hard disk.It can be stored in the memory of solid state hard disk and form the data protecting device Each program module, for example, encrypting module shown in fig. 5 11 and writing module 12.The computer journey that each program module is constituted Sequence makes processor execute the step in the data guard method of each embodiment of the application described in this specification.
For example, solid state hard disk can execute step by the encrypting module 11 in data protecting device as shown in Figure 5 S101.Solid state hard disk can execute step S102 by writing module 12.
In one embodiment, a kind of solid state hard disk is provided, including memory, processor and storage are on a memory simultaneously The computer program that can be run on a processor, processor perform the steps of when executing computer program
To host memory buffer area HMB be written clear data before, to the clear data according to predetermined encryption mode into Row encryption obtains ciphertext data;
The HMB is written into the ciphertext data.
In one embodiment, it is also performed the steps of when processor executes computer program
The clear data is encrypted according to predetermined encryption mode, obtains ciphertext data, comprising:
Determine the encryption key that encryption uses;
The clear data is encrypted using preset Encryption Algorithm and the encryption key, obtains ciphertext number According to;
The encryption key is locally stored.
In one embodiment, it is also performed the steps of when processor executes computer program
Determine the encryption key that encryption uses, comprising:
Generate the first character string at random using random number generator;
First character string is determined as the encryption key.
In one embodiment, it is also performed the steps of when processor executes computer program
Determine the encryption key that encryption uses, comprising:
Read the second character string at random from nand flash memory;
Second character string is determined as the encryption key.
In one embodiment, it is also performed the steps of when processor executes computer program
Determine the encryption key that encryption uses, comprising:
After powering on every time/every by preset time period, redefine the encryption key that encryption uses.
In one embodiment, it is also performed the steps of when processor executes computer program
The method also includes:
After reading the ciphertext data from the HMB, to the ciphertext data according to the predetermined encryption mode Corresponding manner of decryption is decrypted, and obtains the clear data.
In one embodiment, it is also performed the steps of when processor executes computer program
The ciphertext data are decrypted according to manner of decryption corresponding with the predetermined encryption mode, are obtained bright Literary data, comprising:
Determine decruption key corresponding with the encryption key that encryption uses;
Using the corresponding decipherment algorithm of the preset and described Encryption Algorithm and decruption key corresponding with the encryption key, The ciphertext data are decrypted, clear data is obtained.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of when being executed by processor
To host memory buffer area HMB be written clear data before, to the clear data according to predetermined encryption mode into Row encryption obtains ciphertext data;
The HMB is written into the ciphertext data.
In one embodiment, it is also performed the steps of when computer program is executed by processor
The clear data is encrypted according to predetermined encryption mode, obtains ciphertext data, comprising:
Determine the encryption key that encryption uses;
The clear data is encrypted using preset Encryption Algorithm and the encryption key, obtains ciphertext number According to;
The encryption key is locally stored.
In one embodiment, it is also performed the steps of when computer program is executed by processor
Determine the encryption key that encryption uses, comprising:
Generate the first character string at random using random number generator;
First character string is determined as the encryption key.
In one embodiment, it is also performed the steps of when computer program is executed by processor
Determine the encryption key that encryption uses, comprising:
Read the second character string at random from nand flash memory;
Second character string is determined as the encryption key.
In one embodiment, it is also performed the steps of when computer program is executed by processor
Determine the encryption key that encryption uses, comprising:
After powering on every time/every by preset time period, redefine the encryption key that encryption uses.
In one embodiment, it is also performed the steps of when computer program is executed by processor
The method also includes:
After reading the ciphertext data from the HMB, to the ciphertext data according to the predetermined encryption mode Corresponding manner of decryption is decrypted, and obtains the clear data.
In one embodiment, it is also performed the steps of when computer program is executed by processor
The ciphertext data are decrypted according to manner of decryption corresponding with the predetermined encryption mode, are obtained bright Literary data, comprising:
Determine decruption key corresponding with the encryption key that encryption uses;
Using the corresponding decipherment algorithm of the preset and described Encryption Algorithm and decruption key corresponding with the encryption key, The ciphertext data are decrypted, clear data is obtained.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a non-volatile computer and can be read In storage medium, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, provided herein Each embodiment used in any reference to memory, storage, database or other media, may each comprise non-volatile And/or volatile memory.Nonvolatile memory may include that read-only memory (ROM), programming ROM (PROM), electricity can be compiled Journey ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) directly RAM (RDRAM), straight Connect memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
It should be noted that, in this document, the relational terms of such as " first " and " second " or the like are used merely to one A entity or operation with another entity or operate distinguish, without necessarily requiring or implying these entities or operation it Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to Cover non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or setting Standby intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in the process, method, article or apparatus that includes the element.
The above is only a specific embodiment of the invention, is made skilled artisans appreciate that or realizing this hair It is bright.Various modifications to these embodiments will be apparent to one skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention It is not intended to be limited to the embodiments shown herein, and is to fit to and applied principle and features of novelty phase one herein The widest scope of cause.

Claims (10)

1. a kind of data guard method, which is characterized in that the described method includes:
Before clear data is written to host memory buffer area HMB, the clear data is added according to predetermined encryption mode Close processing obtains ciphertext data;
The HMB is written into the ciphertext data.
2. data guard method according to claim 1, which is characterized in that the clear data according to predetermined encryption side Formula is encrypted, and obtains ciphertext data, comprising:
Determine the encryption key that encryption uses;
The clear data is encrypted using preset Encryption Algorithm and the encryption key, obtains ciphertext data;
The encryption key is locally stored.
3. data guard method according to claim 2, which is characterized in that determine the encryption key that encryption uses, Include:
Generate the first character string at random using random number generator;
First character string is determined as the encryption key.
4. data guard method according to claim 2, which is characterized in that determine the encryption key that encryption uses, Include:
Read the second character string at random from nand flash memory;
Second character string is determined as the encryption key.
5. data guard method according to claim 2, which is characterized in that determine the encryption key that encryption uses, Include:
After powering on every time/every by preset time period, redefine the encryption key that encryption uses.
6. data guard method according to claim 2, which is characterized in that the method also includes:
After reading the ciphertext data from the HMB, to the ciphertext data according to corresponding with the predetermined encryption mode Manner of decryption be decrypted, obtain the clear data.
7. data guard method according to claim 6, which is characterized in that preset to the ciphertext data according to described The corresponding manner of decryption of cipher mode is decrypted, and obtains clear data, comprising:
Determine decruption key corresponding with the encryption key that encryption uses;
Using the corresponding decipherment algorithm of the preset and described Encryption Algorithm and decruption key corresponding with the encryption key, to institute It states ciphertext data to be decrypted, obtains clear data.
8. a kind of data protecting device, which is characterized in that described device includes:
Encrypting module, for adding to the clear data according to default before clear data is written to host memory buffer area HMB Close mode is encrypted, and obtains ciphertext data;
Writing module, for the HMB to be written in the ciphertext data.
9. a kind of solid state hard disk including memory, processor and stores the calculating that can be run on a memory and on a processor Machine program, which is characterized in that the processor is realized described in any one of claims 1 to 7 when executing the computer program The step of method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
CN201910590550.6A 2019-07-02 2019-07-02 Data guard method, device, solid state hard disk and storage medium Pending CN110472445A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910590550.6A CN110472445A (en) 2019-07-02 2019-07-02 Data guard method, device, solid state hard disk and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910590550.6A CN110472445A (en) 2019-07-02 2019-07-02 Data guard method, device, solid state hard disk and storage medium

Publications (1)

Publication Number Publication Date
CN110472445A true CN110472445A (en) 2019-11-19

Family

ID=68507287

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910590550.6A Pending CN110472445A (en) 2019-07-02 2019-07-02 Data guard method, device, solid state hard disk and storage medium

Country Status (1)

Country Link
CN (1) CN110472445A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111008399A (en) * 2019-11-29 2020-04-14 卓尔智联(武汉)研究院有限公司 Name data desensitization device, method and readable storage medium
CN111666577A (en) * 2020-06-07 2020-09-15 厦门亿联网络技术股份有限公司 Data decryption method, device, equipment and storage medium
WO2021099960A1 (en) * 2019-11-20 2021-05-27 International Business Machines Corporation Smart data protection

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107423228A (en) * 2016-01-14 2017-12-01 三星电子株式会社 The operating method of storage facilities and storage facilities
US20180260151A1 (en) * 2017-03-07 2018-09-13 Silicon Motion, Inc. Data Storage Device and Operating Method Therefor

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107423228A (en) * 2016-01-14 2017-12-01 三星电子株式会社 The operating method of storage facilities and storage facilities
US20180260151A1 (en) * 2017-03-07 2018-09-13 Silicon Motion, Inc. Data Storage Device and Operating Method Therefor
CN108573175A (en) * 2017-03-07 2018-09-25 慧荣科技股份有限公司 data storage device and operation method thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
汤惟: "密码学与网络安全技术基础", vol. 1, 机械工业出版社, pages: 130 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021099960A1 (en) * 2019-11-20 2021-05-27 International Business Machines Corporation Smart data protection
US11520905B2 (en) 2019-11-20 2022-12-06 Kyndryl, Inc. Smart data protection
CN111008399A (en) * 2019-11-29 2020-04-14 卓尔智联(武汉)研究院有限公司 Name data desensitization device, method and readable storage medium
CN111008399B (en) * 2019-11-29 2021-04-13 卓尔智联(武汉)研究院有限公司 Name data desensitization device, method and readable storage medium
CN111666577A (en) * 2020-06-07 2020-09-15 厦门亿联网络技术股份有限公司 Data decryption method, device, equipment and storage medium
CN111666577B (en) * 2020-06-07 2022-07-19 厦门亿联网络技术股份有限公司 Data decryption method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN106599735B (en) Data protection device, method and storage controller
KR101155697B1 (en) Data whitening for writing and reading data to and from a non-volatile memory
CN103440209B (en) A kind of solid state hard disc data encryption/decryption method and solid state hard disk system
CN101231622B (en) Data storage method and equipment base on flash memory, as well as data fetch method and apparatu
CN110472445A (en) Data guard method, device, solid state hard disk and storage medium
CN104063672B (en) Secure storage method of data
Lee et al. Secure Data Deletion for USB Flash Memory.
EP3667535A1 (en) Storage data encryption and decryption device and method
US8850207B2 (en) Data recording device, and method of processing data recording device
JP4869337B2 (en) Safe processing of data
JP2005018725A5 (en)
CN101408916A (en) Internet software internet privacy protection method
US8745391B2 (en) Data recording device, host device and method of processing data recording device
US20120096280A1 (en) Secured storage device with two-stage symmetric-key algorithm
CN102930223B (en) Method and system for protecting disk data
CN102163267A (en) Solid state disk as well as method and device for secure access control thereof
CN109766731B (en) Encrypted data processing method and device based on solid state disk and computer equipment
CN103914662A (en) Access control method and device of file encrypting system on the basis of partitions
CN109522758B (en) Hard disk data management method and hard disk
CN106100851B (en) Password management system, intelligent wristwatch and its cipher management method
US20110107109A1 (en) Storage system and method for managing data security thereof
US20130336479A1 (en) Information recording device
CN103347017A (en) Data processing method and system on chip
CN107315966A (en) Solid state hard disc data ciphering method and system
US20140281570A1 (en) Method of performing an authentication process between data recording device and host device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination