CN111324899A - Method, device and system for storing/reading data - Google Patents
Method, device and system for storing/reading data Download PDFInfo
- Publication number
- CN111324899A CN111324899A CN202010070816.7A CN202010070816A CN111324899A CN 111324899 A CN111324899 A CN 111324899A CN 202010070816 A CN202010070816 A CN 202010070816A CN 111324899 A CN111324899 A CN 111324899A
- Authority
- CN
- China
- Prior art keywords
- data
- random
- superlattice
- configuration information
- random signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 72
- 230000008569 process Effects 0.000 claims description 9
- 239000004065 semiconductor Substances 0.000 claims description 7
- 230000008901 benefit Effects 0.000 abstract description 8
- 230000007246 mechanism Effects 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 11
- 238000004519 manufacturing process Methods 0.000 description 7
- 238000006243 chemical reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000010355 oscillation Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000013500 data storage Methods 0.000 description 2
- 230000005284 excitation Effects 0.000 description 2
- 230000015654 memory Effects 0.000 description 2
- 238000005070 sampling Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000000739 chaotic effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000000704 physical effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a method for storing/reading data, which comprises the following steps: generating a physical random signal by using a superlattice password device; and encrypting and storing the data to be stored according to the physical random signal, or reading and decrypting the encrypted and stored data. The invention also discloses a device and a system. The method for storing and/or reading data is simple and novel, gives full play to the characteristics of the superlattice device based on the built-in physical security mechanism and the advantage of the superlattice device of high bandwidth, solves the problem that the key is difficult to store and manage in data encryption protection, and has the advantages of high reliability, unconditional security of stored data and the like.
Description
Technical Field
The present invention relates to the field of information security technologies, and in particular, to a method, an apparatus, and a system for storing/reading data.
Background
Information security is a fundamental requirement of the information society, and particularly, the importance of information security is more prominent with the development of services such as internet finance, mobile payment, mobile office, cloud computing and the like since the 21 st century. In order to protect critical service data and reduce the risk of data being copied and stolen in a storage medium, encryption technology is used in data systems to different degrees.
In the current data storage encryption technology, the security of data is determined by the security of a key to a large extent. Since the key data for encryption and decryption needs to be stored and managed additionally, in practical application, the key has a great risk of being stolen and many management inconveniences.
Disclosure of Invention
In order to solve the problems in the prior art, the present invention provides a method, an apparatus and a system for storing/reading data.
According to a first aspect of the present invention, there is provided a method of storing/reading data, the method comprising: generating a physical random signal by using a superlattice password device; and encrypting and storing the data to be stored according to the physical random signal, or reading and decrypting the encrypted and stored data.
In the method for storing/reading data according to the first aspect of the present invention, encrypting and storing data to be stored according to the physical random signal includes: generating a random encryption key and configuration information according to the physical random signal; encrypting data to be stored by using the random encryption key to generate a data ciphertext; writing the data cipher text and the configuration information into a storage medium; wherein the configuration information is used for ensuring that the random decryption key generated in the decryption can be recovered to a random key completely consistent with the random encryption key generated in the encryption within a preset error.
In the method of storing/reading data provided according to the first aspect of the present invention, reading and decrypting the encrypted stored data according to the physical random signal includes: reading the data ciphertext and the configuration information from a storage medium; generating a random decryption key according to the physical random signal and the configuration information; and decrypting the data ciphertext by using the decryption key to generate a data plaintext.
According to a second aspect of the present invention, there is provided a method of storing data, the method comprising: the first device generates a first physical random signal by using a first superlattice password device; the first device encrypts data to be stored according to the first physical random signal to generate encrypted data; the first device writes the encrypted data to the storage medium.
In the method for storing data according to the second aspect of the present invention, the encrypting, by the first device, the data to be stored according to the first physical random signal to generate encrypted data includes: the first device generates a random encryption key and configuration information according to the first physical random signal; the first device encrypts data to be stored by using the random encryption key to generate a data ciphertext; the configuration information is used for ensuring that the random decryption key generated in decryption can be recovered to a random key completely consistent with the random encryption key generated in encryption within a preset error; the encrypted data includes the data cipher text and the configuration information.
According to a third aspect of the present invention, there is provided a method of reading data, the method comprising: the second device reads the stored encrypted data from the storage medium; the second device generates a second physical random signal by using a second superlattice password device; the second device decrypts the encrypted data according to the second physical random signal; the encrypted data is generated by a first device when encrypting data to be stored according to a first physical random signal generated by a first superlattice password device; the second superlattice password device is matched with the first superlattice password device.
In the method for reading data provided by the third aspect of the present invention, the encrypted data includes a data ciphertext and configuration information, the data ciphertext is generated by the first apparatus by encrypting data to be stored with a random encryption key, the random encryption key and the configuration information are generated by the first apparatus according to the first physical random signal, and the configuration information is used to ensure that a random decryption key generated during decryption can be restored to a random key completely consistent with a random encryption key generated during encryption within a predetermined error; wherein the second device decrypting the encrypted data according to the second physically random signal comprises: the second device generates a corresponding random decryption key according to the second physical random signal and the configuration information; and the second device decrypts the data ciphertext by using the random decryption key to generate the data plaintext.
According to a fourth aspect of the present invention, there is provided a method of storing and reading data, the method comprising: the first device generates a first physical random signal by using a first superlattice password device; the first device encrypts data to be stored according to the first physical random signal to generate encrypted data; the first device writes the encrypted data to the storage medium; the second device reads the stored encrypted data from the storage medium; the second device generates a second physical random signal by using a second superlattice password device; the second device decrypts the encrypted data according to the second physical random signal; wherein the second superlattice password device is matched with the first superlattice password device.
According to a fourth aspect of the present invention, there is provided a method for storing and reading data, in which a first device encrypts data to be stored according to a first physical random signal to generate encrypted data, the method including: the first device generates a random encryption key and configuration information according to the first physical random signal; the first device encrypts data to be stored by using the random encryption key to generate a data ciphertext; the configuration information is used for ensuring that the random decryption key generated in decryption can be recovered to a random key completely consistent with the random encryption key generated in encryption within a preset error; the encrypted data includes the data cipher text and the configuration information.
According to a fourth aspect of the present invention, there is provided a method of storing and reading data, wherein the decrypting the encrypted data by the second device according to the second physical random signal includes: the second device generates a corresponding random decryption key according to the second physical random signal and the configuration information; and the second device decrypts the data ciphertext by using the random decryption key to generate the data plaintext.
In the method, the superlattice password device adopted when encrypting data and the superlattice password device adopted when decrypting data have the same structure, the manufacturing process is the same, and the superlattice password device is positioned at the adjacent position of the same semiconductor wafer when being manufactured.
According to a fifth aspect of the present invention, there is provided an apparatus comprising a superlattice cryptographic device, wherein the apparatus is configured to: generating a physical random signal by using a superlattice password device; encrypting data to be stored according to the physical random signal to generate encrypted data; the encrypted data is written to the storage medium.
In an apparatus provided according to a fifth aspect of the invention, the apparatus is further configured to: generating a random encryption key and configuration information according to the physical random signal; encrypting data to be stored by using the random encryption key to generate a data ciphertext; the configuration information is used for ensuring that the random decryption key generated in decryption can be recovered to a random key completely consistent with the random encryption key generated in encryption within a preset error; the encrypted data includes the data cipher text and the configuration information.
According to a sixth aspect of the present invention, there is provided an apparatus comprising a superlattice cryptographic device, wherein the apparatus is configured to: reading the stored encrypted data from the storage medium; generating a physical random signal by using a superlattice password device; decrypting the encrypted data according to the physical random signal; the encrypted data is generated by another device when encrypting the data to be stored according to a physical random signal generated by another superlattice password device; the superlattice password device is matched with the other superlattice password device.
In the apparatus provided according to the sixth aspect of the present invention, the encrypted data includes a data ciphertext and configuration information, the data ciphertext is generated by another apparatus by encrypting data to be stored with a random encryption key, the random encryption key and the configuration information are generated by another apparatus according to a physical random signal generated by the another superlattice cryptographic device, and the configuration information is used to ensure that a random decryption key generated at the time of decryption can be restored to a random key completely consistent with a random encryption key generated at the time of encryption within a predetermined error; wherein the apparatus is further configured to: generating a corresponding random decryption key according to the physical random signal and the configuration information generated by the superlattice password device; and decrypting the data ciphertext by using the random decryption key to generate a data plaintext.
In the device, the superlattice cipher device adopted when encrypting data and the superlattice cipher device adopted when decrypting data have the same structure, and the manufacturing process is the same, and the superlattice cipher device is positioned at the adjacent position of the same semiconductor wafer when being manufactured.
According to a seventh aspect of the present invention, there is provided a system comprising a first apparatus comprising a first superlattice cryptographic device and a second apparatus comprising a second superlattice cryptographic device, the first superlattice cryptographic device and the second superlattice cryptographic device being matched to one another; the first device is used for generating a first physical random signal by using the first superlattice password device, encrypting data to be stored according to the first physical random signal to generate encrypted data, and writing the encrypted data into a storage medium; the second device is used for reading the stored encrypted data from the storage medium, generating a second physical random signal by using a second superlattice password device, and decrypting the encrypted data according to the second physical random signal.
In the system provided in the seventh aspect of the present invention, the first device is further configured to generate a random encryption key and configuration information by using the first physical random signal, and encrypt data to be stored by using the random encryption key to generate a data ciphertext; the configuration information is used for ensuring that the random decryption key generated in decryption can be recovered to a random key completely consistent with the random encryption key generated in encryption within a preset error; the encrypted data includes the data cipher text and the configuration information.
In the system provided by the seventh aspect of the present invention, the second device is further configured to generate a corresponding random decryption key according to the second physical random signal and the configuration information, and decrypt the data ciphertext with the random decryption key to generate the data plaintext.
In the system provided by the seventh aspect of the present invention, the first superlattice password device and the second superlattice password device have the same structure and the same manufacturing process, and are located at adjacent positions of the same semiconductor wafer during manufacturing.
The invention has the beneficial effects that: the method for storing and/or reading data is simple and novel, gives full play to the characteristics of the superlattice device based on the built-in physical security mechanism and the advantage of the superlattice device of high bandwidth, solves the problem that the key is difficult to store and manage in data encryption protection, and has the advantages of high reliability, unconditional security of stored data and the like.
Drawings
The above and other aspects, features and advantages of embodiments of the present invention will become more apparent from the following description taken in conjunction with the accompanying drawings, in which:
FIG. 1 is a schematic diagram of an alternative application environment for various embodiments of the present invention;
FIG. 2 is an architectural diagram of a fixture apparatus according to an embodiment of the present invention;
FIG. 3 is a flow chart of a method of storing/reading data according to an embodiment of the invention;
FIG. 4 is a detailed flow diagram of encrypting and decrypting data according to an embodiment of the invention;
FIG. 5 is a flow diagram of a method of storing data according to an embodiment of the invention;
FIG. 6 is a flow diagram of a method of reading data according to an embodiment of the invention;
FIG. 7 is a flow diagram of a method of storing and reading data according to an embodiment of the invention.
Detailed Description
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings. This invention may, however, be embodied in many different forms and should not be construed as limited to the specific embodiments set forth herein. Rather, these embodiments are provided to explain the principles of the invention and its practical application to thereby enable others skilled in the art to understand the invention for various embodiments and with various modifications as are suited to the particular use contemplated.
FIG. 1 is a schematic diagram of an alternative application environment for various embodiments of the present invention.
Referring to fig. 1, the embodiments of the present invention can be applied to, but not limited to, a system 1 composed of a host 11, a first device 12, and a second device 13. The system 1 is used for encrypting and writing data to the storage medium 2 or reading and decrypting data from the storage medium 2 by means of encryption techniques.
The first means 12 and the second means 13 may be fixed or removable device apparatuses having an encryption/decryption function and writing data to the storage medium 2 or reading data from the storage medium 2. The first device 12 and the second device 13 are used as two sides of data storage/reading respectively, wherein, the storage side is used for data encryption or decryption and data writing or reading, and the reading side is used for data reading or writing and data decryption or encryption. In the following embodiments, the first device 12 is taken as a storage side, and the second device 13 is taken as a reading side. It is understood that in other embodiments, the second device 13 may be used as a storage side and the first device 12 may be used as a reading side.
Furthermore, it should be noted that in other embodiments, the system 1 may only include the host 11 and the first device 12, in which case the first device 12 is used for data encryption and writing data, and the first device 12 may also be used for reading data and data decryption. It should be understood that in other embodiments, the system 1 may comprise only the host 11 and the second device 13, in which case the second device 13 is used for data encryption and writing data, and the second device 13 may also be used for reading data and data decryption.
Thus, the environment in which the various embodiments of the present invention are implemented has been described in detail. Hereinafter, various embodiments of the present invention will be described in detail based on the above application environments.
Fig. 2 is an architecture diagram of a device arrangement according to an embodiment of the invention. Referring to fig. 2, an embodiment of the present invention proposes an apparatus device 2. It is understood that the apparatus 2 may be the first device 12 or the second device 13 described above. The device apparatus 2 includes but is not limited to: the superlattice password device 20, the key generation module 21, the encryption and decryption module 22 and the writing and reading module 23.
The superlattice password device 20 is configured to generate an output signal driven by a particular type of signal, where the output signal is a truly random signal. In this context, the output signal may be referred to as a true random signal or as a physical random signal, which are equivalent in meaning.
The key generation module 21 is configured to process the output signal to generate a random key and, at the same time, to generate configuration information. Here, in order to ensure the reliability of encryption and decryption by the apparatus device 2, it generates corresponding configuration information at the same time as the random key, the configuration information being used to ensure that the random key generated at the time of decryption (may also be referred to as a random decryption key) can be restored to a random key that completely coincides with the random key generated at the time of encryption (may also be referred to as a random encryption key) within a predetermined error. The configuration information is generated by using a general technique related to error correction codes, and thus is used to explain the utility and reliability of the device 2.
The encryption and decryption module 22 is configured to encrypt or decrypt data by using the random key, for example, a plaintext may be encrypted to obtain a ciphertext, and the ciphertext may also be decrypted to obtain the plaintext. If the random keys used for encryption and decryption (i.e., the random encryption key and the random decryption key) are the same, the decrypted plaintext is the same as the original plaintext.
The write-read module 23 is used to write encrypted data into the storage medium 2 or read encrypted data from the storage medium 2.
It will be appreciated by those skilled in the art that the arrangement shown in fig. 2 does not constitute a limitation of the apparatus device 2, and that the apparatus device 2 may also comprise other necessary components, or combine certain components, or a different arrangement of components.
In addition, each module may be an integrated circuit including a Micro Controller Unit (MCU). As is well known to those skilled in the art, a microcontroller may include a Central Processing Unit (CPU), a Read-Only Memory (ROM), a Random Access Memory (RAM), a timing module, a digital-to-analog conversion (a/D Converter), and several input/output ports. Of course, the modules may also be Integrated Circuits in other forms, such as Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs), and the like.
It should be noted that the following descriptions of the embodiments are described in terms of the application environment shown in fig. 1 and the device architecture shown in fig. 2.
< first embodiment >
Fig. 3 is a flowchart of a method of storing/reading data according to an embodiment of the present invention. In which a method of storing/reading data according to an embodiment of the present invention is applied to the system 1. It should be noted that, in the present embodiment, the execution order of the steps in the flowchart shown in fig. 3 may be changed and/or some steps may be omitted according to different requirements.
Referring to fig. 3, a method of storing/reading data according to an embodiment of the present invention includes the steps of:
and S310, generating a physical random signal by using the superlattice password device 20.
In particular, in order to ensure that the keys generated by the first and second devices 12 and 13 are the same (or as much as possible) in the following, so that there is no need to transfer keys between the storage and reading parties, it is necessary to ensure that the particular forms of drive signals used by the first and second devices 12 and 13 are the same, which is ensured by the first and second devices 12 and 13 receiving the particular forms of drive signals transmitted from the common channel, respectively.
The common channel may be an optical fiber, a broadband fixed network, a mobile network, an optical disc, a mobile hard disk, or the like, and may be used for publishing and transmitting information.
In this embodiment, the drive signal of a specific form may be generated by the first device 12, the second device 13, or a third party and then issued to the common channel by the generator of the drive signal of a specific form. The drive signal of the particular form may propagate through the common channel and thus have the advantage of public key encryption. The first device 12 and the second device 13 respectively download the driving signals of the specific form to the local (so the first device 12 and the second device 13 may have memories), and store the driving signals of the specific form to the local. The specific form of the drive signal is used for providing excitation for a subsequent superlattice excitation source, but the specific form of the drive signal has no correlation with a physical random signal of the superlattice. Therefore, the requirement for a particular type of drive signal is simply that it has certain characteristics, and very good randomness is not required. Moreover, the driving signal in the specific form and the superlattice physical random signal have no correlation, so that the driving signal in the specific form can be transmitted through the common channel without worrying about the characteristic of breaking the superlattice physical random signal after being intercepted. The particular form of drive signal for the first means 12 and the particular form of drive signal for the second means 13 are identical, differing only in the physical location where the particular form of drive signal for the first means 12 is located at the first means 12 and the particular form of drive signal for the second means 13 is located at the second means 13. The first device 12 and the second device 13 may not be located at the same place, and may be distributed at any distance, as long as the first device 12 and the second device 13 can respectively receive the driving signal of the specific form.
The particular form of drive signal, even if acquired by an attacker, cannot infer the random keys of the first device 12 and the second device 13.
Further, the manager of the encrypted communication issues the matched first superlattice password device (for example, the superlattice password device 20 of the first device 12) and the second superlattice password device (for example, the superlattice password device 20 of the second device 13) to the storage party and the reading party for storing/reading data, respectively, and the first superlattice password device and the second superlattice password device can be used as identification and authentication identifiers of the storage party and the reading party, respectively. The first device 12 and the second device 13 respectively read out a local specific form of driving signal, and drive the local superlattice cryptographic device 20 with the driving signal to obtain a superlattice physical random signal (i.e. a first physical random signal of the first device 12 and a second physical random signal of the second device 13), which is a true random analog signal.
The superlattice cipher devices 22 in the first device 12 and the second device 13 must be matched superlattice cipher devices 20, and synchronous chaotic oscillation will occur under the drive of a local specific form of drive signal, and the oscillation is a physical true random effect, and the generated oscillation signal is a true random signal. Also, since the drive signals of a particular form are identical, the true random signals generated in this case are also identical (the two signals may be offset in time).
The matched superlattice password devices 20 mean that the superlattice password devices 20 have the same structure and the same manufacturing process, are positioned at the adjacent positions of the same semiconductor wafer during manufacturing, and have extremely similar physical properties and operating characteristics. The superlattice password devices 20 included in the first device 12 and the second device 13 can be used as identification marks of both parties, so that the identification and authentication problems of both parties are automatically solved. The number of the paired superlattice password devices 20 is controlled by the manufacturer of the password device, and may be 2 or more, if there are a plurality of paired superlattice password devices 20 sent to multiple parties, data encryption of multiple parties may be completed, and the method for storing/reading data described in this embodiment is applicable to each of the multiple parties. These mated superlattice password devices 20 are non-duplicable, as determined by the fabrication and operating principles of the superlattice password devices 20. Thus, an attacker cannot obtain a matched superlattice cryptographic device 20, except for the limited number of paired superlattice cryptographic devices 20 that are controlled by the cryptographic device manufacturer as described above.
Since the local superlattice cryptographic devices 20 of the first and second apparatuses 12, 13 are physically unclonable, they are only possible when manufactured in the same batch as the local superlattice cryptographic devices 20 of the first and second apparatuses 10, 13. In addition to this, it is not possible to obtain a superlattice cryptographic device that matches the first and second devices 12, 13, so an attacker cannot generate the same key as the first and second devices 12, 13 even if a particular form of driving signal is intercepted. Thus, a particular form of drive signal can be transmitted on the common channel without fear of the same key being duplicated after interception as the first and second devices 12, 13.
And S320, encrypting, storing or reading and decrypting the data according to the physical random signal.
Specifically, when the data to be stored is encrypted and stored according to the physical random signal, the first device 12 generates a random encryption key and configuration information after processing (for example, processing including sampling, analog-to-digital conversion, and the like) the superlattice physical random signal. Here, the configuration information is used to ensure that the random decryption key generated at the time of decryption can be restored to a random key that completely coincides with the random encryption key generated at the time of encryption within a predetermined error. The first device 12 then encrypts the data to be stored using the random encryption key to generate a data cipher text.
When the encrypted and stored data is read and decrypted according to the physical random signal, the second device 13 processes (for example, processes including sampling and analog-to-digital conversion) the superlattice physical random signal, and generates a corresponding random decryption key according to the processed superlattice physical random signal and the configuration information. Then, the second device 13 decrypts the data ciphertext by using the random decryption key to generate a data plaintext.
The random decryption key and the random encryption key are the same (in this embodiment, can be corrected by configuration information so that they are the same), which is determined by the design of the two steps and the operating principle of the superlattice cryptographic device 20. Thus, when data is encrypted using a symmetric encryption algorithm, the random decryption key and the random encryption key may be used for the decryption key and the encryption key of the data, respectively.
The first device 12 and the second device 13 may perform the above operations at different times, respectively, and not necessarily at the same time, i.e. the generation of the random decryption key and the random encryption key may be temporally non-simultaneous.
Fig. 4 is a detailed flow diagram of encrypting and decrypting data according to an embodiment of the present invention. Referring to fig. 4, encrypting and decrypting data according to an embodiment of the present invention specifically includes the steps of:
s410, the first device 12 encrypts the plaintext (to-be-encrypted data) P by using the random encryption key to obtain the ciphertext (encrypted data) C.
Specifically, the first device 12 encrypts the information plaintext P to be encrypted by using the generated random encryption key to obtain the ciphertext C.
S420, the first device 12 writes the ciphertext C to the storage medium 2.
Specifically, the first device 12 writes the encrypted ciphertext C into the storage medium 2.
S430, the second device 13 reads the ciphertext C from the storage medium 2.
Furthermore, the second device 13 may also read the configuration information from the storage medium 2.
S440, the second device 13 decrypts the ciphertext C by using the random decryption key to obtain the plaintext P.
Specifically, the second device 13 decrypts the ciphertext C using the generated random decryption key. Since the keys generated by the first device 12 and the second device 13 are guaranteed to be the same, the first device 12 can encrypt the plaintext P using a well-established symmetric encryption algorithm. Both parties do not need to pass a key, and can use the locally generated key for encryption and decryption of information.
The encryption and decryption method proposed in this embodiment may transmit only a specific form of the driving signal without transmitting a true encryption key (private key). Since the local superlattice cryptographic devices 20 that match the first and second devices 12, 13 have physical unclonable characteristics, they are only possible when manufactured in the same batch as the local superlattice cryptographic devices of the first and second devices 12, 13. In addition to this, it is impossible to obtain a superlattice cryptographic device 20 that matches the first device 12 and the second device 13, and therefore an attacker cannot generate the same key (private key) as the first device 12 and the second device 13 even if a particular form of driving signal is intercepted. Thus, a particular form of drive signal can be transmitted on a common channel without fear of being intercepted and then duplicating the same private key as the first and second devices 12, 13.
The method of storing and/or reading data will be further described in detail below, taking the storage side (i.e., the first device 12), the reading side (i.e., the second device 13), and the system side (the system 1) as a starting point, respectively.
< second embodiment >
FIG. 5 is a flow diagram of a method of storing data according to an embodiment of the invention. In the detailed description of the present embodiment, the storage side (i.e., the first device 12) is taken as a starting point. Referring to fig. 5, a method of storing data according to an embodiment of the present invention includes the steps of:
s510, the superlattice password device 20 of the first apparatus 12 generates a first physical random signal.
Here, the superlattice password device 20 of the first apparatus 12 is capable of generating a first physical random signal driven by a particular form of signal, the first physical random signal being a true random signal.
S520, the first device 12 encrypts the data to be stored according to the first physical random signal to generate encrypted data.
Specifically, first, the key generation module 21 of the first device 12 generates a random encryption key and configuration information according to the first physical random signal. Here, as described above, the configuration information is used to ensure that the random decryption key generated at the time of decryption can be restored to a random key that completely coincides with the random encryption key generated at the time of encryption within a predetermined error.
Next, the encryption and decryption module 22 of the first device 12 encrypts the data to be stored by using the random encryption key to generate a data ciphertext, so as to obtain encrypted data composed of the data ciphertext and the configuration information.
S530, the write-read module 23 of the first device 12 writes the encrypted data into the storage medium 2. Here, the second device 13 is configured with a superlattice password device 20 that matches the superlattice password device 20 of the first device 12.
< third embodiment >
FIG. 6 is a flow chart of a method of reading data according to an embodiment of the invention. In the detailed description of the present embodiment, the reader (i.e., the first device 13) is taken as a starting point. Referring to fig. 6, a method of reading data according to an embodiment of the present invention includes the steps of:
s610, the write-read module 23 of the second device 13 reads the encrypted data from the storage medium 2.
Of course, here, as described above, the first device 12 encrypts data according to the first physical random signal generated by its superlattice cipher device 20 to obtain encrypted data, and writes the encrypted data into the storage medium 2, which may specifically refer to the above description.
S620, the superlattice password device 20 of the second apparatus 13 generates a second physically random signal.
Here, the particular form of signal that drives the superlattice password device 20 of the first apparatus 12 to generate the first physically random signal is the same as the particular form of signal that drives the superlattice password device 20 of the second apparatus 13 to generate the second physically random signal. This is to ensure that the keys generated by the first device 12 and the second device 13 are the same as possible (of course, the error may be corrected by the configuration information), and there is no need to transfer the key between the storage side and the reading side, so that the key may be prevented from being intercepted, thereby improving security.
S630, the key generation module 21 of the second device 13 decrypts the encrypted data according to the second physical random signal.
First, the key generation module 21 of the second device 13 generates a corresponding random decryption key according to the second physical random signal and the configuration information. Here, as described above, the configuration information is formed when the first device 12 encrypts data according to the first physical random signal generated by its superlattice cryptographic device 20, and is used to ensure that the random decryption key generated at the time of decryption can be restored to a random key that completely coincides with the random encryption key generated at the time of encryption within a predetermined error.
Next, the encryption and decryption module 22 of the second device 13 decrypts the data ciphertext by using the random decryption key to generate the data plaintext. Here, as described above, a data cipher text is formed when the first device 12 encrypts data according to the first physical random signal generated by its superlattice cryptographic device 20, the data cipher text and the configuration information constituting the encrypted data.
< fourth embodiment >
FIG. 7 is a flow diagram of a method of storing and reading data according to an embodiment of the invention. In the detailed description of the present embodiment, the system 1 (i.e., the system constituted by the host 11, the first device 12, and the first device 13) is taken as a starting point. Referring to fig. 7, a method of storing and reading data according to an embodiment of the present invention includes the steps of:
s710, the superlattice cryptographic device 20 of the first apparatus 12 generates a first physical random signal.
Here, the superlattice password device 20 of the first apparatus 12 is capable of generating a first physical random signal driven by a particular form of signal, the first physical random signal being a true random signal.
S720, the first device 12 encrypts the data to be stored according to the first physical random signal to obtain encrypted data.
Specifically, first, the key generation module 21 of the first device 12 generates a random encryption key and configuration information according to the first physical random signal. Here, as described above, the configuration information is used to ensure that the random decryption key generated at the time of decryption can be restored to a random key that completely coincides with the random encryption key generated at the time of encryption within a predetermined error.
Next, the encryption and decryption module 22 of the first device 12 encrypts the data to be stored by using the random encryption key to generate a data ciphertext, so as to obtain encrypted data formed by the data ciphertext and the configuration information.
S730, the write-read module 23 of the first device 12 writes the encrypted data into the storage medium 2.
S740, the write read module 23 of the second device 13 reads the encrypted data from the storage medium 2.
Here, the second device 13 is configured with a superlattice password device 20 that matches the superlattice password device 20 of the first device 12.
And S750, generating a second physical random signal by the superlattice password device 20 of the second device 13.
Here, the superlattice password device 20 of the second apparatus 13 is capable of generating a second physically random signal driven by the particular form of signal, the second physically random signal being a true random signal. Further, the particular form of signal that drives the superlattice password device 20 of the first apparatus 12 to generate the first physically random signal is the same as the particular form of signal that drives the superlattice password device 20 of the second apparatus 13 to generate the second physically random signal. This is to ensure that the keys generated by the first and second devices 12 and 13 are the most likely to be the same (of course, if there is an error, corrected by the configuration information), and that no key needs to be transferred between the storing and reading parties, so that key interception can be avoided, thereby improving security.
S760, the key generation module 21 of the second device 13 decrypts the encrypted data according to the second physical random signal.
Specifically, first, the key generation module 21 generates a corresponding random decryption key according to the second physical random signal and the configuration information.
Next, the encryption and decryption module 22 of the second device 13 decrypts the data ciphertext by using the random decryption key to obtain the data plaintext.
The encrypted transmission process of data by each of the storage side (i.e., the first device 12), the reading side (i.e., the second device 13), and the system side (system 1) will be described in detail below.
< fifth embodiment >
As an embodiment, when performing data encryption storage, the first device 12 may perform data encryption and also perform writing of encrypted data to the storage medium 2. The method comprises the following specific steps:
the superlattice password device 20 of the first device 12 generates a physically random signal.
The superlattice password device 20 of the first apparatus 12 is capable of generating a first physical random signal driven by a particular form of signal, the first physical random signal being a true random signal.
The first device 12 encrypts the data to be stored, which is acquired from the host 11, according to the first physical random signal to obtain encrypted data.
Specifically, the key generation module 21 of the first device 12 generates a random encryption key and configuration information from the first physical random signal. Here, as described above, the configuration information is used to ensure that the random decryption key generated at the time of decryption can be restored to a random key that completely coincides with the random encryption key generated at the time of encryption within a predetermined error.
The encryption and decryption module 22 of the first device 12 encrypts the data to be stored (data plaintext) by using the random encryption key to obtain a data ciphertext, so as to obtain encrypted data formed by the data ciphertext and the configuration information.
The write-read module 23 of the first device 12 writes the encrypted data to the storage medium. Here, the second device 13 is configured with a superlattice password device 20 that matches the superlattice password device 20 of the first device 12.
< sixth embodiment >
As an embodiment, when reading data and decrypting data, the second device 13 may perform reading encrypted data from the storage medium 2 and may also perform decrypting the encrypted data. The method comprises the following specific steps:
the write-read module 23 of the second device 13 reads the encrypted data from the storage medium 2.
Of course, here, as mentioned above, the first device 12 encrypts data according to the first physical random signal generated by its superlattice cryptographic device 20 to obtain encrypted data, and reference may be made to the above description specifically.
The second physically random signal generated by the superlattice password device 20 of the second apparatus 13.
Here, the particular form of signal that drives the superlattice password device 20 of the first apparatus 12 to generate the first physically random signal is the same as the particular form of signal that drives the superlattice password device 20 of the second apparatus 13 to generate the second physically random signal. This is to ensure that the keys generated by the first and second devices 12 and 13 are the same to the greatest extent possible (of course, if there is an error, this can be corrected by the configuration information), and that no key needs to be transferred between the storage side and the reading side, so that interception of the key can be avoided, and security can be improved.
The key generation module 21 of the second device 13 decrypts the read encrypted data according to the second physical random signal.
Specifically, the key generation module 21 of the second device 13 generates a corresponding random decryption key according to the second physical random signal and the configuration information. Here, as described above, the configuration information is formed when the first device 12 encrypts the data to be stored according to the first physical random signal generated by its superlattice cryptographic device 20, and is used to ensure that the random decryption key generated at the time of decryption can be restored to a random key that completely coincides with the random encryption key generated at the time of encryption within a predetermined error.
The encryption and decryption module 22 of the second device 13 decrypts the data ciphertext by using the random decryption key to obtain the data plaintext. Further, the second device 13 may send the data plaintext to the host 11. Here, as described above, the encrypted data is formed when the first device 12 encrypts the data to be stored according to the first physical random signal generated by its superlattice cryptographic device 20, the data cipher text and the configuration information forming the encrypted data.
< seventh embodiment >
As an embodiment, when storing and reading data, the system 1 may perform data encryption, and also perform writing of encrypted data into the storage medium 2, and may also perform reading of encrypted data from the storage medium 2, and may also perform decryption of encrypted data. The method comprises the following specific steps:
the superlattice password device 20 of the first device 12 generates a physically random signal.
The superlattice password device 20 of the first apparatus 12 is capable of generating a first physical random signal driven by a particular form of signal, the first physical random signal being a true random signal.
The first device 12 encrypts the data to be stored, which is acquired from the host 11, according to the first physical random signal to obtain encrypted data.
Specifically, the key generation module 21 of the first device 12 generates a random encryption key and configuration information from the first physical random signal. Here, as described above, the configuration information is used to ensure that the random decryption key generated at the time of decryption can be restored to a random key that completely coincides with the random encryption key generated at the time of encryption within a predetermined error.
The encryption and decryption module 22 of the first device 12 encrypts the data to be stored (data plaintext) by using the random encryption key to obtain a data ciphertext, so as to obtain encrypted data formed by the data ciphertext and the configuration information.
The write-read module 23 of the second device 13 reads the encrypted data from the storage medium 2.
Of course, here, as mentioned above, the first device 12 encrypts data according to the first physical random signal generated by its superlattice cryptographic device 20 to obtain encrypted data, and reference may be made to the above description specifically.
The second physically random signal generated by the superlattice password device 20 of the second apparatus 13.
Here, the particular form of signal that drives the superlattice password device 20 of the first apparatus 12 to generate the first physically random signal is the same as the particular form of signal that drives the superlattice password device 20 of the second apparatus 13 to generate the second physically random signal. This is to ensure that the keys generated by the first and second devices 12 and 13 are the same to the greatest extent possible (of course, if there is an error, this can be corrected by the configuration information), and that no key needs to be transferred between the storage side and the reading side, so that interception of the key can be avoided, and security can be improved.
The key generation module 21 of the second device 13 decrypts the read encrypted data according to the second physical random signal.
Specifically, the key generation module 21 of the second device 13 generates a corresponding random decryption key according to the second physical random signal and the configuration information. Here, as described above, the configuration information is formed when the first device 12 encrypts the data to be stored according to the first physical random signal generated by its superlattice cryptographic device 20, and is used to ensure that the random decryption key generated at the time of decryption can be restored to a random key that completely coincides with the random encryption key generated at the time of encryption within a predetermined error.
The encryption and decryption module 22 of the second device 13 decrypts the data ciphertext by using the random decryption key to obtain the data plaintext. Further, the second device 13 may send the data plaintext to the host 11. Here, as described above, the encrypted data is formed when the first device 12 encrypts the data to be stored according to the first physical random signal generated by its superlattice cryptographic device 20, the data cipher text and the configuration information forming the encrypted data.
In summary, the method for storing and/or reading data according to the embodiment of the present invention is simple and novel, gives full play to the characteristics of the superlattice device based on the intrinsic physical security mechanism and the advantage of the superlattice device with high bandwidth, solves the problem that the key itself is difficult to store and manage in data encryption protection, and has the advantages of high reliability, unconditional security of stored data, and the like.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The numbers of the embodiments or examples of the present invention are merely for description and do not represent the merits of the examples.
While the invention has been shown and described with reference to certain embodiments, those skilled in the art will understand that: various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims and their equivalents.
Claims (20)
1. A method of storing/reading data, the method comprising:
generating a physical random signal by using a superlattice password device;
and encrypting and storing the data to be stored according to the physical random signal, or reading and decrypting the encrypted and stored data.
2. The method of claim 1, wherein encrypting and storing data to be stored according to the physical random signal comprises:
generating a random encryption key and configuration information according to the physical random signal;
encrypting data to be stored by using the random encryption key to generate a data ciphertext;
writing the data cipher text and the configuration information into a storage medium;
wherein the configuration information is used for ensuring that the random decryption key generated in the decryption can be recovered to a random key completely consistent with the random encryption key generated in the encryption within a preset error.
3. The method of claim 2, wherein reading and decrypting the encrypted stored data according to the physical random signal comprises:
reading the data ciphertext and the configuration information from a storage medium;
generating a random decryption key according to the physical random signal and the configuration information;
and decrypting the data ciphertext by using the decryption key to generate a data plaintext.
4. A method of storing data, the method comprising:
the first device generates a first physical random signal by using a first superlattice password device;
the first device encrypts data to be stored according to the first physical random signal to generate encrypted data;
the first device writes the encrypted data to the storage medium.
5. The method of claim 4, wherein encrypting the data to be stored by the first device according to the first physical random signal to generate encrypted data comprises:
the first device generates a random encryption key and configuration information according to the first physical random signal;
the first device encrypts data to be stored by using the random encryption key to generate a data ciphertext;
the configuration information is used for ensuring that the random decryption key generated in decryption can be recovered to a random key completely consistent with the random encryption key generated in encryption within a preset error; the encrypted data includes the data cipher text and the configuration information.
6. A method of reading data, the method comprising:
the second device reads the stored encrypted data from the storage medium;
the second device generates a second physical random signal by using a second superlattice password device;
the second device decrypts the encrypted data according to the second physical random signal;
the encrypted data is generated by a first device when encrypting data to be stored according to a first physical random signal generated by a first superlattice password device; the second superlattice password device is matched with the first superlattice password device.
7. The method according to claim 6, wherein the encrypted data comprises a data ciphertext and configuration information, the data ciphertext is generated by the first device by encrypting data to be stored with a random encryption key, the random encryption key and the configuration information are generated by the first device according to the first physical random signal, and the configuration information is used for ensuring that a random decryption key generated during decryption can be restored to a random key completely consistent with the random encryption key generated during encryption within a predetermined error;
wherein the second device decrypting the encrypted data according to the second physically random signal comprises:
the second device generates a corresponding random decryption key according to the second physical random signal and the configuration information;
and the second device decrypts the data ciphertext by using the random decryption key to generate the data plaintext.
8. A method of storing and reading data, the method comprising:
the first device generates a first physical random signal by using a first superlattice password device;
the first device encrypts data to be stored according to the first physical random signal to generate encrypted data;
the first device writes the encrypted data to the storage medium;
the second device reads the stored encrypted data from the storage medium;
the second device generates a second physical random signal by using a second superlattice password device;
the second device decrypts the encrypted data according to the second physical random signal;
wherein the second superlattice password device is matched with the first superlattice password device.
9. The method of claim 8, wherein encrypting the data to be stored by the first device according to the first physical random signal to generate encrypted data comprises:
the first device generates a random encryption key and configuration information according to the first physical random signal;
the first device encrypts data to be stored by using the random encryption key to generate a data ciphertext;
the configuration information is used for ensuring that the random decryption key generated in decryption can be recovered to a random key completely consistent with the random encryption key generated in encryption within a preset error; the encrypted data includes the data cipher text and the configuration information.
10. The method of claim 9, wherein decrypting the encrypted data from the second physically random signal by the second device comprises:
the second device generates a corresponding random decryption key according to the second physical random signal and the configuration information;
and the second device decrypts the data ciphertext by using the random decryption key to generate the data plaintext.
11. The method of any one of claims 1 to 10, wherein the superlattice cryptographic device used in encrypting data and the superlattice cryptographic device used in decrypting data have the same structure and are fabricated by the same process and are located adjacent to the same semiconductor wafer.
12. An apparatus, comprising a superlattice cryptographic device, wherein the apparatus is configured to:
generating a physical random signal by using a superlattice password device;
encrypting data to be stored according to the physical random signal to generate encrypted data;
the encrypted data is written to the storage medium.
13. The apparatus of claim 12, wherein the apparatus is further configured to:
generating a random encryption key and configuration information according to the physical random signal;
encrypting data to be stored by using the random encryption key to generate a data ciphertext;
the configuration information is used for ensuring that the random decryption key generated in decryption can be recovered to a random key completely consistent with the random encryption key generated in encryption within a preset error; the encrypted data includes the data cipher text and the configuration information.
14. An apparatus, comprising a superlattice cryptographic device, wherein the apparatus is configured to:
reading the stored encrypted data from the storage medium;
generating a physical random signal by using a superlattice password device;
decrypting the encrypted data according to the physical random signal;
the encrypted data is generated by another device when encrypting the data to be stored according to a physical random signal generated by another superlattice password device; the superlattice password device is matched with the other superlattice password device.
15. The apparatus according to claim 14, wherein the encrypted data includes a data ciphertext and configuration information, the data ciphertext is generated by another apparatus by encrypting data to be stored with a random encryption key, the random encryption key and the configuration information are generated by another apparatus according to a physical random signal generated by the another superlattice cryptographic device, and the configuration information is used for ensuring that a random decryption key generated during decryption can be restored to a random key completely consistent with a random encryption key generated during encryption within a predetermined error;
wherein the apparatus is further configured to:
generating a corresponding random decryption key according to the physical random signal and the configuration information generated by the superlattice password device;
and decrypting the data ciphertext by using the random decryption key to generate a data plaintext.
16. The apparatus of any one of claims 12 to 15, wherein the superlattice password device used for encrypting data and the superlattice password device used for decrypting data have the same structure and are fabricated by the same process and are located adjacent to the same semiconductor wafer.
17. A system comprising a first apparatus comprising a first superlattice cryptographic device and a second apparatus comprising a second superlattice cryptographic device, wherein the first superlattice cryptographic device and the second superlattice cryptographic device are matched; wherein,
the first device is used for generating a first physical random signal by using the first superlattice password device, encrypting data to be stored according to the first physical random signal to generate encrypted data, and writing the encrypted data into a storage medium;
the second device is used for reading the stored encrypted data from the storage medium, generating a second physical random signal by using a second superlattice password device, and decrypting the encrypted data according to the second physical random signal.
18. The system of claim 17,
the first device is further used for generating a random encryption key and configuration information by the first physical random signal, and encrypting data to be stored by using the random encryption key to generate a data ciphertext;
the configuration information is used for ensuring that the random decryption key generated in decryption can be recovered to a random key completely consistent with the random encryption key generated in encryption within a preset error; the encrypted data includes the data cipher text and the configuration information.
19. The system of claim 18,
the second device is further used for generating a corresponding random decryption key according to the second physical random signal and the configuration information, and decrypting the data ciphertext by using the random decryption key to generate the data plaintext.
20. The system of any of claims 17 to 19, wherein the first superlattice password device and the second superlattice password device are identical in structure and manufactured by the same process, and are manufactured in adjacent positions on the same semiconductor wafer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010070816.7A CN111324899A (en) | 2020-01-21 | 2020-01-21 | Method, device and system for storing/reading data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010070816.7A CN111324899A (en) | 2020-01-21 | 2020-01-21 | Method, device and system for storing/reading data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111324899A true CN111324899A (en) | 2020-06-23 |
Family
ID=71171020
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010070816.7A Pending CN111324899A (en) | 2020-01-21 | 2020-01-21 | Method, device and system for storing/reading data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111324899A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115311763A (en) * | 2022-06-24 | 2022-11-08 | 北京电子科技学院 | Identity recognition method and system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110519036A (en) * | 2018-05-22 | 2019-11-29 | 中国科学院苏州纳米技术与纳米仿生研究所 | The application method of data encryption and transmission method, terminal device and superlattices chaos device |
CN110519210A (en) * | 2018-05-22 | 2019-11-29 | 中国科学院苏州纳米技术与纳米仿生研究所 | Cryptographic key distribution method and terminal device |
-
2020
- 2020-01-21 CN CN202010070816.7A patent/CN111324899A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110519036A (en) * | 2018-05-22 | 2019-11-29 | 中国科学院苏州纳米技术与纳米仿生研究所 | The application method of data encryption and transmission method, terminal device and superlattices chaos device |
CN110519210A (en) * | 2018-05-22 | 2019-11-29 | 中国科学院苏州纳米技术与纳米仿生研究所 | Cryptographic key distribution method and terminal device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115311763A (en) * | 2022-06-24 | 2022-11-08 | 北京电子科技学院 | Identity recognition method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11533300B2 (en) | Encryption schemes with addressable elements | |
CN106789052B (en) | Remote key issuing system based on quantum communication network and use method thereof | |
CN102138300B (en) | Message authentication code pre-computation with applications to secure memory | |
EP3782105A1 (en) | Offline storage system and method of use | |
WO2019223583A1 (en) | Data encryption transmission method, terminal device and method for using superlattice chaotic device | |
US11308241B2 (en) | Security data generation based upon software unreadable registers | |
US20050120205A1 (en) | Certificate management system and method | |
JP2020535693A (en) | Storage data encryption / decryption device and method | |
US20120314865A1 (en) | NFC Communications Device for Setting Up Encrypted Email Communication | |
US20130077782A1 (en) | Method and Apparatus for Security Over Multiple Interfaces | |
US20190073319A1 (en) | Storage data encryption and decryption apparatus and method | |
WO2006023151A2 (en) | Method of delivering direct proof private keys to devices using an on-line service | |
WO2019223624A1 (en) | Key distribution method and terminal device | |
RU2445740C1 (en) | Simple access authentication method and system | |
EP4352643A1 (en) | Storage device authenticating host credential and utilizing physically unclonable function (puf) for data encryption/decryption | |
CN111314065A (en) | Data encryption transmission method, server and system based on virtual private network | |
CN110225028B (en) | Distributed anti-counterfeiting system and method thereof | |
CN114764512A (en) | Encryption key management | |
CN111324899A (en) | Method, device and system for storing/reading data | |
US8234501B2 (en) | System and method of controlling access to a device | |
JPH104403A (en) | Encryption device, decode device and method therefor | |
CN111246251A (en) | Encryption transmission method, terminal, system and application of video stream data | |
JP2019121955A (en) | Semiconductor device and generating method of encryption key | |
US20190095630A1 (en) | Storage data encryption/decryption apparatus and method | |
GB2427333A (en) | Encryption using a combination of first and second One-Time Pad (OTP) data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200623 |
|
RJ01 | Rejection of invention patent application after publication |