CN112235102A - Hybrid key storage and management method and storage device - Google Patents

Hybrid key storage and management method and storage device Download PDF

Info

Publication number
CN112235102A
CN112235102A CN202011049940.1A CN202011049940A CN112235102A CN 112235102 A CN112235102 A CN 112235102A CN 202011049940 A CN202011049940 A CN 202011049940A CN 112235102 A CN112235102 A CN 112235102A
Authority
CN
China
Prior art keywords
key
storage
area
file
storage area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011049940.1A
Other languages
Chinese (zh)
Other versions
CN112235102B (en
Inventor
王辉
许晶
王振林
李艳超
袁艳芳
刘国营
张磊
侯战斌
庞振江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
Beijing Smartchip Microelectronics Technology Co Ltd
Beijing Smartchip Semiconductor Technology Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
Beijing Smartchip Microelectronics Technology Co Ltd
Beijing Smartchip Semiconductor Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Information and Telecommunication Co Ltd, Beijing Smartchip Microelectronics Technology Co Ltd, Beijing Smartchip Semiconductor Technology Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN202011049940.1A priority Critical patent/CN112235102B/en
Publication of CN112235102A publication Critical patent/CN112235102A/en
Application granted granted Critical
Publication of CN112235102B publication Critical patent/CN112235102B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention relates to the technical field of storage, in particular to a hybrid key storage and management method, which comprises the following steps: responding to the key operation request; acquiring the key type of the key in the key operation request; determining a target area of the key operation request based on the key type; the target area at least comprises a first storage area and a second storage area; the first storage area and the second storage area have different storage formats. A corresponding storage device is also provided. The implementation method provided by the invention can improve the key access performance of the storage equipment such as the security chip and the like, and enriches the application scenes of the storage equipment such as the security chip and the like.

Description

Hybrid key storage and management method and storage device
Technical Field
The present invention relates to the field of storage technologies, and in particular, to a hybrid key storage and management method and a storage device.
Background
The method of accessing a key through a key file is a common method, and has the following disadvantages: when the external device of the use scene of the security chip needs to perform security calculation quickly, the method cannot ensure the access efficiency of the secret key. For example, in a distribution feeder automation terminal, when a certain terminal fails, safety failure information needs to be broadcast to other terminals within 20ms, and the time for a safety chip to perform data safety calculation needs to be guaranteed within 2 ms. At this point, the performance requirement is not met by the method of accessing the key using the key file.
There are some solutions to this in the prior art, but there are still deficiencies. For example: the storage table of the database is partitioned, and the names of the partitioned storage table correspond to the key index values stored in the table, so that the scanning time required by key query is reduced. This method is suitable for the case where the key data is particularly large, but in the security chip in the industrial control field, the use of the key is generally limited to security calculations such as authentication, encryption/decryption of transmitted data, integrity calculation/verification, etc., and a large number of keys are not stored, so the method of the index table in the above patent is not suitable.
Also for example: by optimizing the dynamic storage method of the key and the reading and deleting method after storage, the method is applied to a multi-application system, the limitation of rows and columns in the key index and the limitation of the number of key groups are solved, and meanwhile, the utilization rate of the relatively tense memory resource of the embedded equipment is greatly improved on the basis of meeting the requirement of the maximum application program number of a client. The related public key searching system compares whether the key system is established or not, so that the searching speed can be improved, and the utilization rate of a memory is improved. But still does not meet the time requirements of some high performance scenarios.
Disclosure of Invention
In view of the above, the present invention is directed to a hybrid key storage and management method and a storage device, so as to at least partially solve the above problems.
To achieve the above object, in a first aspect of the present invention, there is provided a hybrid key storage and management method, including: responding to a key operation request, and acquiring a key type of a key in the key operation request; determining a target area of the key operation request based on the key type, wherein the target area at least comprises a first storage area and a second storage area, and the first storage area and the second storage area have different storage formats.
Preferably, the storage format includes block storage and file storage.
Preferably, the first storage area includes a plurality of key storage blocks, and each of the key storage blocks includes: a key type area, a key version area and a plurality of key value recording areas; each of the key value recording areas includes: an identification bit and a key region have been created; the key area is used to store a key value of a key.
Preferably, the optional operations of the first storage area include: creating a key: writing a key value of a key into a key area of a key value recording area in an empty key storage block, simultaneously writing corresponding attributes of the key into a key type area and a key version area in the key storage block respectively, and modifying a value of a created identification bit in the key value recording area; reading the key: determining a key value recording area of the key according to the key type and the key ID of the key, and returning the key value stored in the key area in the key value recording area; and (3) updating the key: and updating the key in a batch updating mode.
Preferably, the second storage area includes a file system, and the file system includes a master file or further includes an application file created under the master file; the main file or the application file includes a key file including a key area for storing a key value of a key.
Preferably, the file system further includes a master control key, and the master control key is used to control the read-write permission of the key stored in the file system.
Preferably, the optional operations of the second storage area include: creating a key: creating a key file, writing a key value of a key into a key area of the key file, and simultaneously writing corresponding attributes of the key into corresponding areas of the key file respectively; reading the key: determining a key file where the key is located in the file system according to the key type and the key ID of the key, and returning a key value stored in a key area in the key file; and (3) updating the key: and updating the key by adopting a file replacement mode.
Preferably, the method further comprises: acquiring an operation instruction in the key operation request; and executing the operation on the target area to realize the key operation request based on the operation instruction and the target area.
In a second aspect of the present invention, there is also provided a storage device comprising a storage area including at least a first storage area and a second storage area; the first storage area and the second storage area have different storage formats for storing key data of different key types, respectively.
Preferably, the storage device is an IC card or a secure chip.
The present invention also provides a computer storage medium having stored thereon a computer program which, when executed by a processor, implements the hybrid key storage and management method described above.
The hybrid secret key storage and management method and the hybrid secret key storage device have the following beneficial effects that:
1) the design method of different storage and access management strategies is adopted according to different key purposes, so that the key access performance is improved on the premise that a hardware platform such as a security chip is kept unchanged;
2) the access time of the high-performance key is greatly shortened, and the management method of the common key is compatible, so that the application of the security chip is expanded, and the application scene of the security chip is enriched;
3) the hybrid-based key storage and management method is suitable for the design of a key management system with both functions and performance.
Additional features and advantages of the invention will be set forth in the detailed description which follows.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate an embodiment of the invention and, together with the description, serve to explain the invention and not to limit the invention. In the drawings:
FIG. 1 is a diagram illustrating steps of a hybrid key storage and management method according to an embodiment of the invention;
FIG. 2 is a diagram illustrating an implementation of a hybrid key storage and management method according to an embodiment of the invention;
fig. 3 is a schematic structural diagram of a first storage area in the hybrid key storage and management method according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a second storage area in the hybrid key storage and management method according to an embodiment of the present invention.
Detailed Description
The following detailed description of embodiments of the invention refers to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating embodiments of the invention, are given by way of illustration and explanation only, not limitation.
Fig. 1 is a schematic diagram illustrating steps of a hybrid key storage and management method according to an embodiment of the present invention, and as shown in fig. 1, the hybrid key storage and management method includes:
s11, responding to the key operation request;
for the storage device, the key operation request is from a read-write device, such as a card reader or a host, and when the embodiment of the method responds to the key operation request, the subsequent processes are executed.
S12, obtaining the key type of the key in the key operation request;
in one embodiment, the key type is set by access efficiency. For example, in a distribution feeder automation terminal, when a certain terminal fails, safety failure information needs to be broadcast to other terminals within 20ms, and the time for a safety chip to perform data safety calculation needs to be guaranteed within 2 ms. At this time, the performance requirement cannot be met by using the method of accessing the key by using the key file, and in this scenario, the distinction needs to be made according to the access efficiency. In other scenarios, the cipher type may be classified according to the security requirement of the key, the key format, the encryption method, the frequency of use, the application range, and other requirements.
S13, determining a target area of the key operation request based on the key type;
in the distribution feeder automation terminal of the above example, if the method for accessing the key through the key file is used, when the external device of the security chip usage scenario needs to perform security calculation quickly, the method cannot ensure the access efficiency of the key. There is a need to integrate the requirements of key storage, management, and access performance. In the embodiment, different storage areas are set, so that classified management of keys is realized, and different applications determined by key types are realized.
Fig. 2 is a schematic diagram of an implementation of a hybrid key storage and management method according to an embodiment of the present invention, as shown in fig. 2. In one embodiment, the target area includes at least a first storage area and a second storage area; when one type of key needs to be accessed quickly, the present embodiment defines this type of key as a high-performance key and creates it in a specific storage area, i.e., the first storage area. The key which does not relate to the performance requirement is called a common key in the scheme, and is created in the second storage area. The setting of the storage area corresponds to the type of the key, and can be more than two, and the storage area is determined according to the password type in the previous step. The approach may not be one-to-one, for example, three key types may correspond to two storage areas.
The first storage area and the second storage area have different storage formats. The data storage has a plurality of storage modes, each mode has different advantages and disadvantages, and different storage modes also determine the storage format of the storage area. By selecting different storage formats, the balance of performance references such as the efficiency and the safety of data access is realized.
In one embodiment, the storage format includes block storage and file storage. The block storage can divide the logical volume on the bare disk, and the logical volume is formatted into any file system, which has the advantages that: supports various file systems, has high transmission speed and provides a hardware fault-tolerant mechanism. The file storage is to store files on a storage medium such as a formatted disk, and the storage efficiency is high and the manageability is good. But it needs to traverse the file system when reading and writing.
Fig. 3 is a schematic structural diagram of a first storage area in a hybrid key storage and management method according to an embodiment of the present invention, as shown in fig. 3. In one embodiment, the first storage area includes a number of key storage blocks, each of the key storage blocks including: a key type area, a key version area and a plurality of key value recording areas; each of the key value recording areas includes: identification bits and a key area for storing a key value of a key have been created. Specifically, each type of key is stored in a specific location, and key type and key version information is recorded. Each type of key stores a number of keys, each key storing a flag bit that has been created and a key value for the key. Through the arrangement of the storage format, not only is the necessary information of the key recorded, but also the hierarchy of key storage is simplified, and the reading efficiency is improved.
In one embodiment, the optional operations of the first storage area include: creating a key: writing a key value of a key into a key area of a key value recording area in an empty key storage block, simultaneously writing corresponding attributes of the key into a key type area and a key version area in the key storage block respectively, and modifying a value of a created identification bit in the key value recording area; reading the key: determining a key value recording area of the key according to the key type and the key ID of the key, and returning the key value stored in the key area in the key value recording area; and (3) updating the key: and updating the key in a batch updating mode.
Specifically, when a high-performance key is created, a free storage block is found in the first storage area, the type and initial version of the key are written into a designated area, that is, the key type of the key is written into the key type area of the key storage block at the same time, the version of the key is written into the key version area of the key storage block, and the created key value is filled into the corresponding key value recording area, so as to rewrite whether the created flag bit is "created".
When accessing a high-performance key, the key is generally found by the key type and the key ID, and the encrypted key value is read and decrypted for use. When accessing the high-performance key, the storage initial position of the key of the type can be quickly found in the first storage area through the key type, then the specific offset relative to the storage initial position is carried out through the key ID, and the key value can be found after judging whether the key is a created zone bit, so that the quick access of the key is realized.
When updating the high-performance key, the same type of key is updated at one time in a batch key updating mode, and the key value and the corresponding zone bit are rewritten
Fig. 4 is a schematic structural diagram of a second storage area in the hybrid key storage and management method according to an embodiment of the present invention, as shown in fig. 4. In an embodiment, the second storage area includes a file system including a master file, or further includes an application file created under the master file; the main file or the application file includes a key file including a key area for storing a key value of a key. Specifically, the common key is stored in a key file, which is included in the file system. When creating file system and key file, firstly, a main file is created, the file content of the main file contains a main control key of a platform, and the main file has the authority of managing all keys in the key storage area and is used for protecting the reading and writing of all keys. Under the master file, a plurality of (0-N) application files, a plurality of (0-N) binary files, and one key file may be created. Under the application file, a plurality of (0-N) binary files, one key file, may be created. The format of the key file includes type, ID, version, security access control, key value. Each time a key file is created, a file space of a corresponding size is allocated thereto.
In an embodiment, the master control key in the file system is used to control the read-write permission of the key stored in the file system, which is beneficial to further improving the read-write security of the file.
In one embodiment, the optional operations of the second storage area include: creating a key: creating a key file, writing a key value of a key into a key area of the key file, and simultaneously writing corresponding attributes of the key into corresponding areas of the key file respectively; reading the key: determining a key file where the key is located in the file system according to the key type and the key ID of the key, and returning a key value stored in a key area in the key file; and (3) updating the key: and updating the key by adopting a file replacement mode. Specifically, when a key is stored, the key file is added. The storage area allocates file space with corresponding size for the key file, and correspondingly writes the content of the key such as type, ID, version, security access authority control, key value and the like into the key file. When the system accesses the common key, the key is looked up by the key type and the key ID. First, the file system is traversed to find the corresponding key file, and then the key type and key ID value of the key file are traversed to find the corresponding key. The encrypted key value can be accessed and decrypted for use only by accessing the rights defined by the rights control field through key security. When updating the common key, finding out the key file, finding out the key address to be updated through the key type and the key ID, and updating the key version and the key value.
In an embodiment, the method further comprises: acquiring the operation in the key operation request; based on the operation and the target area, performing an operation on the target area to implement the key operation request. The operations generally include the aforementioned "create key", "read key", and "update key", and the details of execution of these operations are different between the first storage area and the second storage area. By analyzing the received key operation request, the operation and the target area required to be executed by the key operation request are determined, and the function realization and feedback of the key operation request are completed by referring to the execution details in the embodiment.
In an embodiment, there is also provided a storage device including a storage area including at least a first storage area and a second storage area; the first storage area and the second storage area have different storage formats for storing different types of key data, respectively. By selecting different storage formats, the balance of performance references such as the efficiency and the safety of data access is realized. Different key storage modes have advantages and disadvantages, in the embodiment, according to the characteristics of key storage and access in practical application, a key storage mode in which two modes are mixed is adopted, and a key with higher access performance requirement is stored in a high-performance key storage area, namely a first storage area, according to different requirements; and other common keys are stored in the common key storage area, namely the second storage area, which saves space and has a clearer storage structure.
In one embodiment, the storage device is an IC card or a secure chip. The file structure and file access command format of a Chip Operation System (COS) on a contact IC card are described in the ISO7816 specification. In existing IC smart cards and security chips, the file structure is created and accessed in the manner described by the specification. When the storage device is an IC card or a secure chip, the storage device has a small storage capacity and a high requirement for access speed. Compared with the disk storage, the method and the device can better embody the advantages brought by the classified storage in the embodiment of the invention.
Embodiments of the present invention also provide a computer storage medium having a computer program stored thereon, where the computer program is executed by a processor to implement the method for accessing a usb disk according to the embodiments.
Although the embodiments of the present invention have been described in detail with reference to the accompanying drawings, the embodiments of the present invention are not limited to the details of the above embodiments, and various simple modifications can be made to the technical solutions of the embodiments of the present invention within the technical idea of the embodiments of the present invention, and the simple modifications all belong to the protection scope of the embodiments of the present invention.
It should be noted that the various features described in the above embodiments may be combined in any suitable manner without departing from the scope of the invention. In order to avoid unnecessary repetition, the embodiments of the present invention do not describe every possible combination.
Those skilled in the art will understand that all or part of the steps in the method according to the above embodiments may be implemented by a program, which is stored in a storage medium and includes several instructions to enable a single chip, a chip, or a processor (processor) to execute all or part of the steps in the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In addition, any combination of different implementation manners of the embodiments of the present invention can be performed, and the embodiments of the present invention should be considered as disclosed in the embodiments of the present invention as long as the combination does not depart from the idea of the embodiments of the present invention.

Claims (10)

1. A hybrid key storage and management method, the method comprising:
responding to a key operation request, and acquiring a key type of a key in the key operation request;
determining a target area of the key operation request based on the key type, wherein the target area at least comprises a first storage area and a second storage area, and the first storage area and the second storage area have different storage formats.
2. The method of claim 1, wherein the storage format comprises block storage and file storage.
3. The method of claim 1, wherein the first storage area comprises a plurality of key storage blocks, each key storage block comprising: a key type area, a key version area and a plurality of key value recording areas; each of the key value recording areas includes: an identification bit and a key region have been created; the key area is used to store a key value of a key.
4. The method of claim 3, wherein the optional operations of the first storage area comprise:
creating a key: writing a key value of a key into a key area of a key value recording area in an empty key storage block, simultaneously writing corresponding attributes of the key into a key type area and a key version area in the key storage block respectively, and modifying a value of a created identification bit in the key value recording area;
reading the key: determining a key value recording area of the key according to the key type and the key ID of the key, and returning the key value stored in the key area in the key value recording area;
and (3) updating the key: and updating the key in a batch updating mode.
5. The method of claim 1, wherein the second storage area comprises a file system, wherein the file system comprises a master file or further comprises an application file created under the master file;
the main file or the application file includes a key file including a key area for storing a key value of a key.
6. The method of claim 5, wherein the file system further comprises a master control key for controlling read and write permissions of keys stored in the file system.
7. The method of claim 5, wherein the optional operations of the second storage area comprise:
creating a key: creating a key file, writing a key value of a key into a key area of the key file, and simultaneously writing corresponding attributes of the key into corresponding areas of the key file respectively;
reading the key: determining a key file where the key is located in the file system according to the key type and the key ID of the key, and returning a key value stored in a key area in the key file;
and (3) updating the key: and updating the key by adopting a file replacement mode.
8. The method according to claim 4 or 7, characterized in that the method further comprises:
acquiring an operation instruction in the key operation request;
and executing the operation on the target area to realize the key operation request based on the operation instruction and the target area.
9. A memory device comprising a memory area, characterized in that,
the storage area at least comprises a first storage area and a second storage area;
the first storage area and the second storage area have different storage formats for storing key data of different key types, respectively.
10. The memory device according to claim 9, wherein the memory device is an IC card or a secure chip.
CN202011049940.1A 2020-09-29 2020-09-29 Hybrid key storage and management method and storage device Active CN112235102B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011049940.1A CN112235102B (en) 2020-09-29 2020-09-29 Hybrid key storage and management method and storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011049940.1A CN112235102B (en) 2020-09-29 2020-09-29 Hybrid key storage and management method and storage device

Publications (2)

Publication Number Publication Date
CN112235102A true CN112235102A (en) 2021-01-15
CN112235102B CN112235102B (en) 2023-07-21

Family

ID=74119479

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011049940.1A Active CN112235102B (en) 2020-09-29 2020-09-29 Hybrid key storage and management method and storage device

Country Status (1)

Country Link
CN (1) CN112235102B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070116288A1 (en) * 2005-11-18 2007-05-24 Oktay Rasizade System for managing keys and/or rights objects
CN103414555A (en) * 2013-08-15 2013-11-27 成都卫士通信息产业股份有限公司 Array key management method based on IO block encryption
CN103490878A (en) * 2013-10-15 2014-01-01 上海杉德金卡信息系统科技有限公司 Methods for dynamic secret key storing and stored secret key reading and deleting
US9209974B1 (en) * 2015-05-03 2015-12-08 Zeutro, Llc Functional encryption key management
US20160078244A1 (en) * 2014-09-15 2016-03-17 Unisys Corporation Secured file system management
CN106980676A (en) * 2017-03-29 2017-07-25 江西金格科技股份有限公司 File management method based on intelligent key disk
US20170286709A1 (en) * 2016-03-31 2017-10-05 International Business Machines Corporation Encryption key management for file system
CN107609870A (en) * 2017-09-02 2018-01-19 福建新大陆支付技术有限公司 More application key management method, system and POS terminals for POS
CN107707346A (en) * 2017-04-10 2018-02-16 浙江九州量子信息技术股份有限公司 A kind of key storage based on database, acquisition methods
CN209402526U (en) * 2019-03-29 2019-09-17 北京智芯微电子科技有限公司 The key storage device of safety chip
KR20190136554A (en) * 2018-05-31 2019-12-10 (주)케이스마텍 Hotel smart key service method of hybrid security environment for different types of user terminals and hotel smart key management system for them
US20200028678A1 (en) * 2018-04-28 2020-01-23 EMC IP Holding Company LLC Method, apparatus and computer program product for managing encryption key in a storage system

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070116288A1 (en) * 2005-11-18 2007-05-24 Oktay Rasizade System for managing keys and/or rights objects
CN103414555A (en) * 2013-08-15 2013-11-27 成都卫士通信息产业股份有限公司 Array key management method based on IO block encryption
CN103490878A (en) * 2013-10-15 2014-01-01 上海杉德金卡信息系统科技有限公司 Methods for dynamic secret key storing and stored secret key reading and deleting
US20160078244A1 (en) * 2014-09-15 2016-03-17 Unisys Corporation Secured file system management
US9209974B1 (en) * 2015-05-03 2015-12-08 Zeutro, Llc Functional encryption key management
US20170286709A1 (en) * 2016-03-31 2017-10-05 International Business Machines Corporation Encryption key management for file system
CN106980676A (en) * 2017-03-29 2017-07-25 江西金格科技股份有限公司 File management method based on intelligent key disk
CN107707346A (en) * 2017-04-10 2018-02-16 浙江九州量子信息技术股份有限公司 A kind of key storage based on database, acquisition methods
CN107609870A (en) * 2017-09-02 2018-01-19 福建新大陆支付技术有限公司 More application key management method, system and POS terminals for POS
US20200028678A1 (en) * 2018-04-28 2020-01-23 EMC IP Holding Company LLC Method, apparatus and computer program product for managing encryption key in a storage system
KR20190136554A (en) * 2018-05-31 2019-12-10 (주)케이스마텍 Hotel smart key service method of hybrid security environment for different types of user terminals and hotel smart key management system for them
CN209402526U (en) * 2019-03-29 2019-09-17 北京智芯微电子科技有限公司 The key storage device of safety chip

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
成茂才;徐开勇;: "基于可信计算平台的审计日志安全存储系统", 计算机科学, no. 06 *
金伟;余铭洁;李凤华;杨正坤;耿魁;: "支持高并发的Hadoop高性能加密方法研究", 通信学报, no. 12 *

Also Published As

Publication number Publication date
CN112235102B (en) 2023-07-21

Similar Documents

Publication Publication Date Title
US9529735B2 (en) Secure data encryption in shared storage using namespaces
KR100371124B1 (en) Storing data objects in a smart card memory
US7653796B2 (en) Information recording medium and region management method for a plurality of recording regions each managed by independent file system
US7895394B2 (en) Storage system
CN100465938C (en) Method and apparatus for searching rights objects stored in portable storage device
US7970983B2 (en) Identity-based flash management
US20220006617A1 (en) Method and apparatus for data storage and verification
US9646176B2 (en) Method for encrypting database
US20030041253A1 (en) Recording apparatus, medium, method, and related computer program
CN111695163B (en) Storage device and control method
US20090164709A1 (en) Secure storage devices and methods of managing secure storage devices
CN100419620C (en) Method for command interaction and two-way data transmission on USB mass storage equipment by program and USB mass storage equipment
CN106130730A (en) The data sharing method of a kind of smart card and smart card
CN110554911A (en) Memory access and allocation method, memory controller and system
CN108595346B (en) Feature library file management method and device
CN113420308A (en) Data access control method and control system for encryption memory
CN106155580B (en) A kind of storage method and system based on embedded multi-media card eMMC
CN103136215A (en) Data read-write method and device of storage system
CN114722379A (en) USB flash disk identification method, control method, system, electronic equipment and storage medium
CN105468999A (en) Data security method and mobile hard disk
US20180268127A1 (en) Methods and apparatus for controlling access to secure computing resources
CN112235102B (en) Hybrid key storage and management method and storage device
CN116089327A (en) Data protection method and related equipment
CN112825098A (en) Data protection method and device, computing equipment and storage medium
US10831916B2 (en) Method for blocking access of malicious application and storage device implementing the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant