CN1940803A - Data encryption storage method - Google Patents

Data encryption storage method Download PDF

Info

Publication number
CN1940803A
CN1940803A CN 200510107419 CN200510107419A CN1940803A CN 1940803 A CN1940803 A CN 1940803A CN 200510107419 CN200510107419 CN 200510107419 CN 200510107419 A CN200510107419 A CN 200510107419A CN 1940803 A CN1940803 A CN 1940803A
Authority
CN
China
Prior art keywords
proof box
user
data
storage
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510107419
Other languages
Chinese (zh)
Other versions
CN100428108C (en
Inventor
孟智明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CNB2005101074198A priority Critical patent/CN100428108C/en
Publication of CN1940803A publication Critical patent/CN1940803A/en
Application granted granted Critical
Publication of CN100428108C publication Critical patent/CN100428108C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

A method for enciphering and storing data includes receiving request to set up data storage proof box from user, generating user status verification information based on user biological character information, setting up HPA on storage unit and using it as space to set up said proof box as well as storing user status verification information in proof box by enciphering mode, receiving request to make access on proof box from user and collecting user biological character information as well as carrying out status verification, receiving and processing operation information from user on data stored in proof box if verification is passed or otherwise refusing access request from user on proof box.

Description

A kind of method of data encryption storage
Technical field
The present invention relates to the electronic data storage technology, especially relate to a kind of data encryption storage means that is applied to electronic data processing system.
Background technology
Along with the development of infotech, comprise that the application of various electronic data processing systems of computing machine, server etc. is increasingly extensive, the data of daily contact of people and processing are more and more.Meanwhile, a safety of data problem problem also becoming people gradually and paid close attention to.
In the prior art, there is multiple method of data being encrypted the back storage.For example; adopt numeral, literal, letter or other symbols that the individual selects for use or its combination etc. as password by the user; be used for file is protected; when the user need open file; need submit to password to carry out authentication to system; checking is passed through, and then allows the user to open file, otherwise forbids the operation of user to file.But the defective of the prior art is that this password as authentication is forgotten easily, and ease for use has much room for improvement.
For this reason, the technical scheme that exists some to adopt special hardware to carry out authentication in the prior art, described hardware can be USB flash disk, ID card etc.But also there is defective in the prior art, and promptly corresponding authentication hardware is lost easily, and uses hardware must carry this hardware as the user of authentication thing, trouble comparatively, and ease for use is not high.
And there is a common defective in above-mentioned this dual mode, that be exactly since deposit data at common storage space, in case after the system crash, might the restore data file, thus bring irretrievable loss to the user.
In view of this, need develop the method that a kind of novel data encryption is stored.
Summary of the invention
At the deficiencies in the prior art, the technical matters that the present invention solves is to provide a kind of method of data encryption storage, and its ease for use is higher, and in the data that still can find after the system crash after encrypting storage.
For this reason, the method for data encryption storage provided by the invention comprises step:
1) receives the request that the user creates the data storage proof box;
2) biological information based on this user generates subscriber authentication information;
3) create HPA in storage unit, as the space of creating the data storage proof box; In proof box, preserve user's authentication information with cipher mode;
4) request of reception user capture proof box;
5) biological information of gathering the user carries out authentication; If the verification passes, then enter step 6); Otherwise, enter step 7);
6) receive the user to proof box and to the operation information of the data of proof box stored, handle accordingly;
7) refusing user's is to the visit of proof box.
Adopt first One-way encryption algorithm to carry out when generating subscriber authentication information preferably, described step 2).
Preferably, described step 3) further comprises: based on user's biological information, adopt second One-way encryption algorithm that is different from first One-way encryption algorithm, generate the key that the data of being stored are encrypted, deciphered.
Preferably, described step 2) biological information of Cai Yonging is different from the biological information that step 5) adopts.
Preferably, described biological information is portrait characteristic information or finger print information.
Preferably, in step 2) and step 3) between also comprise and receive the backup access code that the user is provided with; In described step 3), also be included in this backup access code of storage in the proof box; Between described step 5) and step 7), also comprise checking backup access code; If do not pass through, then enter step 7); If pass through, then enter step 6).
Preferably, in described step 2) detect the proof box whether there is current system user account correspondence before; If not, then enter step 2); If, the step of then claiming proof box.
Preferably, the described proof box of claiming comprises:
81) biological information of gathering the user carries out authentication; If the verification passes, then enter step 83); Otherwise, enter step 82);
82) checking backup access code; If pass through, then enter step 83); If not, then enter step 84);
83) claim successfully, set up the related of proof box and this system user account;
84) claim failure.
Preferably, also comprise receiving the instruction that the user deletes proof box, delete the named peril case of this user account correspondence.
Preferably, comprise also between described step 4) and step 5) whether detection exists the proof box of current system user account correspondence; If then enter step 5); If not, then create new proof box.
With respect to prior art, the invention has the beneficial effects as follows: owing to the present invention is based on the authentication information that user's biological information generates the user capture proof box, can solve therefore that the password that is used for authentication in the prior art is forgotten easily or corresponding authentication hardware is lost easily, the not high defective of ease for use.And data storage in the HPA space, is made the data file that can recover to store after system crash.Simultaneously, utilize the generation source of the key that biological information adds/separate as data, make the uniqueness of key be improved.
In preferred version of the present invention, feature to be carried out obtaining after the computing by One-way encryption algorithm based on the enciphering/deciphering of biological characteristic, two cryptographic algorithm can access two data messages, and one of them is the user rs authentication identity, is referred to as authentication information; Can be saved in the HPA, even if in use be decrypted, also because its use be One-way encryption algorithm and can't obtain primitive character information.Another is in order to enciphered data, is referred to as encryption key, because be not used in checking, therefore is difficult to crack.Because primitive character information is can not be acquired, therefore just can guarantee the safety of data simultaneously.
In addition, in preferred version, adopt two kinds of different biological informations to generate authentication information and encryption key respectively, security is further improved.
Description of drawings
Fig. 1 is the process flow diagram of data encryption storage means of the present invention;
Fig. 2 is a process flow diagram of creating and claim proof box among the embodiment of data encryption storage means of the present invention;
Fig. 3 is a process flow diagram of opening proof box among the embodiment of data encryption storage means of the present invention;
Fig. 4 is the synoptic diagram of encrypting based on figure information among the embodiment of data encryption storage means of the present invention;
Fig. 5 is another synoptic diagram of encrypting based on figure information among the embodiment of data encryption storage means of the present invention.
Embodiment
Seeing also Fig. 1, is the process flow diagram of data encryption storage means of the present invention.
Step S110 obtains user's biological information.
Step S120 receives the request that the user creates the data storage proof box.
Step S130 generates subscriber authentication information based on aforementioned biological information.
Step S140 creates HPA in storage unit, as the space of creating storage data assurance case.
Wherein, create described HPA (Host Protected Area, hard disk and host protection zone) on hard disk, HPA is a disclosed standard.
Step S150 receives the request of user capture proof box, and the biological information of gathering the user carries out authentication; If the verification passes, then enter step S160; Otherwise, entering step S170, refusing user's is to the visit of proof box.
Step S160 receives the user to proof box and to the operation information of the data of proof box stored, handles accordingly, comprises encryption, deciphering and/or accessing operation to data.
Those skilled in the art will appreciate that among the described step S160 that class of operation to proof box is similar to the operation to general file, for example, the user can will copy to literary composition the inside, also can directly open file and edit.
Need to prove that the data in the proof box are through encrypting the back storage, encrypted secret key is to change by user's biological information process to get.Wherein, can be by to adopting two kinds of different cryptographic algorithm to obtain two data messages with a kind of biological information, one as authentication information, and one as data encryption key.Certainly, also can use two kinds of different biological information extractive techniques, obtain two kinds of different biological informations, generate authentication information and data encryption key thereby be respectively applied for.
In addition, because the proof box of storage data is HPA spaces, therefore after system crash, the data of proof box and Qi Nei all can not lost.But need the user to claim (step S180) again this moment.Certainly, also allow the user to delete this proof box (step S190), and change step S130 over to, to create new proof box.
For the ease of the understanding of the present invention, the present invention will be described in detail below in conjunction with embodiment.
Seeing also Fig. 2, is the process flow diagram of creating and claim proof box among the embodiment of data encryption storage means of the present invention.
Step S211 receives the request that the user creates proof box.
Step S212 detects the proof box that whether has corresponding current system user account.If then enter step S221 or step S331; If not, then enter step S213.
Wherein, described system user account is meant the user account of the operating system of data handling system, for example the Windows account.
Step S213 obtains user's biological information.
In the present embodiment, the end user that is to say that as the portrait masterplate sample of recognizer establishment validated user described biological information is meant user's portrait characteristic information.Certainly, described biological information fingerprint that also can be the user etc. has the information of uniqueness.
Described portrait characteristic information is gathered in step S201 before this, and generates data message by step S202 storage, is stored in the database of system.
Described portrait characteristic information can adopt multiple prior art computing to obtain, and for example can adopt the Verilook Identification of Images algorithm of Neurotechnologija of the prior art company.
Step S214 receives the backup access code that the user is provided with.
When the user uses function of the present invention for the first time, need the user that a backup access code is set.
Step S215 receives the information that the user is provided with the proof box size.
After the user set the backup access code, the user also needed to set the size of proof box, such as 50MB.If the user is not provided with, then adopt the space size of acquiescence.
Step S216 creates the HPA space, as the proof box of storage data.In proof box, preserve current system user accounts information, that information of biological characteristic, backup password simultaneously with the form of encrypting.
The process of the establishment in HPA space adopts prior art, to the hard disk transmission maximum address instruction SetMax Address is set and gets final product.This order is used to be provided with the maximum address that hard disk can be used, and this maximum address is less than hard disk actual physics maximum address (Native Max).Hard disk can with maximum address be provided with successfully after, become HPA greater than maximum address less than the hard drive space of hard disk actual physics maximum address, i.e. guard space.This space can't be comprised that OS and BIOS visit by any software.Thereby after guaranteeing that the protection subregion is locked, realized the security of data storage.Be user's free space and maximum address following hard drive space in back is set, can be visited by normal software, and show the size that this maximum address is current hard disk.
After above-mentioned steps was all finished, the user just can bring into use the proof box function of this system.
In addition, when custom system collapse, after reinstalling, its proof box can not lost, but the user need claim its proof box again one time, and what need at first before claiming that the user confirms is last Windows user's accounts information (step S212).
Step S221 receives the request that the user claims proof box.
Step S222, after the user chose used accounts information, system can require to check the figure information in the proper account information, checks and does not pass through, and then enters step S223; If pass through, then enter step S224.
Step S223 requires input backup access code in order to identity verification, and is if coupling then enters step S224, that this proof box is related with the active user; If do not match, then refusal is related, and gives the power that can delete this proof box of user.
Step S224, this proof box is related with the active user.
Step S231, the user can delete this proof box according to actual conditions or self-demand.
Seeing also Fig. 3, is the process flow diagram of opening proof box among the embodiment of data encryption storage means of the present invention.
Step S311 receives the request that the user opens proof box.
Step S312 verifies the proof box that whether has current system user account correspondence in the HPA.If exist, then enter step S313; If there is no, then abandon the use of proof box function or enter step S321, create new proof box.
Step S313, checking user's portrait characteristic information.
When the user need open proof box, system can extract the figure information that is stored in the proof box, and checking user's figure information if pass through, then enters step S314; If do not pass through, then enter step S315.
Step S314 successfully opens proof box, allows the user to carry out various operations.
Open proof box, when promptly wishing to have access to guard space HPA, need utilize Set MaxAddress instruction again, with hard disk can with maximum address be set to hard disk actual physics maximum address and just can visit.
After opening proof box, the mode of operation proof box is the same with the mode of operation file folder, and the user can will copy to literary composition the inside, also can directly open file and edit.
After the data manipulation of proof box and storage thereof finished, carry out and close the HPA operation, most hard disks is closed HPA automatically after powering up again.
Step S315 requires the user to import the backup access code, extracts the backup access code that the user is provided with from proof box, in order to identifying user identity.If coupling then enters step S314, open proof box; If do not match, then enter step S316 or step S317.
Step S316, the refusing user's visit.
Step S317, the deletion proof box.
Seeing also Fig. 4, is the synoptic diagram of encrypting based on figure information among the embodiment of data encryption storage means of the present invention.
Wherein, the portrait feature is carried out obtaining after the computing by One-way encryption algorithm based on the enciphering/deciphering of portrait, two cryptographic algorithm can access two data messages, and one of them is the user rs authentication identity, is referred to as the portrait characteristic information; Can be saved in the HPA, even if in use be decrypted, also because its use be One-way encryption algorithm and can't obtain the primitive man as characteristic information.Another is in order to enciphered data, is referred to as the portrait encryption key, because be not used in checking, therefore is difficult to crack.Because the primitive man is can not be acquired as characteristic information, therefore just can guarantee the safety of data simultaneously.
Described One-way encryption algorithm can adopt prior art.For example, can adopt MD5 (MessageDigest Algorithm 5), this is a kind of one-way hash algorithm of RSA data security company exploitation, and MD5 is widely used, and can be used for that the data block of different length is carried out the private mark computing and become one 128 numerical value.Also can adopt SHA (Secure Hash Algorithm), this is a kind of newer hashing algorithm, can generate one 160 numerical value to the data operation of random length.
Seeing also Fig. 5, is another synoptic diagram of encrypting based on figure information among the embodiment of data encryption storage means of the present invention.
It will be appreciated by those skilled in the art that, if when implementing this method, the hardware device of portrait collection has two or more functions, so by after the computing of Identification of Images algorithm, can obtain two or more portrait characteristic informations, like this, just can use these two or more portrait characteristic informations to be respectively applied for different demands.
For example, can gather the lineup as information by the equipment of subsidiary infrared lens, by obtaining portrait characteristic information A after the algorithm computation, we can be applied to identification; After hot outer camera lens is replaced by common lens, then can collect another group figure information, can obtain different portrait characteristic information B again so after calculating, we can be applied to the generation of encryption key.Otherwise, also can.Like this, its security just can reach higher level.
In sum, the present invention relates to a kind of data confidentiality memory technology, especially related to a kind of method and technology that is stored in the interior file that passes through the Identification of Images encryption in HPA space by Identification of Images authentication visit.Because present portrait recognition technology has accuracy preferably, ease for use, hard disk HPA technology is also more and more ripe simultaneously, makes that method of the present invention can accomplished and application.
In a word, the present invention uses the method for portrait recognition technology as identifying user identity, the information source that the end user generates as key as characteristic information, use the storage area of HPA space simultaneously as data file, have ease for use preferably, the key that the portrait characteristic information produces can make that again uniqueness is strengthened, and security is improved, owing to used HPA, can make the user after system crash, can also find the private data file simultaneously as storage space.
The above only is a preferred implementation of the present invention; should be pointed out that for those skilled in the art, under the prerequisite that does not break away from the principle of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (10)

1. the method for a data encryption storage is characterized in that, comprises step:
1) receives the request that the user creates the data storage proof box;
2) biological information based on this user generates subscriber authentication information;
3) create HPA in storage unit, as the space of creating the data storage proof box; In proof box, preserve user's authentication information with cipher mode;
4) request of reception user capture proof box;
5) biological information of gathering the user carries out authentication; If the verification passes, then enter step 6); Otherwise, enter step 7);
6) receive the user to proof box and to the operation information of the data of proof box stored, handle accordingly;
7) refusing user's is to the visit of proof box.
2. the method for data encryption according to claim 1 storage is characterized in that described step 2) in adopt first One-way encryption algorithm to carry out when generating subscriber authentication information.
3. the method for data encryption storage according to claim 2, it is characterized in that, described step 3) further comprises: based on user's biological information, employing is different from second One-way encryption algorithm of first One-way encryption algorithm, generates the key that the data of being stored are encrypted, deciphered.
4. according to the method for each described data encryption storage of claim 1 to 3, it is characterized in that described step 2) biological information that adopts is different from the biological information that step 5) adopts.
5. the method for data encryption storage according to claim 4 is characterized in that described biological information is portrait characteristic information or finger print information.
6. the method for data encryption according to claim 4 storage is characterized in that, in step 2) and step 3) between also comprise and receive the backup access code that the user is provided with; In described step 3), also be included in this backup access code of storage in the proof box; Between described step 5) and step 7), also comprise checking backup access code; If do not pass through, then enter step 7); If pass through, then enter step 6).
7. the method for data encryption according to claim 6 storage is characterized in that, also is included in described step 2) detect the proof box that whether has current system user account correspondence before; If not, then enter step 2); If, the step of then claiming proof box.
8. the method for data encryption storage according to claim 7 is characterized in that the described proof box of claiming comprises:
81) biological information of gathering the user carries out authentication; If the verification passes, then enter step 83); Otherwise, enter step 82);
82) checking backup access code; If pass through, then enter step 83); If not, then enter step 84);
83) claim successfully, set up the related of proof box and this system user account;
84) claim failure.
9. the method for data encryption storage according to claim 8 is characterized in that, also comprises receiving the instruction that the user deletes proof box, deletes the named peril case of this user account correspondence.
10. the method for data encryption storage according to claim 4 is characterized in that, comprises also between described step 4) and step 5) whether detection exists the proof box of current system user account correspondence; If then enter step 5); If not, then create new proof box.
CNB2005101074198A 2005-09-30 2005-09-30 Data encryption storage method Expired - Fee Related CN100428108C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005101074198A CN100428108C (en) 2005-09-30 2005-09-30 Data encryption storage method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005101074198A CN100428108C (en) 2005-09-30 2005-09-30 Data encryption storage method

Publications (2)

Publication Number Publication Date
CN1940803A true CN1940803A (en) 2007-04-04
CN100428108C CN100428108C (en) 2008-10-22

Family

ID=37959037

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005101074198A Expired - Fee Related CN100428108C (en) 2005-09-30 2005-09-30 Data encryption storage method

Country Status (1)

Country Link
CN (1) CN100428108C (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101369892B (en) * 2008-08-08 2010-10-13 西安电子科技大学 Method for reinforcing fingerprint Fuzzy Vault system security
CN101547219B (en) * 2009-05-05 2012-09-05 汤淼 System and method for data storage
CN103870744A (en) * 2012-12-13 2014-06-18 联想(北京)有限公司 Method and electronic device for verifying password
CN105323059A (en) * 2014-07-31 2016-02-10 三星电子株式会社 Device and method of setting or removing security on content
CN105760733A (en) * 2016-01-29 2016-07-13 上海摩软通讯技术有限公司 Data encrypting method and module and data accessing method and module

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1319217A (en) * 1998-09-22 2001-10-24 西门子公司 Method and device for verifying authorization to log onto system
GB0004287D0 (en) * 2000-02-23 2000-04-12 Leeper Kim System and method for authenticating electronic documents
US6775776B1 (en) * 2000-06-27 2004-08-10 Intel Corporation Biometric-based authentication in a nonvolatile memory device
CN1284090C (en) * 2003-12-05 2006-11-08 瀚群科技股份有限公司 Storage store device containing finger print senser and method for protecting its stored document

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101369892B (en) * 2008-08-08 2010-10-13 西安电子科技大学 Method for reinforcing fingerprint Fuzzy Vault system security
CN101547219B (en) * 2009-05-05 2012-09-05 汤淼 System and method for data storage
CN103870744A (en) * 2012-12-13 2014-06-18 联想(北京)有限公司 Method and electronic device for verifying password
CN103870744B (en) * 2012-12-13 2018-04-27 联想(北京)有限公司 A kind of method and electronic equipment for verifying password
CN105323059A (en) * 2014-07-31 2016-02-10 三星电子株式会社 Device and method of setting or removing security on content
CN105323059B (en) * 2014-07-31 2018-11-13 三星电子株式会社 Be arranged or remove content safety measure device and method
CN105760733A (en) * 2016-01-29 2016-07-13 上海摩软通讯技术有限公司 Data encrypting method and module and data accessing method and module
CN105760733B (en) * 2016-01-29 2018-11-23 上海摩软通讯技术有限公司 Data ciphering method and module, data access method and module

Also Published As

Publication number Publication date
CN100428108C (en) 2008-10-22

Similar Documents

Publication Publication Date Title
US8676046B2 (en) Fingerprint scanning systems and methods
CN1256633C (en) A system and method for authenticating electronic documents
CN1229705C (en) Biometric-based authentication in nonvolatile memory device
CN1295625C (en) Bimetrics parameters protected computer serial bus interface protable data storage device and method of proprietary biometrics enrollment
CN102624699B (en) Method and system for protecting data
CN1825341A (en) Biometric authentication apparatus, terminal device and automatic transaction machine
US20070237366A1 (en) Secure biometric processing system and method of use
US20110225652A1 (en) Identity theft countermeasures
CN1281608A (en) Cryptographic key generation using biometric data
US20100215175A1 (en) Methods and systems for stripe blind encryption
JP2009151788A (en) Secure off-chip processing of biometric data
US20070226514A1 (en) Secure biometric processing system and method of use
CN1610888A (en) Data access method and apparatus for storing safety key enciphering (SAKE) equipment to control network
CN1976281A (en) Information processing device and authentication method
CN1496073A (en) Information check equipment
CN1940803A (en) Data encryption storage method
CN109190389A (en) A kind of solid state hard disk data guard method based on USB flash disk authentication
US20090222912A1 (en) Identification device and authentication method through such a device
EP2037389A1 (en) An electronic file protection system having one or more removeable memory devices
CN1991800A (en) Fingerprint identification storage device and fingerprint identification method
US20070226515A1 (en) Secure biometric processing system and method of use
EP2037392A1 (en) A system and method of protecting content of an electronic file using a computer
CN1282051C (en) Safety industrial control system with fingerprint encryption
US20100031048A1 (en) Data authenticator
EP2037390A1 (en) System and method of protecting content of an electronic file for sending and receiving

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20081022

Termination date: 20200930

CF01 Termination of patent right due to non-payment of annual fee