CN101908024A - Encrypting method, device and hard disk - Google Patents

Encrypting method, device and hard disk Download PDF

Info

Publication number
CN101908024A
CN101908024A CN2010102551138A CN201010255113A CN101908024A CN 101908024 A CN101908024 A CN 101908024A CN 2010102551138 A CN2010102551138 A CN 2010102551138A CN 201010255113 A CN201010255113 A CN 201010255113A CN 101908024 A CN101908024 A CN 101908024A
Authority
CN
China
Prior art keywords
memory block
data
encryption
described memory
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010102551138A
Other languages
Chinese (zh)
Inventor
于红旗
吴佳
李清江
郑国�
于轶
蒋水兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HUNAN YUANKE HIGH-TECH Co Ltd
Original Assignee
HUNAN YUANKE HIGH-TECH Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HUNAN YUANKE HIGH-TECH Co Ltd filed Critical HUNAN YUANKE HIGH-TECH Co Ltd
Priority to CN2010102551138A priority Critical patent/CN101908024A/en
Publication of CN101908024A publication Critical patent/CN101908024A/en
Priority to PCT/CN2011/077170 priority patent/WO2012022207A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an encrypting method, a device and a hard disk. The encrypting method comprises the steps of receiving radio frequency information and controlling a storage area in a storage device to display, wherein the original state of the storage area is a hidden state. The invention promotes the safety of data protection in the storage device.

Description

Encryption method and device, hard disk
Technical field
The present invention relates to a kind of encryption method and device, hard disk.
Background technology
Along with arrival of information age, be means of crime with the computing machine and be that the criminal activity of crime target is also increasing day by day with the computerized information.Two kinds on general component software of data protection technology and hardware, the former utilizes software to encrypt, and the latter accomplishes special encryption chip to encrypt from hardware view in the portable hard drive.
Software cryptography: this class is encrypted access rights generally is set in driver, requires the user to enter password etc.All are all realized under software environment.
The portable hard drive encryption of carrying out in the software program mode is easy to be read and crack by update routine, so think that at present hardware encipher is more reliable.
Hardware encipher: portable hard drive carries out the data hardware encipher at whole dish, and the data that prevent to store on the link are given away secrets.Usually will be through a series of processes such as enciphered method conversion, additional password, encrypting modules.Decrypting process then comprises the data integrity discriminating.Whether the eigenwert of system's contrast verification object input meets preset parameters, realizes the safeguard protection to data.
At in the correlation technique to the not high enough problem of Data Protection security in the memory storage, effective solution is not proposed at present as yet.
Summary of the invention
At in the correlation technique the not high enough problem of Data Protection security in the memory storage being proposed the present invention, for this reason, fundamental purpose of the present invention is to provide a kind of encryption method and device, hard disk, to address the above problem.
To achieve these goals, according to an aspect of the present invention, provide a kind of encryption method.This encryption method comprises: received RF information; And the memory block in the control store device shows that wherein, the original state of described memory block is a hidden state.
To achieve these goals, according to a further aspect in the invention, provide a kind of encryption device.This encryption device comprises: first receiver module is used for received RF information; And control module, the memory block that is used for the control store device shows that wherein, the original state of described memory block is a hidden state.
By the present invention, adopt received RF information; And the memory block in the control store device shows that wherein, the original state of described memory block is a hidden state.Solved in the correlation technique the not high enough problem of Data Protection security in the memory storage, and then reached the effect that improves the security of data protection in the memory storage.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used to explain the present invention, do not constitute improper qualification of the present invention.In the accompanying drawings:
Fig. 1 is the synoptic diagram according to the encryption device of first embodiment of the invention;
Fig. 2 is the synoptic diagram according to the encryption device of second embodiment of the invention;
Fig. 3 is the process flow diagram according to the encryption method of first embodiment of the invention;
Fig. 4 is the process flow diagram according to the encryption method of second embodiment of the invention;
Fig. 5 is the process flow diagram according to the AES encryption of the embodiment of the invention;
Fig. 6 is the process flow diagram according to the AES deciphering of the embodiment of the invention.
Embodiment
Need to prove that under the situation of not conflicting, embodiment and the feature among the embodiment among the application can make up mutually.Describe the present invention below with reference to the accompanying drawings and in conjunction with the embodiments in detail.
Fig. 1 is the synoptic diagram according to the encryption device of first embodiment of the invention.
As shown in Figure 1, this encryption device comprises first receiver module 10 and control module 20.
Wherein, first receiver module 10 is used for received RF information; And the memory block that control module 20 is used for the control store device shows that wherein, the original state of described memory block is a hidden state.
Memory block in memory storage is under the situation of original state, and when memory storage was connected to computing machine, this memory block was a hidden state.By this embodiment, encryption device is receiving under the situation of radio-frequency information, and the memory block that hides is shown, can improve the security of data protection in the memory storage.
Fig. 2 is the synoptic diagram according to the encryption device of second embodiment of the invention.
Preferably, encryption device also comprises: second receiver module 50, be used to receive the destruction instruction of user's input, and wherein, described destruction instruction is used for indicating the data to described memory block to destroy; And destroy module 60, be used for the data of described memory block are destroyed.By this embodiment, under the situation of the destruction instruction that receives the user, the data in the memory block are destroyed, can improve the security of data protection in the memory storage further.
Above-mentioned encryption device can also comprise: deciphering module 30 is used for described memory block is decrypted.
Fig. 3 is the process flow diagram according to the encryption method of first embodiment of the invention.As shown in Figure 3, this method comprises:
Step S102, received RF information.
For example, the encryption chip that is connected with memory storage receives the radio-frequency information from external label or transponder.
Step S104, the memory block in the control store device shows that wherein, the original state of described memory block is a hidden state.
This step can also comprise: described memory block is decrypted, and wherein, described memory block is an encrypted state in original state; And the memory block after the control deciphering shows.
Before described memory block was decrypted, described method also comprised: high-level data encryption standard (Advanced Encryption Standard abbreviates AES as) is carried out in described memory block encrypt.
The AES encrypting/decrypting method is specific as follows:
AES is the password of an iteration, symmetric key grouping, can use 128,192 and 256 keys, and with 128 (16 byte) block encryption and data decryptions.Use key to different with public key cryptography, symmetric key cipher is used identical secret key encryption and data decryption.The figure place of the enciphered data of returning by block cipher is identical with the input data.AES encrypt/decrypt block diagram as shown in Figure 5 and Figure 6.In Fig. 5, can circulate for ciphering process (being converted into XOR with expanded keys) by the S box, for example, 128 key versions can carry out 10 encryption cycle among the AES, Fig. 6 is a data decryption, correspondingly, also need through 10 decryption rounds (by anti-line translation to anti-rank transformation) process for 128 key versions among the AES.
Aes algorithm is based on displacement and replacement.Displacement is rearranging of data, and replacement is to replace another with a cell data.Several different technology of having used AES realize displacement and replace.For example 128 place values that will encrypt, and the array of indexes of their correspondences:
00?11?22?33?44?55?66?77?88?99?aa?bb?cc?dd?ee?ff
O?1?2?3?4?5?6?7?8?9?10?11?12?13?14?15
The value of 192 keys is:
00?01?02?03?04?05?06?07?08?09?0a?0b?0c?0d?0e?0f?10?11?12?13?14?1516?17
0?1?2?3?4?5?6?7?8?9?10?11?12?13?14?15?16?17?18?19?20?21?22?23
When the constructed fuction of AES was called, two tables that are used for encryption method were initialised.The replacement box of first table is called the S-box.It is one 16 * 16 matrix.Preceding 5 row and preceding 5 row of S-box are as shown in table 1.
Table 1S-box
Figure BSA00000231944500061
Encryption routine is obtained this key array and is generated a w[by name] the key schedule table, as shown in table 2.
Table 2 key schedule table
Figure BSA00000231944500062
W[] initial Nk (6) row is used as seed, with primary key value (0 * 00~0 * 17).The residue row produces from seed key.The seed key length that it is unit that variable Nk represents 32 words.New key is called as round key (round keys).
It is in 4 * 4 byte matrixes of input array to a State by name (attitude) of copy 16 bytes that the AES encryption routine begins.As shown in table 3.The major cycle of aes algorithm is carried out 4 different being operating as: SubBytes (byte replacement), ShiftRows (line displacement conversion), MixColumns (row mixing transformation) and AddRoundKey to the State matrix.
SubBytes is one and replaces operation that it replaces to a new byte by the Sbox decision with each byte in the State matrix.
ShiftRows is a replacement operator, it with the byte in the State matrix to anticlockwise.As shown in table 4, the 0th row of State is by to 0 position of anticlockwise, and the 1st row of State is by to 1 position of anticlockwise, and the 2nd row of State is by to 2 positions of anticlockwise, and the 3rd row of State is by to 3 positions of anticlockwise.
MixColumns is one and replaces operation, and it carries out mathematical field with the value of State byte stream and adds the result who takes advantage of with the territory and replace each byte.
AddRoundKey (round key adds) carries out XORs (XOR) operation of a byte of a byte with preceding 4 row in the key schedule table to the State matrix, and with round key table w[e, r] State[r.c of XOR input].SubBytes, ShiftRows, MixColumns and 4 of AddRoundKev operate in one and carry out in Nr time the circulation and be called, and Nr is that the wheel number of given cipher key size subtracts 1.The wheel number or 10,12 that cryptographic algorithm is used, or 14, this depends on seed key length is 128,192 or 256.Here, because Nr equals 12, then these 4 operations are called 11 times.After this iteration was finished, before output parameter, cryptographic algorithm finished after calling SubBytes, ShiftRows and AddRoundKey at copy State matrix.
The core of AES cryptographic algorithm has 4 operations, and AddRoundKey uses the round key that generates from the seed key value to replace 4 groups of bytes.SubBytes replaces and replaces single byte with a substitution list.ShiftRows carries out the sequence displacement by 4 groups of bytes of rotating 4 byte row.MixColumns adds the combination of taking advantage of with the territory with the territory and replaces byte.
The realization of aes algorithm is simpler. and simultaneously because aes algorithm possesses very strong diffusion, the final password that forms has very high randomness, and anti-analytical attack ability is strong.In soft project, be more convenient for being made into general cryptographic object type or encryption standard assembly, under the condition that does not reduce security performance, the development difficulty of great reduced data encipheror.
The realization program of aes algorithm, to the aspects such as demand of processor performance, internal memory require low, can be applied in the smart machines such as smart card, satellite communication, Digital Television, streaming video, Encryption Keyboard, ATM, CDM widely, very high security performance can be provided, therefore, AES will possess wide application prospect in for a long time from now on.
Memory block in the control store device shows and comprises: described radio-frequency information is carried out authentication; And under the authentication case of successful, the memory block in the control store device shows.
Said method also comprises: receive the destruction instruction of user's input, wherein, described destruction instruction is used for indicating the data to described memory block to destroy; And the data in the described memory block are destroyed.
It is easy to use that one key pin is ruined function, and a toggle switch can be set in the present invention, and the user presses outside one time in second of toggle switch, and hard disk begins to start to be destroyed, and destruction speed can reach 2.5G/S~3G/S.
The specific implementation process is as follows: the user presses toggle switch, trigger controller and start destruction, controller is wiped at each data block of hard disk FLASH, wipe all data of back FLASH and all be changed to 1 or 0, according to the characteristic of FLASH storage medium, the data after wiping can not be resumed.
In hard disk, add RFID control, can effectively improve the intensity of hard disc data security performance.
Fig. 4 is the process flow diagram according to the encryption method of second embodiment of the invention.As shown in the figure, this method may further comprise the steps:
After label (transponder) enters magnetic field, receive the radiofrequency signal that plug-in reader (radio-frequency identification reader) sends, rely on the energy that induction current obtained to send out product information (the Passive Tag that is stored in the chip, passive label or passive label), perhaps initiatively send the signal (Active Tag, active label or active tag) of a certain frequency; After plug-in reader reads information and decoding, deliver to CIS and carry out the relevant data processing.
Rfid system among the present invention mainly partly is made up of reader (Reader) and just so-called transponder of electronic tag (TAG) (Transponder) and three of application software systems, its principle of work is that Reader launches the radio wave energy of a characteristic frequency to Transponder, in order to drive the Transponder circuit data of inside are sent, this moment, Reader just received unscrambling data in regular turn, gave application program and did corresponding processing.
Can be divided into haply with communication between rfid card sheet reader and the electronic tag and energy-sensitive mode, induction coupling (Inductive Coupling) and back scattering coupling (Backscatter Coupling) two kinds, the RFID of general low frequency mostly adopts first kind of formula, and higher-frequency adopts the second way mostly.
Reader is different with technology according to the structure of using can be to read or read/write device, is the information Control and the processing enter of rfid system.Reader is made up of coupling module, transceiver module, control module and interface unit usually.The general half-duplex operation mode that adopts is carried out message exchange between reader and the transponder, and reader provides energy and sequential by coupling to passive balise simultaneously.In actual applications, can be further by the management functions such as collection, processing and teletransmission of realizations such as Ethernet or WLAN to object identification information.Transponder is the information carrier of rfid system, and transponder is formed parasitic element by coupling original paper (coil, microstrip antenna etc.) and microchip mostly at present.
On standard, the RFID standard is mainly concerned with the following aspects: air interface specification, physical characteristics, read write line agreement, coding scheme, test specification, using standard, data management and information security etc.
Rfid system among the present invention can also be made up of label, read write line, application interface or middleware software computer network and terminal server etc., the RFID labels class is preserved the information of the electronic data of agreement form with the record goods like the bar code on the goods packing; The optophone of the similar identification label of read write line, the main two-way communication of being responsible for electronic tag also can be accepted the control command of main frame simultaneously; Application interface or middleware are finished the collection of RFID label data information; Transmission network is realized the transmission of data, can adopt multiple transmission mode for you according to the read write line terminal; Terminal server is then realized the orderly management of RFID marker.
The RFID label (Tag) also claim intelligent label, and it is the real data carrier of radio-frequency recognition system by the ultramicroscopic little label that IC chip and radio antenna are formed.Rfid interrogator carries out radio communication by antenna and RFID electronic tag, can realize reading or write operation tag recognition sign indicating number and internal storage data.Typical read write line includes high-frequency model (transmitter and receiver), control module and reading and writing device antenna.
Read write line is sent out the electromagnetic wave of one group of fixed frequency to label, a LC series resonant circuit is arranged in the tag card, its frequency is identical with the frequency of read write line emission, under electromagnetic excitation, the LC resonant circuit produces resonance, make electric charge has been arranged in the resonant capacitance, the other end at electric capacity, be connected to the electronic pump of a unidirectional conducting, electric charge in the electric capacity is delivered to the storage of module storage capacitors, when the electric charge arrival 2V that is accumulated was above, this electric capacity can be used as power supply and provides operating voltage to modular circuit, data transmission in the card is gone out or accepted the data of read write line.
Encryption device among the present invention and encryption method can be used for the encryption of hard disk.
Technical scheme provided by the invention is: mainly comprise based on the secret mobile solid state hard disc of the height of RFID technology: USB2.0 interface, USB-SATA bridgt circuit module, AES data encryption module, RFID induction module, five parts of solid-state storage module.
In the present invention, memory storage comprises first storage area and second storage area, and wherein, the described first storage area original state is a show state, and the original state of described second storage area is described hidden state.
Data at first enter USB-SATA bridged cryptographic module after the USB2.0 interface enters hard disk, signal enters the solid-state storage module by the SATA interface behind the bridge joint.Under the cooperation of RFID control module, the space of whole solid-state storage is divided into two parts: 1, public domain (that is above-mentioned first storage area); 2, encrypt zone (that is, above-mentioned second storage area), encrypt wherein that institute's deposit data adopts the AES128 cryptographic algorithm to encrypt in the zone.Through the data encrypted space is sightless at ordinary times, has only when the user uses the RFID label will encrypt the temporary transient deciphering in zone, as seen the data area just can be.Because ciphering process adopts AES data encryption algorithm and RFID hardware identification to encrypt the mode that combines, the security of sensitive data has obtained ensureing effectively in user's hard disk.
In the sensitive data security, the designed secret mobile solid state hard disc of height of the present invention can provide data to destroy operation fast, to guarantee that the user fast, thoroughly destroys data in the hard disk under extreme case in guaranteeing the user encryption zone.Among the design, the key intelligence that can adopt source section to be developed is destroyed quick destruction technology and is realized this function.For example, trigger the destruction signal to the hard disk master controller by outer button, master controller carries out erase operation to the Flash storage medium, because Flash wipes by piece and is undertaken, erasing speed is very fast, so can reach the purpose that rapid data is destroyed, and because there is not " remanent magnetism " effect of magnetic medium in the Flash storage medium, thereby guarantee to carry out the irrecoverable property of the electronic data after data are destroyed fast.The present invention uses the RFID radio frequency technology of setting to guarantee that the AES cryptographic algorithm is not cracked, the feasible encrypted area that only under the situation of using correct RFID contactless card, just can recognize hard disk, under the situation that does not set encrypted area, can not crack encrypted area (AES cryptographic algorithm).
The present invention carries out combination in conjunction with RFID radio-frequency technique and AES data encryption from hardware and software, and the encryption of software utilizes hardware protection, makes data encryption crack at all and has no way of doing it, the object that does not crack; Add toggle switch one key pin and ruin function, the user can be made things convenient at any time reliably for good and all delete hard disc data rapidly.
As can be seen from the above description, the present invention has greatly improved the security of data storage, and then has improved the protection to hard disk secure.
Need to prove, can in computer system, carry out in the step shown in the process flow diagram of accompanying drawing such as a set of computer-executable instructions, and, though there is shown logical order in flow process, but in some cases, can carry out step shown or that describe with the order that is different from herein.
Obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with the general calculation device, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation element forms, alternatively, they can be realized with the executable program code of calculation element, thereby, they can be stored in the memory storage and carry out by calculation element, perhaps they are made into each integrated circuit modules respectively, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. an encryption method is characterized in that, comprising:
Received RF information; And
Memory block in the control store device shows that wherein, the original state of described memory block is a hidden state.
2. encryption method according to claim 1 is characterized in that, the memory block in the control store device shows and comprises:
Described memory block is decrypted, and wherein, described memory block is an encrypted state in original state; And
Memory block after the control deciphering shows.
3. encryption method according to claim 2 is characterized in that, before described memory block was decrypted, described method also comprised:
The high-level data Encryption Standard AES is carried out in described memory block encrypts.
4. encryption method according to claim 1, it is characterized in that described memory storage comprises first storage area and second storage area, wherein, the described first storage area original state is a show state, and the original state of described second storage area is described hidden state.
5. encryption method according to claim 1 is characterized in that, the memory block in the control store device shows and comprises:
Described radio-frequency information is carried out authentication; And
Under the authentication case of successful, the memory block in the control store device shows.
6. according to each described encryption method in the claim 1 to 5, it is characterized in that described method also comprises:
Receive the destruction instruction of user's input, wherein, described destruction instruction is used for indicating the data to described memory block to destroy; And
Data in the described memory block are destroyed.
7. an encryption device is characterized in that, comprising:
First receiver module is used for received RF information; And
Control module, the memory block that is used for the control store device show that wherein, the original state of described memory block is a hidden state.
8. encryption device according to claim 7 is characterized in that, also comprises:
Second receiver module is used to receive the destruction instruction of user's input, and wherein, described destruction instruction is used for indicating the data to described memory block to destroy; And
Destroy module, be used for the data of described memory block are destroyed.
9. encryption device according to claim 7 is characterized in that, also comprises:
Deciphering module is used for described memory block is decrypted.
10. a hard disk is characterized in that, has each described encryption device in the claim 7 to 9.
CN2010102551138A 2010-08-17 2010-08-17 Encrypting method, device and hard disk Pending CN101908024A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2010102551138A CN101908024A (en) 2010-08-17 2010-08-17 Encrypting method, device and hard disk
PCT/CN2011/077170 WO2012022207A1 (en) 2010-08-17 2011-07-14 Method and device for encryption and hard disk

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102551138A CN101908024A (en) 2010-08-17 2010-08-17 Encrypting method, device and hard disk

Publications (1)

Publication Number Publication Date
CN101908024A true CN101908024A (en) 2010-12-08

Family

ID=43263488

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102551138A Pending CN101908024A (en) 2010-08-17 2010-08-17 Encrypting method, device and hard disk

Country Status (2)

Country Link
CN (1) CN101908024A (en)
WO (1) WO2012022207A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012022207A1 (en) * 2010-08-17 2012-02-23 湖南源科高新技术有限公司 Method and device for encryption and hard disk
CN103200169A (en) * 2013-01-30 2013-07-10 中国科学院自动化研究所 Method and system of user data protection based on proxy
CN108964870A (en) * 2018-07-05 2018-12-07 西南交通大学 The safe Enhancement Method of railway transponder message based on motor synchronizing chaos cipher
CN110851825A (en) * 2019-11-20 2020-02-28 江苏恒宝智能***技术有限公司 eSIM card and working method thereof
CN112528311A (en) * 2020-12-23 2021-03-19 杭州海康汽车软件有限公司 Data management method and device and terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1239248A (en) * 1998-06-16 1999-12-22 Ncr国际公司 Data security arrangement
CN1696960A (en) * 2004-05-13 2005-11-16 瀚群科技股份有限公司 Method for protecting portable cryptographic storage device of containing biological identification and stored data
CN201229570Y (en) * 2008-07-18 2009-04-29 北京中科联众科技有限公司 Mobile hard disc data protection apparatus
CN101478595A (en) * 2008-09-08 2009-07-08 广东南方信息安全产业基地有限公司 Mobile communication terminal data protection method
CN101692264A (en) * 2009-09-25 2010-04-07 天津大学 Method of encrypting and protecting files by using hidden partition (HPA), CPU ID and soft keyboard
CN201698408U (en) * 2010-06-23 2011-01-05 沈刚 Storing mechanism capable of hiding or displaying part of storage space through RF induction manner

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1235227C (en) * 2001-07-31 2006-01-04 台均实业有限公司 Portable readable and writable memory with USB interface and its data management method
CN101908024A (en) * 2010-08-17 2010-12-08 湖南源科高新技术有限公司 Encrypting method, device and hard disk

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1239248A (en) * 1998-06-16 1999-12-22 Ncr国际公司 Data security arrangement
CN1696960A (en) * 2004-05-13 2005-11-16 瀚群科技股份有限公司 Method for protecting portable cryptographic storage device of containing biological identification and stored data
CN201229570Y (en) * 2008-07-18 2009-04-29 北京中科联众科技有限公司 Mobile hard disc data protection apparatus
CN101478595A (en) * 2008-09-08 2009-07-08 广东南方信息安全产业基地有限公司 Mobile communication terminal data protection method
CN101692264A (en) * 2009-09-25 2010-04-07 天津大学 Method of encrypting and protecting files by using hidden partition (HPA), CPU ID and soft keyboard
CN201698408U (en) * 2010-06-23 2011-01-05 沈刚 Storing mechanism capable of hiding or displaying part of storage space through RF induction manner

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012022207A1 (en) * 2010-08-17 2012-02-23 湖南源科高新技术有限公司 Method and device for encryption and hard disk
CN103200169A (en) * 2013-01-30 2013-07-10 中国科学院自动化研究所 Method and system of user data protection based on proxy
CN108964870A (en) * 2018-07-05 2018-12-07 西南交通大学 The safe Enhancement Method of railway transponder message based on motor synchronizing chaos cipher
CN108964870B (en) * 2018-07-05 2020-04-28 西南交通大学 Railway transponder message security enhancement method based on self-synchronizing chaotic cipher
CN110851825A (en) * 2019-11-20 2020-02-28 江苏恒宝智能***技术有限公司 eSIM card and working method thereof
CN110851825B (en) * 2019-11-20 2022-04-15 恒宝股份有限公司 eSIM card and working method thereof
CN112528311A (en) * 2020-12-23 2021-03-19 杭州海康汽车软件有限公司 Data management method and device and terminal
CN112528311B (en) * 2020-12-23 2024-02-20 杭州海康汽车软件有限公司 Data management method, device and terminal

Also Published As

Publication number Publication date
WO2012022207A1 (en) 2012-02-23

Similar Documents

Publication Publication Date Title
US10104542B2 (en) Systems and methods for preventing transmitted cryptographic parameters from compromising privacy
US8681987B2 (en) RFID authentication architecture and methods for RFID authentication
CN101847199B (en) Security authentication method for radio frequency recognition system
Toiruul et al. An advanced mutual-authentication algorithm using AES for RFID systems
Choi et al. Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems
CN103279775B (en) Ensure that secret and the rfid system of data integrity and its implementation
Chen et al. RFID authentication protocol for anti-counterfeiting and privacy protection
KR20110015022A (en) System of providing a fixed identification of a transponder while keeping privacy and avoiding tracking
CN101882197A (en) RFID (Radio Frequency Identification Device) inquiring-response safety certificate method based on grading key
CN101908024A (en) Encrypting method, device and hard disk
CN104700125A (en) AES encryption and verification of ultra high frequency radio identification system
Chang A feasible security mechanism for low cost RFID tags
Israsena Design and implementation of low power hardware encryption for low cost secure RFID using TEA
Peris-Lopez et al. Lightweight cryptography for low-cost RFID tags
CN1286050C (en) Encipher / decipher method for identity information and recognition system
CN103324970A (en) Efficient and safe RFID (radio frequency identification device) receiving and transmitting method and system
Seshabhattar et al. Security implementation within GEN2 protocol
KR101053636B1 (en) Encryption/decryption method and system for rfid tag and reader using multi algorithm
Israsena et al. Hardware implementation of a TEA-based lightweight encryption for RFID security
ElMahgoub Pre-encrypted user data for secure passive UHF RFID communication
Zhang et al. Low cost minimal mutual authentication protocol for RFID
Chien New Gen2v2-based mutual authentication schemes
Yongzhen et al. Design and implementation of a security-enhanced baseband system for UHF RFID tag
Kapoor Secure ownership transfer and authentication protocols for radio frequency identification (RFID)
CN118153605A (en) LFSR-based passive RFID authentication and dynamic encryption method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB03 Change of inventor or designer information

Inventor after: Yu Hongqi

Inventor after: Xu Xin

Inventor after: Wu Jia

Inventor before: Yu Hongqi

Inventor before: Wu Jia

Inventor before: Li Qingjiang

Inventor before: Zheng Guo

Inventor before: Yu Die

Inventor before: Jiang Shuibing

COR Change of bibliographic data

Free format text: CORRECT: INVENTOR; FROM: YU HONGQI WU JIA LI QINGJIANG ZHENG GUO YU YI JIANG SHUIBING TO: YU HONGQI XU XIN WU JIA

REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1151868

Country of ref document: HK

C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20101208

REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1151868

Country of ref document: HK