Method of data access preventing decryption

A data access and data reading technology, applied in the direction of preventing unauthorized use of memory, information storage, static storage, etc., can solve the problem of not being able to guarantee the confidentiality of data in storage devices

Active Publication Date: 2008-12-17
PHISON ELECTRONICS
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the known technology cannot guarantee the confidentiality of the data in the storage device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of data access preventing decryption
  • Method of data access preventing decryption
  • Method of data access preventing decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The invention discloses a data storage device and a data access method thereof. Those skilled in the art will have a better understanding of the above objects and advantages of the present invention after reading the following embodiments and accompanying drawings. The present invention is not limited by the following examples.

[0034] Please refer to FIG. 4 , illustrating a security mechanism of a data storage device according to the present invention. As shown in Figure 4, the data storage device 1 includes: an interface 20 connected to a data read / write device (not shown), which is used for buffering and transmitting data; a non-volatile memory 21; A flash memory 22 for storing data; an encryption unit 23; and a decryption unit 24, and the above elements will be described in detail below.

[0035]The encryption key and the decryption key are stored in the non-volatile memory 21 at the same time. Each key is a field of bits used to encrypt and decrypt data using t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data access method of a data storage device applied to a data read / write device and provided with at least one NAND flash memory. The method comprises the following steps: default passwords are established; a first encryption key is generated; data encryption is performed through the first encryption key; a prompt for password input is provided after an access request is received; headers stored in the NAND flash memory are decoded through the passwords input by a user; the headers are detected to determine whether the passwords input by the user are correctly corresponding to the first encryption key or not; and after the passwords input by the user are correctly corresponding to the first encryption key, decryption and data output are performed through the encryption key.

Description

【Technical field】 [0001] The invention relates to a data access method, in particular to a safe data access method applied to a data storage device. 【Background technique】 [0002] Revolutionary changes in communication tools have brought about the rapid growth of the Internet and the accelerated digitization of information, posing unprecedented threats to personal security and privacy. An ever-increasing amount of sensitive information is circulating electronically, including e-mails, fax messages, phone conversations, fund transfers, trade secrets, and other personal records. The same technological advances have brought enormous benefits to humanity, but have also exposed people to more difficult and potentially dangerous prying eyes. Several new applications have emerged for computer storage devices, many of which are in response to the need to enhance the overall security of data stored in computer storage devices. [0003] figure 1 3 is a schematic diagram of a secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06K19/073G11C16/22
Inventor 马中迅王智麟伍汉维王淑华
Owner PHISON ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products