Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

System and method for trusted storage of data

A storage system and trusted technology, applied in the field of information security in information technology, can solve problems such as low key strength, reduced practicability, key leakage, etc., and achieve the effect of reduced risk, high strength, and fine-grained control

Inactive Publication Date: 2014-07-16
娄绍钢 +1
View PDF3 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Often the practicability of complex key management will be reduced, and simple key management can be easily broken
Therefore, key management tends to be a weak point of such schemes
Key configuration and human errors can easily cause problems such as low key strength and key leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for trusted storage of data
  • System and method for trusted storage of data
  • System and method for trusted storage of data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0045] refer to figure 1 In this embodiment, a system for trusted data storage includes four logical entities, which are respectively a trusted management center, an application server, a storage virtualization security gateway, and a back-end storage system. The trusted management center acts as a configuration and management entity for trusted policies. The application server is the entity that initiates the data access request, and a trusted storage client agent function component is implemented in the application server. The storage virtualization security gateway is used to receive data requests from the application layer, and use virtualization technology to realize the mapping of virtual ports, the translation of virtual storage devices to physical storage devices, address translation, and the encapsulation of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system and method for trusted storage of data. The system mainly comprises four logical entities, namely, a trusted management center, an application server, a storage virtualization security gateway and a rear-end storage system. The trusted management center serves as a configuration and management entity for a trusted strategy. The application server serves as an entity sending a data access request. The storage virtualization security gateway serves as an entity receiving the data request of an application layer and achieving mapping of a virtual port, converting of a virtual storage device address and a physical storage device address and encapsulating of an IO request through the virtualization technology. The rear-end storage system provides a physical medium for data storage and operation. On the basis of the storage virtualization technology, a data access control flow in the trusted technology is provided for the storage virtualization security gateway or an agent layer so that strict security check and control can be carried out on an access request for a storage system, and illegal access or vicious data access operation can be prevented.

Description

technical field [0001] The invention relates to the field of information security in information technology, in particular to a system and implementation method for trusted storage of data. Background technique [0002] The emergence of cloud computing application mode and the application of storage virtualization technology bring new risks to the data security access of the back-end storage system. First, relatively closed storage systems are more likely to be exposed to external network attack environments, while traditional network-based security methods are easily bypassed or breached. Secondly, after the storage servers, application servers, and network devices connected to the storage system are compromised, they can easily be used as a springboard for attacks, threatening to destroy the back-end storage system. [0003] Usually, when the data access subject initiates an access request, the traditional access control method only judges according to whether the access ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/62H04L29/06H04L29/08
CPCG06F3/0622G06F3/0668G06F21/62H04L63/20
Inventor 陈幼雷郭伟董唯元
Owner 娄绍钢
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products