Hardware encryption method, system and device based on distributed storage

A distributed storage and hardware encryption technology, applied in the field of data security, can solve the problems of data leakage, high security risks, and endless emergence, and achieve the effect of ensuring versatility, reliability, and speed.

Pending Publication Date: 2021-10-29
苏州海加网络科技股份有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid construction and development of various information systems and data centers, more and more sensitive business data are generated. The distributed storage system solves the problem of storage concentration, capacity, throughput, etc., but storage is becoming more and more centralized, Value is becoming more and more important, there are more and more internal and external security threats, security risks are getting higher and higher, resulting in endless data leakage incidents, and data storage security issues are becoming more and more prominent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware encryption method, system and device based on distributed storage
  • Hardware encryption method, system and device based on distributed storage
  • Hardware encryption method, system and device based on distributed storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Below in conjunction with specific embodiment, further illustrate the present invention, should be understood that these embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention, after having read the present invention, those skilled in the art will understand various equivalent forms of the present invention All modifications fall within the scope defined by the appended claims of the present application.

[0033] Such as Figure 1-3 As shown, the hardware encryption method and system based on distributed storage proposed in the embodiment involves a client, a management node, and a storage cluster (including a primary storage node and a secondary storage node).

[0034] The client accesses the distributed storage hardware through the interface.

[0035] The management node is responsible for monitoring the distributed cluster, maintaining the health status of the cluster, and maintaining various ma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hardware encryption method, system and device based on distributed storage, and belongs to the field of data security. The method comprises the following steps of: obtaining a key through an encryption card API, slicing user data, encrypting, performing hardware encryption on the data according to a user identity, and storing a ciphertext on a disk. According to the technical scheme, data leakage caused by the fact that the hard disk is stolen can be avoided due to the fact that the ciphertext data exist on the disk, meanwhile, logic isolation and encryption isolation of user data are provided by adopting different strategies of different user passwords, and establishment of a safer encryption mechanism is facilitated.

Description

technical field [0001] The invention relates to a hardware encryption method, system and device based on distributed storage, and belongs to the technical field of data security. Background technique [0002] With the rapid construction and development of various information systems and data centers, more and more sensitive business data are generated. The distributed storage system solves the problem of storage concentration, capacity, throughput, etc., but storage is becoming more and more centralized, Value is becoming more and more important, there are more and more internal and external security threats, and security risks are getting higher and higher, resulting in endless data leakage incidents, and data storage security issues are becoming more and more prominent. [0003] The security of the storage system includes confidentiality and integrity. The root cause of the threat to the security of stored data is that the data in the storage medium is stored in plain text...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F3/06G06F21/60G06F21/80
CPCG06F3/0622G06F3/067G06F3/0689G06F21/602G06F21/80
Inventor 郑朝晖阳海华
Owner 苏州海加网络科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products