Method, system and device for enhancing security of storage media and medium

A technology for storage media and security, applied in the field of data security, can solve problems such as data leakage, achieve the effect of enhancing security, solving security problems, and avoiding potential safety hazards

Active Publication Date: 2021-07-13
湖北央中巨石信息技术有限公司
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented technology allows for securely storing important data within encrypted blocks made up from digital signatures without being able to be easily compromised through brute force attacks against them. Additionally, there are several ways to verify if these encryption systems work correctly during collaboration between users who want access only their own content (their user's device). Overall, this innovation improves the efficiency and reliability of distributed computing platforms such as cloud servers.

Problems solved by technology

This patented technical problem addressed by the present technology relates to ensuring secure access to storage devices while also being able to handle multiple types of encryption algorithms (TMPs) with varying degrees of rules flexibilities without compromising their effectiveness due to attacks caused by external sources like physical damage during transportation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device for enhancing security of storage media and medium
  • Method, system and device for enhancing security of storage media and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0106] Please refer to figure 2 , figure 2 It is a schematic composition diagram of a system for enhancing the security of storage media. Embodiment 2 of the present invention provides a system for enhancing the security of storage media. The system includes:

[0107] The first smart contract module is used to obtain the secure private key string, sign the secure private key string according to the multi-signature smart contract to obtain a key set, and send the key set to the storage medium;

[0108] The second smart contract module is used to obtain the decrypted private key string, sign the decrypted private key string according to the multi-signature smart contract to get decryption, and send the decryption to the storage medium;

[0109] The first threshold encryption module is used to encrypt the key set received by the storage medium and the information of the host computer corresponding to the storage medium based on the multiple threshold encryption method to obtain e

Embodiment 3

[0119] Embodiment 3 of the present invention provides an electronic device, including a memory, a processor, and a computer program stored in the memory and operable on the processor. When the processor executes the computer program, the Steps of a method of enhancing storage media security.

[0120] Wherein, the processor may be a central processing unit, or other general-purpose processors, digital signal processors, application-specific integrated circuits, off-the-shelf programmable gate arrays or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components etc. A general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like.

[0121] The memory can be used to store the computer program and / or module, and the processor implements various functions of the device for enhancing the security of the storage medium in the invention by running or executing the data stored in the memo

Embodiment 4

[0123] Embodiment 4 of the present invention provides a computer-readable storage medium, the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the steps of the method for enhancing the security of the storage medium are implemented .

[0124] The computer storage medium in the embodiments of the present invention may use any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, but is not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples (non-exhaustive list) of computer-readable storage media include: electrical connections with one or more conductors, portable computer disks, hard disks, random access memory (RAM), read-only memory (ReadOnlyMe

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, system and device for enhancing security of storage media and a medium, and relates to the field of data security; the method includes determining the number A of participating users, and wherein each participating user generates a corresponding key; deploying a multi-signature smart contract, obtaining a secure private key string corresponding to the private key of each participating user under the multi-signature smart contract, and signing each secure private key string to obtain a key set; sending the key set to a storage medium, and encrypting according to a multi-threshold encryption method to obtain encrypted data; according to the multi-signature smart contract, obtaining a decryption private key string corresponding to a private key of a decryption user, and signing each decryption private key string according to the multi-signature smart contract to obtain solution densification; sending the solution density to a storage medium to obtain decrypted data; and comparing the decrypted data with the encrypted data to judge whether decryption succeeds or not. According to the invention, the problem that the keys are difficult to manage due to too many keys in a large-scale network environment can be effectively solved.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner 湖北央中巨石信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products