WO2013131362A1 - 一种安全隐藏存储器的装置及方法 - Google Patents
一种安全隐藏存储器的装置及方法 Download PDFInfo
- Publication number
- WO2013131362A1 WO2013131362A1 PCT/CN2012/081763 CN2012081763W WO2013131362A1 WO 2013131362 A1 WO2013131362 A1 WO 2013131362A1 CN 2012081763 W CN2012081763 W CN 2012081763W WO 2013131362 A1 WO2013131362 A1 WO 2013131362A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- identity authentication
- memory
- authentication
- pin code
- storage area
- Prior art date
Links
- 230000015654 memory Effects 0.000 title claims abstract description 84
- 238000000034 method Methods 0.000 title claims abstract description 24
- 230000006870 function Effects 0.000 description 4
- 238000005192 partition Methods 0.000 description 3
- 150000003839 salts Chemical class 0.000 description 3
- 238000006243 chemical reaction Methods 0.000 description 2
- 230000010365 information processing Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000009938 salting Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/1425—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
Definitions
- the invention belongs to the field of information security.
- the present invention relates to an apparatus and method for securely hiding a memory.
- it relates to an apparatus and method that can securely hide the number of storage areas on a storage device.
- the secure area 122 when used for storage, the information stored in the secure area 122 can also be encrypted and decrypted when read out; this method is called medium encryption.
- the essence of this scheme is that the use of the open secure area 122 or transparent use (write encryption, read decryption) is performed after the memory controller 11 verifies that the PIN code is correct by the identity authentication device 111.
- the computer 2 is also referred to as the upper computer of the memory 1.
- Patent application ZL201110051151.6 (a method of partition hiding and reading).
- Patent application ZL201110108695.KUSB embedded trustworthy private information processing device and system discloses a portable and reliable private information processing system.
- Patent application ZL200610036302.X memory card data hiding management method and its program.
- Patent application ZL201010144381.2 Storage device management method and system.
- this method cannot hide this important information that the memory has a safe area or a hidden area. That is to say, the user who illegally obtains the memory can confirm whether the memory has a hidden area or a secure area.
- a further requirement is that an information hiding memory is required, which has a secure hidden area; at the software level, there is no reliable means to detect whether the memory has the hidden function. This is a new information security issue and a technical issue that needs to be addressed.
- the memory must have more than two areas.
- the Patriot L8250 security U disk is implemented in exactly the same way as Figure 1; it has a security zone and a public zone.
- How to split two areas on one memory (one disk), especially two areas that are safely isolated, refer to the related patents and patent applications of the present inventor: (ZL02113032.9) - a device for realizing hard disk safety isolation and Method, (ZL00132989.8) Patent and patent applications for hard disk access and indexing devices and hard disk index access methods.
- a large file is used to represent a hidden area; or a file system is used to leave a hidden area in the file system area; in short, we can understand that there are still more than two areas. .
- the host computer When the host computer uses these memories, it usually sends commands and then the memory responds; these commands are generally specified by the protocol of the interface, and some special commands designed by the memory designer are called private commands;
- the data in the read/write memory is the command sent by the host computer to read and write the address, and then the memory CPU dominates the reading and writing of the data of the storage medium, and transmits the data to (read) the upper computer through the interface, or receives the data of the upper computer. Write to the storage medium. That is, the host computer is MASTER (HOST), and the memory is SLAVE (DEVICE).
- the external interface of the memory it can be divided into a U disk, an SD card, a SATA hard disk, an ATA hard disk, a TF card, an MMC card, and the like.
- DDR RAM memory memory
- the basic function is also to read data through the address; however, there is basically no CPU-like independent computing capability chip inside it, and generally there is no programming chip for computing power in DDR RAM. Possible and necessary.
- the memory in the patent specification of the present invention specifically refers to a CPU that operates independently, a corresponding software and a storage medium running on the CPU; the CPU is simply referred to as a disk control or a disk control chip, and we It is called a memory controller; the corresponding software is generally called disk control software or disk control firmware, or directly referred to as firmware.
- the meaning of curing is not unmodified, but generally does not require modification.
- An apparatus for securely concealing a memory comprising: a memory controller, at least two storage areas, and at least two identity authentication devices (respectively corresponding to the storage areas respectively); the memory controller respectively uses the identity authentication device to Identity authentication device corresponding to the storage area performs identity authentication, and uses a corresponding storage area according to the authentication result of the identity authentication device;
- the identity authentication device may be a PIN code authentication device, that is, the PIN code received by the memory controller through the external interface of the memory and the PIN code stored by the PIN code authentication device are authenticated one by one according to whether the consistency is the same (or the change is consistent, plus After the salt is consistent) decide whether to use the corresponding area. It is also possible to check whether the operating data of the storage area of the upper computer and the PIN code stored by the PIN code authentication device are authenticated one by one by the memory controller, and determine whether to use the corresponding area according to whether it is consistent (or consistent after the conversion, consistent with salt).
- a method of secure hidden storage comprising:
- the memory implementing the method has at least two storage areas and corresponding identity authentication devices; the steps of the implementation are:
- Figure 2 shows a schematic diagram of a preferred embodiment 1 and embodiment 3, wherein the common area 123 is not necessary, and the area does not have any functions such as hiding, reading and writing restrictions, and media encryption;
- Fig. 3 is a view showing a preferred embodiment 2.
- the user inputs the PIN code according to the prompt of the computer 2, and the computer 2 transmits the input PIN code to the memory controller 11 through the memory to the external interface 110 for identity authentication; the identity authentication device 111 and 112 respectively store corresponding PIN codes or salted PIN codes; the memory controller 11 sends the PIN codes requiring authentication to the identity authentication devices 111 and 112 respectively, and the device compares the stored PIN codes with the received PIN codes.
- the PIN code the agreement indicates that the authentication is passed, and the result is returned to the memory controller 11; if the PIN code input on the computer 2 is authenticated by the identity authentication device 111, the memory controller 11 opens the use of the storage area 121 to the computer 2 ( Read/write); If the entered PIN code is authenticated by the identity authentication device 112, the memory controller 11 opens the use (read and write) of the storage area 122 to the computer 2. Obviously, it is generally impossible to input the PIN code through the authentication of the identity authentication devices 111 and 112 at the same time, and in some cases, if both are authenticated; this requires the memory controller to simultaneously open the use of the storage area 121 and the storage area 122.
- This scenario shows the case where there are only two hidden storage areas, and it is obvious that the authentication scheme is applicable to more than two hidden storage areas. For example, 5 hidden storage areas, so there are corresponding 5 PIN codes. This allows multiple storage areas to be hidden, and there is no way for an attacker to confirm the actual number of hidden areas (storage areas). Regarding the situation of multiple storage areas, it will not be described.
- this hidden method is the multiple identity separate hidden authentication. Choosing a storage area based on the results of the certification is a matter of course. Of course, a more advanced identity authentication protocol such as zero-knowledge authentication can be used to implement multiple identity separate authentication.
- a method of using a hidden area is shown in FIG.
- the memory controller 11 receives the external authentication data through the memory external interface 110; then, the memory controller 11 supplies the received authentication data to each of the identity authentication devices, such as the identity authentication device 111 and the identity authentication. The device 112; finally, the memory controller 11 opens the storage area corresponding to the authentication by the identity authentication device based on the authentication result returned by the identity authentication devices 111 and 112.
- a device for using a secure hidden area is shown in the associated secure hidden memory 1 of Figure 2.
- the storage area 121 corresponds to the identity authentication device 111; the storage area 122 corresponds to the identity authentication device 112.
- the identity authentication devices 111 and 112 are both PIN code authentication devices, that is, the identity authentication devices 111 and 112 store PIN codes or PIN codes after salting.
- the memory controller 11 checks the write data to the common area 123, it is found that there is data conforming to the identity authentication request of the identity authentication device 111 matching the storage area 121, the memory controller 11 opens the use of the storage area 121; when the memory is controlled When checking the write data to the common area 123, the device 11 finds that there is data conforming to the identity authentication request of the identity authentication device 112 matching the storage area 122, and the memory controller 11 opens the use of the storage area 122.
- the apparatus and method of the present invention are described above with two storage areas and two PIN code concealed authentications.
- the present invention is not completely limited to use only two storage areas, and is not limited to only using PIN code identity authentication, nor is it limited to a U disk, and obviously can also be applied to a TF card, an SD card, a memory in a mobile phone, a hard disk, and Memory in the computer. While the invention has been described in the foregoing embodiments, it is understood that Various modifications, improvements, changes and substitutions are possible in the spirit and scope of the invention.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201280071277.2A CN104169893A (zh) | 2012-03-09 | 2012-09-21 | 一种安全隐藏存储器的装置及方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210060647.4 | 2012-03-09 | ||
CN 201210060647 CN103309821A (zh) | 2012-03-09 | 2012-03-09 | 一种安全隐藏存储器的装置及方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013131362A1 true WO2013131362A1 (zh) | 2013-09-12 |
Family
ID=49115916
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2012/081763 WO2013131362A1 (zh) | 2012-03-09 | 2012-09-21 | 一种安全隐藏存储器的装置及方法 |
Country Status (2)
Country | Link |
---|---|
CN (2) | CN103309821A (zh) |
WO (1) | WO2013131362A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113535603B (zh) * | 2021-06-22 | 2023-06-13 | 杭州华澜微电子股份有限公司 | 一种数据隐藏分区的实现方法 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1170160A (zh) * | 1996-07-09 | 1998-01-14 | 李志淮 | Dos文件系统安全存取控制方法及设备 |
JP2006139489A (ja) * | 2004-11-11 | 2006-06-01 | Nippon Telegr & Teleph Corp <Ntt> | 共同利用パソコンシステムの環境復元方法および共同利用パソコン |
CN201150069Y (zh) * | 2007-09-20 | 2008-11-12 | 北京飞天诚信科技有限公司 | 一种支持多身份认证的信息安全设备 |
CN101382919A (zh) * | 2007-09-05 | 2009-03-11 | 北京明朝万达科技有限公司 | 一种基于身份的存储数据隔离方法 |
CN101788959A (zh) * | 2010-02-03 | 2010-07-28 | 武汉固捷联讯科技有限公司 | 一种固态硬盘安全加密系统 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100476762C (zh) * | 2005-12-31 | 2009-04-08 | 联想(北京)有限公司 | 一种安全存储装置和数据管理方法 |
-
2012
- 2012-03-09 CN CN 201210060647 patent/CN103309821A/zh active Pending
- 2012-09-21 CN CN201280071277.2A patent/CN104169893A/zh active Pending
- 2012-09-21 WO PCT/CN2012/081763 patent/WO2013131362A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1170160A (zh) * | 1996-07-09 | 1998-01-14 | 李志淮 | Dos文件系统安全存取控制方法及设备 |
JP2006139489A (ja) * | 2004-11-11 | 2006-06-01 | Nippon Telegr & Teleph Corp <Ntt> | 共同利用パソコンシステムの環境復元方法および共同利用パソコン |
CN101382919A (zh) * | 2007-09-05 | 2009-03-11 | 北京明朝万达科技有限公司 | 一种基于身份的存储数据隔离方法 |
CN201150069Y (zh) * | 2007-09-20 | 2008-11-12 | 北京飞天诚信科技有限公司 | 一种支持多身份认证的信息安全设备 |
CN101788959A (zh) * | 2010-02-03 | 2010-07-28 | 武汉固捷联讯科技有限公司 | 一种固态硬盘安全加密系统 |
Also Published As
Publication number | Publication date |
---|---|
CN103309821A (zh) | 2013-09-18 |
CN104169893A (zh) | 2014-11-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112083879B (zh) | 一种固态硬盘存储空间物理分区隔离与隐藏方法 | |
US8898477B2 (en) | System and method for secure firmware update of a secure token having a flash memory controller and a smart card | |
TWI345705B (en) | A secure storage system and method of use | |
CN101324912B (zh) | 一种可信安全计算机 | |
US7861015B2 (en) | USB apparatus and control method therein | |
KR20080101799A (ko) | 외부 장치에 보안을 제공하기 위한 시스템과 방법 | |
EP3355231B1 (en) | Mobile data storage device with access control functionality | |
US20100023650A1 (en) | System and method for using a smart card in conjunction with a flash memory controller to detect logon authentication | |
US20070300080A1 (en) | Two-Factor Content Protection | |
CN105354479A (zh) | 一种基于u盘鉴权的固态硬盘及数据隐藏方法 | |
TW201216061A (en) | Method and system for securing access to a storage device | |
CN112084472B (zh) | 一种多用户安全存储的实时动态认证方法 | |
CN108345785A (zh) | 内建智能安全行动装置 | |
TW201530344A (zh) | 應用程式存取保護方法及應用程式存取保護裝置 | |
US20090187770A1 (en) | Data Security Including Real-Time Key Generation | |
CN102346716B (zh) | 硬盘存储设备的加密方法和解密方法及其加解密系统 | |
CN101320355A (zh) | 存储装置、存储卡存取装置及其读写方法 | |
CN101673248A (zh) | 存储系统、控制器与数据保护方法 | |
CN110807186B (zh) | 一种存储设备安全存储的方法、装置、设备和存储介质 | |
CN109190364A (zh) | 一种用于固态硬盘鉴权的安全u盘 | |
CN103678973A (zh) | 一种同时实现主机和虚拟机访问控制的系统及其工作方法 | |
CN101169811A (zh) | 非接触式数字安全系统 | |
WO2013131362A1 (zh) | 一种安全隐藏存储器的装置及方法 | |
EP1870828A1 (en) | Two-Factor Content Protection | |
KR20020086444A (ko) | 저장 및 연산 기능을 가지는 복합형 유에스비 드라이브 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12870729 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 12870729 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 12/03/2015) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 12870729 Country of ref document: EP Kind code of ref document: A1 |