会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明申请
    • Traffic analysis resistant storage encryption using implicit and explicit data
    • 使用隐式和显式数据的流量分析抵抗存储加密
    • US20100031057A1
    • 2010-02-04
    • US12012262
    • 2008-02-01
    • Donald Rozinak BeaverLaszlo Hars
    • Donald Rozinak BeaverLaszlo Hars
    • G06F12/14H04K1/00
    • H04L9/0631H04L9/0894
    • An encryption scheme for mass storage devices employing a tweakable encryption scheme to add variability to the encrypted data to resist attacks by traffic analysis. Explicit tweak and implicit tweak may be used to add variability to plaintext prior to encryption and eventual storage. The tweak information is either stored on the storage device along with the encrypted data as in the case of an explicit tweak, or it is derived from another source when needed as in the case of an implicit tweak. The ciphertext is decrypted using either the stored explicit tweak value or derive the implicit tweak value to “de-tweak” the decrypted data prior to usage. The data may be deleted by destroying the cipher key(s) to render the ciphertext useless. The tweak information alone is useless for decryption, as the ciphertext needs to be decrypted with the cipher key(s).
    • 采用可调节加密方案的大容量存储设备的加密方案,以增加对加密数据的可变性,以抵抗通过流量分析的攻击。 显式调整和隐性调整可用于在加密和最终存储之前向明文增加变异性。 调整信息或者存储在存储设备上以及加密的数据,如在显式调整的情况下,或者在需要时从另一个源派生,如在隐式调整的情况下。 使用存储的显式调整值来解密密文,或者导出隐式调整值以在使用之前“解密”解密的数据。 可以通过破坏加密密钥来使密文无效地删除数据。 单独的调整信息对于解密是无用的,因为密文需要用密码密钥解密。
    • 10. 发明授权
    • Secure direct platter access
    • 安全的直接拼盘访问
    • US08103844B2
    • 2012-01-24
    • US12012261
    • 2008-02-01
    • Donald Rozinak Beaver
    • Donald Rozinak Beaver
    • G06F12/00
    • G06F21/79
    • Bulk data transfers by directly accessing a persistent and secured area on the data storage device, e.g., a disk drive having a magnetic storage medium, without relying on the system operating system to execute its read/write operations. For a disk drive, the Protected Area Run Time Interface Extension (PARTIES) technology is applied to create and organize a secured sub-area within a secured storage area. The secured sub-area is a data buffer to and from which large data file transfers can be made with data authenticity and confidentiality. Since this new secured sub-area is not organized and protected by the operating system, it is inherently protected from attack by viruses or Trojan horse software whose effectiveness depends on their ability to maliciously direct the operating system. In addition, the read/write operations bypass command payload limits while reducing data and command validation costs.
    • 通过直接访问数据存储设备上的持久和安全区域(例如具有磁存储介质的磁盘驱动器)而不依赖于系统操作系统来执行其读/写操作来批量数据传输。 对于磁盘驱动器,应用保护区运行时接口扩展(PARTIES)技术来创建和组织安全存储区域内的安全子区域。 安全子区域是数据缓冲区,可以从数据缓冲区中进行大数据文件传输,数据的真实性和机密性。 由于这个新的安全子区域不受操作系统的组织和保护,因此它本质上受到防病毒或特洛伊木马软件的攻击,其有效性取决于其恶意指导操作系统的能力。 此外,读/写操作在减少数据和命令验证成本的同时绕过命令有效负载。