[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN202795383U - Device and system for protecting data - Google Patents

Device and system for protecting data Download PDF

Info

Publication number
CN202795383U
CN202795383U CN 201220025792 CN201220025792U CN202795383U CN 202795383 U CN202795383 U CN 202795383U CN 201220025792 CN201220025792 CN 201220025792 CN 201220025792 U CN201220025792 U CN 201220025792U CN 202795383 U CN202795383 U CN 202795383U
Authority
CN
China
Prior art keywords
equipment
environment
data
decryption
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN 201220025792
Other languages
Chinese (zh)
Inventor
姜斌斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Goertek Inc
Original Assignee
Goertek Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Goertek Inc filed Critical Goertek Inc
Priority to CN 201220025792 priority Critical patent/CN202795383U/en
Application granted granted Critical
Publication of CN202795383U publication Critical patent/CN202795383U/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model discloses a device and a system for protecting data. An embodiment of the utility model provides a device for protecting data, wherein, an initialization unit in an initialization process of the device, acquires an environment factor via an environment factor acquiring unit according to environment information of the device in a safety environment, and encrypts sensitive data in the device via an encryption and decryption unit by use of the environment factor in the safety environment; after confirmation of successful encryption, the initialization unit destroys the environment factor; a guide control unit, at every time the device is started, acquires the environment factor via the environment factor acquiring unit according to environment information of the device in a current, environment, and decrypts the encrypted sensitive data in the device via the encryption and decryption unit by use of the environment factor in the current environment; if decryption is successful, the guide control unit allows access to data in the device, and if decryption fails, the guide control unit rejects access to data in the device. Cost of hardware required by the scheme is lower, and data leakage risk can be greatly reduced.

Description

A kind of equipment of protected data and system
Technical field
The utility model relates to the Technology On Data Encryption field, particularly a kind of equipment of protected data and system.
Background technology
Along with popularizing of information carrier equipment, increasing automatically control, information handling system adopt embedded architecture, and the social organizations such as individual, enterprise are also more and more higher for the degree of dependence of information carrier equipment.Embedded device is a kind of information carrier equipment commonly used, and the universal one side of embedded device has improved social production efficiency, facilitated the control to producing, and also the various information recording /s in the system has been proposed the specific requirement in the safeguard protection on the other hand.
In recent years, a lot of information security manufacturers mainly is confined to how to protect the safety of data in network of embedded device in the research and development on the Data Protection Technologies, such as the protection to data such as the database in the network, local files.And often out in the cold as the data security (the particularly physical security of equipment) of the embedded device self of information store and management carrier, cause the risk of data leak higher, be difficult to realize real safe and reliable.Particularly for embedded mobile device, in case after losing or maliciously being stolen, the data in the equipment are very easily revealed, cause the losing of enterprise key data, caused loss to enterprise technology and trade secret.
At present a lot of developers and user come to realise the commercial value of data and the meaning in Enterprise Value Chain, for the problems referred to above, have proposed to adopt credible theory of computation system that information carrier equipment is protected.On hardware, increase the hardware device of encrypting, such as reliable platform module (Trusted Platform Module, TPM) chip and USB-key etc.; Logically, a believable safe root is set, this safe root can be considered as " root " of trusting relationship in the security system, and the activity of all mutual trusts or mandate is all take the safety root as the basis in the security system.
There is following defective at least in existing Data Protection Scheme:
Existing credible theory of computation system solution need to additionally be set up encryption hardware equipment on computing platform, such as TPM chip or USB-key etc., hardware cost is too high, and most user is difficult to accept; And the enforcement of existing safeguard protection system and the complicated operation of deployment; professional excessively strong; common IT managerial personnel are difficult to the configure and maintenance of complete independently system usually, and in case configuration goes wrong, may cause whole system to use or the security of whole system reduces greatly.
The utility model content
The utility model provides a kind of equipment and system of protected data, and is too high to solve existing scheme hardware cost, professional excessively strong problem.
For achieving the above object, the utility model embodiment has adopted following technical scheme:
The utility model embodiment provides a kind of equipment of protected data, and described equipment comprises initialization unit, guiding control module, envirment factor acquiring unit and encryption/decryption element, wherein,
Described initialization unit is in initialization procedure of described equipment, by the environment information acquisition envirment factor of envirment factor acquiring unit according to equipment under the security context, utilize the envirment factor under the security context that the sensitive data in the described equipment is encrypted by encryption/decryption element; After confirming to encrypt successfully, described initialization unit is destroyed described envirment factor;
Described guiding control module is when the described equipment of each startup, by the environment information acquisition envirment factor of envirment factor acquiring unit according to equipment under the current environment, utilize the envirment factor under the current environment that the described sensitive data of having encrypted is decrypted by encryption/decryption element; When successful decryption, described guiding control module allows the data in the described equipment of access, when Decryption failures, and the data in the described equipment of described guiding control module denied access.
Further, described equipment also comprises removing module or No starting module,
Described removing module is destroyed described sensitive data when the encryption/decryption element Decryption failures;
Described No starting module stops the operating system under the described device start security context when the encryption/decryption element Decryption failures.
Further, described equipment comprises that also alarm communication system module and/or permission start module,
Described alarm communication system module when the encryption/decryption element Decryption failures, sends warning message;
Described permission starts module, when the encryption/decryption element Decryption failures, allows the operating system under the described device start insecure environments, and the operating system under the described insecure environments can't be accessed described sensitive data.
Further, described alarm communication system module is one or more in note card, multimedia message card or the global position system GPS chip.
Further, the equipment of described protected data is embedded device, and described sensitive data is kernel and image file data.
The utility model embodiment also provides a kind of system of protected data, it is characterized in that, described system comprises the equipment and the environmental information extraction unit that is connected with the equipment of this protected data of aforesaid protected data.
Further, described environmental information extraction unit comprises following at least a:
The certificate server of the network detection server of the image acquisition device of the physical characteristics collecting device of the illumination collector of the humidity collector of the Temperature sampler of the temperature environment information of extraction equipment, the humidity environment information of extraction equipment, the photoenvironment information of extraction equipment, extraction equipment user's biological information, the physical environment image information of extraction equipment, the network environment information of extraction equipment, extraction equipment and webserver bidirectional identity authentication information.
Further, described system also comprises the environmental monitoring server that is connected with the equipment of described protected data,
Described environmental monitoring server, gather in advance the identity information of described equipment under security context, before the described equipment of each startup, gather the identity information of described equipment under current environment, according to the identity information of described equipment under the identity information of described equipment under the security context checking current environment, and judge according to the result whether described equipment is legitimate device, if, allow described equipment access security context, if not, forbid described equipment access security context.
The beneficial effect of the utility model embodiment is:
The utility model embodiment is by extracting the security context factor and utilizing the non-volatile sensitive data in the security context factor pair equipment to encrypt in security context, thereby can be with the sensitive data in the equipment and working environment binding, different working environments will extract different envirment factors, in case therefore equipment shifts out safe working environment, cause Decryption failures owing to obtaining consistent envirment factor, and then reduce the risk that data are revealed by the data in the denied access equipment.Because this programme need not to set up extra encryption hardware equipment; realize protection to the non-volatile sensitive data in the equipment by the encryption and decryption mechanism with environment binding; so hardware cost is less; implement in addition also relative simple with the operation of disposing the notebook data protection scheme; professional requirement is lower, has reduced the workload of System Implementation and deployment and to the requirement of human resources.
Description of drawings
The working method synoptic diagram of the envirment factor acquiring unit that Fig. 1 provides for the utility model embodiment;
The working method synoptic diagram of the system of the protected data that Fig. 2 provides for the utility model embodiment;
Fig. 3 a kind of working method synoptic diagram with dual system device start environment binding that provide for the utility model embodiment;
A kind of dual system operation mechanism synoptic diagram that Fig. 4 provides for the utility model embodiment.
Embodiment
For making the purpose of this utility model, technical scheme and advantage clearer, below in conjunction with accompanying drawing the utility model embodiment is described in further detail.
The utility model embodiment illustrates the data protection mechanism that this programme provides as an example of a kind of system of protected data example.The system of the protected data that present embodiment provides comprises the equipment at data place, and this equipment comprises initialization unit, guiding control module, envirment factor acquiring unit and encryption/decryption element.
Described initialization unit, in initialization procedure of described equipment, by the environment information acquisition envirment factor of envirment factor acquiring unit according to equipment under the security context, utilize described envirment factor that the sensitive data in the described equipment is encrypted by encryption/decryption element; After confirming to encrypt successfully, described initialization unit is destroyed described envirment factor.
Described guiding control module, when the described equipment of each startup, by the environment information acquisition envirment factor of envirment factor acquiring unit according to equipment under the current environment, utilize the envirment factor under the current environment that the described sensitive data of having encrypted is decrypted by encryption/decryption element; When successful decryption, described guiding control module allows the data in the described equipment of access, otherwise the data in the described equipment of denied access.
Working environment when above-mentioned security context can be installed for the first time for equipment, perhaps, the working environment that above-mentioned security context can set behind first installation and operation according to actual needs for equipment.Working environment when being chosen to be equipment and installing for the first time take security context in the present embodiment describes as example.The said equipment is including, but not limited to various embedded devices, such as embedded memory device, Embedded Handhold Terminal (mobile phone, palm PC Pad), embedded industrial control computer etc.
The extraction of envirment factor
The extraction of above-mentioned envirment factor refers to that protected equipment (such as embedded device) carries out alternately according to its working environment of certain logical and (comprising physical environment, equipment physical environment, server and software environment) by the environmental information extraction unit; from environmental information, finish feature extraction, finally generate the serial data of certain-length as the process of envirment factor.
The environmental factor of identifying is different, then the environmental information extraction unit is also different from the mode of environmental interaction, and the interactive mode that can adopt comprises at least: the measurement of the image of the physical environment that temperature environment is accurately measured, intensity of illumination is measured, video monitoring is taken, the measurement of biological characteristic, network environment, the scanning of data, employing challenge-response (Challenge/Response) authentication mechanism and internet obtain key etc. alternately.Any one of these factors or the combination of any amount envirment factor of final formation system to the environment cognition that interact.
Referring to Fig. 1, envirment factor acquiring unit 110 be used for the external unit 112 to 115 of extraction environment information and carry out alternately, this external unit 112 to 115 is the environmental information extraction unit.
Image acquisition device 112 can collecting device the physical environment image information of physical environment, the environmental information of extracting comprises this physical environment image information.
Humiture collection equipment 113 (such as Temperature sampler) can measure to the temperature environment of equipment temperature environment information, and the environmental information of extracting comprises this temperature environment information.
Humiture collection equipment 113 (such as humidity collector) can also measure to the humidity environment of equipment humidity environment information, and the environmental information of extracting comprises this humidity environment information.
Image acquisition device 112, humiture collection equipment 113 can carry out data acquisition by direct data-interface, and then the error concealment mechanism by data obtains one and stablizes believable numerical value as envirment factor or participate in the build environment factor.
Network detection server 114 can collecting device the network environment information of network environment, the environmental information of extracting comprises this network environment information.Network detection server 114 is realized by the function sub-modules that is integrated in embedded device inside or is realized by the equipment that is arranged on the embedded device outside.The network environment information that gathers mainly comprises various servers in topology of networks, the network or the finger print information (FingerPrint) of particular host, such as media Access Control (MAC) address information etc., with the build environment factor behind these informations or participate in the build environment factor.
Certificate server 115 carries out bidirectional identity authentication with equipment, and after authentication was passed through, certificate server generated the data block as bidirectional identity authentication information, and this data block is sent to equipment, and the environmental information of then extracting comprises this data block.For example, certificate server 115 directly can carry out the two-way authentication of passage by the asymmet-ric encryption method of challenge-response with embedded device, allow simultaneously certificate server and embedded device confirm the other side's identity, then in this asymmetric encryption data channel, issue a data block by certificate server to embedded device, with this data block as envirment factor or participate in the build environment factor.Wherein, the challenge-response authentication mechanism is a kind of mode of authentication, under this mode during each authentication the certificate server end all send different " challenge " word string, client to client and receive this " challenge is " after the word string, make corresponding " replying ", to realize the affirmation of both sides' identity.
Further, except the measurement to above-mentioned environmental factor, native system can also utilize the illumination collector that the photoenvironment of equipment is measured intensity of illumination information, and the environmental information of extracting comprises this intensity of illumination information; Perhaps, utilize physical characteristics collecting device collecting device user's biological information (such as fingerprint, iris etc.), the environmental information of extracting comprises this biological information etc.
One or more environmental informations that envirment factor acquiring unit 110 directly will extract are as accessed envirment factor, perhaps, one or more environmental information build environment factors that the utilization of envirment factor acquiring unit is extracted, such as the envirment factor acquiring unit one or more environmental informations are carried out feature extraction, and generate the serial data of certain-length according to pre-defined algorithm, with this serial data as envirment factor.The mode that generates for example can be by the concrete data of environmental variance in the environmental information are carried out feature extraction, form characteristic character string after the shielding microcosmic variable factor, all each environmental variance data characteristic of correspondence word strings that participate in computing are carried out the hash computing, finally obtain envirment factor, perhaps, also can be finally to obtain envirment factor by the methods such as modulo operation to characteristic character string.Envirment factor acquiring unit 110 is passed to encryption/decryption element 120 with this envirment factor, encryption/decryption element 120 with envirment factor as the key of encrypting or decipher non-volatile sensitive data.
Initialization unit
When the main finishing equipment of above-mentioned initialization unit is installed for the first time to the affirmation of environmental information and the extraction of environmental information, form envirment factor, and the sensitive data on system's non-volatile memory medium is encrypted as initialization key by this " envirment factor ".This non-volatile sensitive data is the necessary uniqueness data of the data of access means under security context, for example, above-mentioned non-volatile sensitive data can for starting outfit in the necessary uniqueness data of the operating system under the security context.During to embedded device, selected non-volatile sensitive data is kernel and image file data (data in the Ramdisk ram disk).And to other data on the non-volatile memory medium in the equipment, in the operating system aspect, adopt envirment factor to realize encryption according to the mode of wildcard, finish credible transmission.
Initialization unit logically can be in the application layer of system; work in system's initial start-up; and the first operation configuration of difference operating environment factor acquiring unit and encryption/decryption element completion system; layoutprocedure does not generate a preservable configuration file or data; but obtain envirment factor by the result of extraction environment data characteristics; envirment factor is directly encrypted system kernel and the image file that needs protection as key, encrypt successfully after, do not preserve this envirment factor.This initialized result cannot directly extract and conversed analysis.
Initialization unit has a kind of self-destroying function in the present embodiment, after confirming to encrypt successfully, destroys the described security context factor, and the described non-volatile sensitive data of the unencrypted of storing in the sweep equipment is also forbidden encryption function.On the storage medium of system, the shared data space of initialization unit is carried out data erase operation.The method of wiping comprises full zero padding, complete 1 filling, random number filling etc.The final stage of self-destruction process will be made amendment to guiding control module configuration file, remove the information relevant with initialization unit, and restart facility.
The guiding control module
Environment before the main completion system of guiding control module starts is confirmed; execution environment is confirmed action before the operating system nucleus guiding of embedded device, avoids equipment to start (shifting out the running environment of appointment such as equipment) in the environment that does not have the safeguard protection system.
So the guiding control module can be realized by calling above-mentioned identical envirment factor acquiring unit the generation of envirment factor.Equally, the Output rusults of generation (envirment factor) only is disposable decruption key, can't preserve in system.
At first the envirment factor acquiring unit extracts an envirment factor according to the environmental information that gets access to, is stored in operating system nucleus and corresponding image file (Ramdisk) thereof on the equipment non-volatile memory medium in order to deciphering.If the working environment of equipment changes, can't generate correct envirment factor, also just can't carry out the extraction operation of plaintext to the data that are stored on the non-volatile memory medium.
The envirment factor that the envirment factor acquiring unit extracts under same environment should be in full accord, and only generation effect when system loads or startup of envirment factor, in case system finishes and loads or start, it will not be present among the volatile or non-volatile memory medium of any one of system.
Referring to Fig. 2, shown the working method synoptic diagram of the system of the protected data that the utility model embodiment provides.
Take the equipment that needs protection as embedded device, security context is that the scene of the first installation environment of equipment is that example describes in the present embodiment.In initialization procedure, extraction environment information and the build environment factor are utilized kernel and the image file of envirment factor generating ciphertext in initialization procedure.Therefore, initialization procedure must be disposable, and is irreversible, and initialization unit is complete operation when system powers up for the first time, and operation must be carried out self-destruction later, to guarantee the nonreversibility of initialization procedure.
During the system initial start-up, whether the guiding control module can start for the first time according to the configuration file check system of system, if, execution in step 210.
210: the initialization unit 200 of start-up system.
Initialization unit 200 transfer environment factor acquiring units 100 carry out the collection of environmental information, the build environment factor, and envirment factor inputed to encryption/decryption element 201.
Step 213: kernel file, image file on 201 pairs of non-volatile memory mediums 300 of encryption/decryption element are encrypted processing.
Adopt the step-by-step symmetry algorithm that non-volatile sensitive data selected in the equipment is encrypted in the present embodiment.Owing to be step-by-step operation, any variation does not occur through its length after the encryption in raw data, so original file size is not had any impact, has guaranteed the stability of operating system, has improved the compatibility of equipment.
Encryption/decryption element 201 can carry out verification to encrypted kernel file and image file after finishing cryptographic operation, and verification is finished, and after confirming to encrypt successfully, notice initialization unit 100 enters next step action 215.
Step 215: initialization unit 200 is carried out the self-destruction operation.
The self-destruction operation specifically can be that the original data space of initialization unit is carried out data erase operation.
The method of deletion data comprises full zero padding, complete 1 filling, random number filling etc.The final stage of self-destruction process is guiding control module configuration file to be made amendment, remove the relevant information of initialization unit, so far the finishing equipment initialization procedure.
The step of required execution when step shown in dotted lines in Figure 2 is device initialize.After the initialization of completion system, again power up starting outfit, the step shown in the solid line in the execution graph 3.
Step 216: the guiding control module enters normal start-up course, finishes BIOS and loads rear directly transfer environment factor acquiring unit 100.
Step 217: the envirment factor that envirment factor acquiring unit 100 generates under the current environment inputs to encryption/decryption element 201.
Step 218: encryption/decryption element 201 utilizes the envirment factor under the current environment that kernel and the image file of ciphertext is decrypted loading, when successful decryption, allows the data in the access means, when Decryption failures, and the data in the denied access equipment.
Break away from after security context starts when equipment in the present embodiment, can adopt multiple associative operation, as utilizing the alarm communication system module to send warning message, warning message can be the much informations such as GPS information, note, multimedia message, and can warning message be transferred out by the diverse network communication modes; Utilize removing module to destroy described sensitive data with the data in the disable access equipment; Perhaps, utilize the No starting module, stop the operating system under the described device start security context, with the data in the described equipment of denied access; And, utilize to allow to start module, when the encryption/decryption element Decryption failures, allow the operating system under the described device start insecure environments, the operating system under the described insecure environments can't be accessed described sensitive data.
Among the utility model embodiment, also provide a kind of dual system equipment that starts of selecting different operating system according to environmental factor.At least two kinds of operating systems namely are set in system, wherein a kind of operating system and envirment factor binding, and the operating system that another kind of operating system is not bound with environment can as required, be switched in different operating system flexibly.
Referring to Fig. 3, after adopting envirment factor that the non-volatile sensitive data in the equipment is encrypted, a kind of workflow of the utility model embodiment dual system device start mainly comprises:
Step 41: after the device power-on, main bootstrap program (Master Boot Record, MBR) operation.
Step 42: main bootstrap program starts the guiding control module.
Main bootstrap program will guide the data of control module to be loaded into internal memory from non-volatile memory medium and begin and carry out.
Step 43: the guiding control module will determine whether needs execution environment decision process according to CONFIG.SYS, if not, and execution in step 44, if, execution in step 45.
Step 44: when not needing the execution environment decision process, start not with the environment binding the first operating system (being expressed as OS1).This first operating system does not need to access the non-volatile sensitive data of having encrypted, and namely the start-up and operation of this first operating system does not need the above-mentioned non-volatile sensitive data of having encrypted.
Step 45: when needs execution environment decision process, start the envirment factor acquiring unit.
The envirment factor acquiring unit can produce envirment factor according to the environmental information that gets access to.
Step 46: encryption/decryption element is carried out the kernel file of ciphertext and the decryption oprerations of image file according to envirment factor, after confirming successful decryption, execution in step 49 loads kernel file and image file after deciphering, starts the operating system OS2 that binds mutually with environmental factor.Behind Decryption failures, execution in step 47.
Step 47: need to judge whether alarm operation, if, execution in step 48.In case of necessity, can also destroy above-mentioned non-volatile sensitive data, assurance equipment not can with the operating system of environment binding under start, with the data of the described equipment of denied access under this operating system.
Step 48: start the alarm communication system module, send warning message.
Described alarm communication system module can be in note card, multimedia message card or the global position system GPS chip one or more.
A kind of dual system operation mechanism that present embodiment provides can also be as shown in Figure 4.
In initialization procedure, in two kinds of operating systems that equipment is supported, choose a kind of operating system and environmental factor binding by initialization unit 200, as operating system OS2 and environmental facies are bound.
When starting outfit again, the guiding control module directly confirms through environment whether the process judgment device is operated in the safe environment, if start the operating system (OS2) under the security context, if not, then start another not with the operating system (OS1) of environmental facies bindings.
Further, present embodiment also provides the mechanism of a kind of environment and equipment two-way authentication, has higher security to guarantee system.Utilize on the one hand envirment factor with equipment and environment binding, require equipment to start in the environment of safety, on the other hand, environment also can be identified the equipment identities that works in wherein, only allows the equipment of legal identity to be operated under this environment.At this moment, native system also comprises the environmental monitoring server, and this environmental monitoring server gathers in advance the identity information of legitimate device under security context and preserves.
Before each startup current device, the identity information of this environmental monitoring collection of server equipment under current environment, judge according to the identity information of described equipment under the security context whether current device is legitimate device, if, allow described equipment access security context, if not, forbid described equipment access security context.This environmental monitoring server can be realized by independent server apparatus, also can be integrated in the embedded device and realize.
Above-mentioned processing mode not only requires protected embedded device to confirm oneself to be among the security context by certain mode; also allowing the security context that is defined to guarantee to be present in equipment in the environment by modes such as certain methods (two-way authentication, equipment video monitoring) all is equipment through environmental permission, rather than other equipment or the logical block of being implanted arbitrarily or invading.Can adopt Public Key Infrastructure (Public Key Infrastructure, PKI) authentication mechanism between environmental monitoring server and the embedded device.PKI mechanism is a kind of key management technology of following set standard, be a kind of can use to provide for all-network encrypt and cryptographic service and necessary key and the certificate management system such as digital signature.Whether environmental monitoring server and embedded device both sides authenticate the other side's certificate mutually effective, if side's authentification failure can think that so embedded device is not legal safety equipment, does not allow the operation of this embedded device.
Above-mentioned initialization unit in this programme, the guiding control module, envirment factor acquiring unit and encryption/decryption element and alarm communication system module etc. can hardware device mode realize, this programme has just adopted the naming method of " unit " " module " as hardware device, can be in order to realize the multiple hardwares equipment of these unit and module to contain, for example, encryption/decryption element in this programme can be for being realized by deciphering chip, such as the system-level encryption chip of grand think of HS32U1, when adopting the GPS type of alarm, the alarm communication system module in this programme can be realized by SiRF III GPS chip that the model that can adopt WAVECOM when adopting the SMS alarm mode is that the note card of M 1206B is realized.
From the above mentioned, the utility model embodiment is by extracting the security context factor and utilizing the non-volatile sensitive data in the security context factor pair equipment to encrypt in security context, thereby can be with the sensitive data in the equipment and working environment binding, different working environments will extract different envirment factors, in case therefore equipment shifts out safe working environment, cause Decryption failures owing to obtaining consistent envirment factor, and then reduce the risk that data are revealed by the data in the denied access equipment.Because this programme need not to set up extra encryption hardware equipment; realize protection to the non-volatile sensitive data in the equipment by the encryption and decryption mechanism with environment binding; so hardware cost is less; implement in addition also relative simple with the operation of disposing the notebook data protection scheme; professional requirement is lower, has reduced the workload of System Implementation and deployment and to the requirement of human resources.
The above is preferred embodiment of the present utility model only, is not be used to limiting protection domain of the present utility model.All any modifications of within spirit of the present utility model and principle, doing, be equal to replacement, improvement etc., all be included in the protection domain of the present utility model.

Claims (8)

1. the equipment of a protected data is characterized in that, described equipment comprises initialization unit, guiding control module, envirment factor acquiring unit and encryption/decryption element, wherein,
Described initialization unit is in initialization procedure of described equipment, by the environment information acquisition envirment factor of envirment factor acquiring unit according to equipment under the security context, utilize the envirment factor under the security context that the sensitive data in the described equipment is encrypted by encryption/decryption element; After confirming to encrypt successfully, described initialization unit is destroyed described envirment factor;
Described guiding control module is when the described equipment of each startup, by the environment information acquisition envirment factor of envirment factor acquiring unit according to equipment under the current environment, utilize the envirment factor under the current environment that the described sensitive data of having encrypted is decrypted by encryption/decryption element; When successful decryption, described guiding control module allows the data in the described equipment of access, when Decryption failures, and the data in the described equipment of described guiding control module denied access.
2. equipment according to claim 1 is characterized in that, described equipment also comprises removing module or No starting module,
Described removing module is destroyed described sensitive data when the encryption/decryption element Decryption failures;
Described No starting module stops the operating system under the described device start security context when the encryption/decryption element Decryption failures.
3. equipment according to claim 1 is characterized in that, described equipment comprises that also alarm communication system module and/or permission start module,
Described alarm communication system module when the encryption/decryption element Decryption failures, sends warning message;
Described permission starts module, when the encryption/decryption element Decryption failures, allows the operating system under the described device start insecure environments, and the operating system under the described insecure environments can't be accessed described sensitive data.
4. equipment according to claim 3 is characterized in that,
Described alarm communication system module is one or more in note card, multimedia message card or the global position system GPS chip.
5. equipment according to claim 1 is characterized in that,
The equipment of described protected data is embedded device.
6. the system of a protected data is characterized in that, described system comprises the equipment and the environmental information extraction unit that is connected with the equipment of this protected data such as each described protected data of claim 1 to 5.
7. system according to claim 6 is characterized in that, described environmental information extraction unit comprises following at least a:
The certificate server of the network detection server of the image acquisition device of the physical characteristics collecting device of the illumination collector of the humidity collector of the Temperature sampler of the temperature environment information of extraction equipment, the humidity environment information of extraction equipment, the photoenvironment information of extraction equipment, extraction equipment user's biological information, the physical environment image information of extraction equipment, the network environment information of extraction equipment, extraction equipment and webserver bidirectional identity authentication information.
8. according to claim 6 or 7 described systems, it is characterized in that described system also comprises the environmental monitoring server that is connected with the equipment of described protected data.
CN 201220025792 2012-01-19 2012-01-19 Device and system for protecting data Expired - Lifetime CN202795383U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201220025792 CN202795383U (en) 2012-01-19 2012-01-19 Device and system for protecting data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201220025792 CN202795383U (en) 2012-01-19 2012-01-19 Device and system for protecting data

Publications (1)

Publication Number Publication Date
CN202795383U true CN202795383U (en) 2013-03-13

Family

ID=47822600

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201220025792 Expired - Lifetime CN202795383U (en) 2012-01-19 2012-01-19 Device and system for protecting data

Country Status (1)

Country Link
CN (1) CN202795383U (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624699A (en) * 2012-01-19 2012-08-01 歌尔声学股份有限公司 Method and system for protecting data
CN105519038A (en) * 2014-06-27 2016-04-20 微软技术许可有限责任公司 Data protection based on user input during device boot-up, user login, and device shut-down states
CN105874464A (en) * 2013-12-23 2016-08-17 赛门铁克公司 Systems and methods for introducing variation in sub-system output signals to prevent device fingerprinting
US10192039B2 (en) 2014-06-27 2019-01-29 Microsoft Technology Licensing, Llc System for context-based data protection
US10326733B2 (en) 2015-12-30 2019-06-18 Symantec Corporation Systems and methods for facilitating single sign-on for multiple devices
US10375114B1 (en) 2016-06-27 2019-08-06 Symantec Corporation Systems and methods for enforcing access-control policies
US10404697B1 (en) 2015-12-28 2019-09-03 Symantec Corporation Systems and methods for using vehicles as information sources for knowledge-based authentication
US10423766B2 (en) 2014-06-27 2019-09-24 Microsoft Technology Licensing, Llc Data protection system based on user input patterns on device
US10462184B1 (en) 2016-06-28 2019-10-29 Symantec Corporation Systems and methods for enforcing access-control policies in an arbitrary physical space
US10469457B1 (en) 2016-09-26 2019-11-05 Symantec Corporation Systems and methods for securely sharing cloud-service credentials within a network of computing devices
US10474849B2 (en) 2014-06-27 2019-11-12 Microsoft Technology Licensing, Llc System for data protection in power off mode
CN110532783A (en) * 2019-08-21 2019-12-03 西安四叶草信息技术有限公司 Data tamper resistant method, device, equipment and storage medium
US10812981B1 (en) 2017-03-22 2020-10-20 NortonLifeLock, Inc. Systems and methods for certifying geolocation coordinates of computing devices
CN114338007A (en) * 2021-12-27 2022-04-12 中国电信股份有限公司 Data processing method and device, electronic equipment and computer readable storage medium

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013107362A1 (en) * 2012-01-19 2013-07-25 歌尔声学股份有限公司 Method and system for protecting data
CN102624699B (en) * 2012-01-19 2015-07-08 歌尔声学股份有限公司 Method and system for protecting data
CN102624699A (en) * 2012-01-19 2012-08-01 歌尔声学股份有限公司 Method and system for protecting data
CN105874464A (en) * 2013-12-23 2016-08-17 赛门铁克公司 Systems and methods for introducing variation in sub-system output signals to prevent device fingerprinting
US10372937B2 (en) 2014-06-27 2019-08-06 Microsoft Technology Licensing, Llc Data protection based on user input during device boot-up, user login, and device shut-down states
US10474849B2 (en) 2014-06-27 2019-11-12 Microsoft Technology Licensing, Llc System for data protection in power off mode
CN105519038A (en) * 2014-06-27 2016-04-20 微软技术许可有限责任公司 Data protection based on user input during device boot-up, user login, and device shut-down states
US10423766B2 (en) 2014-06-27 2019-09-24 Microsoft Technology Licensing, Llc Data protection system based on user input patterns on device
US10192039B2 (en) 2014-06-27 2019-01-29 Microsoft Technology Licensing, Llc System for context-based data protection
CN105519038B (en) * 2014-06-27 2020-03-17 微软技术许可有限责任公司 User input data protection method and system
US10404697B1 (en) 2015-12-28 2019-09-03 Symantec Corporation Systems and methods for using vehicles as information sources for knowledge-based authentication
US10326733B2 (en) 2015-12-30 2019-06-18 Symantec Corporation Systems and methods for facilitating single sign-on for multiple devices
US10375114B1 (en) 2016-06-27 2019-08-06 Symantec Corporation Systems and methods for enforcing access-control policies
US10462184B1 (en) 2016-06-28 2019-10-29 Symantec Corporation Systems and methods for enforcing access-control policies in an arbitrary physical space
US10469457B1 (en) 2016-09-26 2019-11-05 Symantec Corporation Systems and methods for securely sharing cloud-service credentials within a network of computing devices
US10812981B1 (en) 2017-03-22 2020-10-20 NortonLifeLock, Inc. Systems and methods for certifying geolocation coordinates of computing devices
CN110532783A (en) * 2019-08-21 2019-12-03 西安四叶草信息技术有限公司 Data tamper resistant method, device, equipment and storage medium
CN114338007A (en) * 2021-12-27 2022-04-12 中国电信股份有限公司 Data processing method and device, electronic equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN202795383U (en) Device and system for protecting data
CN102624699B (en) Method and system for protecting data
US11036869B2 (en) Data security with a security module
RU2620998C2 (en) Method and authentication device for unlocking administrative rights
US8997198B1 (en) Techniques for securing a centralized metadata distributed filesystem
US10211977B1 (en) Secure management of information using a security module
Skillen et al. On implementing deniable storage encryption for mobile devices
US9219722B2 (en) Unclonable ID based chip-to-chip communication
CN104320389B (en) A kind of fusion identity protection system and method based on cloud computing
CN101470783B (en) Identity recognition method and device based on trusted platform module
US9647834B2 (en) Systems and methods with cryptography and tamper resistance software security
CN101122942A (en) Data safe reading method and its safe storage device
CN113168480A (en) Trusted execution based on environmental factors
CN113383335B (en) Secure logging of data storage device events
EP3732818A1 (en) Method and system for cryptographic activation of a plurality of equipement items
CN103973715B (en) Cloud computing security system and method
CN113039542A (en) Secure counting in cloud computing networks
CN104104650A (en) Data file visit method and terminal equipment
CN114662135A (en) Data access method, computer device and readable storage medium
JP2008005408A (en) Recorded data processing apparatus
CN114942729A (en) Data safety storage and reading method for computer system
WO2013044384A1 (en) System and method for providing hardware-based security
CN102087683A (en) Password management and verification method suitable for trusted platform module (TPM)
CN113961970B (en) Cross-network-segment network disk login identity authentication method and device, network disk and storage medium
KR101474744B1 (en) Apparatus and method for managing usim data of device by using mobile trusted module

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP01 Change in the name or title of a patent holder

Address after: 261031 Dongfang Road, Weifang high tech Industrial Development Zone, Shandong, China, No. 268

Patentee after: Goertek Inc.

Address before: 261031 Dongfang Road, Weifang high tech Industrial Development Zone, Shandong, China, No. 268

Patentee before: Goertek Inc.

CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20130313