CN108898005B - Hard disk identification method, system, equipment and computer readable storage medium - Google Patents

Hard disk identification method, system, equipment and computer readable storage medium Download PDF

Info

Publication number
CN108898005B
CN108898005B CN201810745205.0A CN201810745205A CN108898005B CN 108898005 B CN108898005 B CN 108898005B CN 201810745205 A CN201810745205 A CN 201810745205A CN 108898005 B CN108898005 B CN 108898005B
Authority
CN
China
Prior art keywords
hard disk
ciphertext
plaintext
equipment
unique identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810745205.0A
Other languages
Chinese (zh)
Other versions
CN108898005A (en
Inventor
徐洪志
王艳清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201810745205.0A priority Critical patent/CN108898005B/en
Publication of CN108898005A publication Critical patent/CN108898005A/en
Application granted granted Critical
Publication of CN108898005B publication Critical patent/CN108898005B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0614Improving the reliability of storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0673Single storage device

Abstract

The application discloses a hard disk identification method, which comprises the following steps: when the equipment is powered on and started or the hard disk is inserted into the equipment, reading the unique identifier of the hard disk; judging whether a ciphertext exists in a reserved area of the hard disk; if so, reading the ciphertext, and decrypting the ciphertext into a plaintext by combining a preset key; judging whether the plaintext is the same as the unique identifier; and if the plaintext is different from the unique identifier, forbidding to use the hard disk. According to the technical scheme, whether the plaintext is the same as the unique identifier or not is judged, if the plaintext is different from the unique identifier, the hard disk is forbidden to be used, the risk that a user replaces the hard disk provided by a non-server/storage manufacturer by himself is avoided, the problem that the reliability of the server/storage equipment is reduced is further avoided, and the probability of huge loss is reduced. The application also provides a system and equipment for identifying the hard disk and a computer readable storage medium, and the system and the equipment have the beneficial effects.

Description

Hard disk identification method, system, equipment and computer readable storage medium
Technical Field
The present application relates to the field of hard disk identification, and in particular, to a method, a system, a device, and a computer-readable storage medium for hard disk identification.
Background
For the server/storage device, it is required to have good reliability because the loss and cost of data loss, shutdown and line stop caused by hard disk failure are huge, and the maintenance cost is high, so the hard disk used by the server/storage device is generally an industrial hard disk, and the stability and reliability of the industrial hard disk are much higher than those of a consumer hard disk.
However, for the user, the hard disk provided by the server/storage manufacturer may be replaced by the consumer hard disk by himself or herself for the reason of cost or data transfer, which may reduce the reliability of the server/storage device and even bring about huge loss and cost.
Therefore, how to prevent the user from replacing the hard disk provided by the non-server/storage manufacturer by himself is a technical problem that needs to be solved by those skilled in the art.
Disclosure of Invention
The application aims to provide a method, a system, equipment and a computer readable storage medium for hard disk identification, which are used for preventing a user from replacing a hard disk provided by a non-server/storage manufacturer by himself.
In order to solve the above technical problem, the present application provides a hard disk identification method, including:
when equipment is powered on and started or a hard disk is inserted into the equipment, reading the unique identifier of the hard disk;
judging whether a ciphertext exists in a reserved area of the hard disk or not;
if so, reading the ciphertext, and decrypting the ciphertext into a plaintext by combining a preset key;
judging whether the plaintext is the same as the unique identifier;
and if the plaintext is different from the unique identifier, forbidding to use the hard disk.
Optionally, the decrypting the ciphertext into the plaintext by combining the preset key includes:
acquiring the equipment level of the current equipment;
searching a secret key corresponding to the equipment level in a preset secret key table;
and decrypting the ciphertext into plaintext by combining the key.
Optionally, when the ciphertext is not stored in the reserved area of the hard disk, the method further includes:
the hard disk is prohibited from being used.
Optionally, after prohibiting using the hard disk, the method further includes:
and outputting prompt information that the hard disk does not meet the standard.
The present application further provides a system for hard disk identification, the system comprising:
the reading module is used for reading the unique identifier of the hard disk when the equipment is powered on and started or the hard disk is inserted into the equipment;
the first judgment module is used for judging whether a ciphertext exists in a reserved area of the hard disk or not;
the decryption module is used for reading the ciphertext when the ciphertext exists in the reserved area of the hard disk and decrypting the ciphertext into plaintext by combining with a preset key;
the second judgment module is used for judging whether the plaintext is the same as the unique identifier or not;
and the first disabling module is used for disabling the hard disk when the plaintext is different from the unique identifier.
Optionally, the decryption module includes:
the obtaining submodule is used for obtaining the equipment level of the current equipment;
the searching submodule is used for searching the secret key corresponding to the equipment level in a preset secret key table;
and the decryption submodule is used for decrypting the ciphertext into plaintext by combining the secret key.
Optionally, the method further includes:
and the second forbidding module is used for forbidding to use the hard disk when the cipher text is not stored in the reserved area of the hard disk.
Optionally, the method further includes:
the determining module is used for determining the hard disk grade according to the input customization requirement;
the encryption module is used for encrypting the unique identifier of the hard disk by using the secret key corresponding to the hard disk level to obtain a ciphertext;
and the writing module is used for writing the ciphertext into the reserved area of the hard disk.
The present application further provides a hard disk identification device, which includes:
a memory for storing a computer program;
a processor for implementing the steps of the method for hard disk identification according to any one of the above claims when executing the computer program.
The present application also provides a computer-readable storage medium having stored thereon a computer program which, when being executed by a processor, carries out the steps of the method of hard disk identification according to any of the preceding claims.
The hard disk identification method provided by the application comprises the following steps: when the equipment is powered on and started or the hard disk is inserted into the equipment, reading the unique identifier of the hard disk; judging whether a ciphertext exists in a reserved area of the hard disk; if so, reading the ciphertext, and decrypting the ciphertext into a plaintext by combining a preset key; judging whether the plaintext is the same as the unique identifier; and if the plaintext is different from the unique identifier, forbidding to use the hard disk.
According to the technical scheme provided by the application, the ciphertext is preset for the hard disk, so that when the equipment is powered on and started or the hard disk is inserted into the equipment, the unique identifier of the hard disk is read, and whether the ciphertext exists in the reserved area of the hard disk or not is judged; if so, reading the ciphertext, and decrypting the ciphertext into a plaintext by combining a preset key; judging whether the plaintext is the same as the unique identifier; if the plaintext is different from the unique identifier, the hard disk is forbidden to be used, so that the risk that a user replaces the hard disk provided by a non-server/storage manufacturer by himself is avoided, the problem that the reliability of the server/storage equipment is reduced is further avoided, and the probability of huge loss is reduced. The application also provides a system, equipment and computer readable storage medium for hard disk identification, which have the beneficial effects and are not repeated herein.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a hard disk identification method according to an embodiment of the present disclosure;
FIG. 2 is a flow chart of an actual representation of S103 in the method for identifying a hard disk of FIG. 1;
fig. 3 is a block diagram of a system for hard disk identification according to an embodiment of the present disclosure;
fig. 4 is a block diagram of another hard disk identification system according to an embodiment of the present disclosure;
fig. 5 is a structural diagram of a hard disk identification device according to an embodiment of the present application.
Detailed Description
The core of the application is to provide a method, a system, equipment and a computer readable storage medium for hard disk identification, which are used for preventing a user from replacing a hard disk provided by a non-server/storage manufacturer by himself.
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
For the server/storage device, it is required to have good reliability because the loss and cost of data loss, shutdown and line stop caused by hard disk failure are huge, and the maintenance cost is high, so the hard disk used by the server/storage device is generally an industrial hard disk, and the stability and reliability of the industrial hard disk are much higher than those of a consumer hard disk.
However, for the user, considering the cost or data transfer, the hard disk provided by the server/storage manufacturer may be replaced by the consumer hard disk by himself, which causes the reliability of the server/storage device to be reduced and even brings huge loss and cost, and based on this, the present application provides a method for identifying the hard disk, which is used for solving the above problems.
Referring to fig. 1, fig. 1 is a flowchart of a hard disk identification method according to an embodiment of the present disclosure.
The method specifically comprises the following steps:
s101: when the equipment is powered on and started or the hard disk is inserted into the equipment, reading the unique identifier of the hard disk;
the unique identifier of the hard disk mentioned herein may specifically include, but is not limited to, at least one of a hard disk ID, an SN code, and a PN code.
S102: judging whether a ciphertext exists in a reserved area of the hard disk;
if yes, go to step S103;
optionally, when the cipher text is not stored in the reserved area of the hard disk, it is proved that the hard disk is not a hard disk provided by a server/storage manufacturer, and a consumer-grade hard disk replaced by a user with a high probability is provided, and at this time, the hard disk can be prohibited from being used, so as to further avoid the problem of reliability reduction of the server/storage device, and reduce the probability of occurrence of huge loss.
S103: reading the ciphertext, and decrypting the ciphertext into a plaintext by combining a preset key;
optionally, the ciphertext mentioned here is obtained by encrypting the unique identifier in combination with a preset key, and the ciphertext is set for the hard disk meeting the requirement in advance, so that the hard disk can be used by the device, where the process of setting the ciphertext for the hard disk in advance mentioned here may specifically be:
determining the level of the hard disk according to the input customization requirement;
encrypting the unique identifier of the hard disk by using the secret key corresponding to the hard disk level to obtain a ciphertext;
and writing the cipher text into the reserved area of the hard disk.
The encryption mentioned here may be encryption according to a preset symmetric encryption algorithm, which may include but is not limited to at least one of AES encryption algorithm, DES encryption algorithm, SM4 encryption algorithm, and the server/storage vendor may select according to the actual production environment;
when the reserved area of the hard disk has the ciphertext, the hard disk is indicated to be a hard disk provided by a server/storage manufacturer possibly, the ciphertext is read at the moment, and the ciphertext is decrypted into a plaintext by combining a preset key, so that whether the hard disk is the hard disk provided by the server/storage manufacturer is judged by judging whether the plaintext is the same as the unique identifier;
optionally, the ciphertext is decrypted into a plaintext by combining with a preset key, where the preset key may specifically be a key set by a server/storage manufacturer according to conditions such as a production environment, or may also be a key acquired by logging in a preset website by a system.
S104: judging whether the plaintext is the same as the unique identifier;
if not, the step S105 is executed;
when the plaintext is different from the unique identifier, the plaintext indicates that the hard disk and the device may not be manufactured by the same server/storage manufacturer, or the hard disk and the device belong to different grades, that is, the hard disk does not meet the requirements of the device, and the hard disk is forbidden at this moment;
optionally, when the plaintext is the same as the unique identifier, the hard disk can be normally used
S105: the hard disk is prohibited from being used.
Preferably, after the hard disk is forbidden to be used, prompt information that the hard disk does not meet the standard can be output, so that a user can replace the hard disk meeting the requirement in time.
Based on the technical scheme, the method for identifying the hard disk, provided by the application, has the advantages that the cipher text is preset for the hard disk, so that when equipment is powered on and started or the hard disk is inserted into the equipment, the unique identifier of the hard disk is read, and whether the cipher text exists in the reserved area of the hard disk or not is judged; if so, reading the ciphertext, and decrypting the ciphertext into a plaintext by combining a preset key; judging whether the plaintext is the same as the unique identifier; if the plaintext is different from the unique identifier, the hard disk is forbidden to be used, so that the risk that a user replaces the hard disk provided by a non-server/storage manufacturer by himself is avoided, the problem that the reliability of the server/storage equipment is reduced is further avoided, and the probability of huge loss is reduced.
For the step S103 of the previous embodiment, the ciphertext is decrypted into a plaintext by combining with the preset key, and specifically, the corresponding key may also be selected according to the device level of the current device, which is described below with reference to fig. 2.
Referring to fig. 2, fig. 2 is a flowchart illustrating an actual representation manner of S103 in the method for identifying a hard disk provided in fig. 1.
The method specifically comprises the following steps:
s201: acquiring the equipment level of the current equipment;
the device classes referred to herein may be specifically classified as low-end, medium-end, high-end devices.
S202: searching a key corresponding to the equipment level in a preset key table;
s203: the cipher text is decrypted into plaintext in combination with the key.
The equipment level can be divided according to the application environment and the equipment attribute of the equipment, and the equipment in different levels has different requirements on the rotating speed, the medium and the interface type of the hard disk, so that when the cipher text is set for the hard disk, the hard disks with different attributes can be encrypted by different secret keys, and based on the cipher text encryption method, when the cipher text is decrypted into the plaintext by combining with the preset secret key, the equipment level of the current equipment is firstly obtained; then, a secret key corresponding to the equipment level is searched in a preset secret key table; and finally, the cipher text is decrypted into a plaintext by combining the key, and the decryption of the cipher text is completed.
Referring to fig. 3, fig. 3 is a structural diagram of a hard disk identification system according to an embodiment of the present disclosure.
The system may include:
the reading module 100 is configured to read a unique identifier of a hard disk when the device is powered on and started or the hard disk is inserted into the device;
a first judging module 200, configured to judge whether a ciphertext exists in a reserved area of the hard disk;
the decryption module 300 is configured to, when a ciphertext exists in the reserved area of the hard disk, read the ciphertext and decrypt the ciphertext into a plaintext by combining with a preset key;
a second judging module 400, configured to judge whether the plaintext is the same as the unique identifier;
a first disabling module 500 for disabling the hard disk when the plaintext is different from the unique identifier.
Referring to fig. 4, fig. 4 is a block diagram of another hard disk identification system according to an embodiment of the present disclosure.
The decryption module 300 may include:
the obtaining submodule is used for obtaining the equipment level of the current equipment;
the searching submodule is used for searching the secret key corresponding to the equipment level in a preset secret key table;
and the decryption submodule is used for decrypting the ciphertext into a plaintext by combining the key.
The system may further comprise:
and the second forbidding module is used for forbidding to use the hard disk when the cipher text is not stored in the reserved area of the hard disk.
The system may further comprise:
the determining module is used for determining the hard disk grade according to the input customization requirement;
the encryption module is used for encrypting the unique identifier of the hard disk by using the secret key corresponding to the hard disk level to obtain a ciphertext;
and the writing module is used for writing the ciphertext into the reserved area of the hard disk.
The various components of the above system may be practically applied in the following embodiments:
when the equipment is powered on and started or the hard disk is inserted into the equipment, the reading module reads the unique identifier of the hard disk; the first judging module judges whether a ciphertext exists in a reserved area of the hard disk or not; when the reserved area of the hard disk does not contain the ciphertext, the second forbidding module forbids to use the hard disk;
when a cipher text is stored in a reserved area of the hard disk, the obtaining submodule obtains the equipment level of the current equipment; the searching submodule searches the secret key corresponding to the equipment level in a preset secret key table; the decryption submodule decrypts the ciphertext into a plaintext by combining the secret key; the second judging module judges whether the plaintext is the same as the unique identifier; when the plaintext is different from the unique identifier, the first disabling module disables the hard disk; the output module outputs prompt information that the hard disk does not meet the standard.
Referring to fig. 5, fig. 5 is a structural diagram of a hard disk identification device according to an embodiment of the present application.
The hard disk identification device 600 may have relatively large differences due to different configurations or performances, and may include one or more processors (CPUs) 622 (e.g., one or more processors) and memory 632, one or more storage media 630 (e.g., one or more mass storage devices) storing applications 642 or data 644. Memory 632 and storage medium 630 may be, among other things, transient or persistent storage. The program stored in the storage medium 630 may include one or more modules (not shown), each of which may include a sequence of instructions operating on the device. Still further, the central processor 622 may be configured to communicate with the storage medium 630 and execute a series of instruction operations in the storage medium 630 on the hard disk identification device 600.
Hard disk identification apparatus 600 may also include one or more power supplies 626, one or more wired or wireless network interfaces 650, one or more input-output interfaces 658, and/or one or more operating systems 641, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
The steps in the hard disk identification method described in fig. 1 to 2 above are implemented by the hard disk identification device based on the structure shown in fig. 5.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the apparatus and the module described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus, device and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of modules is merely a division of logical functions, and an actual implementation may have another division, for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
Modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a function calling device, or a network device) to execute all or part of the steps of the method of the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The method, system, device and computer readable storage medium for hard disk identification provided by the present application are described in detail above. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.
It is further noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.

Claims (6)

1. A method for identifying a hard disk, comprising:
when equipment is powered on and started or a hard disk is inserted into the equipment, reading the unique identifier of the hard disk;
judging whether a ciphertext exists in a reserved area of the hard disk or not; the ciphertext is generated by encrypting the unique identifier;
if so, reading the ciphertext, and decrypting the ciphertext into a plaintext by combining a preset key;
judging whether the plaintext is the same as the unique identifier;
if the plaintext is different from the unique identifier, the hard disk is forbidden to be used;
the decrypting the ciphertext into the plaintext by combining the preset key comprises the following steps:
acquiring the equipment level of the current equipment;
searching a secret key corresponding to the equipment level in a preset secret key table;
decrypting the ciphertext into plaintext by combining the secret key;
wherein the process of generating the ciphertext comprises:
determining the level of the hard disk according to the input customization requirement;
encrypting the unique identifier of the hard disk by using the secret key corresponding to the hard disk level to obtain a ciphertext;
and writing the ciphertext into a reserved area of the hard disk.
2. The method of claim 1, wherein when the ciphertext is not stored in the reserved area of the hard disk, the method further comprises:
the hard disk is prohibited from being used.
3. A system for hard disk identification, comprising:
the reading module is used for reading the unique identifier of the hard disk when the equipment is powered on and started or the hard disk is inserted into the equipment;
the first judgment module is used for judging whether a ciphertext exists in a reserved area of the hard disk or not;
the decryption module is used for reading the ciphertext when the ciphertext exists in the reserved area of the hard disk and decrypting the ciphertext into plaintext by combining with a preset key;
the second judgment module is used for judging whether the plaintext is the same as the unique identifier or not;
the first forbidding module is used for forbidding to use the hard disk when the plaintext is different from the unique identifier;
wherein the decryption module comprises:
the obtaining submodule is used for obtaining the equipment level of the current equipment;
the searching submodule is used for searching the secret key corresponding to the equipment level in a preset secret key table;
the decryption submodule is used for decrypting the ciphertext into a plaintext by combining the secret key;
wherein the system further comprises:
the determining module is used for determining the hard disk grade according to the input customization requirement;
the encryption module is used for encrypting the unique identifier of the hard disk by using the secret key corresponding to the hard disk level to obtain a ciphertext;
and the writing module is used for writing the ciphertext into the reserved area of the hard disk.
4. The system of claim 3, further comprising:
and the second forbidding module is used for forbidding to use the hard disk when the cipher text is not stored in the reserved area of the hard disk.
5. A hard disk identification device, comprising:
a memory for storing a computer program;
processor for implementing the steps of the method for hard disk identification according to claim 1 or 2 when executing said computer program.
6. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the method for hard disk identification according to claim 1 or 2.
CN201810745205.0A 2018-07-09 2018-07-09 Hard disk identification method, system, equipment and computer readable storage medium Active CN108898005B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810745205.0A CN108898005B (en) 2018-07-09 2018-07-09 Hard disk identification method, system, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810745205.0A CN108898005B (en) 2018-07-09 2018-07-09 Hard disk identification method, system, equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN108898005A CN108898005A (en) 2018-11-27
CN108898005B true CN108898005B (en) 2021-06-11

Family

ID=64349216

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810745205.0A Active CN108898005B (en) 2018-07-09 2018-07-09 Hard disk identification method, system, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108898005B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109657447B (en) * 2018-11-28 2023-03-14 腾讯科技(深圳)有限公司 Equipment fingerprint generation method and device
CN109582238B (en) * 2018-12-03 2022-02-18 郑州云海信息技术有限公司 Hard disk binding and matching method and system, electronic equipment and storage medium
CN109660609B (en) * 2018-12-07 2019-12-06 北京海泰方圆科技股份有限公司 equipment identification method and device and storage medium
CN110674522B (en) * 2019-09-27 2022-06-17 苏州浪潮智能科技有限公司 Hard disk encryption method, device, server, system and storage medium
CN111414606A (en) * 2020-03-18 2020-07-14 一汽-大众汽车有限公司 Robot interface management method and device
CN112905120B (en) * 2021-02-19 2023-08-04 山东英信计算机技术有限公司 Lock disc upgrading method and device, electronic equipment and storage medium
CN114465805A (en) * 2022-02-18 2022-05-10 深圳市优博讯科技股份有限公司 Active identification control method and system
CN115001702A (en) * 2022-05-19 2022-09-02 浪潮思科网络科技有限公司 Switch board encryption and decryption method, system, device and medium
CN114943072B (en) * 2022-07-25 2023-05-05 北京网藤科技有限公司 Method and system for realizing U disk linkage management and control among various software systems

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1745400A (en) * 2003-01-31 2006-03-08 松下电器产业株式会社 Semiconductor memory card, and program for controlling the same

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7758422B2 (en) * 2005-04-13 2010-07-20 Microsoft Corporation Hard drive authentication
US8065509B2 (en) * 2006-09-26 2011-11-22 Hewlett-Packard Development Company, L.P. Persistent security system and method
CN101615161B (en) * 2009-07-28 2012-07-18 成都市华为赛门铁克科技有限公司 Method for encrypting and decrypting hard disk, hard disk driving device and hard disk

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1745400A (en) * 2003-01-31 2006-03-08 松下电器产业株式会社 Semiconductor memory card, and program for controlling the same

Also Published As

Publication number Publication date
CN108898005A (en) 2018-11-27

Similar Documents

Publication Publication Date Title
CN108898005B (en) Hard disk identification method, system, equipment and computer readable storage medium
CN108599930B (en) Firmware encryption and decryption system and method
CN111539813B (en) Method, device, equipment and system for backtracking processing of business behaviors
CN106529308B (en) data encryption method and device and mobile terminal
CN103617401A (en) Method and device for protecting data files
CN104615929A (en) Security key device for secure cloud services, and system and method of providing security cloud services
CN105069365A (en) Data processing method and mobile terminal
CN112734361B (en) Distributed cooperative office data processing method and system
CN110188555A (en) A kind of hard disk data protection method, system and associated component
CN105337722A (en) Data encryption method and apparatus
CN111596938A (en) Embedded equipment firmware safety upgrading method, system, terminal and storage medium
CN111258756A (en) Load balancing method and device, computer equipment and readable storage medium
CN111726230A (en) Data storage method, data recovery method, device and equipment
CN112287376A (en) Method and device for processing private data
CN111259382A (en) Malicious behavior identification method, device and system and storage medium
US20200044838A1 (en) Data encryption method and system using device authentication key
CN110059081A (en) Data output method, device and the computer equipment shown based on data
KR20190134817A (en) Method of restoring a secure element to a factory state
CN115757535A (en) Data query method, data storage method and device and electronic equipment
CN111339523B (en) Authorization method and device for embedded equipment
CN113992345A (en) Method and device for encrypting and decrypting webpage sensitive data, electronic equipment and storage medium
CN114124469A (en) Data processing method, device and equipment
CN104484611A (en) Partition-mounting control method and device of Android system
CN112506810B (en) Storage space distribution method applied to chip and chip
CN108038368B (en) Data processing method and device, storage medium and processor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant