CN113076564B - Hard disk protection method, device and equipment based on Beidou positioning and storage medium - Google Patents

Hard disk protection method, device and equipment based on Beidou positioning and storage medium Download PDF

Info

Publication number
CN113076564B
CN113076564B CN202110397854.8A CN202110397854A CN113076564B CN 113076564 B CN113076564 B CN 113076564B CN 202110397854 A CN202110397854 A CN 202110397854A CN 113076564 B CN113076564 B CN 113076564B
Authority
CN
China
Prior art keywords
hard disk
data
instruction
preset
sending
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110397854.8A
Other languages
Chinese (zh)
Other versions
CN113076564A (en
Inventor
陈重
栾风翔
刘军
吴润乐
陈发忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Beidou Cloud Information Technology Co ltd
Original Assignee
Shandong Beidou Cloud Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Beidou Cloud Information Technology Co ltd filed Critical Shandong Beidou Cloud Information Technology Co ltd
Priority to CN202110397854.8A priority Critical patent/CN113076564B/en
Publication of CN113076564A publication Critical patent/CN113076564A/en
Application granted granted Critical
Publication of CN113076564B publication Critical patent/CN113076564B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of data protection, and discloses a hard disk protection method, a device, equipment and a storage medium based on Beidou positioning, wherein the method comprises the steps of acquiring Beidou positioning information of a hard disk in real time, and determining position coordinates of the hard disk according to the Beidou positioning information; when the position coordinate is out of the preset range, sending a read-write forbidding instruction to the hard disk so that the hard disk forbids a read-write function according to the read-write forbidding instruction; acquiring the duration of the hard disk outside a preset range; the data destruction instruction is sent to the hard disk when the duration is longer than the preset duration, so that the hard disk destroys the stored data according to the data destruction instruction.

Description

Hard disk protection method, device and equipment based on Beidou positioning and storage medium
Technical Field
The invention relates to the technical field of data protection, in particular to a hard disk protection method, a device, equipment and a storage medium based on Beidou positioning.
Background
With the development of storage technology, the storage capacity of a hard disk is larger and larger, the reading and writing speed is higher and higher, people rely more on using a large-capacity hard disk to store data, but once the hard disk is lost, the stored data has a risk of leakage, and a great economic loss may be caused to a hard disk owner.
The above is only for the purpose of assisting understanding of the technical solution of the present invention, and does not represent an admission that the above is the prior art.
Disclosure of Invention
The invention mainly aims to provide a Beidou positioning-based hard disk protection method, a Beidou positioning-based hard disk protection device, beidou positioning-based hard disk protection equipment and a storage medium, and aims to solve the technical problem of data leakage caused by hard disk loss in the prior art.
In order to achieve the purpose, the invention provides a hard disk protection method based on Beidou positioning, which comprises the following steps:
acquiring Beidou positioning information of a hard disk in real time, and determining the position coordinate of the hard disk according to the Beidou positioning information;
when the position coordinate is out of a preset range, sending a read-write forbidding instruction to the hard disk so that the hard disk forbids a read-write function according to the read-write forbidding instruction;
acquiring the duration of the hard disk outside a preset range;
and when the duration is longer than the preset duration, sending a data destruction instruction to the hard disk so that the hard disk destroys the stored data according to the data destruction instruction.
Optionally, the sending a data destruction instruction to the hard disk when the duration is longer than a preset duration so that the hard disk destroys the stored data according to the data destruction instruction includes:
when the duration is longer than the preset duration, acquiring the security priority of the data stored in the hard disk;
and sending a data destruction instruction to the hard disk so that the hard disk destroys the stored data according to the data destruction instruction and the security priority.
Optionally, the sending a data destruction instruction to the hard disk to enable the hard disk to destroy stored data according to the data destruction instruction and the security priority includes:
sending a data destruction instruction to the hard disk so that the hard disk overwrites the stored data according to the data destruction instruction and the security priority;
when the overwriting of the stored data is completed, the built-in resistance coil of the hard disk is controlled to be electrified to generate a strong magnetic field to destroy the overwritten stored data.
Optionally, after obtaining the Beidou positioning information of the hard disk in real time and determining the position coordinates of the hard disk according to the Beidou positioning information, the method further includes:
monitoring shell state information of the hard disk through a preset sensor, and judging whether the shell of the hard disk is illegally opened according to the shell state information;
and when the shell of the hard disk is illegally opened, sending a data destruction instruction to the hard disk so that the hard disk destroys the stored data according to the data destruction instruction.
Optionally, the monitoring, by a preset sensor, the casing state information of the hard disk, and determining whether the casing of the hard disk is illegally opened according to the casing state information includes:
monitoring the distance change between the shell of the hard disk and internal elements of the hard disk and the light intensity inside the hard disk shell by a preset sensor;
and when the distance change is greater than a preset distance threshold value or the light intensity is greater than a preset intensity, judging that the shell of the hard disk is illegally opened.
Optionally, after the sending a read-write prohibition instruction to the hard disk to disable the read-write function according to the read-write prohibition instruction when the position coordinate is outside the preset range, the method further includes:
sending a data transmission instruction and a preset generating polynomial to the hard disk so that the hard disk generates backup data according to the preset generating polynomial and a hard disk storage data sequence, and sending the backup data to a cloud end;
and when the cloud end receives the backup data, the preset generating polynomial is sent to the cloud end, so that the cloud end carries out cyclic redundancy check on the backup data according to the preset generating polynomial, and when the check is passed, the backup data is marked as safe storage data.
Optionally, after the sending a read-write forbidding instruction to the hard disk to disable the read-write function according to the read-write forbidding instruction when the position coordinate is outside the preset range, the method further includes:
acquiring a fingerprint verification result of the hard disk when the position coordinate of the hard disk is changed from being out of a preset range to being within the preset range within a preset time;
when the fingerprint verification result is that the fingerprint verification passes, sending a restoration instruction to the hard disk so that the hard disk is restored to a normal read-write state according to the restoration instruction;
and when the fingerprint verification result is that the verification fails, sending a data destruction instruction to the hard disk so that the hard disk destroys the stored data according to the destruction instruction.
In addition, in order to achieve the above object, the present invention further provides a hard disk protection device based on Beidou positioning, wherein the device includes:
the determining module is used for acquiring Beidou positioning information of the hard disk in real time and determining the position coordinate of the hard disk according to the Beidou positioning information;
the forbidding module is used for sending a reading and writing forbidding instruction to the hard disk when the position coordinate is out of a preset range so that the hard disk forbids the reading and writing function according to the reading and writing forbidding instruction;
the acquisition module is used for acquiring the duration of the hard disk outside a preset range;
and the destruction module is used for sending a data destruction instruction to the hard disk when the duration is longer than the preset duration so that the hard disk destroys the stored data according to the data destruction instruction.
In addition, in order to achieve the above object, the present invention further provides a hard disk protection device based on Beidou positioning, wherein the device includes: the hard disk protection program based on Beidou positioning is configured to realize the steps of the hard disk protection method based on Beidou positioning.
In addition, in order to achieve the above object, the present invention further provides a storage medium, where the storage medium stores a hard disk protection program based on Beidou positioning, and the hard disk protection program based on Beidou positioning implements the steps of the hard disk protection method based on Beidou positioning when executed by a processor.
According to the method, the Beidou positioning information of the hard disk is acquired in real time, and the position coordinate of the hard disk is determined according to the Beidou positioning information; when the position coordinate is out of the preset range, sending a read-write forbidding instruction to the hard disk so that the hard disk forbids the read-write function according to the read-write forbidding instruction; acquiring the duration of the hard disk outside a preset range; when the duration is longer than the preset duration, a data destruction instruction is sent to the hard disk so that the hard disk destroys the stored data according to the data destruction instruction.
Drawings
Fig. 1 is a schematic structural diagram of a hard disk protection device based on Beidou positioning in a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart of a first embodiment of a hard disk protection method based on Beidou positioning according to the present invention;
FIG. 3 is a schematic flow chart of a second embodiment of the hard disk protection method based on Beidou positioning according to the present invention;
FIG. 4 is a schematic flow chart of a third embodiment of a hard disk protection method based on Beidou positioning according to the present invention;
fig. 5 is a structural block diagram of a first embodiment of the hard disk protection device based on Beidou positioning.
The implementation, functional features and advantages of the present invention will be further described with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a hard disk protection device based on Beidou positioning in a hardware operating environment according to an embodiment of the present invention.
As shown in fig. 1, the hard disk protection device based on Beidou positioning may include: a processor 1001, such as a Central Processing Unit (CPU), a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a WIreless interface (e.g., a WIreless-FIdelity (WI-FI) interface). The Memory 1005 may be a Random Access Memory (RAM) Memory, or may be a Non-Volatile Memory (NVM), such as a disk Memory. The memory 1005 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the configuration shown in fig. 1 does not constitute a limitation of the Beidou positioning based hard disk protection device, and may include more or fewer components than those shown, or some components in combination, or a different arrangement of components.
As shown in fig. 1, the memory 1005, which is a storage medium, may include an operating system, a data storage module, a network communication module, a user interface module, and a hard disk protection program based on the beidou positioning.
In the hard disk protection device based on the beidou positioning shown in fig. 1, the network interface 1004 is mainly used for data communication with a network server; the user interface 1003 is mainly used for data interaction with a user; the processor 1001 and the memory 1005 of the hard disk protection device based on Beidou positioning can be arranged in the hard disk protection device based on Beidou positioning, and the hard disk protection device based on Beidou positioning calls the hard disk protection program based on Beidou positioning stored in the memory 1005 through the processor 1001 and executes the hard disk protection method based on Beidou positioning provided by the embodiment of the invention.
The embodiment of the invention provides a hard disk protection method based on Beidou positioning, and referring to FIG. 2, FIG. 2 is a schematic flow diagram of a first embodiment of the hard disk protection method based on Beidou positioning.
In this embodiment, the hard disk protection method based on Beidou positioning includes the following steps:
step S10: acquiring Beidou positioning information of a hard disk in real time, and determining the position coordinate of the hard disk according to the Beidou positioning information;
it should be noted that the execution main body of the embodiment is a hard disk protection device based on the Beidou positioning, the device may be a smart phone, a smart watch, a portable computer or other devices with the same or similar functions, and the embodiment takes the hard disk protection device based on the Beidou positioning as an example for description, and does not constitute a limitation to the embodiment.
It should be understood that the Beidou satellite navigation system consists of a space section, a ground section and a user section, can provide high-precision, high-reliability positioning, navigation and time service for various users all day long in the world, has short message communication capacity, and initially has regional navigation, positioning and time service capacities, wherein the positioning precision is decimeter and centimeter level, the speed measurement precision is 0.2 meter/second, and the time service precision is 10 nanoseconds.
Understandably, the Beidou chip is preassembled in the hard disk and can receive signals transmitted by a Beidou satellite so as to complete positioning, and communication connection is established between the hard disk and hard disk protection equipment based on Beidou positioning so that Beidou positioning information of the hard disk can be acquired in real time.
It should be understood that Beidou positioning can provide positioning with centimeter-level accuracy, and accurate position coordinates of the hard disk in the space can be determined through Beidou positioning information.
Step S20: when the position coordinate is out of a preset range, sending a read-write forbidding instruction to the hard disk so that the hard disk forbids a read-write function according to the read-write forbidding instruction;
it can be understood that the preset range is a safe space range where the hard disk is located, and can be set according to specific use conditions, for example, the hard disk is used in an office within a period of time, and at this time, the preset range can be set as the space range of the office, and if the use place of the hard disk is changed, the preset range can be set as the space range of a new use place.
It should be understood that when the position coordinate of the hard disk is determined to be within the preset range through the Beidou positioning information of the hard disk, the hard disk is used within the safety range, at the moment, the hard disk can be normally used, when the position coordinate of the hard disk is outside the preset range, the hard disk is used outside the safety range, and at the moment, the risk of leakage of hard disk data exists.
It can be understood that when the position coordinates of the hard disk are used for determining that the hard disk is out of the preset range, the hard disk may be taken away from the preset range by a hard disk user, at the moment, a read-write forbidding instruction is sent to the hard disk, and after the hard disk receives the instruction, the read-write function of the hard disk is forbidden.
It should be understood that, in order to remind the user to find the position of the hard disk in time, when the position coordinates of the hard disk are determined to be out of the preset range, prompt information is sent to the hard disk protection device to remind the user to respond according to actual conditions in time.
Step S30: acquiring the duration of the hard disk outside a preset range;
it should be understood that, when it is determined that the hard disk is outside the preset range according to the position coordinates of the hard disk, timing may be started to obtain the duration of time that the hard disk is outside the preset range.
Step S40: and when the duration is longer than the preset duration, sending a data destruction instruction to the hard disk so that the hard disk destroys the stored data according to the data destruction instruction.
It can be understood that the preset time is the safe time when the hard disk is outside the preset range, and when the time when the hard disk is outside the preset range is longer than the preset time, it indicates that the risk of hard disk data leakage has reached the highest level, and at this time, the hard disk data needs to be destroyed.
It should be understood that the data destruction instruction is an instruction for controlling the hard disk to destroy the stored data, which is sent by the hard disk protection device based on the beidou, and after receiving the instruction, the hard disk starts the operation of destroying the data.
Further, in order to improve the security of the hard disk data, the step S40 includes:
when the duration is longer than the preset duration, acquiring the security priority of the data stored in the hard disk; and sending a data destruction instruction to the hard disk so that the hard disk destroys the stored data according to the data destruction instruction and the security priority.
It will be appreciated that security priority is the priority set by the hard disk owner in terms of the importance of storing data.
It should be understood that when the duration of the hard disk outside the preset range is longer than the preset duration, the hard disk data needs to be destroyed, at this time, the security priority of the hard disk data stored is first obtained, and the importance degree of the hard disk data stored can be obtained according to the security priority.
It can be understood that a certain time is required for destroying data, in the process of destroying data, a situation that protective measures of a hard disk are cracked exists, if important stored data are not completely destroyed at the moment, great loss can be caused, when the hard disk is used for storing data, a safety priority can be set according to the importance degree of the data, when the data are destroyed, the importance degree of the data can be determined according to the safety priority, the data with high safety priority are destroyed first, and therefore leakage of the important data is avoided to the greatest extent.
Further, in order to ensure that the data stored in the hard disk cannot be restored after being destroyed and improve the security of the data, the sending of the data destruction instruction to the hard disk so that the hard disk destroys the stored data according to the data destruction instruction and the security priority includes:
sending a data destruction instruction to the hard disk so that the hard disk overwrites the stored data according to the data destruction instruction and the security priority; when the overwriting of the stored data is completed, the built-in resistance coil of the hard disk is controlled to be electrified to generate a strong magnetic field to destroy the overwritten stored data.
It will be appreciated that overwriting is the process of writing non-secure data to the hard disk cluster that stores the secure data. The data on the hard disk are stored in binary "1" and "0" forms. The original stored secret data on the hard disk is repeatedly covered by meaningless and irregular information, so that the original data can not be known to be 1 or 0, and the purpose of destroying the hard disk data is achieved. The data can be divided into bit-by-bit overwriting, skip bit overwriting, random overwriting and other modes according to the specific sequence when the data is overwritten. A
It should be understood that the magnetic grains on the disk surface of the hard disk are arranged along the track direction, and different N/S pole connection directions represent data 0 and 1, respectively, so as to achieve the effect of recording data.
It can be understood that the resistance coil and the power supply for supplying power to the resistance coil are arranged in the hard disk, after the data stored in the hard disk is destroyed by overwriting, the resistance coil arranged in the hard disk is electrified, a strong magnetic field can be generated instantly, after the hard disk is influenced by the strong magnetic field, the magnetic particles can be uniformly arranged along the field intensity direction to become 0 or 1 with a clear color, the data recorded in the hard disk can be erased, and the hard disk can lose the data recording function.
Further, after step S20, to implement backup of lost hard disk data, the method further includes: sending a data transmission instruction and a preset generating polynomial to the hard disk so that the hard disk generates backup data according to the preset generating polynomial and a hard disk storage data sequence, and sending the backup data to a cloud end; and when the cloud end receives the backup data, the preset generating polynomial is sent to the cloud end, so that the cloud end carries out cyclic redundancy check on the backup data according to the preset generating polynomial, and when the check is passed, the backup data is marked as safe storage data.
It should be understood that, in order to back up important data in a lost hard disk, a communication module may be built in the hard disk for transmitting data, a data transmission error may occur during data transmission, and in order to ensure accuracy of data transmission, a cyclic redundancy check algorithm may be used to check the transmitted data.
It is understood that the predetermined generator polynomial is a polynomial that generates a cyclic redundancy check code when performing a cyclic redundancy check algorithm.
It can be understood that when the cyclic redundancy check algorithm is used for checking the transmitted storage data, the preset generating polynomial is sent to the hard disk, when the hard disk transmits the storage data, the cyclic redundancy check code is generated according to the preset generating polynomial, and then the backup data is generated according to the storage data and the cyclic redundancy check code and transmitted to the cloud.
It should be understood that after the cloud receives the backup data, the accuracy of the received backup data needs to be checked, at this time, the hard disk protection device based on the Beidou positioning sends the preset generating polynomial to the cloud, the preset generating polynomial is used for dividing the polynomial of the backup data, if the polynomial can be divided completely, the transmitted data is correct, the check is passed, and at this time, the backup data is marked as safe data.
In a particular implementation, for example: presetting a generator polynomial as G (x) = x 4 + x +1, whose binary expression is 10011, 5 bits in total, where k =4, assuming that the binary of the storage data sequence to be transmitted by the hard disk is 101011, adding 40 s after the storage data to be transmitted, and the binary expression is 1010110000, 10 bits in total, at this time, removing 1010110000 from the binary expression 10011 of the preset generating polynomial, obtaining 0100 as the redundant cyclic check code according to the modulo-2 algorithm, adding the cyclic redundancy check code to the back of the data to be transmitted, and obtaining the bit stream of the backup data transmitted to the cloud: 1010110100, wherein the first 6 bits are original data and the last 4 bits are cyclic redundancy check codeAfter receiving the backup data with the cyclic redundancy check code, dividing the backup data by the generating polynomial, if the data has no error in the transmission process, the data can be definitely divided by the same generating polynomial G (x), and if the data has an error in the transmission process, the result obtained after the generating polynomial G (x) is removed is certainly not 0.
In the embodiment, the position coordinates of the hard disk are determined according to the Beidou positioning information by acquiring the Beidou positioning information of the hard disk in real time; when the position coordinate is out of the preset range, sending a read-write forbidding instruction to the hard disk so that the hard disk forbids a read-write function according to the read-write forbidding instruction; acquiring the duration of the hard disk outside a preset range; when the duration is longer than the preset duration, a data destruction instruction is sent to the hard disk so that the hard disk destroys the stored data according to the data destruction instruction.
Referring to fig. 3, fig. 3 is a schematic flow chart of a hard disk protection method based on Beidou positioning according to a second embodiment of the present invention.
Based on the first embodiment, in this embodiment, after the step S10, the method further includes:
step S101: monitoring shell state information of the hard disk through a preset sensor, and judging whether the shell of the hard disk is illegally opened according to the shell state information;
it should be understood that the preset sensor includes a light sensor and a distance sensor, and the change of the hard disk housing can be judged according to the data monitored by the sensor.
It will be understood that illegal opening includes breaking the housing with brute force, opening the housing without opening authority, or otherwise opening the housing.
It can be understood that when the hard disk shell is damaged, the light detected by the light sensor and the distance detected by the distance sensor are changed, so that whether the shell is illegally opened can be judged.
Step S102: and when the shell of the hard disk is illegally opened, sending a data destruction instruction to the hard disk so that the hard disk destroys the stored data according to the data destruction instruction.
Understandably, when the shell is illegally opened, in order to avoid data leakage, the hard disk protection device based on Beidou positioning sends a data destruction instruction, so that the hard disk destroys the stored data according to the instruction.
Further, in order to improve the accuracy of determining whether the hard disk shell is illegally opened, the method of monitoring the shell state information of the hard disk through the preset sensor and determining whether the hard disk shell is illegally opened according to the shell state information includes:
monitoring the distance change between the shell of the hard disk and the internal elements of the hard disk and the light intensity inside the hard disk shell by a preset sensor; and when the distance change is greater than a preset distance threshold value or the light intensity is greater than a preset intensity, judging that the shell of the hard disk is illegally opened.
It will be appreciated that in determining the change in distance, an internal element of the hard disk may be selected as a reference, and that in normal use of the hard disk, the distance between the sensor and the internal element of the reference is unchanged or changes very little.
It can be understood that when the hard disk is normally used, the light intensity inside the hard disk shell is basically unchanged, so that the sensor can be used for monitoring the light intensity inside the shell to judge whether the shell is illegally opened.
It can be understood that the preset distance threshold is a value of the maximum distance change generated by the shell relative to the internal element of the reference when the shell is deformed normally, and the preset intensity is the maximum illumination intensity which can be monitored in the shell when the hard disk is in normal use.
In the embodiment, the shell state information of the hard disk is monitored through a preset sensor, and whether the shell of the hard disk is illegally opened or not is judged according to the shell state information; when the shell of the hard disk is illegally opened, a data destruction instruction is sent to the hard disk so that the hard disk destroys the stored data according to the data destruction instruction.
Referring to fig. 4, fig. 4 is a schematic flowchart of a hard disk protection method based on Beidou positioning according to a third embodiment of the present invention.
Based on the foregoing embodiments, in this embodiment, after the step S20, the method further includes:
step S201: acquiring a fingerprint verification result of the hard disk when the position coordinate of the hard disk is changed from being out of a preset range to being within the preset range within a preset time;
understandably, after fingerprint verification is carried out on the hard disk by the built-in fingerprint identification module of the hard disk, the hard disk can send a fingerprint verification result to the hard disk protection equipment based on Beidou positioning.
It should be understood that when the hard disk is outside the preset range, the hard disk is controlled to disable the read-write function, if the position coordinates of the hard disk are determined to be within the preset time, the hard disk returns to the preset range from outside the preset range, the risk of data leakage of the hard disk can be judged to be low, and the hard disk can be normally used after fingerprint verification.
Step S202: when the fingerprint verification result is that the fingerprint verification passes, sending a restoration instruction to the hard disk so that the hard disk is restored to a normal read-write state according to the restoration instruction;
it can be understood that the condition that the fingerprint verification passes can be that at least one fingerprint verification is successful within the preset times, at the moment, the forbidden read-write function is removed, and the hard disk is restored to the normal state.
Step S203: and when the fingerprint verification result is that the verification fails, sending a data destruction instruction to the hard disk so that the hard disk destroys the stored data according to the destruction instruction.
It can be understood that the condition of fingerprint verification failure can be that fingerprint verification fails completely within preset times, at this time, the stored data of the hard disk has a leakage risk, a data destruction instruction is sent to the hard disk, and the stored data of the hard disk is destroyed after the hard disk receives the instruction.
In the embodiment, when the position coordinate of the hard disk is changed from being out of the preset range to being within the preset range within the preset time, the fingerprint verification result of the hard disk is obtained; when the fingerprint verification result is that the fingerprint verification passes, sending a restoration instruction to the hard disk so that the hard disk is restored to a normal read-write state according to the restoration instruction; and when the fingerprint verification result is verification failure, sending a data destruction instruction to the hard disk so that the hard disk destroys stored data according to the destruction instruction.
In addition, the embodiment of the invention also provides a storage medium, wherein the storage medium stores a hard disk protection program based on Beidou positioning, and the hard disk protection program based on Beidou positioning realizes the steps of the hard disk protection method based on Beidou positioning when being executed by a processor.
Referring to fig. 5, fig. 5 is a structural block diagram of a first embodiment of the hard disk protection device based on Beidou positioning.
As shown in fig. 5, the hard disk protection device based on Beidou positioning according to the embodiment of the present invention includes: the device comprises a determination module 10, a disabling module 20, an acquisition module 30 and a destruction module 40.
The determining module 10 is used for acquiring Beidou positioning information of the hard disk in real time and determining the position coordinate of the hard disk according to the Beidou positioning information;
the forbidding module 20 is configured to send a read-write forbidding instruction to the hard disk when the position coordinate is outside a preset range, so that the hard disk forbids a read-write function according to the read-write forbidding instruction;
an obtaining module 30, configured to obtain a duration of the hard disk that is outside a preset range;
and the destruction module 40 is configured to send a data destruction instruction to the hard disk when the duration is longer than a preset duration, so that the hard disk destroys the stored data according to the data destruction instruction.
In the embodiment, the determining module 10 is used for acquiring Beidou positioning information of the hard disk in real time and determining the position coordinate of the hard disk according to the Beidou positioning information; when the position coordinate is out of the preset range, the forbidding module 20 sends a read-write forbidding instruction to the hard disk so that the hard disk forbids the read-write function according to the read-write forbidding instruction; the obtaining module 30 obtains the duration of the hard disk outside the preset range; the destruction module 40 sends a data destruction instruction to the hard disk when the duration is longer than the preset duration, so that the hard disk destroys the stored data according to the data destruction instruction.
Based on the first embodiment of the hard disk protection device based on Beidou positioning, the second embodiment of the hard disk protection device based on Beidou positioning is provided.
In this embodiment, the destruction module 40 is further configured to obtain a security priority of the data stored in the hard disk when the duration is longer than a preset duration; and sending a data destruction instruction to the hard disk so that the hard disk destroys the stored data according to the data destruction instruction and the security priority.
The destruction module 40 is further configured to send a data destruction instruction to the hard disk, so that the hard disk overwrites the stored data according to the data destruction instruction and the security priority; when the data is completely overwritten, the built-in resistance coil of the hard disk is controlled to be electrified to generate a strong magnetic field to destroy the overwritten data.
The determining module 10 is further configured to monitor the casing state information of the hard disk through a preset sensor, and determine whether the casing of the hard disk is illegally opened according to the casing state information; and when the shell of the hard disk is illegally opened, sending a data destruction instruction to the hard disk so that the hard disk destroys the stored data according to the data destruction instruction.
The determining module 10 is further configured to monitor, through a preset sensor, a distance change between a housing of the hard disk and an internal component of the hard disk and a light intensity inside the hard disk housing; and when the distance change is larger than a preset distance threshold value or the light intensity is larger than a preset intensity, judging that the shell of the hard disk is illegally opened.
The disabling module 20 is further configured to send a data transmission instruction and a preset generating polynomial to the hard disk, so that the hard disk generates backup data according to the preset generating polynomial and a hard disk storage data sequence, and sends the backup data to a cloud; and when the cloud end receives the backup data, the preset generating polynomial is sent to the cloud end, so that the cloud end carries out cyclic redundancy check on the backup data according to the preset generating polynomial, and when the check is passed, the backup data is marked as safe storage data.
The disabling module 20 is further configured to obtain a fingerprint verification result of the hard disk when the position coordinate of the hard disk changes from being outside a preset range to being within the preset range within a preset time; when the fingerprint verification result is that the fingerprint verification passes, sending a restoration instruction to the hard disk so that the hard disk is restored to a normal read-write state according to the restoration instruction; and when the fingerprint verification result is that the verification fails, sending a data destruction instruction to the hard disk so that the hard disk destroys the stored data according to the destruction instruction.
Other embodiments or specific implementation manners of the hard disk protection device based on Beidou positioning can refer to the above method embodiments, and are not described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrases "comprising one of 8230; \8230;" 8230; "does not exclude the presence of additional like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are only for description, and do not represent the advantages and disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention or portions thereof contributing to the prior art may be embodied in the form of a software product, where the computer software product is stored in a storage medium (such as a rom/ram, a magnetic disk, and an optical disk), and includes several instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the methods according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention, and all equivalent structures or equivalent processes performed by the present invention or directly or indirectly applied to other related technical fields are also included in the scope of the present invention.

Claims (9)

1. A hard disk protection method based on Beidou positioning is characterized by comprising the following steps:
obtaining Beidou positioning information of a hard disk in real time, and determining the position coordinate of the hard disk according to the Beidou positioning information;
when the position coordinate is out of a preset range, sending a read-write forbidding instruction to the hard disk so that the hard disk forbids a read-write function according to the read-write forbidding instruction;
acquiring the duration of the hard disk outside a preset range;
when the duration is longer than a preset duration, sending a data destruction instruction to the hard disk so that the hard disk destroys stored data according to the data destruction instruction;
when the duration is longer than a preset duration, sending a data destruction instruction to the hard disk so that the hard disk destroys stored data according to the data destruction instruction, wherein the method comprises the following steps:
when the duration is longer than the preset duration, acquiring the security priority of the data stored in the hard disk, wherein the security priority corresponds to the importance degree of the data;
sending a data destruction instruction to the hard disk so that the hard disk destroys stored data according to the data destruction instruction and the security priority;
the sending of the data destruction instruction to the hard disk so that the hard disk destroys the stored data according to the data destruction instruction and the security priority comprises:
and sending a data destruction instruction to the hard disk so that the hard disk destroys the corresponding stored data according to the data destruction instruction from high to low according to the security priority.
2. The method of claim 1, wherein the sending a data destruction instruction to the hard disk to cause the hard disk to destroy stored data according to the data destruction instruction and according to the security priority comprises:
sending a data destruction instruction to the hard disk so that the hard disk overwrites the stored data according to the data destruction instruction and the security priority;
when the overwriting of the stored data is completed, the built-in resistance coil of the hard disk is controlled to be electrified to generate a strong magnetic field to destroy the overwritten stored data.
3. The method of claim 1, wherein after obtaining the Beidou positioning information of the hard disk in real time and determining the position coordinates of the hard disk according to the Beidou positioning information, the method further comprises:
monitoring shell state information of the hard disk through a preset sensor, and judging whether the shell of the hard disk is illegally opened according to the shell state information;
and when the shell of the hard disk is illegally opened, sending a data destruction instruction to the hard disk so that the hard disk destroys the stored data according to the data destruction instruction.
4. The method of claim 3, wherein the monitoring of the state information of the housing of the hard disk by the preset sensor and the determination of whether the housing of the hard disk is illegally opened according to the state information of the housing comprise:
monitoring the distance change between the shell of the hard disk and the internal elements of the hard disk and the light intensity inside the hard disk shell by a preset sensor;
and when the distance change is greater than a preset distance threshold value or the light intensity is greater than a preset intensity, judging that the shell of the hard disk is illegally opened.
5. The method of claim 1, wherein after sending a read-write prohibition instruction to the hard disk to disable a read-write function of the hard disk according to the read-write prohibition instruction when the position coordinates are outside a preset range, the method further comprises:
sending a data transmission instruction and a preset generating polynomial to the hard disk so that the hard disk generates backup data according to the preset generating polynomial and a hard disk storage data sequence, and sending the backup data to a cloud end;
and when the cloud end receives the backup data, sending the preset generator polynomial to the cloud end so that the cloud end carries out cyclic redundancy check on the backup data according to the preset generator polynomial, and when the check is passed, marking the backup data as safe storage data.
6. The method of claim 1, wherein after sending a read/write prohibition instruction to the hard disk to disable a read/write function according to the read/write prohibition instruction when the position coordinate is outside a preset range, the method further comprises:
acquiring a fingerprint verification result of the hard disk when the position coordinate of the hard disk is changed from being out of a preset range to being within the preset range within a preset time;
when the fingerprint verification result is that the fingerprint verification passes, sending a restoration instruction to the hard disk so that the hard disk is restored to a normal read-write state according to the restoration instruction;
and when the fingerprint verification result is that the verification fails, sending a data destruction instruction to the hard disk so that the hard disk destroys the stored data according to the destruction instruction.
7. The utility model provides a hard disk protection device based on big dipper location which characterized in that, the device includes:
the determining module is used for acquiring Beidou positioning information of the hard disk in real time and determining the position coordinate of the hard disk according to the Beidou positioning information;
the forbidding module is used for sending a reading and writing forbidding instruction to the hard disk when the position coordinate is out of a preset range so that the hard disk forbids the reading and writing function according to the reading and writing forbidding instruction;
the acquisition module is used for acquiring the duration of the hard disk outside the preset range;
the destruction module is used for sending a data destruction instruction to the hard disk when the duration is longer than a preset duration so that the hard disk destroys stored data according to the data destruction instruction;
the destruction module is further used for acquiring the security priority of the data stored in the hard disk when the duration is longer than the preset duration, wherein the security priority corresponds to the importance degree of the data; sending a data destruction instruction to the hard disk so that the hard disk destroys stored data according to the data destruction instruction and the security priority;
the destruction module is further configured to send a data destruction instruction to the hard disk, so that the hard disk destroys the corresponding stored data according to the data destruction instruction from high to low according to the security priority.
8. The utility model provides a hard disk protection equipment based on big dipper location which characterized in that, equipment includes: the Beidou positioning-based hard disk protection program is stored on the memory and can run on the processor, and is configured to realize the steps of the Beidou positioning-based hard disk protection method according to any one of claims 1 to 6.
9. A storage medium is characterized in that a hard disk protection program based on Beidou positioning is stored on the storage medium, and when the hard disk protection program based on Beidou positioning is executed by a processor, the steps of the hard disk protection method based on Beidou positioning as set forth in any one of claims 1 to 6 are realized.
CN202110397854.8A 2021-04-13 2021-04-13 Hard disk protection method, device and equipment based on Beidou positioning and storage medium Active CN113076564B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110397854.8A CN113076564B (en) 2021-04-13 2021-04-13 Hard disk protection method, device and equipment based on Beidou positioning and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110397854.8A CN113076564B (en) 2021-04-13 2021-04-13 Hard disk protection method, device and equipment based on Beidou positioning and storage medium

Publications (2)

Publication Number Publication Date
CN113076564A CN113076564A (en) 2021-07-06
CN113076564B true CN113076564B (en) 2022-10-14

Family

ID=76617627

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110397854.8A Active CN113076564B (en) 2021-04-13 2021-04-13 Hard disk protection method, device and equipment based on Beidou positioning and storage medium

Country Status (1)

Country Link
CN (1) CN113076564B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113625969B (en) * 2021-08-16 2023-11-03 上海明略人工智能(集团)有限公司 Method and device for preventing audio data leakage, electronic equipment and storage medium
CN113704836B (en) * 2021-08-17 2022-06-10 深圳市安信达存储技术有限公司 Intelligent destroying method based on Loongson processor
CN114283537A (en) * 2021-12-29 2022-04-05 中国工商银行股份有限公司 Control method and device of card sender, computer equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1614688A (en) * 2004-07-05 2005-05-11 上海交通大学 Monitoring data file processing method and hard disk inspecting method based on hard disk
JP2008059388A (en) * 2006-08-31 2008-03-13 Toshiba Corp Information processor and data erasing method of hard disk applied to information processor
JP2009129453A (en) * 2007-11-19 2009-06-11 Lenovo (Beijing) Co Ltd Hard disk data protection device, hard disk, computer, and hard disk data protection method
CN201600703U (en) * 2009-11-10 2010-10-06 徐欣 Anti-secret leakage self-destruction system based on solid state disk
CN107797899A (en) * 2017-10-12 2018-03-13 记忆科技(深圳)有限公司 A kind of method of solid state hard disc data safety write-in
CN112099895A (en) * 2020-09-28 2020-12-18 广州华多网络科技有限公司 Interface notification message scheduling method, device, equipment and storage medium
CN112269547A (en) * 2020-10-26 2021-01-26 武汉轻工大学 Active and controllable hard disk data deleting method and device without operating system

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1286012C (en) * 2002-03-20 2006-11-22 联想(北京)有限公司 Method for recovering and backing up information in hard disc of computer
WO2006105552A2 (en) * 2005-03-29 2006-10-05 Milan Tomasovic Device for protecting data in laptop computers in case of their loss or theft
JP2009032305A (en) * 2007-07-24 2009-02-12 Toshiba Corp Information recording device and control method therefor
CN101465610A (en) * 2007-12-17 2009-06-24 北京和升达信息安全技术有限公司 Power supply device for demagnetizer
CN102646177B (en) * 2012-02-27 2015-04-08 李予温 Single-host security computer based on satellite system
CN203076316U (en) * 2012-11-13 2013-07-24 北京和升达科技发展有限公司 Storage medium office destroying machine with demagnetizing function
CN104182674A (en) * 2014-08-12 2014-12-03 清华大学深圳研究生院 Protective device for solid-state disk
CN104156670A (en) * 2014-08-13 2014-11-19 北京深思数盾科技有限公司 Data protection method and device
CN107194291A (en) * 2017-05-16 2017-09-22 努比亚技术有限公司 Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium
CN107577961A (en) * 2017-09-05 2018-01-12 深圳支点电子智能科技有限公司 Mobile terminal and Related product available for security information protection
CN108388810A (en) * 2018-01-31 2018-08-10 山东华芯半导体有限公司 A kind of mobile encrypted hard disk and encryption method of having electronic fence function
CN108470130A (en) * 2018-03-13 2018-08-31 山东超越数控电子股份有限公司 A kind of concerning security matters mobile memory system and its implementation with long-distance positioning function
CN208255886U (en) * 2018-05-24 2018-12-18 湖南君瀚信息技术有限公司 Safe storage device based on BDStar navigation system
CN109670348A (en) * 2019-01-31 2019-04-23 西安奇维科技有限公司 The highly reliable universal solid state hard disk rapid physical of one kind destroys circuit and method
CN110049487A (en) * 2019-03-27 2019-07-23 山东超越数控电子股份有限公司 A kind of high safety encryption storage remote destroying management system and its working method based on Beidou
CN110572776B (en) * 2019-09-20 2021-07-16 深圳市知赢科技有限公司 Method for dividing safety area, terminal and storage medium
CN210836095U (en) * 2019-10-15 2020-06-23 湖南君瀚信息技术有限公司 Safe mobile storage device capable of being rapidly and physically destroyed and destruction circuit
CN111091681A (en) * 2019-12-12 2020-05-01 南京酷派软件技术有限公司 Anti-lost monitoring method and device, storage medium and electronic equipment
CN111324916A (en) * 2020-01-21 2020-06-23 苏州浪潮智能科技有限公司 Data destruction method, device, equipment and readable storage medium
CN111612570A (en) * 2020-04-09 2020-09-01 福建鸿兴福食品有限公司 Rental method, server, battery and computer-readable storage medium authorized to be used by others

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1614688A (en) * 2004-07-05 2005-05-11 上海交通大学 Monitoring data file processing method and hard disk inspecting method based on hard disk
JP2008059388A (en) * 2006-08-31 2008-03-13 Toshiba Corp Information processor and data erasing method of hard disk applied to information processor
JP2009129453A (en) * 2007-11-19 2009-06-11 Lenovo (Beijing) Co Ltd Hard disk data protection device, hard disk, computer, and hard disk data protection method
CN201600703U (en) * 2009-11-10 2010-10-06 徐欣 Anti-secret leakage self-destruction system based on solid state disk
CN107797899A (en) * 2017-10-12 2018-03-13 记忆科技(深圳)有限公司 A kind of method of solid state hard disc data safety write-in
CN112099895A (en) * 2020-09-28 2020-12-18 广州华多网络科技有限公司 Interface notification message scheduling method, device, equipment and storage medium
CN112269547A (en) * 2020-10-26 2021-01-26 武汉轻工大学 Active and controllable hard disk data deleting method and device without operating system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一种实时触发的敏感数据安全销毁系统的研究;董亮等;《小型微型计算机系统》;20100715(第07期);全文 *
固态硬盘数据销毁技术综述;邓宗永等;《电脑知识与技术》;20181005(第28期);全文 *

Also Published As

Publication number Publication date
CN113076564A (en) 2021-07-06

Similar Documents

Publication Publication Date Title
CN113076564B (en) Hard disk protection method, device and equipment based on Beidou positioning and storage medium
KR100397316B1 (en) Storage device, encrypting/decrypting device, and method for accessing nonvolatile memory
US9967252B2 (en) Secure storage device with automatic command filtering
TWI405211B (en) Flash memory storage system, controller and data protecting method thereof
US8495385B2 (en) Adapter for portable storage medium and method of disabling data access
US8769309B2 (en) Flash memory storage system, and controller and method for anti-falsifying data thereof
CN102549594A (en) Secure storage of temporary secrets
WO2002001368A2 (en) Embedded security device within a nonvolatile memory device
US6101605A (en) Method and apparatus for performing a secure operation
CN106919859A (en) Basic input output system guard method and device
CN101221614A (en) Remote calibration method of real time clock in software protection device
EP1739587A1 (en) Portable electronic apparatus and secured data output method therefor
EP4261713A1 (en) License file management method and apparatus, and device
TWI507913B (en) Personal electronic device and data loss prevention system and method thereof
CN115080324A (en) Method, system, device and medium for testing password write protection function of HDD (hard disk drive)
CN110399719A (en) BIT file loading method, device, equipment and computer readable storage medium
JP2005292959A (en) Nonvolatile memory module and nonvolatile memory system
CN113779511A (en) Software authorization method, device, server and readable storage medium
CN112699398A (en) Device, method and equipment for protecting key data of android application and storable medium
CN111968693B (en) MCU and MCU debugging interface control method
CN111262696B (en) Key management method, device, equipment and storage medium of system on chip
US20240078348A1 (en) System for forensic tracing of memory device content erasure and tampering
CN114756831A (en) Remote activation authorization system and remote activation authorization method
CN117993030A (en) Memory management method, chip, electronic device, and readable storage medium
CN113722732A (en) 2 debugging encryption and decryption security protection system on line

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant