CN113434322A - Solid state disk safety management method based on watchdog - Google Patents

Solid state disk safety management method based on watchdog Download PDF

Info

Publication number
CN113434322A
CN113434322A CN202110710433.6A CN202110710433A CN113434322A CN 113434322 A CN113434322 A CN 113434322A CN 202110710433 A CN202110710433 A CN 202110710433A CN 113434322 A CN113434322 A CN 113434322A
Authority
CN
China
Prior art keywords
watchdog
solid state
state disk
management method
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110710433.6A
Other languages
Chinese (zh)
Other versions
CN113434322B (en
Inventor
吴佳
李礼
吴叶楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai V&g Information Technology Co ltd
Original Assignee
Shanghai V&g Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai V&g Information Technology Co ltd filed Critical Shanghai V&g Information Technology Co ltd
Priority to CN202110710433.6A priority Critical patent/CN113434322B/en
Publication of CN113434322A publication Critical patent/CN113434322A/en
Application granted granted Critical
Publication of CN113434322B publication Critical patent/CN113434322B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0751Error or fault detection not based on redundancy
    • G06F11/0754Error or fault detection not based on redundancy by exceeding limits
    • G06F11/0757Error or fault detection not based on redundancy by exceeding limits by exceeding a time limit, i.e. time-out, e.g. watchdogs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Software Systems (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

The invention discloses a watchdog-based solid state disk safety management method, wherein the solid state disk safety management device comprises a switch function module (a switch function unit) and a real-time setting module (a real-time setting unit), and the steps of S1: initializing watchdog trigger times N and watchdog query interval time T by the solid state disk; step S2: waiting for T time; step S3: if the solid state disk receives the watchdog signal, the operation is permitted, the count a is 0, step S2 is turned, otherwise, step S4 is turned; step S4: if a > is N, the operation is prohibited, let a be a, go to step S2; otherwise, let a be a +1, go to step S2. The method has the advantages of simple principle, easy realization, simple and convenient operation, capability of eliminating the hidden trouble that manual operation protection is easy to forget, and wider application scenes.

Description

Solid state disk safety management method based on watchdog
Technical Field
The invention relates to the technical field of memories, in particular to a watchdog-based solid state disk security management method.
Background
The solid state disk is a memory with a nonvolatile data storage function, has the advantages of high reading and writing speed, large storage capacity and the like, and is widely used for mass data storage; but the view, modification and deletion of the stored data need to be limited, otherwise the key data is easy to be stolen, modified or deleted.
For this reason, many practitioners in the industry propose a security management scheme for solid state disks, so as to solve the security problem of the solid state disks. For example, the scheme disclosed in the chinese patent application "solid state disk based on automatic locking write protect function": the data writing function of the solid state disk is closed by authorizing a user to send a locking instruction, so that the key data is prevented from being rewritten or erased. According to the scheme, the solid state disk can be locked by the data writing function through the locking instruction, and the safety problem of the solid state disk is solved to a certain extent.
However, the above method requires manual initiative sending of the locking instruction, which has a hidden danger of forgetting; in addition, in an application scenario such as monitoring video recording, when data needs to be written continuously while unattended, it is impossible to prevent the video data from being rewritten or erased.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: aiming at the technical problems in the prior art, the invention provides the watchdog-based solid state disk safety management method which is simple in principle, easy to implement and simple and convenient to operate.
In order to solve the technical problems, the invention adopts the technical scheme that:
a security management method of a solid state disk based on a watchdog, wherein the security management method of the solid state disk adopts a watchdog access authorization mechanism for read operation, write operation or deletion operation of the solid state disk, thereby realizing security management of the solid state disk; the method comprises the following steps:
step S1: initializing a watchdog trigger time N and a watchdog query interval time T by the solid state disk, wherein N is a natural number, and the trigger time initialization count a is 0;
step S2: waiting for T time;
step S3: if the solid state disk receives the watchdog signal, allowing a read operation, a write operation or a delete operation on the solid state disk, and turning to step S2, if the count a is 0; otherwise go to step S4;
step S4: if a > is N, forbidding the read operation, the write operation or the delete operation of the solid state disk, and turning to step S2; otherwise, let a be a +1, go to step S2.
As a further improvement of the invention: for operations related to the safety of the solid state disk, such as read operation, write operation, deletion operation and the like of the solid state disk, independent watchdog access authorization can be respectively carried out. That is, the read operation, the write operation, the delete operation and other operations related to the security of the solid state disk can be independently provided with independent watchdog access mechanisms. It is understood that, in other embodiments, operations such as merging may be performed according to the division of the operation function tasks, so that two or more operations share one watchdog access mechanism.
As a further improvement of the invention: when the solid state disk works normally, whether the watchdog access authorization is opened or not can be configured. That is to say, the watchdog access mechanism in the present invention has an independent switch function module (switch function unit), and can be controlled to be in an on or off state in a form of hardware or software. For example, when the solid state disk normally works, and the watchdog access authorization for closing the read operation, the write operation or the delete operation, the read operation, the write operation or the delete operation of the solid state disk is not limited. When the watchdog access authorization of the read operation, the write operation or the delete operation is opened, the watchdog access authorization is required for the read operation, the write operation or the delete operation of the solid state disk.
As a further improvement of the invention: the watchdog access mechanism in the invention is provided with a real-time setting module (real-time setting unit), namely, when the solid state disk normally works, an operator can configure the watchdog trigger time N and the watchdog query interval time T at any time. That is, the operator can set the number N of watchdog triggers and the watchdog polling interval T at any time according to actual needs.
As a further improvement of the invention: the watchdog signal can be designed to be sent by a software program according to actual needs, or can be sent by a hardware circuit (such as a trigger circuit of a USB interface) or other known watchdog trigger modes.
As a further improvement of the invention: according to actual needs, the watchdog signal can be triggered manually, pulse signals, periodic signals, passwords and the like, and the solid state disk can detect the signal. If the signal is not in accordance with the requirement, judging that the watchdog signal is not received; if the signal meets the requirements, the watchdog signal is judged to be received. Further, the password may be a static password, a dynamic password, an interactive password, or a password of other known methods.
As a further improvement of the invention: for a video monitoring scene, the invention can only carry out watchdog access authorization on deletion operation, thereby ensuring the integrity of records and being convenient for checking; for the sensitive data collected continuously, the watchdog access authorization can be carried out on the read operation and the delete operation, so that illegal reading and deletion are prevented, and the addition of new data is not influenced.
Compared with the prior art, the invention has the advantages that:
the watchdog-based solid state disk safety management method is simple in principle, easy to implement, simple and convenient to operate, capable of eliminating hidden danger that operation protection is easy to forget when performed manually, and wide in application range. The read operation, the write operation and the delete operation of the solid state disk can be respectively subjected to independent watchdog access authorization, and can also be combined, so that the flexibility is higher. Meanwhile, the invention further enables the user to set in real time according to own habits, occasion requirements and other own requirements at any time.
Drawings
FIG. 1 is a schematic flow diagram of the process of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Examples
A security management method of a solid state disk based on a watchdog, wherein the security management method of the solid state disk adopts a watchdog access authorization mechanism for read operation, write operation or deletion operation of the solid state disk, thereby realizing security management of the solid state disk; the method comprises the following steps:
step S1: initializing a watchdog trigger time N and a watchdog query interval time T by the solid state disk, wherein N is a natural number, and the trigger time initialization count a is 0;
step S2: waiting for T time;
step S3: if the solid state disk receives the watchdog signal, allowing a read operation, a write operation or a delete operation on the solid state disk, and turning to step S2, if the count a is 0; otherwise go to step S4;
step S4: if a > is N, forbidding the read operation, the write operation or the delete operation of the solid state disk, and turning to step S2; otherwise, let a be a +1, go to step S2.
In a specific application example, the present invention preferably performs independent watchdog access authorization on operations related to the security of the solid state disk, such as read operation, write operation, and delete operation of the solid state disk. That is, the read operation, the write operation, the delete operation and other operations related to the security of the solid state disk can be independently provided with independent watchdog access mechanisms. It is understood that, in other embodiments, operations such as merging may be performed according to the division of the operation function tasks, so that two or more operations share one watchdog access mechanism.
In a specific application example, the present invention preferably configures whether to open the watchdog access authorization when the solid state disk normally operates. That is, the watchdog access mechanism in the present invention has an independent switch function module (switch function unit), and the switch function module (switch function unit) can control the watchdog access mechanism to be in an on or off state in a form of hardware or software. For example, when the solid state disk normally works, and the watchdog access authorization for closing the read operation, the write operation or the delete operation, the read operation, the write operation or the delete operation of the solid state disk is not limited. When the watchdog access authorization of the read operation, the write operation or the delete operation is opened, the watchdog access authorization is required for the read operation, the write operation or the delete operation of the solid state disk.
In a specific application example, the present invention preferably further provides that the watchdog access mechanism in the present invention has a real-time setting module (real-time setting unit), and the real-time setting module (real-time setting unit) is configured such that an operator can configure the watchdog trigger time N and the watchdog query interval time T at any time when the solid state disk normally operates. That is, the operator can set the number N of watchdog triggers and the watchdog polling interval T at any time according to actual needs.
In a specific application example, the watchdog signal can be designed to be sent by a software program according to actual needs, or sent by a hardware circuit (such as a trigger circuit of a USB interface), and other known watchdog trigger modes.
In a specific application example, according to actual needs, the watchdog signal can be triggered manually, pulse signals, periodic signals, passwords and the like, and the solid state disk can detect the watchdog signal. If the watchdog signal does not meet the requirement, judging that the watchdog signal is not received; and if the watchdog signal meets the requirement, judging that the watchdog signal is received.
Further, the password may be a static password, a dynamic password, an interactive password, or a password in other known manners.
In a specific application example, further, for a video monitoring scene, the invention can only carry out watchdog access authorization on deletion operation, thereby ensuring the integrity of records and being convenient for viewing; for the sensitive data collected continuously, the watchdog access authorization can be carried out on the read operation and the delete operation, so that illegal reading and deletion are prevented, and the addition of new data is not influenced.
The above is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above-mentioned embodiments, and all technical solutions belonging to the idea of the present invention belong to the protection scope of the present invention. It should be noted that modifications and embellishments within the scope of the invention may be made by those skilled in the art without departing from the principle of the invention.

Claims (5)

1. A watchdog-based solid state disk security management method comprises the following steps:
step S1: initializing a watchdog trigger time N and a watchdog query interval time T by the solid state disk, wherein N is a natural number, and the trigger time initialization count a is 0;
step S2: waiting for T time;
step S3: if the solid state disk receives the watchdog signal, allowing a read operation, a write operation or a delete operation on the solid state disk, and turning to step S2, if the count a is 0; otherwise go to step S4;
step S4: if a > is N, forbidding the read operation, the write operation or the delete operation of the solid state disk, and turning to step S2; otherwise, let a be a +1, go to step S2.
2. The watchdog-based solid state disk security management method according to claim 1, characterized in that: the watchdog access mechanism has an independent switch function module.
3. The watchdog-based solid state disk security management method according to claim 1, characterized in that: the watchdog access mechanism has a real-time setup module.
4. The watchdog-based solid state disk security management method according to claim 1, characterized in that: the watchdog signal is sent via a software program or a hardware circuit.
5. The watchdog-based solid state disk security management method according to claim 4, wherein: the hardware circuit is a trigger circuit of the USB interface.
CN202110710433.6A 2021-06-25 2021-06-25 Solid state disk safety management method based on watchdog Active CN113434322B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110710433.6A CN113434322B (en) 2021-06-25 2021-06-25 Solid state disk safety management method based on watchdog

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110710433.6A CN113434322B (en) 2021-06-25 2021-06-25 Solid state disk safety management method based on watchdog

Publications (2)

Publication Number Publication Date
CN113434322A true CN113434322A (en) 2021-09-24
CN113434322B CN113434322B (en) 2023-03-21

Family

ID=77755377

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110710433.6A Active CN113434322B (en) 2021-06-25 2021-06-25 Solid state disk safety management method based on watchdog

Country Status (1)

Country Link
CN (1) CN113434322B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040250178A1 (en) * 2003-05-23 2004-12-09 Munguia Peter R. Secure watchdog timer
US20060171453A1 (en) * 2005-01-04 2006-08-03 Rohlfing Thomas R Video surveillance system
JP2011060173A (en) * 2009-09-14 2011-03-24 Fuji Xerox Co Ltd Information storage control device, electronic equipment, image forming apparatus, and program
JP2011103051A (en) * 2009-11-10 2011-05-26 Toshiba Tec Corp Information processor
CN103440466A (en) * 2013-09-04 2013-12-11 上海斐讯数据通信技术有限公司 Method for protecting hard disk of network device
CN108509813A (en) * 2018-03-31 2018-09-07 北京联想核芯科技有限公司 A kind of data processing method of safe solid state disk, device and safe solid state disk
CN110378149A (en) * 2019-08-02 2019-10-25 河源市飞腾信息科技有限公司 A kind of computer information security control apparatus
CN110874495A (en) * 2018-08-31 2020-03-10 深圳市安信达存储技术有限公司 Solid state disk based on automatic locking write protection function and tamper-proof method
US20200252430A1 (en) * 2019-02-05 2020-08-06 Sennco Solutions, Inc. Integrated security monitoring via watchdog trigger locking

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040250178A1 (en) * 2003-05-23 2004-12-09 Munguia Peter R. Secure watchdog timer
US20060171453A1 (en) * 2005-01-04 2006-08-03 Rohlfing Thomas R Video surveillance system
JP2011060173A (en) * 2009-09-14 2011-03-24 Fuji Xerox Co Ltd Information storage control device, electronic equipment, image forming apparatus, and program
JP2011103051A (en) * 2009-11-10 2011-05-26 Toshiba Tec Corp Information processor
CN103440466A (en) * 2013-09-04 2013-12-11 上海斐讯数据通信技术有限公司 Method for protecting hard disk of network device
CN108509813A (en) * 2018-03-31 2018-09-07 北京联想核芯科技有限公司 A kind of data processing method of safe solid state disk, device and safe solid state disk
CN110874495A (en) * 2018-08-31 2020-03-10 深圳市安信达存储技术有限公司 Solid state disk based on automatic locking write protection function and tamper-proof method
US20200252430A1 (en) * 2019-02-05 2020-08-06 Sennco Solutions, Inc. Integrated security monitoring via watchdog trigger locking
CN110378149A (en) * 2019-08-02 2019-10-25 河源市飞腾信息科技有限公司 A kind of computer information security control apparatus

Also Published As

Publication number Publication date
CN113434322B (en) 2023-03-21

Similar Documents

Publication Publication Date Title
US5144660A (en) Securing a computer against undesired write operations to or read operations from a mass storage device
US6330648B1 (en) Computer memory with anti-virus and anti-overwrite protection apparatus
US5781793A (en) Appratus for preventing changes of computer configuration data by unauthorized users
US6012146A (en) Password protection for removable hard drive
US11588644B2 (en) Secure snapshot management for data storage devices
US20010055227A1 (en) Semiconductor device and control device for use therewith
US6615330B2 (en) Virtual worm method and system
US6128148A (en) Memory device having multiple memory regions for a recording device
CN113434322B (en) Solid state disk safety management method based on watchdog
US5754647A (en) Software protection apparatus and the method of protection utilizing read-write memory means having inconsistent input and output data
US20200242257A1 (en) Non-volatile memory with precise write-once protection
US20090119782A1 (en) Method and device for digital rights protection
CN105700830A (en) Solid-state disk master control supporting WORM storage, solid-state disk and WORM storage method
US6996006B2 (en) Semiconductor memory preventing unauthorized copying
JP3055359B2 (en) Tape cassette information protection system
KR970049627A (en) Electronic device and its management method
US20030131112A1 (en) Computer firewall system
US8140795B2 (en) Hard disk drive with write-only region
WO1994006071A1 (en) A dongle
JPS58178456A (en) Magnetic disk controller
KR100369535B1 (en) Apparatus for memorizing log data through tele-communication and method there of
JP3028567B2 (en) Microcomputer with built-in EEPROM
CN112685802B (en) Flash chip reading control method and device and storage medium
CN108268760B (en) Electronic equipment safety protection method and system
KR200200507Y1 (en) Apparatus for memorizing log data through tele-communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant