CN101859357A - Hard disk and host binding method based on ATA standard - Google Patents

Hard disk and host binding method based on ATA standard Download PDF

Info

Publication number
CN101859357A
CN101859357A CN201010187796A CN201010187796A CN101859357A CN 101859357 A CN101859357 A CN 101859357A CN 201010187796 A CN201010187796 A CN 201010187796A CN 201010187796 A CN201010187796 A CN 201010187796A CN 101859357 A CN101859357 A CN 101859357A
Authority
CN
China
Prior art keywords
ata
unique identification
hard disk
key
hash operations
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201010187796A
Other languages
Chinese (zh)
Inventor
张辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Centerm Information Co Ltd
Original Assignee
Fujian Centerm Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Centerm Information Co Ltd filed Critical Fujian Centerm Information Co Ltd
Priority to CN201010187796A priority Critical patent/CN101859357A/en
Publication of CN101859357A publication Critical patent/CN101859357A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

The invention provides a hard disk and host binding method based on an ATA (Actural Time of Arrival) standard, comprising a factory production step and a system guiding step, wherein the factory production step comprises the following steps of: obtaining a unique identification of a machine; obtaining an ATA locking key by carrying out nonreversible hashing operation on the unique identification; locking a magnetic disk by using an ATA command; the system guiding step comprises the following steps of: obtaining the unique identification of the machine; obtaining the ATA locking key by carrying out the nonreversible hashing operation on the unique identification; unlocking the magnetic disk by using the ATA command; and guiding a system; and thus, a host and a hard disk are bound together. On one hand, the host only uses the original factory hard disk, otherwise, the system can not guide, an illegal machine is effectively prevented from entering the system; on the other hand, hard-disk data only can be read by a factory host, and other hosts can not unlock the magnetic disk so as to prevent data loss.

Description

Hard disk and host binding method based on the ATA standard
[technical field]
The present invention relates to a kind of guard method of computer data, relate in particular to a kind of hard disk and host binding method based on the ATA standard.
[background technology]
Data are cores of IT system protection, and hard disk needs to lay special stress on protecting as the important media of data storage.In traditional computer system, hard disk is designed to arbitrarily to dismantle replacement, and there are following two problems in this under higher environment of security: after 1) hard disk was lost or is stolen, data can't be protected.2) disabled user may obtain extra access rights by the method for changing hard disk or obtain sensitive data in the total system.
[summary of the invention]
The technical problem to be solved in the present invention; be to provide a kind of hard disk and host binding method based on the ATA standard; make the disabled user obtain extra access rights or obtain sensitive data in the total system by the method for changing hard disk; even hard disk is lost or is stolen, data still can be protected.
The present invention is achieved in that a kind of hard disk and host binding method based on the ATA standard, it comprises plant produced step and system bootstrap step, described plant produced step is to obtain the machine unique identification, this unique identification is made irreversible hash operations obtain the ATA key that locks, use ATA instruction locking disk; Described system bootstrap step is to obtain described machine unique identification, this unique identification is made irreversible hash operations obtain the ATA key that locks, and uses the ATA instruction to separate latching disk, guidance system.
Described plant produced step further is:
Step 12, at first produce the machine unique identification by a machine unique identification maker according to hardware characteristics;
Step 14, the described machine unique identification that will produce by an irreversible hash operations device again carry out irreversible hash operations and generate the ATA key;
Step 16, according to the ATA key that is produced, add lock module by an ATA and use ATA special instruction locking hard disk;
Described system bootstrap step further is:
Step 22, obtain described machine unique identification;
Step 24, by described irreversible hash operations device described machine unique identification is carried out irreversible hash operations again and generate the ATA key;
Step 26, according to the ATA key that is produced in the described step 24, separate lock module by an ATA and use ATA special instruction release hard disk.
The present invention has following advantage: with the binding of main frame and hard disk, on the one hand, main frame can only use the original hard disk when dispatching from the factory by the inventive method, otherwise system can't guide, and prevents that effectively illegal machine from entering system; On the other hand, the hard disc data main frame that can only be dispatched from the factory reads, and other main frames can't be separated latching disk, prevent loss of data.
[description of drawings]
The present invention is further illustrated in conjunction with the embodiments with reference to the accompanying drawings.
Fig. 1 is the software module block architecture diagram that realizes the inventive method.
[embodiment]
Seeing also shown in Figure 1ly, is the software module block architecture diagram that realizes the inventive method, and it comprises following six modules: machine unique identification maker 1, irreversible hash operations device 2, ATA add lock module 3, ATA separates lock module 4.The function of each module is as follows:
Described machine unique identification maker 1: produce machine identification according to hardware characteristics, and guarantee the uniqueness of machine identification;
Described irreversible hash operations device 2: machine identification is carried out irreversible hash operations generate the ATA key;
Described ATA adds lock module 3: according to the ATA key, use ATA special instruction locking hard disk;
Described ATA separates lock module 4: according to the ATA key, use ATA special instruction release hard disk.
Based on above-mentioned basis of software, the invention provides a kind of hard disk and host binding method based on the ATA standard, it comprises plant produced step and system bootstrap step, wherein:
Described plant produced step is specially:
Step 12, at first produce the machine unique identification by machine unique identification maker 1 according to hardware characteristics;
Step 14, the described machine unique identification that will produce by irreversible hash operations device 2 again carry out irreversible hash operations and generate the ATA key;
Step 16, according to an ATA key that is produced in the step 14, add lock module 3 by ATA and use ATA special instructions locking hard disks;
Described system bootstrap step is specially:
Step 22, obtain described machine unique identification;
Step 24, by described irreversible hash operations device 2 described machine unique identification is carried out irreversible hash operations again and generate another ATA key;
Step 26, according to the ATA key that is produced in the described step 24, separate lock module 4 by an ATA and use ATA special instruction release hard disks, get final product guidance system.
In the above-mentioned journey, described machine unique identification maker 1 and irreversible hash operations device 2 are utility modules.Described plant produced step is only carried out once, and described system bootstrap step all need be carried out when each start.
Be that hardware characteristics is an example below with the network interface card:
The plant produced step: machine is obtained the MAC Address of first network interface card of machine as the machine unique identification when plant produced, MAC Address of Network Card is carried out the MD5 computing generate 128 ATA key, lock to instruct by ATA then and key is sent to hard disk, the locking hard disk.
The system bootstrap step: machine powers on earlier when using, enter system bootstrap routine, the MAC Address that obtains first network interface card of machine when system bootstrap is as the machine unique identification, MAC Address of Network Card is carried out the MD5 computing generate 128 ATA key, by the ATA unlock command key is sent to hard disk, the release hard disk enters normal system bootstrap flow process then.Top flow process is finished transparent to the machine user, do not need the machine user to intervene.

Claims (2)

1. the hard disk and host binding method based on the ATA standard is characterized in that: comprise
Plant produced step: obtain the machine unique identification, this unique identification is made irreversible hash operations obtain the ATA key that locks, use ATA instruction locking disk;
System bootstrap step: obtain described machine unique identification, this unique identification is made irreversible hash operations obtain the ATA key that locks, use the ATA instruction to separate latching disk, guidance system.
2. the hard disk and host binding method based on the ATA standard according to claim 1 is characterized in that:
Described plant produced step further is:
Step 12, at first produce the machine unique identification by a machine unique identification maker according to hardware characteristics;
Step 14, the described machine unique identification that will produce by an irreversible hash operations device again carry out irreversible hash operations and generate the ATA key;
Step 16, according to the ATA key that is produced, add lock module by an ATA and use ATA special instruction locking hard disk;
Described system bootstrap step further is:
Step 22, obtain described machine unique identification;
Step 24, by described irreversible hash operations device described machine unique identification is carried out irreversible hash operations again and generate the ATA key;
Step 26, according to the ATA key that is produced in the described step 24, separate lock module by an ATA and use ATA special instruction release hard disk.
CN201010187796A 2010-05-31 2010-05-31 Hard disk and host binding method based on ATA standard Pending CN101859357A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010187796A CN101859357A (en) 2010-05-31 2010-05-31 Hard disk and host binding method based on ATA standard

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010187796A CN101859357A (en) 2010-05-31 2010-05-31 Hard disk and host binding method based on ATA standard

Publications (1)

Publication Number Publication Date
CN101859357A true CN101859357A (en) 2010-10-13

Family

ID=42945260

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010187796A Pending CN101859357A (en) 2010-05-31 2010-05-31 Hard disk and host binding method based on ATA standard

Country Status (1)

Country Link
CN (1) CN101859357A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109409112A (en) * 2018-10-19 2019-03-01 郑州云海信息技术有限公司 A kind of disk binding method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1294457A (en) * 1999-10-26 2001-05-09 国际商业机器公司 Encrypted/deencrypted stored data by utilizing disaccessible only secret key
CN1553347A (en) * 2003-05-28 2004-12-08 联想(北京)有限公司 Computer data protective method
CN1924807A (en) * 2005-09-01 2007-03-07 横河电机株式会社 Os starting method and apparatus using the same
CN101441601A (en) * 2007-11-22 2009-05-27 中国长城计算机深圳股份有限公司 Ciphering transmission method of hard disk ATA instruction

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1294457A (en) * 1999-10-26 2001-05-09 国际商业机器公司 Encrypted/deencrypted stored data by utilizing disaccessible only secret key
CN1553347A (en) * 2003-05-28 2004-12-08 联想(北京)有限公司 Computer data protective method
CN1924807A (en) * 2005-09-01 2007-03-07 横河电机株式会社 Os starting method and apparatus using the same
CN101441601A (en) * 2007-11-22 2009-05-27 中国长城计算机深圳股份有限公司 Ciphering transmission method of hard disk ATA instruction

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109409112A (en) * 2018-10-19 2019-03-01 郑州云海信息技术有限公司 A kind of disk binding method and device

Similar Documents

Publication Publication Date Title
CN101650693B (en) Security control method for mobile hard disk and security mobile hard disk
US8195960B2 (en) Content data management system and method
CN101038568B (en) Method and device for encrypting date of external computer hard disk
CN102136048B (en) Mobile phone Bluetooth-based ambient intelligent computer protection device and method
CN101082883A (en) Storage apparatus having multiple layer encrypting protection
CN103065102A (en) Data encryption mobile storage management method based on virtual disk
CN102932140A (en) Key backup method for enhancing safety of cipher machine
CN103345601A (en) Identity recording and verification system based on radio frequency
CN102207999A (en) Data protection method based on trusted computing cryptography support platform
CN104298472A (en) Layered computing virtualization implementing method and device
CN113383335B (en) Secure logging of data storage device events
CN106713334B (en) Encryption method, decryption method, access method and device for virtual storage volume
CN104639332A (en) Protective method for solid-state disk encryption key
CN105279453B (en) It is a kind of to support the partitions of file for separating storage management to hide system and method
CN107742141B (en) Intelligent identity information acquisition method and system based on RFID technology
CN105303093A (en) Token verification method for cryptographic smart token
CN104794025B (en) The method of rapid verification storage device
CN205232389U (en) Frequency encoding and decoding SOC chip is looked to safe sound
CN201984486U (en) Security chip, encryption box and USB interface identification and data storage equipment
CN101859357A (en) Hard disk and host binding method based on ATA standard
CN105989482A (en) Data encryption method
CN102012874A (en) USB (universal serial bus) storage device provided with resource manager
CN104573559B (en) It is a kind of to support the storage of the file of password authorization and operation log and access method
CN110300289A (en) Video security management system and method
CN102567230B (en) Smart card and method for safely managing same

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20101013