CN101859357A - Hard disk and host binding method based on ATA standard - Google Patents
Hard disk and host binding method based on ATA standard Download PDFInfo
- Publication number
- CN101859357A CN101859357A CN201010187796A CN201010187796A CN101859357A CN 101859357 A CN101859357 A CN 101859357A CN 201010187796 A CN201010187796 A CN 201010187796A CN 201010187796 A CN201010187796 A CN 201010187796A CN 101859357 A CN101859357 A CN 101859357A
- Authority
- CN
- China
- Prior art keywords
- ata
- unique identification
- hard disk
- key
- hash operations
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Signal Processing For Digital Recording And Reproducing (AREA)
Abstract
The invention provides a hard disk and host binding method based on an ATA (Actural Time of Arrival) standard, comprising a factory production step and a system guiding step, wherein the factory production step comprises the following steps of: obtaining a unique identification of a machine; obtaining an ATA locking key by carrying out nonreversible hashing operation on the unique identification; locking a magnetic disk by using an ATA command; the system guiding step comprises the following steps of: obtaining the unique identification of the machine; obtaining the ATA locking key by carrying out the nonreversible hashing operation on the unique identification; unlocking the magnetic disk by using the ATA command; and guiding a system; and thus, a host and a hard disk are bound together. On one hand, the host only uses the original factory hard disk, otherwise, the system can not guide, an illegal machine is effectively prevented from entering the system; on the other hand, hard-disk data only can be read by a factory host, and other hosts can not unlock the magnetic disk so as to prevent data loss.
Description
[technical field]
The present invention relates to a kind of guard method of computer data, relate in particular to a kind of hard disk and host binding method based on the ATA standard.
[background technology]
Data are cores of IT system protection, and hard disk needs to lay special stress on protecting as the important media of data storage.In traditional computer system, hard disk is designed to arbitrarily to dismantle replacement, and there are following two problems in this under higher environment of security: after 1) hard disk was lost or is stolen, data can't be protected.2) disabled user may obtain extra access rights by the method for changing hard disk or obtain sensitive data in the total system.
[summary of the invention]
The technical problem to be solved in the present invention; be to provide a kind of hard disk and host binding method based on the ATA standard; make the disabled user obtain extra access rights or obtain sensitive data in the total system by the method for changing hard disk; even hard disk is lost or is stolen, data still can be protected.
The present invention is achieved in that a kind of hard disk and host binding method based on the ATA standard, it comprises plant produced step and system bootstrap step, described plant produced step is to obtain the machine unique identification, this unique identification is made irreversible hash operations obtain the ATA key that locks, use ATA instruction locking disk; Described system bootstrap step is to obtain described machine unique identification, this unique identification is made irreversible hash operations obtain the ATA key that locks, and uses the ATA instruction to separate latching disk, guidance system.
Described plant produced step further is:
Step 12, at first produce the machine unique identification by a machine unique identification maker according to hardware characteristics;
Step 14, the described machine unique identification that will produce by an irreversible hash operations device again carry out irreversible hash operations and generate the ATA key;
Step 16, according to the ATA key that is produced, add lock module by an ATA and use ATA special instruction locking hard disk;
Described system bootstrap step further is:
Step 22, obtain described machine unique identification;
Step 24, by described irreversible hash operations device described machine unique identification is carried out irreversible hash operations again and generate the ATA key;
Step 26, according to the ATA key that is produced in the described step 24, separate lock module by an ATA and use ATA special instruction release hard disk.
The present invention has following advantage: with the binding of main frame and hard disk, on the one hand, main frame can only use the original hard disk when dispatching from the factory by the inventive method, otherwise system can't guide, and prevents that effectively illegal machine from entering system; On the other hand, the hard disc data main frame that can only be dispatched from the factory reads, and other main frames can't be separated latching disk, prevent loss of data.
[description of drawings]
The present invention is further illustrated in conjunction with the embodiments with reference to the accompanying drawings.
Fig. 1 is the software module block architecture diagram that realizes the inventive method.
[embodiment]
Seeing also shown in Figure 1ly, is the software module block architecture diagram that realizes the inventive method, and it comprises following six modules: machine unique identification maker 1, irreversible hash operations device 2, ATA add lock module 3, ATA separates lock module 4.The function of each module is as follows:
Described machine unique identification maker 1: produce machine identification according to hardware characteristics, and guarantee the uniqueness of machine identification;
Described irreversible hash operations device 2: machine identification is carried out irreversible hash operations generate the ATA key;
Described ATA adds lock module 3: according to the ATA key, use ATA special instruction locking hard disk;
Described ATA separates lock module 4: according to the ATA key, use ATA special instruction release hard disk.
Based on above-mentioned basis of software, the invention provides a kind of hard disk and host binding method based on the ATA standard, it comprises plant produced step and system bootstrap step, wherein:
Described plant produced step is specially:
Step 12, at first produce the machine unique identification by machine unique identification maker 1 according to hardware characteristics;
Step 14, the described machine unique identification that will produce by irreversible hash operations device 2 again carry out irreversible hash operations and generate the ATA key;
Step 16, according to an ATA key that is produced in the step 14, add lock module 3 by ATA and use ATA special instructions locking hard disks;
Described system bootstrap step is specially:
Step 22, obtain described machine unique identification;
Step 24, by described irreversible hash operations device 2 described machine unique identification is carried out irreversible hash operations again and generate another ATA key;
Step 26, according to the ATA key that is produced in the described step 24, separate lock module 4 by an ATA and use ATA special instruction release hard disks, get final product guidance system.
In the above-mentioned journey, described machine unique identification maker 1 and irreversible hash operations device 2 are utility modules.Described plant produced step is only carried out once, and described system bootstrap step all need be carried out when each start.
Be that hardware characteristics is an example below with the network interface card:
The plant produced step: machine is obtained the MAC Address of first network interface card of machine as the machine unique identification when plant produced, MAC Address of Network Card is carried out the MD5 computing generate 128 ATA key, lock to instruct by ATA then and key is sent to hard disk, the locking hard disk.
The system bootstrap step: machine powers on earlier when using, enter system bootstrap routine, the MAC Address that obtains first network interface card of machine when system bootstrap is as the machine unique identification, MAC Address of Network Card is carried out the MD5 computing generate 128 ATA key, by the ATA unlock command key is sent to hard disk, the release hard disk enters normal system bootstrap flow process then.Top flow process is finished transparent to the machine user, do not need the machine user to intervene.
Claims (2)
1. the hard disk and host binding method based on the ATA standard is characterized in that: comprise
Plant produced step: obtain the machine unique identification, this unique identification is made irreversible hash operations obtain the ATA key that locks, use ATA instruction locking disk;
System bootstrap step: obtain described machine unique identification, this unique identification is made irreversible hash operations obtain the ATA key that locks, use the ATA instruction to separate latching disk, guidance system.
2. the hard disk and host binding method based on the ATA standard according to claim 1 is characterized in that:
Described plant produced step further is:
Step 12, at first produce the machine unique identification by a machine unique identification maker according to hardware characteristics;
Step 14, the described machine unique identification that will produce by an irreversible hash operations device again carry out irreversible hash operations and generate the ATA key;
Step 16, according to the ATA key that is produced, add lock module by an ATA and use ATA special instruction locking hard disk;
Described system bootstrap step further is:
Step 22, obtain described machine unique identification;
Step 24, by described irreversible hash operations device described machine unique identification is carried out irreversible hash operations again and generate the ATA key;
Step 26, according to the ATA key that is produced in the described step 24, separate lock module by an ATA and use ATA special instruction release hard disk.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010187796A CN101859357A (en) | 2010-05-31 | 2010-05-31 | Hard disk and host binding method based on ATA standard |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010187796A CN101859357A (en) | 2010-05-31 | 2010-05-31 | Hard disk and host binding method based on ATA standard |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101859357A true CN101859357A (en) | 2010-10-13 |
Family
ID=42945260
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010187796A Pending CN101859357A (en) | 2010-05-31 | 2010-05-31 | Hard disk and host binding method based on ATA standard |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101859357A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109409112A (en) * | 2018-10-19 | 2019-03-01 | 郑州云海信息技术有限公司 | A kind of disk binding method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1294457A (en) * | 1999-10-26 | 2001-05-09 | 国际商业机器公司 | Encrypted/deencrypted stored data by utilizing disaccessible only secret key |
CN1553347A (en) * | 2003-05-28 | 2004-12-08 | 联想(北京)有限公司 | Computer data protective method |
CN1924807A (en) * | 2005-09-01 | 2007-03-07 | 横河电机株式会社 | Os starting method and apparatus using the same |
CN101441601A (en) * | 2007-11-22 | 2009-05-27 | 中国长城计算机深圳股份有限公司 | Ciphering transmission method of hard disk ATA instruction |
-
2010
- 2010-05-31 CN CN201010187796A patent/CN101859357A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1294457A (en) * | 1999-10-26 | 2001-05-09 | 国际商业机器公司 | Encrypted/deencrypted stored data by utilizing disaccessible only secret key |
CN1553347A (en) * | 2003-05-28 | 2004-12-08 | 联想(北京)有限公司 | Computer data protective method |
CN1924807A (en) * | 2005-09-01 | 2007-03-07 | 横河电机株式会社 | Os starting method and apparatus using the same |
CN101441601A (en) * | 2007-11-22 | 2009-05-27 | 中国长城计算机深圳股份有限公司 | Ciphering transmission method of hard disk ATA instruction |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109409112A (en) * | 2018-10-19 | 2019-03-01 | 郑州云海信息技术有限公司 | A kind of disk binding method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101650693B (en) | Security control method for mobile hard disk and security mobile hard disk | |
US8195960B2 (en) | Content data management system and method | |
CN101038568B (en) | Method and device for encrypting date of external computer hard disk | |
CN102136048B (en) | Mobile phone Bluetooth-based ambient intelligent computer protection device and method | |
CN101082883A (en) | Storage apparatus having multiple layer encrypting protection | |
CN103065102A (en) | Data encryption mobile storage management method based on virtual disk | |
CN102932140A (en) | Key backup method for enhancing safety of cipher machine | |
CN103345601A (en) | Identity recording and verification system based on radio frequency | |
CN102207999A (en) | Data protection method based on trusted computing cryptography support platform | |
CN104298472A (en) | Layered computing virtualization implementing method and device | |
CN113383335B (en) | Secure logging of data storage device events | |
CN106713334B (en) | Encryption method, decryption method, access method and device for virtual storage volume | |
CN104639332A (en) | Protective method for solid-state disk encryption key | |
CN105279453B (en) | It is a kind of to support the partitions of file for separating storage management to hide system and method | |
CN107742141B (en) | Intelligent identity information acquisition method and system based on RFID technology | |
CN105303093A (en) | Token verification method for cryptographic smart token | |
CN104794025B (en) | The method of rapid verification storage device | |
CN205232389U (en) | Frequency encoding and decoding SOC chip is looked to safe sound | |
CN201984486U (en) | Security chip, encryption box and USB interface identification and data storage equipment | |
CN101859357A (en) | Hard disk and host binding method based on ATA standard | |
CN105989482A (en) | Data encryption method | |
CN102012874A (en) | USB (universal serial bus) storage device provided with resource manager | |
CN104573559B (en) | It is a kind of to support the storage of the file of password authorization and operation log and access method | |
CN110300289A (en) | Video security management system and method | |
CN102567230B (en) | Smart card and method for safely managing same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20101013 |