CN103294971A - Method for realizing burglary prevention and data protection of hard disk - Google Patents

Method for realizing burglary prevention and data protection of hard disk Download PDF

Info

Publication number
CN103294971A
CN103294971A CN2012103940306A CN201210394030A CN103294971A CN 103294971 A CN103294971 A CN 103294971A CN 2012103940306 A CN2012103940306 A CN 2012103940306A CN 201210394030 A CN201210394030 A CN 201210394030A CN 103294971 A CN103294971 A CN 103294971A
Authority
CN
China
Prior art keywords
hard disk
data protection
antitheft
data
realizes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012103940306A
Other languages
Chinese (zh)
Inventor
上雅丽
刘炜
赵本立
冉淑兰
何轶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XI'AN CHEN'AN ELECTRONIC TECHNOLOGY Co Ltd
Original Assignee
XI'AN CHEN'AN ELECTRONIC TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XI'AN CHEN'AN ELECTRONIC TECHNOLOGY Co Ltd filed Critical XI'AN CHEN'AN ELECTRONIC TECHNOLOGY Co Ltd
Priority to CN2012103940306A priority Critical patent/CN103294971A/en
Publication of CN103294971A publication Critical patent/CN103294971A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Safety Devices In Control Systems (AREA)

Abstract

The invention provides a method for realizing burglary prevention and data protection of a hard disk. The method can effectively prevent the hard disk from being burgled. The method comprises the following steps of (1) binding the hard disk with a computer by a manual program: reading a computer feature code, transmitting to an embedded master control module through a control line, and storing in an embedded memorizer, and (2) performing authentication with a server program or the manual program when a system is started up: reading a system feature code, transmitting to the embedded master control module through the control line, comparing with the computer feature code stored in the memorizer, allowing the dedicated hard disk to be available if the feature code passes, and allowing the dedicated hard disk to be unavailable if the computer feature code fails. According to the method for realizing the burglary prevention and the data protection of the hard disk, the data interaction between a mainboard and the hard disk is conducted by a data line, so that the data security purposes such as the burglary prevention of the hard disk, and prevention of starting from win pe, an optical disk or a slave disk are achieved, and the purpose of the data protection is achieved.

Description

A kind of method that realizes the antitheft and data protection of hard disk
Technical field
The present invention relates to a kind of data guard method, especially a kind of method that realizes the antitheft and data protection of hard disk.
Background technology
Existing hard disk is storing lot of data, can arbitrarily be used, and is easy to stolenly, causes leakage of data or loses, and makes the use of hard disk be subjected to very big threat safely.
Summary of the invention
The invention provides a kind of method that can effectively prevent the antitheft and data protection of the stolen realization hard disk of hard disk.
A kind of method that realizes the antitheft and data protection of hard disk that realizes the object of the invention comprises the steps:
(1) by manual process hard disk and computing machine are bound, namely read the computer characteristic sign indicating number, and send to embedded main control module and be kept in the Embedded storer by control line;
(2) when system starts, authenticate by server program or manual process or network mode, it is the reading system condition code, send in the embedded main control module by control line, compare with the computer characteristic sign indicating number that remains in the storer, by then allowing dedicated hard disk use, it is unavailable that failure then limits dedicated hard disk.
Described step (2) if do not authenticate or authentification failure, then also limited dedicated hard disk and uses in the time of setting.
Describedly bind by manual process, can allow to bind one or many, on the computing machine that is not having binding, then limit hard disk and use.
Described a kind of method that realizes the antitheft and data protection of hard disk when installing operating system, authenticates by manual process, just allows installing operating system after the authentication.
Described a kind of method that realizes the antitheft and data protection of hard disk comprises also hard disk and embedded main control module are installed in the specific outer box that when outer box was opened by force, the data of hard disk were destroyed destroyed device voluntarily.
Described breaking plant can burn hard disk or the data on the hard disk are carried out physical destroying by voltage.
The beneficial effect of a kind of method that realizes the antitheft and data protection of hard disk of the present invention is as follows:
A kind of method that realizes the antitheft and data protection of hard disk of the present invention is carried out the data interaction of mainboard and hard disk by data line; Thereby reach hard disk antitheft, prevent from reaching the purpose of protected data from win pe, CD, from the data security problem that dish etc. starts etc.
Description of drawings
Fig. 1 is a kind of process flow diagram of realizing the method for the antitheft and data protection of hard disk of the present invention.
Fig. 2 is a kind of synoptic diagram of realizing the method for the antitheft and data protection of hard disk of the present invention.
Fig. 3 is a kind of manual process binding process flow diagram of realizing the method for the antitheft and data protection of hard disk of the present invention.
Fig. 4 is a kind of installation procedure process flow diagram of realizing the method for the antitheft and data protection of hard disk of the present invention.
Embodiment
As shown in Figure 1, a kind of method that realizes the antitheft and data protection of hard disk of the present invention comprises the steps:
(1) by manual process hard disk and computing machine are bound, namely read the computer characteristic sign indicating number, and send to embedded main control module and be kept in the Embedded storer by control line;
(2) when system starts, authenticate by server program or manual process or network mode, it is the reading system condition code, send in the embedded main control module by control line, compare with the computer characteristic sign indicating number that remains in the storer, by then allowing dedicated hard disk use, it is unavailable that failure then limits dedicated hard disk.
Described step (2) if do not authenticate or authentification failure, then also limited dedicated hard disk and uses in the time of setting.
Described setting-up time is 5 seconds.
As shown in Figure 3, describedly bind by manual process, can allow to bind one or many, on the computing machine that is not having binding, then limit hard disk and use.
As shown in Figure 4, described a kind of method that realizes the antitheft and data protection of hard disk when installing operating system, authenticates by manual process, just allows installing operating system after the authentication.
Described a kind of method that realizes the antitheft and data protection of hard disk comprises also hard disk and embedded main control module are installed in the specific outer box that when outer box was opened by force, the data of hard disk were destroyed destroyed device voluntarily.
Described breaking plant can burn hard disk or the data on the hard disk are carried out physical destroying by voltage.
The advantage of a kind of method that realizes the antitheft and data protection of hard disk of the present invention is as follows:
1) when authentification failure, the use of limiting computer and hard disk, thus protected the data in the hard disk illegally to be used;
2) after hard disk is stolen, the use of restriction hard disk reaches the purpose of protecting hard disc data;
3) at hard disk by when using from dish (as starting, start from CD-ROM drive from win pe), the use of restriction hard disk reaches the purpose of protection hard disc data.
As shown in Figure 2, a kind of composition of the method for the antitheft and data protection of hard disk of realizing of the present invention comprises:
1, outer box
1) this hard disk and embedded type main control system etc. are installed in the special hard disk box;
2) data-interface that stays by box, control interface, power interface carry out work;
3) this box is designed to the box that can not open, when box is opened, will trigger breaking plant, thus the damage of hard disc data in the past.
2, server program
1) is registered in the operating system;
2) behind os starting, will be automatically performed;
3) this praise is used for reading the characteristic information of computer system, as characteristic informations such as network interface card id, bios, cpu id, mainboard id;
4) the characteristic information that reads, send to embedded the authentication by " data line ", when authentication is passed through, then allow hard disk to use, otherwise do not allow hard disk to use;
5) the system default hard disk can not use, and enabling hard disk can use, and then authenticates at once; If exceed authentication official hour authentification failure, then limit the use of hard disk;
6) after hard disk is stolen, the condition code that then reads is just inconsistent with the computing machine of binding, thereby causes authentification failure, prevents that data are damaged.
3, manual process
When 1) using for the first time, system is bound;
2) condition code of computer system is read in so-called binding exactly, this condition code is sent to embedded through " data line " with specific forms, is kept in the Embedded storer;
3) when server authentication and manual authentication, will compare the condition code of preserving in the program that reads and the in-line memory after, and correctly then allow hard disk use, mistake then limits hard disk and uses;
4) when installing operating system,, then authenticate authentication back installing operating system and server program because the server program can not be moved with manual process.
4, power supply
Give this hard-disk system power supply by the power supply of system.
5, data line
1) data line of reading writing harddisk is as sata line/ide line;
2) one of this data line connects mainboard, and the other end connects the dedicated hard disk box.
6, control line
1) computing machine and embedded master use hard-disk system, control by control line;
2) control line generally is any connections such as Serial Port Line, usb line.
7, breaking plant
1) index is according to apparatus for destroying;
2) by this device the data on the hard disk are carried out physical destroying;
3) for example, use the self-desttruction equipment of a patent to carry out self-destruction;
4) for example, use voltage to burn hard disk;
5) this breaking plant uses existing techniques in realizing, and namely any technology that can destroy hard disc data can.
8, main control module
1) embedded main control chip is used for carrying out functions such as embedded Control and data communication;
2) hard disk uses device such as HF switch to control, and hard disk can be used when enable, and use can in restriction when disable;
3) main control module is that an embedded integrated circuit board of cover and system constitute;
4) connection of main control module is mainboard, and what the other end connected is hard disk, is a control transmission bridge.
9, hard disk
1) common hard disk;
2) can be sata or ide interface.
Embodiment 1
Present embodiment a kind of realizes the method for the antitheft and data protection of hard disk, comprises the steps:
(1) by manual process hard disk and computing machine are bound, namely read the computer characteristic sign indicating number, and send to embedded main control module and be kept in the Embedded storer by control line;
(2) when system starts, authenticate by server program or manual process or network mode, it is the reading system condition code, send in the embedded main control module by control line, compare with the computer characteristic sign indicating number that remains in the storer, by then allowing dedicated hard disk use, it is unavailable that failure then limits dedicated hard disk.
Described step (2) if do not authenticate or authentification failure, then also limited dedicated hard disk and uses in the time of setting.Described setting-up time is 5 seconds.
Describedly bind by manual process, can allow to bind one or many, on the computing machine that is not having binding, then limit hard disk and use.
Described a kind of method that realizes the antitheft and data protection of hard disk when installing operating system, authenticates by manual process, just allows installing operating system after the authentication.
Embodiment 2
Present embodiment a kind of realizes the method for the antitheft and data protection of hard disk, comprises the steps:
(1) by manual process hard disk and computing machine are bound, namely read the computer characteristic sign indicating number, and send to embedded main control module and be kept in the Embedded storer by control line;
(2) when system starts, authenticate by server program or manual process or network mode, it is the reading system condition code, send in the embedded main control module by control line, compare with the computer characteristic sign indicating number that remains in the storer, by then allowing dedicated hard disk use, it is unavailable that failure then limits dedicated hard disk.
Described step (2) if do not authenticate or authentification failure, then also limited dedicated hard disk and uses in the time of setting.Described setting-up time is 8 seconds.
Describedly bind by manual process, can allow to bind one or many, on the computing machine that is not having binding, then limit hard disk and use.
Described a kind of method that realizes the antitheft and data protection of hard disk comprises also hard disk and embedded main control module are installed in the specific outer box that when outer box was opened by force, the data of hard disk were destroyed destroyed device voluntarily.Described breaking plant burns hard disk by voltage.
Embodiment 3
Present embodiment a kind of realizes the method for the antitheft and data protection of hard disk, comprises the steps:
(1) by manual process hard disk and computing machine are bound, namely read the computer characteristic sign indicating number, and send to embedded main control module and be kept in the Embedded storer by control line;
(2) when system starts, authenticate by server program or manual process or network mode, it is the reading system condition code, send in the embedded main control module by control line, compare with the computer characteristic sign indicating number that remains in the storer, by then allowing dedicated hard disk use, it is unavailable that failure then limits dedicated hard disk.
Described step (2) if do not authenticate or authentification failure, then also limited dedicated hard disk and uses in the time of setting.Described setting-up time is 10 seconds.
Describedly bind by manual process, can allow to bind one or many, on the computing machine that is not having binding, then limit hard disk and use.
Described a kind of method that realizes the antitheft and data protection of hard disk when installing operating system, authenticates by manual process, just allows installing operating system after the authentication.
Described a kind of method that realizes the antitheft and data protection of hard disk comprises also hard disk and embedded main control module are installed in the specific outer box that when outer box was opened by force, the data of hard disk were destroyed destroyed device voluntarily.Described breaking plant is that the data on the hard disk are carried out physical destroying.
Embodiment 4
Present embodiment a kind of realizes the method for the antitheft and data protection of hard disk, comprises the steps:
(1) by manual process hard disk and computing machine are bound, namely read the computer characteristic sign indicating number, and send to embedded main control module and be kept in the Embedded storer by control line;
(2) when system starts, authenticate by server program or manual process or network mode, it is the reading system condition code, send in the embedded main control module by control line, compare with the computer characteristic sign indicating number that remains in the storer, by then allowing dedicated hard disk use, it is unavailable that failure then limits dedicated hard disk.
Described step (2) if do not authenticate or authentification failure, then also limited dedicated hard disk and uses in the time of setting.Described setting-up time is 8 seconds.
Described a kind of method that realizes the antitheft and data protection of hard disk when installing operating system, authenticates by manual process, just allows installing operating system after the authentication.
Described a kind of method that realizes the antitheft and data protection of hard disk comprises also hard disk and embedded main control module are installed in the specific outer box that when outer box was opened by force, the data of hard disk were destroyed destroyed device voluntarily.Described breaking plant burns hard disk by voltage.
Embodiment 5
Present embodiment a kind of realizes the method for the antitheft and data protection of hard disk, comprises the steps:
(1) by manual process hard disk and computing machine are bound, namely read the computer characteristic sign indicating number, and send to embedded main control module and be kept in the Embedded storer by control line;
(2) when system starts, authenticate by server program or manual process or network mode, it is the reading system condition code, send in the embedded main control module by control line, compare with the computer characteristic sign indicating number that remains in the storer, by then allowing dedicated hard disk use, it is unavailable that failure then limits dedicated hard disk.
Described step (2) if do not authenticate or authentification failure, then also limited dedicated hard disk and uses in the time of setting.Described setting-up time is 5 seconds.
Describedly bind by manual process, can allow to bind one or many, on the computing machine that is not having binding, then limit hard disk and use.
Described a kind of method that realizes the antitheft and data protection of hard disk when installing operating system, authenticates by manual process, just allows installing operating system after the authentication.
Described a kind of method that realizes the antitheft and data protection of hard disk comprises also hard disk and embedded main control module are installed in the specific outer box that when outer box was opened by force, the data of hard disk were destroyed destroyed device voluntarily.Described breaking plant is that the data on the hard disk are carried out physical destroying.
Embodiment recited above is described preferred implementation of the present invention; be not that scope of the present invention is limited; design under the spiritual prerequisite not breaking away from the present invention; various distortion and improvement that the common engineering technical personnel in this area make technical solution of the present invention all should fall in the definite protection domain of claims of the present invention.

Claims (6)

1. a method that realizes the antitheft and data protection of hard disk comprises the steps:
(1) by manual process hard disk and computing machine are bound, namely read the computer characteristic sign indicating number, and send to embedded main control module and be kept in the Embedded storer by control line;
(2) when system starts, authenticate by server program or manual process or network mode, it is the reading system condition code, send in the embedded main control module by control line, compare with the computer characteristic sign indicating number that remains in the storer, by then allowing dedicated hard disk use, it is unavailable that failure then limits dedicated hard disk.
2. a kind of method that realizes the antitheft and data protection of hard disk according to claim 1 is characterized in that: described step (2) is in the time of setting, if not authentication or authentification failure then also limit dedicated hard disk and use.
3. a kind of method that realizes the antitheft and data protection of hard disk according to claim 1 is characterized in that: describedly bind by manual process, can allow to bind one or many, on the computing machine that not have binding, then limit the hard disk use.
4. a kind of method that realizes the antitheft and data protection of hard disk according to claim 1; it is characterized in that: the method for the antitheft and data protection of described realization hard disk; when installing operating system, authenticate by manual process, just allow installing operating system after the authentication.
5. according to the arbitrary described a kind of method that realizes the antitheft and data protection of hard disk of claim 1~5; it is characterized in that: the method for the antitheft and data protection of described realization hard disk; also comprise hard disk and embedded main control module are installed in the specific outer box; when outer box was opened by force, the data of hard disk were destroyed destroyed device voluntarily.
6. a kind of method that realizes the antitheft and data protection of hard disk according to claim 6, it is characterized in that: described breaking plant can burn hard disk or the data on the hard disk are carried out physical destroying by voltage.
CN2012103940306A 2012-10-17 2012-10-17 Method for realizing burglary prevention and data protection of hard disk Pending CN103294971A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012103940306A CN103294971A (en) 2012-10-17 2012-10-17 Method for realizing burglary prevention and data protection of hard disk

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012103940306A CN103294971A (en) 2012-10-17 2012-10-17 Method for realizing burglary prevention and data protection of hard disk

Publications (1)

Publication Number Publication Date
CN103294971A true CN103294971A (en) 2013-09-11

Family

ID=49095810

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012103940306A Pending CN103294971A (en) 2012-10-17 2012-10-17 Method for realizing burglary prevention and data protection of hard disk

Country Status (1)

Country Link
CN (1) CN103294971A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104318695A (en) * 2014-11-17 2015-01-28 四川智诚天逸科技有限公司 Antitheft method of mobile hard disk drive
CN105117302A (en) * 2015-07-24 2015-12-02 厦门宇高信息科技有限公司 Verification method for data destruction of storage medium
CN105356914A (en) * 2015-10-08 2016-02-24 上海瀚银信息技术有限公司 Near field communication device and system and working method of near field communication system
CN107908981A (en) * 2017-11-03 2018-04-13 山东超越数控电子股份有限公司 It is a kind of to have from the hard disc data connection system and method destroyed
CN111310247A (en) * 2020-03-11 2020-06-19 温州市音咯网络科技有限公司 Anti-theft device of information secrecy hard disk
CN112181089A (en) * 2020-10-14 2021-01-05 广州新程北斗信息科技有限公司 Data safety protection device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1450459A (en) * 2002-04-10 2003-10-22 联想(北京)有限公司 Hard disc data protector
WO2004084470A2 (en) * 2003-03-18 2004-09-30 Ensconce Data Technology Dead on demand disk technology
CN101046776A (en) * 2006-03-31 2007-10-03 联想(新加坡)私人有限公司 Random password automatically generated by BIOS for securing a data storage device
CN101201803A (en) * 2006-12-14 2008-06-18 英业达股份有限公司 Method for protecting data of hard disk

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1450459A (en) * 2002-04-10 2003-10-22 联想(北京)有限公司 Hard disc data protector
WO2004084470A2 (en) * 2003-03-18 2004-09-30 Ensconce Data Technology Dead on demand disk technology
CN101046776A (en) * 2006-03-31 2007-10-03 联想(新加坡)私人有限公司 Random password automatically generated by BIOS for securing a data storage device
CN101201803A (en) * 2006-12-14 2008-06-18 英业达股份有限公司 Method for protecting data of hard disk

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104318695A (en) * 2014-11-17 2015-01-28 四川智诚天逸科技有限公司 Antitheft method of mobile hard disk drive
CN105117302A (en) * 2015-07-24 2015-12-02 厦门宇高信息科技有限公司 Verification method for data destruction of storage medium
CN105117302B (en) * 2015-07-24 2017-12-29 厦门宇高信息科技有限公司 A kind of method of calibration for storage medium data destroying
CN105356914A (en) * 2015-10-08 2016-02-24 上海瀚银信息技术有限公司 Near field communication device and system and working method of near field communication system
CN107908981A (en) * 2017-11-03 2018-04-13 山东超越数控电子股份有限公司 It is a kind of to have from the hard disc data connection system and method destroyed
CN111310247A (en) * 2020-03-11 2020-06-19 温州市音咯网络科技有限公司 Anti-theft device of information secrecy hard disk
CN112181089A (en) * 2020-10-14 2021-01-05 广州新程北斗信息科技有限公司 Data safety protection device
CN112181089B (en) * 2020-10-14 2021-11-12 国网福建省电力有限公司漳州供电公司 Data safety protection device

Similar Documents

Publication Publication Date Title
CA2799932C (en) Computer motherboard having peripheral security functions
CN103294971A (en) Method for realizing burglary prevention and data protection of hard disk
RU2321055C2 (en) Device for protecting information from unsanctioned access for computers of informational and computing systems
CN203773424U (en) Safe and reliable computer based on loongson processor
CN104484629A (en) Computer starting method and device
CN102289623A (en) Anti-leakage laptop
CN102955921A (en) Electronic device and safe starting method
CA2893030C (en) Data security device
CN106716333B (en) Method for completing secure erase operation
CN102855451A (en) Portable computer terminal with safe anti-secret-disclosing function
CN100583119C (en) Mobile memory and method for controlling data download of computer
CN100476761C (en) Device and method of realizing hard disk safety isolation
CN202815852U (en) Portable computer terminal with safety and secrecy
CN105975872A (en) Method for testing TPM under Windows
CN205451071U (en) Machine case data destructors that uncaps
US10445534B2 (en) Selective storage device wiping system and method
CN104361280B (en) A kind of method realizing carrying out authentic authentication to USB storage device by SMI interrupt
CN104794071A (en) Method and system for unfreezing and adding coded lock on computer SATA hard disk based on USB flash disk
CN104361298A (en) Method and device for information safety and confidentiality
CN102142066A (en) Computing equipment and backup recovery method thereof
CN103294614A (en) Method for realizing burglary prevention and data protection of hard disk with hardware encryption
GB2481043A (en) Storage device adapted to physically destroy itself in response to an unauthorised access attempt
CN113360877B (en) Design method of safe mobile storage medium based on RAM
CN103488951A (en) File protection method and system based on cloud storage
CN202189368U (en) Secret loss preventing notebook computer

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20130911

RJ01 Rejection of invention patent application after publication