CN108595988A - It is a kind of to encrypt simultaneously and fault-tolerant hard disk - Google Patents
It is a kind of to encrypt simultaneously and fault-tolerant hard disk Download PDFInfo
- Publication number
- CN108595988A CN108595988A CN201810392007.0A CN201810392007A CN108595988A CN 108595988 A CN108595988 A CN 108595988A CN 201810392007 A CN201810392007 A CN 201810392007A CN 108595988 A CN108595988 A CN 108595988A
- Authority
- CN
- China
- Prior art keywords
- hard disk
- module
- fault
- visual cryptography
- memory module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provide it is a kind of can encrypt simultaneously and fault-tolerant hard disk, including:Hard disk control module, visual cryptography encrypting module, hard disk array memory module and hard disk are from operation module;The hard disk control module is the control centre of hard disk, is attached respectively from operation module by interface with visual cryptography encrypting module, hard disk array memory module and hard disk.Its is simple in structure easily operated for hard disk of the present invention; and design is more prominent; use the visual cryptography of information security field for HD encryption; prevent the possibility that data leak; also the dynamic performance index of hard disk can be understood in time; once triggering decryption fails, then hard disk can take data different degrees of protection according to instruction, lock or destroy;Enhance the fault-tolerance of hard disk using the coding theory of information security field, hardware ensure that the safety of data in hard disk in a hard disk in the case of breaking down, prevent data because self reason and caused by lose or loss.
Description
Technical field
It a kind of can encrypt the present invention relates to information security processing technology field more particularly to simultaneously and fault-tolerant hard disk.
Background technology
With the fast development of computer technology, popularizing for information technology produces more and more information datas, people
It largely will be by means of storing tool for the processing of information data, therefore the security requirement for storing tool is also higher and higher.
Particularly with company or important government department, the safety of some classified papers storage is particularly important.
At present for hard disk secure, it is divided into two classes:Thus the protection of hardware and software cryptography algorithm prevent secret number
According to leak.Hardware based protection, although having a certain effect by the protection of hardware, in hardware once occur sector or
The failure of person's magnetic track, then information data be also faced with the loss that can not be retrieved, former data can not be restored, and now,
It is also slightly aobvious serious to occur the problem of hardware fault in hard disk.
Invention content
It is an object of the invention to solve the problems of the above-mentioned prior art, a kind of can encrypt simultaneously and fault-tolerant is provided
Hard disk, can ensure data leak while, can also restore because hardware fault and caused by loss of data, ensure that data
Integrality and safety.
It is a kind of to encrypt simultaneously and fault-tolerant hard disk, including:Hard disk control module, visual cryptography encrypting module, hard disk battle array
Row memory module and hard disk are from operation module;
The visual cryptography encrypting module feeds back to encrypted result firmly for the information in hard disk to be encrypted
Disk control module, hard disk control module can carry out destruction operation using hard disk according to feedback result from operation module;
Testing result is fed back to hard disk by hard disk array memory module for detecting in hard disk hardware error whether occur
Control module, hard disk control module carry out locking or decoding operate using hard disk according to feedback result from operation module;
The hard disk control module is the control centre of hard disk, is stored respectively with visual cryptography encrypting module, hard disk array
Module and hard disk are attached from operation module by interface.
Further, it can encrypt simultaneously as described above and fault-tolerant hard disk, the hard disk control module include:Instruct number
It is worth memory module, hard disk detection module sends operational order module and control centre's module;
Described instruction numerical value memory module is deposited with visual cryptography encrypting module, hard disk array respectively by SCL and SDA interfaces
Module connection is stored up, the specific number for obtaining the control command in visual cryptography encrypting module, the transmission of hard disk array memory module
Value, and the concrete numerical value is sent to and sends operational order module;
The control command operation that the transmission operational order module is used to get from instruction numerical value memory module
Concrete numerical value is sent to hard disk from operation module, and corresponding operation is made from operation module for hard disk;
The hard disk detection module is used to detect safety and the integrity state of the performance indicator, current data of hard disk,
And testing result is fed back into hard disk from operation module, for hard disk corresponding operation is made from operation module;
The read-write that control centre's module is used to control hard disk array memory module is balanced, controls hard-disk interface and computer
Between data transmission.
Further, it can encrypt simultaneously as described above and fault-tolerant hard disk, visual cryptography encrypting module are pacified using information
The threshold technique of visual cryptography, is divided into n people by the cipher mode of thresholding by the password of hard disk into password is about in full field,
When having k people or k people or more while fixed disk file can be opened after showing up respective secret superposition, if less than can not be solved if k people
It opens password and opens hard disk, k≤n.
Further, it can encrypt simultaneously as described above and fault-tolerant hard disk, hard disk array memory module are pacified using information
- EVENODD yards of the array code of coding theory carries out code storage to hard-disc storage data in full field, and EVENODD codes can be by number
According to being divided into p parts, p is prime number, carries out code storage afterwards, can be encoded to p+2 parts and be stored, when in hard disk there are two and
When two magnetic tracks below or sector mistake, hard disk array memory module can detect mistake and send error message to hard disk
Control module starts simultaneously at and restores to losing data, is i.e. decoding process.
Advantageous effect:
It is provided by the invention it is a kind of can encrypt simultaneously and fault-tolerant hard disk, it is simple in structure easily operated, and design more
It is prominent, use the visual cryptography of information security field for HD encryption, it is therefore prevented that the possibility that data leak can also understand in time
The dynamic performance index of hard disk, once triggering decryption fails, then hard disk can take data different degrees of protection according to instruction,
Locking is destroyed;Enhance the fault-tolerance of hard disk using the coding theory of information security field, event occurs in hardware in a hard disk
The safety that ensure that data in hard disk in the case of barrier, prevent data because self reason and caused by lose or loss.
Description of the drawings
Fig. 1 can be encrypted simultaneously for the present invention and fault-tolerant hard disc structure block diagram.
Specific implementation mode
To make the object, technical solutions and advantages of the present invention clearer, the technical solution below in the present invention carries out clear
Chu is fully described by, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other without creative efforts
Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, can be encrypted simultaneously and fault-tolerant hard disk the present invention provides a kind of, contain in the encryption fault-tolerant hard
HD encryption tolerant system, the system comprises hard disk control module, visual cryptography encrypting module, hard disk array memory module and
Hard disk is from operation module, and wherein hard disk control module is the control centre of the hard disk, respectively with visual cryptography encrypting module, hard disk
Array memory module and hard disk are attached from operation module by interface.
Further, the hard disk control module in this example includes SCL and SDA interfaces, instructs numerical value memory module, firmly
Disk detection module sends operational order module and control centre's module;SCL and SDA interfaces are used for realizing that visual cryptography encrypts mould
Block, the data connection of hard disk array memory module and hard disk control module are unsuccessfully believed when visual cryptography encrypting module sends decryption
It ceases to hard disk control module, hard disk control module can be referred to by sending operational order module and sending to destroy to hard disk from operation module
It enables, when hard disk array memory module, which detects, hardware error occurs in hard disk, Hard disk error can be sent to hard disk control module
Information, hard disk control module sends lock instruction by sending operational order module to hard disk from operation module, when receiving
After information is completed in decoding, then by sending operational order module unlock instruction is sent to hard disk from operation module;Instruction numerical value is deposited
The concrete numerical value for storing up the control command in module storage SCL and SDA interfaces transmission therefrom obtains special when sending specific instruction
Fixed numerical value is sent;Hard disk detection module detects some performance indicators of hard disk, the safety of current data and integrality
State, and the operation positioned from operation module can be required;Send operational order module be hard disk control module will from SCL and
The concrete numerical value of the control command operation got in SDA interfaces is sent to hard disk from operation module;Control centre's module is used for
The read-write for controlling hard disk array memory module is balanced, controls the data transmission between hard-disk interface and computer.
Further, the visual cryptography encrypting module in this example uses (k, n) of visual cryptography in information security field
The password of hard disk is divided into n people by threshold technique (k≤n) by the cipher mode of (k, n) thresholding into password is about to, when there is k people
Or more than k people show up simultaneously and will can open fixed disk file after respective secret superposition, can not unlock password if being less than k people beats
Open hard disk.
Further, the hard disk array memory module in this example uses the array of coding theory in information security field
- EVENODD yards of code carries out code storage to hard-disc storage data, and data can be divided into p parts (p is prime number) by EVENODD codes,
After carry out code storage, p+2 parts can be encoded to and stored, when there are two and two magnetic tracks below or sectors in hard disk
When mistake, hard disk array memory module can detect mistake and send error message to hard disk control module, start simultaneously to losing
It loses data to be restored, i.e. decoding process.
Further, the hard disk in this implementation receives hard disk control module by sending operational order module from operation module
The special value sent, each special value represent different operational orders, then according to corresponding instruction to hard-disc storage
Content carries out corresponding operation, such as locks, and destroys, and feedback information can be sent to by unlock, positioning operation after the completion of execution
Hard disk control module.
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although
Present invention has been described in detail with reference to the aforementioned embodiments, it will be understood by those of ordinary skill in the art that:It still may be used
With technical scheme described in the above embodiments is modified or equivalent replacement of some of the technical features;
And these modifications or replacements, various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution spirit and
Range.
Claims (4)
- It can be encrypted simultaneously and fault-tolerant hard disk 1. a kind of, which is characterized in that including:Hard disk control module, visual cryptography encrypt mould Block, hard disk array memory module and hard disk are from operation module;Encrypted result is fed back to hard disk control by the visual cryptography encrypting module for the information in hard disk to be encrypted Molding block, hard disk control module can carry out destruction operation using hard disk according to feedback result from operation module;Testing result is fed back to hard disk controlling by hard disk array memory module for detecting in hard disk hardware error whether occur Module, hard disk control module carry out locking or decoding operate using hard disk according to feedback result from operation module;The hard disk control module be hard disk control centre, respectively with visual cryptography encrypting module, hard disk array memory module It is attached from operation module by interface with hard disk.
- It can be encrypted simultaneously and fault-tolerant hard disk 2. according to claim 1, which is characterized in that the hard disk control module packet It includes:Numerical value memory module, hard disk detection module is instructed to send operational order module and control centre's module;Described instruction numerical value memory module stores mould with visual cryptography encrypting module, hard disk array respectively by SCL and SDA interfaces Block connects, the concrete numerical value for obtaining the control command in visual cryptography encrypting module, the transmission of hard disk array memory module, and The concrete numerical value is sent to and sends operational order module;It is described send operational order module for will from instruction numerical value memory module in get control command operation it is specific Numerical value is sent to hard disk from operation module, and corresponding operation is made from operation module for hard disk;The hard disk detection module is used to detect safety and the integrity state of the performance indicator, current data of hard disk, and will Testing result feeds back to hard disk from operation module, and corresponding operation is made from operation module for hard disk;The read-write that control centre's module is used to control hard disk array memory module is balanced, controls between hard-disk interface and computer Data transmission.
- It can be encrypted simultaneously and fault-tolerant hard disk 3. according to claim 1 or 2, which is characterized in that visual cryptography encrypts mould Block uses the threshold technique of visual cryptography in information security field, and the password of hard disk is close into being about to by the cipher mode of thresholding Code be divided into n people, when have k people or k people or more simultaneously show up by it is respective secret be superimposed after can open fixed disk file, if being less than K people can not then unlock password and open hard disk, k≤n.
- It can be encrypted simultaneously and fault-tolerant hard disk 4. according to claim 1 or 2, which is characterized in that hard disk array stores mould Block uses-EVENODD yards of the array code of coding theory in information security field to carry out code storage to hard-disc storage data, Data can be divided into p parts by EVENODD codes, and p is prime number, carry out code storage afterwards, can be encoded to p+2 parts and be stored, when hard There are when two and two magnetic tracks below or sector mistake in disk, hard disk array memory module can detect mistake and send Error message starts simultaneously at and restores to losing data, is i.e. decoding process to hard disk control module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810392007.0A CN108595988A (en) | 2018-04-27 | 2018-04-27 | It is a kind of to encrypt simultaneously and fault-tolerant hard disk |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810392007.0A CN108595988A (en) | 2018-04-27 | 2018-04-27 | It is a kind of to encrypt simultaneously and fault-tolerant hard disk |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108595988A true CN108595988A (en) | 2018-09-28 |
Family
ID=63610831
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810392007.0A Pending CN108595988A (en) | 2018-04-27 | 2018-04-27 | It is a kind of to encrypt simultaneously and fault-tolerant hard disk |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108595988A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110490010A (en) * | 2019-08-14 | 2019-11-22 | 北京泰立鑫科技有限公司 | A kind of data auto-destruct method based on multiple-factor environment sensing |
CN114925008A (en) * | 2022-03-24 | 2022-08-19 | 南宁磁动电子科技有限公司 | Western data hard disk electronic evidence obtaining tool |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003058453A1 (en) * | 2001-12-26 | 2003-07-17 | Swarm Networks, Inc. | High-performance log-structured raid |
CN1808968A (en) * | 2006-01-16 | 2006-07-26 | 钱丽娜 | Password encryption and multi-channel transmission method |
CN100337209C (en) * | 2002-11-01 | 2007-09-12 | 国际商业机器公司 | Method and means for tolerating multiple dependent or arbitrary double disk failures in a disk array |
CN101339524A (en) * | 2008-05-22 | 2009-01-07 | 清华大学 | Magnetic disc fault tolerance method of large scale magnetic disc array storage system |
CN201600703U (en) * | 2009-11-10 | 2010-10-06 | 徐欣 | Anti-secret leakage self-destruction system based on solid state disk |
CN104268031A (en) * | 2014-09-28 | 2015-01-07 | 安徽中科大国祯信息科技有限责任公司 | Erasure code configuration method for solid state disk in disk array storage system |
CN105353974A (en) * | 2015-10-08 | 2016-02-24 | 华东交通大学 | Dual fault-tolerant encoding method applicable to disk array and distributed storage system |
CN105608394A (en) * | 2015-12-22 | 2016-05-25 | 华中科技大学 | Secure deletion method for data in solid-state disk on basis of flash memory |
CN205486125U (en) * | 2016-03-31 | 2016-08-17 | 邓剑 | Encrypt hard disk |
CN107665152A (en) * | 2017-07-02 | 2018-02-06 | 成都信息工程大学 | The interpretation method of a kind of correcting and eleting codes |
-
2018
- 2018-04-27 CN CN201810392007.0A patent/CN108595988A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003058453A1 (en) * | 2001-12-26 | 2003-07-17 | Swarm Networks, Inc. | High-performance log-structured raid |
CN100337209C (en) * | 2002-11-01 | 2007-09-12 | 国际商业机器公司 | Method and means for tolerating multiple dependent or arbitrary double disk failures in a disk array |
CN1808968A (en) * | 2006-01-16 | 2006-07-26 | 钱丽娜 | Password encryption and multi-channel transmission method |
CN101339524A (en) * | 2008-05-22 | 2009-01-07 | 清华大学 | Magnetic disc fault tolerance method of large scale magnetic disc array storage system |
CN201600703U (en) * | 2009-11-10 | 2010-10-06 | 徐欣 | Anti-secret leakage self-destruction system based on solid state disk |
CN104268031A (en) * | 2014-09-28 | 2015-01-07 | 安徽中科大国祯信息科技有限责任公司 | Erasure code configuration method for solid state disk in disk array storage system |
CN105353974A (en) * | 2015-10-08 | 2016-02-24 | 华东交通大学 | Dual fault-tolerant encoding method applicable to disk array and distributed storage system |
CN105608394A (en) * | 2015-12-22 | 2016-05-25 | 华中科技大学 | Secure deletion method for data in solid-state disk on basis of flash memory |
CN205486125U (en) * | 2016-03-31 | 2016-08-17 | 邓剑 | Encrypt hard disk |
CN107665152A (en) * | 2017-07-02 | 2018-02-06 | 成都信息工程大学 | The interpretation method of a kind of correcting and eleting codes |
Non-Patent Citations (4)
Title |
---|
M. BLAUM 等: "EVENODD: An Efficient Scheme for Tolerating Double Failures in RAID Architectures", 《 IEEE TRANSACTIONS ON COMPUTERS》 * |
唐聃 等: "一类多容错的阵列纠删码", 《中国科学:信息科学》 * |
武雪芹: "视觉密码技术应用与研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
罗象宏: "磁盘阵列的编码与容错技术研究", 《中国博士学位论文全文数据库 信息科技辑》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110490010A (en) * | 2019-08-14 | 2019-11-22 | 北京泰立鑫科技有限公司 | A kind of data auto-destruct method based on multiple-factor environment sensing |
CN114925008A (en) * | 2022-03-24 | 2022-08-19 | 南宁磁动电子科技有限公司 | Western data hard disk electronic evidence obtaining tool |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8135135B2 (en) | Secure data protection during disasters | |
US9594698B2 (en) | Local keying for self-encrypting drives (SED) | |
EP0911738A2 (en) | Disk drive with embedded data encryption | |
CN108170562B (en) | Solid state disk and data processing method and system thereof | |
CN102262721B (en) | Data encryption for independent agency is changed | |
CN105830086A (en) | Data protection in a storage system using external secrets | |
CN101589399B (en) | System and method for securing data | |
US20090183002A1 (en) | Method and device for automatically creating backup copies | |
US20080016127A1 (en) | Utilizing software for backing up and recovering data | |
CN103065102A (en) | Data encryption mobile storage management method based on virtual disk | |
CN111460531B (en) | Multidimensional grading destruction method for key data | |
JP2006301849A (en) | Electronic information storage system | |
CN108595988A (en) | It is a kind of to encrypt simultaneously and fault-tolerant hard disk | |
US9235532B2 (en) | Secure storage of full disk encryption keys | |
CN103473512A (en) | Mobile storage medium management method and mobile storage medium management device | |
US8140858B2 (en) | Data processing apparatus | |
EP1592016A2 (en) | Tape drive apparatus | |
CN101403985B (en) | Software permission backup method for software protection apparatus | |
CN110727931A (en) | Data storage device and method | |
CN113468607B (en) | Method for generating and using encrypted tamper-proof file | |
CN101789058A (en) | Method for protecting data hiding and hardware thereof | |
EP1979815B1 (en) | Method of preserving the safe state of a redundant processor after occurence of a failure | |
Dell | ||
CN110311773B (en) | Method for preventing injection type attack of advanced encryption standard coprocessor | |
CN1462001A (en) | Safety data storage equipment and method for preventing data lest in data transaction system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180928 |
|
RJ01 | Rejection of invention patent application after publication |