CN109543461A - A kind of storage disk, storage disk control method and control system - Google Patents
A kind of storage disk, storage disk control method and control system Download PDFInfo
- Publication number
- CN109543461A CN109543461A CN201811500228.1A CN201811500228A CN109543461A CN 109543461 A CN109543461 A CN 109543461A CN 201811500228 A CN201811500228 A CN 201811500228A CN 109543461 A CN109543461 A CN 109543461A
- Authority
- CN
- China
- Prior art keywords
- storage disc
- storage
- disc body
- label
- circuit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims description 16
- 238000004458 analytical method Methods 0.000 claims description 3
- 238000004891 communication Methods 0.000 claims description 3
- 230000009471 action Effects 0.000 claims description 2
- 238000013475 authorization Methods 0.000 claims description 2
- 230000004044 response Effects 0.000 claims description 2
- 238000007726 management method Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/81—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Abstract
A kind of storage disk, including storage disk ontology and label.Store disk ontology, including storage circuit, the storage circuit realizes the function of storage disk read-write data, and the storage disk ontology also sets up electronic switch and the first Bluetooth circuit, the electronic switch and the first Bluetooth circuit and the storage circuit are electrically connected, and control the connection of the storage circuit.Label, including the second Bluetooth circuit and battery.Broadcast message is sent by the second Bluetooth circuit, the first Bluetooth circuit searches for the Bluetooth broadcast information of second Bluetooth circuit, and parses to it.When being resolved to key of the broadcast message comprising the storage disk ontology, when judging the label at a distance from the storage disk ontology in setting value, the electronic switch of the storage disk ontology is connected, the storage circuit of the storage disk described in this way can work, to reach cipher round results.
Description
Technical Field
The present invention relates to the field of storage disk encryption management technologies, and in particular, to a storage disk, a storage disk control method, and a storage disk control system.
Background
In both individuals and enterprises, there is a need for privacy protection of storage disks such as a usb disk, a mechanical hard disk, and a solid state disk. In the prior art, files stored in a storage disc are encrypted, or encrypted by software, or encrypted by hardware.
When the number of files in the storage disc is large, the file encryption mode is not practical, and the files with low use frequency are easy to forget passwords.
The software encryption mode has high probability of problems, once the encryption software is damaged, the encrypted data is swallowed, and the data can be recovered only by various data recovery software tools, but the successful recovery is not guaranteed.
The hardware encryption method is to embed a special encryption chip or an independent processing chip in the storage disk. When the encryption chip, the special electronic key and the storage disk are in one-to-one correspondence, the encryption chip can put the information corresponding to the three pieces of hardware together for encryption operation, and simultaneously write the information into a main partition table stored in the storage disk. Therefore, the encryption chip, the special electronic key and the hard disk are bound together, and any one of the encryption chip, the special electronic key and the hard disk cannot be normally used, so that the convenience of a user is influenced.
Disclosure of Invention
Based on the above problems, the present invention provides a solution.
According to a first aspect of the present invention, a storage disc is provided.
In particular to a storage disc which comprises a storage disc body and a label,
the storage disc comprises a storage disc body and is characterized in that the storage disc body comprises a storage circuit, the storage circuit realizes the function of reading and writing data of the storage disc, the storage disc body is also provided with an electronic switch and a first Bluetooth circuit, and the electronic switch and the first Bluetooth circuit are electrically connected with the storage circuit and control the communication of the storage circuit;
the tag comprises a second Bluetooth circuit and a battery, wherein the battery supplies power to the second Bluetooth circuit.
The label sends broadcast information through the second Bluetooth circuit, and the storage disc body searches for the Bluetooth broadcast information sent by the second Bluetooth circuit through the first Bluetooth circuit and analyzes the Bluetooth broadcast information. When the broadcast information is analyzed to contain the key of the storage disc body, and the distance between the label and the storage disc body is judged to be within a set value, the electronic switch of the storage disc body is switched on, so that the storage circuit of the storage disc can work. And when the distance between the label and the storage disc body is not within the set value, the electronic switch of the storage disc body is switched off, so that the storage circuit of the storage disc cannot work.
Through the assistance of the label, when the distance between the storage disc body and the label exceeds the range, or the storage disc body is stolen or lost, the storage disc body cannot work, the data in the storage disc body cannot be read, and therefore the encryption effect is achieved.
According to a second aspect of the present invention, there is provided a method of controlling a storage disc.
Specifically, the control method comprises the following steps:
receiving Bluetooth broadcast information sent by the tag, and analyzing the Bluetooth broadcast information;
identifying whether the analysis information contains a key consistent with the storage of the storage disc body; if so, then:
under the condition that the intensity of the Bluetooth broadcast signal is greater than a set threshold value, an electronic switch of the storage disc body is conducted;
and under the condition that the intensity of the Bluetooth broadcast signal is smaller than a set threshold value, the electronic switch of the storage disc body is disconnected.
Through above-mentioned control can both make the storage disc body use under the control through label or intelligent terminal.
In order to enhance the management of the storage disc, according to a third aspect of the present invention, a storage disc control system is provided.
The intelligent terminal is used for adding or deleting the identity identification information of the storage disc body to the server and acquiring and analyzing the information of the storage disc body from the server. The server stores the white list of the storage disc body and analyzes the information of the storage disc body.
By the control system, the intelligent terminal can also control the use of the storage disc body, and the history record of the intelligent terminal using the storage disc body is obtained.
Drawings
FIG. 1 shows a first embodiment of a storage disc structure;
FIG. 2 shows a second embodiment of a storage disc structure;
FIG. 3 is a flow chart of a storage disk control method;
FIG. 4 is a schematic diagram of adding and deleting labels;
fig. 5 is a schematic diagram of unlocking an intelligent terminal.
Detailed Description
The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings. It is to be understood that the drawings are merely illustrative of the principles of the invention and are not limiting of the invention. For example: the drawings are shown as U disks, but the storage disks include but are not limited to U disks, mechanical hard disks, solid state disks and hybrid hard disks.
Fig. 1 shows a first structural embodiment of a storage disc.
A storage disc comprises a storage disc body and a label,
the storage disc comprises a storage disc body and is characterized in that the storage disc body comprises a storage circuit, the storage circuit realizes the function of reading and writing data of the storage disc, the storage disc body is also provided with an electronic switch and a first Bluetooth circuit, and the electronic switch and the first Bluetooth circuit are electrically connected with the storage circuit and control the communication of the storage circuit;
the tag comprises a second Bluetooth circuit and a battery, wherein the battery supplies power to the second Bluetooth circuit.
The label sends broadcast information through the second Bluetooth circuit, and the storage disc body searches for the broadcast information of the second Bluetooth circuit through the first Bluetooth circuit and analyzes the broadcast information. When the broadcast information is analyzed to contain the key of the storage disc body, and the distance between the label and the storage disc body is judged to be within a set value, the electronic switch of the storage disc body is switched on, so that the storage circuit of the storage disc can work. And when the distance between the label and the storage disc body is not within the set value, the electronic switch of the storage disc body is switched off, so that the storage circuit of the storage disc cannot work.
When the distance between the storage disc body and the label exceeds the range, or the storage disc body is stolen or lost, the storage disc body cannot work, and the data in the storage disc body cannot be read. The encryption effect is achieved by means of label unlocking.
Fig. 2 shows a second embodiment of the structure of a storage disc.
The plurality of storage disc bodies share one label.
The shared label broadcast information contains the keys of the plurality of storage disc bodies, any one of the storage disc bodies searches the broadcast information to analyze, and the distance between the storage disc body and the shared label is within a set range, the electronic switch can be switched on, the unlocking is successful, and the storage disc bodies can read and write data.
This is particularly useful for enterprise applications where multiple storage disks are networked in an office area. Any storage disk can only be used within the limit of the shared label, and the data cannot be read and written beyond the limit.
Fig. 3 shows a method for controlling the storage disc, comprising the steps of:
searching Bluetooth broadcast information sent by the tag, and analyzing the Bluetooth broadcast information;
identifying whether the analysis information contains a key consistent with the storage of the storage disc body; if so, then:
under the condition that the intensity of the Bluetooth broadcast signal is greater than a set threshold value, an electronic switch of the storage disc body is conducted;
and under the condition that the intensity of the Bluetooth broadcast signal is smaller than a set threshold value, the electronic switch of the storage disc body is disconnected.
By adopting the control scheme, the connection between the label and the storage disc body is not required to be established, the Bluetooth broadcast attribute is utilized, the risk that the Bluetooth cannot be connected and the trouble of Bluetooth connection operation are avoided, and the application scene that a plurality of storage disc bodies share one label can be met.
When the label and the storage disk body are lost or stolen together, the data of the storage disk is prevented from being leaked; or, when the label is lost, the storage disc body cannot be used because the label cannot be searched, so as to avoid the situations; a storage disk control system and management method can be constructed.
Specifically, the storage disk control system comprises a storage disk body, an intelligent terminal and a server, wherein the intelligent terminal is used for adding or deleting identification information of the storage disk body to the server. The storage disk related information is managed and recorded by the server. The intelligent terminal can also unlock the storage disc body. The intelligent terminal comprises but is not limited to a smart phone, a tablet computer and intelligent wearable equipment.
For convenience of management, identity information needs to be set on the storage disc, where the identity information represents a unique identity of the storage disc body. The identification information may be presented in one of a barcode, a one-dimensional code, a two-dimensional code, a three-dimensional code, a DOI number, a QR code, and/or a number. Wherein, the number can be composed of numbers and/or characters.
When the storage disc body corresponds to the label, the identification information may be provided on the storage disc body or on the label.
When the plurality of storage disk bodies share one label, the plurality of storage disk bodies are respectively provided with identification information.
Fig. 4 shows a method for controlling the storage disc, comprising the steps of:
the intelligent terminal acquires the identity identification information of the storage disc body;
sending the identity identification information of the storage disc body to a server;
when the server finishes the matching of the storage disc body and the label, receiving information that the matching of the storage disc body and the label is successful;
or,
sending a request for deleting the identity identification information of the storage disc body;
and when the server completes the pairing removal of the storage disc body and the label, receiving information that the pairing removal of the storage disc body and the label is successful.
In the process of adding or deleting, the decryption relationship between the storage disc body and the label is kept in the server. When the label is lost together with the storage disc body, the label can be deleted so that the storage disc body is no longer controlled by the label. Even if the label and the storage disc body are lost together, there is no fear of leakage of the file.
Fig. 5 shows a method for controlling the storage disc, further comprising the steps of:
the intelligent terminal acquires the identity identification information of the storage disc body;
sending the identity identification information of the storage disc body to a server;
requesting to acquire decryption information of the storage disc body;
analyzing the storage disc body by using the decryption information;
and sending the time of the decoding action and the user information for exercising the decoding request to a server.
When the label is lost, the intelligent terminal can be informed to unlock to use the storage disc body, and the use information of the storage disc body is used through the intelligent terminal, such as: information on the user, the time of use, the place of use, and the like can be sent to the server to be referred to.
Further, the method also comprises the following steps:
the first user intelligent terminal sends an authorization request for analyzing the storage disc body by the second user intelligent terminal;
and receiving a response that the second user intelligent terminal is added to analyze the storage disc body successfully.
And adding a second user to unlock the storage disc body through the request of the first user, and granting the unlocking authority to the second user.
The above description is only exemplary of the present invention and should not be taken as limiting, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (10)
1. A storage disc, characterized by: comprises a storage disc body and a label,
the storage disc comprises a storage disc body and is characterized in that the storage disc body comprises a storage circuit, the storage circuit realizes the function of reading and writing data of the storage disc, the storage disc body is also provided with an electronic switch and a first Bluetooth circuit, and the electronic switch and the first Bluetooth circuit are electrically connected with the storage circuit and control the communication of the storage circuit;
the tag comprises a second Bluetooth circuit and a battery, wherein the battery supplies power to the second Bluetooth circuit.
2. The storage disc of claim 1, wherein:
at least one of the storage disc bodies corresponds to one of the labels.
3. The method for controlling the storage disc of claim 1 or 2, comprising the steps of:
searching Bluetooth broadcast information sent by the tag, and analyzing the Bluetooth broadcast information;
identifying whether the analysis information contains a key consistent with the storage of the storage disc body; if so, then:
under the condition that the intensity of the Bluetooth broadcast signal is greater than a set threshold value, an electronic switch of the storage disc body is conducted;
and under the condition that the intensity of the Bluetooth broadcast signal is smaller than a set threshold value, the electronic switch of the storage disc body is disconnected.
4. The storage disc of claim 1, wherein:
and identity identification information is arranged on the storage disc body or the label, wherein the identity identification information represents the unique identity of the storage disc body.
5. The storage disc of claim 2, wherein:
and identity identification information is respectively arranged on the storage disc bodies, wherein the identity identification information respectively represents the unique identity of the storage disc bodies.
6. A storage disk control system, comprising the storage disk body of claim 4 or 5, an intelligent terminal and a server, wherein the intelligent terminal is configured to add or delete the identification information of the storage disk body of claim 4 or 5 to the server.
7. The storage disk control system of claim 6, wherein the intelligent terminal decrypts the storage disk body of claim 4 or 5.
8. The method for controlling the storage disc of claim 4 or 5, comprising the steps of:
the intelligent terminal acquires the identity identification information of the storage disc body;
sending the identity identification information of the storage disc body to a server;
when the server finishes the matching of the storage disc body and the label, receiving information that the matching of the storage disc body and the label is successful;
or,
sending a request for deleting the identity identification information of the storage disc body;
and when the server completes the pairing removal of the storage disc body and the label, receiving information that the pairing removal of the storage disc body and the label is successful.
9. The method for controlling the storage disc of claim 4 or 5, further comprising the steps of:
the intelligent terminal acquires the identity identification information of the storage disc body;
sending the identity identification information of the storage disc body to a server;
requesting to acquire decryption information of the storage disc body;
analyzing the storage disc body by using the decryption information;
and sending the time of the decoding action and the user information for exercising the decoding request to a server.
10. The method for controlling the storage disc of claim 9, further comprising the steps of:
the first user intelligent terminal sends an authorization request for analyzing the storage disc body by the second user intelligent terminal;
and receiving a response that the second user intelligent terminal is added to analyze the storage disc body successfully.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811500228.1A CN109543461A (en) | 2018-12-10 | 2018-12-10 | A kind of storage disk, storage disk control method and control system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811500228.1A CN109543461A (en) | 2018-12-10 | 2018-12-10 | A kind of storage disk, storage disk control method and control system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109543461A true CN109543461A (en) | 2019-03-29 |
Family
ID=65853156
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811500228.1A Pending CN109543461A (en) | 2018-12-10 | 2018-12-10 | A kind of storage disk, storage disk control method and control system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109543461A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110072503A1 (en) * | 2008-09-04 | 2011-03-24 | Wayne Joon Yong Tan | Method of authentication for a wireless enabled memory card |
US8321953B2 (en) * | 2005-07-14 | 2012-11-27 | Imation Corp. | Secure storage device with offline code entry |
CN105740719A (en) * | 2014-12-12 | 2016-07-06 | 北京壹人壹本信息科技有限公司 | Wireless safe USB (Universal Serial Bus) flash disk and implementation method thereof |
CN107864133A (en) * | 2017-11-01 | 2018-03-30 | 卢冠熊 | A kind of wireless authentication secrecy flash memory device and encryption and authentication method |
CN108376224A (en) * | 2018-02-24 | 2018-08-07 | 深圳市大迈科技有限公司 | A kind of movable storage device and its encryption method and device |
CN108614979A (en) * | 2018-04-25 | 2018-10-02 | 深圳市昂宇电子有限公司 | A kind of encryption system and encryption method of the wireless memory device based on Bluetooth technology |
-
2018
- 2018-12-10 CN CN201811500228.1A patent/CN109543461A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8321953B2 (en) * | 2005-07-14 | 2012-11-27 | Imation Corp. | Secure storage device with offline code entry |
US20110072503A1 (en) * | 2008-09-04 | 2011-03-24 | Wayne Joon Yong Tan | Method of authentication for a wireless enabled memory card |
CN105740719A (en) * | 2014-12-12 | 2016-07-06 | 北京壹人壹本信息科技有限公司 | Wireless safe USB (Universal Serial Bus) flash disk and implementation method thereof |
CN107864133A (en) * | 2017-11-01 | 2018-03-30 | 卢冠熊 | A kind of wireless authentication secrecy flash memory device and encryption and authentication method |
CN108376224A (en) * | 2018-02-24 | 2018-08-07 | 深圳市大迈科技有限公司 | A kind of movable storage device and its encryption method and device |
CN108614979A (en) * | 2018-04-25 | 2018-10-02 | 深圳市昂宇电子有限公司 | A kind of encryption system and encryption method of the wireless memory device based on Bluetooth technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8995668B2 (en) | Privacy management for tracked devices | |
US20180152296A1 (en) | Electronic data protection method and device and terminal device | |
CN105279449A (en) | Context based data access control | |
CN101610152B (en) | Content identification method and system and content management client and server | |
CN1675878A (en) | Mobile network authentication for protecting stored content | |
CN105493054A (en) | Fast data protection using dual file systems | |
KR20040041642A (en) | Method and device for encryption/decryption of data on mass storage device | |
CN104995621A (en) | Server device, private search program, recording medium, and private search system | |
KR20060019490A (en) | Wireless tag system, wireless tag access control device, wireless tag access control method, wireless tag access control program and wireless tag | |
CN111400714B (en) | Virus detection method, device, equipment and storage medium | |
WO2009068990A2 (en) | Processing module operating methods, processing modules, and communications systems | |
JP7105495B2 (en) | Segmented key authenticator | |
WO2011145096A1 (en) | System and method for controlling and monitoring access to data processing applications | |
CN101568929B (en) | Information converting technique | |
KR101346284B1 (en) | Method for producing an encrypted file and decrypting the encrypted file, computer readable recording medium a program for implementing the methods | |
CN105468999A (en) | Data security method and mobile hard disk | |
CN109543461A (en) | A kind of storage disk, storage disk control method and control system | |
KR20170053056A (en) | Security server using case based reasoning engine and storage medium for installing security function | |
US20080126808A1 (en) | Encrypted dataset access by custodians | |
CN113660657A (en) | Secret-related carrier management method, device and equipment | |
Putra et al. | Design and Development of Login Security System Using Radio Frequency Identification | |
CN105550558A (en) | Fingerprint reading method and user equipment | |
KR101053636B1 (en) | Encryption/decryption method and system for rfid tag and reader using multi algorithm | |
KR102146132B1 (en) | Security device and method using thereof | |
CN113625969B (en) | Method and device for preventing audio data leakage, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190329 |
|
WD01 | Invention patent application deemed withdrawn after publication |