CN112083879A - Physical partition isolation and hiding method for storage space of solid state disk - Google Patents

Physical partition isolation and hiding method for storage space of solid state disk Download PDF

Info

Publication number
CN112083879A
CN112083879A CN202010811739.6A CN202010811739A CN112083879A CN 112083879 A CN112083879 A CN 112083879A CN 202010811739 A CN202010811739 A CN 202010811739A CN 112083879 A CN112083879 A CN 112083879A
Authority
CN
China
Prior art keywords
partition
user
solid state
state disk
disk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010811739.6A
Other languages
Chinese (zh)
Other versions
CN112083879B (en
Inventor
杜润泽
王兴起
方景龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dianzi University
Original Assignee
Hangzhou Dianzi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dianzi University filed Critical Hangzhou Dianzi University
Priority to CN202010811739.6A priority Critical patent/CN112083879B/en
Publication of CN112083879A publication Critical patent/CN112083879A/en
Application granted granted Critical
Publication of CN112083879B publication Critical patent/CN112083879B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0604Improving or facilitating administration, e.g. storage management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention relates to a method for isolating and hiding a physical partition of a storage space of a solid state disk. The invention firstly authenticates the legality of the user using the solid state disk, only the legal user is allowed to access the hard disk, and the solid state disk hides the physical partition when the user authentication fails. And then, opening a physical partition corresponding to a legal user, and mapping the physical partition of the user into the whole solid state disk space, so that the access of the user to the solid state disk is limited in the physical partition. When the user program accesses the hard disk data, the solid state hard disk firmware judges whether the user access logic address is out of range, and if the user access logic address is out of range, the user access is refused. Compared with the traditional physical partition isolation and hiding of the operating system, the method realizes the physical isolation of the hard disk storage space at the solid state hard disk end, ensures higher safety of information storage, and reduces the risk of information stealing.

Description

Physical partition isolation and hiding method for storage space of solid state disk
Technical Field
The invention belongs to the technical field of solid state disk access, and particularly relates to a solid state disk with a storage space physically partitioned and a partition reading method thereof.
Background
At present, the partition isolation of the solid state disk is usually realized by a hard disk isolation card, and the working principle is that two working intervals are separated from one hard disk by the read-write control technology of the solid state disk, and the two intervals cannot access each other. It physically divides a hard disk into two parts, and the two areas are completely isolated. Partition isolation is also realized from a software application level through an operating system, namely a module mode is adopted; the method is realized by modifying part of hard disk data, but a module mode depends on an operating system platform, so that potential safety hazards exist, namely the method is easy to crack by an unauthorized person by utilizing trojans or bugs and the like. The modular approach has another risk that an illegal intruder familiar with the file format of the operating system can reveal the disk partition by modifying the disk data. In the aspect of partition hiding, the partition hiding is realized on the level of an operating system, and the corresponding partition table of the solid state disk is modified by the operating system, so that the corresponding partition is invisible. However, it is easy for a person familiar with the operating system to display the hidden partition by modifying the partition table information.
Generally speaking, partition isolation and hiding at the application level are not thorough enough, and theoretically can be cracked by an illegal intruder familiar with the file format of an operating system. Even if the hard disk isolation card is adopted, the potential safety hazard of illegal invasion and the like still exists due to the separation of the hard disk isolation card and the solid state disk.
Disclosure of Invention
The invention provides a method for isolating and hiding a physical partition of a storage space aiming at the defects of the prior art, wherein a logic address sent by a host is detected at a solid state hard disk end through a customized ATA instruction, and an out-of-range address is intercepted during address conversion to realize the isolation of the physical partition of the storage space; and modifying the partition table information through a customized ATA instruction to realize the hiding of the physical partition of the storage space. The technology realizes the isolation and the hiding of the physical partition of the storage space from the content of the solid state disk, and avoids the aim of illegally reading the information of the solid state disk by attacking an operating system or application software, thereby improving the safety of the information storage of the solid state disk.
The invention relates to a solid state disk with isolated physical partitions of storage space.A storage space inside the solid state disk is divided into a plurality of independent partitions; each independent partition corresponds to a password; a partition isolation reading system is arranged in the solid state disk; the partition isolation reading system comprises an instruction receiving module, a password storage comparison module and a partition mapping reading module. The instruction receiving module is used for receiving the authentication instruction. The key used by the decryption module in decryption is stored by a register. The password storage comparison module is used for storing correct passwords of different independent partitions, comparing the password input by the user with the correct password of each independent partition and determining the independent partition which can be opened by the user; and the partition mapping reading module is used for mapping the independent partition which can be opened by the user into the whole internal storage space of the hard disk for the user to use.
Preferably, the solid state disk with the storage space physically partitioned and isolated is internally provided with a disk control chip for executing a partitioned and isolated reading system. And the disk control chip is used for controlling the partition isolation reading system.
Preferably, the partitioned isolated reading system further comprises a locking module. The locking module is used for receiving a locking instruction sent by a user, locking the solid state disk, and unlocking the solid state disk after re-inputting the user name and the password.
Preferably, the partitioned isolated reading system further comprises a random number generation module and a decryption module. The random number generation module is used for generating a random number as a key and sending the random number to a user. The random number generation module is started after the instruction receiving module receives the authentication instruction. The decryption module is used for decrypting the encrypted data input by the user through the secret key to obtain the password input by the user.
The reading method of the solid state disk comprises the following specific steps:
step 1, a user sends an authentication command to a hard disk, inputs a password and determines an independent partition which can be opened by the hard disk, wherein the independent partition is an accessed partition.
And 2, initializing the hard disk according to the address of the accessed partition, confirming whether the address of the accessed partition is legal, if so, waiting for the read-write operation of the user on the hard disk, and otherwise, hiding the accessed partition.
Step 3, the partition mapping reading module maps the storage space of the accessed partition into the internal storage space of the whole hard disk;
and 4, reading the accessed partition by the user.
Preferably, the specific process of step 1 is as follows:
1-1, the user sends an authentication command to the solid state disk.
1-2, after receiving the authentication command, the solid state disk generates a random number, saves the received random number as a secret key, and simultaneously sends the random number to a user;
1-3, the user uses the received random number as a key to encrypt the user name and the password to obtain encrypted data; then, the user sends the encrypted data to the solid state disk;
and 1-4, after receiving the encrypted data, the solid state disk decrypts the encrypted data by using a key stored by the solid state disk to obtain a user name and a password input by a user.
1-5, comparing a user name and a password input by a user with the user name and the correct password of each independent partition stored in the solid state disk by the solid state disk; if the user input user name and the password are different from the user name and the correct password of each independent partition, the solid state disk returns a prompt that the storage space cannot be read to the user; and if the user input user name and the password are the same as those of one independent partition, taking the independent partition as an accessed partition, and returning a prompt for continuing the operation to the user by the solid state disk.
Preferably, the encryption described in steps 1-3 employs the AES encryption method.
Preferably, in the initialization process of step 2, the partition mapping reading module sends the hard disk capacity S to the computer, and maps the hard disk address 0 to the physical address a. S is the capacity of the accessed partition; a is the actual physical address of the accessed partition in the solid state disk.
Preferably, in step 4, after the operation is completed, the user locks or powers off the solid state disk. The method comprises the following specific steps: the user sends a lock command to the hard disk. After the solid state disk receives the locking command, a locking module in the hard disk sets the address boundary of the hard disk at the tail of a system partition, the read-write command falling on the data partition is judged as an illegal command crossing the boundary, the read-write access exceeding the address boundary is rejected, and the system can only read and write a cache region; and makes it impossible for the system to identify the correct primary boot partition for the data partition.
Preferably, after the hard disk is locked, the original user or the new user sends an unlocking command to the solid state disk or unlocks an independent partition corresponding to the user in the solid state disk according to the method in the step 1; a locking module in the solid state disk can restore the address boundary of the hard disk to the value of the initial state; meanwhile, the main guide sector with correct data partition is identified, and the user can access the corresponding independent partition.
The invention has the beneficial effects that:
1. the invention divides the hard disk space into a plurality of independent partitions, determines the partition capable of being opened according to the password input by the user, and maps the partition capable of being opened into the whole storage space, thereby obviously improving the security of different user data.
2. The method and the device check the legality of the access address in the address space mapping process in the solid state disk, thereby ensuring the security of data in a user physical partition, and reducing the possibility of stealing the data compared with the data soft isolation on the level of an operating system or application software.
3. The invention adopts a method for locking and unlocking the physical partition, and erases the physical partition which is not unlocked from the hard disk partition table, so that an operating system and application software cannot detect the existence of the partition, and the effective hiding of the physical partition is realized.
Drawings
FIG. 1 is a flow chart of the present invention;
FIG. 2 is a diagram illustrating the authentication process in step 1 according to the present invention;
FIG. 3 is a process diagram of the hard disk space mapping in step 3 of the present invention.
Detailed Description
The present invention will be described in detail with reference to the attached drawings in conjunction with the isolation and hiding process of the physical partition of the storage space in the Windows environment.
A solid state disk with a storage space isolated by physical partitions is internally provided with a disk control chip for executing a partition isolation reading system. The internal storage space of the solid state disk is divided into a plurality of independent partitions; each independent partition corresponds to a user name and a password; only when the password of a certain independent partition is input, the partition can be opened.
A partition isolation reading system is installed in the solid state disk; the partition isolation reading system comprises an instruction receiving module, a random number generating module, a decryption module, a password storage comparison module, a partition mapping reading module and a locking module. The instruction receiving module is used for receiving the authentication instruction and starting the random number generating module. The random number generation module is used for generating a random number serving as a secret key through a random number algorithm and sending the random number to a user. The decryption module is used for decrypting the encrypted data input by the user by using the secret key to obtain the password input by the user. The key used by the decryption module in decryption is stored by a register.
The password storage comparison module is used for storing user names and correct passwords of different partitions, comparing the password input by the user with the correct password of each independent partition and determining the independent partition which can be opened by the user; the partition mapping and reading module is solid state disk firmware and is used for mapping the independent partitions which can be opened by a user into the internal storage space of the whole hard disk for the user to use and preventing the user from reading data in other independent partitions. The locking module is used for receiving a locking instruction sent by a user, locking the solid state disk, and unlocking the solid state disk after re-inputting the user name and the password.
As shown in fig. 1, the reading method of the solid state disk is as follows:
step 1, as shown in fig. 2, the solid state disk realizes the identity authentication of a legal user through authentication operation. Only the authenticated user has the authority to access the corresponding physical partition of the solid state disk. The authentication process is shown in the attached figure 2, and the process is as follows:
1-1, the user sends an authentication command to the solid state disk through an API (application program interface).
1-2, after receiving the authentication command, the solid state disk generates a random number, stores the received random number as a secret key into a register, and simultaneously sends the random number to a user through an API (application program interface);
1-3, the user uses the received random number as an AES key to carry out AES encryption (encryption according to the advanced encryption standard) on the user name and the password to obtain encrypted data; then, the user sends the encrypted data to the solid state disk through the API;
and 1-4, after the solid state disk receives the encrypted data, using a secret key stored in a register to carry out AES decryption on the encrypted data to obtain a user name and a password input by a user.
1-5, comparing a user name and a password input by a user with the user name and the correct password of each independent partition stored in the solid state disk by the solid state disk; if the user input user name and the password are different from the user name and the correct password of each independent partition, the solid state disk returns a prompt that the storage space cannot be read to the user; and if the user input user name and the password are the same as those of one independent partition, taking the independent partition as an accessed partition, and returning a prompt for continuing the operation to the user by the solid state disk.
And step 2, opening the accessed partition of the solid state disk. And the mode of opening the accessed partition is to send a customized ATA instruction to the solid state disk firmware, the firmware initializes the solid state disk according to the authenticated user information and waits for the read-write operation of the user on the solid state disk. And meanwhile, confirming whether the address of the accessed partition is legal, if so, waiting for the read-write operation of the user on the hard disk, and otherwise, hiding the accessed partition.
And 3, only performing read-write operation on the accessed partition through space mapping limitation of the solid state disk, and realizing isolation of the physical partition of the internal storage space. The method comprises the following specific steps:
as shown in fig. 3, when an accessed partition of the solid state disk space is opened, the partition mapping reading module maps the storage space of the accessed partition into the internal storage space of the entire hard disk; when the solid state disk protocol is initialized (Inquire command query capacity), the partition mapping reading module sends the capacity and address information of the partition mapping reading module to the computer: the hard disk has a capacity S and hard disk address 0 is mapped to physical address a. S is the capacity of the accessed partition; a is the actual physical address of the accessed partition in the solid state disk. At this time, the user can only see the storage space of the accessed partition of the solid state disk in the computer, and the other spaces are not visible.
And 4, reading the accessed partition by a user, and locking or powering off the solid state disk after the operation is finished. The method comprises the following specific steps:
the user sends a Lock command (i.e., Lock instruction) to the solid state disk. After the solid state disk receives the locking command, a locking module in the solid state disk sets the address boundary of the hard disk at the tail of a system partition, the read-write command falling on the data partition is judged as an illegal command crossing the boundary, the read-write access exceeding the address boundary is rejected, and the system can only read and write a cache region; and the system can not identify the correct master boot partition (MBR) of the data partition, thereby performing second-layer protection on the internal storage space of the solid state disk; therefore, all internal storage spaces of the solid state disk are hidden, and the condition that a user cannot access the data partitions is guaranteed. If normal access to the physical partition is required, unlocking can only be performed through a specific API. And when the solid state disk is powered off, the operation is the same as that of the locking command.
Step 5, the original user or the new user sends an unlocking command (namely an Unlock instruction) to the solid state disk or unlocks an independent partition corresponding to the user in the solid state disk according to the method in the step 1; a locking module in the solid state disk can restore the address boundary of the hard disk to the value of the initial state; meanwhile, the main guide sector with correct data partition is identified, and the user can access the corresponding independent partition.

Claims (10)

1. The utility model provides a solid state hard drives that memory space physics subregion was kept apart which characterized in that: the internal storage space is divided into a plurality of independent partitions; each independent partition corresponds to a password; a partition isolation reading system is arranged in the solid state disk; the partition isolation reading system comprises an instruction receiving module, a password storage comparison module and a partition mapping reading module; the instruction receiving module is used for receiving an authentication instruction; the key used by the decryption module in decryption is stored through a register; the password storage comparison module is used for storing correct passwords of different independent partitions, comparing the password input by the user with the correct password of each independent partition and determining the independent partition which can be opened by the user; and the partition mapping reading module is used for mapping the independent partition which can be opened by the user into the whole internal storage space of the hard disk for the user to use.
2. The solid state disk with the isolated storage space physical partition of claim 1, wherein: a disk control chip for executing a partition isolation reading system is arranged in the computer; and the disk control chip is used for controlling the partition isolation reading system.
3. The solid state disk with the isolated storage space physical partition of claim 1, wherein: the partitioned isolated reading system also comprises a locking module; the locking module is used for receiving a locking instruction sent by a user, locking the solid state disk, and unlocking the solid state disk after re-inputting the user name and the password.
4. The solid state disk with the isolated storage space physical partition of claim 1, wherein: the partition isolation reading system also comprises a random number generation module and a decryption module; the random number generation module is used for generating a random number as a key and sending the random number to a user; the random number generation module is started after the instruction receiving module receives the authentication instruction; the decryption module is used for decrypting the encrypted data input by the user through the secret key to obtain the password input by the user.
5. A hard disk reading method with isolated storage space physical partitions is characterized in that: step 1, a user sends an authentication command to a hard disk, inputs a password and determines an independent partition which can be opened by the hard disk, wherein the independent partition is an accessed partition;
step 2, initializing the hard disk according to the address of the accessed partition, confirming whether the address of the accessed partition is legal or not, if so, waiting for the read-write operation of the user on the hard disk, and otherwise, hiding the accessed partition;
step 3, the partition mapping reading module maps the storage space of the accessed partition into the internal storage space of the whole hard disk;
and 4, reading the accessed partition by the user.
6. The solid state disk with the isolated storage space physical partition of claim 5, wherein: the specific process of step 1 is as follows:
1-1, a user sends an authentication command to a solid state disk;
1-2, after receiving the authentication command, the solid state disk generates a random number, saves the received random number as a secret key, and simultaneously sends the random number to a user;
1-3, the user uses the received random number as a key to encrypt the user name and the password to obtain encrypted data; then, the user sends the encrypted data to the solid state disk;
1-4, after receiving the encrypted data, the solid state disk decrypts the encrypted data by using a key stored by the solid state disk to obtain a user name and a password input by a user;
1-5, comparing a user name and a password input by a user with the user name and the correct password of each independent partition stored in the solid state disk by the solid state disk; if the user input user name and the password are different from the user name and the correct password of each independent partition, the solid state disk returns a prompt that the storage space cannot be read to the user; and if the user input user name and the password are the same as those of one independent partition, taking the independent partition as an accessed partition, and returning a prompt for continuing the operation to the user by the solid state disk.
7. The solid state disk with the isolated physical partition of the storage space of claim 6, wherein: the encryption described in steps 1-3 employs the AES encryption method.
8. The solid state disk with the isolated storage space physical partition of claim 5, wherein: in the initialization process of the step 2, the partition mapping reading module sends the hard disk capacity S to the computer, and maps the hard disk address 0 to the physical address A; s is the capacity of the accessed partition; a is the actual physical address of the accessed partition in the solid state disk.
9. The solid state disk with the isolated storage space physical partition of claim 5, wherein: in step 4, after the operation is finished, the user locks or powers off the solid state disk; the method comprises the following specific steps: a user sends a locking command to the hard disk; after the solid state disk receives the locking command, a locking module in the hard disk sets the address boundary of the hard disk at the tail of a system partition, the read-write command falling on the data partition is judged as an illegal command crossing the boundary, the read-write access exceeding the address boundary is rejected, and the system can only read and write a cache region; and makes it impossible for the system to identify the correct primary boot partition for the data partition.
10. The solid state disk with the isolated physical partition of the storage space of claim 9, wherein: after the hard disk is locked, the original user or the new user sends an unlocking command to the solid state disk or unlocks an independent partition corresponding to the user in the solid state disk according to the method in the step 1; a locking module in the solid state disk can restore the address boundary of the hard disk to the value of the initial state; meanwhile, the main guide sector with correct data partition is identified, and the user can access the corresponding independent partition.
CN202010811739.6A 2020-08-13 2020-08-13 Physical partition isolation and hiding method for storage space of solid state disk Active CN112083879B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010811739.6A CN112083879B (en) 2020-08-13 2020-08-13 Physical partition isolation and hiding method for storage space of solid state disk

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010811739.6A CN112083879B (en) 2020-08-13 2020-08-13 Physical partition isolation and hiding method for storage space of solid state disk

Publications (2)

Publication Number Publication Date
CN112083879A true CN112083879A (en) 2020-12-15
CN112083879B CN112083879B (en) 2023-04-07

Family

ID=73729353

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010811739.6A Active CN112083879B (en) 2020-08-13 2020-08-13 Physical partition isolation and hiding method for storage space of solid state disk

Country Status (1)

Country Link
CN (1) CN112083879B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112560058A (en) * 2020-12-17 2021-03-26 山东华芯半导体有限公司 SSD partition encryption storage system based on intelligent password key and implementation method thereof
CN114153396A (en) * 2021-12-03 2022-03-08 湖南国科微电子股份有限公司 Data processing method and device, data storage equipment and terminal equipment
CN115048681A (en) * 2022-05-10 2022-09-13 黄建邦 Data security protection method and device, target device and storage medium
US20220334746A1 (en) * 2021-04-14 2022-10-20 SK Hynix Inc. Storage device and operating method thereof

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050138396A1 (en) * 2003-12-22 2005-06-23 International Business Machines Corporation Method and system for protecting a hard disk
US20050172144A1 (en) * 2002-05-20 2005-08-04 Tong Shao Apparatus and method for securely isolating hard disk
CN1831787A (en) * 2005-03-10 2006-09-13 联想(北京)有限公司 Method for setting hard disk physical partition
JP2007035136A (en) * 2005-07-26 2007-02-08 Buffalo Inc External hard disk storing apparatus, control method of external hard disk storing apparatus, and control program of external hard disk storing apparatus
CN1959587A (en) * 2005-11-01 2007-05-09 联想(北京)有限公司 Method for realizing isolation among multiple users of using same computer
CN101436233A (en) * 2007-11-12 2009-05-20 中国长城计算机深圳股份有限公司 Hard disk multi-user partition switch control method, system and computer terminal
JP2009129453A (en) * 2007-11-19 2009-06-11 Lenovo (Beijing) Co Ltd Hard disk data protection device, hard disk, computer, and hard disk data protection method
CN109711206A (en) * 2018-12-17 2019-05-03 杭州华澜微电子股份有限公司 A kind of safe hard disk of multi-user and its control method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050172144A1 (en) * 2002-05-20 2005-08-04 Tong Shao Apparatus and method for securely isolating hard disk
US20050138396A1 (en) * 2003-12-22 2005-06-23 International Business Machines Corporation Method and system for protecting a hard disk
CN1831787A (en) * 2005-03-10 2006-09-13 联想(北京)有限公司 Method for setting hard disk physical partition
JP2007035136A (en) * 2005-07-26 2007-02-08 Buffalo Inc External hard disk storing apparatus, control method of external hard disk storing apparatus, and control program of external hard disk storing apparatus
CN1959587A (en) * 2005-11-01 2007-05-09 联想(北京)有限公司 Method for realizing isolation among multiple users of using same computer
CN101436233A (en) * 2007-11-12 2009-05-20 中国长城计算机深圳股份有限公司 Hard disk multi-user partition switch control method, system and computer terminal
JP2009129453A (en) * 2007-11-19 2009-06-11 Lenovo (Beijing) Co Ltd Hard disk data protection device, hard disk, computer, and hard disk data protection method
CN109711206A (en) * 2018-12-17 2019-05-03 杭州华澜微电子股份有限公司 A kind of safe hard disk of multi-user and its control method

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112560058A (en) * 2020-12-17 2021-03-26 山东华芯半导体有限公司 SSD partition encryption storage system based on intelligent password key and implementation method thereof
US20220334746A1 (en) * 2021-04-14 2022-10-20 SK Hynix Inc. Storage device and operating method thereof
US11836370B2 (en) * 2021-04-14 2023-12-05 SK Hynix Inc. Storage device and operating method thereof
CN114153396A (en) * 2021-12-03 2022-03-08 湖南国科微电子股份有限公司 Data processing method and device, data storage equipment and terminal equipment
CN114153396B (en) * 2021-12-03 2024-03-19 湖南国科微电子股份有限公司 Data processing method and device, data storage device and terminal device
CN115048681A (en) * 2022-05-10 2022-09-13 黄建邦 Data security protection method and device, target device and storage medium
CN115048681B (en) * 2022-05-10 2024-02-20 黄建邦 Data security protection method and device, target equipment and storage medium

Also Published As

Publication number Publication date
CN112083879B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
CN112083879B (en) Physical partition isolation and hiding method for storage space of solid state disk
US8356184B1 (en) Data storage device comprising a secure processor for maintaining plaintext access to an LBA table
US7900252B2 (en) Method and apparatus for managing shared passwords on a multi-user computer
US7721115B2 (en) USB secure storage apparatus and method
US8230207B2 (en) System and method of providing security to an external attachment device
CN101416195B (en) Computer system to control access to a storage device
JP5724118B2 (en) Protection device management
US7971241B2 (en) Techniques for providing verifiable security in storage devices
US7941847B2 (en) Method and apparatus for providing a secure single sign-on to a computer system
US20130219191A1 (en) Platform firmware armoring technology
US20070180210A1 (en) Storage device for providing flexible protected access for security applications
US8539250B2 (en) Secure, two-stage storage system
CN105354479A (en) USB flash disk authentication based solid state disk and data hiding method
CN101788959A (en) Solid state hard disk secure encryption system
US20100023650A1 (en) System and method for using a smart card in conjunction with a flash memory controller to detect logon authentication
CN112084472B (en) Real-time dynamic authentication method for multi-user secure storage
JP2010020751A (en) Content protection method, computer system, and storage medium
CN110795776A (en) Safety hard disk
US10515022B2 (en) Data center with data encryption and method for operating data center
JP2009526472A (en) Data security including real-time key generation
KR20130111352A (en) Information storage device, control method of information storage device and recording medium
CN110807186B (en) Method, device, equipment and storage medium for safe storage of storage equipment
CN105279453A (en) Separate storage management-supporting file partition hiding system and method thereof
TW201112034A (en) Authentication method, associated controller, host computer, and machine-readable medium
JP4561213B2 (en) Hard disk security management system and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant