CN113190181A - Virtual disk mounting method and system - Google Patents

Virtual disk mounting method and system Download PDF

Info

Publication number
CN113190181A
CN113190181A CN202110592484.3A CN202110592484A CN113190181A CN 113190181 A CN113190181 A CN 113190181A CN 202110592484 A CN202110592484 A CN 202110592484A CN 113190181 A CN113190181 A CN 113190181A
Authority
CN
China
Prior art keywords
disk
user
data segment
request message
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110592484.3A
Other languages
Chinese (zh)
Inventor
张跃
梁佳佳
张诚金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING TIP TECHNOLOGY CO LTD
Original Assignee
BEIJING TIP TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING TIP TECHNOLOGY CO LTD filed Critical BEIJING TIP TECHNOLOGY CO LTD
Priority to CN202110592484.3A priority Critical patent/CN113190181A/en
Publication of CN113190181A publication Critical patent/CN113190181A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0655Vertical data movement, i.e. input-output transfer; data movement between one or more hosts and one or more storage devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0662Virtualisation aspects

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The embodiment of the application discloses a virtual disk mounting method and a virtual disk mounting system, which prompt a user to log in after a disk mounting program is started; verifying user information and acquiring user disk information; carrying out disk mounting operation according to the user disk information; and after mounting, reading and/or writing the disk data according to the user instruction. The virtual disk is mounted through technologies such as driving, network transmission, encryption and decryption, disk data of a user are encrypted and stored on the server in a centralized mode, and centralized and safe storage and local non-retention of the data are achieved.

Description

Virtual disk mounting method and system
Technical Field
The embodiment of the application relates to the technical field of information security, in particular to a virtual disk mounting method and system.
Background
Data storage in a local hard disk is unsafe, for example, if the hard disk is lost, data leakage can be caused; when the user computer is damaged, the user office may be interrupted, and the user data may be lost; when a user changes an office computer, original computer data needs to be transferred to a new computer, and in order to ensure data safety, the storage medium of the original computer needs to be destroyed and the like.
Disclosure of Invention
Therefore, the embodiment of the application provides a virtual disk mounting method and a virtual disk mounting system, wherein the virtual disk is mounted through technologies such as driving, network transmission, encryption and decryption, and the like, and disk data of a user is stored on a server in a centralized and encrypted manner, so that centralized and safe data storage and local non-retention are realized.
In order to achieve the above object, the embodiments of the present application provide the following technical solutions:
according to a first aspect of an embodiment of the present application, a virtual disk mount method is provided, where the method includes:
prompting a user to log in after a disk mounting program is started;
verifying user information and acquiring user disk information;
carrying out disk mounting operation according to the user disk information;
and after mounting, reading and/or writing the disk data according to the user instruction.
Optionally, the reading the disk data according to the user instruction includes:
a user triggers the operation of reading the data segment of the disk;
the disk drive receives a request message for reading the data segment and sends the request message for reading the data segment to a client;
the client encrypts the read data segment request message and sends the encrypted read data segment request message to a server;
the server reads the corresponding data segment according to the actual disk file of the user and returns the corresponding data segment to the client;
the client side returns the data segment to the driving module after decryption;
the driver module responds to a read data segment request message from a user.
Optionally, the writing the disk data according to the user instruction includes:
a user triggers a write-in disk operation;
the disk drive receives a request message for writing data segments and sends the request message for writing data segments to the client;
the client encrypts the request message for writing the data segment and sends the encrypted request message to a server;
the server encrypts and writes the data segment into the actual disk file of the user and returns a writing result;
the client returns the writing result to the driving module;
the driver module responds to a user's write data segment request message.
According to a second aspect of the embodiments of the present application, there is provided a virtual disk mount system, including:
the login module is used for prompting a user to log in after the disk mounting program is started;
the disk information acquisition module is used for verifying the user information and acquiring the user disk information;
the disk mounting module is used for carrying out disk mounting operation according to the user disk information;
and the read-write module is used for reading and/or writing the disk data according to the user instruction after the mounting is finished.
Optionally, the read-write module is specifically configured to:
a user triggers the operation of reading the data segment of the disk;
the disk drive receives a request message for reading the data segment and sends the request message for reading the data segment to a client;
the client encrypts the read data segment request message and sends the encrypted read data segment request message to a server;
the server reads the corresponding data segment according to the actual disk file of the user and returns the corresponding data segment to the client;
the client side returns the data segment to the driving module after decryption;
the driver module responds to a read data segment request message from a user.
Optionally, the read-write module is specifically configured to:
a user triggers a write-in disk operation;
the disk drive receives a request message for writing data segments and sends the request message for writing data segments to the client;
the client encrypts the request message for writing the data segment and sends the encrypted request message to a server;
the server encrypts and writes the data segment into the actual disk file of the user and returns a writing result;
the client returns the writing result to the driving module;
the driver module responds to a user's write data segment request message.
According to a third aspect of embodiments herein, there is provided an apparatus comprising: the device comprises a data acquisition device, a processor and a memory; the data acquisition device is used for acquiring data; the memory is to store one or more program instructions; the processor is configured to execute one or more program instructions to perform the method of any of the first aspect.
According to a fourth aspect of embodiments herein, there is provided a computer-readable storage medium having one or more program instructions embodied therein for performing the method of any of the first aspects.
To sum up, the embodiment of the present application provides a virtual disk mount method and system, which prompt a user to log in after a disk mount program is started; verifying user information and acquiring user disk information; carrying out disk mounting operation according to the user disk information; and after mounting, reading and/or writing the disk data according to the user instruction. The virtual disk is mounted through technologies such as driving, network transmission, encryption and decryption, disk data of a user are encrypted and stored on the server in a centralized mode, and centralized and safe storage and local non-retention of the data are achieved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It should be apparent that the drawings in the following description are merely exemplary, and that other embodiments can be derived from the drawings provided by those of ordinary skill in the art without inventive effort.
The structures, ratios, sizes, and the like shown in the present specification are only used for matching with the contents disclosed in the specification, so that those skilled in the art can understand and read the present invention, and do not limit the conditions for implementing the present invention, so that the present invention has no technical significance, and any structural modifications, changes in the ratio relationship, or adjustments of the sizes, without affecting the functions and purposes of the present invention, should still fall within the scope of the present invention.
Fig. 1 is a virtual disk mounting method according to an embodiment of the present application;
fig. 2 is a disk mounting process provided in the embodiment of the present application;
FIG. 3 is a flow chart of reading data from a disk according to an embodiment of the present application;
FIG. 4 is a flow chart of writing data into a disk according to an embodiment of the present application;
fig. 5 is a block diagram of a virtual disk mount system according to an embodiment of the present application.
Detailed Description
The present invention is described in terms of particular embodiments, other advantages and features of the invention will become apparent to those skilled in the art from the following disclosure, and it is to be understood that the described embodiments are merely exemplary of the invention and that it is not intended to limit the invention to the particular embodiments disclosed. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 illustrates a virtual disk mount method, which includes:
step 101: prompting a user to log in after a disk mounting program is started;
step 102: verifying user information and acquiring user disk information;
step 103: carrying out disk mounting operation according to the user disk information;
step 104: and after mounting, reading and/or writing the disk data according to the user instruction.
In a possible implementation manner, the reading of the disk data according to the user instruction includes:
a user triggers the operation of reading the data segment of the disk; the disk drive receives a request message for reading the data segment and sends the request message for reading the data segment to a client; the client encrypts the read data segment request message and sends the encrypted read data segment request message to a server; the server reads the corresponding data segment according to the actual disk file of the user and returns the corresponding data segment to the client; the client side returns the data segment to the driving module after decryption; the driver module responds to a read data segment request message from a user.
In a possible implementation manner, the writing of the disk data according to the user instruction includes:
a user triggers a write-in disk operation; the disk drive receives a request message for writing data segments and sends the request message for writing data segments to the client; the client encrypts the request message for writing the data segment and sends the encrypted request message to a server; the server encrypts and writes the data segment into the actual disk file of the user and returns a writing result; the client returns the writing result to the driving module; the driver module responds to a user's write data segment request message.
The embodiment of the application intercepts and responds to the requests of reading and writing the disk data segment by a user by using a driving technical means; sending the user request information to a server by using a network transmission technology; encrypting and transmitting network data by using an encryption and decryption technology; and (4) encrypting and storing the disk data by using an encryption and decryption technology.
Fig. 2 shows a disk mount process provided in an embodiment of the present application, which specifically includes the following steps:
step 1: prompting a user to log in after the program is started;
step 2: the user inputs correct user information to log in, and the server acquires and returns the disk information of the user;
and step 3: carrying out disk mounting operation according to the returned disk information;
and 4, step 4: and after the mounting is finished, waiting for a user to read/write the disk.
Fig. 3 shows a disk data reading process provided in this embodiment of the present application, which specifically includes the following steps:
step 1: a user triggers the operation of reading the data segment of the disk;
step 2: the disk drive receives the data segment reading request and sends a user reading request to the client;
and step 3: the client encrypts the user request information and sends the user request information to the server;
and 4, step 4: the server receives a data reading request of a user, reads a corresponding data segment from an actual disk file of the user, and returns the corresponding data segment to the client;
and 5: the client side returns the data segment to the driving module after decryption;
step 6: the driver responds to a read request from a user.
Fig. 4 shows a disk data writing process provided in this embodiment of the present application, which specifically includes the following steps:
step 1: a user triggers a disk writing operation;
step 2: the disk drive receives the request of writing the data segment and sends the user writing request to the client;
and step 3: the client encrypts the user request information and sends the encrypted user request information to the server;
and 4, step 4: the server receives a data segment writing request of a user, encrypts and writes the data segment into an actual disk file of the user, and returns a writing result;
and 5: the client returns the result to the disk drive;
step 6: the driver responds to a user request to write a segment of data.
Therefore, by the method provided by the embodiment of the application, the data can be stored in the server in an encrypted manner without being retained locally, and the data is not leaked or lost when the conditions of hard disk loss, computer damage, office computer replacement and the like are met. Meanwhile, the user can flexibly select the office computer as long as the computer can be connected to the server.
The data security can be ensured: the data is encrypted and stored on the server in a centralized manner and is not stored locally, so that the data storage is safer; the login is flexible: the user can select any computer in the network to work as long as the computer can be connected with the server.
To sum up, the embodiment of the present application provides a virtual disk mount method, which prompts a user to log in after a disk mount program is started; verifying user information and acquiring user disk information; carrying out disk mounting operation according to the user disk information; and after mounting, reading and/or writing the disk data according to the user instruction. The virtual disk is mounted through technologies such as driving, network transmission, encryption and decryption, disk data of a user are encrypted and stored on the server in a centralized mode, and centralized and safe storage and local non-retention of the data are achieved.
Based on the same technical concept, an embodiment of the present application further provides a virtual disk mount system, as shown in fig. 5, the system includes:
a login module 501, configured to prompt a user to log in after a disk mount program is started;
a disk information obtaining module 502, configured to verify user information and obtain user disk information;
a disk mount module 503, configured to perform a disk mount operation according to the user disk information;
and the read-write module 504 is configured to read and/or write data of the disk according to a user instruction after the mounting is completed.
In a possible implementation manner, the read-write module 504 is specifically configured to:
a user triggers the operation of reading the data segment of the disk; the disk drive receives a request message for reading the data segment and sends the request message for reading the data segment to a client; the client encrypts the read data segment request message and sends the encrypted read data segment request message to a server; the server reads the corresponding data segment according to the actual disk file of the user and returns the corresponding data segment to the client; the client side returns the data segment to the driving module after decryption; the driver module responds to a read data segment request message from a user.
In a possible implementation manner, the read-write module 504 is specifically configured to:
a user triggers a write-in disk operation; the disk drive receives a request message for writing data segments and sends the request message for writing data segments to the client; the client encrypts the request message for writing the data segment and sends the encrypted request message to a server; the server encrypts and writes the data segment into the actual disk file of the user and returns a writing result; the client returns the writing result to the driving module; the driver module responds to a user's write data segment request message.
Based on the same technical concept, an embodiment of the present application further provides an apparatus, including: the device comprises a data acquisition device, a processor and a memory; the data acquisition device is used for acquiring data; the memory is to store one or more program instructions; the processor is configured to execute one or more program instructions to perform the method.
Based on the same technical concept, the embodiment of the present application also provides a computer-readable storage medium, wherein the computer-readable storage medium contains one or more program instructions, and the one or more program instructions are used for executing the method.
In the present specification, each embodiment of the method is described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. Reference is made to the description of the method embodiments.
It is noted that while the operations of the methods of the present invention are depicted in the drawings in a particular order, this is not a requirement or suggestion that the operations must be performed in this particular order or that all of the illustrated operations must be performed to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
Although the present application provides method steps as in embodiments or flowcharts, additional or fewer steps may be included based on conventional or non-inventive approaches. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an apparatus or client product in practice executes, it may execute sequentially or in parallel (e.g., in a parallel processor or multithreaded processing environment, or even in a distributed data processing environment) according to the embodiments or methods shown in the figures. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the presence of additional identical or equivalent elements in a process, method, article, or apparatus that comprises the recited elements is not excluded.
The units, devices, modules, etc. set forth in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. Of course, in implementing the present application, the functions of each module may be implemented in one or more software and/or hardware, or a module implementing the same function may be implemented by a combination of a plurality of sub-modules or sub-units, and the like. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may therefore be considered as a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, classes, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, or the like, and includes several instructions for enabling a computer device (which may be a personal computer, a mobile terminal, a server, or a network device) to execute the method according to the embodiments or some parts of the embodiments of the present application.
The embodiments in the present specification are described in a progressive manner, and the same or similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. The application is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable electronic devices, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
The above-mentioned embodiments are further described in detail for the purpose of illustrating the invention, and it should be understood that the above-mentioned embodiments are only illustrative of the present invention and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements, etc. made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (8)

1. A virtual disk mounting method is characterized by comprising the following steps:
prompting a user to log in after a disk mounting program is started;
verifying user information and acquiring user disk information;
carrying out disk mounting operation according to the user disk information;
and after mounting, reading and/or writing the disk data according to the user instruction.
2. The method of claim 1, wherein reading the disk data according to the user indication comprises:
a user triggers the operation of reading the data segment of the disk;
the disk drive receives a request message for reading the data segment and sends the request message for reading the data segment to a client;
the client encrypts the read data segment request message and sends the encrypted read data segment request message to a server;
the server reads the corresponding data segment according to the actual disk file of the user and returns the corresponding data segment to the client;
the client side returns the data segment to the driving module after decryption;
the driver module responds to a read data segment request message from a user.
3. The method of claim 1, wherein writing disk data according to a user indication comprises:
a user triggers a write-in disk operation;
the disk drive receives a request message for writing data segments and sends the request message for writing data segments to the client;
the client encrypts the request message for writing the data segment and sends the encrypted request message to a server;
the server encrypts and writes the data segment into the actual disk file of the user and returns a writing result;
the client returns the writing result to the driving module;
the driver module responds to a user's write data segment request message.
4. A virtual disk mount system, the system comprising:
the login module is used for prompting a user to log in after the disk mounting program is started;
the disk information acquisition module is used for verifying the user information and acquiring the user disk information;
the disk mounting module is used for carrying out disk mounting operation according to the user disk information;
and the read-write module is used for reading and/or writing the disk data according to the user instruction after the mounting is finished.
5. The system of claim 4, wherein the read-write module is specifically configured to:
a user triggers the operation of reading the data segment of the disk;
the disk drive receives a request message for reading the data segment and sends the request message for reading the data segment to a client;
the client encrypts the read data segment request message and sends the encrypted read data segment request message to a server;
the server reads the corresponding data segment according to the actual disk file of the user and returns the corresponding data segment to the client;
the client side returns the data segment to the driving module after decryption;
the driver module responds to a read data segment request message from a user.
6. The system of claim 4, wherein the read-write module is specifically configured to:
a user triggers a write-in disk operation;
the disk drive receives a request message for writing data segments and sends the request message for writing data segments to the client;
the client encrypts the request message for writing the data segment and sends the encrypted request message to a server;
the server encrypts and writes the data segment into the actual disk file of the user and returns a writing result;
the client returns the writing result to the driving module;
the driver module responds to a user's write data segment request message.
7. An apparatus, characterized in that the apparatus comprises: the device comprises a data acquisition device, a processor and a memory;
the data acquisition device is used for acquiring data; the memory is to store one or more program instructions; the processor, configured to execute one or more program instructions to perform the method of any of claims 1-3.
8. A computer-readable storage medium having one or more program instructions embodied therein for performing the method of any of claims 1-3.
CN202110592484.3A 2021-05-28 2021-05-28 Virtual disk mounting method and system Pending CN113190181A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110592484.3A CN113190181A (en) 2021-05-28 2021-05-28 Virtual disk mounting method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110592484.3A CN113190181A (en) 2021-05-28 2021-05-28 Virtual disk mounting method and system

Publications (1)

Publication Number Publication Date
CN113190181A true CN113190181A (en) 2021-07-30

Family

ID=76986381

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110592484.3A Pending CN113190181A (en) 2021-05-28 2021-05-28 Virtual disk mounting method and system

Country Status (1)

Country Link
CN (1) CN113190181A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114385091A (en) * 2022-03-24 2022-04-22 天津联想协同科技有限公司 Method and device for realizing network disk drive character, network disk and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101986651A (en) * 2010-08-26 2011-03-16 上海网众信息技术有限公司 Remote storage method, remote storage system and client
WO2016192456A1 (en) * 2015-06-04 2016-12-08 中兴通讯股份有限公司 Local mounting processing method, apparatus and system for network disk
CN111045601A (en) * 2019-11-07 2020-04-21 北京北信源软件股份有限公司 Fuse-based virtual disk loading method and system
CN112667172A (en) * 2021-01-19 2021-04-16 南方电网科学研究院有限责任公司 Disk operation method, device, system, storage medium and computing equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101986651A (en) * 2010-08-26 2011-03-16 上海网众信息技术有限公司 Remote storage method, remote storage system and client
WO2016192456A1 (en) * 2015-06-04 2016-12-08 中兴通讯股份有限公司 Local mounting processing method, apparatus and system for network disk
CN111045601A (en) * 2019-11-07 2020-04-21 北京北信源软件股份有限公司 Fuse-based virtual disk loading method and system
CN112667172A (en) * 2021-01-19 2021-04-16 南方电网科学研究院有限责任公司 Disk operation method, device, system, storage medium and computing equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114385091A (en) * 2022-03-24 2022-04-22 天津联想协同科技有限公司 Method and device for realizing network disk drive character, network disk and storage medium

Similar Documents

Publication Publication Date Title
TWI744797B (en) Computer implement method, system and computer program product for binding secure keys of secure guests to a hardware security module
EP3369030B1 (en) Methods and apparatus for mobile computing device security in testing facilities
CN113544675A (en) Secure execution of client owner environment control symbols
CN112753196B (en) HSM self-destruction method, system and storage medium in hybrid cloud KMS solution
CN102622311A (en) USB (universal serial bus) mobile memory device access control method, USB mobile memory device access control device and USB mobile memory device access control system
CN110555293A (en) Method, apparatus, electronic device and computer readable medium for protecting data
CN112231702B (en) Application protection method, device, equipment and medium
CN105678192A (en) Smart card based secret key application method and application apparatus
CN101047701B (en) System and method for ensuring safety operation of applied program
CN113544674A (en) Secure execution client owner control for secure interface controls
CN111628863B (en) Data signature method and device, electronic equipment and storage medium
CN113544679A (en) Incremental decryption and integrity verification of secure operating system images
CN113342425A (en) Starting method, device and storage medium of Linux embedded system
US10366227B2 (en) Secure debugging in a trustable computing environment
CN113190181A (en) Virtual disk mounting method and system
CN113052305B (en) Method for operating a neural network model, electronic device and storage medium
CN104731626A (en) Application installation method and device
CN113918999A (en) Method and device for establishing safe ferry channel, network disk and storage medium
CN106326782A (en) Information processing method and electronic device
CN109324843B (en) Fingerprint processing system and method and fingerprint equipment
CN116204211A (en) Information processing method, device, equipment and computer readable storage medium
CN115033870A (en) Anti-malicious tampering code method and device based on big data cloud deployment
EP3007092B1 (en) Mobile device-based authentication method and authentication apparatus
CN105574425A (en) Method and device for accessing stored data
CN109711177A (en) Data safety control method and terminal device based on biological information identification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination