CN113190181A - Virtual disk mounting method and system - Google Patents
Virtual disk mounting method and system Download PDFInfo
- Publication number
- CN113190181A CN113190181A CN202110592484.3A CN202110592484A CN113190181A CN 113190181 A CN113190181 A CN 113190181A CN 202110592484 A CN202110592484 A CN 202110592484A CN 113190181 A CN113190181 A CN 113190181A
- Authority
- CN
- China
- Prior art keywords
- disk
- user
- data segment
- request message
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000005516 engineering process Methods 0.000 abstract description 7
- 230000005540 biological transmission Effects 0.000 abstract description 5
- 230000014759 maintenance of location Effects 0.000 abstract description 4
- 230000006870 function Effects 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 238000004891 communication Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000013500 data storage Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000000750 progressive effect Effects 0.000 description 2
- 108010001267 Protein Subunits Proteins 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0655—Vertical data movement, i.e. input-output transfer; data movement between one or more hosts and one or more storage devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0662—Virtualisation aspects
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Debugging And Monitoring (AREA)
Abstract
The embodiment of the application discloses a virtual disk mounting method and a virtual disk mounting system, which prompt a user to log in after a disk mounting program is started; verifying user information and acquiring user disk information; carrying out disk mounting operation according to the user disk information; and after mounting, reading and/or writing the disk data according to the user instruction. The virtual disk is mounted through technologies such as driving, network transmission, encryption and decryption, disk data of a user are encrypted and stored on the server in a centralized mode, and centralized and safe storage and local non-retention of the data are achieved.
Description
Technical Field
The embodiment of the application relates to the technical field of information security, in particular to a virtual disk mounting method and system.
Background
Data storage in a local hard disk is unsafe, for example, if the hard disk is lost, data leakage can be caused; when the user computer is damaged, the user office may be interrupted, and the user data may be lost; when a user changes an office computer, original computer data needs to be transferred to a new computer, and in order to ensure data safety, the storage medium of the original computer needs to be destroyed and the like.
Disclosure of Invention
Therefore, the embodiment of the application provides a virtual disk mounting method and a virtual disk mounting system, wherein the virtual disk is mounted through technologies such as driving, network transmission, encryption and decryption, and the like, and disk data of a user is stored on a server in a centralized and encrypted manner, so that centralized and safe data storage and local non-retention are realized.
In order to achieve the above object, the embodiments of the present application provide the following technical solutions:
according to a first aspect of an embodiment of the present application, a virtual disk mount method is provided, where the method includes:
prompting a user to log in after a disk mounting program is started;
verifying user information and acquiring user disk information;
carrying out disk mounting operation according to the user disk information;
and after mounting, reading and/or writing the disk data according to the user instruction.
Optionally, the reading the disk data according to the user instruction includes:
a user triggers the operation of reading the data segment of the disk;
the disk drive receives a request message for reading the data segment and sends the request message for reading the data segment to a client;
the client encrypts the read data segment request message and sends the encrypted read data segment request message to a server;
the server reads the corresponding data segment according to the actual disk file of the user and returns the corresponding data segment to the client;
the client side returns the data segment to the driving module after decryption;
the driver module responds to a read data segment request message from a user.
Optionally, the writing the disk data according to the user instruction includes:
a user triggers a write-in disk operation;
the disk drive receives a request message for writing data segments and sends the request message for writing data segments to the client;
the client encrypts the request message for writing the data segment and sends the encrypted request message to a server;
the server encrypts and writes the data segment into the actual disk file of the user and returns a writing result;
the client returns the writing result to the driving module;
the driver module responds to a user's write data segment request message.
According to a second aspect of the embodiments of the present application, there is provided a virtual disk mount system, including:
the login module is used for prompting a user to log in after the disk mounting program is started;
the disk information acquisition module is used for verifying the user information and acquiring the user disk information;
the disk mounting module is used for carrying out disk mounting operation according to the user disk information;
and the read-write module is used for reading and/or writing the disk data according to the user instruction after the mounting is finished.
Optionally, the read-write module is specifically configured to:
a user triggers the operation of reading the data segment of the disk;
the disk drive receives a request message for reading the data segment and sends the request message for reading the data segment to a client;
the client encrypts the read data segment request message and sends the encrypted read data segment request message to a server;
the server reads the corresponding data segment according to the actual disk file of the user and returns the corresponding data segment to the client;
the client side returns the data segment to the driving module after decryption;
the driver module responds to a read data segment request message from a user.
Optionally, the read-write module is specifically configured to:
a user triggers a write-in disk operation;
the disk drive receives a request message for writing data segments and sends the request message for writing data segments to the client;
the client encrypts the request message for writing the data segment and sends the encrypted request message to a server;
the server encrypts and writes the data segment into the actual disk file of the user and returns a writing result;
the client returns the writing result to the driving module;
the driver module responds to a user's write data segment request message.
According to a third aspect of embodiments herein, there is provided an apparatus comprising: the device comprises a data acquisition device, a processor and a memory; the data acquisition device is used for acquiring data; the memory is to store one or more program instructions; the processor is configured to execute one or more program instructions to perform the method of any of the first aspect.
According to a fourth aspect of embodiments herein, there is provided a computer-readable storage medium having one or more program instructions embodied therein for performing the method of any of the first aspects.
To sum up, the embodiment of the present application provides a virtual disk mount method and system, which prompt a user to log in after a disk mount program is started; verifying user information and acquiring user disk information; carrying out disk mounting operation according to the user disk information; and after mounting, reading and/or writing the disk data according to the user instruction. The virtual disk is mounted through technologies such as driving, network transmission, encryption and decryption, disk data of a user are encrypted and stored on the server in a centralized mode, and centralized and safe storage and local non-retention of the data are achieved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It should be apparent that the drawings in the following description are merely exemplary, and that other embodiments can be derived from the drawings provided by those of ordinary skill in the art without inventive effort.
The structures, ratios, sizes, and the like shown in the present specification are only used for matching with the contents disclosed in the specification, so that those skilled in the art can understand and read the present invention, and do not limit the conditions for implementing the present invention, so that the present invention has no technical significance, and any structural modifications, changes in the ratio relationship, or adjustments of the sizes, without affecting the functions and purposes of the present invention, should still fall within the scope of the present invention.
Fig. 1 is a virtual disk mounting method according to an embodiment of the present application;
fig. 2 is a disk mounting process provided in the embodiment of the present application;
FIG. 3 is a flow chart of reading data from a disk according to an embodiment of the present application;
FIG. 4 is a flow chart of writing data into a disk according to an embodiment of the present application;
fig. 5 is a block diagram of a virtual disk mount system according to an embodiment of the present application.
Detailed Description
The present invention is described in terms of particular embodiments, other advantages and features of the invention will become apparent to those skilled in the art from the following disclosure, and it is to be understood that the described embodiments are merely exemplary of the invention and that it is not intended to limit the invention to the particular embodiments disclosed. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 illustrates a virtual disk mount method, which includes:
step 101: prompting a user to log in after a disk mounting program is started;
step 102: verifying user information and acquiring user disk information;
step 103: carrying out disk mounting operation according to the user disk information;
step 104: and after mounting, reading and/or writing the disk data according to the user instruction.
In a possible implementation manner, the reading of the disk data according to the user instruction includes:
a user triggers the operation of reading the data segment of the disk; the disk drive receives a request message for reading the data segment and sends the request message for reading the data segment to a client; the client encrypts the read data segment request message and sends the encrypted read data segment request message to a server; the server reads the corresponding data segment according to the actual disk file of the user and returns the corresponding data segment to the client; the client side returns the data segment to the driving module after decryption; the driver module responds to a read data segment request message from a user.
In a possible implementation manner, the writing of the disk data according to the user instruction includes:
a user triggers a write-in disk operation; the disk drive receives a request message for writing data segments and sends the request message for writing data segments to the client; the client encrypts the request message for writing the data segment and sends the encrypted request message to a server; the server encrypts and writes the data segment into the actual disk file of the user and returns a writing result; the client returns the writing result to the driving module; the driver module responds to a user's write data segment request message.
The embodiment of the application intercepts and responds to the requests of reading and writing the disk data segment by a user by using a driving technical means; sending the user request information to a server by using a network transmission technology; encrypting and transmitting network data by using an encryption and decryption technology; and (4) encrypting and storing the disk data by using an encryption and decryption technology.
Fig. 2 shows a disk mount process provided in an embodiment of the present application, which specifically includes the following steps:
step 1: prompting a user to log in after the program is started;
step 2: the user inputs correct user information to log in, and the server acquires and returns the disk information of the user;
and step 3: carrying out disk mounting operation according to the returned disk information;
and 4, step 4: and after the mounting is finished, waiting for a user to read/write the disk.
Fig. 3 shows a disk data reading process provided in this embodiment of the present application, which specifically includes the following steps:
step 1: a user triggers the operation of reading the data segment of the disk;
step 2: the disk drive receives the data segment reading request and sends a user reading request to the client;
and step 3: the client encrypts the user request information and sends the user request information to the server;
and 4, step 4: the server receives a data reading request of a user, reads a corresponding data segment from an actual disk file of the user, and returns the corresponding data segment to the client;
and 5: the client side returns the data segment to the driving module after decryption;
step 6: the driver responds to a read request from a user.
Fig. 4 shows a disk data writing process provided in this embodiment of the present application, which specifically includes the following steps:
step 1: a user triggers a disk writing operation;
step 2: the disk drive receives the request of writing the data segment and sends the user writing request to the client;
and step 3: the client encrypts the user request information and sends the encrypted user request information to the server;
and 4, step 4: the server receives a data segment writing request of a user, encrypts and writes the data segment into an actual disk file of the user, and returns a writing result;
and 5: the client returns the result to the disk drive;
step 6: the driver responds to a user request to write a segment of data.
Therefore, by the method provided by the embodiment of the application, the data can be stored in the server in an encrypted manner without being retained locally, and the data is not leaked or lost when the conditions of hard disk loss, computer damage, office computer replacement and the like are met. Meanwhile, the user can flexibly select the office computer as long as the computer can be connected to the server.
The data security can be ensured: the data is encrypted and stored on the server in a centralized manner and is not stored locally, so that the data storage is safer; the login is flexible: the user can select any computer in the network to work as long as the computer can be connected with the server.
To sum up, the embodiment of the present application provides a virtual disk mount method, which prompts a user to log in after a disk mount program is started; verifying user information and acquiring user disk information; carrying out disk mounting operation according to the user disk information; and after mounting, reading and/or writing the disk data according to the user instruction. The virtual disk is mounted through technologies such as driving, network transmission, encryption and decryption, disk data of a user are encrypted and stored on the server in a centralized mode, and centralized and safe storage and local non-retention of the data are achieved.
Based on the same technical concept, an embodiment of the present application further provides a virtual disk mount system, as shown in fig. 5, the system includes:
a login module 501, configured to prompt a user to log in after a disk mount program is started;
a disk information obtaining module 502, configured to verify user information and obtain user disk information;
a disk mount module 503, configured to perform a disk mount operation according to the user disk information;
and the read-write module 504 is configured to read and/or write data of the disk according to a user instruction after the mounting is completed.
In a possible implementation manner, the read-write module 504 is specifically configured to:
a user triggers the operation of reading the data segment of the disk; the disk drive receives a request message for reading the data segment and sends the request message for reading the data segment to a client; the client encrypts the read data segment request message and sends the encrypted read data segment request message to a server; the server reads the corresponding data segment according to the actual disk file of the user and returns the corresponding data segment to the client; the client side returns the data segment to the driving module after decryption; the driver module responds to a read data segment request message from a user.
In a possible implementation manner, the read-write module 504 is specifically configured to:
a user triggers a write-in disk operation; the disk drive receives a request message for writing data segments and sends the request message for writing data segments to the client; the client encrypts the request message for writing the data segment and sends the encrypted request message to a server; the server encrypts and writes the data segment into the actual disk file of the user and returns a writing result; the client returns the writing result to the driving module; the driver module responds to a user's write data segment request message.
Based on the same technical concept, an embodiment of the present application further provides an apparatus, including: the device comprises a data acquisition device, a processor and a memory; the data acquisition device is used for acquiring data; the memory is to store one or more program instructions; the processor is configured to execute one or more program instructions to perform the method.
Based on the same technical concept, the embodiment of the present application also provides a computer-readable storage medium, wherein the computer-readable storage medium contains one or more program instructions, and the one or more program instructions are used for executing the method.
In the present specification, each embodiment of the method is described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. Reference is made to the description of the method embodiments.
It is noted that while the operations of the methods of the present invention are depicted in the drawings in a particular order, this is not a requirement or suggestion that the operations must be performed in this particular order or that all of the illustrated operations must be performed to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
Although the present application provides method steps as in embodiments or flowcharts, additional or fewer steps may be included based on conventional or non-inventive approaches. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an apparatus or client product in practice executes, it may execute sequentially or in parallel (e.g., in a parallel processor or multithreaded processing environment, or even in a distributed data processing environment) according to the embodiments or methods shown in the figures. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the presence of additional identical or equivalent elements in a process, method, article, or apparatus that comprises the recited elements is not excluded.
The units, devices, modules, etc. set forth in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. Of course, in implementing the present application, the functions of each module may be implemented in one or more software and/or hardware, or a module implementing the same function may be implemented by a combination of a plurality of sub-modules or sub-units, and the like. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may therefore be considered as a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, classes, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, or the like, and includes several instructions for enabling a computer device (which may be a personal computer, a mobile terminal, a server, or a network device) to execute the method according to the embodiments or some parts of the embodiments of the present application.
The embodiments in the present specification are described in a progressive manner, and the same or similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. The application is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable electronic devices, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
The above-mentioned embodiments are further described in detail for the purpose of illustrating the invention, and it should be understood that the above-mentioned embodiments are only illustrative of the present invention and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements, etc. made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (8)
1. A virtual disk mounting method is characterized by comprising the following steps:
prompting a user to log in after a disk mounting program is started;
verifying user information and acquiring user disk information;
carrying out disk mounting operation according to the user disk information;
and after mounting, reading and/or writing the disk data according to the user instruction.
2. The method of claim 1, wherein reading the disk data according to the user indication comprises:
a user triggers the operation of reading the data segment of the disk;
the disk drive receives a request message for reading the data segment and sends the request message for reading the data segment to a client;
the client encrypts the read data segment request message and sends the encrypted read data segment request message to a server;
the server reads the corresponding data segment according to the actual disk file of the user and returns the corresponding data segment to the client;
the client side returns the data segment to the driving module after decryption;
the driver module responds to a read data segment request message from a user.
3. The method of claim 1, wherein writing disk data according to a user indication comprises:
a user triggers a write-in disk operation;
the disk drive receives a request message for writing data segments and sends the request message for writing data segments to the client;
the client encrypts the request message for writing the data segment and sends the encrypted request message to a server;
the server encrypts and writes the data segment into the actual disk file of the user and returns a writing result;
the client returns the writing result to the driving module;
the driver module responds to a user's write data segment request message.
4. A virtual disk mount system, the system comprising:
the login module is used for prompting a user to log in after the disk mounting program is started;
the disk information acquisition module is used for verifying the user information and acquiring the user disk information;
the disk mounting module is used for carrying out disk mounting operation according to the user disk information;
and the read-write module is used for reading and/or writing the disk data according to the user instruction after the mounting is finished.
5. The system of claim 4, wherein the read-write module is specifically configured to:
a user triggers the operation of reading the data segment of the disk;
the disk drive receives a request message for reading the data segment and sends the request message for reading the data segment to a client;
the client encrypts the read data segment request message and sends the encrypted read data segment request message to a server;
the server reads the corresponding data segment according to the actual disk file of the user and returns the corresponding data segment to the client;
the client side returns the data segment to the driving module after decryption;
the driver module responds to a read data segment request message from a user.
6. The system of claim 4, wherein the read-write module is specifically configured to:
a user triggers a write-in disk operation;
the disk drive receives a request message for writing data segments and sends the request message for writing data segments to the client;
the client encrypts the request message for writing the data segment and sends the encrypted request message to a server;
the server encrypts and writes the data segment into the actual disk file of the user and returns a writing result;
the client returns the writing result to the driving module;
the driver module responds to a user's write data segment request message.
7. An apparatus, characterized in that the apparatus comprises: the device comprises a data acquisition device, a processor and a memory;
the data acquisition device is used for acquiring data; the memory is to store one or more program instructions; the processor, configured to execute one or more program instructions to perform the method of any of claims 1-3.
8. A computer-readable storage medium having one or more program instructions embodied therein for performing the method of any of claims 1-3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110592484.3A CN113190181A (en) | 2021-05-28 | 2021-05-28 | Virtual disk mounting method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110592484.3A CN113190181A (en) | 2021-05-28 | 2021-05-28 | Virtual disk mounting method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113190181A true CN113190181A (en) | 2021-07-30 |
Family
ID=76986381
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110592484.3A Pending CN113190181A (en) | 2021-05-28 | 2021-05-28 | Virtual disk mounting method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113190181A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114385091A (en) * | 2022-03-24 | 2022-04-22 | 天津联想协同科技有限公司 | Method and device for realizing network disk drive character, network disk and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101986651A (en) * | 2010-08-26 | 2011-03-16 | 上海网众信息技术有限公司 | Remote storage method, remote storage system and client |
WO2016192456A1 (en) * | 2015-06-04 | 2016-12-08 | 中兴通讯股份有限公司 | Local mounting processing method, apparatus and system for network disk |
CN111045601A (en) * | 2019-11-07 | 2020-04-21 | 北京北信源软件股份有限公司 | Fuse-based virtual disk loading method and system |
CN112667172A (en) * | 2021-01-19 | 2021-04-16 | 南方电网科学研究院有限责任公司 | Disk operation method, device, system, storage medium and computing equipment |
-
2021
- 2021-05-28 CN CN202110592484.3A patent/CN113190181A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101986651A (en) * | 2010-08-26 | 2011-03-16 | 上海网众信息技术有限公司 | Remote storage method, remote storage system and client |
WO2016192456A1 (en) * | 2015-06-04 | 2016-12-08 | 中兴通讯股份有限公司 | Local mounting processing method, apparatus and system for network disk |
CN111045601A (en) * | 2019-11-07 | 2020-04-21 | 北京北信源软件股份有限公司 | Fuse-based virtual disk loading method and system |
CN112667172A (en) * | 2021-01-19 | 2021-04-16 | 南方电网科学研究院有限责任公司 | Disk operation method, device, system, storage medium and computing equipment |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114385091A (en) * | 2022-03-24 | 2022-04-22 | 天津联想协同科技有限公司 | Method and device for realizing network disk drive character, network disk and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI744797B (en) | Computer implement method, system and computer program product for binding secure keys of secure guests to a hardware security module | |
EP3369030B1 (en) | Methods and apparatus for mobile computing device security in testing facilities | |
CN113544675A (en) | Secure execution of client owner environment control symbols | |
CN112753196B (en) | HSM self-destruction method, system and storage medium in hybrid cloud KMS solution | |
CN102622311A (en) | USB (universal serial bus) mobile memory device access control method, USB mobile memory device access control device and USB mobile memory device access control system | |
CN110555293A (en) | Method, apparatus, electronic device and computer readable medium for protecting data | |
CN112231702B (en) | Application protection method, device, equipment and medium | |
CN105678192A (en) | Smart card based secret key application method and application apparatus | |
CN101047701B (en) | System and method for ensuring safety operation of applied program | |
CN113544674A (en) | Secure execution client owner control for secure interface controls | |
CN111628863B (en) | Data signature method and device, electronic equipment and storage medium | |
CN113544679A (en) | Incremental decryption and integrity verification of secure operating system images | |
CN113342425A (en) | Starting method, device and storage medium of Linux embedded system | |
US10366227B2 (en) | Secure debugging in a trustable computing environment | |
CN113190181A (en) | Virtual disk mounting method and system | |
CN113052305B (en) | Method for operating a neural network model, electronic device and storage medium | |
CN104731626A (en) | Application installation method and device | |
CN113918999A (en) | Method and device for establishing safe ferry channel, network disk and storage medium | |
CN106326782A (en) | Information processing method and electronic device | |
CN109324843B (en) | Fingerprint processing system and method and fingerprint equipment | |
CN116204211A (en) | Information processing method, device, equipment and computer readable storage medium | |
CN115033870A (en) | Anti-malicious tampering code method and device based on big data cloud deployment | |
EP3007092B1 (en) | Mobile device-based authentication method and authentication apparatus | |
CN105574425A (en) | Method and device for accessing stored data | |
CN109711177A (en) | Data safety control method and terminal device based on biological information identification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |