CN115859395A - Hard disk with anti-theft function and application method thereof - Google Patents

Hard disk with anti-theft function and application method thereof Download PDF

Info

Publication number
CN115859395A
CN115859395A CN202310189380.7A CN202310189380A CN115859395A CN 115859395 A CN115859395 A CN 115859395A CN 202310189380 A CN202310189380 A CN 202310189380A CN 115859395 A CN115859395 A CN 115859395A
Authority
CN
China
Prior art keywords
hardware
hard disk
computer
access
security level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310189380.7A
Other languages
Chinese (zh)
Inventor
张友平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Shenzhou Huian Technology Co ltd
Original Assignee
Beijing Shenzhou Huian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Shenzhou Huian Technology Co ltd filed Critical Beijing Shenzhou Huian Technology Co ltd
Priority to CN202310189380.7A priority Critical patent/CN115859395A/en
Publication of CN115859395A publication Critical patent/CN115859395A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The application relates to a hard disk with an anti-theft function and an application method thereof, belonging to the field of hard disk anti-theft, wherein the hard disk comprises a controller, and the application method of the hard disk with the anti-theft function runs in the controller, wherein the application method of the hard disk with the anti-theft function comprises the steps of obtaining the total amount of hardware in a computer where the hard disk is located and a terminal identifier corresponding to the hardware; judging whether the hardware is trustable hardware according to the terminal identifier of the hardware, and obtaining the hardware quantity of the trustable hardware according to the judgment result; calculating the proportion information of the hardware quantity of the trusted hardware in the total hardware quantity of the computer; evaluating the security level of the computer according to the proportion information and a preset security level rating rule; and giving the corresponding hard disk access right and access authority to the computer according to the security level of the computer and a preset hard disk access rule. The application has the effect of realizing the anti-theft function of the hard disk.

Description

Hard disk with anti-theft function and application method thereof
Technical Field
The application relates to the field of hard disk anti-theft, in particular to a hard disk with an anti-theft function and an application method thereof.
Background
Hard disk generally refers to computer hard disk; the computer hard disk is the most main storage equipment of the computer; the hard disk consists of one or more aluminum or glass disks, and ferromagnetic materials are covered outside the disks; the hard disk is one of the most important memories in the computer, and most of software required by the computer to normally run is stored on the hard disk; when the hard disk is used, a user can store some application data and files in the hard disk and also can store some more important data in the hard disk; therefore, both data storage security and application security of the hard disk are crucial.
Disclosure of Invention
The application provides a hard disk with an anti-theft function and an application method thereof, which have the characteristic of realizing the anti-theft function of the hard disk.
The application aims to provide a hard disk with an anti-theft function and an application method thereof.
The above object of the present application is achieved by the following technical solutions:
an application method of a hard disk with an anti-theft function is provided, wherein the hard disk comprises a controller, the application method of the hard disk with the anti-theft function is operated in the controller, and the application method comprises the following steps:
acquiring the total amount of hardware in a computer where the hard disk is located and a terminal identifier corresponding to the hardware;
judging whether the hardware is trustable hardware according to the terminal identifier of the hardware, and obtaining the hardware quantity of the trustable hardware according to the judgment result;
calculating the proportion information of the hardware quantity of the trusted hardware in the total hardware quantity of the computer;
evaluating the security level of the computer according to the proportion information and a preset security level rating rule;
and giving the corresponding hard disk access right and access authority to the computer according to the security level of the computer and a preset hard disk access rule.
By adopting the technical scheme, the hardware quantity and the corresponding terminal identification in the computer are firstly obtained, then whether the hardware belongs to the trusted hardware is judged according to the terminal identification of the hardware, the hardware environment of the hard disk is determined in this way, if most of the hardware in the computer is the trusted hardware, the hardware environment of the hard disk is determined to be trusted, then the security level of the computer is evaluated according to the proportion of the specific quantity of the trusted hardware to the quantity of all the hardware in the computer, and then the computer is given corresponding access rights and access permissions according to the security level; by the method, the detection of the hardware environment where the hard disk is located is realized, the anti-theft function of the hard disk is realized, and the access security of the hard disk is improved; and then, by giving different access authorities to computers with different security levels, the access security and the use security of data in the hard disk are improved.
The application may be further configured in a preferred example to: obtaining a judgment result after judging whether the hardware is trustable hardware according to the terminal identifier of the hardware, and obtaining the hardware quantity of the trustable hardware according to the judgment result;
obtaining the hardware weight of the untrusted hardware according to a preset hardware weight table;
when the total quantity of the untrusted hardware is larger than a preset quantity threshold or the total hardware weight of the untrusted hardware is larger than a preset hardware weight threshold;
obtaining the hardware weight of the trusted hardware according to a preset hardware weight table;
obtaining the total hardware weight of the computer according to the hardware weight of the trusted hardware and the hardware weight of the untrusted hardware;
resetting the security level of the computer according to the total hardware weight of the computer and the security level rating rule;
and giving the corresponding hard disk access right and access authority to the computer according to the security level of the computer and a preset hard disk access rule.
By adopting the technical scheme, the security level of the computer is further judged by judging the trusted hardware in the computer, namely whether the trusted hardware in the computer can cause certain influence on the hard disk or not, if so, the security level of the computer is re-evaluated, so that the hard disk is further protected, and the use security of the hard disk is improved.
The present application may be further configured in a preferred example to: judging whether the computer is connected with an external device or not, if so, judging whether the computer is connected with the external device or not;
judging whether the external equipment belongs to trusted equipment or not;
if yes, the access right and the access authority of the hard disk of the computer are not influenced;
if not, outputting prompt information, wherein the prompt information is used for indicating that the external equipment has potential safety hazard and the connection between the computer and the external equipment is to be disconnected.
By adopting the technical scheme, the safety of the external equipment of the computer is evaluated, and the use safety of the hard disk is further improved.
The present application may be further configured in a preferred example to: acquiring the network condition of a computer; and judging whether the computer can access the hard disk according to the terminal identification of the hard disk, the network condition of the computer and a preset hard disk access rule.
By adopting the technical scheme, the software environment of the hard disk is evaluated safely, whether the computer can access the hard disk under the software environment is judged according to the preset hard disk access rule and the requirements of different types of hard disks, and the use safety of the hard disk is improved.
The present application may be further configured in a preferred example to: acquiring a face image of a user; and judging whether the facial image is in a binding relationship with the hard disk according to the facial image and the terminal identifier of the hard disk, and if not, outputting information of refusing to access the hard disk.
By adopting the technical scheme, the facial image of the user is evaluated safely, whether the person who wants to access the hard disk belongs to a trusted person or not is judged, if not, the person is prohibited from accessing the hard disk, and the access safety of the hard disk is improved.
The application may be further configured in a preferred example to: acquiring temperature information of a user; and comparing the temperature information value with a preset temperature threshold, and outputting the information of refusing to access the hard disk if the temperature information value is greater than the preset temperature threshold.
By adopting the technical scheme, on the basis of judging the facial image of the user, the temperature of the user is further judged, and the access safety of the hard disk is further improved.
The present application may be further configured in a preferred example to: before acquiring the total amount of hardware in the computer where the hard disk is located and the terminal identifier corresponding to the hardware, judging whether the hard disk is accessed to the computer, detecting whether the hard disk receives the access request information of the computer, and if so, indicating that the hard disk is accessed to the computer.
The second purpose of the application is to provide an application device of the hard disk with the anti-theft function.
The second application object of the present application is achieved by the following technical scheme:
an application device of a hard disk with an anti-theft function comprises:
the acquisition module is used for acquiring the total amount of hardware in the computer where the hard disk is located and a terminal identifier corresponding to the hardware;
the judging module is used for judging whether the hardware is trustable hardware according to the terminal identifier of the hardware and obtaining the hardware quantity of the trustable hardware according to the judging result;
the calculation module is used for calculating the proportion information of the hardware quantity of the trusted hardware in the total hardware quantity of the computer;
the evaluation module is used for evaluating the security level of the computer according to the proportion information and a preset security level rating rule;
and the giving module is used for giving the corresponding hard disk access right and access authority to the computer according to the security level of the computer and the preset hard disk access rule.
The third purpose of the application is to provide an intelligent terminal.
The third objective of the present application is achieved by the following technical solutions:
an intelligent terminal comprises a memory and a processor, wherein the memory stores computer program instructions of the application method of the hard disk with the anti-theft function, and the computer program instructions can be loaded and executed by the processor.
The fourth purpose of the present application is to provide a computer medium capable of storing a corresponding program.
The fourth application purpose of the present application is achieved by the following technical solutions:
a computer-readable storage medium storing a computer program that can be loaded by a processor and that executes any of the above methods for applying a hard disk with an anti-theft function.
Drawings
Fig. 1 is a schematic flowchart of an application method of a hard disk with an anti-theft function in an embodiment of the present application.
Fig. 2 is a schematic structural diagram of an application system of a hard disk with an anti-theft function in an embodiment of the present application.
Description of reference numerals: 1. an acquisition module; 2. a judgment module; 3. a calculation module; 4. an evaluation module; 5. and (4) a endowing module.
Detailed Description
The present embodiment is only for explaining the present application and is not limited to the present application, and those skilled in the art can make modifications without inventive contribution to the present embodiment as needed after reading the present specification, but all of them are protected by patent law within the scope of the claims of the present application.
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making any creative effort belong to the protection scope of the present application.
The embodiments of the present application will be described in further detail with reference to the drawings attached to the specification.
The application provides an application method of a hard disk with an anti-theft function, wherein the hard disk in the embodiment of the application comprises a controller, and the application method of the hard disk with the anti-theft function runs in the controller; specifically, the main flow of the method is described below.
As shown in fig. 1:
step S101: and acquiring the total amount of hardware in the computer where the hard disk is located and a terminal identifier corresponding to the hardware.
Step S102: and judging whether the hardware is the trusted hardware according to the terminal identifier of the hardware, and obtaining the hardware quantity of the trusted hardware according to the judgment result.
Step S103: and calculating the proportion information of the hardware quantity of the trusted hardware to the total hardware quantity of the computer.
Step S104: and evaluating the security level of the computer according to the proportion information and a preset security level rating rule.
Step S105: and giving the corresponding hard disk access right and access authority to the computer according to the security level of the computer and a preset hard disk access rule.
In the embodiment of the application, the hardware environment, the software environment and the user of the hard disk are used for judging, and whether the use environment of the hard disk is safe or not is analyzed from the three aspects, so that the anti-theft function of the hard disk is realized; only when the hardware environment, the software environment and the user are trusted can the hard disk be accessed, so that the access security and the use security of the hard disk are improved, and the use security of data in the hard disk is also improved.
In the embodiment of the application, before the hardware environment of the hard disk is judged; firstly, judging whether a hard disk is accessed to a computer, specifically, detecting whether the hard disk receives access request information of the computer, and if so, indicating that the hard disk is accessed to the computer; it can be understood that the determination method is only used for proving that the hard disk is accessed to the computer, and the specific determination method is not limited; in an actual working environment, the hard disk comprises a solid state hard disk and a mobile hard disk, the hard disk can be installed inside a case or connected to the case, data is stored in the hard disk, and when a computer wants to access the data in the hard disk, an access request is sent to the hard disk; when the computer does not want to access the hard disk, the hard disk is not affected, so whether the hard disk is accessed into the computer or not needs to be detected first.
After the hard disk is proved to be accessed into the computer, the hardware environment of the hard disk can be judged; specifically, the total amount of hardware in a computer where the hard disk is located and a terminal identifier corresponding to the hardware are obtained first; then judging whether the hardware is trustable hardware according to the terminal identifier of the hardware, and obtaining the hardware quantity of the trustable hardware according to the judgment result; in the embodiment of the application, the specific manner of judging whether the hardware is trusted hardware according to the terminal identifier of the hardware includes judging whether the hardware is trusted hardware according to prestored trusted terminal identifier data, if the terminal identifier of the hardware is in the trusted terminal identifier data, the hardware is trusted hardware, and if the terminal identifier of the hardware is not in the trusted terminal identifier data, the hardware is untrusted hardware; the hardware in the computer can be judged by the method, and the corresponding hardware quantity of the trusted hardware and the corresponding hardware quantity of the untrusted hardware in the computer are obtained; it can be understood that each hardware has a unique terminal identifier, and the hardware itself can be represented by the terminal identifier, so that if the terminal identifier is trusted, it is indicated that the hardware corresponding to the terminal identifier is also trusted.
After the hardware quantity of the trusted hardware in the calculation is obtained, calculating the proportion information of the hardware quantity of the trusted hardware in the total hardware quantity of the computer; the proportional information is obtained by dividing the hardware quantity value of the trusted hardware by the quantity value of the total quantity of the hardware and then multiplying the result by one hundred percent, and the proportional value is the proportional information; then, evaluating the security level of the computer according to the proportion information and a preset security level rating rule; and finally, giving corresponding hard disk access rights and access authorities to the computer according to the security level of the computer and a preset hard disk access rule.
In the embodiment of the application, the security level rating rule contains a rule about a proportion value, the rule is to determine the security level of the computer according to the proportion information of the number of trusted hardware in the computer in the total number of the hardware in the computer, and the corresponding relation between the proportion value and the security level is set in the rule; for example, the safety level corresponding to the proportion value of 60% -70% is four levels, the safety level corresponding to the proportion value of 70% -80% is three levels, the safety level corresponding to the proportion value of 80% -90% is two levels, the safety level corresponding to the proportion value of 90% -100% is one level, and the safety levels are sequentially increased from four levels to one level, wherein one level represents the highest safety level; if the proportion value is lower than 60%, the computer is not trustable, and the computer is not accessed; it should be understood that the above description is only exemplary, and does not mean that the security level and the ratio are fixed, and the corresponding relationship between the security level and the ratio can be changed; in the embodiment of the present application, the security level rating rule includes a plurality of rules, and the rules are named as proportional value rules.
After the security level of the computer is obtained, different hard disk access rights and access permissions can be obtained according to the security level and a preset hard disk access rule; the access right here indicates whether the computer can access the hard disk, and the access right here indicates how much data and what type of data in the hard disk the computer can access; the hard disk access rule contains the access authority rule, the rule is to determine the access authority of the computer according to the security level of the computer, and the corresponding relation between the security level and the access authority is set in the rule; in the embodiment of the application, the rule is named as an access authority rule; to elaborate on the above rules, the following examples are given; for example, the security level is four levels capable of accessing 20% of data in the hard disk, the security level is three levels capable of accessing 40% of data in the hard disk, the security level is two levels capable of accessing 60% of data in the hard disk, and the security level is one level capable of accessing 80% of data in the hard disk.
In the process of evaluating the security of the computer by using the method, the calculated security level is evaluated only by the number of the trusted hardware in the computer; however, if untrusted hardware exists in the computer, the untrusted hardware may have a greater impact on the security of the hard disk, and further analysis of the untrusted hardware in the computer is required.
Specifically, a judgment result is obtained after judging whether the hardware is trusted hardware according to the terminal identifier of the hardware, and then the hardware quantity of untrusted hardware is obtained according to the judgment result; obtaining hardware weight of the untrusted hardware according to a preset hardware weight table, and obtaining hardware weight of the trusted hardware according to the preset hardware weight table when the total quantity of the untrusted hardware is greater than a preset quantity threshold or the total hardware weight of the untrusted hardware is greater than a preset hardware weight threshold; obtaining the total hardware weight of the computer according to the hardware weight of the trusted hardware and the hardware weight of the untrusted hardware; according to the total hardware weight of the computer; resetting the security level of the computer according to the total hardware weight of the computer and the security level rating rule; and giving the corresponding hard disk access right and access authority to the computer according to the security level of the computer and a preset hard disk access rule.
It can be understood that the hardware weight table herein includes weight values of each hardware, where the weight values refer to the safety degree and the insecurity degree of the hardware; for example, for trusted hardware, the trusted hardware is determined by the terminal identifier of the hardware, and if the terminal identifier of the hardware is trusted, it is determined that the hardware is also trusted, because the terminal identifier of each hardware is unique; the hardware weight is specific to hardware, and different types of hardware have different weights, that is, tasks executed in the computer have different importance; the hardware in the computer generally includes a motherboard, a bus, a power supply, a hard disk, a memory controller, an interface card, a portable storage device, an internal memory, an input device, a CPU fan, a buzzer, etc.; in these devices, the importance of the motherboard is relatively the highest, and then the weight of the motherboard is also the highest, then the hardware ranking information is obtained after the ranking according to the importance of the hardware, and then the corresponding hardware weight value is given according to the hardware ranking information; for example, the weight value of the main board is 30, the weight value of the storage controller is 20, and the like; then, a hardware weight table can be generated based on the name information of each hardware and the corresponding weight value information; the weight values comprise positive and negative, the weight value of the trusted hardware is positive, the weight value of the untrusted hardware is negative, then the weight of the trusted hardware and the weight of the untrusted hardware are calculated according to the method, and the weights are added to obtain the total hardware weight of the computer.
After the weight and the number of the untrusted hardware are obtained, further judgment can be made to see whether the number or the weight of the untrusted hardware in the computer meets the requirements or not; if the requirements are not met, the untrusted hardware can influence the safe use of the hard disk; therefore, as long as the total amount of the untrusted hardware is greater than the preset number threshold, or the total hardware weight of the untrusted hardware is greater than the preset hardware weight threshold, the security level of the computer needs to be reset; for example, there are three untrusted hardware in the computer, the number exceeds two, or the weight of the untrusted hardware in the computer is-20, and the weight exceeds 5, and in both cases, the security level of the computer needs to be reset; it will be appreciated that the weight comparison to untrusted hardware here is a comparison of the absolute values of the weight values.
In an embodiment of the present application, the security level rating rule further includes a weight rule; the rule is that the safety level of the computer is determined according to the weight value of the total hardware weight of the computer, and the corresponding relation between the safety level and the total hardware weight is set in the rule; for example, the security level corresponding to the total hardware weight 20-30 is four, the security level corresponding to the total hardware weight 30-35 is three, the security level corresponding to the total hardware weight 35-40 is two, and the security level corresponding to the total hardware weight 40-50 is one; with total hardware weights below 20, there are no access rights.
It can be understood that, for the computer in the embodiment of the present application, because the importance represented by different hardware is different, when the total hardware weight is calculated, the weight of untrusted hardware may cancel the weight of a part of trusted hardware, in this way, if a larger number of untrusted hardware exists in the computer or the weight of untrusted hardware is higher, that is, the importance of untrusted hardware is higher, the resulting result is that the total hardware weight of the computer is lower, then the security level of the computer needs to be reduced according to a corresponding rule; for example, when the trusted hardware is used for judging the security level of the computer, the security level of the computer is one level; and then, when the safety level of the computer is judged by using the untrusted hardware, if the safety level of the computer is second level, resetting the safety level of the computer to be second level.
It can be understood that the security level rating rule includes a plurality of rules, and the above-mentioned rule including the security level and the total hardware weight is named as an untrusted hardware rule, and the rule is adopted when the security level of the computer is rated in relation to both untrusted hardware and trusted hardware; it should be noted that the priority of the rule is higher than that of the rule containing the corresponding relationship between the ratio and the security level, that is, when the judgment of the untrusted hardware is involved, the security level of the computer obtained by the rule will cover the security level of the previous computer.
After the trusted hardware and the untrusted hardware of the computer are judged, resetting the security level of the computer is executed; then, the external equipment of the computer is required to be judged, and when the external equipment is connected to the computer, whether the external equipment belongs to trusted equipment or not is judged; if the external equipment belongs to the trusted equipment, the external equipment has no influence on the hard disk access right and the access authority of the computer; if the external equipment does not belong to the trusted equipment, outputting prompt information, wherein the prompt information is used for indicating that the external equipment stores potential safety hazards and disconnecting the computer from the external equipment; it can be understood that the determination of whether the computer is connected with the external device belongs to the conventional technical means, and is not described herein again; the manner of determining whether the external device belongs to the trusted device is also to determine the terminal identifier of the external device, and is not described herein again.
After the hardware environment of the hard disk is judged, the software environment of the hard disk needs to be judged; specifically, the network condition of the computer is obtained, and then whether the computer can access the hard disk is judged according to the terminal identifier of the hard disk, the network condition of the computer and a preset hard disk access rule.
The network condition of the computer comprises the specific condition of whether the computer is networked or not and the network to which the computer is connected; for example, the network to which the computer is connected is a local area network, the coverage of the local area network, etc.; in the embodiment of the application, the hard disk access rule includes the corresponding relation between the hard disks and the network, for example, some hard disks require to log in under the state of no network connection, some hard disks require to log in under a trustable local area network, some hard disks require to log in under the internet, and some hard disks do not require to the network; therefore, network requirement information corresponding to the hard disk is determined according to the terminal identification of the hard disk and the hard disk access rule, and then whether the hard disk can be accessed in the current network state is judged according to the network condition of the computer, if the hard disk cannot be accessed, the hard disk can be accessed after the network is adjusted; for example, the hard disk a requires a network to log in under a trusted lan, and when it is detected that the network condition of the computer is the internet, the network of the computer needs to be replaced, and the computer can access the hard disk a only after the internet is converted into the trusted lan of the hard disk a.
After the network environment where the hard disk is located is converted into a network environment which can be logged in and trusted, the hardware of the computer is also located in the same network environment, and part of the hardware can establish connection with an external network under the network environment, so that the risk that the hardware is invaded from the external network and is accessed to the hard disk through the original trusted hardware to acquire the data of the hard disk is increased, and therefore after the conversion of the network environment where the hard disk is located is completed, whether the hardware of the computer is trusted or not needs to be re-evaluated.
Judging whether the hardware has a networking function according to the terminal identification of each hardware, and if not, judging whether the hardware is trustable hardware or untrustworthy hardware according to whether the terminal identification of the hardware is trustable; if so, the hardware is re-evaluated.
If the hardware is originally trusted hardware, after judging that the hardware has the networking function according to the terminal identification of the hardware, marking the hardware as doubtful hardware; if the hardware is originally untrusted, after the hardware is judged to have the networking function according to the terminal identification of the hardware, the hardware is marked as dangerous hardware; counting the number of doubtful hardware and the number of dangerous hardware; calculating the ratio of the number of the in-doubt hardware to the number of the original trusted hardware to obtain a first ratio; calculating the ratio of the number of the dangerous hardware to the number of the original untrustworthy hardware to obtain a second ratio; comparing the first ratio value with the second ratio value, and if the second ratio value is larger than the first ratio value, reducing the security level of the computer by one level; comparing the first ratio value with a preset ratio threshold, and if the first ratio value is greater than the preset ratio threshold, reducing the security level of the computer by one level; if the first ratio value is larger than a preset ratio threshold value and the second ratio value is larger than the first ratio value, the safety level of the computer is reduced by two levels; it is understood that the number of originally trusted hardware here refers to the total number of trusted hardware before the trusted hardware after networking is marked as suspect hardware; the amount of otherwise untrusted hardware refers to the total amount of untrusted hardware before the untrusted hardware after networking is marked as dangerous hardware.
After the network environment where the hard disk is located is a trusted network environment, some hardware can be connected to an external network, so that the hardware originally rated as trusted hardware is not necessarily trusted, and the hardware originally rated as untrusted hardware is not necessarily only untrusted, so that the hardware is rated by using the terminal identifier of the hardware again; the method aims to protect the data security of the hard disk, so that hardware with a networking function is re-evaluated, trusted hardware is marked as suspect hardware, and untrusted hardware is marked as dangerous hardware; then, the newly evaluated hardware is analyzed, and if the ratio of the in-doubt hardware to the trustable hardware is higher than the preset ratio, namely the number of the in-doubt hardware converted in the original trustable hardware is more, the security level of the computer is reduced by one level; if the proportion of the dangerous hardware to the untrusted hardware is higher than that of the suspect hardware to the trusted hardware, it means that most of the untrusted hardware can be networked after networking, so that the security risk of the original pure untrusted hardware to the hard disk is increased sharply, and the security level of the computer is also reduced by one level at this time; under the condition that the two conditions are met, the safety level of the computer is reduced by two levels; the above process corresponds to the hardware re-rating rule in the software environment in the security level rating rule.
In the evaluation process of the hardware environment and the software environment, the safety grade rating rule comprises a weight rule, a proportional value rule, an untrusted hardware rule and a hardware re-evaluation rule in the software environment; the rules correspond to specific application scenes, and the security level of the computer can be rated through the cooperation of the rules, so that the computer can access the hard disk under the corresponding security level, and the use security and the data security of the hard disk are ensured.
After the detection of the hardware environment and the software environment of the hard disk is completed, safety judgment needs to be carried out on users who want to access the hard disk; specifically, a face image of a user is acquired; judging whether the facial image is in a binding relationship with the hard disk according to the facial image and the terminal identifier of the hard disk, and if not, outputting information of refusing to access the hard disk; and then acquiring the temperature information of the user, comparing the temperature information value with a preset temperature threshold value, and outputting the information of refusing to access the hard disk if the temperature information value is greater than the preset temperature threshold value.
It can be understood that, in the process of using the hard disk, for the user and the hard disk, there is a binding relationship, and the designated hard disk can only be accessed by the designated person, so that the access of other persons to the hard disk can be avoided, and the use safety of the hard disk is further improved; the face image of the trusted user bound by the hard disk can be called out according to the terminal identification of the hard disk; and then acquiring a facial image of a user through camera equipment of the computer, comparing the two facial images by using a feature recognition technology, judging whether the user is a trusted person, if so, allowing the user to access the hard disk, and if not, forbidding the user to access the hard disk.
In the process that a user uses the hard disk, the user can visit the hard disk privately under the unnecessary condition, and in the condition, the body temperature of the user is in an abnormal state, so that the body temperature of the user is detected, the temperature information value of the user is judged to exceed a preset temperature threshold value, if yes, the user is prohibited from visiting, and if not, the user is permitted to visit.
After finishing the safety judgment of the hardware environment, the software environment and the user of the hard disk, the computer obtains the corresponding access right and the access authority; the computer can then access the relevant data in the hard disk; the hard disk comprises a plurality of folders, and data in the hard disk is stored in the folders; when a computer wants to access a folder, a corresponding password needs to be input for entering; when a computer wants to access a folder, firstly acquiring the access authority of the computer, and judging whether the access authority of the computer can access the folder or not; if the computer can access the folder, a link pops up, then the password of the folder can be obtained after clicking the link to enter a corresponding webpage, and then the password can be input to enter the folder; by the method, the password is stored in the additional webpage and presented in a link mode, so that the interaction between the computer and the hard disk can be reduced, and the hard disk is prevented from being influenced to a certain extent after the computer can access the hard disk; in the process that a user accesses the appointed folder, temperature information of a user is obtained, whether the temperature information value changes or not is judged, specifically, whether the temperature information value falls on a preset temperature threshold value or not is judged, if yes, the user does not have abnormity, if not, the user generates abnormity, at the moment, the access authority of the user is temporarily closed, and the user is forbidden to access the folder; by the mode, the use safety of the hard disk can be further improved, and the use safety of data in the hard disk is improved.
As shown in fig. 2, the application system of a hard disk with an anti-theft function includes an obtaining module 1, configured to obtain the total amount of hardware in a computer where the hard disk is located and a terminal identifier corresponding to the hardware; the judging module 2 is used for judging whether the hardware is trustable hardware according to the terminal identifier of the hardware and obtaining the hardware quantity of the trustable hardware according to the judgment result; the calculation module 3 is used for calculating the proportion information of the hardware quantity of the trusted hardware in the total hardware quantity of the computer; the evaluation module 4 is used for evaluating the security level of the computer according to the proportion information and a preset security level rating rule; and the giving module 5 is used for giving the computer corresponding hard disk access right and access authority according to the security level of the computer and a preset hard disk access rule.
In order to better execute the program of the method, the application also provides an intelligent terminal which comprises a memory and a processor.
Wherein the memory is operable to store an instruction, a program, code, a set of codes, or a set of instructions. The memory may include a program storage area and a data storage area, wherein the program storage area may store instructions for implementing an operating system, instructions for at least one function, and instructions for implementing an application method of the above-described hard disk having the anti-theft function, and the like; the data storage area can store data and the like related to the application method of the hard disk with the anti-theft function.
A processor may include one or more processing cores. The processor executes or executes the instructions, programs, code sets, or instruction sets stored in the memory, calls data stored in the memory, performs various functions of the present application, and processes the data. The processor may be at least one of an application specific integrated circuit, a digital signal processor, a digital signal processing device, a programmable logic device, a field programmable gate array, a central processing unit, a controller, a microcontroller, and a microprocessor. It is understood that the electronic devices for implementing the above processor functions may be other devices, and the embodiments of the present application are not limited in particular.
The present application also provides a computer-readable storage medium, for example, comprising: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk. The computer-readable storage medium stores a computer program that can be loaded by a processor and executes the method for applying the above-described hard disk with the antitheft function.
The foregoing description is only exemplary of the preferred embodiments of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the disclosure. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (10)

1. An application method of a hard disk with an anti-theft function is provided, the hard disk comprises a controller, the application method of the hard disk with the anti-theft function is operated in the controller, and the application method is characterized by comprising the following steps:
acquiring the total amount of hardware in a computer where the hard disk is located and a terminal identifier corresponding to the hardware;
judging whether the hardware is trustable hardware according to the terminal identifier of the hardware, and obtaining the hardware quantity of the trustable hardware according to the judgment result;
calculating the proportion information of the hardware quantity of the trusted hardware in the total hardware quantity of the computer;
evaluating the security level of the computer according to the proportion information and a preset security level rating rule;
and giving the corresponding hard disk access right and access authority to the computer according to the security level of the computer and a preset hard disk access rule.
2. The method for applying a hard disk with an anti-theft function according to claim 1, wherein a determination result is obtained after determining whether the hardware is trusted hardware according to the terminal identifier of the hardware, and the hardware quantity of untrusted hardware is obtained according to the determination result;
obtaining the hardware weight of the untrusted hardware according to a preset hardware weight table;
when the total quantity of the untrusted hardware is larger than a preset quantity threshold or the total hardware weight of the untrusted hardware is larger than a preset hardware weight threshold;
obtaining the hardware weight of the trusted hardware according to a preset hardware weight table;
obtaining the total hardware weight of the computer according to the hardware weight of the trusted hardware and the hardware weight of the untrusted hardware;
resetting the security level of the computer according to the total hardware weight of the computer and the security level rating rule;
and giving the corresponding hard disk access right and access authority to the computer according to the security level of the computer and a preset hard disk access rule.
3. The method of claim 2, wherein determining whether the computer is connected to an external device, if so;
judging whether the external equipment belongs to trusted equipment or not;
if yes, the access right and the access authority of the hard disk of the computer are not influenced;
if not, outputting prompt information, wherein the prompt information is used for indicating that the external equipment has potential safety hazard and the connection between the computer and the external equipment is to be disconnected.
4. The method for applying the hard disk with the anti-theft function according to claim 1, wherein the network condition of the computer is obtained; and judging whether the computer can access the hard disk according to the terminal identification of the hard disk, the network condition of the computer and a preset hard disk access rule.
5. The method of claim 1, wherein the face image of the user is obtained; and judging whether the facial image is in a binding relationship with the hard disk or not according to the facial image and the terminal identifier of the hard disk, and if not, outputting information of refusing to access the hard disk.
6. The method for applying the hard disk with the anti-theft function according to claim 5, wherein temperature information of a user is acquired; and comparing the temperature information value with a preset temperature threshold, and outputting the information of refusing to access the hard disk if the temperature information value is greater than the preset temperature threshold.
7. The method for applying the hard disk with the anti-theft function according to claim 1, wherein before acquiring the total amount of hardware in the computer where the hard disk is located and the terminal identifier corresponding to the hardware, it is determined whether the hard disk is accessed to the computer, and it is detected whether the hard disk receives the access request information of the computer, and if so, it is indicated that the hard disk is accessed to the computer.
8. An application apparatus of a hard disk with an anti-theft function, comprising:
the acquisition module (1) is used for acquiring the total amount of hardware in the computer where the hard disk is located and a terminal identifier corresponding to the hardware;
the judging module (2) is used for judging whether the hardware is trustable hardware according to the terminal identifier of the hardware and obtaining the hardware quantity of the trustable hardware according to the judging result;
the calculation module (3) is used for calculating the proportion information of the hardware quantity of the trusted hardware in the total hardware quantity of the computer;
the evaluation module (4) is used for evaluating the security level of the computer according to the proportion information and a preset security level rating rule;
and the giving module (5) is used for giving the corresponding hard disk access right and access authority to the computer according to the security level of the computer and the preset hard disk access rule.
9. An intelligent terminal, comprising a memory and a processor, the memory having stored thereon computer program instructions capable of being loaded by the processor and performing the method of any of claims 1-7.
10. A computer-readable storage medium, characterized in that a computer program is stored which can be loaded by a processor and which executes the method as claimed in any of the claims 1-7.
CN202310189380.7A 2023-03-02 2023-03-02 Hard disk with anti-theft function and application method thereof Pending CN115859395A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310189380.7A CN115859395A (en) 2023-03-02 2023-03-02 Hard disk with anti-theft function and application method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310189380.7A CN115859395A (en) 2023-03-02 2023-03-02 Hard disk with anti-theft function and application method thereof

Publications (1)

Publication Number Publication Date
CN115859395A true CN115859395A (en) 2023-03-28

Family

ID=85659681

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310189380.7A Pending CN115859395A (en) 2023-03-02 2023-03-02 Hard disk with anti-theft function and application method thereof

Country Status (1)

Country Link
CN (1) CN115859395A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104063641A (en) * 2014-06-23 2014-09-24 华为技术有限公司 Hard-disk safety-access control method and hard disk
US20190087353A1 (en) * 2017-09-20 2019-03-21 Toshiba Memory Corporation Data storage apparatus
CN110061987A (en) * 2019-04-19 2019-07-26 武汉大学 A kind of access control method and device of based role and trusted end-user
CN113254994A (en) * 2021-05-27 2021-08-13 平安普惠企业管理有限公司 Database access method and device, storage medium and computer equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104063641A (en) * 2014-06-23 2014-09-24 华为技术有限公司 Hard-disk safety-access control method and hard disk
US20190087353A1 (en) * 2017-09-20 2019-03-21 Toshiba Memory Corporation Data storage apparatus
CN110061987A (en) * 2019-04-19 2019-07-26 武汉大学 A kind of access control method and device of based role and trusted end-user
CN113254994A (en) * 2021-05-27 2021-08-13 平安普惠企业管理有限公司 Database access method and device, storage medium and computer equipment

Similar Documents

Publication Publication Date Title
CN110298188B (en) Control method and system for dynamic access authority
KR101724307B1 (en) Method and system for detecting a malicious code
CN102710598B (en) System and method for reducing security risk in computer network
CN111159762B (en) Subject credibility verification method and system under mandatory access control
US20080163353A1 (en) Data structures for use in firewalls
JP6777612B2 (en) Systems and methods to prevent data loss in computer systems
CN104217139A (en) Processing system
US9245149B1 (en) System and method for controling privileges of consumers of personal data
US9230128B2 (en) Assignment of security contexts to define access permissions for file system objects
CN113542442B (en) Malicious domain name detection method, device, equipment and storage medium
CN114996746A (en) Data authority management method and system based on multi-dimensional information
Petracca et al. On risk in access control enforcement
CN114866296A (en) Intrusion detection method, device, equipment and readable storage medium
CN108133136A (en) Attack node detection device, method and computer readable storage medium thereof
JP4363214B2 (en) Access policy generation system, access policy generation method, and access policy generation program
CN117235797A (en) Intelligent management method, device, equipment and system for big data resource access
CN111181979B (en) Access control method, device, computer equipment and computer readable storage medium
CN115859395A (en) Hard disk with anti-theft function and application method thereof
CN116319026A (en) Trust assessment method and device in zero-trust architecture and electronic equipment
CN113282929B (en) Behavior processing method, device and equipment of mobile storage equipment and storage medium
US8635685B2 (en) Value generator coupled to firewall programmable qualifier data structure logics
US10019587B2 (en) System and method for generating application control rules
CN115277228A (en) Data access defense method and system in hierarchical network
CN111835715B (en) Method and device for determining safety value of virtual network function
CN113282922B (en) Method, device, equipment and medium for protecting and controlling mobile storage equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20230328

RJ01 Rejection of invention patent application after publication