CN116560571A - Method and system for reading safety data of solid state disk - Google Patents
Method and system for reading safety data of solid state disk Download PDFInfo
- Publication number
- CN116560571A CN116560571A CN202310523957.3A CN202310523957A CN116560571A CN 116560571 A CN116560571 A CN 116560571A CN 202310523957 A CN202310523957 A CN 202310523957A CN 116560571 A CN116560571 A CN 116560571A
- Authority
- CN
- China
- Prior art keywords
- solid state
- state disk
- data
- reading
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 239000007787 solid Substances 0.000 title claims abstract description 225
- 238000000034 method Methods 0.000 title claims abstract description 35
- 231100000279 safety data Toxicity 0.000 title abstract description 7
- 238000012545 processing Methods 0.000 claims abstract description 31
- 238000013523 data management Methods 0.000 claims abstract description 17
- 238000005192 partition Methods 0.000 claims description 44
- 238000012795 verification Methods 0.000 claims description 40
- 238000012544 monitoring process Methods 0.000 claims description 21
- 238000013500 data storage Methods 0.000 claims description 11
- 230000008569 process Effects 0.000 claims description 11
- 238000012217 deletion Methods 0.000 claims description 4
- 230000037430 deletion Effects 0.000 claims description 4
- 238000012986 modification Methods 0.000 claims description 4
- 230000004048 modification Effects 0.000 claims description 4
- 230000009849 deactivation Effects 0.000 claims description 3
- 238000013508 migration Methods 0.000 claims description 3
- 230000005012 migration Effects 0.000 claims description 3
- 230000000694 effects Effects 0.000 abstract description 6
- 238000012423 maintenance Methods 0.000 abstract description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
- G06F3/0622—Securing storage systems in relation to access
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0653—Monitoring storage devices or systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/0671—In-line storage system
- G06F3/0673—Single storage device
- G06F3/0679—Non-volatile semiconductor memory device, e.g. flash memory, one time programmable memory [OTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the technical field of data processing, in particular to a method and a system for reading safety data of a solid state disk, comprising a data management layer, a processing layer and a reading layer; the method and the system can manage the data content stored in the solid state disk and further configure the risk level, and read the data content stored in the solid state disk through different reading logics on the basis of the risk level, so that the safety of the data in the solid state disk when the data in the solid state disk is read is ensured, and a maintenance effect is brought to the reading of the data stored in the solid state disk by the solid state disk user.
Description
Technical Field
The invention relates to the technical field of data processing, in particular to a method and a system for reading safety data of a solid state disk.
Background
The solid state disk is the same as the mechanical hard disk, and can store software and games in the solid state disk, and has the advantages of higher reading speed and lower power consumption than the mechanical hard disk, and meanwhile, the solid state disk is higher in stability and is not easy to damage during tilting, collision and vibration.
In general, a solid state disk is installed on a computer for use, and is used as a storage disk or a system disk of the computer, however, the solid state disk is used as a storage disk or a system disk of the computer, and the solid state disk has the fundamental function of storing data, so that when the solid state disk is operated in a computer networking state, the risk of leakage and theft exists in the data content stored in the solid state disk, and the safety of user data assets is threatened to a certain extent.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects in the prior art, the invention provides a method and a system for reading safety data of a solid state disk, which solve the problems that the data content stored in the solid state disk is leaked and stolen when the solid state disk is operated in a computer networking state, and the safety of user data assets is threatened to a certain extent.
Technical proposal
In order to achieve the above purpose, the invention is realized by the following technical scheme:
the first aspect is a secure data reading system of a solid state disk, including a data management layer, a processing layer and a reading layer;
the method comprises the steps that data stored in a solid state disk are distinguished and placed through a data management layer to set a step-type risk level, a processing layer is based on a data reading request of a solid state disk user, after the risk level of data of a reading target is identified, the safety of a data reading environment is detected, the identity of the solid state disk user is verified, the data reading target is further sent to a reading layer, and the solid state disk user reads data content corresponding to the reading request through the reading layer;
the processing layer comprises an identification module and a setting module, wherein the identification module is used for receiving a data reading request of a solid state disk user, identifying a target data risk level of the request, and the setting module is used for receiving and storing user identity information and setting a verification key;
in the operation stage of the processing layer, network security for monitoring the data reading state of the solid state disk in real time is calculated by the following formula:
wherein: p (t) is a network security threat index; i (t) is the lost cost caused by malicious node attack in the network; r (t) is the malicious node deactivation rate; s (t) is a node in the network; i is the network security monitoring times; p (t) is more than or equal to 1, judging that the network has security threat, P (t) is less than 1, judging that the network has security threat, and ending the data reading operation of the solid state disk when the judging result is that the security threat exists;
and the processing layer detects the network security of the data reading state of the solid state disk according to the monitoring period.
Further, the data management layer comprises a traversing module, a marking module and a configuration module, wherein the traversing module is used for traversing the data content currently stored in the solid state disk, the marking module is used for marking the risk level of the data content stored in the solid state disk, and the configuration module is used for distributing the storage space inside the solid state disk, so that the storage space of each partition inside the solid state disk corresponds to a group of risk level marks;
the risk level marks in the mark module are manually set by a solid state disk user, and the step type risk level marks are provided with three groups and comprise: when the first-level, second-level and third-level marking modules and the traversing modules operate, a solid state disk user provides traversing data targets through the traversing modules, risk level marks set in the marking modules are applied to mark the real-time traversing data targets, and when the solid state disk newly receives data contents, the solid state disk user synchronously applies the marking modules to mark the data contents and then stores the newly received data contents in the solid state disk.
Furthermore, when the traversing module operates and provides the traversing data target of the solid state disk user, the traversing module calculates and outputs the corresponding data content position of the traversing data target provided to the solid state disk user through the following formula, the traversing module searches the corresponding data content in the solid state disk according to the output data content position and outputs the corresponding data content to the user terminal, and the calculating formula is as follows:
k o =μ∑(n,m-m o ,x);
wherein: k (k) o A data content storage path; μ is a subset of the data storage root directory; n is a data content storage timestamp; x is the optimal target data content selected according to the size of the data content; m is the storage path of all data contents in the solid state disk; m is m o An output data content storage path; m-m o The I is a storage path of the residual non-output data content in the solid state disk;
after the operation of the traversing module and the marking module is finished, the configuration module further performs data migration on the marking result of the data content stored in each solid state disk according to the marking module, so that the risk levels of the data content stored in each partition in the solid state disk are the same, and the risk levels of the data content stored in each partition are different.
Furthermore, in the operation stage of the data management layer, the traversing module continuously provides data contents for the solid state disk user to traverse the data target until the traversing module does not output the traversed data target, and the operation of the data management layer is finished and jumps to the processing layer for further operation.
Furthermore, a data storage directory is arranged in the processing layer, the data storage directory is integrated by the names of the data contents stored in the solid state disk, and when a user of the solid state disk sends a data reading request, the user searches manually or edits input words through the data storage directory in the processing layer to search.
Still further, the setting module is internally provided with a sub-module, including:
the monitoring unit is used for setting the refreshing period of the verification key; the method is used for monitoring whether the verification key is updated in the refreshing period;
the method comprises the steps that a verification key is manually set by a solid state disk user, the verification key is composed of Arabic numbers with a plurality of digits, the solid state disk user modifies the key after the verification key according to a verification key refreshing period, in the continuous key modification operation process, the modified key is inconsistent with a previous group of keys, in the verification key refreshing period, the solid state disk user fails in the verification key refreshing period, the solid state disk user accesses a system in a solid state disk offline state, all identity information is input by a setting module, the setting module compares the identity information input by the solid state disk user with the identity information stored in the solid state disk user, and when a judging result is consistent, the verification key is reset by the setting module, otherwise, the system operation is finished.
Still further, the identity information stored in the setting module is manually input by the solid state disk user, including: name, mobile phone number, identification card number, and text data;
the corresponding read logic of each storage partition in the solid state disk is respectively as follows:
primary partition: after the key verification is successful, the data content to be read is sent to the secondary partition, the identity information of the solid state disk user is further verified in the secondary partition, and after the identity information verification is successful, the data content sent to the primary partition in the secondary partition is further sent to the reading layer;
secondary partition: verifying the identity information of the solid state disk user, after the identity information is verified successfully, sending the data content to be read to the third-level partition, and further sending the data content sent to the second-level partition in the third-level partition to the reading layer;
three-level partition: verifying the identity information of the solid state disk user, and after the identity information is verified successfully, further transmitting the data content to be read to a reading layer;
the operation of verifying the identity information and comparing the identity information of the solid state disk user is completed in the processing layer.
The reading layer further comprises an output module and a deleting module, wherein the output module is used for receiving the data content received by the reading layer, outputting the data content to the solid state disk user, and reading the data content by the solid state disk user, and the deleting module is used for deleting the read data content by the solid state disk user and then reading the corresponding read data content in the reading layer.
Furthermore, the traversing module is electrically connected with the marking module and the configuration module through a medium, the configuration module is electrically connected with the identification module and the setting module through the medium, the inside of the setting module is electrically connected with the monitoring unit through the medium, the setting module is electrically connected with the output module through the medium, and the output module is interconnected with the deleting module through the medium.
In a second aspect, a method for reading security data of a solid state disk includes the following steps:
step 1: traversing the stored data in the solid state disk, and setting and distinguishing the risk level of the stored data;
step 2: setting reading logic for distinguishing placed data contents, and reading the data contents stored in the solid state disk by applying the reading logic;
step 3: after the solid state disk user reads the data content to be read, deleting the data content read by the solid state disk user.
Advantageous effects
Compared with the known public technology, the technical scheme provided by the invention has the following beneficial effects:
1. the invention provides a safe data reading system of a solid state disk, which can manage data content stored in the solid state disk and further configure risk level, and the data content stored in the solid state disk is read through different reading logics on the basis of the risk level, so that the safety of the data in the solid state disk when the data in the solid state disk are read is ensured, and a maintenance effect is brought to the reading of the data stored in the solid state disk by a solid state disk user.
2. When the system is operated, the real-time network security monitoring effect can be brought to a user when the data stored in the solid state disk is read, the process of reading the data in the solid state disk can be kept safe through the set period, and when the security risk exists, countermeasures are timely taken, so that the conditions of data leakage and theft caused by the operation of reading the data in the solid state disk are effectively avoided.
3. The invention provides a method for reading safety data of a solid state disk, which can further maintain the stability of the system operation in the invention through the execution of the steps in the method, and can further process the data content read by a user in real time in the solid state disk in the operation process of the system, so that the technical scheme provided by the invention obtains more comprehensive safety protection when the data stored in the solid state disk is read.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is evident that the drawings in the following description are only some embodiments of the present invention and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art.
FIG. 1 is a schematic diagram of a system for reading secure data of a solid state disk;
fig. 2 is a flow chart of a method for reading security data of a solid state disk.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. It will be apparent that the described embodiments are some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention is further described below with reference to examples.
Example 1
The method and system for reading the secure data of the solid state disk in this embodiment, as shown in fig. 1 and 2, include a data management layer, a processing layer and a reading layer;
the method comprises the steps that data stored in a solid state disk are distinguished and placed through a data management layer to set a step-type risk level, a processing layer is based on a data reading request of a solid state disk user, after the risk level of data of a reading target is identified, the safety of a data reading environment is detected, the identity of the solid state disk user is verified, the data reading target is further sent to a reading layer, and the solid state disk user reads data content corresponding to the reading request through the reading layer;
the processing layer comprises an identification module and a setting module, wherein the identification module is used for receiving a data reading request of a solid state disk user, identifying a target data risk level of the request, and the setting module is used for receiving and storing user identity information and setting a verification key;
in the operation stage of the processing layer, network security for monitoring the data reading state of the solid state disk in real time is calculated by the following formula:
wherein: p (t) is a network security threat index; i (t) is the lost cost caused by malicious node attack in the network; r (t) is the malicious node deactivation rate; s (t) is a node in the network; i is the network security monitoring times; p (t) is more than or equal to 1, judging that the network has security threat, P (t) is less than 1, judging that the network has security threat, and ending the data reading operation of the solid state disk when the judging result is that the security threat exists;
the system is in a network connection disconnection state in a module running state in the data management layer, a monitoring period is set for detecting network security of a solid state disk data reading state in the processing layer, and the processing layer detects the network security of the solid state disk data reading state according to the monitoring period;
when the traversal module operates and provides the traversal data target of the solid state disk user, the traversal data target corresponding data content position provided for the solid state disk user is calculated and output through the following formula, the traversal module searches corresponding data content in the solid state disk according to the output data content position and outputs the corresponding data content to the user terminal, and the calculation formula is as follows:
k o =μ∑(n,|m-m o |,x);
wherein: k (k) o A data content storage path; μ is a subset of the data storage root directory; n is a data content storage timestamp; x is the optimal target data content selected according to the size of the data content; m is the storage path of all data contents in the solid state disk; m is m o An output data content storage path; m-m o The I is a storage path of the residual non-output data content in the solid state disk;
after the operation of the traversing module and the marking module is finished, the configuration module further carries out data migration on the marking result of the data content stored in each solid state disk according to the marking module, so that the risk level of the data content stored in each partition in the solid state disk is the same, and the risk level of the data content stored in each partition is different;
a method for reading safety data of a solid state disk comprises the following steps:
step 1: traversing the stored data in the solid state disk, and setting and distinguishing the risk level of the stored data;
step 2: setting reading logic for distinguishing placed data contents, and reading the data contents stored in the solid state disk by applying the reading logic;
step 3: after the solid state disk user reads the data content to be read, deleting the data content read by the solid state disk user.
In this embodiment, the traversing module traverses the data content currently stored in the solid state disk, the marking module operates at a rear position to mark the risk level of the data content stored in the solid state disk, the configuration module allocates the storage space inside the solid state disk, so that the storage space of each partition inside the solid state disk corresponds to a group of risk level marks, the identification module receives the data reading request of the solid state disk user, identifies the risk level of the request target data, receives and stores the user identity information and sets the verification key through the setting module, after the verification is completed in the processing layer, the output module receives the data content received by the reading layer, outputs the data content to the solid state disk user for the solid state disk user to read, and finally the deletion module deletes the data content read by the solid state disk user to read the corresponding read data content in the reading layer;
on the other hand, the network environment of the data reading operation of the solid state disk can be monitored through the formula calculation, so that the data reading operation process of the solid state disk is safer, and in addition, the data traversing stage in the data management layer brings output traversal data output logic, so that the marking operation of the data by the solid state disk user is more smoothly carried out.
Example 2
On the basis of embodiment 1, this embodiment further specifically describes a secure data reading system of a solid state disk in embodiment 1 with reference to fig. 1:
the data management layer comprises a traversing module, a marking module and a configuration module, wherein the traversing module is used for traversing the data content stored in the solid state disk at present, the marking module is used for marking the risk level of the data content stored in the solid state disk, and the configuration module is used for distributing the storage space inside the solid state disk, so that the storage space of each partition inside the solid state disk corresponds to one group of risk level marks;
the risk level marks in the mark module are manually set by a solid state disk user, and the step type risk level marks are provided with three groups and comprise: when the first-level, second-level and third-level marking modules and the traversing modules operate, a solid state disk user provides traversing data targets through the traversing modules, risk level marks set in the marking modules are applied to mark the real-time traversing data targets, and when the solid state disk newly receives data contents, the solid state disk user synchronously applies the marking modules to mark the data contents and then stores the newly received data contents in the solid state disk.
Through the arrangement, the data stored in the solid state disk can be distinguished, so that the follow-up system operation can perform logical safety management on the data output and reading process stored in the solid state disk.
Preferably, in the operation stage of the data management layer, the traversing module continuously provides data content to the solid state disk user to traverse the data target until the traversing module does not output the traversed data target, and the operation of the data management layer is finished and jumps to the processing layer for further operation; the processing layer is provided with a data storage catalog which is integrated by the names of all data contents stored in the solid state disk, and when a user of the solid state disk sends a data reading request, the user manually searches or edits input words to search and search through the data storage catalog.
Preferably, the setting module is internally provided with a sub-module, including:
the monitoring unit is used for setting the refreshing period of the verification key; the method is used for monitoring whether the verification key is updated in the refreshing period;
the method comprises the steps that a verification key is manually set by a solid state disk user, the verification key is composed of Arabic numbers with a plurality of digits, the solid state disk user modifies the key after the verification key according to a verification key refreshing period, in the continuous key modification operation process, the modified key is inconsistent with a previous group of keys, in the verification key refreshing period, the solid state disk user fails in the verification key refreshing period, the solid state disk user accesses a system in a solid state disk offline state, all identity information is input by a setting module, the setting module compares the identity information input by the solid state disk user with the identity information stored in the solid state disk user, and when a judging result is consistent, the verification key is reset by the setting module, otherwise, the system operation is finished.
Through the arrangement, the verification key used in the data reading operation in the solid state disk can be further and safely controlled, and the verification key used in the long-term running state of the system is more safe and stable
Example 3
On the basis of embodiment 1, this embodiment further specifically describes a secure data reading system of a solid state disk in embodiment 1 with reference to fig. 1:
the identity information stored in the setting module is manually input by a solid state disk user, and the setting module comprises the following steps: name, mobile phone number, identification card number, and text data;
the corresponding read logic of each storage partition in the solid state disk is respectively as follows:
primary partition: after the key verification is successful, the data content to be read is sent to the secondary partition, the identity information of the solid state disk user is further verified in the secondary partition, and after the identity information verification is successful, the data content sent to the primary partition in the secondary partition is further sent to the reading layer;
secondary partition: verifying the identity information of the solid state disk user, after the identity information is verified successfully, sending the data content to be read to the third-level partition, and further sending the data content sent to the second-level partition in the third-level partition to the reading layer;
three-level partition: verifying the identity information of the solid state disk user, and after the identity information is verified successfully, further transmitting the data content to be read to a reading layer;
the operation of verifying the identity information and comparing the identity information of the solid state disk user is completed in the processing layer.
Through the arrangement, the corresponding reading logic of each storage partition in the solid state disk is further limited, so that when a user of the solid state disk reads data stored in the solid state disk, the solid state disk outputs data required to be read by the user more stably, and the situation that the data stored in the solid state disk leak in a large area due to the reading behavior of the data is avoided by means of the logic arranged.
Preferably, the reading layer comprises an output module and a deleting module, the output module is used for receiving the data content received by the reading layer, outputting the data content to the solid state disk user for the solid state disk user to read, and the deleting module is used for deleting the data content read by the solid state disk user and then reading the corresponding read data content in the reading layer.
Preferably, the traversing module is electrically connected with the marking module and the configuration module through a medium, the configuration module is electrically connected with the identification module and the setting module through the medium, the monitoring unit is electrically connected with the inside of the setting module through the medium, the setting module is electrically connected with the output module through the medium, and the output module is interconnected with the deleting module through the medium.
In summary, through the system operation in the above embodiment, the data content stored in the solid state disk can be managed, and further the risk level is configured, and the data content stored in the solid state disk is read through different reading logics on the basis of the risk level, so that the safety of the solid state disk when the data is read is ensured, and a maintenance effect is brought to the reading of the data stored in the solid state disk by the solid state disk user; in addition, when the system is operated, a real-time network security monitoring effect can be brought to a user when the data stored in the solid state disk is read, the process of reading the data in the solid state disk can be kept safe through a set period, and when the security risk exists, countermeasures are timely taken, so that the conditions of data leakage and theft caused by the operation of reading the data in the solid state disk are effectively avoided; in addition, the method provided in the embodiment can further stabilize the operation of the system, and further process the data content read by the user in real time in the solid state disk in the operation process of the system, so that the technical scheme provided in the embodiment obtains more comprehensive safety protection when the data stored in the solid state disk is read.
The above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.
Claims (10)
1. The safe data reading system of the solid state disk is characterized by comprising a data management layer, a processing layer and a reading layer;
the method comprises the steps that data stored in a solid state disk are distinguished and placed through a data management layer to set a step-type risk level, a processing layer is based on a data reading request of a solid state disk user, after the risk level of data of a reading target is identified, the safety of a data reading environment is detected, the identity of the solid state disk user is verified, the data reading target is further sent to a reading layer, and the solid state disk user reads data content corresponding to the reading request through the reading layer;
the processing layer comprises an identification module and a setting module, wherein the identification module is used for receiving a data reading request of a solid state disk user, identifying a target data risk level of the request, and the setting module is used for receiving and storing user identity information and setting a verification key;
in the operation stage of the processing layer, network security for monitoring the data reading state of the solid state disk in real time is calculated by the following formula:
wherein: p (t) is a network security threat index; i (t) is the lost cost caused by malicious node attack in the network; r (t) is the malicious node deactivation rate; s (t) is a node in the network; i is the network security monitoring times; p (t) is more than or equal to 1, judging that the network has security threat, P (t) is less than 1, judging that the network has security threat, and ending the data reading operation of the solid state disk when the judging result is that the security threat exists;
and the processing layer detects the network security of the data reading state of the solid state disk according to the monitoring period.
2. The system for reading the safe data of the solid state disk according to claim 1, wherein the data management layer comprises a traversing module, a marking module and a configuration module, the traversing module is used for traversing the data content currently stored in the solid state disk, the marking module is used for marking the risk level of the data content stored in the solid state disk, and the configuration module is used for distributing the internal storage space of the solid state disk, so that the storage space of each partition in the solid state disk corresponds to a group of risk level marks;
the risk level marks in the mark module are manually set by a solid state disk user, and the step type risk level marks are provided with three groups and comprise: when the first-level, second-level and third-level marking modules and the traversing modules operate, a solid state disk user provides traversing data targets through the traversing modules, risk level marks set in the marking modules are applied to mark the real-time traversing data targets, and when the solid state disk newly receives data contents, the solid state disk user synchronously applies the marking modules to mark the data contents and then stores the newly received data contents in the solid state disk.
3. The system for reading the secure data of the solid state disk according to claim 1, wherein when the traversing module operates to provide the traversed data target of the solid state disk user, the traversing module calculates and outputs the position of the corresponding data content of the traversed data target provided to the solid state disk user according to the following formula, and the traversing module searches the corresponding data content in the solid state disk according to the output position of the data content and outputs the data content to the user terminal, and the calculating formula is as follows:
k o =μ∑(n,|m-m o |,x);
wherein: k (k) o A data content storage path; μ is a subset of the data storage root directory; n is the data contentStoring the time stamp; x is the optimal target data content selected according to the size of the data content; m is the storage path of all data contents in the solid state disk; m is m o An output data content storage path; m-m o The I is a storage path of the residual non-output data content in the solid state disk;
after the operation of the traversing module and the marking module is finished, the configuration module further performs data migration on the marking result of the data content stored in each solid state disk according to the marking module, so that the risk levels of the data content stored in each partition in the solid state disk are the same, and the risk levels of the data content stored in each partition are different.
4. The system for reading the secure data of the solid state disk according to claim 3, wherein the traverse module continues to provide the data content to the user of the solid state disk to traverse the data object until the traverse module does not output the traversed data object, and the data management layer is finished to jump to the processing layer for further operation.
5. The system for reading the safe data of the solid state disk according to claim 1, wherein a data storage directory is arranged in the processing layer, the data storage directory is integrated by each data content name stored in the solid state disk, and when a user of the solid state disk sends a data reading request, the user of the solid state disk performs manual search or edits input words to search through the data storage directory in the processing layer.
6. The system for reading secure data from a solid state disk according to claim 1, wherein the setting module is internally provided with a sub-module, and the system comprises:
the monitoring unit is used for setting the refreshing period of the verification key; the method is used for monitoring whether the verification key is updated in the refreshing period;
the method comprises the steps that a verification key is manually set by a solid state disk user, the verification key is composed of Arabic numbers with a plurality of digits, the solid state disk user modifies the key after the verification key according to a verification key refreshing period, in the continuous key modification operation process, the modified key is inconsistent with a previous group of keys, in the verification key refreshing period, the solid state disk user fails in the verification key refreshing period, the solid state disk user accesses a system in a solid state disk offline state, all identity information is input by a setting module, the setting module compares the identity information input by the solid state disk user with the identity information stored in the solid state disk user, and when a judging result is consistent, the verification key is reset by the setting module, otherwise, the system operation is finished.
7. The system for reading the secure data of the solid state disk according to claim 1, wherein the identity information stored in the setting module is manually input by a user of the solid state disk, and the system comprises: name, mobile phone number, identification card number, and text data;
the corresponding read logic of each storage partition in the solid state disk is respectively as follows:
primary partition: after the key verification is successful, the data content to be read is sent to the secondary partition, the identity information of the solid state disk user is further verified in the secondary partition, and after the identity information verification is successful, the data content sent to the primary partition in the secondary partition is further sent to the reading layer;
secondary partition: verifying the identity information of the solid state disk user, after the identity information is verified successfully, sending the data content to be read to the third-level partition, and further sending the data content sent to the second-level partition in the third-level partition to the reading layer;
three-level partition: verifying the identity information of the solid state disk user, and after the identity information is verified successfully, further transmitting the data content to be read to a reading layer;
the operation of verifying the identity information and comparing the identity information of the solid state disk user is completed in the processing layer.
8. The system for reading the safe data of the solid state disk according to claim 1, wherein the reading layer comprises an output module and a deletion module, the output module is used for receiving the data content received by the reading layer, outputting the data content to the solid state disk user for the solid state disk user to read, and the deletion module is used for deleting the data content read by the solid state disk user and then reading the corresponding read data content in the reading layer.
9. The system for reading the security data of the solid state disk according to claim 1, wherein the traverse module is electrically connected with the marking module and the configuration module through a medium, the configuration module is electrically connected with the identification module and the setting module through a medium, the inside of the setting module is electrically connected with the monitoring unit through a medium, the setting module is electrically connected with the output module through a medium, and the output module is electrically connected with the deletion module through a medium.
10. A method for reading secure data of a solid state disk, the method being implemented by the secure data reading system of a solid state disk according to any one of claims 1 to 9, and comprising the steps of:
step 1: traversing the stored data in the solid state disk, and setting and distinguishing the risk level of the stored data;
step 2: setting reading logic for distinguishing placed data contents, and reading the data contents stored in the solid state disk by applying the reading logic;
step 3: after the solid state disk user reads the data content to be read, deleting the data content read by the solid state disk user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310523957.3A CN116560571B (en) | 2023-05-10 | 2023-05-10 | Method and system for reading safety data of solid state disk |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310523957.3A CN116560571B (en) | 2023-05-10 | 2023-05-10 | Method and system for reading safety data of solid state disk |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116560571A true CN116560571A (en) | 2023-08-08 |
CN116560571B CN116560571B (en) | 2024-05-07 |
Family
ID=87494121
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310523957.3A Active CN116560571B (en) | 2023-05-10 | 2023-05-10 | Method and system for reading safety data of solid state disk |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116560571B (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20090106143A (en) * | 2008-04-04 | 2009-10-08 | 주식회사 셀픽 | Solid state disk with security function |
US20100146608A1 (en) * | 2008-12-06 | 2010-06-10 | Raytheon Company | Multi-Level Secure Collaborative Computing Environment |
US20110173490A1 (en) * | 2010-01-08 | 2011-07-14 | Juniper Networks, Inc. | High availability for network security devices |
CN108197483A (en) * | 2017-12-29 | 2018-06-22 | 北京联想核芯科技有限公司 | Data guard method, solid state disk |
US10158653B1 (en) * | 2015-12-04 | 2018-12-18 | Nautilus Data Technologies, Inc. | Artificial intelligence with cyber security |
CN112153015A (en) * | 2020-09-09 | 2020-12-29 | 杭州安恒信息技术股份有限公司 | Multi-encryption interface authentication method, device, equipment and readable storage medium |
US20210216633A1 (en) * | 2019-11-22 | 2021-07-15 | Pure Storage, Inc. | Multi-Layer Security Threat Detection for a Storage System |
CN113553006A (en) * | 2021-07-12 | 2021-10-26 | 山东华芯半导体有限公司 | Secure encrypted storage system for realizing data writing to read-only partition |
US20220050903A1 (en) * | 2020-08-14 | 2022-02-17 | Ken STRATFORD | Secure data storage |
US20220058091A1 (en) * | 2005-09-30 | 2022-02-24 | Pure Storage, Inc. | Storage Unit Connection Security in a Storage Network and Methods for use Therewith |
US20220092180A1 (en) * | 2019-11-22 | 2022-03-24 | Pure Storage, Inc. | Host-Driven Threat Detection-Based Protection of Storage Elements within a Storage System |
CN115987827A (en) * | 2022-11-29 | 2023-04-18 | 中国电信股份有限公司 | Equipment monitoring method and device, electronic equipment and readable medium |
-
2023
- 2023-05-10 CN CN202310523957.3A patent/CN116560571B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220058091A1 (en) * | 2005-09-30 | 2022-02-24 | Pure Storage, Inc. | Storage Unit Connection Security in a Storage Network and Methods for use Therewith |
KR20090106143A (en) * | 2008-04-04 | 2009-10-08 | 주식회사 셀픽 | Solid state disk with security function |
US20100146608A1 (en) * | 2008-12-06 | 2010-06-10 | Raytheon Company | Multi-Level Secure Collaborative Computing Environment |
US20110173490A1 (en) * | 2010-01-08 | 2011-07-14 | Juniper Networks, Inc. | High availability for network security devices |
US10158653B1 (en) * | 2015-12-04 | 2018-12-18 | Nautilus Data Technologies, Inc. | Artificial intelligence with cyber security |
CN108197483A (en) * | 2017-12-29 | 2018-06-22 | 北京联想核芯科技有限公司 | Data guard method, solid state disk |
US20210216633A1 (en) * | 2019-11-22 | 2021-07-15 | Pure Storage, Inc. | Multi-Layer Security Threat Detection for a Storage System |
US20220092180A1 (en) * | 2019-11-22 | 2022-03-24 | Pure Storage, Inc. | Host-Driven Threat Detection-Based Protection of Storage Elements within a Storage System |
US20220050903A1 (en) * | 2020-08-14 | 2022-02-17 | Ken STRATFORD | Secure data storage |
CN112153015A (en) * | 2020-09-09 | 2020-12-29 | 杭州安恒信息技术股份有限公司 | Multi-encryption interface authentication method, device, equipment and readable storage medium |
CN113553006A (en) * | 2021-07-12 | 2021-10-26 | 山东华芯半导体有限公司 | Secure encrypted storage system for realizing data writing to read-only partition |
CN115987827A (en) * | 2022-11-29 | 2023-04-18 | 中国电信股份有限公司 | Equipment monitoring method and device, electronic equipment and readable medium |
Also Published As
Publication number | Publication date |
---|---|
CN116560571B (en) | 2024-05-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112465411B (en) | Risk prediction method, device and equipment | |
CN106548091A (en) | A kind of data deposit card, the method and device of checking | |
CN105989306A (en) | File signature method and device of operating system and file verification method and device of operating system | |
CN112347521A (en) | Medical data management method and system based on medical block chain | |
CN106652182A (en) | Charging card management system and method | |
CN117195297B (en) | ERP-based data security and privacy protection system and method | |
CN115134069A (en) | Block chain editing method and block chain link point | |
CN113395271A (en) | Data security access method in cloud computing platform and cloud computing platform | |
KR102124049B1 (en) | Apparatus for processing security event using block chain and smart contract and method therefor | |
CN111526020A (en) | Safety sharing method | |
CN108090364B (en) | Method and system for positioning data leakage source | |
CN116560571B (en) | Method and system for reading safety data of solid state disk | |
CN109067849A (en) | Method of data synchronization based on block | |
CN112235304A (en) | Dynamic security protection method and system for industrial internet | |
CN112182555A (en) | Weak password detection method, device, electronic apparatus, storage medium, and program | |
CN115174185B (en) | Access control method and device | |
CN116467388A (en) | System and method for maintaining consistency of shared files based on blockchain | |
CN101106567A (en) | Data processing system and file system firewall method | |
CN113852641B (en) | Network attack tracing system, method and equipment based on graph database | |
CN105653932A (en) | Software upgrading validation method and device | |
CN112948847B (en) | Block chain-based data sharing system and data correctness verification method | |
CN111444270B (en) | Method and system for controlling harmful information based on block chain | |
CN110636082B (en) | Intrusion detection method and device | |
CN108108913A (en) | A kind of monitoring and managing method of decentralization application system | |
CN111953637B (en) | Application service method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20230808 Assignee: Zhejiang Weigu Information Technology Co.,Ltd. Assignor: SHANGHAI V&G INFORMATION TECHNOLOGY CO.,LTD. Contract record no.: X2024980016641 Denomination of invention: A secure data reading method and system for solid-state drives Granted publication date: 20240507 License type: Common License Record date: 20240929 |