CN116560571B - Method and system for reading safety data of solid state disk - Google Patents

Method and system for reading safety data of solid state disk Download PDF

Info

Publication number
CN116560571B
CN116560571B CN202310523957.3A CN202310523957A CN116560571B CN 116560571 B CN116560571 B CN 116560571B CN 202310523957 A CN202310523957 A CN 202310523957A CN 116560571 B CN116560571 B CN 116560571B
Authority
CN
China
Prior art keywords
solid state
state disk
data
reading
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310523957.3A
Other languages
Chinese (zh)
Other versions
CN116560571A (en
Inventor
吴佳
李礼
吴叶楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai V&g Information Technology Co ltd
Original Assignee
Shanghai V&g Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai V&g Information Technology Co ltd filed Critical Shanghai V&g Information Technology Co ltd
Priority to CN202310523957.3A priority Critical patent/CN116560571B/en
Publication of CN116560571A publication Critical patent/CN116560571A/en
Application granted granted Critical
Publication of CN116560571B publication Critical patent/CN116560571B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0622Securing storage systems in relation to access
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0653Monitoring storage devices or systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0673Single storage device
    • G06F3/0679Non-volatile semiconductor memory device, e.g. flash memory, one time programmable memory [OTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of data processing, in particular to a method and a system for reading safety data of a solid state disk, comprising a data management layer, a processing layer and a reading layer; the method and the system can manage the data content stored in the solid state disk and further configure the risk level, and read the data content stored in the solid state disk through different reading logics on the basis of the risk level, so that the safety of the data in the solid state disk when the data in the solid state disk is read is ensured, and a maintenance effect is brought to the reading of the data stored in the solid state disk by the solid state disk user.

Description

Method and system for reading safety data of solid state disk
Technical Field
The invention relates to the technical field of data processing, in particular to a method and a system for reading safety data of a solid state disk.
Background
The solid state disk is the same as the mechanical hard disk, and can store software and games in the solid state disk, and has the advantages of higher reading speed and lower power consumption than the mechanical hard disk, and meanwhile, the solid state disk is higher in stability and is not easy to damage during tilting, collision and vibration.
In general, a solid state disk is installed on a computer for use, and is used as a storage disk or a system disk of the computer, however, the solid state disk is used as a storage disk or a system disk of the computer, and the solid state disk has the fundamental function of storing data, so that when the solid state disk is operated in a computer networking state, the risk of leakage and theft exists in the data content stored in the solid state disk, and the safety of user data assets is threatened to a certain extent.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects in the prior art, the invention provides a method and a system for reading safety data of a solid state disk, which solve the problems that the data content stored in the solid state disk is leaked and stolen when the solid state disk is operated in a computer networking state, and the safety of user data assets is threatened to a certain extent.
Technical proposal
In order to achieve the above purpose, the invention is realized by the following technical scheme:
the first aspect is a secure data reading system of a solid state disk, including a data management layer, a processing layer and a reading layer;
The method comprises the steps that data stored in a solid state disk are distinguished and placed through a data management layer to set a step-type risk level, a processing layer is based on a data reading request of a solid state disk user, after the risk level of data of a reading target is identified, the safety of a data reading environment is detected, the identity of the solid state disk user is verified, the data reading target is further sent to a reading layer, and the solid state disk user reads data content corresponding to the reading request through the reading layer;
The processing layer comprises an identification module and a setting module, wherein the identification module is used for receiving a data reading request of a solid state disk user, identifying a target data risk level of the request, and the setting module is used for receiving and storing user identity information and setting a verification key;
In the operation stage of the processing layer, network security for monitoring the data reading state of the solid state disk in real time is calculated by the following formula:
Wherein: p (t) is a network security threat index; i (t) is the lost cost caused by malicious node attack in the network; r (t) is the malicious node deactivation rate; s (t) is a node in the network; i is the network security monitoring times; p (t) is more than or equal to 1, judging that the network has security threat, P (t) is less than 1, judging that the network has security threat, and ending the data reading operation of the solid state disk when the judging result is that the security threat exists;
And the processing layer detects the network security of the data reading state of the solid state disk according to the monitoring period.
Further, the data management layer comprises a traversing module, a marking module and a configuration module, wherein the traversing module is used for traversing the data content currently stored in the solid state disk, the marking module is used for marking the risk level of the data content stored in the solid state disk, and the configuration module is used for distributing the storage space inside the solid state disk, so that the storage space of each partition inside the solid state disk corresponds to a group of risk level marks;
the risk level marks in the mark module are manually set by a solid state disk user, and the step type risk level marks are provided with three groups and comprise: when the first-level, second-level and third-level marking modules and the traversing modules operate, a solid state disk user provides traversing data targets through the traversing modules, risk level marks set in the marking modules are applied to mark the real-time traversing data targets, and when the solid state disk newly receives data contents, the solid state disk user synchronously applies the marking modules to mark the data contents and then stores the newly received data contents in the solid state disk.
Furthermore, when the traversing module operates and provides the traversing data target of the solid state disk user, the traversing module calculates and outputs the corresponding data content position of the traversing data target provided to the solid state disk user through the following formula, the traversing module searches the corresponding data content in the solid state disk according to the output data content position and outputs the corresponding data content to the user terminal, and the calculating formula is as follows:
ko=μ∑(n,m-mo,x);
Wherein: k o is a data content storage path; μ is a subset of the data storage root directory; n is a data content storage timestamp; x is the optimal target data content selected according to the size of the data content; m is the storage path of all data contents in the solid state disk; m o data content storage paths that have been output; the I m-m o is a storage path of the residual unoutput data content in the solid state disk;
After the operation of the traversing module and the marking module is finished, the configuration module further performs data migration on the marking result of the data content stored in each solid state disk according to the marking module, so that the risk levels of the data content stored in each partition in the solid state disk are the same, and the risk levels of the data content stored in each partition are different.
Furthermore, in the operation stage of the data management layer, the traversing module continuously provides data contents for the solid state disk user to traverse the data target until the traversing module does not output the traversed data target, and the operation of the data management layer is finished and jumps to the processing layer for further operation.
Furthermore, a data storage directory is arranged in the processing layer, the data storage directory is integrated by the names of the data contents stored in the solid state disk, and when a user of the solid state disk sends a data reading request, the user searches manually or edits input words through the data storage directory in the processing layer to search.
Still further, the setting module is internally provided with a sub-module, including:
the monitoring unit is used for setting the refreshing period of the verification key; the method is used for monitoring whether the verification key is updated in the refreshing period;
The method comprises the steps that a verification key is manually set by a solid state disk user, the verification key is composed of Arabic numbers with a plurality of digits, the solid state disk user modifies the key after the verification key according to a verification key refreshing period, in the continuous key modification operation process, the modified key is inconsistent with a previous group of keys, in the verification key refreshing period, the solid state disk user fails in the verification key refreshing period, the solid state disk user accesses a system in a solid state disk offline state, all identity information is input by a setting module, the setting module compares the identity information input by the solid state disk user with the identity information stored in the solid state disk user, and when a judging result is consistent, the verification key is reset by the setting module, otherwise, the system operation is finished.
Still further, the identity information stored in the setting module is manually input by the solid state disk user, including: name, mobile phone number, identification card number, and text data;
the corresponding read logic of each storage partition in the solid state disk is respectively as follows:
Primary partition: after the key verification is successful, the data content to be read is sent to the secondary partition, the identity information of the solid state disk user is further verified in the secondary partition, and after the identity information verification is successful, the data content sent to the primary partition in the secondary partition is further sent to the reading layer;
Secondary partition: verifying the identity information of the solid state disk user, after the identity information is verified successfully, sending the data content to be read to the third-level partition, and further sending the data content sent to the second-level partition in the third-level partition to the reading layer;
Three-level partition: verifying the identity information of the solid state disk user, and after the identity information is verified successfully, further transmitting the data content to be read to a reading layer;
the operation of verifying the identity information and comparing the identity information of the solid state disk user is completed in the processing layer.
The reading layer further comprises an output module and a deleting module, wherein the output module is used for receiving the data content received by the reading layer, outputting the data content to the solid state disk user, and reading the data content by the solid state disk user, and the deleting module is used for deleting the read data content by the solid state disk user and then reading the corresponding read data content in the reading layer.
Furthermore, the traversing module is electrically connected with the marking module and the configuration module through a medium, the configuration module is electrically connected with the identification module and the setting module through the medium, the inside of the setting module is electrically connected with the monitoring unit through the medium, the setting module is electrically connected with the output module through the medium, and the output module is interconnected with the deleting module through the medium.
In a second aspect, a method for reading security data of a solid state disk includes the following steps:
Step 1: traversing the stored data in the solid state disk, and setting and distinguishing the risk level of the stored data;
step 2: setting reading logic for distinguishing placed data contents, and reading the data contents stored in the solid state disk by applying the reading logic;
step 3: after the solid state disk user reads the data content to be read, deleting the data content read by the solid state disk user.
Advantageous effects
Compared with the known public technology, the technical scheme provided by the invention has the following beneficial effects:
1. The invention provides a safe data reading system of a solid state disk, which can manage data content stored in the solid state disk and further configure risk level, and the data content stored in the solid state disk is read through different reading logics on the basis of the risk level, so that the safety of the data in the solid state disk when the data in the solid state disk are read is ensured, and a maintenance effect is brought to the reading of the data stored in the solid state disk by a solid state disk user.
2. When the system is operated, the real-time network security monitoring effect can be brought to a user when the data stored in the solid state disk is read, the process of reading the data in the solid state disk can be kept safe through the set period, and when the security risk exists, countermeasures are timely taken, so that the conditions of data leakage and theft caused by the operation of reading the data in the solid state disk are effectively avoided.
3. The invention provides a method for reading safety data of a solid state disk, which can further maintain the stability of the system operation in the invention through the execution of the steps in the method, and can further process the data content read by a user in real time in the solid state disk in the operation process of the system, so that the technical scheme provided by the invention obtains more comprehensive safety protection when the data stored in the solid state disk is read.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is evident that the drawings in the following description are only some embodiments of the present invention and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art.
FIG. 1 is a schematic diagram of a system for reading secure data of a solid state disk;
Fig. 2 is a flow chart of a method for reading security data of a solid state disk.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. It will be apparent that the described embodiments are some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention is further described below with reference to examples.
Example 1
The method and system for reading the secure data of the solid state disk in this embodiment, as shown in fig. 1 and 2, include a data management layer, a processing layer and a reading layer;
The method comprises the steps that data stored in a solid state disk are distinguished and placed through a data management layer to set a step-type risk level, a processing layer is based on a data reading request of a solid state disk user, after the risk level of data of a reading target is identified, the safety of a data reading environment is detected, the identity of the solid state disk user is verified, the data reading target is further sent to a reading layer, and the solid state disk user reads data content corresponding to the reading request through the reading layer;
The processing layer comprises an identification module and a setting module, wherein the identification module is used for receiving a data reading request of a solid state disk user, identifying a target data risk level of the request, and the setting module is used for receiving and storing user identity information and setting a verification key;
In the operation stage of the processing layer, network security for monitoring the data reading state of the solid state disk in real time is calculated by the following formula:
Wherein: p (t) is a network security threat index; i (t) is the lost cost caused by malicious node attack in the network; r (t) is the malicious node deactivation rate; s (t) is a node in the network; i is the network security monitoring times; p (t) is more than or equal to 1, judging that the network has security threat, P (t) is less than 1, judging that the network has security threat, and ending the data reading operation of the solid state disk when the judging result is that the security threat exists;
The system is in a network connection disconnection state in a module running state in the data management layer, a monitoring period is set for detecting network security of a solid state disk data reading state in the processing layer, and the processing layer detects the network security of the solid state disk data reading state according to the monitoring period;
When the traversal module operates and provides the traversal data target of the solid state disk user, the traversal data target corresponding data content position provided for the solid state disk user is calculated and output through the following formula, the traversal module searches corresponding data content in the solid state disk according to the output data content position and outputs the corresponding data content to the user terminal, and the calculation formula is as follows:
ko=μ∑(n,|m-mo|,x);
Wherein: k o is a data content storage path; μ is a subset of the data storage root directory; n is a data content storage timestamp; x is the optimal target data content selected according to the size of the data content; m is the storage path of all data contents in the solid state disk; m o data content storage paths that have been output; the I m-m o is a storage path of the residual unoutput data content in the solid state disk;
After the operation of the traversing module and the marking module is finished, the configuration module further carries out data migration on the marking result of the data content stored in each solid state disk according to the marking module, so that the risk level of the data content stored in each partition in the solid state disk is the same, and the risk level of the data content stored in each partition is different;
A method for reading safety data of a solid state disk comprises the following steps:
Step 1: traversing the stored data in the solid state disk, and setting and distinguishing the risk level of the stored data;
step 2: setting reading logic for distinguishing placed data contents, and reading the data contents stored in the solid state disk by applying the reading logic;
step 3: after the solid state disk user reads the data content to be read, deleting the data content read by the solid state disk user.
In this embodiment, the traversing module traverses the data content currently stored in the solid state disk, the marking module operates at a rear position to mark the risk level of the data content stored in the solid state disk, the configuration module allocates the storage space inside the solid state disk, so that the storage space of each partition inside the solid state disk corresponds to a group of risk level marks, the identification module receives the data reading request of the solid state disk user, identifies the risk level of the request target data, receives and stores the user identity information and sets the verification key through the setting module, after the verification is completed in the processing layer, the output module receives the data content received by the reading layer, outputs the data content to the solid state disk user for the solid state disk user to read, and finally the deletion module deletes the data content read by the solid state disk user to read the corresponding read data content in the reading layer;
On the other hand, the network environment of the data reading operation of the solid state disk can be monitored through the formula calculation, so that the data reading operation process of the solid state disk is safer, and in addition, the data traversing stage in the data management layer brings output traversal data output logic, so that the marking operation of the data by the solid state disk user is more smoothly carried out.
Example 2
On the basis of embodiment 1, this embodiment further specifically describes a secure data reading system of a solid state disk in embodiment 1 with reference to fig. 1:
the data management layer comprises a traversing module, a marking module and a configuration module, wherein the traversing module is used for traversing the data content stored in the solid state disk at present, the marking module is used for marking the risk level of the data content stored in the solid state disk, and the configuration module is used for distributing the storage space inside the solid state disk, so that the storage space of each partition inside the solid state disk corresponds to one group of risk level marks;
the risk level marks in the mark module are manually set by a solid state disk user, and the step type risk level marks are provided with three groups and comprise: when the first-level, second-level and third-level marking modules and the traversing modules operate, a solid state disk user provides traversing data targets through the traversing modules, risk level marks set in the marking modules are applied to mark the real-time traversing data targets, and when the solid state disk newly receives data contents, the solid state disk user synchronously applies the marking modules to mark the data contents and then stores the newly received data contents in the solid state disk.
Through the arrangement, the data stored in the solid state disk can be distinguished, so that the follow-up system operation can perform logical safety management on the data output and reading process stored in the solid state disk.
Preferably, in the operation stage of the data management layer, the traversing module continuously provides data content to the solid state disk user to traverse the data target until the traversing module does not output the traversed data target, and the operation of the data management layer is finished and jumps to the processing layer for further operation; the processing layer is provided with a data storage catalog which is integrated by the names of all data contents stored in the solid state disk, and when a user of the solid state disk sends a data reading request, the user manually searches or edits input words to search and search through the data storage catalog.
Preferably, the setting module is internally provided with a sub-module, including:
the monitoring unit is used for setting the refreshing period of the verification key; the method is used for monitoring whether the verification key is updated in the refreshing period;
The method comprises the steps that a verification key is manually set by a solid state disk user, the verification key is composed of Arabic numbers with a plurality of digits, the solid state disk user modifies the key after the verification key according to a verification key refreshing period, in the continuous key modification operation process, the modified key is inconsistent with a previous group of keys, in the verification key refreshing period, the solid state disk user fails in the verification key refreshing period, the solid state disk user accesses a system in a solid state disk offline state, all identity information is input by a setting module, the setting module compares the identity information input by the solid state disk user with the identity information stored in the solid state disk user, and when a judging result is consistent, the verification key is reset by the setting module, otherwise, the system operation is finished.
Through the arrangement, the verification key used in the data reading operation in the solid state disk can be further and safely controlled, and the verification key used in the long-term running state of the system is more safe and stable
Example 3
On the basis of embodiment 1, this embodiment further specifically describes a secure data reading system of a solid state disk in embodiment 1 with reference to fig. 1:
the identity information stored in the setting module is manually input by a solid state disk user, and the setting module comprises the following steps: name, mobile phone number, identification card number, and text data;
the corresponding read logic of each storage partition in the solid state disk is respectively as follows:
Primary partition: after the key verification is successful, the data content to be read is sent to the secondary partition, the identity information of the solid state disk user is further verified in the secondary partition, and after the identity information verification is successful, the data content sent to the primary partition in the secondary partition is further sent to the reading layer;
Secondary partition: verifying the identity information of the solid state disk user, after the identity information is verified successfully, sending the data content to be read to the third-level partition, and further sending the data content sent to the second-level partition in the third-level partition to the reading layer;
Three-level partition: verifying the identity information of the solid state disk user, and after the identity information is verified successfully, further transmitting the data content to be read to a reading layer;
the operation of verifying the identity information and comparing the identity information of the solid state disk user is completed in the processing layer.
Through the arrangement, the corresponding reading logic of each storage partition in the solid state disk is further limited, so that when a user of the solid state disk reads data stored in the solid state disk, the solid state disk outputs data required to be read by the user more stably, and the situation that the data stored in the solid state disk leak in a large area due to the reading behavior of the data is avoided by means of the logic arranged.
Preferably, the reading layer comprises an output module and a deleting module, the output module is used for receiving the data content received by the reading layer, outputting the data content to the solid state disk user for the solid state disk user to read, and the deleting module is used for deleting the data content read by the solid state disk user and then reading the corresponding read data content in the reading layer.
Preferably, the traversing module is electrically connected with the marking module and the configuration module through a medium, the configuration module is electrically connected with the identification module and the setting module through the medium, the monitoring unit is electrically connected with the inside of the setting module through the medium, the setting module is electrically connected with the output module through the medium, and the output module is interconnected with the deleting module through the medium.
In summary, through the system operation in the above embodiment, the data content stored in the solid state disk can be managed, and further the risk level is configured, and the data content stored in the solid state disk is read through different reading logics on the basis of the risk level, so that the safety of the solid state disk when the data is read is ensured, and a maintenance effect is brought to the reading of the data stored in the solid state disk by the solid state disk user; in addition, when the system is operated, a real-time network security monitoring effect can be brought to a user when the data stored in the solid state disk is read, the process of reading the data in the solid state disk can be kept safe through a set period, and when the security risk exists, countermeasures are timely taken, so that the conditions of data leakage and theft caused by the operation of reading the data in the solid state disk are effectively avoided; in addition, the method provided in the embodiment can further stabilize the operation of the system, and further process the data content read by the user in real time in the solid state disk in the operation process of the system, so that the technical scheme provided in the embodiment obtains more comprehensive safety protection when the data stored in the solid state disk is read.
The above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. The safe data reading system of the solid state disk is characterized by comprising a data management layer, a processing layer and a reading layer;
The method comprises the steps that data stored in a solid state disk are distinguished and placed through a data management layer to set a step-type risk level, a processing layer is based on a data reading request of a solid state disk user, after the risk level of data of a reading target is identified, the safety of a data reading environment is detected, the identity of the solid state disk user is verified, the data reading target is further sent to a reading layer, and the solid state disk user reads data content corresponding to the reading request through the reading layer;
The processing layer comprises an identification module and a setting module, wherein the identification module is used for receiving a data reading request of a solid state disk user, identifying a target data risk level of the request, and the setting module is used for receiving and storing user identity information and setting a verification key;
In the operation stage of the processing layer, network security for monitoring the data reading state of the solid state disk in real time is calculated by the following formula:
Wherein: is a network security threat index; /(I) The cost of loss caused by malicious node attack in the network is reduced; /(I)Is the inactivation rate of malicious nodes; /(I)Is a node in the network; /(I)The network security monitoring times are counted; /(I)1 Or more, judging that the network has security threat, and/or > judging that the network has security threat1, Judging network security, wherein when the judging result is that the network has security threat, the data reading operation of the solid state disk is finished, and t represents real-time;
And under the running state of the module in the data management layer, the network connection of the system is disconnected, and the network security of the data reading state of the solid state disk is detected according to a monitoring period, wherein the monitoring period is set by the processing layer for detecting the network security of the data reading state of the solid state disk.
2. The system for reading the safe data of the solid state disk according to claim 1, wherein the data management layer comprises a traversing module, a marking module and a configuration module, the traversing module is used for traversing the data content currently stored in the solid state disk, the marking module is used for marking the risk level of the data content stored in the solid state disk, and the configuration module is used for distributing the internal storage space of the solid state disk, so that the storage space of each partition in the solid state disk corresponds to a group of risk level marks;
the risk level marks in the mark module are manually set by a solid state disk user, and the step type risk level marks are provided with three groups and comprise: when the first-level, second-level and third-level marking modules and the traversing modules operate, a solid state disk user provides traversing data targets through the traversing modules, risk level marks set in the marking modules are applied to mark the real-time traversing data targets, and when the solid state disk newly receives data contents, the solid state disk user synchronously applies the marking modules to mark the data contents and then stores the newly received data contents in the solid state disk.
3. The system for reading the secure data of the solid state disk according to claim 2, wherein when the traversing module operates to provide the traversed data target of the solid state disk user, the traversing module calculates and outputs the position of the corresponding data content of the traversed data target provided to the solid state disk user according to the following formula, the traversing module searches the corresponding data content in the solid state disk according to the output position of the data content and outputs the data content to the user terminal, and the calculating formula is as follows:
Wherein: A data content storage path; /(I) A subset of the data storage root records; /(I)Storing a timestamp for the data content; the optimal target data content is selected according to the size of the data content; /(I) The storage path is used for storing all data contents in the solid state disk; /(I)An output data content storage path; /(I)A storage path for the remaining non-output data content in the solid state disk;
After the operation of the traversing module and the marking module is finished, the configuration module further performs data migration on the marking result of the data content stored in each solid state disk according to the marking module, so that the risk levels of the data content stored in each partition in the solid state disk are the same, and the risk levels of the data content stored in each partition are different.
4. The system for reading the secure data of the solid state disk according to claim 3, wherein the traverse module continues to provide the data content to the user of the solid state disk to traverse the data object until the traverse module does not output the traversed data object, and the data management layer is finished to jump to the processing layer for further operation.
5. The system for reading the safe data of the solid state disk according to claim 1, wherein a data storage directory is arranged in the processing layer, the data storage directory is integrated by each data content name stored in the solid state disk, and when a user of the solid state disk sends a data reading request, the user of the solid state disk performs manual search or edits input words to search through the data storage directory in the processing layer.
6. The system for reading secure data from a solid state disk according to claim 1, wherein the setting module is internally provided with a sub-module, and the system comprises:
The monitoring unit is used for setting a refreshing period of the verification key and monitoring whether the verification key is updated in the refreshing period;
The method comprises the steps that a verification key is manually set by a solid state disk user, the verification key is composed of Arabic numbers with a plurality of digits, the solid state disk user modifies the key after the verification key according to a verification key refreshing period, in the continuous key modification operation process, the modified key is inconsistent with a previous group of keys, in the verification key refreshing period, the solid state disk user fails in the verification key refreshing period, the solid state disk user accesses a system in a solid state disk offline state, all identity information is input by a setting module, the setting module compares the identity information input by the solid state disk user with the identity information stored in the solid state disk user, and when a judging result is consistent, the verification key is reset by the setting module, otherwise, the system operation is finished.
7. The system for reading the secure data of the solid state disk according to claim 1, wherein the identity information stored in the setting module is manually input by a user of the solid state disk, and the system comprises: name, mobile phone number, identification card number, and text data;
the corresponding read logic of each storage partition in the solid state disk is respectively as follows:
Primary partition: after the key verification is successful, the data content to be read is sent to the secondary partition, the identity information of the solid state disk user is further verified in the secondary partition, and after the identity information verification is successful, the data content sent to the primary partition in the secondary partition is further sent to the reading layer;
Secondary partition: verifying the identity information of the solid state disk user, after the identity information is verified successfully, sending the data content to be read to the third-level partition, and further sending the data content sent to the second-level partition in the third-level partition to the reading layer;
Three-level partition: verifying the identity information of the solid state disk user, and after the identity information is verified successfully, further transmitting the data content to be read to a reading layer;
the operation of verifying the identity information and comparing the identity information of the solid state disk user is completed in the processing layer.
8. The system for reading the safe data of the solid state disk according to claim 1, wherein the reading layer comprises an output module and a deletion module, the output module is used for receiving the data content received by the reading layer, outputting the data content to the solid state disk user for the solid state disk user to read, and the deletion module is used for deleting the data content read by the solid state disk user and then reading the corresponding read data content in the reading layer.
9. The system for reading the security data of the solid state disk according to claim 2, wherein the traverse module is electrically connected with the marking module and the configuration module through a medium, the configuration module is electrically connected with the identification module and the setting module through a medium, the inside of the setting module is electrically connected with the monitoring unit through a medium, the setting module is electrically connected with the output module through a medium, and the output module is electrically connected with the deletion module through a medium.
10. A method for reading secure data of a solid state disk, the method being implemented by the secure data reading system of a solid state disk according to any one of claims 1 to 9, and comprising the steps of:
Step 1: traversing the stored data in the solid state disk, and setting and distinguishing the risk level of the stored data;
step 2: setting reading logic for distinguishing placed data contents, and reading the data contents stored in the solid state disk by applying the reading logic;
step 3: after the solid state disk user reads the data content to be read, deleting the data content read by the solid state disk user.
CN202310523957.3A 2023-05-10 2023-05-10 Method and system for reading safety data of solid state disk Active CN116560571B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310523957.3A CN116560571B (en) 2023-05-10 2023-05-10 Method and system for reading safety data of solid state disk

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310523957.3A CN116560571B (en) 2023-05-10 2023-05-10 Method and system for reading safety data of solid state disk

Publications (2)

Publication Number Publication Date
CN116560571A CN116560571A (en) 2023-08-08
CN116560571B true CN116560571B (en) 2024-05-07

Family

ID=87494121

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310523957.3A Active CN116560571B (en) 2023-05-10 2023-05-10 Method and system for reading safety data of solid state disk

Country Status (1)

Country Link
CN (1) CN116560571B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090106143A (en) * 2008-04-04 2009-10-08 주식회사 셀픽 Solid state disk with security function
CN108197483A (en) * 2017-12-29 2018-06-22 北京联想核芯科技有限公司 Data guard method, solid state disk
US10158653B1 (en) * 2015-12-04 2018-12-18 Nautilus Data Technologies, Inc. Artificial intelligence with cyber security
CN112153015A (en) * 2020-09-09 2020-12-29 杭州安恒信息技术股份有限公司 Multi-encryption interface authentication method, device, equipment and readable storage medium
CN113553006A (en) * 2021-07-12 2021-10-26 山东华芯半导体有限公司 Secure encrypted storage system for realizing data writing to read-only partition
CN115987827A (en) * 2022-11-29 2023-04-18 中国电信股份有限公司 Equipment monitoring method and device, electronic equipment and readable medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11841770B2 (en) * 2005-09-30 2023-12-12 Pure Storage, Inc. Storage unit connection security in a storage network and methods for use therewith
US20100146608A1 (en) * 2008-12-06 2010-06-10 Raytheon Company Multi-Level Secure Collaborative Computing Environment
US8291258B2 (en) * 2010-01-08 2012-10-16 Juniper Networks, Inc. High availability for network security devices
US20220092180A1 (en) * 2019-11-22 2022-03-24 Pure Storage, Inc. Host-Driven Threat Detection-Based Protection of Storage Elements within a Storage System
US11615185B2 (en) * 2019-11-22 2023-03-28 Pure Storage, Inc. Multi-layer security threat detection for a storage system
US11941130B2 (en) * 2020-08-14 2024-03-26 Ken STRATFORD Secure data storage

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090106143A (en) * 2008-04-04 2009-10-08 주식회사 셀픽 Solid state disk with security function
US10158653B1 (en) * 2015-12-04 2018-12-18 Nautilus Data Technologies, Inc. Artificial intelligence with cyber security
CN108197483A (en) * 2017-12-29 2018-06-22 北京联想核芯科技有限公司 Data guard method, solid state disk
CN112153015A (en) * 2020-09-09 2020-12-29 杭州安恒信息技术股份有限公司 Multi-encryption interface authentication method, device, equipment and readable storage medium
CN113553006A (en) * 2021-07-12 2021-10-26 山东华芯半导体有限公司 Secure encrypted storage system for realizing data writing to read-only partition
CN115987827A (en) * 2022-11-29 2023-04-18 中国电信股份有限公司 Equipment monitoring method and device, electronic equipment and readable medium

Also Published As

Publication number Publication date
CN116560571A (en) 2023-08-08

Similar Documents

Publication Publication Date Title
US20200195667A1 (en) Url attack detection method and apparatus, and electronic device
CN106548091A (en) A kind of data deposit card, the method and device of checking
US20200175583A1 (en) Blockchain-based leasing
CN105471581A (en) Identity verification method and device
CN106652182B (en) A kind of charging card management system and method
CN112347521A (en) Medical data management method and system based on medical block chain
CN112465411A (en) Risk prediction method, device and equipment
CN113962787A (en) Safety protection method for financial information
CN106850675A (en) A kind of determination method and device of attack
CN105933185A (en) Method and device for determining connection abnormity type of router
CN115134069A (en) Block chain editing method and block chain link point
CN116527288A (en) Knowledge graph-based network attack security risk assessment system and method
CN116560571B (en) Method and system for reading safety data of solid state disk
CN110472978A (en) A kind of digital cash address tamper resistant method and system
CN107426182A (en) The access control method and system of a kind of storage management system
CN110110528A (en) Safety risk estimating method, device and the equipment of information system
CN109067849A (en) Method of data synchronization based on block
KR102124049B1 (en) Apparatus for processing security event using block chain and smart contract and method therefor
CN112235304A (en) Dynamic security protection method and system for industrial internet
CN101106567A (en) Data processing system and file system firewall method
CN116361292A (en) Cross-chain resource mapping and management method and system
CN116467388A (en) System and method for maintaining consistency of shared files based on blockchain
CN110928923A (en) Data storage method and system based on block chain
CN116185296A (en) Distributed safe storage system based on multimedia teleconference information
CN112948847B (en) Block chain-based data sharing system and data correctness verification method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant