CN1286025C - Method for realizing hard disk protection - Google Patents

Method for realizing hard disk protection Download PDF

Info

Publication number
CN1286025C
CN1286025C CN 200410007970 CN200410007970A CN1286025C CN 1286025 C CN1286025 C CN 1286025C CN 200410007970 CN200410007970 CN 200410007970 CN 200410007970 A CN200410007970 A CN 200410007970A CN 1286025 C CN1286025 C CN 1286025C
Authority
CN
China
Prior art keywords
password
hard disk
product
current
sequence number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN 200410007970
Other languages
Chinese (zh)
Other versions
CN1673982A (en
Inventor
黄双喜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN 200410007970 priority Critical patent/CN1286025C/en
Publication of CN1673982A publication Critical patent/CN1673982A/en
Application granted granted Critical
Publication of CN1286025C publication Critical patent/CN1286025C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Abstract

The present invention discloses a method for protecting hard disks. A parameter which is indicated by providing a verification password and a parameter which represents a safety verification grade are set in a hard disk, and a password generation algorithm generates an encryption password of an original configuration hard disk of the product based on a product sequence number and the device identification of an original configuration device in the product; when data on the hard disk is accessed, a CPU reads the product sequence number of the current product and the device identification used for generating the encryption password in the current product, and the password generation algorithm stored in the current product generates a verification password according to the product sequence number and the device identification read currently; meanwhile, the encryption password stored in the hard disk of the current product is read; whether the verification password generated currently is matched with the read encryption password is judged, and if true, the verification password is authorized and certified to pass to enter normal application; or else, the verification password quit current access. Hard disks can be protected simply and conveniently by adopting the method, the safe reliability of hard disks can be improved, and the present invention is convenient for users to use.

Description

A kind of method that realizes hard disk protection
Technical field
The present invention relates to the hard disk management technology, refer to a kind of hard disk method for encryption/decryption of realizing hard disk protection especially.
Background technology
As everyone knows, hard disk (HDD) is used for storing a large number of users data and application program, and the user needs the data thereon of visit storage at any time.For any a hard disk, unless special setting is arranged, usually, user's visit is without any need for authorizing, in other words, be exactly that HDD can give tacit consent to all users and is the power user, it is legal giving tacit consent to all visits, HDD does not carry out authority checking (CA, Certificate Authorization) to the user of request visit.
But, in actual use, in order to guarantee the legitimacy of calling party, also in order to guarantee that data are not arbitrarily copied in the hard disk, arbitrarily do not analyzed and crack by other system, mostly need in the firmware (Firmware) of HDD, carry out special setting, on visit HDD, provide mandate during data to require the user, thereby the current accessed user is carried out authority checking.In simple terms, need the password (Password) of user class exactly, this Password can be preestablished by the user, and can make amendment or wipe.
The principle of work of HD encryption is such: usually, hard disk possesses two kinds of other users of level: User and Master, the pairing safety verification rank of these two kinds of ranks is respectively: High and Maximum, utilize the security password in the system that order Security Set Password is set, can the different safety verification rank of setting harddisk: High or Maximum.
If the level of security of setting harddisk is High, then during the data on the user capture hard disk, system can require the user that User is provided Password, this User Password and the original Password that is stored in the HDD register mate checking, if meet mutually, locking to hard disk is untied by safety unlock command Security Unlock by system, and the user just can conduct interviews to the data on the hard disk.In case the Password in UserPassword that the user provides and the HDD register can't mate, HDD just can't be by the unlocked state, and the user also just can't visit data wherein.But, for level of security is High, the Password rank is the hard disk of User Password, in case the user provides Master Password, after system receives this other Password of Master level, utilize Security Unlock order, the lock-out state of HDD also can be untied by system, that is to say that in the safety verification rank of User level, the Password of Master level also is the locking that can untie HDD.
If the level of security of setting harddisk is Maximum, then during the data on the user capture hard disk, system can require the user that User is provided Password, then User Password that is provided and the Password that is stored in the hard disk register are mated checking, if coupling, then system can order by SecurityUnlock, unties the lock-out state of hard disk, and the user can conduct interviews to the data on the hard disk.If but at the level of security of Maximum, even the user provides Master Password, also can't utilize the SecurityUnlock order to untie the lock-out state of hard disk, this moment, system can utilize secure erase to prepare the locking that HDD is untied in (SECURITYERASE PREPARE) and secure erase unit (SECURITY ERASE UNIT), under the but this state, the data on Password and the HDD all can be wiped free of.
Present hard disk enciphering/deciphering technology can be undertaken or finishes by hardware by software, below just illustrates in the prior art it is how to realize the hard disk enciphering/deciphering for two more typical examples:
A kind of implementation method of HD encryption is disclosed in the patent of CN1464404A, this scheme is divided into encrypted area and non-encrypted area with hard disk, when some confidential datas of storage, can select to be stored in encrypted area, at this moment, can move an encryption software on the backstage of system, the content of data is carried out storing on the hard disk again after the encryption, like this, also must obtain corresponding encryption software and input password even other disabled user has obtained hard disk, could decipher and read the content of encrypted area on the hard disk.This encryption method all needs the user to input password when each encryption or deciphering, and this be feasible, but for the consumer electronics series products, this method will be brought very large problem for PC or purely as the equipment of storage.Because the consumer electronics series products at be general client layer, the execution that needs all application programs is all to user transparent, so, if every execution is once used, just need the user to input password one time, the application of this product will be extremely inconvenient concerning the user, be that the user is unacceptable.
Here, be a notion comparatively widely on the described consumer electronics series products stricti jurise, contain all electronic products, for example MP3, DVD etc. towards the consumption individual.But related consumer electronics series products mainly is meant the consumption personal electric product that utilizes the embedded hardware platform to develop and realize in present patent application, more typically be exactly personal digital video recorder (PVR), digital video recorder (DVR) etc., this class consumption electronic product adopts hardware structures such as Embedded X86, ARM, Xscale, realize concrete consumer application in conjunction with embedded real-time operating system (RTOS), comprise that TV watching, TV programme timed recording, voice playing, photo are browsed, video/DVD plays and function such as recreation.
A kind of hardware encipher scheme is also disclosed in patent CN1248743A, this scheme is in data stream turnover hard disk process, allow current data through a hardware enciphering and deciphering unit, the user inputs password during encryption, system deposits the password of being inputed in the random access memory (RAM) of encryption chip, require user's input validation password during deciphering, again the password of preserving among the password of input and the RAM is mated checking, if the verification passes normal data in the access hard disk then.If this scheme is applied in the consumer electronics series products, the problem that can have two aspects: on the one hand, there be the problem the same with patented claim CN1464404A in this scheme, application program needs the user to input password when each run to verify, this will bring great inconvenience to the consumption electronic product; On the other hand, as everyone knows at the consumer electronics series products, cost is a very important focus, adopts this encipherment scheme to need the extra hardware encryption circuit that a cover is made up of parts such as enciphering/deciphering chip and internal control unit that increases, and this can increase the cost of entire product.Having at present utilizes CPLD/field programmable logic circuit (CPLD/FPGA) to realize the scheme of enciphering/deciphering, the cost of its increase is more than 6 dollars, this user to the consumption electronic product is difficult to accept, and this scheme can increase the complexity of hardware handles.
From above-mentioned several disclosed HD encryption schemes, present hard disk enciphering/deciphering scheme mainly is at PC or pure device design as storage, if it is directly applied in the consumer electronics series products, can there be many obvious defects, very unfavorable to user's use.
Summary of the invention
In view of this, fundamental purpose of the present invention is to provide a kind of method that realizes hard disk protection, can realize the protection to hard disk simply and easily, and is user-friendly when improving the hard disk secure reliability.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of method that realizes hard disk protection, key is, be provided with and indicate parameter and other parameter of expression safety verification level that authentication password need be provided in the hard disk, selected password generating algorithm is according to the device identification of an original configuration device in product ID and this product, generation is to the Crypted password of this product original configuration hard disk, and the Crypted password that is generated is stored in the described original configuration hard disk; When the data on the access hard disk, this method is further comprising the steps of:
A.CPU reads the product ID of current production, and reading the device identification that is used to generate Crypted password in the current production, the password generating algorithm of storing in the current production boot storage area generates authentication password according to current product ID that reads and device identification; Simultaneously, read the Crypted password of storing in the current production hard disk;
Whether the authentication password of b. judging current generation mates with the current Crypted password that reads, if then authorization identifying passes through, normally enters application operating; Otherwise, withdraw from the current accessed flow process.
Wherein, if password does not match among the step b, further comprise the current step that is operating as illegal operation of warning.
In the such scheme, described device identification is a hard disk sequence number or for the CPU sequence number or for the mainboard sequence number.The Crypted password that is generated is stored in the register of hard disk.The CMOS that described boot storage area is a PC or for the CMOS of X86 embedded hardware platform or for not containing the flash memory that is used to store boot in the embedded hardware framework of BIOS.
In the such scheme, describedly indication is set need provides the parameter of authentication password to be: the Bit1 of the 82nd word is set to 1 in the hard disk initialization information, and the Bit1 of the 85th word is set to 1 in the hard disk initialization information.Described other parameter of expression safety verification level that is provided with is: the Bit7 of the 128th word is set to 0 in the hard disk initialization information, is the User level with the rank of representing required password.
In the such scheme, read product ID described in the step a and be: the ad-hoc location from CMOS reads product ID.When described device identification was the hard disk sequence number, reading device was designated described in the step a: read the hard disk sequence number from current hard disk register.
Hard disk protecting method provided by the present invention has following advantage and characteristics:
1) the present invention adopts the device identification of the product ID of unique identification product and certain device of unique identification to construct Crypted password to hard disk jointly, so, encrypting or during password authentification, set encryption and decryption program can be extracted corresponding sign automatically and operate, so, just can be directly in all encryption and decryption programs of running background, the user need not be concerned about password, also need not input password, whole encryption and password authentification process are fully transparent to the user, thereby can improve the ease for use of system applies, also provide great convenience for the user uses.This transparency that the enciphering/deciphering program is carried out for the consumer electronics series products, only is best suited for.
2) owing to adopt two unique signs to form jointly among the present invention, and these two signs can not obtain simultaneously, and password can't utilize software to derive; Simultaneously, the present invention implements on the embedded hardware platform, the encryption and decryption procedure stores is at the storage area relevant with boot, unless the user knows the generating algorithm of password, otherwise at all can't decryption, therefore, method of the present invention can improve the safe reliability of total system, the ease for use of application preferably.
3) because the checking of password is divided into two processes: read two signs by CPU earlier, dynamically generate authentication password according to the password generator program; And then the password that generated and the password of being stored mated checking, and so in case changed hardware platform or done other change, this hard disk can't start, or the data on the hard disk can't normally read, the security of encryption is higher.
4) owing to adopt User and Master two-stage encrypted authentication system, generally finish normal enciphering/deciphering with the User level, and can utilize the password of Master level to untie in-problem hard disk at the product maintenance end, to repair its problem, and can need not destroy the wherein data of storage fully, more convenient operation, practicality, flexible.
Description of drawings
Fig. 1 is the processing flow chart of preset password among the present invention;
Fig. 2 is the realization flow figure of password authentification among the present invention.
Embodiment
Core concept of the present invention is: add password and generate and the password authentification program in the boot storage area, the setting by to specific word in the hard disk firmware and specific bit position realizes the protection to hard disk.Be exactly specifically: the product ID (PSN) of employing unique identification product and the device identification of certain device of unique identification are constructed the Crypted password to hard disk jointly, set the password generating algorithm simultaneously, generate the Crypted password of hard disk by these two signs and the password generating algorithms that set in advance and be stored in the corresponding hard disk; Data on this hard disk of visit, when this hard disk is carried out password authentification, read current PSN and corresponding devices sign, and the password generating algorithm that has by current device generates current authentication password, password that is generated and the password of storing are in advance compared, if coupling, then checking is passed through, allow the data on the normal access hard disk of user, otherwise visit that will refusing user's.
Here, described product ID is meant the product ID that carries out hard disk that enciphering/deciphering the handles equipment under original; Described device identification is meant the sign that belongs to a device under the original device with the hard disk that carries out the enciphering/deciphering processing, this device identification can directly be the hard disk sequence number (HSN) of hard disk self, also can be the sequence number of CPU, can also be the sequence number of mainboard.In a word, there is the sequence number of uniquely identified device can be used as device identification.Give an example, handle if the hard disk among the consumer electronics product PVR is carried out enciphering/deciphering, so, PSN just is meant the product ID of PVR, device identification can be the sequence number of hard disk self among the PVR, or the sequence number of CPU among the PVR, or the sequence number or the like of mainboard among the PVR.
Hard disk protecting method of the present invention can be used for general PC or embedded consumer electronics series products; the top password of mentioning generates and the password authentification program generally is placed in the storage area relevant with system bootstrap routine; can directly be stored in the boot storage area, or be stored in when system start-up detects and to have access to storage area.Be exactly specifically,, cooperate, password generation and proving program can be stored among the CMOS, to carry out the coupling checking of password by BIOS for general PC; For the embedded hardware platform of X86, also password generation and proving program can be stored among the CMOS, to carry out the coupling checking of password; For other embedded hardware framework that does not need BIOS, for example ARM hardware structure etc. then can generate password with proving program and be stored in the Flash that is used for storing boot, to carry out the coupling checking of password.
Be example only below, specify the implementation procedure of the inventive method, adopt the implementation procedure of other device identification identical with present embodiment with principle to adopt PSN and HSN to construct the HD encryption password jointly.In the present embodiment, adopt the embedded hardware platform of X86, password generates and proving program sets in advance and is stored among the CMOS.
Because at each consumer electronics series products, for example PVR only has a unique product level sequence number (Product SN), is called PSN, this PSN is a unique identification of distinguishing every equipment.Equally, at every hard disk, also all have only a unique hard disk sequence number (HDD SN), be called HSN, this HSN is the unique identification that separates every hard disk.The characteristics that the present invention utilizes these two unique mark just and easily obtains; because equipment or device serial number are directly to read, do not need the user to participate in importing, so; just can realize complete transparent encryption and password authentification process, and then realize protection hard disk to the user.
Method of the present invention mainly comprises two parts: default flow process of password and password authentification flow process.Wherein, the default flow process of password just is meant and utilizes PSN and HSN to construct the process of password and storage jointly.Referring to shown in Figure 1, the password preset procedures among the present invention specifically may further comprise the steps:
Step 101~103: in order to cooperate encryption and the password authentification of realization to hard disk, at first will be before equipment dispatches from the factory, utilize the operation commands set (IDENTIFY DEVICE CommandSets) in the hard disk firmware (Firmware), initialization information to original configuration hard disk in every equipment is provided with, and this setting comprises: indication need provide parameter and other parameter of expression safety verification level of password authentification.In hard disk firmware, be provided with the zone of storage hard disk initialization information specially, this zone is called IDENTIFY DEVICE, and therefore, described setting is exactly that certain bits to specific word among the IDENTIFY DEVICE is provided with.
Shown in table one, table two, wherein, table one is the description and the implication thereof of the 82nd word bit and the 85th word bit among the IDENTIFY DEVICE, and table two is the description and the implication thereof of the 128th word bit among the IDENTIFY DEVICE.So, concrete setting is exactly: the Bit 1 that utilizes operation commands set that the 82nd word among the IDENTIFYDEVICE is set is 1, Bit 1 with the 85th word among the IDENTIFY DEVICE is changed to 1 simultaneously, so, provides authentication password in the time of can requiring to attempt data on the access hard disk in system.In addition, also need to set the safety verification rank of this password, concrete operations are: the Bit 7 of the 128th word among the IDENTIFY DEVICE is set to 0, is the User level with the rank of representing required password.
82 M X F F F X F F F F F F F F F F F Command set supported 15 Obsolete 14 1=NOP Command Supported 13 1=READ BUFFER command supported 12 1=WRITE BUFFER command supported 11 Obsolete 10 1=Host Protected Area feature set supported 9 1=DEVICE RESET command supported 8 1=SERVICE interrupt supported 7 1=release interrupt supported 6 1=look-ahead supported 5 1=write cache supported 4 Shall be cleared to zero 3 1=supports Power Management feature set 2 1=supports Removable Media feature set 1 1=supports Security Mode feature set (hard disk is supported the setting of safety detection pattern) 0 1=supports SMART feature set
85 M X F F F X F F F F F F F F F F F Command set/feature enabled 15 Obsolete 14 1=NOP Command Enabled 13 1=READ BUFFER command Enabled 12 1=WRITE BUFFER command Enabled 11 Obsolete 10 1=Host Protected Area feature set Enabled 9 1=DEVICE RESET command Enabled 8 1=SERVICE interrupt Enabled 7 1=release interrupt Enabled 6 1=look-ahead Enabled 5 1=write cache Enabled 4 Shall be cleared to zero 3 1=Power Management feature set Enabled 2 1=Removable Media feature set Enabled 1 1=Security Mode feature set enabled (the safety verification pattern arranges to activate and comes into force) 0 1=SMART feature set Enabled
Table one
89 90 92 128 O O O O F F V F V F F V V V V F Time required for security erase unit completion Time required for Enhanced security erase completion Master Password Revision Code Security Status 15-9 Reserved 8 Security Level 0=High; 1=Maximum (level of security High respective value 0, the other Maximum respective value 1 of safe level 7-6 Reserved) 5 1=Enhanced security erase supported 4 1=Security count expired 3 1=Security frozen, 2 1=Security locked (hard disk is in the encryption safe state) 1 1=Security enabled (encryption safe activates effectively) 0 1=Security supported (hard disk support safety encipher)
Table two
Step 104~106: after required parameter is set, CPU reads the PSN of current device and the HSN of hard disk that current device disposes, the password of CPU operation simultaneously generating algorithm, generate a unique password by the password generating algorithm of storing among the CMOS according to the current PSN that reads and HSN, and then utilize security password that order Security Set Password is set the password that is generated is deposited in the register of hard disk.
Here, reading PSN specifically is the special bit that CPU reads indication equipment sequence number among the CMOS; Reading HSN specifically is that CPU reads the hard disk sequence number of storing in the hard disk register; Described password generating algorithm can be selected any existing standard key schedule for use, and such as MD5 algorithm etc., PSN and HSN are just as the input parameter of selected key schedule.
Above-mentioned steps 101~103 and step 104~106 fully can parallel work-flows, do not have the branch of sequencing, and same, step 101,102,103 3 steps also can be carried out simultaneously, there is no the branch of sequencing.
Password authentification process of the present invention specifically may further comprise the steps as shown in Figure 2:
The password of storing among step 201~202:CPU operation CMOS generates and the password authentification program, reads the PSN of current device and the HSN of hard disk that current device disposes simultaneously automatically, generates a password by the password generating algorithm according to current PSN that reads and HSN;
Step 203: read that store in the hard disk register, default Crypted password;
Step 204~206: whether the password of more current Crypted password that reads and current generation mates, if then authority checking is passed through, system normally enters required application operating; Otherwise the authority checking failure directly finishes the current accessed process, or warns the current illegal operation that is operating as, and withdraws from the current accessed process then.
Above-mentioned steps 201~202 and step 203 fully can parallel work-flows, do not have the branch of sequencing.
After adopting method of the present invention, at every turn after device power-up starts, hard disk all can require system to carry out the checking of password coupling, like this, the product mark PSN that CPU will read the sign HSN of hard disk automatically and be stored in the CMOS specific position, afterwards, according to the password generating algorithm of moving among the BIOS, CPU generates authentication password, is made the real-time verification on backstage by BIOS whereabouts hard disk; In case the password in password that is generated and the hard disk register can mate, the lock-out state of hard disk just can be untied by system.Because the execution of the generation of authentication password and concrete checking is all carried out on the backstage, so this enciphering/deciphering scheme is fully transparent to the user.
Like this, if the user takes certain hard disk in the system in addition of own original affiliated system, to attempt to copy the data on it or to carry out system and crack when analyzing, because hard disk requirement system provides authentication password, although the HSN that reads hard disk that CPU can be correct, but owing to do not store corresponding PSN and password authentification generator program among the BIOS in other system, so the data in the hard disk at all can't be accessed.So, both can guarantee that the television content of being recorded was not arbitrarily derived, also guarantee simultaneously the analysis that is not cracked of the system design part in the hard disk.
When the used hard disk of user or the system failure need be returned maintenance, because the PSN difference of every product, factory can't utilize User level password to mate checking, but as can be known according to the encryption principle of hard disk, hard disk exists two-stage safety verification: Master and User, therefore, producer can utilize special Master level password generator program, generate " power user " password of Master level, cooperate Security Unlock to order the locking of untiing, like this, both can untie locking every hard disk to hard disk, concrete reparation can be carried out again, also the content of storing in the hard disk can be do not damaged simultaneously.
Adopt method of the present invention, can protect the data in the hard disk arbitrarily not copied and propagate, the system in the hard disk of yet guaranteeing is not simultaneously taken to be analyzed in other system and is cracked.Such scheme is mainly used in the consumer electronics series products, for example: PVR﹠amp; Among the DMR (Digital Media Recorder), be the video file format of MPEG2 and store on the hard disk because the main function of this series products is exactly the recording TV program content, so, because the content of being recorded is to provide and have the property in copyright of its content by cable television provider (Cable Service Provider), so require this series products cannot arbitrarily propagate the content that it is recorded; Because this series products is embedded real-time operating system (RTOS) in conjunction with the embedded hard disc platform, develop as X86 or XScale etc. simultaneously, the developer does not wish that its system design part is cracked and imitates by others' analysis yet.
Simultaneously; owing to be at the consumer electronics series products; also need to take into full account the comfort level of its ease for use, user's use; so password generation and password authentification all are arranged at running background; transparent fully to the user; only occur with the illegal copies hard disc data or attempt in violated system to analyze when cracking the behavior of hard-disk system design architecture, the safeguard measure of hard disk just can come into force, and normal the use is the imperceptible hard disk protection that exists.
The above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.

Claims (9)

1, a kind of method that realizes hard disk protection, it is characterized in that, be provided with and indicate parameter and other parameter of expression safety verification level that authentication password need be provided in the hard disk, selected password generating algorithm is according to the device identification of an original configuration device in product ID and this product, generation is to the Crypted password of this product original configuration hard disk, and the Crypted password that is generated is stored in the described original configuration hard disk; When the data on the access hard disk, this method is further comprising the steps of:
A.CPU reads the product ID of current production, and reading the device identification that is used to generate Crypted password in the current production, the password generating algorithm of storing in the current production boot storage area generates authentication password according to current product ID that reads and device identification; Simultaneously, read the Crypted password of storing in the current production hard disk;
Whether the authentication password of b. judging current generation mates with the current Crypted password that reads, if then authorization identifying passes through, normally enters application operating; Otherwise, withdraw from the current accessed flow process.
2, method according to claim 1 is characterized in that, if password does not match among the step b, further comprises the current step that is operating as illegal operation of warning.
3, method according to claim 1 is characterized in that, described device identification is a hard disk sequence number or for the CPU sequence number or for the mainboard sequence number.
4, according to claim 1,2 or 3 described methods, it is characterized in that the Crypted password that is generated is stored in the register of hard disk.
5, according to claim 1,2 or 3 described methods, it is characterized in that the CMOS that described boot storage area is a PC or for the CMOS of X86 embedded hardware platform or for not containing the flash memory that is used to store boot in the embedded hardware framework of BIOS.
6, according to claim 1,2 or 3 described methods, it is characterized in that, describedly indication is set provides the parameter of authentication password to be: the Bit 1 of the 82nd word in the hard disk initialization information is set to 1, and the Bit 1 of the 85th word in the hard disk initialization information is set to 1.
According to claim 1,2 or 3 described methods, it is characterized in that 7, described other parameter of expression safety verification level that is provided with is: the Bit 7 of the 128th word in the hard disk initialization information is set to 0, is the User level with the rank of representing required password.
8, method according to claim 5 is characterized in that, reads product ID described in the step a to be: the ad-hoc location from CMOS reads product ID.
9, method according to claim 3 is characterized in that, when described device identification was the hard disk sequence number, reading device was designated described in the step a: read the hard disk sequence number from current hard disk register.
CN 200410007970 2004-03-23 2004-03-23 Method for realizing hard disk protection Expired - Lifetime CN1286025C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200410007970 CN1286025C (en) 2004-03-23 2004-03-23 Method for realizing hard disk protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200410007970 CN1286025C (en) 2004-03-23 2004-03-23 Method for realizing hard disk protection

Publications (2)

Publication Number Publication Date
CN1673982A CN1673982A (en) 2005-09-28
CN1286025C true CN1286025C (en) 2006-11-22

Family

ID=35046538

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200410007970 Expired - Lifetime CN1286025C (en) 2004-03-23 2004-03-23 Method for realizing hard disk protection

Country Status (1)

Country Link
CN (1) CN1286025C (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201037552A (en) * 2009-04-14 2010-10-16 Wistron Corp Method for enhancing information security in a computer system
CN105095788B (en) * 2015-06-30 2018-06-29 北京奇虎科技有限公司 The method, apparatus and system of private data guard
CN105939192A (en) * 2016-02-29 2016-09-14 杭州迪普科技有限公司 Data encryption method and device
CN107766735A (en) * 2016-08-17 2018-03-06 西安莫贝克半导体科技有限公司 A kind of invisible encryption storage method
CN107818272A (en) * 2016-09-13 2018-03-20 研祥智能科技股份有限公司 Hard disk secure starts and hard disk binding method, device and industrial computer
CN107818273A (en) * 2016-09-14 2018-03-20 深圳中电长城信息安全系统有限公司 Measure the method and system of fail-safe computer equipment
CN106845284A (en) * 2016-12-27 2017-06-13 郑州云海信息技术有限公司 A kind of hardware certificate encryption method of scalable computer system
CN107341416A (en) * 2017-06-15 2017-11-10 深圳市海邻科信息技术有限公司 Hard disk decryption method, equipment and readable storage medium storing program for executing
CN107688756B (en) * 2017-08-08 2019-09-13 深圳市海邻科信息技术有限公司 Hard disk control method, equipment and readable storage medium storing program for executing
CN109145573A (en) * 2018-07-23 2019-01-04 合肥联宝信息技术有限公司 A kind of method and device for protecting data
CN109522757A (en) * 2018-10-22 2019-03-26 郑州云海信息技术有限公司 A kind of server data disk lock collar device, method and server
CN110674522B (en) * 2019-09-27 2022-06-17 苏州浪潮智能科技有限公司 Hard disk encryption method, device, server, system and storage medium
CN115499689B (en) * 2022-09-22 2023-09-19 山东浪潮超高清智能科技有限公司 AndroidTV-based high-security hard disk connection method

Also Published As

Publication number Publication date
CN1673982A (en) 2005-09-28

Similar Documents

Publication Publication Date Title
JP4690600B2 (en) Data protection method
RU2213991C2 (en) Copy protection system and method
US8370647B2 (en) Information processing apparatus, information processing method, and program
US20050021948A1 (en) Secure single drive copy method and apparatus
TWI344640B (en) Systems and methods for secure program execution
CN1286025C (en) Method for realizing hard disk protection
US8694799B2 (en) System and method for protection of content stored in a storage device
WO2007100975A2 (en) System, method, and apparatus for securely providing content viewable on a secure device
CN101488352B (en) Information processing apparatus and information processing method
US20070107063A1 (en) Method and means for writing decryption information to a storage medium, storage medium, method and means for reading data from a storage medium, and computer program
CN1729526A (en) Verifying the integrity of a media key block by storing validation data in the cutting area of media
JP2015035224A (en) Method and system for control of code execution on general purpose computing device and control of code execution in recursive security protocol
JP2004510367A (en) Protection by data chunk address as encryption key
CN101076861A (en) Controlling distribution and use of digital works
US20070162393A1 (en) Apparatus and method for preventing unauthorized copying
CN103988463A (en) Information processing device, information storage device, information processing system, and information processing method, as well as program
CN100364002C (en) Apparatus and method for reading or writing user data
CN1961524A (en) Data inspection device, data inspection method, and data inspection program
KR100695665B1 (en) Apparatus and method for accessing material using an entity locked secure registry
CN101587723B (en) Anti-copy optical storage medium and manufacturing method thereof
US8166302B1 (en) Storage device with traceable watermarked content
CN1914680A (en) Apparatus and method for recording data on and reproducing data from storage medium
JP2008513854A (en) Method, apparatus and recording medium for protecting content
CN1287299C (en) Logic magnetic disk authentication method
US20060136746A1 (en) Security system for preventing unauthorized copying of digital data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20061122