CN1673982A - Method for realizing hard disk protection - Google Patents
Method for realizing hard disk protection Download PDFInfo
- Publication number
- CN1673982A CN1673982A CN 200410007970 CN200410007970A CN1673982A CN 1673982 A CN1673982 A CN 1673982A CN 200410007970 CN200410007970 CN 200410007970 CN 200410007970 A CN200410007970 A CN 200410007970A CN 1673982 A CN1673982 A CN 1673982A
- Authority
- CN
- China
- Prior art keywords
- hard disk
- password
- current
- product
- sequence number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 238000012795 verification Methods 0.000 claims abstract description 17
- 238000003860 storage Methods 0.000 claims description 16
- 230000008569 process Effects 0.000 claims description 13
- 238000004519 manufacturing process Methods 0.000 claims description 8
- 238000013475 authorization Methods 0.000 claims description 3
- 238000012790 confirmation Methods 0.000 abstract 1
- 230000008878 coupling Effects 0.000 description 6
- 238000010168 coupling process Methods 0.000 description 6
- 238000005859 coupling reaction Methods 0.000 description 6
- 238000013461 design Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000012163 sequencing technique Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 241001515806 Stictis Species 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 230000007306 turnover Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The hard disc protecting method includes setting the parameter indicating the verification cipher and parameter expressing safety verification level for the hard disc; and creating the enciphered cipher based on the product sequence number and the original configured device marks by means of cipher creating algorithm and storing the cipher in the hard disc. During accessing the hard disc data, the CPU reads the product sequence number and the device marks and creates the verification cipher by means of the stored cipher creating algorithm, the stored ciphered cipher is read, and the created verification cipher is judged whether to match the read ciphered cipher. If matching, the confirmation is passed for normal application, or else, the current access is exited. The method can raise the safety and reliability of hard disc and facilitate use.
Description
Technical field
The present invention relates to the hard disk management technology, refer to a kind of hard disk method for encryption/decryption of realizing hard disk protection especially.
Background technology
As everyone knows, hard disk (HDD) is used for storing a large number of users data and application program, and the user needs the data thereon of visit storage at any time.For any a hard disk, unless special setting is arranged, usually, user's visit is without any need for authorizing, in other words, be exactly that HDD can give tacit consent to all users and is the power user, it is legal giving tacit consent to all visits, HDD does not carry out authority checking (CA, Certificate Authorization) to the user of request visit.
But, in actual use, in order to guarantee the legitimacy of calling party, also in order to guarantee that data are not arbitrarily copied in the hard disk, arbitrarily do not analyzed and crack by other system, mostly need in the firmware (Firmware) of HDD, carry out special setting, on visit HDD, provide mandate during data to require the user, thereby the current accessed user is carried out authority checking.In simple terms, need the password (Password) of user class exactly, this Password can be preestablished by the user, and can make amendment or wipe.
The principle of work of HD encryption is such: usually, hard disk possesses two kinds of other users of level: User and Master, the pairing safety verification rank of these two kinds of ranks is respectively: High and Maximum, utilize the security password in the system that order Security Set Password is set, can the different safety verification rank of setting harddisk: High or Maximum.
If the level of security of setting harddisk is High, then during the data on the user capture hard disk, system can require the user that User is provided Password, this User Password and the original Password that is stored in the HDD register mate checking, if meet mutually, locking to hard disk is untied by safety unlock command Security Unlock by system, and the user just can conduct interviews to the data on the hard disk.In case the Password in UserPassword that the user provides and the HDD register can't mate, HDD just can't be by the unlocked state, and the user also just can't visit data wherein.But, for level of security is High, the Password rank is the hard disk of User Password, in case the user provides Master Password, after system receives this other Password of Master level, utilize Security Unlock order, the lock-out state of HDD also can be untied by system, that is to say that in the safety verification rank of User level, the Password of Master level also is the locking that can untie HDD.
If the level of security of setting harddisk is Maximum, then during the data on the user capture hard disk, system can require the user that User is provided Password, then User Password that is provided and the Password that is stored in the hard disk register are mated checking, if coupling, then system can order by SecurityUnlock, unties the lock-out state of hard disk, and the user can conduct interviews to the data on the hard disk.If but at the level of security of Maximum, even the user provides Master Password, also can't utilize the SecurityUnlock order to untie the lock-out state of hard disk, this moment, system can utilize secure erase to prepare the locking that HDD is untied in (SECURITYERASE PREPARE) and secure erase unit (SECURITY ERASE UNIT), under the but this state, the data on Password and the HDD all can be wiped free of.
Present hard disk enciphering/deciphering technology can be undertaken or finishes by hardware by software, below just illustrates in the prior art it is how to realize the hard disk enciphering/deciphering for two more typical examples:
A kind of implementation method of HD encryption is disclosed in the patent of CN1464404A, this scheme is divided into encrypted area and non-encrypted area with hard disk, when some confidential datas of storage, can select to be stored in encrypted area, at this moment, can move an encryption software on the backstage of system, the content of data is carried out storing on the hard disk again after the encryption, like this, also must obtain corresponding encryption software and input password even other disabled user has obtained hard disk, could decipher and read the content of encrypted area on the hard disk.This encryption method all needs the user to input password when each encryption or deciphering, and this be feasible, but for the consumer electronics series products, this method will be brought very large problem for PC or purely as the equipment of storage.Because the consumer electronics series products at be general client layer, the execution that needs all application programs is all to user transparent, so, if every execution is once used, just need the user to input password one time, the application of this product will be extremely inconvenient concerning the user, be that the user is unacceptable.
Here, be a notion comparatively widely on the described consumer electronics series products stricti jurise, contain all electronic products, for example MP3, DVD etc. towards the consumption individual.But related consumer electronics series products mainly is meant the consumption personal electric product that utilizes the embedded hardware platform to develop and realize in present patent application, more typically be exactly personal digital video recorder (PVR), digital video recorder (DVR) etc., this class consumption electronic product adopts hardware structures such as Embedded X86, ARM, Xscale, realize concrete consumer application in conjunction with embedded real-time operating system (RTOS), comprise that TV watching, TV programme timed recording, voice playing, photo are browsed, video/DVD plays and function such as recreation.
A kind of hardware encipher scheme is also disclosed in patent CN1248743A, this scheme is in data stream turnover hard disk process, allow current data through a hardware enciphering and deciphering unit, the user inputs password during encryption, system deposits the password of being inputed in the random access memory (RAM) of encryption chip, require user's input validation password during deciphering, again the password of preserving among the password of input and the RAM is mated checking, if the verification passes normal data in the access hard disk then.If this scheme is applied in the consumer electronics series products, the problem that can have two aspects: on the one hand, there be the problem the same with patented claim CN1464404A in this scheme, application program needs the user to input password when each run to verify, this will bring great inconvenience to the consumption electronic product; On the other hand, as everyone knows at the consumer electronics series products, cost is a very important focus, adopts this encipherment scheme to need the extra hardware encryption circuit that a cover is made up of parts such as enciphering/deciphering chip and internal control unit that increases, and this can increase the cost of entire product.Having at present utilizes CPLD/field programmable logic circuit (CPLD/FPGA) to realize the scheme of enciphering/deciphering, the cost of its increase is more than 6 dollars, this user to the consumption electronic product is difficult to accept, and this scheme can increase the complexity of hardware handles.
From above-mentioned several disclosed HD encryption schemes, present hard disk enciphering/deciphering scheme mainly is at PC or pure device design as storage, if it is directly applied in the consumer electronics series products, can there be many obvious defects, very unfavorable to user's use.
Summary of the invention
In view of this, fundamental purpose of the present invention is to provide a kind of method that realizes hard disk protection, can realize the protection to hard disk simply and easily, and is user-friendly when improving the hard disk secure reliability.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of method that realizes hard disk protection, key is, be provided with and indicate parameter and other parameter of expression safety verification level that authentication password need be provided in the hard disk, selected password generating algorithm is according to the device identification of an original configuration device in product ID and this product, generation is to the Crypted password of this product original configuration hard disk, and the Crypted password that is generated is stored in the described original configuration hard disk; When the data on the access hard disk, this method is further comprising the steps of:
A.CPU reads the product ID of current production, and reading the device identification that is used to generate Crypted password in the current production, the password generating algorithm of storing in the current production boot storage area generates authentication password according to current product ID that reads and device identification; Simultaneously, read the Crypted password of storing in the current production hard disk;
Whether the authentication password of b. judging current generation mates with the current Crypted password that reads, if then authorization identifying passes through, normally enters application operating; Otherwise, withdraw from the current accessed flow process.
Wherein, if password does not match among the step b, further comprise the current step that is operating as illegal operation of warning.
In the such scheme, described device identification is a hard disk sequence number or for the CPU sequence number or for the mainboard sequence number.The Crypted password that is generated is stored in the register of hard disk.The CMOS that described boot storage area is a PC or for the CMOS of X86 embedded hardware platform or for not containing the flash memory that is used to store boot in the embedded hardware framework of BIOS.
In the such scheme, describedly indication is set provides the parameter of authentication password to be: the Bit 1 of the 82nd word in the hard disk initialization information is set to 1, and the Bit 1 of the 85th word in the hard disk initialization information is set to 1.Described other parameter of expression safety verification level that is provided with is: the Bit 7 of the 128th word in the hard disk initialization information is set to 0.
In the such scheme, read product ID described in the step a and be: the ad-hoc location from CMOS reads product ID.When described device identification was the hard disk sequence number, reading device was designated described in the step a: read the hard disk sequence number from current hard disk register.
Hard disk protecting method provided by the present invention has following advantage and characteristics:
1) the present invention adopts the device identification of the product ID of unique identification product and certain device of unique identification to construct Crypted password to hard disk jointly, so, encrypting or during password authentification, set encryption and decryption program can be extracted corresponding sign automatically and operate, so, just can be directly in all encryption and decryption programs of running background, the user need not be concerned about password, also need not input password, whole encryption and password authentification process are fully transparent to the user, thereby can improve the ease for use of system applies, also provide great convenience for the user uses.This transparency that the enciphering/deciphering program is carried out for the consumer electronics series products, only is best suited for.
2) owing to adopt two unique signs to form jointly among the present invention, and these two signs can not obtain simultaneously, and password can't utilize software to derive; Simultaneously, the present invention implements on the embedded hardware platform, the encryption and decryption procedure stores is at the storage area relevant with boot, unless the user knows the generating algorithm of password, otherwise at all can't decryption, therefore, method of the present invention can improve the safe reliability of total system, the ease for use of application preferably.
3) because the checking of password is divided into two processes: read two signs by CPU earlier, dynamically generate authentication password according to the password generator program; And then the password that generated and the password of being stored mated checking, and so in case changed hardware platform or done other change, this hard disk can't start, or the data on the hard disk can't normally read, the security of encryption is higher.
4) owing to adopt User and Master two-stage encrypted authentication system, generally finish normal enciphering/deciphering with the User level, and can utilize the password of Master level to untie in-problem hard disk at the product maintenance end, to repair its problem, and can need not destroy the wherein data of storage fully, more convenient operation, practicality, flexible.
Description of drawings
Fig. 1 is the processing flow chart of preset password among the present invention;
Fig. 2 is the realization flow figure of password authentification among the present invention.
Embodiment
Core concept of the present invention is: add password and generate and the password authentification program in the boot storage area, the setting by to specific word in the hard disk firmware and specific bit position realizes the protection to hard disk.Be exactly specifically: the product ID (PSN) of employing unique identification product and the device identification of certain device of unique identification are constructed the Crypted password to hard disk jointly, set the password generating algorithm simultaneously, generate the Crypted password of hard disk by these two signs and the password generating algorithms that set in advance and be stored in the corresponding hard disk; Data on this hard disk of visit, when this hard disk is carried out password authentification, read current PSN and corresponding devices sign, and the password generating algorithm that has by current device generates current authentication password, password that is generated and the password of storing are in advance compared, if coupling, then checking is passed through, allow the data on the normal access hard disk of user, otherwise visit that will refusing user's.
Here, described product ID is meant the product ID that carries out hard disk that enciphering/deciphering the handles equipment under original; Described device identification is meant the sign that belongs to a device under the original device with the hard disk that carries out the enciphering/deciphering processing, this device identification can directly be the hard disk sequence number (HSN) of hard disk self, also can be the sequence number of CPU, can also be the sequence number of mainboard.In a word, there is the sequence number of uniquely identified device can be used as device identification.Give an example, handle if the hard disk among the consumer electronics product PVR is carried out enciphering/deciphering, so, PSN just is meant the product ID of PVR, device identification can be the sequence number of hard disk self among the PVR, or the sequence number of CPU among the PVR, or the sequence number or the like of mainboard among the PVR.
Hard disk protecting method of the present invention can be used for general PC or embedded consumer electronics series products; the top password of mentioning generates and the password authentification program generally is placed in the storage area relevant with system bootstrap routine; can directly be stored in the boot storage area, or be stored in when system start-up detects and to have access to storage area.Be exactly specifically,, cooperate, password generation and proving program can be stored among the CMOS, to carry out the coupling checking of password by BIOS for general PC; For the embedded hardware platform of X86, also password generation and proving program can be stored among the CMOS, to carry out the coupling checking of password; For other embedded hardware framework that does not need BIOS, for example ARM hardware structure etc. then can generate password with proving program and be stored in the Flash that is used for storing boot, to carry out the coupling checking of password.
Be example only below, specify the implementation procedure of the inventive method, adopt the implementation procedure of other device identification identical with present embodiment with principle to adopt PSN and HSN to construct the HD encryption password jointly.In the present embodiment, adopt the embedded hardware platform of X86, password generates and proving program sets in advance and is stored among the CMOS.
Because at each consumer electronics series products, for example PVR only has a unique product level sequence number (Product SN), is called PSN, this PSN is a unique identification of distinguishing every equipment.Equally, at every hard disk, also all have only a unique hard disk sequence number (HDD SN), be called HSN, this HSN is the unique identification that separates every hard disk.The characteristics that the present invention utilizes these two unique mark just and easily obtains; because equipment or device serial number are directly to read, do not need the user to participate in importing, so; just can realize complete transparent encryption and password authentification process, and then realize protection hard disk to the user.
Method of the present invention mainly comprises two parts: default flow process of password and password authentification flow process.Wherein, the default flow process of password just is meant and utilizes PSN and HSN to construct the process of password and storage jointly.Referring to shown in Figure 1, the password preset procedures among the present invention specifically may further comprise the steps:
Shown in table one, table two, wherein, table one is the description and the implication thereof of the 82nd word bit and the 85th word bit among the IDENTIFY DEVICE, and table two is the description and the implication thereof of the 128th word bit among the IDENTIFY DEVICE.So, concrete setting is exactly: the Bit 1 that utilizes operation commands set that the 82nd word among the IDENTIFYDEVICE is set is 1, Bit 1 with the 85th word among the IDENTIFY DEVICE is changed to 1 simultaneously, so, provides authentication password in the time of can requiring to attempt data on the access hard disk in system.In addition, also need to set the safety verification rank of this password, concrete operations are: the Bit 7 of the 128th word among the IDENTIFY DEVICE is set to 0, is the User level with the rank of representing required password.
??82 | ??M | ??X ??F ??F ??F ??X ??F ??F ??F ??F ??F ??F ??F ??F ??F ??F ??F | Command set supported 15 Obsolete 14 1=NOP Command Supported 13 1=READ BUFFER command supported 12 1=WRITE BUFFER command supported 11 Obsolete 10 1=Host Protected Area feature set supported 9 1=DEVICE RESET command supported 8 1=SERVICE interrupt supported 7 1=release interrupt supported 6 1=look-ahead supported 5 1=write cache supported 4 Shall be cleared to zero 3 1=supports Power Management feature set 2 1=supports Removable Media feature set 1 1=supports Security Mode feature set (hard disk is supported the setting of safety detection pattern) 0 1=supports SMART feature set |
??85 | ??M | ??X ??F ??F ??F ??X ??F ??F ??F ??F ??F ??F ??F ??F ??F ??F ??F | Command set/feature enabled 15 Obsolete 14 1=NOP Command Enabled 13 1=READ BUFFER command Enabled 12 1=WRITE BUFFER command Enabled 11 Obsolete 10 1=Host Protected Area feature set Enabled 9 1=DEVICE RESET command Enabled 8 1=SERVICE interrupt Enabled 7 1=release interrupt Enabled 6 1=look-ahead Enabled 5 1=write cache Enabled 4 Shall be cleared to zero 3 1=Power Management feature set Enabled 2 1=Removable Media feature set Enabled 1 1=Security Mode feature set enabled (the safety verification pattern arranges to activate and comes into force) 0 1=SMART feature set Enabled |
Table one
????89 ????90 ????92 ????128 | ????O ????O ????O ????O | ????F ????F ????V ????F ????V ????F ????F ????V ????V ????V ????V ????F | Time required for security erase unit completion Time required for Enhanced security erase completion Master Password Revision Code Security Status 15-9 Reserved 8 Security Level 0=High; 1=Maximum (level of security High respective value 0, the other Maximum respective value 1 of safe level 7-6 Reserved) 5 1=Enhanced security erase supported 4 1=Security count expired 3 1=Security frozen, 2 1=Security locked (hard disk is in the encryption safe state) 1 1=Security enabled (encryption safe activates effectively) 0 1=Security supported (hard disk support safety encipher) |
Table two
Here, reading PSN specifically is the special bit that CPU reads indication equipment sequence number among the CMOS; Reading HSN specifically is that CPU reads the hard disk sequence number of storing in the hard disk register; Described password generating algorithm can be selected any existing standard key schedule for use, and such as MD5 algorithm etc., PSN and HSN are just as the input parameter of selected key schedule.
Above-mentioned steps 101~103 and step 104~106 fully can parallel work-flows, do not have the branch of sequencing, and same, step 101,102,103 3 steps also can be carried out simultaneously, there is no the branch of sequencing.
Password authentification process of the present invention specifically may further comprise the steps as shown in Figure 2:
The password of storing among step 201~202:CPU operation CMOS generates and the password authentification program, reads the PSN of current device and the HSN of hard disk that current device disposes simultaneously automatically, generates a password by the password generating algorithm according to current PSN that reads and HSN;
Step 203: read that store in the hard disk register, default Crypted password;
Above-mentioned steps 201~202 and step 203 fully can parallel work-flows, do not have the branch of sequencing.
After adopting method of the present invention, at every turn after device power-up starts, hard disk all can require system to carry out the checking of password coupling, like this, the product mark PSN that CPU will read the sign HSN of hard disk automatically and be stored in the CMOS specific position, afterwards, according to the password generating algorithm of moving among the BIOS, CPU generates authentication password, is made the real-time verification on backstage by BIOS whereabouts hard disk; In case the password in password that is generated and the hard disk register can mate, the lock-out state of hard disk just can be untied by system.Because the execution of the generation of authentication password and concrete checking is all carried out on the backstage, so this enciphering/deciphering scheme is fully transparent to the user.
Like this, if the user takes certain hard disk in the system in addition of own original affiliated system, to attempt to copy the data on it or to carry out system and crack when analyzing, because hard disk requirement system provides authentication password, although the HSN that reads hard disk that CPU can be correct, but owing to do not store corresponding PSN and password authentification generator program among the BIOS in other system, so the data in the hard disk at all can't be accessed.So, both can guarantee that the television content of being recorded was not arbitrarily derived, also guarantee simultaneously the analysis that is not cracked of the system design part in the hard disk.
When the used hard disk of user or the system failure need be returned maintenance, because the PSN difference of every product, factory can't utilize User level password to mate checking, but as can be known according to the encryption principle of hard disk, hard disk exists two-stage safety verification: Master and User, therefore, producer can utilize special Master level password generator program, generate " power user " password of Master level, cooperate Security Unlock to order the locking of untiing, like this, both can untie locking every hard disk to hard disk, concrete reparation can be carried out again, also the content of storing in the hard disk can be do not damaged simultaneously.
Adopt method of the present invention, can protect the data in the hard disk arbitrarily not copied and propagate, the system in the hard disk of yet guaranteeing is not simultaneously taken to be analyzed in other system and is cracked.Such scheme is mainly used in the consumer electronics series products, for example: PVR﹠amp; Among the DMR (Digital MediaRecorder), be the video file format of MPEG2 and store on the hard disk because the main function of this series products is exactly the recording TV program content, so, because the content of being recorded is to provide and have the property in copyright of its content by cable television provider (Cable Service Provider), so require this series products cannot arbitrarily propagate the content that it is recorded; Because this series products is embedded real-time operating system (RTOS) in conjunction with the embedded hard disc platform, develop as X86 or XScale etc. simultaneously, the developer does not wish that its system design part is cracked and imitates by others' analysis yet.
Simultaneously; owing to be at the consumer electronics series products; also need to take into full account the comfort level of its ease for use, user's use; so password generation and password authentification all are arranged at running background; transparent fully to the user; only occur with the illegal copies hard disc data or attempt in violated system to analyze when cracking the behavior of hard-disk system design architecture, the safeguard measure of hard disk just can come into force, and normal the use is the imperceptible hard disk protection that exists.
The above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.
Claims (9)
1, a kind of method that realizes hard disk protection, it is characterized in that, be provided with and indicate parameter and other parameter of expression safety verification level that authentication password need be provided in the hard disk, selected password generating algorithm is according to the device identification of an original configuration device in product ID and this product, generation is to the Crypted password of this product original configuration hard disk, and the Crypted password that is generated is stored in the described original configuration hard disk; When the data on the access hard disk, this method is further comprising the steps of:
A.CPU reads the product ID of current production, and reading the device identification that is used to generate Crypted password in the current production, the password generating algorithm of storing in the current production boot storage area generates authentication password according to current product ID that reads and device identification; Simultaneously, read the Crypted password of storing in the current production hard disk;
Whether the authentication password of b. judging current generation mates with the current Crypted password that reads, if then authorization identifying passes through, normally enters application operating; Otherwise, withdraw from the current accessed flow process.
2, method according to claim 1 is characterized in that, if password does not match among the step b, further comprises the current step that is operating as illegal operation of warning.
3, method according to claim 1 is characterized in that, described device identification is a hard disk sequence number or for the CPU sequence number or for the mainboard sequence number.
4, according to claim 1,2 or 3 described methods, it is characterized in that the Crypted password that is generated is stored in the register of hard disk.
5, according to claim 1,2 or 3 described methods, it is characterized in that the CMOS that described boot storage area is a PC or for the CMOS of X86 embedded hardware platform or for not containing the flash memory that is used to store boot in the embedded hardware framework of BIOS.
6, according to claim 1,2 or 3 described methods, it is characterized in that, describedly indication is set provides the parameter of authentication password to be: the Bit 1 of the 82nd word in the hard disk initialization information is set to 1, and the Bit 1 of the 85th word in the hard disk initialization information is set to 1.
According to claim 1,2 or 3 described methods, it is characterized in that 7, described other parameter of expression safety verification level that is provided with is: the Bit 7 of the 128th word in the hard disk initialization information is set to 0.
8, method according to claim 5 is characterized in that, reads product ID described in the step a to be: the ad-hoc location from CMOS reads product ID.
9, method according to claim 3 is characterized in that, when described device identification was the hard disk sequence number, reading device was designated described in the step a: read the hard disk sequence number from current hard disk register.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200410007970 CN1286025C (en) | 2004-03-23 | 2004-03-23 | Method for realizing hard disk protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200410007970 CN1286025C (en) | 2004-03-23 | 2004-03-23 | Method for realizing hard disk protection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1673982A true CN1673982A (en) | 2005-09-28 |
CN1286025C CN1286025C (en) | 2006-11-22 |
Family
ID=35046538
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200410007970 Expired - Lifetime CN1286025C (en) | 2004-03-23 | 2004-03-23 | Method for realizing hard disk protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1286025C (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100262770A1 (en) * | 2009-04-14 | 2010-10-14 | Wen-Chuan Chao | Method for Enhancing Information Security in a Computer System |
CN105095788A (en) * | 2015-06-30 | 2015-11-25 | 北京奇虎科技有限公司 | Method, device and system for private data protection |
CN105939192A (en) * | 2016-02-29 | 2016-09-14 | 杭州迪普科技有限公司 | Data encryption method and device |
CN106845284A (en) * | 2016-12-27 | 2017-06-13 | 郑州云海信息技术有限公司 | A kind of hardware certificate encryption method of scalable computer system |
CN107341416A (en) * | 2017-06-15 | 2017-11-10 | 深圳市海邻科信息技术有限公司 | Hard disk decryption method, equipment and readable storage medium storing program for executing |
CN107688756A (en) * | 2017-08-08 | 2018-02-13 | 深圳市海邻科信息技术有限公司 | Hard disk control method, equipment and readable storage medium storing program for executing |
CN107766735A (en) * | 2016-08-17 | 2018-03-06 | 西安莫贝克半导体科技有限公司 | A kind of invisible encryption storage method |
CN107818273A (en) * | 2016-09-14 | 2018-03-20 | 深圳中电长城信息安全系统有限公司 | Measure the method and system of fail-safe computer equipment |
CN107818272A (en) * | 2016-09-13 | 2018-03-20 | 研祥智能科技股份有限公司 | Hard disk secure starts and hard disk binding method, device and industrial computer |
CN109145573A (en) * | 2018-07-23 | 2019-01-04 | 合肥联宝信息技术有限公司 | A kind of method and device for protecting data |
CN109522757A (en) * | 2018-10-22 | 2019-03-26 | 郑州云海信息技术有限公司 | A kind of server data disk lock collar device, method and server |
CN110674522A (en) * | 2019-09-27 | 2020-01-10 | 苏州浪潮智能科技有限公司 | Hard disk encryption method, device, server, system and storage medium |
CN115499689A (en) * | 2022-09-22 | 2022-12-20 | 山东浪潮超高清智能科技有限公司 | High-security hard disk connection method based on android TV |
-
2004
- 2004-03-23 CN CN 200410007970 patent/CN1286025C/en not_active Expired - Lifetime
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100262770A1 (en) * | 2009-04-14 | 2010-10-14 | Wen-Chuan Chao | Method for Enhancing Information Security in a Computer System |
CN105095788A (en) * | 2015-06-30 | 2015-11-25 | 北京奇虎科技有限公司 | Method, device and system for private data protection |
CN105095788B (en) * | 2015-06-30 | 2018-06-29 | 北京奇虎科技有限公司 | The method, apparatus and system of private data guard |
CN105939192A (en) * | 2016-02-29 | 2016-09-14 | 杭州迪普科技有限公司 | Data encryption method and device |
CN107766735A (en) * | 2016-08-17 | 2018-03-06 | 西安莫贝克半导体科技有限公司 | A kind of invisible encryption storage method |
CN107818272A (en) * | 2016-09-13 | 2018-03-20 | 研祥智能科技股份有限公司 | Hard disk secure starts and hard disk binding method, device and industrial computer |
CN107818273A (en) * | 2016-09-14 | 2018-03-20 | 深圳中电长城信息安全系统有限公司 | Measure the method and system of fail-safe computer equipment |
CN106845284A (en) * | 2016-12-27 | 2017-06-13 | 郑州云海信息技术有限公司 | A kind of hardware certificate encryption method of scalable computer system |
CN107341416A (en) * | 2017-06-15 | 2017-11-10 | 深圳市海邻科信息技术有限公司 | Hard disk decryption method, equipment and readable storage medium storing program for executing |
CN107688756A (en) * | 2017-08-08 | 2018-02-13 | 深圳市海邻科信息技术有限公司 | Hard disk control method, equipment and readable storage medium storing program for executing |
CN107688756B (en) * | 2017-08-08 | 2019-09-13 | 深圳市海邻科信息技术有限公司 | Hard disk control method, equipment and readable storage medium storing program for executing |
CN109145573A (en) * | 2018-07-23 | 2019-01-04 | 合肥联宝信息技术有限公司 | A kind of method and device for protecting data |
CN109522757A (en) * | 2018-10-22 | 2019-03-26 | 郑州云海信息技术有限公司 | A kind of server data disk lock collar device, method and server |
CN110674522A (en) * | 2019-09-27 | 2020-01-10 | 苏州浪潮智能科技有限公司 | Hard disk encryption method, device, server, system and storage medium |
CN115499689A (en) * | 2022-09-22 | 2022-12-20 | 山东浪潮超高清智能科技有限公司 | High-security hard disk connection method based on android TV |
CN115499689B (en) * | 2022-09-22 | 2023-09-19 | 山东浪潮超高清智能科技有限公司 | AndroidTV-based high-security hard disk connection method |
Also Published As
Publication number | Publication date |
---|---|
CN1286025C (en) | 2006-11-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4690600B2 (en) | Data protection method | |
US9607131B2 (en) | Secure and efficient content screening in a networked environment | |
US8370647B2 (en) | Information processing apparatus, information processing method, and program | |
JP5636371B2 (en) | Method and system for code execution control in a general purpose computing device and code execution control in a recursive security protocol | |
US20050021948A1 (en) | Secure single drive copy method and apparatus | |
TWI344640B (en) | Systems and methods for secure program execution | |
US20070226412A1 (en) | Storage device, controller for storage device, and storage device control method | |
US8694799B2 (en) | System and method for protection of content stored in a storage device | |
US20070107063A1 (en) | Method and means for writing decryption information to a storage medium, storage medium, method and means for reading data from a storage medium, and computer program | |
CN1286025C (en) | Method for realizing hard disk protection | |
CN101488352B (en) | Information processing apparatus and information processing method | |
WO2011152065A1 (en) | Controller, control method, computer program, program recording medium, recording apparatus, and method of manufacturing recording apparatus | |
US20090063867A1 (en) | Method, System and Computer Program Product for Preventing Execution of Software Without a Dynamically Generated Key | |
JP2004510367A (en) | Protection by data chunk address as encryption key | |
CN101076861A (en) | Controlling distribution and use of digital works | |
CN1961524A (en) | Data inspection device, data inspection method, and data inspection program | |
CN103988463A (en) | Information processing device, information storage device, information processing system, and information processing method, as well as program | |
US20070162393A1 (en) | Apparatus and method for preventing unauthorized copying | |
CN100364002C (en) | Apparatus and method for reading or writing user data | |
KR101405915B1 (en) | Method for writing data by encryption and reading the data thereof | |
KR100695665B1 (en) | Apparatus and method for accessing material using an entity locked secure registry | |
CN101587723B (en) | Anti-copy optical storage medium and manufacturing method thereof | |
US20120066513A1 (en) | Method and apparatus for authenticating a non-volatile memory device | |
CN1914680A (en) | Apparatus and method for recording data on and reproducing data from storage medium | |
CN1287299C (en) | Logic magnetic disk authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CX01 | Expiry of patent term | ||
CX01 | Expiry of patent term |
Granted publication date: 20061122 |