TWI741271B - Data protection method and associated storage device - Google Patents

Data protection method and associated storage device Download PDF

Info

Publication number
TWI741271B
TWI741271B TW108110224A TW108110224A TWI741271B TW I741271 B TWI741271 B TW I741271B TW 108110224 A TW108110224 A TW 108110224A TW 108110224 A TW108110224 A TW 108110224A TW I741271 B TWI741271 B TW I741271B
Authority
TW
Taiwan
Prior art keywords
storage device
host
data
data protection
storage unit
Prior art date
Application number
TW108110224A
Other languages
Chinese (zh)
Other versions
TW202014923A (en
Inventor
林世陵
Original Assignee
智微科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 智微科技股份有限公司 filed Critical 智微科技股份有限公司
Priority to US16/589,162 priority Critical patent/US11144217B2/en
Publication of TW202014923A publication Critical patent/TW202014923A/en
Application granted granted Critical
Publication of TWI741271B publication Critical patent/TWI741271B/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/565Static detection by checking file integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a data protection method and associated storage device. The data protection method includes:(A): during an initial period after the storage device is connected to a host, performing detection upon the storage device, and determining whether the storage device needs to be performed with data protection; (B): when it is determined that the storage device needs to be performed with data protection in Step (A), modifying a predetermined writing destination that the host writes to a storage unit within the storage device, in order to make data from the host be written to another writing destination of the storage unit instead of the predetermined writing destination; or writing the data from the host into an inner memory or an inner register of a control chip or a bridge chip of the storage device, rather than writing the data from the host into the storage unit; and (C): reporting to the host that the writing operation is completed.

Description

資料保護方法以及相關儲存裝置 Data protection method and related storage device

綜上所述,本發明的目的在於提供一個方法,能夠於漏洞仍存在或是惡意程式尚未被清除的情況下,在外接式儲存裝置掛載上電腦主機的一段時間之內,保護其內的資料不被任意刪除、修改及破壞。 In summary, the purpose of the present invention is to provide a method that can protect the external storage device within a period of time when the external storage device is mounted on the host computer when the vulnerability still exists or the malicious program has not been cleared. The data will not be arbitrarily deleted, modified or destroyed.

附帶一提,“一段時間之內”係指從使用者將外接式儲存裝置掛載上電腦主機開始,到電腦主機辨認完成外接式儲存裝置、並將儲存裝置顯示在電腦主機上、讓使用者可以開始進行存取後結束的這段時間。此外,“掛載”一詞包含將裝置插入電腦主機、或是將裝置從電腦主機上卸載之後,再掛載上去。所謂“卸載之後,再掛載上去”可包含軟體動作以及硬體動作,其中軟體動作是指裝置並沒有實際從電腦主機上拔除,而硬體動作則是指裝置經過實際被拔除、再插回電腦主機。 Incidentally, "within a certain period of time" refers to the time when the user mounts the external storage device on the host computer, until the host computer recognizes the external storage device and displays the storage device on the host computer to allow the user The period of time that ends after the access can be started. In addition, the term "mounting" includes inserting the device into the host computer, or unmounting the device from the host computer, and then mounting it. The so-called "after unmounting, then mounting" can include software actions and hardware actions. The software action means that the device is not actually unplugged from the host computer, while the hardware action means that the device is actually unplugged and then plugged back in. Computer host.

由於便於攜帶以及插拔,外接式儲存裝置(諸如外接式硬碟、快閃記憶體裝置等)已在市面上極為盛行,而將照片、工作檔案存放在外接式儲存裝置內是目前常見的應用。在一般的認知上,在裝置連接上電腦主機之後,倘若使用者沒有再對電腦主機做進一步的操作,其資料應該不會被任意刪除、修 改及破壞。然而,相關實際研究顯示,目前遍及全世界的電腦主機存在著讓外接式儲存裝置的資料的遺失的潛在風險,這是因為受到系統漏洞或惡意程式的影響而導致電腦的作業系統本身有可能對外接式儲存裝置內的資料進行複寫或是刪除的動作,且即便使用者只是剛將其外接式儲存裝置連接上電腦主機一段時間,其儲存資料就有可能突然間毀損、消失。舉例來說,使用者在透過USB連接線將硬碟或隨身碟接上電腦的USB插槽後,在數秒後,螢幕畫面上會彈出“您的裝置已可使用”的視窗,然而當使用者看到此訊息時或許已經太遲了,在這短暫的時間儲存裝置就有可能遭到改寫。 Because of its ease of portability and plug-in, external storage devices (such as external hard drives, flash memory devices, etc.) have become extremely popular on the market, and storing photos and work files in external storage devices is currently a common application . Generally speaking, after the device is connected to the host computer, if the user does not perform further operations on the host computer, the data should not be arbitrarily deleted or repaired. Change and destroy. However, relevant actual research shows that the current computer hosts all over the world have the potential risk of data loss from external storage devices. This is due to the impact of system vulnerabilities or malicious programs, which may cause the computer's operating system itself to be affected. The data in the external storage device is copied or deleted, and even if the user just connects the external storage device to the computer host for a period of time, the stored data may suddenly be damaged or disappear. For example, after the user connects the hard disk or flash drive to the USB slot of the computer via the USB cable, a few seconds later, a window "Your device is ready to use" will pop up on the screen. However, when the user It may be too late when you see this message, and the storage device may be overwritten in this short period of time.

進一步來說,惡意程式會在外接式儲存裝置掛載上電腦主機後的一段時間,對儲存裝置內的檔案系統(file system)進行不正常的單數或複數寫入動作,進而導致資料的毀損或者消失。 Furthermore, the malicious program will perform abnormal singular or plural write operations to the file system in the storage device for a period of time after the external storage device is mounted on the host computer, thereby causing data damage or disappear.

電腦主機系統廠商通常缺乏意願去解決這些潛在的漏洞,且即便在網站上提供系統更新檔(或稱系統補丁)來降低特定惡意程式所造成的傷害,使用者往往不會主動去下載這些更新檔,且製造廠商難以一次性地解決所有可能的潛在風險。製造廠商往往建議使用者將資料備份到雲端,但此作法並非沒有缺點,且使用外接式儲存裝置仍有其無可取代的方便性 Computer host system vendors usually lack the willingness to solve these potential vulnerabilities, and even if they provide system update files (or system patches) on the website to reduce the damage caused by specific malicious programs, users often do not actively download these update files. , And it is difficult for manufacturers to solve all possible potential risks at once. Manufacturers often recommend users to back up data to the cloud, but this approach is not without its shortcomings, and the use of external storage devices still has its irreplaceable convenience

有鑑於以上問題,本發明的目的在於提供一個方法,能夠於漏洞仍存在或是惡意程式尚未被清除的情況下,在外接式儲存裝置掛載上電腦主機的一段時間之內,保護其內的資料不被任意刪除、修改及破壞。確切來說,本發明可透過更新外接式儲存裝置的韌體來實現這個上述目的。 In view of the above problems, the purpose of the present invention is to provide a method that can protect the external storage device within a period of time when the external storage device is mounted on the host computer when the vulnerability still exists or the malicious program has not been cleared. The data will not be arbitrarily deleted, modified or destroyed. Specifically, the present invention can achieve this above-mentioned purpose by updating the firmware of the external storage device.

本發明的一實施例提供一種資料保護方法,用於提供安全性防護。 該資料保護方法包含以下步驟:(A):於一儲存裝置連接上一主機的初始時段,對該儲存裝置進行偵測,且判斷該儲存裝置是否需要進行資料保護;(B):當步驟A判斷該儲存裝置需要進行資料保護時,更改該主機對該儲存裝置的一預定寫入位置,以使來自該主機的資料寫入到不同於該預定寫入位置的另一寫入位置;或將來自該主機的資料寫入到該儲存裝置的控制晶片或橋接晶片的內部記憶體或內部暫存器,而不寫入到該儲存單元;以及(C):回報該主機系統寫入操作已完成。 An embodiment of the present invention provides a data protection method for providing security protection. The data protection method includes the following steps: (A): During the initial period when a storage device is connected to a host, the storage device is detected and whether the storage device needs to be protected; (B): Step A When determining that the storage device needs data protection, change a predetermined writing position of the host to the storage device so that the data from the host is written to another writing position different from the predetermined writing position; or The data from the host is written to the internal memory or internal register of the control chip or bridge chip of the storage device, but not to the storage unit; and (C): report that the host system write operation has been completed .

本發明的一實施例提供一種儲存裝置,用以資料處理並且提供安全性防護,該儲存裝置包含一儲存單元以及一處理器,其中該處理器用以執行以下步驟:(A):於該儲存裝置連接上一主機的初始時段,對該儲存裝置進行偵測,且判斷該儲存裝置是否需要進行資料保護;(B):當步驟A判斷該儲存裝置需要進行資料保護時,更改該主機對該儲存單元的一預定寫入位置,以使來自該主機的資料寫入到該儲存單元上不同於該預定寫入位置的另一寫入位置;或將來自該主機的資料寫入到該儲存裝置的控制晶片或橋接晶片的內部記憶體或內部暫存器,而不寫入到該儲存單元;以及(C):回報該主機系統寫入操作已完成。 An embodiment of the present invention provides a storage device for data processing and security protection. The storage device includes a storage unit and a processor, wherein the processor is used to perform the following steps: (A): in the storage device During the initial period of connecting to the previous host, detect the storage device and determine whether the storage device needs data protection; (B): When step A determines that the storage device needs data protection, change the host to the storage A predetermined writing position of the unit, so that the data from the host is written to another writing position on the storage unit that is different from the predetermined writing position; or the data from the host is written to the storage device The internal memory or internal register of the control chip or the bridge chip is not written to the storage unit; and (C): report the completion of the write operation of the host system.

綜上所述,本發明能夠在外接硬碟剛連上電腦的這段等待時間提供保護來防止資料遭到刪除、竄改。此外,在電腦主機系統將指令及資料傳輸到儲存單元的過程當中,本發明係利用控制器來過濾特定的指令與資料,故可大幅降低資料被攻擊的可能性,進而保護儲存裝置內的資料在這段時間之內不被惡意的動作破壞。 In summary, the present invention can provide protection to prevent data from being deleted and tampered during the waiting time when the external hard disk is just connected to the computer. In addition, in the process of the computer host system transmitting commands and data to the storage unit, the present invention uses a controller to filter specific commands and data, so the possibility of data being attacked can be greatly reduced, thereby protecting the data in the storage device. Not be destroyed by malicious actions during this time.

100:儲存裝置 100: storage device

110:控制器 110: Controller

120:儲存單元 120: storage unit

112:處理器 112: processor

112M:記憶體 112M: memory

112C:程式碼 112C: Code

114:控制邏輯 114: Control logic

118:介面邏輯 118: Interface Logic

119:介面邏輯II 119: Interface Logic II

130:主裝置 130: main device

200:方法 200: method

202~218:步驟 202~218: Steps

第1圖為依據本發明一實施例之一種儲存裝置的示意圖。 FIG. 1 is a schematic diagram of a storage device according to an embodiment of the invention.

第2圖係為根據本發明一實施例的應用於儲存裝置的資料保護方法的流程圖。 FIG. 2 is a flowchart of a data protection method applied to a storage device according to an embodiment of the invention.

在說明書及後續的申請專利範圍當中使用了某些詞彙來指稱特定的元件。所屬領域中具有通常知識者應可理解,硬體製造商可能會用不同的名詞來稱呼同樣的元件。本說明書及後續的申請專利範圍並不以名稱的差異來作為區分元件的方式,而是以元件在功能上的差異來作為區分的準則。在通篇說明書及後續的請求項當中所提及的“包含”係為一開放式的用語,故應解釋成“包含但不限定於”。另外,“耦接”一詞在此係包含任何直接及間接的電氣連接手段。因此,若文中描述一第一裝置耦接於一第二裝置,則代表該第一裝置可直接電氣連接於該第二裝置,或透過其他裝置或連接手段間接地電氣連接至該第二裝置。 In the specification and subsequent patent applications, certain words are used to refer to specific elements. Those with ordinary knowledge in the field should understand that hardware manufacturers may use different terms to refer to the same components. The scope of this specification and subsequent patent applications does not use differences in names as a way to distinguish elements, but uses differences in functions as a criterion for distinguishing. The "including" mentioned in the entire specification and the subsequent claims is an open term, so it should be interpreted as "including but not limited to". In addition, the term "coupled" herein includes any direct and indirect electrical connection means. Therefore, if it is described that a first device is coupled to a second device, it means that the first device can be directly electrically connected to the second device, or indirectly electrically connected to the second device through other devices or connection means.

為了解決外接式儲存裝置剛連接上主機的這段時間內,能夠防止惡意程式對外接式儲存裝置進行修改、破壞,本發明提出了一種新穎的作法保護其內的資料不被任意刪除、修改及破壞。 In order to prevent malicious programs from modifying and destroying the external storage device during the period when the external storage device is just connected to the host, the present invention proposes a novel method to protect the data from being arbitrarily deleted, modified, and destroy.

請參考第1圖,第1圖為依據本發明一實施例之一種儲存裝置100的示意圖。儲存裝置100包含有一儲存單元120以及一控制器110,且控制器110係用來存取儲存單元120。依據本實施例,控制器110包含一處理器112、一記憶體 112M、一控制邏輯114、一介面邏輯118以及一介面邏輯II 119。記憶體112M係用來儲存一程式碼112C,而處理器112則用來執行程式碼112C以控制對儲存單元120之存取(Access)。控制邏輯114或介面邏輯II 119用來執行對於儲存單元120的控制。請注意,第1圖中的諸多元件僅為舉例之目的,並非用以限定本發明的範疇,只要能實質上維持相關功能的運作,當中一些元件可予以置換或省略。 Please refer to FIG. 1, which is a schematic diagram of a storage device 100 according to an embodiment of the present invention. The storage device 100 includes a storage unit 120 and a controller 110, and the controller 110 is used to access the storage unit 120. According to this embodiment, the controller 110 includes a processor 112 and a memory 112M, a control logic 114, an interface logic 118, and an interface logic II 119. The memory 112M is used to store a program code 112C, and the processor 112 is used to execute the program code 112C to control access to the storage unit 120. The control logic 114 or the interface logic II 119 is used to control the storage unit 120. Please note that many elements in Figure 1 are for illustrative purposes only, and are not intended to limit the scope of the present invention. As long as the relevant functions can be substantially maintained, some elements can be replaced or omitted.

在一實施例中,儲存裝置100可以是可攜式記憶裝置(例如:符合SD/MMC、CF、MS、XD標準之記憶模組),且主機諸如主裝置130為一可與記憶裝置連接的電子裝置,例如手機、筆記型電腦、桌上型電腦...等等。而在另一實施例中,儲存裝置100可以是固態硬碟或符合通用快閃記憶體儲存(Universal Flash Storage,UFS)或嵌入式多媒體記憶卡(Embedded Multi Media Card,EMMC)規格之嵌入式儲存裝置,以設置在一電子裝置中,例如設置在手機、筆記型電腦、桌上型電腦之中,而此時主裝置130可以是該電子裝置的一處理器。 In one embodiment, the storage device 100 may be a portable memory device (for example, a memory module that conforms to SD/MMC, CF, MS, and XD standards), and the host such as the main device 130 is a device that can be connected to the memory device Electronic devices, such as mobile phones, laptops, desktop computers... etc. In another embodiment, the storage device 100 may be a solid state drive or an embedded storage conforming to Universal Flash Storage (UFS) or Embedded Multi Media Card (EMMC) specifications. The device may be installed in an electronic device, such as a mobile phone, a notebook computer, or a desktop computer. In this case, the main device 130 may be a processor of the electronic device.

更進一步而言,儲存裝置100可實作為一硬碟外接盒,例如2.5吋或3.5吋硬碟外接盒。當儲存裝置100為2.5吋硬碟外接盒時,可由主裝置130進行供電;當儲存裝置100為3.5吋硬碟外接盒時,可另透過外接電源來供電。儲存裝置100包含控制器110以及儲存單元120,其中控制器110包含:介面邏輯118,用以進行與主裝置130之間的傳輸;處理器112,用以執行各種相關操作;以及控制邏輯114或介面邏輯II 119,用以進行與儲存單元120之間的傳輸。 Furthermore, the storage device 100 can be implemented as a hard disk external box, such as a 2.5-inch or 3.5-inch hard disk external box. When the storage device 100 is a 2.5-inch hard disk external box, it can be powered by the main device 130; when the storage device 100 is a 3.5-inch hard disk external box, it can be powered by an external power supply. The storage device 100 includes a controller 110 and a storage unit 120. The controller 110 includes: an interface logic 118 for transmitting with the host device 130; a processor 112 for performing various related operations; and a control logic 114 or The interface logic II 119 is used to communicate with the storage unit 120.

請參考第2圖,第2圖係為根據本發明一實施例的應用於儲存裝置的資料保護方法200的流程圖。請注意,假若可獲得實質上相同的結果,則這些步驟並不一定要遵照第2圖所示的執行次序來執行,且這些步驟之間亦不排除插入 其他步驟的可能性。第2圖所示之方法可被第1圖所示之儲存裝置100所採用,並可簡單歸納如下:步驟202:首先,將外接式儲存裝置(例如儲存裝置100)掛載上主機,例如透過USB連接線、USB插槽等設計,但本發明並不限定外接裝置式只能是透過USB的方法連接到主機端。此外,主機可以內建有讀卡機(或是外接讀卡機亦可),以供插入記憶卡。 Please refer to FIG. 2, which is a flowchart of a data protection method 200 applied to a storage device according to an embodiment of the present invention. Please note that if substantially the same results can be obtained, these steps do not necessarily have to be executed in the order of execution shown in Figure 2, and the insertion between these steps is not excluded. Possibility of other steps. The method shown in Figure 2 can be used by the storage device 100 shown in Figure 1, and can be briefly summarized as follows: Step 202: First, mount an external storage device (such as the storage device 100) to the host, for example, through The USB cable, USB slot, etc. are designed, but the present invention does not limit the type of external device to be connected to the host through the USB method. In addition, the host can have a built-in card reader (or an external card reader can also be) for inserting memory cards.

步驟204:控制器讀回儲存單元(例如儲存單元120)上的檔案系統(file system),並收集檔案系統內的相關資訊。 Step 204: The controller reads back the file system on the storage unit (such as the storage unit 120), and collects relevant information in the file system.

步驟205:判斷檔案系統是否存在? Step 205: Determine whether the file system exists?

步驟206:當判斷儲存單元內沒有檔案系統存在、或者檔案系統已經毀損時,控制器不啟動(關閉)資料保護操作(因為此情況下沒有需要對資料進行保護),流程跳至步驟218。 Step 206: When it is determined that there is no file system in the storage unit or the file system has been damaged, the controller does not start (close) the data protection operation (because there is no need to protect the data in this case), and the flow skips to step 218.

步驟207:當判斷儲存單元內有檔案系統存在時,在主機辨認外接式儲存裝置的初始化過程當中,控制器啟動資料保護操作。 Step 207: When it is determined that there is a file system in the storage unit, the controller initiates a data protection operation during the initialization process of the host identifying the external storage device.

步驟208:在資料保護操作已啟動的情況下,判斷控制器收到的指令類型,當控制器收到至少一種特定指令時,流程進入步驟210;當控制器收到寫入指令時,流程進入步驟212。 Step 208: When the data protection operation has been started, determine the type of instruction received by the controller. When the controller receives at least one specific instruction, the process proceeds to step 210; when the controller receives a write instruction, the process enters Step 212.

步驟210:關閉資料保護操作,接著跳至步驟214。 Step 210: Turn off the data protection operation, and then skip to step 214.

步驟212:改寫該寫入指令的寫入位置(例如改寫至與預定寫入位置不同的另一寫入位置;或改寫至該儲存裝置的控制晶片或橋接晶片的內部記憶體或內部暫存器,而不寫入到該儲存單元),或是將該寫入指令捨棄。 Step 212: Rewrite the write location of the write command (for example, rewrite to another write location different from the predetermined write location; or rewrite to the internal memory or internal register of the control chip or bridge chip of the storage device , Do not write to the storage unit), or discard the write command.

步驟214:回報主機此寫入指令已寫入成功,藉此使主機判定寫入動作(亦即惡意程式的竄改動作)已完成。 Step 214: Report that the write command has been successfully written to the host, so that the host determines that the write operation (that is, the tampering operation of the malicious program) has been completed.

步驟216:判斷是否已達預定時間(亦即外接裝置剛插上主機這段 時間)。若是,則進入步驟218;若否,則回到步驟205,重複執行流程直到資料保護操作被關閉(例如從步驟208進入步驟210)或是流程已達預定時間。 Step 216: Determine whether the predetermined time has elapsed (that is, the period when the external device is just plugged into the host time). If yes, go to step 218; if not, go back to step 205, and repeat the process until the data protection operation is closed (for example, from step 208 to step 210) or the process has reached a predetermined time.

步驟218:一旦資料保護操作被關閉,便不再啟動。(直到外接式儲存裝置重新“掛載”上主機後,才會再度判斷是否需要啟動資料保護操作)。 Step 218: Once the data protection operation is closed, it will not be activated again. (Until the external storage device is "mounted" to the host again, it will be judged again whether it is necessary to start the data protection operation).

在儲存單元內有檔案系統存在的情況下,在主機辨認外接式儲存裝置的初始化過程的這段時間之內(也就是資料容易受到攻擊的這一段時間內),控制器可透過以下幾種方式啟動資料保護操作: When there is a file system in the storage unit, the controller can use the following methods during the period when the host recognizes the initialization process of the external storage device (that is, during the period when the data is vulnerable to attack) Start data protection operation:

I.是否收到某些指令的順序或某些指令的組合。 I. Whether to receive some order of order or some combination of order.

II.是否收到某種特殊指令,或有規律性的收到某種特殊指令(例如每幾秒收到某種特殊指令)。 II. Whether a certain special instruction is received, or a certain special instruction is received regularly (for example, a certain special instruction is received every few seconds).

III.是否收到一或多個寫入指令寫入的一或多個位置(例如邏輯區塊位址(Logical Block Address,LBA),舉例來說,當寫入位置指向檔案系統磁區或Cluster範圍內的位置時,則啟動資料保護操作。 III. Whether to receive one or more write commands to write one or more locations (such as logical block address (Logical Block Address, LBA), for example, when the write location points to the file system sector or Cluster When the position is within the range, the data protection operation is started.

IV.是否收到一或多個讀取指令讀取的某個或某些位置(例如LBA),舉例來說,當讀取指令讀取儲存單元上的最後一個LBA時,則啟動資料保護操作。 IV. Whether to receive one or more read commands to read a certain position (such as LBA), for example, when the read command reads the last LBA on the storage unit, the data protection operation is started .

V.無條件直接啟動。 V. Unconditionally start directly.

當資料保護操作已啟動,會根據控制器是否收到特定指令來決定是否關閉資料保護操作,也就是說,某些類型的指令可直接判斷為並非惡意程式的攻擊,因此可省去後續的防護動作。舉例來說,特定指令可包含(但不限定於)以下指令: When the data protection operation is activated, it will decide whether to turn off the data protection operation according to whether the controller receives a specific command. That is to say, certain types of commands can be directly judged as not being a malicious program attack, so subsequent protection can be omitted action. For example, a specific command may include (but is not limited to) the following commands:

I.資料同步指令(例如SCSI指令的SYNCHRONIZE CACHE指令)。 I. Data synchronization commands (such as the SYNCHRONIZE CACHE command of the SCSI command).

II.某種指令的順序或是某些指令的組合。 II. A certain order of instructions or a combination of certain instructions.

在步驟212中,當資料保護操作已啟動、且控制器收到了“寫入指令”,則選擇以下兩者之一的指令處理方式: In step 212, when the data protection operation is started and the controller receives the "write command", it selects one of the following two command processing methods:

I.改寫指令的寫入位置,將其寫入位置導入至檔案系統中並非實際存在的閒置空間,(可利用步驟204所收集到的檔案系統資訊判斷何者為閒置空間)。 I. Rewrite the writing position of the command and import the writing position into the free space that does not actually exist in the file system (the file system information collected in step 204 can be used to determine which is the free space).

II.將指令所攜帶的寫入資料導入至控制器內部的特定儲存空間,然後置之不理或捨棄,其中所述特定儲存空間係指內部的記憶體或內部的暫存器,但不限於這兩種儲存元件。所述特定儲存空間亦可理解為一垃圾蒐集區,其垃圾(即這些惡意程式、寫入指令)可置之不理,或待垃圾達一定的量時予以清除。 II. Import the written data carried by the command into a specific storage space inside the controller, and then ignore or discard it. The specific storage space refers to internal memory or internal registers, but not limited to these two Storage components. The specific storage space can also be understood as a garbage collection area, and the garbage (that is, these malicious programs, writing instructions) can be ignored or cleared when the garbage reaches a certain amount.

以上兩種方式都可以保護現有的資料不被破壞,換言之,由於惡意程式、寫入指令已經被導入一不存在的位置或是對儲存資料沒有影響的獨立空間,故可完全地防止儲存資料遭到修改或刪除。 The above two methods can protect the existing data from being damaged. In other words, because malicious programs and write commands have been imported into a non-existent location or an independent space that has no effect on the stored data, it can completely prevent the stored data from being damaged. To modify or delete.

在步驟214回報主機此寫入指令已寫入成功後,即達到“欺騙”主機的目的,使主機判定寫入動作(亦即惡意程式的竄改動作)已完成,故達到了資料防護的目的。 After the host is reported in step 214 that the write command has been successfully written, the purpose of "spoofing" the host is achieved, so that the host determines that the write operation (that is, the tampering operation of the malicious program) has been completed, thus achieving the purpose of data protection.

步驟216係於預定時間(亦即外接裝置剛插上主機這段時間)持續判斷有沒有需要啟動資料保護操作的需要,直到預定時間結束。而一旦該預定時間結束後,資料保護操作被關閉後便不再啟動,因為在該預定時間儲存裝置已 經不再有被竄改之虞,直到外接式儲存裝置自主機移除後,下次再進行連接時才會再度執行第2圖的流程。 Step 216 is to continuously determine whether there is a need to start the data protection operation for a predetermined time (that is, the time when the external device is just plugged into the host), until the predetermined time is over. Once the predetermined time is over, the data protection operation will not be activated after it is closed, because the storage device has been There is no longer a risk of tampering, and the process shown in Figure 2 will not be executed again until the external storage device is removed from the host and the next time the connection is made.

綜上所述,本發明能夠在外接硬碟剛連上電腦的這段等待時間提供保護來防止資料遭到刪除、竄改。此外,在主機將指令及資料傳輸到儲存單元的過程當中,本發明係利用控制器來過濾特定的指令與資料,故可大幅降低資料被攻擊的可能性,進而保護儲存裝置內的資料在這段時間之內不被惡意的動作破壞。 以上所述僅為本發明之較佳實施例,凡依本發明申請專利範圍所做之均等變化與修飾,皆應屬本發明之涵蓋範圍。 In summary, the present invention can provide protection to prevent data from being deleted and tampered during the waiting time when the external hard disk is just connected to the computer. In addition, in the process of the host transmitting commands and data to the storage unit, the present invention uses the controller to filter specific commands and data, so the possibility of data being attacked can be greatly reduced, thereby protecting the data in the storage device. Not be destroyed by malicious actions within a period of time. The foregoing descriptions are only preferred embodiments of the present invention, and all equivalent changes and modifications made in accordance with the scope of the patent application of the present invention shall fall within the scope of the present invention.

200:方法 200: method

202~218:步驟 202~218: Steps

Claims (5)

一種資料保護方法,用於提供安全性防護,包含以下步驟:(A):於一儲存裝置連接上一主機的初始時段,利用該儲存裝置的一控制器對該儲存裝置進行偵測,且判斷該儲存裝置是否需要進行資料保護操作,其中該初始時段為該儲存裝置掛載上該主機開始到該主機辨認完成該儲存裝置的時間;(B):當步驟A判斷該儲存裝置需要進行資料保護操作時,利用該控制器更改該主機對該儲存裝置的一儲存單元的一預定寫入位置,以使來自該主機的資料寫入到不同於該預定寫入位置的另一寫入位置;或將來自該主機的資料寫入到該儲存裝置的控制晶片或橋接晶片的內部記憶體或內部暫存器,而不寫入到該儲存單元;以及(C):利用該控制器回報該主機寫入指令已完成。 A data protection method for providing security protection includes the following steps: (A): During the initial period when a storage device is connected to a host, a controller of the storage device is used to detect the storage device and determine Whether the storage device needs to perform data protection operations, where the initial period is the time from when the storage device is mounted on the host to when the host recognizes the storage device; (B): when step A determines that the storage device needs data protection During operation, use the controller to change a predetermined writing position of the host to a storage unit of the storage device, so that data from the host is written to another writing position different from the predetermined writing position; or Write the data from the host to the internal memory or internal register of the control chip or bridge chip of the storage device without writing to the storage unit; and (C): Use the controller to report the host write The incoming instruction has been completed. 如請求項1所述的資料保護方法,其中,判斷是否需要進行資料保護操作的步驟包含:利用該控制器讀回該儲存裝置中的一儲存單元上的檔案系統(file system),並收集該檔案系統內的相關資訊,以判斷該檔案系統是否存在,其中當偵測到該儲存單元內有該檔案系統存在時,該控制器啟動該資料保護操作。 The data protection method according to claim 1, wherein the step of determining whether a data protection operation needs to be performed includes: using the controller to read back a file system on a storage unit in the storage device, and collect the The relevant information in the file system is used to determine whether the file system exists, and when the file system is detected in the storage unit, the controller initiates the data protection operation. 如請求項2所述的資料保護方法,其中,於該初始時段內、該資料保護操作被關閉之前,反覆執行步驟B~C。 The data protection method according to claim 2, wherein in the initial time period, before the data protection operation is closed, steps B to C are repeatedly performed. 如請求項2所述的資料保護方法,其中,一旦該資料保護操作被關閉 後,於該儲存裝置下一次連接上該主機前不再啟動。 The data protection method according to claim 2, wherein, once the data protection operation is closed After that, it will not start until the storage device is connected to the host next time. 一種儲存裝置,用以資料處理並且提供安全性防護,該儲存裝置包含:一儲存單元;以及一控制器,用以執行以下步驟:(A):於該儲存裝置連接上一主機的初始時段,對該儲存裝置進行偵測,且判斷該儲存裝置是否需要進行資料保護操作,其中該初始時段為該儲存裝置掛載上該主機開始到該主機辨認完成該儲存裝置的時間;(B):當步驟A判斷該儲存裝置需要進行資料保護操作時,更改該主機對該儲存單元的一預定寫入位置,以使來自該主機的資料寫入到該儲存單元上不同於該預定寫入位置的另一寫入位置;或將來自該主機的資料寫入到或將來自該主機的資料寫入到控制晶片或橋接晶片的內部記憶體或內部暫存器,而不寫入到該儲存單元;以及(C):回報該主機寫入操作已完成。 A storage device for data processing and security protection. The storage device includes: a storage unit; and a controller for performing the following steps: (A): in the initial period when the storage device is connected to a host, Detect the storage device and determine whether the storage device needs to perform data protection operations, wherein the initial period is the time from when the storage device is mounted on the host to when the host recognizes the storage device; (B): when Step A: When it is determined that the storage device needs to perform a data protection operation, change a predetermined writing position of the host to the storage unit so that the data from the host is written to the storage unit other than the predetermined writing position. A write location; or write data from the host to or write data from the host to the internal memory or internal register of the control chip or bridge chip, but not to the storage unit; and (C): Report that the host's write operation has been completed.
TW108110224A 2018-10-02 2019-03-25 Data protection method and associated storage device TWI741271B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/589,162 US11144217B2 (en) 2018-10-02 2019-10-01 Data protection method and associated storage device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201862739866P 2018-10-02 2018-10-02
US62/739,866 2018-10-02

Publications (2)

Publication Number Publication Date
TW202014923A TW202014923A (en) 2020-04-16
TWI741271B true TWI741271B (en) 2021-10-01

Family

ID=70081575

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108110224A TWI741271B (en) 2018-10-02 2019-03-25 Data protection method and associated storage device

Country Status (2)

Country Link
CN (1) CN110990832A (en)
TW (1) TWI741271B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI775098B (en) * 2020-06-17 2022-08-21 和碩聯合科技股份有限公司 Removable storage device and data protection method thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8060716B2 (en) * 2006-12-22 2011-11-15 Panasonic Corporation Information processing device for securely processing data that needs to be protected using a secure memory
TW201329707A (en) * 2012-01-13 2013-07-16 Phison Electronics Corp Data protecting method, memory controller and memory storage apparatus
TW201516680A (en) * 2013-10-21 2015-05-01 Univ Nat Sun Yat Sen Processor and cache, control method thereof for data trace storage
US20170286644A1 (en) * 2014-09-01 2017-10-05 Zte Corporation Protection Method and Device for Application Data

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100464314C (en) * 2006-03-23 2009-02-25 联想(北京)有限公司 Digital data transparency protected safety read-write system and method
CN101373457B (en) * 2007-07-31 2010-04-14 北京理工大学 Hard disk write-protection lock based on USB equipment under Windows environment
SE534099C2 (en) * 2008-06-02 2011-04-26 Klaus Drosch Device for data protection
CN101667161A (en) * 2008-09-02 2010-03-10 联想(北京)有限公司 Method and device for protecting data of storage device and computer system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8060716B2 (en) * 2006-12-22 2011-11-15 Panasonic Corporation Information processing device for securely processing data that needs to be protected using a secure memory
TW201329707A (en) * 2012-01-13 2013-07-16 Phison Electronics Corp Data protecting method, memory controller and memory storage apparatus
TWI451248B (en) * 2012-01-13 2014-09-01 Phison Electronics Corp Data protecting method, memory controller and memory storage apparatus
TW201516680A (en) * 2013-10-21 2015-05-01 Univ Nat Sun Yat Sen Processor and cache, control method thereof for data trace storage
TWI514145B (en) * 2013-10-21 2015-12-21 Univ Nat Sun Yat Sen Processor and cache, control method thereof for data trace storage
US20170286644A1 (en) * 2014-09-01 2017-10-05 Zte Corporation Protection Method and Device for Application Data

Also Published As

Publication number Publication date
CN110990832A (en) 2020-04-10
TW202014923A (en) 2020-04-16

Similar Documents

Publication Publication Date Title
US8024530B2 (en) Security erase of a delete file and of sectors not currently assigned to a file
KR101622416B1 (en) Peripheral device locking mechanism
CN103718165B (en) BIOS flash memory attack protection and notice
US8578179B2 (en) Safe command execution and error recovery for storage devices
TWI451248B (en) Data protecting method, memory controller and memory storage apparatus
TWI610182B (en) Systems and methods for providing dynamic file system awareness on storage devices
US6016536A (en) Method for backing up the system files in a hard disk drive
US20100241875A1 (en) External storage device and method of controlling the same
CN102473216A (en) Data security in solid state memory
US20140372710A1 (en) System and method for recovering from an unexpected shutdown in a write-back caching environment
CN113553006A (en) Secure encrypted storage system for realizing data writing to read-only partition
US11144217B2 (en) Data protection method and associated storage device
US10013172B2 (en) Electronic data storage device with multiple configurable data storage mediums
TWI741271B (en) Data protection method and associated storage device
US8776232B2 (en) Controller capable of preventing spread of computer viruses and storage system and method thereof
TW201305842A (en) Method and apparatus for securing storage devices by real-time monitoring file system
US20060080518A1 (en) Method for securing computers from malicious code attacks
US7263468B2 (en) Method for storing access record in network communication device
CN104239245A (en) Electronic system and operating method
US11314453B2 (en) Memory system managing map data based on risk of malware—infection of host, and operating method thereof
US20140351604A1 (en) Electronic device and encryption control method
TWI796935B (en) Memory control method and memory storage devcie
CN110633173B (en) Write filtering system and method based on Linux system disk
CN118427823A (en) Virus attack behavior processing method and device based on hard disk storage chip
TW202420128A (en) Improved security and reliability of cloud-based systems by removing device firmware persistence