WO2016070537A1 - Disk validity detection method, authentication method and related device - Google Patents
Disk validity detection method, authentication method and related device Download PDFInfo
- Publication number
- WO2016070537A1 WO2016070537A1 PCT/CN2015/074029 CN2015074029W WO2016070537A1 WO 2016070537 A1 WO2016070537 A1 WO 2016070537A1 CN 2015074029 W CN2015074029 W CN 2015074029W WO 2016070537 A1 WO2016070537 A1 WO 2016070537A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- disk
- authentication code
- authentication
- information
- verified
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
Definitions
- the present invention relates to the field of computer storage, and in particular to a method for detecting validity of a disk, an authentication method, and a corresponding device.
- the computer storage system products currently on the market are compatible with the disk interface type that the product cabinet (box) is adapted to, and in principle, any disk can be used.
- the disk will be based on different indicators to meet the corresponding quality requirements, and the computer storage system is shipped from the factory.
- the disk is "marked” and the device also does not allow the insertion of a "tag” disk.
- the hard disk required on many computer storage systems is a highly reliable hard disk. If the user purchases an ordinary hard disk, the anti-vibration performance and high temperature resistance are poor, which may cause frequent links to the link and even drop the disk.
- the embodiment of the invention provides a method for detecting the validity of a disk, an authentication method and a corresponding device, so as to determine whether the computer storage system is verified by the computer storage system during operation, and provides security and reliability.
- an embodiment of the present invention provides a method for detecting validity of a disk, which is applied to a computer system, and the method includes:
- the authentication information includes first authentication information and second authentication information
- the first authentication information is stored in a first authentication code storage area of the disk
- the second authentication information is stored in a second authentication code storage area of the disk.
- the authentication information is matched with the disk authentication code, and determining the validity of the disk according to the matching result includes:
- the authentication code to be verified is obtained from the legal authentication information
- the disk If the authentication code to be verified matches the disk authentication code, the disk is considered to be valid, and the disk authentication code is copied to a storage area of the illegal authentication information of the disk; if the authentication code to be verified is If the disk authentication code does not match, the disk is considered invalid.
- the authentication information is matched with the disk authentication code, and determining the validity of the disk according to the matching result includes:
- the first to-be-verified authentication code is obtained from the first authentication information
- the second to-be-verified authentication code is obtained from the second authentication information.
- the disk is considered to be valid; if the first to-be-verified authentication code and the second to-be-verified If one of the authentication codes matches the disk authentication code, the disk is considered to be valid, and the disk authentication code is copied to a storage area of the disk that does not match the authentication information; if the first to-be-verified authentication is performed If the code and the second to-be-verified authentication code do not match the disk authentication code, the disk is considered invalid.
- calculating the disk authentication code according to the disk serial number information and the disk capacity information includes:
- the disk authentication code MD5 (MD5 (serial number of the disk) + MD5 (disk capacity)).
- the embodiment of the invention further provides a method for authenticating a disk, which is applied to a computer system, the party The law includes:
- the disk authentication code is stored in an authentication code storage area of the disk.
- generating the disk authentication code according to the disk serial number information and the disk capacity information includes:
- the disk authentication code MD5 (MD5 (serial number of the disk) + MD5 (disk capacity)).
- storing the disk authentication code in the authentication code storage area of the disk includes:
- the authentication code storage area includes a first authentication code storage area and a second authentication code storage area
- the disk authentication code is simultaneously stored in the first authentication code storage area and the second authentication code storage area.
- the embodiment of the invention further provides a device for detecting the validity of a disk, which is applied to a computer system, and the device comprises:
- a calculation module configured to calculate a disk authentication code according to the disk serial number information and the disk capacity information
- a search module configured to obtain authentication information stored by the disk
- the determining module is configured to match the authentication information and the disk authentication code, and determine the validity of the disk according to the matching result.
- the authentication information includes first authentication information and second authentication information
- the first authentication information is stored in a first authentication code storage area of the disk
- the second authentication information is stored in a second authentication code storage area of the disk.
- the judging module is set to:
- the authentication code to be verified is obtained from the legal authentication information
- the disk If the authentication code to be verified matches the disk authentication code, the disk is considered to be valid, and the disk authentication code is copied to a storage area of the illegal authentication information of the disk; if the authentication code to be verified is If the disk authentication code does not match, the disk is considered invalid.
- the judging module is set to:
- the first to-be-verified authentication code is obtained from the first authentication information
- the second to-be-verified authentication code is obtained from the second authentication information.
- the disk is considered to be valid; if the first to-be-verified authentication code and the second to-be-verified If one of the authentication codes matches the disk authentication code, the disk is considered to be valid, and the disk authentication code is copied to a storage area of the unmatched authentication information; if the first to-be-verified authentication code and the If the second to-be-verified authentication code does not match the disk authentication code, the disk is considered invalid.
- the computing module is configured to:
- the disk authentication code MD5 (MD5 (serial number of the disk) + MD5 (disk capacity)).
- the embodiment of the invention further provides a disk authentication device, which is applied to a computer system, and the device includes:
- An information acquisition module configured to obtain disk serial number information and disk capacity information
- a calculating module configured to generate a disk authentication code according to the disk serial number information and the disk capacity information
- a storage module configured to store the disk authentication code in an authentication code storage area of the disk.
- the computing module is configured to:
- the disk authentication code MD5 (MD5 (serial number of the disk) + MD5 (disk capacity)).
- the storage module is configured to:
- the embodiment of the present invention further provides a computer readable storage medium, where the storage medium stores a computer program, the computer program includes program instructions, when the program instruction is executed by the computer system device, enabling the device to execute the above-mentioned disk effective sexual detection method.
- the embodiment of the present invention further provides a computer readable storage medium, where the storage medium stores a computer program, the computer program includes program instructions, when the program instruction is executed by the computer system device, enabling the device to execute the disk. Authentication method.
- the above solution adds a disk authentication code to a reliable disk that has passed the certification of the computer storage system manufacturer.
- the computer storage system can identify whether the disk is verified by the computer storage system manufacturer through the disk authentication code during operation, and prohibits the use of the computer storage system without passing through the computer storage system. Vendor-verified unreliable disks provide security and reliability.
- FIG. 1 is a schematic structural diagram of a computer system according to Embodiment 1 of the present invention.
- Embodiment 1 of the present invention is a flowchart of a method for detecting validity of a disk in Embodiment 1 of the present invention
- Embodiment 3 is a flowchart of a method for disk authentication in Embodiment 1 of the present invention.
- FIG. 4 is a schematic structural diagram of a device for detecting validity of a disk according to Embodiment 1 of the present invention.
- FIG. 5 is a schematic structural diagram of an apparatus for disk authentication according to Embodiment 1 of the present invention.
- FIG. 6 is another flowchart of a method for disk authentication in Embodiment 2 of the present invention.
- FIG. 7 is a schematic diagram of storage of a disk authentication code in Embodiment 2 of the present invention.
- FIG. 8 is another flow chart of a method for detecting validity of a disk in Embodiment 3 of the present invention.
- FIG. 1 is a schematic structural diagram of a computer system including: a disk, a disk drive unit, a disk management unit, a disk intelligent detection unit, a RAID (Redundant Arrays of independent Disks) controller unit, and a NAS. (Network Attached Storage) controller unit, SAN (Storage Area Network) controller unit, and magnetic array controller unit.
- a disk a disk drive unit
- a disk management unit a disk intelligent detection unit
- RAID Redundant Arrays of independent Disks
- NAS Network Attached Storage
- SAN Storage Area Network
- the disk is a physical disk that is installed on the storage system as a physical storage medium when the user uses the storage system device, such as a normal hard disk or a solid state disk (SSD).
- SSD solid state disk
- Disk drive unit after the disk is connected to the computer storage system, the system needs to control the physical disk and read and write data through the disk drive unit.
- the disk management unit abstracts the interface provided by the disk drive unit into a storage interface of the computer storage system, that is, a logical disk, and manages the interaction between the storage system and the physical disk.
- the disk intelligent detection unit performs intelligent detection processing after obtaining physical disk information from the disk management unit, identifies whether the disk is a legitimate disk, and notifies the disk management unit.
- the RAID controller unit is further organized into a RAID disk array by the logical disk provided by the disk management unit, and the RAID array abstraction is provided to the upper layer application for one logical volume.
- the NAS controller unit manages logical volumes in the form of a local file system and provides NFS (Network File System), CIFS (Common Internet File System), and FTP (File Transfer Protocol). Protocol) and other file service functions.
- NFS Network File System
- CIFS Common Internet File System
- FTP File Transfer Protocol
- the SAN controller unit divides the logical volume re-management into a logical disk to provide data storage services to the FC (Fibre Channel, Network Channel) or ISCSI (Internet Small Computer System Interface) protocol.
- FC Fibre Channel, Network Channel
- ISCSI Internet Small Computer System Interface
- the magnetic array control unit provides the logical volume to the external client in the form of a logical disk through the SAS or SATA (Serial Advanced Technology Attachment) interface.
- SAS Serial Advanced Technology Attachment
- the present invention provides a method for detecting the validity of a disk, which is applied to a computer system, and the method includes:
- Step S101 Calculate a disk authentication code according to the disk serial number information and the disk capacity information
- the computer system manufacturer can verify the validity of the disk.
- the verification method can set the disk authentication code to the disk, and encapsulate the disk authentication code into a certain data format and store it in the storage area of the disk.
- Step S102 Acquire authentication information stored on the disk.
- the authentication information may include first authentication information and second authentication information; the first authentication information is stored in a first authentication code storage area of the disk, and the second authentication information is stored in a second authentication code storage area of the disk.
- Step S103 Match the authentication information and the disk authentication code, and determine the validity of the disk according to the matching result.
- the authentication code to be verified is obtained from the legal authentication information; if the verification authentication code matches the disk authentication code, the disk is considered to be valid. And copying the disk authentication code to the storage area of the illegal authentication information; if the verification authentication code does not match the disk authentication code, the disk is considered invalid.
- the first to-be-verified authentication code is obtained from the first authentication information
- the second to-be-verified authentication code is obtained from the second authentication information
- the disk If the second to-be-verified authentication code matches the disk authentication code, the disk is considered to be valid; if one of the first to-be-verified authentication code and the second to-be-verified authentication code matches the disk authentication code, the disk is considered to be valid, and Copying the disk authentication code to the storage area of the unmatched authentication information; if the first to-be-verified authentication code and the second to-be-verified authentication code both do not match the disk authentication code, the disk is considered invalid.
- the present invention further provides a method for authenticating a magnetic disk, which is applied to a computer system, and the method includes:
- Step S111 Acquire disk serial number information and disk capacity information
- Step S112 Generate a disk authentication code according to the disk serial number information and the disk capacity information.
- the disk authentication code MD5 (MD5 (serial number of the disk) + MD5 (disk capacity)).
- Step S113 Store the disk authentication code in an authentication code storage area of the disk.
- Storing the disk authentication code in the authentication code storage area of the disk includes:
- the authentication code storage area may include a first authentication code storage area and a second authentication code storage area; the disk authentication code is simultaneously stored in the first authentication code storage area and the second authentication code storage area.
- the purpose of setting two authentication code storage areas is to prevent the correction from being verified by another location after one location is destroyed.
- the number of authentication code storage areas may be set to one or two or more.
- Computer storage system manufacturers can certify their computer storage system products. For reliable disk computer storage system manufacturers that have passed vendor verification, the certification mark can be set. The computer storage system can automatically detect disk reliability by detecting the set authentication mark.
- the present invention further provides a device for detecting the validity of a disk, which is applied to a computer system, the device comprising a processor and a program storage device, and further comprising:
- the calculating module 11 is adapted to calculate a disk authentication code according to the disk serial number information and the disk capacity information;
- the searching module 12 is adapted to obtain the authentication information stored by the disk.
- the determining module 13 is adapted to match the authentication information and the disk authentication code according to The matching result determines the validity of the disk.
- the authentication information includes first authentication information and second authentication information
- the first authentication information is stored in a first authentication code storage area of the disk
- the second authentication information is stored in a second authentication code storage area of the disk.
- the determining module 13 is adapted to match the authentication information and the disk authentication code, and determining, according to the matching result, the validity of the disk is:
- the authentication code to be verified is obtained from the legal authentication information
- the disk If the verification authentication code matches the disk authentication code, the disk is considered to be valid, and the disk authentication code is copied to a storage area of the illegal authentication information; if the verification authentication code does not match the disk authentication code, The disk is considered invalid.
- the determining module 13 is adapted to match the authentication information and the disk authentication code, and determining, according to the matching result, the validity of the disk is:
- the first to-be-verified authentication code is obtained from the first authentication information
- the second to-be-verified authentication code is obtained from the second authentication information.
- the disk is considered to be valid; if the first to-be-verified authentication code and the second to-be-verified If one of the authentication codes matches the disk authentication code, the disk is considered to be valid, and the disk authentication code is copied to a storage area of the unmatched authentication information; if the first to-be-verified authentication code and the If the second to-be-verified authentication code does not match the disk authentication code, the disk is considered invalid.
- the calculating module 11 is adapted to calculate a disk according to the disk serial number information and the disk capacity information.
- the authentication code means :
- the disk authentication code MD5 (MD5 (serial number of the disk) + MD5 (disk capacity)).
- the present invention further provides a disk authentication device, which is applied to a computer system, the device includes a processor and a program storage device, and further includes:
- the information obtaining module 21 is adapted to obtain the disk serial number information and the disk capacity information
- the calculating module 22 is adapted to generate a disk authentication code according to the disk serial number information and the disk capacity information;
- the storage module 23 is adapted to store the disk authentication code in an authentication code storage area of the disk.
- the calculating module is adapted to generate a disk authentication code according to the disk serial number information and the disk capacity information:
- the disk authentication code MD5 (MD5 (serial number of the disk) + MD5 (disk capacity)).
- the storing module is adapted to store the disk authentication code in the authentication code storage area of the disk, where:
- the authentication code storage area includes a first authentication code storage area and a second authentication code storage area
- the disk authentication code is simultaneously stored in the first authentication code storage area and the second authentication code storage area.
- FIG. 6 is a schematic diagram of a disk authentication method according to an embodiment of the present invention. As shown in FIG. 6, the method includes four steps of reading a disk serial number and capacity information, calculating a disk authentication code, storing an authentication code, and feeding back a disk marking result. .
- Step 201 The system obtains the serial number and disk capacity of the verified disk through the software, and provides necessary parameters for generating the authentication code subsequently. If the serial number or the disk capacity fails, the system fails to mark the authentication disk.
- Step 202 On the basis of obtaining the serial number and capacity of the disk in step 201, the serial number and the capacity are combined to generate an authentication code, and the serial number and the disk capacity generation authentication code algorithm are implemented by using the MD5 encryption algorithm:
- an authentication code can be calculated: BD2D991D38CCAFE5630B7FEB87A1AAC0. If the authentication code fails to be generated, the feedback error ends marking the disk.
- Step 203 the authentication code generated in step 202 is encapsulated into a fixed data format, and respectively written into two fixed areas of the disk as the primary and backup information, so as to prevent the correction from being corrected after another place is destroyed, the specific structural form As shown in Figure 7.
- Step 204 Check data of two spaces of the disk set as the authentication information storage area, and check whether the written data is correct. If the disk tag is successfully prompted to be successful, the disk is flagged with an error message if it fails.
- FIG. 8 is a schematic diagram of a method for detecting validity of a disk according to an embodiment of the present invention, which specifically includes:
- Step 301 obtaining a disk serial number and a disk capacity, by using the algorithm described in step 202. Calculate the disk authentication code of the disk to be authenticated;
- Step 302 Read the authentication information of the two areas fixed by the disk as shown in FIG. 7, and check whether the format of the obtained two sets of authentication information is legal.
- Step 303 If only one set of the obtained two sets of authentication information is legal, only the authentication code is extracted from the legal set of data (step 305 if all are legal), and the extracted authentication code and the disk authentication code obtained in step 401 are obtained. Make a match. If the match fails, the computer storage system is notified that the disk is illegal for use.
- Step 304 If the authentication code extracted in step 303 matches the disk authentication code, copy the disk authentication code or the legal group of authentication information to another area on the disk where the illegal authentication information is stored, and notify the system of the disk. Is an authentication disk that can be used.
- Step 305 If the format of the two sets of authentication information obtained in step 302 is legal, check whether the two sets of authentication information obtained from the two areas are consistent.
- Step 306 if step 305 checks that the two sets of authentication information are consistent (if not, proceed to step 307), and extract the authentication code from any of the group of authentication information.
- the extracted authentication code is matched with the disk authentication code obtained in step 301. If the authentication code matches correctly, notify the computer storage system that the disk is a vendor-certified authentication disk. Otherwise, notify the computer storage system that the disk is forbidden to use the illegal disk that has not been verified by the manufacturer.
- Step 307 Extract two authentication codes from the two sets of authentication information, and match the two authentication codes with the disk authentication code obtained in step 301. If both authentication codes fail to match, the computer storage system is notified that the disk is not used by the manufacturer.
- Step 308 if one of the two authentication codes matches correctly, copy the correct verification code or the authentication information that is extracted with the matching authentication code into another area where the error authentication information is stored, and then notify the computer storage system that the disk is A reliable disk that has been tested by the manufacturer can be used.
- the technical solution provided by the embodiment of the present invention adds a disk authentication code to a reliable disk that has passed the certification of the computer storage system manufacturer.
- the computer storage system can identify whether the disk is verified by the computer storage system manufacturer through the disk authentication code during operation, and provides security. And reliability.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Storage Device Security (AREA)
Abstract
A disk validity detection method, applied to a computer system, the method comprising: calculating a disk authentication code according to disk serial number information and disk volume information; acquiring disk authentication information; matching the authentication information with the disk authentication code, and determining the validity of the disk according to a matching result. The invention assigns a disk authentication code to a reliable disk authenticated by a computer storage system manufacturer and, when running, the computer storage system can recognize via the disk authentication code whether the disk has been authenticated by the computer storage system manufacturer, thus improving safety and reliability.
Description
本发明涉及计算机存储领域,具体涉及一种磁盘有效性的检测方法、认证方法及相应装置。The present invention relates to the field of computer storage, and in particular to a method for detecting validity of a disk, an authentication method, and a corresponding device.
目前市场上的计算机存储系统产品只要与该产品机柜(箱)所适配的磁盘接口类型兼容,原则上可以使用任意磁盘的。但是在实际应用中,考虑产品整体的性能、可靠性等指标,以及计算机存储系统产品的大量损耗来自磁盘,对磁盘均会根据不同的指标提出相应的质量要求,并且计算机存储系统出厂时对配套的磁盘进行“标记”,该设备也不允许无“标记”磁盘的插入混用。在很多计算机存储系统上要求使用的硬盘是高可靠性的硬盘,如果用户自行购买了普通硬盘,由于抗震动性能、耐高温特性比较差,会导致链路频繁出错,甚至掉盘。此外即使用户使用了自行采购的高可靠性硬盘,如果型号和固件的原因其硬盘与计算机存储系统本身配置的SAS(Serial Attached SCSI,串行连接小型计算机系统接口)链路参数不匹配,会导致大量误码等问题。因此计算机存储系统产品在使用磁盘之前检测磁盘的可靠性在计算机存储系统产品的实际工作中具有非常重要的意义。The computer storage system products currently on the market are compatible with the disk interface type that the product cabinet (box) is adapted to, and in principle, any disk can be used. However, in practical applications, considering the overall performance and reliability of the product, as well as the large loss of computer storage system products from the disk, the disk will be based on different indicators to meet the corresponding quality requirements, and the computer storage system is shipped from the factory. The disk is "marked" and the device also does not allow the insertion of a "tag" disk. The hard disk required on many computer storage systems is a highly reliable hard disk. If the user purchases an ordinary hard disk, the anti-vibration performance and high temperature resistance are poor, which may cause frequent links to the link and even drop the disk. In addition, even if the user uses a self-purchased high-reliability hard disk, if the model and the firmware are not compatible with the SAS (Serial Attached SCSI) link parameters configured by the computer storage system itself, A lot of errors and other issues. Therefore, the reliability of the computer storage system product to detect the disk before using the disk is of great significance in the actual work of the computer storage system product.
发明内容Summary of the invention
本发明实施例提供一种磁盘有效性的检测方法、认证方法及相应装置,以实现计算机存储系统运行时判断是否通过计算机存储系统厂商验证,提供安全性可可靠性。The embodiment of the invention provides a method for detecting the validity of a disk, an authentication method and a corresponding device, so as to determine whether the computer storage system is verified by the computer storage system during operation, and provides security and reliability.
为了解决上述技术问题,本发明实施例提供了一种磁盘有效性的检测方法,应用于计算机系统,所述方法包括:In order to solve the above technical problem, an embodiment of the present invention provides a method for detecting validity of a disk, which is applied to a computer system, and the method includes:
根据磁盘序列号信息和磁盘容量信息计算磁盘认证码;Calculate the disk authentication code according to the disk serial number information and the disk capacity information;
获取所述磁盘存储的认证信息;
Obtaining the authentication information stored by the disk;
将所述认证信息和所述磁盘认证码进行匹配,根据匹配结果判断所述磁盘的有效性。Matching the authentication information and the disk authentication code, and determining the validity of the disk according to the matching result.
可选地,所述认证信息包括第一认证信息和第二认证信息;Optionally, the authentication information includes first authentication information and second authentication information;
所述第一认证信息存储于所述磁盘的第一认证码存储区域,所述第二认证信息存储于所述磁盘的第二认证码存储区域。The first authentication information is stored in a first authentication code storage area of the disk, and the second authentication information is stored in a second authentication code storage area of the disk.
可选地,将所述认证信息和所述磁盘认证码进行匹配,根据匹配结果判断所述磁盘的有效性包括:Optionally, the authentication information is matched with the disk authentication code, and determining the validity of the disk according to the matching result includes:
当所述第一认证信息与所述第二认证信息中的一个认证信息为合法时,则从合法的认证信息中获取待验证认证码;When one of the first authentication information and the second authentication information is legal, the authentication code to be verified is obtained from the legal authentication information;
如果所述待验证认证码与所述磁盘认证码匹配,则认为所述磁盘有效,并将所述磁盘认证码复制到所述磁盘的非法认证信息的存储区域;如果所述待验证认证码与所述磁盘认证码不匹配则认为所述磁盘无效。If the authentication code to be verified matches the disk authentication code, the disk is considered to be valid, and the disk authentication code is copied to a storage area of the illegal authentication information of the disk; if the authentication code to be verified is If the disk authentication code does not match, the disk is considered invalid.
可选地,将所述认证信息和所述磁盘认证码进行匹配,根据匹配结果判断所述磁盘的有效性包括:Optionally, the authentication information is matched with the disk authentication code, and determining the validity of the disk according to the matching result includes:
当所述第一认证信息与所述第二认证信息都合法时,则从所述第一认证信息中获取第一待验证认证码,从所述第二认证信息中获取第二待验证认证码;When the first authentication information and the second authentication information are both valid, the first to-be-verified authentication code is obtained from the first authentication information, and the second to-be-verified authentication code is obtained from the second authentication information. ;
如果所述第一待验证认证码与所述第二待验证认证码均与所述磁盘认证码匹配,则认为所述磁盘有效;如果所述第一待验证认证码与所述第二待验证认证码其中之一与所述磁盘认证码匹配,则认为所述磁盘有效,并将所述磁盘认证码复制到所述磁盘的不匹配的认证信息的存储区域;如果所述第一待验证认证码和所述第二待验证认证码均与所述磁盘认证码不匹配则认为所述磁盘无效。If the first to-be-verified authentication code and the second to-be-verified authentication code both match the disk authentication code, the disk is considered to be valid; if the first to-be-verified authentication code and the second to-be-verified If one of the authentication codes matches the disk authentication code, the disk is considered to be valid, and the disk authentication code is copied to a storage area of the disk that does not match the authentication information; if the first to-be-verified authentication is performed If the code and the second to-be-verified authentication code do not match the disk authentication code, the disk is considered invalid.
可选地,根据磁盘序列号信息和磁盘容量信息计算磁盘认证码包括:Optionally, calculating the disk authentication code according to the disk serial number information and the disk capacity information includes:
将所述磁盘序列号和所述磁盘容量通过信息-摘要算法MD5生成磁盘认证码;Generating the disk serial number and the disk capacity by using the information-digest algorithm MD5 to generate a disk authentication code;
所述磁盘认证码=MD5(MD5(磁盘的序列号)+MD5(磁盘容量))。The disk authentication code = MD5 (MD5 (serial number of the disk) + MD5 (disk capacity)).
本发明实施例还提供一种磁盘的认证方法,应用于计算机系统,所述方
法包括:The embodiment of the invention further provides a method for authenticating a disk, which is applied to a computer system, the party
The law includes:
获取磁盘序列号信息和磁盘容量信息;Obtain disk serial number information and disk capacity information;
根据所述磁盘序列号信息和所述磁盘容量信息生成磁盘认证码;Generating a disk authentication code according to the disk serial number information and the disk capacity information;
将所述磁盘认证码存储在所述磁盘的认证码存储区域中。The disk authentication code is stored in an authentication code storage area of the disk.
可选地,根据所述磁盘序列号信息和所述磁盘容量信息生成磁盘认证码包括:Optionally, generating the disk authentication code according to the disk serial number information and the disk capacity information includes:
将所述磁盘序列号和所述磁盘容量通过信息-摘要算法MD5生成磁盘认证码;Generating the disk serial number and the disk capacity by using the information-digest algorithm MD5 to generate a disk authentication code;
所述磁盘认证码=MD5(MD5(磁盘的序列号)+MD5(磁盘容量))。The disk authentication code = MD5 (MD5 (serial number of the disk) + MD5 (disk capacity)).
可选地,将所述磁盘认证码存储在所述磁盘的认证码存储区域中包括:Optionally, storing the disk authentication code in the authentication code storage area of the disk includes:
所述认证码存储区域包括第一认证码存储区域和第二认证码存储区域;The authentication code storage area includes a first authentication code storage area and a second authentication code storage area;
所述磁盘认证码同时存储于所述第一认证码存储区域和所述第二认证码存储区域。The disk authentication code is simultaneously stored in the first authentication code storage area and the second authentication code storage area.
本发明实施例还提供一种磁盘有效性的检测装置,应用于计算机系统,所述装置包括:The embodiment of the invention further provides a device for detecting the validity of a disk, which is applied to a computer system, and the device comprises:
计算模块,设置为根据磁盘序列号信息和磁盘容量信息计算磁盘认证码;a calculation module configured to calculate a disk authentication code according to the disk serial number information and the disk capacity information;
查找模块,设置为获取所述磁盘存储的认证信息;a search module, configured to obtain authentication information stored by the disk;
判断模块,设置为将所述认证信息和所述磁盘认证码进行匹配,根据匹配结果判断所述磁盘的有效性。The determining module is configured to match the authentication information and the disk authentication code, and determine the validity of the disk according to the matching result.
可选地,所述认证信息包括第一认证信息和第二认证信息;Optionally, the authentication information includes first authentication information and second authentication information;
所述第一认证信息存储于所述磁盘的第一认证码存储区域,所述第二认证信息存储于所述磁盘的第二认证码存储区域。The first authentication information is stored in a first authentication code storage area of the disk, and the second authentication information is stored in a second authentication code storage area of the disk.
可选地,判断模块是设置为:Optionally, the judging module is set to:
当所述第一认证信息与所述第二认证信息中的一个认证信息为合法时,则从合法的认证信息中获取待验证认证码;
When one of the first authentication information and the second authentication information is legal, the authentication code to be verified is obtained from the legal authentication information;
如果所述待验证认证码与所述磁盘认证码匹配,则认为所述磁盘有效,并将所述磁盘认证码复制到所述磁盘的非法认证信息的存储区域;如果所述待验证认证码与所述磁盘认证码不匹配则认为所述磁盘无效。If the authentication code to be verified matches the disk authentication code, the disk is considered to be valid, and the disk authentication code is copied to a storage area of the illegal authentication information of the disk; if the authentication code to be verified is If the disk authentication code does not match, the disk is considered invalid.
可选地,判断模块是设置为:Optionally, the judging module is set to:
当所述第一认证信息与所述第二认证信息都合法时,则从所述第一认证信息中获取第一待验证认证码,从所述第二认证信息中获取第二待验证认证码;When the first authentication information and the second authentication information are both valid, the first to-be-verified authentication code is obtained from the first authentication information, and the second to-be-verified authentication code is obtained from the second authentication information. ;
如果所述第一待验证认证码与所述第二待验证认证码均与所述磁盘认证码匹配,则认为所述磁盘有效;如果所述第一待验证认证码与所述第二待验证认证码其中之一与所述磁盘认证码匹配,则认为所述磁盘有效,并将所述磁盘认证码复制到不匹配的认证信息的存储区域;如果所述第一待验证认证码和所述第二待验证认证码均与所述磁盘认证码不匹配则认为所述磁盘无效。If the first to-be-verified authentication code and the second to-be-verified authentication code both match the disk authentication code, the disk is considered to be valid; if the first to-be-verified authentication code and the second to-be-verified If one of the authentication codes matches the disk authentication code, the disk is considered to be valid, and the disk authentication code is copied to a storage area of the unmatched authentication information; if the first to-be-verified authentication code and the If the second to-be-verified authentication code does not match the disk authentication code, the disk is considered invalid.
可选地,所述计算模块是设置为:Optionally, the computing module is configured to:
将所述磁盘序列号和所述磁盘容量通过信息-摘要算法MD5生成磁盘认证码;Generating the disk serial number and the disk capacity by using the information-digest algorithm MD5 to generate a disk authentication code;
所述磁盘认证码=MD5(MD5(磁盘的序列号)+MD5(磁盘容量))。The disk authentication code = MD5 (MD5 (serial number of the disk) + MD5 (disk capacity)).
本发明实施例还提供一种磁盘的认证装置,应用于计算机系统,所述装置包括:The embodiment of the invention further provides a disk authentication device, which is applied to a computer system, and the device includes:
信息获取模块,设置为获取磁盘序列号信息和磁盘容量信息;An information acquisition module, configured to obtain disk serial number information and disk capacity information;
计算模块,设置为根据所述磁盘序列号信息和所述磁盘容量信息生成磁盘认证码;a calculating module, configured to generate a disk authentication code according to the disk serial number information and the disk capacity information;
存储模块,设置为将所述磁盘认证码存储在所述磁盘的认证码存储区域中。And a storage module configured to store the disk authentication code in an authentication code storage area of the disk.
可选地,所述计算模块是设置为:Optionally, the computing module is configured to:
将所述磁盘序列号和所述磁盘容量通过信息-摘要算法MD5生成磁盘认证码;
Generating the disk serial number and the disk capacity by using the information-digest algorithm MD5 to generate a disk authentication code;
所述磁盘认证码=MD5(MD5(磁盘的序列号)+MD5(磁盘容量))。The disk authentication code = MD5 (MD5 (serial number of the disk) + MD5 (disk capacity)).
可选地,所述存储模块是设置为:Optionally, the storage module is configured to:
将所述磁盘认证码同时存储于所述磁盘的认证码存储区域的第一认证码存储区域和第二认证码存储区域。And storing the disk authentication code in the first authentication code storage area and the second authentication code storage area of the authentication code storage area of the disk.
本发明实施例还提供一种计算机可读存储介质,所述存储介质存储有计算机程序,该计算机程序包括程序指令,当该程序指令被计算机系统设备执行时,使得该设备可执行上述的磁盘有效性的检测方法。The embodiment of the present invention further provides a computer readable storage medium, where the storage medium stores a computer program, the computer program includes program instructions, when the program instruction is executed by the computer system device, enabling the device to execute the above-mentioned disk effective Sexual detection method.
本发明实施例还提供一种计算机可读存储介质,所述存储介质存储有计算机程序,该计算机程序包括程序指令,当该程序指令被计算机系统设备执行时,使得该设备可执行上述的磁盘的认证方法。The embodiment of the present invention further provides a computer readable storage medium, where the storage medium stores a computer program, the computer program includes program instructions, when the program instruction is executed by the computer system device, enabling the device to execute the disk. Authentication method.
上述方案对通过了计算机存储系统厂商认证的可靠磁盘添加磁盘认证码,计算机存储系统在运行时能够通过磁盘认证码来识别磁盘是否通过计算机存储系统厂商验证,禁止计算机存储系统使用未经过计算机存储系统厂商验证的不可靠磁盘,提供了安全性和可靠性。The above solution adds a disk authentication code to a reliable disk that has passed the certification of the computer storage system manufacturer. The computer storage system can identify whether the disk is verified by the computer storage system manufacturer through the disk authentication code during operation, and prohibits the use of the computer storage system without passing through the computer storage system. Vendor-verified unreliable disks provide security and reliability.
附图概述BRIEF abstract
图1是本发明实施例一中的计算机系统的结构示意图;1 is a schematic structural diagram of a computer system according to Embodiment 1 of the present invention;
图2是本发明实施例一中的磁盘有效性的检测方法的流程图;2 is a flowchart of a method for detecting validity of a disk in Embodiment 1 of the present invention;
图3是本发明实施例一中的磁盘认证的方法的流程图;3 is a flowchart of a method for disk authentication in Embodiment 1 of the present invention;
图4是本发明实施例一中的磁盘有效性的检测装置的结构示意图;4 is a schematic structural diagram of a device for detecting validity of a disk according to Embodiment 1 of the present invention;
图5是本发明实施例一中的磁盘认证的装置的结构示意图;FIG. 5 is a schematic structural diagram of an apparatus for disk authentication according to Embodiment 1 of the present invention; FIG.
图6是本发明实施例二中的磁盘认证的方法的另一流程图;6 is another flowchart of a method for disk authentication in Embodiment 2 of the present invention;
图7是本发明实施例二中的磁盘认证码存储示意图;7 is a schematic diagram of storage of a disk authentication code in Embodiment 2 of the present invention;
图8是本发明实施例三中的磁盘有效性的检测方法的另一流程图。FIG. 8 is another flow chart of a method for detecting validity of a disk in Embodiment 3 of the present invention.
本发明的较佳实施方式Preferred embodiment of the invention
下文中将结合附图对本申请的实施例进行详细说明。需要说明的是,在
不冲突的情况下,本申请中的实施例及实施例中的特征可以相互任意组合。Embodiments of the present application will be described in detail below with reference to the accompanying drawings. It should be noted that
In the case of no conflict, the embodiments in the present application and the features in the embodiments may be arbitrarily combined with each other.
实施例一Embodiment 1
本发明提供的一种磁盘有效性的检测方法以及认证方法应用于计算机系统。图1所示为计算机系统结构示意图,该计算机存储系统包括:磁盘、磁盘驱动单元、磁盘管理单元、磁盘智能检测单元、RAID(Redundant Arrays of independent Disks,独立磁盘冗余阵列)控制器单元、NAS(Network Attached Storage,网络附属存储)控制器单元、SAN(Storage Area Network,存储区域网络)控制器单元、磁阵控制器单元。The invention provides a method for detecting the validity of a disk and an authentication method applied to a computer system. FIG. 1 is a schematic structural diagram of a computer system including: a disk, a disk drive unit, a disk management unit, a disk intelligent detection unit, a RAID (Redundant Arrays of independent Disks) controller unit, and a NAS. (Network Attached Storage) controller unit, SAN (Storage Area Network) controller unit, and magnetic array controller unit.
其中,磁盘为用户在使用该存储系统装置时作为物理存储介质安装到存储系统上的物理磁盘,例如普通硬盘、固态硬盘(SSD)。The disk is a physical disk that is installed on the storage system as a physical storage medium when the user uses the storage system device, such as a normal hard disk or a solid state disk (SSD).
磁盘驱动单元,磁盘接入计算机存储系统之后,系统需要通过磁盘驱动单元来实现对物理磁盘的控制和数据读写。Disk drive unit, after the disk is connected to the computer storage system, the system needs to control the physical disk and read and write data through the disk drive unit.
磁盘管理单元,将磁盘驱动单元提供的接口抽象为计算机存储系统的存储接口即逻辑磁盘,并管理控制存储系统与物理磁盘之间的交互。The disk management unit abstracts the interface provided by the disk drive unit into a storage interface of the computer storage system, that is, a logical disk, and manages the interaction between the storage system and the physical disk.
磁盘智能检测单元,从磁盘管理单元中获取物理磁盘信息后进行智能检测处理,鉴定该磁盘是否为合法磁盘,并通知磁盘管理单元。The disk intelligent detection unit performs intelligent detection processing after obtaining physical disk information from the disk management unit, identifies whether the disk is a legitimate disk, and notifies the disk management unit.
RAID控制器单元,通过磁盘管理单元提供的逻辑磁盘进一步组织为一个RAID磁盘阵列,RAID阵列抽象为一个逻辑卷提供给上层应用使用。The RAID controller unit is further organized into a RAID disk array by the logical disk provided by the disk management unit, and the RAID array abstraction is provided to the upper layer application for one logical volume.
NAS控制器单元,以本地文件系统的形式管理逻辑卷,并对外提供NFS(Network File System,网络文件系统)、CIFS(Common Internet File System,通用网络文件系统)、FTP(File Transfer Protocol,文件传输协议)等文件服务功能。The NAS controller unit manages logical volumes in the form of a local file system and provides NFS (Network File System), CIFS (Common Internet File System), and FTP (File Transfer Protocol). Protocol) and other file service functions.
SAN控制器单元,将逻辑卷重新管理划分为逻辑盘以FC(Fibre Channel,网状通道)或者ISCSI(Internet Small Computer System Interface,Internet小型计算机系统接口)协议对外提供数据存储服务。The SAN controller unit divides the logical volume re-management into a logical disk to provide data storage services to the FC (Fibre Channel, Network Channel) or ISCSI (Internet Small Computer System Interface) protocol.
磁阵控制单元,通过SAS或者SATA(Serial Advanced Technology Attachment,串行高级技术附件)接口以逻辑磁盘的形式将逻辑卷提供给外部客户端使用。
The magnetic array control unit provides the logical volume to the external client in the form of a logical disk through the SAS or SATA (Serial Advanced Technology Attachment) interface.
如图2所示,本发明提供一种磁盘有效性的检测方法,应用于计算机系统,所述方法包括:As shown in FIG. 2, the present invention provides a method for detecting the validity of a disk, which is applied to a computer system, and the method includes:
步骤S101:根据磁盘序列号信息和磁盘容量信息计算磁盘认证码;Step S101: Calculate a disk authentication code according to the disk serial number information and the disk capacity information;
具体可以采取以下计算方式:Specifically, the following calculation methods can be adopted:
将磁盘序列号和所述磁盘容量通过信息-摘要算法MD5生成磁盘认证码;磁盘认证码=MD5(MD5(磁盘的序列号)+MD5(磁盘容量))。The disk serial number and the disk capacity are generated by the information-summary algorithm MD5 to generate a disk authentication code; the disk authentication code=MD5 (MD5 (disk serial number) + MD5 (disk capacity)).
计算机系统厂商可以对磁盘进行有效性验证,验证的方式可以采用对磁盘设定磁盘认证码,并把磁盘认证码封装一定的数据格式,并存储在磁盘的存储区域中。The computer system manufacturer can verify the validity of the disk. The verification method can set the disk authentication code to the disk, and encapsulate the disk authentication code into a certain data format and store it in the storage area of the disk.
步骤S102:获取磁盘存储的认证信息;Step S102: Acquire authentication information stored on the disk.
认证信息可以包括第一认证信息和第二认证信息;第一认证信息存储于磁盘的第一认证码存储区域,第二认证信息存储于所述磁盘的第二认证码存储区域。The authentication information may include first authentication information and second authentication information; the first authentication information is stored in a first authentication code storage area of the disk, and the second authentication information is stored in a second authentication code storage area of the disk.
步骤S103:将认证信息和磁盘认证码进行匹配,根据匹配结果判断磁盘的有效性。Step S103: Match the authentication information and the disk authentication code, and determine the validity of the disk according to the matching result.
具体包括以下内容:Specifically includes the following:
当第一认证信息与第二认证信息中其中一个认证信息为合法时,则从合法的认证信息中获取待验证认证码;如果该验证认证码与磁盘认证码匹配,则认为所述磁盘有效,并将磁盘认证码复制到非法认证信息的存储区域;如果该验证认证码与所述磁盘认证码不匹配则认为所述磁盘无效。When one of the first authentication information and the second authentication information is legal, the authentication code to be verified is obtained from the legal authentication information; if the verification authentication code matches the disk authentication code, the disk is considered to be valid. And copying the disk authentication code to the storage area of the illegal authentication information; if the verification authentication code does not match the disk authentication code, the disk is considered invalid.
当第一认证信息与第二认证信息都合法时,则从第一认证信息中获取第一待验证认证码,从第二认证信息中获取第二待验证认证码;如果第一待验证认证码与第二待验证认证码均与磁盘认证码匹配,则认为所述磁盘有效;如果第一待验证认证码与第二待验证认证码其中之一与磁盘认证码匹配,则认为磁盘有效,并将磁盘认证码复制到不匹配的认证信息的存储区域;如果所述第一待验证认证码和所述第二待验证认证码均与所述磁盘认证码不匹配则认为所述磁盘无效。
When the first authentication information and the second authentication information are both valid, the first to-be-verified authentication code is obtained from the first authentication information, and the second to-be-verified authentication code is obtained from the second authentication information; If the second to-be-verified authentication code matches the disk authentication code, the disk is considered to be valid; if one of the first to-be-verified authentication code and the second to-be-verified authentication code matches the disk authentication code, the disk is considered to be valid, and Copying the disk authentication code to the storage area of the unmatched authentication information; if the first to-be-verified authentication code and the second to-be-verified authentication code both do not match the disk authentication code, the disk is considered invalid.
如图3所示,本发明还提供一种磁盘的认证方法,应用于计算机系统,所述方法包括:As shown in FIG. 3, the present invention further provides a method for authenticating a magnetic disk, which is applied to a computer system, and the method includes:
步骤S111:获取磁盘序列号信息和磁盘容量信息;Step S111: Acquire disk serial number information and disk capacity information;
步骤S112:根据所述磁盘序列号信息和所述磁盘容量信息生成磁盘认证码;Step S112: Generate a disk authentication code according to the disk serial number information and the disk capacity information.
具体包括:Specifically include:
将所述磁盘序列号和所述磁盘容量通过信息-摘要算法MD5生成磁盘认证码;Generating the disk serial number and the disk capacity by using the information-digest algorithm MD5 to generate a disk authentication code;
所述磁盘认证码=MD5(MD5(磁盘的序列号)+MD5(磁盘容量))。The disk authentication code = MD5 (MD5 (serial number of the disk) + MD5 (disk capacity)).
步骤S113:将所述磁盘认证码存储在所述磁盘的认证码存储区域中。Step S113: Store the disk authentication code in an authentication code storage area of the disk.
将磁盘认证码存储在磁盘的认证码存储区域中包括:Storing the disk authentication code in the authentication code storage area of the disk includes:
认证码存储区域可以包括第一认证码存储区域和第二认证码存储区域;磁盘认证码同时存储于第一认证码存储区域和第二认证码存储区域。设定两个认证码存储区域的作用是为了防止一处被破坏之后可以通过另一处来检验校正。当然在其它的实施例中认证码存储区域的个数也可以设置为1个或者2个以上。The authentication code storage area may include a first authentication code storage area and a second authentication code storage area; the disk authentication code is simultaneously stored in the first authentication code storage area and the second authentication code storage area. The purpose of setting two authentication code storage areas is to prevent the correction from being verified by another location after one location is destroyed. Of course, in other embodiments, the number of authentication code storage areas may be set to one or two or more.
计算机存储系统厂商可以对其计算机存储系统产品进行认证,对于通过了厂商验证的可靠磁盘计算机存储系统厂家可以设置认证标记,计算机存储系统可以通过检测设置的认证标记自动检测磁盘可靠性。Computer storage system manufacturers can certify their computer storage system products. For reliable disk computer storage system manufacturers that have passed vendor verification, the certification mark can be set. The computer storage system can automatically detect disk reliability by detecting the set authentication mark.
如图4所示,本发明还提供一种磁盘有效性的检测装置,应用于计算机系统,所述装置包括处理器和程序存储设备,还包括:As shown in FIG. 4, the present invention further provides a device for detecting the validity of a disk, which is applied to a computer system, the device comprising a processor and a program storage device, and further comprising:
计算模块11,适用于根据磁盘序列号信息和磁盘容量信息计算磁盘认证码;The calculating module 11 is adapted to calculate a disk authentication code according to the disk serial number information and the disk capacity information;
查找模块12,适用于获取所述磁盘存储的认证信息;The searching module 12 is adapted to obtain the authentication information stored by the disk.
判断模块13,适用于将所述认证信息和所述磁盘认证码进行匹配,根据
匹配结果判断所述磁盘的有效性。The determining module 13 is adapted to match the authentication information and the disk authentication code according to
The matching result determines the validity of the disk.
较佳地,Preferably,
所述认证信息包括第一认证信息和第二认证信息;The authentication information includes first authentication information and second authentication information;
所述第一认证信息存储于所述磁盘的第一认证码存储区域,所述第二认证信息存储于所述磁盘的第二认证码存储区域。The first authentication information is stored in a first authentication code storage area of the disk, and the second authentication information is stored in a second authentication code storage area of the disk.
较佳地,Preferably,
判断模块13适用于将所述认证信息和所述磁盘认证码进行匹配,根据匹配结果判断所述磁盘的有效性是指:The determining module 13 is adapted to match the authentication information and the disk authentication code, and determining, according to the matching result, the validity of the disk is:
当所述第一认证信息与所述第二认证信息中其中一个认证信息为合法时,则从合法的认证信息中获取待验证认证码;When one of the first authentication information and the second authentication information is legal, the authentication code to be verified is obtained from the legal authentication information;
如果该验证认证码与所述磁盘认证码匹配,则认为所述磁盘有效,并将所述磁盘认证码复制到非法认证信息的存储区域;如果该验证认证码与所述磁盘认证码不匹配则认为所述磁盘无效。If the verification authentication code matches the disk authentication code, the disk is considered to be valid, and the disk authentication code is copied to a storage area of the illegal authentication information; if the verification authentication code does not match the disk authentication code, The disk is considered invalid.
较佳地,Preferably,
判断模块13适用于将所述认证信息和所述磁盘认证码进行匹配,根据匹配结果判断所述磁盘的有效性是指:The determining module 13 is adapted to match the authentication information and the disk authentication code, and determining, according to the matching result, the validity of the disk is:
当所述第一认证信息与所述第二认证信息都合法时,则从所述第一认证信息中获取第一待验证认证码,从所述第二认证信息中获取第二待验证认证码;When the first authentication information and the second authentication information are both valid, the first to-be-verified authentication code is obtained from the first authentication information, and the second to-be-verified authentication code is obtained from the second authentication information. ;
如果所述第一待验证认证码与所述第二待验证认证码均与所述磁盘认证码匹配,则认为所述磁盘有效;如果所述第一待验证认证码与所述第二待验证认证码其中之一与所述磁盘认证码匹配,则认为所述磁盘有效,并将所述磁盘认证码复制到不匹配的认证信息的存储区域;如果所述第一待验证认证码和所述第二待验证认证码均与所述磁盘认证码不匹配则认为所述磁盘无效。If the first to-be-verified authentication code and the second to-be-verified authentication code both match the disk authentication code, the disk is considered to be valid; if the first to-be-verified authentication code and the second to-be-verified If one of the authentication codes matches the disk authentication code, the disk is considered to be valid, and the disk authentication code is copied to a storage area of the unmatched authentication information; if the first to-be-verified authentication code and the If the second to-be-verified authentication code does not match the disk authentication code, the disk is considered invalid.
较佳地,Preferably,
所述计算模块11适用于根据磁盘序列号信息和磁盘容量信息计算磁盘
认证码是指:The calculating module 11 is adapted to calculate a disk according to the disk serial number information and the disk capacity information.
The authentication code means:
将所述磁盘序列号和所述磁盘容量通过信息-摘要算法MD5生成磁盘认证码;Generating the disk serial number and the disk capacity by using the information-digest algorithm MD5 to generate a disk authentication code;
所述磁盘认证码=MD5(MD5(磁盘的序列号)+MD5(磁盘容量))。The disk authentication code = MD5 (MD5 (serial number of the disk) + MD5 (disk capacity)).
如图5所示,本发明还提供一种磁盘的认证装置,应用于计算机系统,所述装置包括处理器和程序存储设备,还包括:As shown in FIG. 5, the present invention further provides a disk authentication device, which is applied to a computer system, the device includes a processor and a program storage device, and further includes:
信息获取模块21,适用于获取磁盘序列号信息和磁盘容量信息;The information obtaining module 21 is adapted to obtain the disk serial number information and the disk capacity information;
计算模块22,适用于根据所述磁盘序列号信息和所述磁盘容量信息生成磁盘认证码;The calculating module 22 is adapted to generate a disk authentication code according to the disk serial number information and the disk capacity information;
存储模块23,适用于将所述磁盘认证码存储在所述磁盘的认证码存储区域中。The storage module 23 is adapted to store the disk authentication code in an authentication code storage area of the disk.
较佳地,Preferably,
所述计算模块适用于根据所述磁盘序列号信息和所述磁盘容量信息生成磁盘认证码是指:The calculating module is adapted to generate a disk authentication code according to the disk serial number information and the disk capacity information:
将所述磁盘序列号和所述磁盘容量通过信息-摘要算法MD5生成磁盘认证码;Generating the disk serial number and the disk capacity by using the information-digest algorithm MD5 to generate a disk authentication code;
所述磁盘认证码=MD5(MD5(磁盘的序列号)+MD5(磁盘容量))。The disk authentication code = MD5 (MD5 (serial number of the disk) + MD5 (disk capacity)).
较佳地,Preferably,
存储模块适用于将所述磁盘认证码存储在所述磁盘的认证码存储区域中是指:The storing module is adapted to store the disk authentication code in the authentication code storage area of the disk, where:
所述认证码存储区域包括第一认证码存储区域和第二认证码存储区域;The authentication code storage area includes a first authentication code storage area and a second authentication code storage area;
所述磁盘认证码同时存储于所述第一认证码存储区域和所述第二认证码存储区域。The disk authentication code is simultaneously stored in the first authentication code storage area and the second authentication code storage area.
实施例二
Embodiment 2
下面结合附图和具体实施例对本发明的技术方案进一步详细阐述。The technical solutions of the present invention are further elaborated below in conjunction with the accompanying drawings and specific embodiments.
如图6所示为本发明实施例的一种磁盘认证方法,如图6所示该方法包含读取磁盘序列号和容量信息、计算磁盘认证码、存储认证码和反馈磁盘标记结果四个步骤。FIG. 6 is a schematic diagram of a disk authentication method according to an embodiment of the present invention. As shown in FIG. 6, the method includes four steps of reading a disk serial number and capacity information, calculating a disk authentication code, storing an authentication code, and feeding back a disk marking result. .
步骤201,系统通过软件获取验证通过的磁盘的序列号和磁盘容量,为后续生成认证码提供必要参数,如果获取序列号或者磁盘容量失败则提示标记认证磁盘失败。Step 201: The system obtains the serial number and disk capacity of the verified disk through the software, and provides necessary parameters for generating the authentication code subsequently. If the serial number or the disk capacity fails, the system fails to mark the authentication disk.
步骤202,在步骤201获取了磁盘序列号和容量基础上,将序列号和容量组合生成一个认证码,所述序列号和磁盘容量生成认证码算法采用MD5加密算法实现:Step 202: On the basis of obtaining the serial number and capacity of the disk in step 201, the serial number and the capacity are combined to generate an authentication code, and the serial number and the disk capacity generation authentication code algorithm are implemented by using the MD5 encryption algorithm:
例如,获取磁盘序列号:A=6SJ7B33F0000N4054THU;For example, obtain the disk serial number: A=6SJ7B33F0000N4054THU;
磁盘容量为2000398934016bytes取B=2000398934016;The disk capacity is 2000398934016bytes and B=2000398934016;
X=MD5(A)+MD5(B);X=MD5(A)+MD5(B);
认证码=MD5(X);Authentication code = MD5 (X);
根据上述磁盘序列号和容量值可计算得到一个认证码:BD2D991D38CCAFE5630B7FEB87A1AAC0。如果产生认证码失败,则反馈错误结束标记该磁盘。According to the above disk serial number and capacity value, an authentication code can be calculated: BD2D991D38CCAFE5630B7FEB87A1AAC0. If the authentication code fails to be generated, the feedback error ends marking the disk.
步骤203,将步骤202生成的认证码封装成一个固定的数据格式,分别写入磁盘的两处固定区域作为主备信息,防止一处被破坏之后可以通过另一处来检验校正,具体结构形式如图7所示。 Step 203, the authentication code generated in step 202 is encapsulated into a fixed data format, and respectively written into two fixed areas of the disk as the primary and backup information, so as to prevent the correction from being corrected after another place is destroyed, the specific structural form As shown in Figure 7.
步骤204,检查设置为认证信息存放区域的磁盘两处空间的数据,检验写入数据是否正确。如果正确提示磁盘标记成功,如果失败则反馈磁盘标记错误信息。Step 204: Check data of two spaces of the disk set as the authentication information storage area, and check whether the written data is correct. If the disk tag is successfully prompted to be successful, the disk is flagged with an error message if it fails.
实施例三、Embodiment 3
如图8所示为本发明实施例的一种磁盘有效性的检测方法,具体包括:FIG. 8 is a schematic diagram of a method for detecting validity of a disk according to an embodiment of the present invention, which specifically includes:
步骤301,获取磁盘序列号和磁盘容量,通过使用步骤202所述算法计
算出待鉴定磁盘的磁盘认证码; Step 301, obtaining a disk serial number and a disk capacity, by using the algorithm described in step 202.
Calculate the disk authentication code of the disk to be authenticated;
步骤302,读取如图7所示的磁盘固定两处区域的认证信息,并检查获取的两组认证信息的格式是否合法。Step 302: Read the authentication information of the two areas fixed by the disk as shown in FIG. 7, and check whether the format of the obtained two sets of authentication information is legal.
步骤303,如果获取的两组认证信息只有一组合法,只从合法的那组数据中提取认证码(如果都合法则进行步骤305),提取出的认证码与步骤401得到的所述磁盘认证码进行匹配。如果匹配失败,则通知计算机存储系统该磁盘为非法磁盘禁止使用。Step 303: If only one set of the obtained two sets of authentication information is legal, only the authentication code is extracted from the legal set of data (step 305 if all are legal), and the extracted authentication code and the disk authentication code obtained in step 401 are obtained. Make a match. If the match fails, the computer storage system is notified that the disk is illegal for use.
步骤304,步骤303中提取的认证码与所述磁盘认证码匹配则将所述磁盘认证码或合法的那组认证信息复制写入磁盘中另一存放非法认证信息的区域,并通知系统该磁盘为可使用的认证磁盘。Step 304: If the authentication code extracted in step 303 matches the disk authentication code, copy the disk authentication code or the legal group of authentication information to another area on the disk where the illegal authentication information is stored, and notify the system of the disk. Is an authentication disk that can be used.
步骤305,如果步骤302获取的两组认证信息的格式均合法,则检查从两个区域中获取的两组认证信息是否一致。Step 305: If the format of the two sets of authentication information obtained in step 302 is legal, check whether the two sets of authentication information obtained from the two areas are consistent.
步骤306,如果步骤305检查两组认证信息一致(如果不一致则进行步骤307),在任一组认证信息中提取出认证码。将提取出的认证码与步骤301得到的磁盘认证码匹配。如果认证码匹配正确就通知计算机存储系统该磁盘是经过厂商验证的认证磁盘可以使用,否则通知计算机存储系统该磁盘为未经厂家检验的非法磁盘禁止使用。Step 306, if step 305 checks that the two sets of authentication information are consistent (if not, proceed to step 307), and extract the authentication code from any of the group of authentication information. The extracted authentication code is matched with the disk authentication code obtained in step 301. If the authentication code matches correctly, notify the computer storage system that the disk is a vendor-certified authentication disk. Otherwise, notify the computer storage system that the disk is forbidden to use the illegal disk that has not been verified by the manufacturer.
步骤307,从两组认证信息中提取出两个认证码,将两个认证码分别与步骤301得到的磁盘认证码进行匹配。如果两个认证码都匹配失败,就通知计算机存储系统该磁盘未经厂商检验禁止使用。Step 307: Extract two authentication codes from the two sets of authentication information, and match the two authentication codes with the disk authentication code obtained in step 301. If both authentication codes fail to match, the computer storage system is notified that the disk is not used by the manufacturer.
步骤308,如果两个认证码中有一个匹配正确,则将所述正确验证码或提取出匹配认证码的认证信息复制写入另一个存放错误认证信息的区域,再通知计算机存储系统该磁盘是经过厂商检验过的可靠磁盘可以使用。 Step 308, if one of the two authentication codes matches correctly, copy the correct verification code or the authentication information that is extracted with the matching authentication code into another area where the error authentication information is stored, and then notify the computer storage system that the disk is A reliable disk that has been tested by the manufacturer can be used.
需要说明的是,在其它的实施例中不限于上述执行步骤,还可以按照其它的执行顺序检测磁盘认证码是否有效果。It should be noted that, in other embodiments, the foregoing execution steps are not limited, and it is also possible to detect whether the disk authentication code has an effect according to other execution orders.
以上所述仅为本发明的较佳实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和
原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序来指令相关硬件完成,所述程序可以存储于计算机可读存储介质中,如只读存储器、磁盘或光盘等。可选地,上述实施例的全部或部分步骤也可以使用一个或多个集成电路来实现,相应地,上述实施例中的各模块/模块可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。本申请不限制于任何特定形式的硬件和软件的结合。The above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Where in the spirit of the present invention
Any modifications, equivalent substitutions, improvements, etc. made within the scope of the present invention are intended to be included within the scope of the present invention. One of ordinary skill in the art will appreciate that all or a portion of the steps described above can be accomplished by a program that instructs the associated hardware, such as a read-only memory, a magnetic or optical disk, and the like. Optionally, all or part of the steps of the foregoing embodiments may also be implemented by using one or more integrated circuits. Accordingly, each module/module in the foregoing embodiment may be implemented in the form of hardware, or may be implemented by using a software function module. Formal realization. This application is not limited to any specific combination of hardware and software.
本发明实施例提供的技术方案对通过了计算机存储系统厂商认证的可靠磁盘添加磁盘认证码,计算机存储系统在运行时能够通过磁盘认证码来识别磁盘是否通过计算机存储系统厂商验证,提供了安全性和可靠性。
The technical solution provided by the embodiment of the present invention adds a disk authentication code to a reliable disk that has passed the certification of the computer storage system manufacturer. The computer storage system can identify whether the disk is verified by the computer storage system manufacturer through the disk authentication code during operation, and provides security. And reliability.
Claims (18)
- 一种磁盘有效性的检测方法,应用于计算机系统,所述方法包括:A method for detecting disk validity is applied to a computer system, the method comprising:根据磁盘序列号信息和磁盘容量信息计算磁盘认证码;Calculate the disk authentication code according to the disk serial number information and the disk capacity information;获取所述磁盘存储的认证信息;Obtaining the authentication information stored by the disk;将所述认证信息和所述磁盘认证码进行匹配,根据匹配结果判断所述磁盘的有效性。Matching the authentication information and the disk authentication code, and determining the validity of the disk according to the matching result.
- 如权利要求1所述的方法,其中:The method of claim 1 wherein:所述认证信息包括第一认证信息和第二认证信息;The authentication information includes first authentication information and second authentication information;所述第一认证信息存储于所述磁盘的第一认证码存储区域,所述第二认证信息存储于所述磁盘的第二认证码存储区域。The first authentication information is stored in a first authentication code storage area of the disk, and the second authentication information is stored in a second authentication code storage area of the disk.
- 如权利要求2所述的方法,其中:The method of claim 2 wherein:将所述认证信息和所述磁盘认证码进行匹配,根据匹配结果判断所述磁盘的有效性包括:Matching the authentication information with the disk authentication code, and determining, according to the matching result, the validity of the disk includes:当所述第一认证信息与所述第二认证信息中的一个认证信息合法时,从合法的认证信息中获取待验证认证码;When the one of the first authentication information and the second authentication information is legal, the authentication code to be verified is obtained from the legal authentication information;如果所述待验证认证码与所述磁盘认证码匹配,则认为所述磁盘有效,并将所述磁盘认证码复制到所述磁盘的非法认证信息的存储区域;如果所述待验证认证码与所述磁盘认证码不匹配,则认为所述磁盘无效。If the authentication code to be verified matches the disk authentication code, the disk is considered to be valid, and the disk authentication code is copied to a storage area of the illegal authentication information of the disk; if the authentication code to be verified is If the disk authentication code does not match, the disk is considered invalid.
- 如权利要求2所述的方法,其中:The method of claim 2 wherein:将所述认证信息和所述磁盘认证码进行匹配,根据匹配结果判断所述磁盘的有效性包括:Matching the authentication information with the disk authentication code, and determining, according to the matching result, the validity of the disk includes:当所述第一认证信息与所述第二认证信息都合法时,则从所述第一认证信息中获取第一待验证认证码,从所述第二认证信息中获取第二待验证认证码;When the first authentication information and the second authentication information are both valid, the first to-be-verified authentication code is obtained from the first authentication information, and the second to-be-verified authentication code is obtained from the second authentication information. ;如果所述第一待验证认证码与所述第二待验证认证码均与所述磁盘认证码匹配,则认为所述磁盘有效;如果所述第一待验证认证码与所述第二待验证认证码其中之一与所述磁盘认证码匹配,则认为所述磁盘有效,将所述磁 盘认证码复制到所述磁盘的不匹配的认证信息的存储区域;如果所述第一待验证认证码和所述第二待验证认证码均与所述磁盘认证码不匹配,则认为所述磁盘无效。If the first to-be-verified authentication code and the second to-be-verified authentication code both match the disk authentication code, the disk is considered to be valid; if the first to-be-verified authentication code and the second to-be-verified If one of the authentication codes matches the disk authentication code, the disk is considered to be valid, and the magnetic The disc authentication code is copied to the storage area of the mismatched authentication information of the disk; if the first to-be-verified authentication code and the second to-be-verified authentication code both do not match the disk authentication code, the The disk is invalid.
- 如权利要求1至4任一所述的方法,其中:A method as claimed in any one of claims 1 to 4 wherein:根据磁盘序列号信息和磁盘容量信息计算磁盘认证码包括:Calculating the disk authentication code based on the disk serial number information and the disk capacity information includes:将所述磁盘序列号和所述磁盘容量通过信息-摘要算法MD5生成磁盘认证码;Generating the disk serial number and the disk capacity by using the information-digest algorithm MD5 to generate a disk authentication code;所述磁盘认证码=MD5(MD5(磁盘的序列号)+MD5(磁盘容量))。The disk authentication code = MD5 (MD5 (serial number of the disk) + MD5 (disk capacity)).
- 一种磁盘的认证方法,应用于计算机系统,所述方法包括:A disk authentication method is applied to a computer system, the method comprising:获取磁盘序列号信息和磁盘容量信息;Obtain disk serial number information and disk capacity information;根据所述磁盘序列号信息和所述磁盘容量信息生成磁盘认证码;Generating a disk authentication code according to the disk serial number information and the disk capacity information;将所述磁盘认证码存储在所述磁盘的认证码存储区域中。The disk authentication code is stored in an authentication code storage area of the disk.
- 如权利要求6所述的方法,其中:The method of claim 6 wherein:根据所述磁盘序列号信息和所述磁盘容量信息生成磁盘认证码包括:Generating the disk authentication code according to the disk serial number information and the disk capacity information includes:将所述磁盘序列号和所述磁盘容量通过信息-摘要算法MD5生成磁盘认证码;Generating the disk serial number and the disk capacity by using the information-digest algorithm MD5 to generate a disk authentication code;所述磁盘认证码=MD5(MD5(磁盘的序列号)+MD5(磁盘容量))。The disk authentication code = MD5 (MD5 (serial number of the disk) + MD5 (disk capacity)).
- 如权利要求6至7任一所述的方法,其中:A method according to any one of claims 6 to 7, wherein:将所述磁盘认证码存储在所述磁盘的认证码存储区域中包括:Storing the disk authentication code in the authentication code storage area of the disk includes:所述认证码存储区域包括第一认证码存储区域和第二认证码存储区域;The authentication code storage area includes a first authentication code storage area and a second authentication code storage area;所述磁盘认证码同时存储于所述第一认证码存储区域和所述第二认证码存储区域。The disk authentication code is simultaneously stored in the first authentication code storage area and the second authentication code storage area.
- 一种磁盘有效性的检测装置,应用于计算机系统,所述装置包括:A disk validity detecting device is applied to a computer system, the device comprising:计算模块,设置为根据磁盘序列号信息和磁盘容量信息计算磁盘认证码;a calculation module configured to calculate a disk authentication code according to the disk serial number information and the disk capacity information;查找模块,设置为获取所述磁盘存储的认证信息; a search module, configured to obtain authentication information stored by the disk;判断模块,设置为将所述认证信息和所述磁盘认证码进行匹配,根据匹配结果判断所述磁盘的有效性。The determining module is configured to match the authentication information and the disk authentication code, and determine the validity of the disk according to the matching result.
- 如权利要求9所述的装置,其中:The apparatus of claim 9 wherein:所述认证信息包括第一认证信息和第二认证信息;The authentication information includes first authentication information and second authentication information;所述第一认证信息存储于所述磁盘的第一认证码存储区域,所述第二认证信息存储于所述磁盘的第二认证码存储区域。The first authentication information is stored in a first authentication code storage area of the disk, and the second authentication information is stored in a second authentication code storage area of the disk.
- 如权利要求10所述的装置,其中:The apparatus of claim 10 wherein:判断模块是设置为:The judgment module is set to:当所述第一认证信息与所述第二认证信息中的一个认证信息合法时,从合法的认证信息中获取待验证认证码;When the one of the first authentication information and the second authentication information is legal, the authentication code to be verified is obtained from the legal authentication information;如果所述待验证认证码与所述磁盘认证码匹配,则认为所述磁盘有效,并将所述磁盘认证码复制到所述磁盘的非法认证信息的存储区域;如果所述待验证认证码与所述磁盘认证码不匹配,则认为所述磁盘无效。If the authentication code to be verified matches the disk authentication code, the disk is considered to be valid, and the disk authentication code is copied to a storage area of the illegal authentication information of the disk; if the authentication code to be verified is If the disk authentication code does not match, the disk is considered invalid.
- 如权利要求10所述的装置,其中:The apparatus of claim 10 wherein:判断模块是设置为:The judgment module is set to:当所述第一认证信息与所述第二认证信息都合法时,从所述第一认证信息中获取第一待验证认证码,从所述第二认证信息中获取第二待验证认证码;When the first authentication information and the second authentication information are both valid, the first to-be-verified authentication code is obtained from the first authentication information, and the second to-be-verified authentication code is obtained from the second authentication information;如果所述第一待验证认证码与所述第二待验证认证码均与所述磁盘认证码匹配,则认为所述磁盘有效;如果所述第一待验证认证码与所述第二待验证认证码其中之一与所述磁盘认证码匹配,则认为所述磁盘有效,并将所述磁盘认证码复制到不匹配的认证信息的存储区域;如果所述第一待验证认证码和所述第二待验证认证码均与所述磁盘认证码不匹配,则认为所述磁盘无效。If the first to-be-verified authentication code and the second to-be-verified authentication code both match the disk authentication code, the disk is considered to be valid; if the first to-be-verified authentication code and the second to-be-verified If one of the authentication codes matches the disk authentication code, the disk is considered to be valid, and the disk authentication code is copied to a storage area of the unmatched authentication information; if the first to-be-verified authentication code and the If the second to-be-verified authentication code does not match the disk authentication code, the disk is considered invalid.
- 如权利要求9至12任一所述的装置,其中:A device according to any of claims 9 to 12, wherein:所述计算模块是设置为:The calculation module is set to:将所述磁盘序列号和所述磁盘容量通过信息-摘要算法MD5生成磁盘认 证码;And generating the disk serial number and the disk capacity by using the information-digest algorithm MD5 Certificate code所述磁盘认证码=MD5(MD5(磁盘的序列号)+MD5(磁盘容量))。The disk authentication code = MD5 (MD5 (serial number of the disk) + MD5 (disk capacity)).
- 一种磁盘的认证装置,应用于计算机系统,所述装置包括:A disk authentication device is applied to a computer system, the device comprising:信息获取模块,设置为获取磁盘序列号信息和磁盘容量信息;An information acquisition module, configured to obtain disk serial number information and disk capacity information;计算模块,设置为根据所述磁盘序列号信息和所述磁盘容量信息生成磁盘认证码;a calculating module, configured to generate a disk authentication code according to the disk serial number information and the disk capacity information;存储模块,设置为将所述磁盘认证码存储在所述磁盘的认证码存储区域中。And a storage module configured to store the disk authentication code in an authentication code storage area of the disk.
- 如权利要求14所述的装置,其中:The apparatus of claim 14 wherein:所述计算模块是设置为:The calculation module is set to:将所述磁盘序列号和所述磁盘容量通过信息-摘要算法MD5生成磁盘认证码;Generating the disk serial number and the disk capacity by using the information-digest algorithm MD5 to generate a disk authentication code;所述磁盘认证码=MD5(MD5(磁盘的序列号)+MD5(磁盘容量))。The disk authentication code = MD5 (MD5 (serial number of the disk) + MD5 (disk capacity)).
- 如权利要求14至15任一所述的装置,其中:A device according to any of claims 14 to 15, wherein:所述存储模块是设置为:The storage module is set to:将所述磁盘认证码同时存储于所述磁盘的认证码存储区域的第一认证码存储区域和第二认证码存储区域。And storing the disk authentication code in the first authentication code storage area and the second authentication code storage area of the authentication code storage area of the disk.
- 一种计算机可读存储介质,所述存储介质存储有计算机程序,该计算机程序包括程序指令,当该程序指令被计算机系统设备执行时,使得该设备可执行权利要求1-5任一项的方法。A computer readable storage medium storing a computer program, the computer program comprising program instructions, when executed by a computer system device, causing the device to perform the method of any of claims 1-5 .
- 一种计算机可读存储介质,所述存储介质存储有计算机程序,该计算机程序包括程序指令,当该程序指令被计算机系统设备执行时,使得该设备可执行权利要求6-8任一项的方法。 A computer readable storage medium storing a computer program, the computer program comprising program instructions, when executed by a computer system device, causing the device to perform the method of any one of claims 6-8 .
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410614440.6 | 2014-11-04 | ||
CN201410614440.6A CN105631304A (en) | 2014-11-04 | 2014-11-04 | Method for detecting validity of magnetic disk, method for authenticating validity of magnetic disk, and corresponding device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016070537A1 true WO2016070537A1 (en) | 2016-05-12 |
Family
ID=55908463
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/074029 WO2016070537A1 (en) | 2014-11-04 | 2015-03-11 | Disk validity detection method, authentication method and related device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105631304A (en) |
WO (1) | WO2016070537A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109783031B (en) * | 2019-01-23 | 2022-02-18 | 郑州云海信息技术有限公司 | Method, device, terminal and storage medium for checking drive letter and slot number of RAID card |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101398791A (en) * | 2007-09-25 | 2009-04-01 | 神州亿品科技有限公司 | Method for automatically monitoring USB disc |
WO2010075703A1 (en) * | 2008-12-31 | 2010-07-08 | 中兴通讯股份有限公司 | Mehtod and device of multiple disks grouping hot standby in distributed file system |
CN101984400A (en) * | 2010-11-05 | 2011-03-09 | 成都市华为赛门铁克科技有限公司 | RAID control method, device and system |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1287299C (en) * | 2004-03-25 | 2006-11-29 | 四川汇源光通信股份有限公司 | Logic magnetic disk authentication method |
CN100462991C (en) * | 2006-12-28 | 2009-02-18 | 北京飞天诚信科技有限公司 | Method and system for restore hardware mark |
CN103777903A (en) * | 2014-01-23 | 2014-05-07 | 武汉市烽视威科技有限公司 | Data storage method applicable for media streaming service |
-
2014
- 2014-11-04 CN CN201410614440.6A patent/CN105631304A/en not_active Withdrawn
-
2015
- 2015-03-11 WO PCT/CN2015/074029 patent/WO2016070537A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101398791A (en) * | 2007-09-25 | 2009-04-01 | 神州亿品科技有限公司 | Method for automatically monitoring USB disc |
WO2010075703A1 (en) * | 2008-12-31 | 2010-07-08 | 中兴通讯股份有限公司 | Mehtod and device of multiple disks grouping hot standby in distributed file system |
CN101984400A (en) * | 2010-11-05 | 2011-03-09 | 成都市华为赛门铁克科技有限公司 | RAID control method, device and system |
Also Published As
Publication number | Publication date |
---|---|
CN105631304A (en) | 2016-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102937922B (en) | Inquiry and repair data | |
US9652408B2 (en) | System and method for providing data integrity | |
US10720225B2 (en) | Information processing apparatus, control method thereof, and storage mediumMD | |
CN103530548B (en) | Startup method that built-in terminal based on mobile trustable computation module is credible | |
TWI443517B (en) | Memory stroage apparatus, memory controller and password verification method | |
US11601281B2 (en) | Managing user profiles securely in a user environment | |
US10581602B2 (en) | End-to-end checksum in a multi-tenant encryption storage system | |
US11481284B2 (en) | Systems and methods for generating self-notarized backups | |
US12052346B2 (en) | Secure secret recovery | |
US10877830B1 (en) | Remote storage device destruction | |
WO2019210844A1 (en) | Anomaly detection method and apparatus for storage device, and distributed storage system | |
US20150256344A1 (en) | Memory system and method of generating management information | |
EP2568655A2 (en) | Method for authenticating a storage device, machine-readable storage medium, and host device | |
US9965625B2 (en) | Control system and authentication device | |
US11372555B2 (en) | Reconstructing data in a smart storage array | |
WO2016070537A1 (en) | Disk validity detection method, authentication method and related device | |
CN102520223A (en) | Software anti-interference method used for electric energy meter | |
US9946853B1 (en) | Techniques for application code obfuscation | |
JP2008257279A (en) | Integrity enhancement method for file system | |
US10536525B2 (en) | Consistency level driven data storage in a dispersed storage network | |
US10387252B2 (en) | Synchronously storing data in a plurality of dispersed storage networks | |
WO2018218814A1 (en) | Method for storing off-line transaction record, and computer device and storage medium | |
US12008109B2 (en) | Cloud based boot integrity | |
US9128953B1 (en) | Asynchronous multi-node filesystem coordinated replication | |
JP6293216B2 (en) | Information processing apparatus, control method, and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15857658 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15857658 Country of ref document: EP Kind code of ref document: A1 |