Data security protection method and device

A technology of data security and protection device, applied in the field of storage security, can solve problems such as the inability to judge whether the storage device is in a legal use state, the storage device not providing the self-destruction function, and the brute force cracking.

Inactive Publication Date: 2009-04-08
HUAWEI DIGITAL TECH (CHENGDU) CO LTD
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process of realizing the present invention, the inventors found that there are at least the following problems in the prior art: the existing HDD-based data security protection scheme mainly manages the access authority of the data storage device. It is impossible to judge...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security protection method and device
  • Data security protection method and device
  • Data security protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0031] One is that the authentication can be performed by the IP address segment or MAC address segment of the computer that is allowed to access the SSD preset in step S11, and the application system will request the IP address segment or MAC address segment of the computer that uses the SSD to establish with step S11 If the IP address or MAC address of the computer is in the address database, it means that the SSD is allowed to be used by the computer, and the authentication is successful, and then proceed to step S14, otherwise it means that the SSD is not allowed to be used by the computer , the authentication was unsuccessful.

[0032] The other is to ask the computer user who requests to use the SSD to input the user name and password. If the user name and password match, the authentication is successful and step S14 is performed, otherwise the authentication is unsuccessful.

[0033] The other is to compare and search the fingerprint information of the computer user req...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a data security protection method which comprises the following steps: access right authentification is carried out on access users according to the confidential conditions preset in a solid state disk; if the authentification is not passed, data self-destruction is carried out according to a data self-destruction method preset in the solid state disk. The embodiment of the invention also provides a data security protection device. When the solid state disk is in the state of illegal possession or use, the data self-destruction function can be realized by self-operation of the device, thus better ensuring the data security and preventing confidential data from illegal disclosure.

Description

technical field [0001] The invention relates to the technical field of storage security, in particular to a data security protection method and device. Background technique [0002] SSD (Solid State Disk / Drive), also known as solid state disk or electronic disk, as a new storage medium, based on Nand Flash, simulates the basic access mode of dynamic random access memory, and can achieve high-speed data random access transmission. The traditional mechanical hard disk HDD (Hard Disk Drive) uses magnetic media as the storage medium, and data is stored on the magnetic tracks of the hard disk. Not only that, SSD also has its own advantages in data security protection compared to traditional mechanical hard disk HDD. [0003] In the process of realizing the present invention, the inventors found that there are at least the following problems in the prior art: the existing HDD-based data security protection scheme mainly manages the access authority of the data storage device. I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14
Inventor 王黎明
Owner HUAWEI DIGITAL TECH (CHENGDU) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products