Method for realizing secure access of data in hard disk

A data security and hard disk technology, applied in the fields of digital data protection, electronic digital data processing, computer security devices, etc., can solve the problems of high risk of leakage, leakage of confidential data, increased risk of carrying and storage, etc., so as to reduce the risk of leakage and improve the safety effect

Active Publication Date: 2012-06-20
GUANGZHOU SHINE TECH
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the process of information management, the hard disk, as the most important storage device of the computer, stores a large amount of data, some of which inevitably involve some important internal documents or confidential information, which need to be viewed by people with certain authority , therefore, in order to prevent people not within the scope of authority from illegally viewing these confidential data, people need to protect the confidential data. There are two commonly used protection methods: one is to use encryption software to create an encrypted directory and store it in the encrypted directory The data in the encrypted directory will be automatically encrypted. You must first enter the authorized password to decrypt the data in the encrypted directory before opening the encrypted directory normally. In this way, people who are not within the scope of authority cannot open the encrypted directory because they do not have an authorized password. However, although this method It has a certain protective effect, but with the development of information technology, the encryption software is more likely to be cracked, so the risk of confidential data leakage is higher; another method is to store confidential data in mobile storage devices, such as U Disk, mobile hard disk, memory card, etc. Although this can prevent the problem of illegal viewing of confidential data stored in the computer, it also increases the risk of carrying and storage. Once the mobile storage device is lost, the chance of confidential data leakage is very small. bigger
[0006] In view of this, it is necessary to provide a method for people to realize safe access to hard disk data, so as to solve the problem of high leakage risk of the above-mentioned existing protection methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing secure access of data in hard disk
  • Method for realizing secure access of data in hard disk
  • Method for realizing secure access of data in hard disk

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0030] The present invention is a method for realizing safe access to hard disk data. The method creates a safe space on the hard disk and monitors the safe space. Attributes such as the size of the safe space, the drive letter, and the encryption algorithm can all be set at the time of creation. The encryption algorithm It can be any one of AES, Twofish, and Serpent. After the secure space is created, the data written in the secure space will be automatically encrypted according to the encryption algorithm. This mainly involves the I / O interface call of the WINDOWS operating system and the establishment of a virtual disk. As well as file encryption and other mature common technologies. In order to review the access rights, after the safe space is created, it is necessary to associate the safe space with the USB KEY and set the protection passw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing secure access of data in a hard disk. The method is realized by the following steps: establishing a secure space on the hard disk and monitoring the secure space; automatically encrypting the data written in the secure space; associating the secure space with a USBKEY; and setting protection passwords required for opening the secure space. When the data in the secure space is accessed, USBKEY authentication and passwords authentication are carried out in sequence, the secure space can be opened only after the double authentication; and when the situation that the data in the secure space is accessed but the secure space is not opened is monitored, whether the USBKEY authentication passes or not is checked, if not, the accessing is blocked, and a preset ISMG (internet short message gateway) or/and an instant communication port is/are used for sending an alarm information to a user. In the invention, by virtue of the double authentication and the monitoring on the secure space, the secret-divulging risk is reduced, the effects of safety, rapidness and easiness in use are achieved, and the active defense and active alarming are also realized, therefore, the safety is improved to the maximum extent.

Description

[0001] technical field [0002] The invention relates to the technology in the field of hard disk data management, in particular to a method for realizing safe access to hard disk data. [0003] Background technique [0004] With the rapid development of information technology, the performance of computer hardware has been continuously improved, which has greatly promoted the informatization process of all walks of life in society. Almost all enterprises and government departments are constantly carrying out business informatization transformation in order to use Information management to improve the efficiency of enterprises and government departments and reduce the number of staff in enterprises and government departments. [0005] In the process of information management, the hard disk, as the most important storage device of the computer, stores a large amount of data, some of which inevitably involve some important internal documents or confidential information, which ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/00G06F21/62
Inventor 熊卫
Owner GUANGZHOU SHINE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products