Disk array and computer or storage medium authentication method and system

A disk array and storage medium technology, applied in the field of computer information storage technology and security, can solve problems such as hidden dangers of data security, untrustworthy certification of disk arrays, non-compliance of disk arrays, etc.

Inactive Publication Date: 2014-06-18
BEIJING INST OF COMP TECH & APPL +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing disk array does not follow the trusted computer architecture, and cannot realize the trusted chain of trust from the trusted computer to the disk array, and the disk array cannot implement trusted authentication for its internal solid-state disk, disk and other storage media. There are still certain hidden dangers in data security, such as: system administrators cannot be prevented from obtaining data by maliciously replacing disks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Disk array and computer or storage medium authentication method and system
  • Disk array and computer or storage medium authentication method and system
  • Disk array and computer or storage medium authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] figure 1 It is a flowchart of the authentication method between the trusted disk array and the computer or the storage medium of the present invention. Such as figure 1 As shown, the method includes:

[0046] Step 1, when the computer or storage medium accesses the trusted disk array, the disk array control module of the trusted disk array controls the trusted disk array through the disk array controller module, and controls the computer and The storage medium uses a cryptographic authentication algorithm to perform mutual authentication;

[0047] Step 2, the computer or storage medium authenticated by the trusted disk array is certified as a trusted computer or trusted storage medium, allowing it to access the trusted disk array; otherwise it is certified as an illegal computer or illegal storage medium, preventing It accesses the trusted disk array.

[0048]Further, the step 1 includes:

[0049] Step 11, the disk array controller module is connected to the comput...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a disk array and computer or storage medium authentication method and system. The method includes the following steps that 1 a disc array control module of a credible disk array controls the credible disk array through a disk array controller module and conducts mutual authentication on a computer and a storage medium by utilizing a password authentication algorithm; 2 the computer or the storage medium passing the credible disk array authentication is authenticated to be a credible computer or a credible storage medium and is permitted to enter the credible disk array; otherwise, the computer or the storage medium is authenticated to be an illegal computer or an illegal storage medium and is prevented from being connected into the credible disk array. By means of the method and system, credible authentication between the disk array and the credible computer and between the disk array and the internal storage medium is achieved, and data on the disk array and the storage medium cannot be accessed illegally.

Description

technical field [0001] The invention relates to the fields of computer information storage technology and security technology, in particular to an authentication method and system between a trusted disk array and a computer or storage medium. Background technique [0002] As a large-capacity and reliable data storage device, disk arrays have been widely used. A large amount of data information is stored centrally in the disk array. In most applications, the system has very high requirements on the overall security of the disk array. [0003] The existing disk array does not follow the trusted computer architecture, and cannot realize the trusted chain of trust from the trusted computer to the disk array, and the disk array cannot implement trusted authentication for its internal solid-state disk, disk and other storage media. There are still certain hidden dangers in data security, such as: system administrators cannot be prevented from obtaining data by maliciously replaci...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/80
CPCG06F21/80
Inventor 牛中盈陕振张淑萍
Owner BEIJING INST OF COMP TECH & APPL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products