Hard-disk safety-access control method and hard disk

A security access control and security algorithm technology, applied in hard disk security access control method and hard disk field, can solve hard disk security and other issues

Active Publication Date: 2014-09-24
HUAWEI TECH CO LTD
View PDF9 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a hard disk security access control method and a hard disk to solve the security problem of hard disk access in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hard-disk safety-access control method and hard disk
  • Hard-disk safety-access control method and hard disk
  • Hard-disk safety-access control method and hard disk

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0040] figure 1 It is a flow chart of Embodiment 1 of the hard disk security access control method of the present invention, figure 2 It is a schematic diagram of the logical architecture of the security access control layer of the first embodiment of the hard disk security access control method of the present invention. The execution subject of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a hard-disk safety-access control method and a hard disk. According to the hard-disk safety-access control method, the hard disk comprises an IP (Internet Protocol) interface and a control panel, and the hard-disk safety-access control method comprises the following steps of receiving an access data packet of a user by the IP interface, and sending the access data packet to the control panel; unpacking the access data packet by the control panel to resolve an authentication data packet, wherein the authentication data packet comprises the access authority information of the user; detecting the access authority information of the user according to a stored safety strategy, and determining whether the access of the user is legal or not, wherein the corresponding relation of the access authority information of the user and the sector mark of each sector in the hard disk is recorded in the safety strategy; if the access of the user is legal, then carrying out safety verification on the access data packet of the user by using a safety algorithm; if the access data packet of the user passes the safety verification, then allowing the user to access the data in the corresponding sector in the hard disk according to the sector mark. The access safety for the hard disk is improved by the embodiment of the invention.

Description

technical field [0001] The embodiment of the present invention relates to the field of computer technology, in particular to a hard disk security access control method and a hard disk. Background technique [0002] Existing hard disk data access control technologies are based on upper-layer applications and upper-layer devices. For example, in storage devices, ordinary block device storage integrates disks into a Redundant Array of Independent Disks (RAID) group. Divide stripes on the RAID, divide logical units (Logic Unit, LUN for short) on the stripes and map them to the upper host, and the host layer manages and stores data through the file system or other device systems (such as using the database of the device); or The hard disk is directly installed in a simple computer system, and the operating system provides management for data storage and access methods on the hard disk through the file system. [0003] The existing distributed storage Key-Value storage system is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/79
CPCG06F21/604G06F12/14G06F12/1458G06F21/31G06F21/6218G06F21/6227G06F21/78G06F2212/1052
Inventor 李熠斌
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products