Safety access control method of hard disk and hard disk

A security access control, hard disk technology, applied in the direction of internal/peripheral computer component protection, digital data authentication, etc., can solve the problem that the data security of the mobile hard disk cannot be effectively guaranteed, and achieve the effect of ensuring security

Inactive Publication Date: 2017-08-25
BEIJING BANGCLE TECH CO LTD
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a hard disk security access control method and a hard disk to solve the technical problem that the data security in the mobile hard disk cannot be effectively guaranteed in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety access control method of hard disk and hard disk
  • Safety access control method of hard disk and hard disk
  • Safety access control method of hard disk and hard disk

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] The embodiment of the present application discloses a security access control method for a hard disk, see figure 1 shown, including the following steps:

[0039] Step S101 , dividing a first storage area and a second storage area in the hard disk; wherein, the first storage area is a read-only storage area storing a first authentication program, and the second storage area is an encrypted storage area.

[0040] Taking the mobile hard disk as an example, the mobile hard disk is divided into the first storage area and the second storage area. When the mobile hard disk is connected to the computer, the computer can only load the read-only storage area of ​​the mobile hard disk, that is, the first storage area. The second storage area is used as an encrypted storage area, which can be loaded by the computer only through authentication.

[0041] It is pointed out here that in the embodiment of the present application, the mobile hard disk is not limited to only include the ...

Embodiment 2

[0064] see figure 2 As shown, the embodiment of the present application provides a hard disk, and the hard disk includes a first storage area 201 , a second storage area 202 , a control unit 203 , a receiving module 204 and a USB interface 205 .

[0065] The first storage area 201 is a read-only storage area. When the computer is connected to the hard disk, the user can only view the contents of the first storage area 201 through the computer, but cannot write to it. A first authentication program 2011 is stored in the first storage area 201 for verifying the identity of the user accessing the second storage area 202 . The second storage area 202 is an encrypted storage area, which can only be accessed after authentication.

[0066] Setting the first authentication program 2011 in the first storage area 201 effectively prevents the technical problem that the first authentication program is tampered with.

[0067] After the receiving module 204 receives the access request fo...

Embodiment 3

[0080] see Figure 4 As shown, it is a flowchart of a method for using a hard disk in the embodiment of the present application, including the following steps:

[0081] Step S401, access to the computer.

[0082] In the embodiment of the present application, a mobile hard disk is taken as an example for illustration.

[0083] Step S402, loading the first storage area.

[0084] In the embodiment of the present application, the first storage area is a read-only storage area, and a first authentication program is stored in the first storage area, which is used to verify the identity information of the user who wants to access the second storage area.

[0085] Step S403, running the first authentication program.

[0086] After the first storage area is loaded, the first authentication program located in the first storage area is automatically run, and when the identity information of the user who wants to access the second storage area is verified by the first authentication pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety access control method of a hard disk and the hard disk. The safety access control method of the hard disk comprises the following steps of: dividing a first storage area and a second storage area in the hard disk, wherein the first storage area is a read-only storage area in which a first authentication program is stored, and the second storage area is an encrypted storage area; receiving an access request for accessing the hard disk; carrying out identity authentication through the first authentication program; and if the identity authentication passes, decrypting the second storage area to allow to access the second storage area. According to the safety access control method, the technical effect of effectively ensuring the safety of data in the hard disk is achieved.

Description

technical field [0001] The present application relates to the technical field of data storage security, in particular to a hard disk security access control method and a hard disk. Background technique [0002] As a common device for offline transfer of big data, mobile hard disks have undeniable advantages of large capacity and high speed, especially in some fields with large data volumes, mobile hard disks are used more frequently. [0003] With the frequent use of mobile hard disks and the expansion of the scope of use, the security of data in mobile hard disks has become an urgent problem to be solved. In the prior art solution, a password is set on the hard disk box to prevent the personal mobile hard disk from being used by others without permission. This method ensures the security of data in the mobile hard disk to a certain extent. But, when this mobile hard disk box is cracked violently, to the safety of the data in the mobile hard disk, still be a very big threa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/80G06F21/31
CPCG06F21/31G06F21/80
Inventor 阚志刚陈彪方宁卢佐华彭建芬
Owner BEIJING BANGCLE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products