Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Multi-host shared storage system and data integrity protection method

A data integrity and shared storage technology, applied in the field of information security, can solve problems such as restricted reading and writing, system crashes, data leakage, etc., to prevent illegal reading and tampering, enhance security, and protect integrity.

Inactive Publication Date: 2019-11-12
NANJING SEMIDRIVE TECH CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Need to restrict other hosts or host systems from reading and writing their private resources
[0004] In the prior art, although these private resources can be encrypted and stored using a symmetric encryption algorithm, due to the possibility of accessing each other's private data among multiple host systems, once such illegal reading occurs, it will lead to data leakage
What is more dangerous is that once illegal writing occurs, the data will be tampered with, and the tampered data will lead to data errors, and even cause system crashes
That is to say, a major problem faced by the existing multi-host shared storage system is that the legitimate host and storage control system cannot prevent its private data from being illegally read or tampered with, and there is no way to know whether the data has been illegally read or not. take or illegally tamper with
Data errors caused by illegal tampering can directly lead to system crashes. The data integrity of the existing multi-host shared storage system is actually facing a great security risk and is an extremely urgent problem.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-host shared storage system and data integrity protection method
  • Multi-host shared storage system and data integrity protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose and technical solutions of the embodiments of the present invention clearer, the technical solutions of the embodiments of the present invention will be described clearly and completely in conjunction with the accompanying drawings of the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, rather than all of the embodiments. Based on the described embodiments of the present invention, all other embodiments obtained by a person of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0025] Those skilled in the art can understand that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meanings as those commonly understood by those of ordinary skill in the art to which the present invention belongs. It should also be understood that terms such as those defi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-host shared storage system and a data integrity protection method. The fingerprint for the data is calculated according to the feature information of the data owner system, the address information needing to be stored and the like, and the fingerprint and the data are written into the storage medium together. Therefore, in the data access process, whether the fingerprint information corresponds to the original fingerprint information or not can be judged on the basis of the system identity of the system corresponding to the visitor, the provided address and other information, and therefore the integrity of data is protected between different systems. Particularly, since in the data access process, fingerprint matching needs to be carried out on the system requested to be accessed in advance, illegal access can be prevented and the system sending the abnormal data access request can be reported in time when fingerprint mismatching is judged, traceabilityis achieved, illegal reading and tampering of data can be detected and prevented, integrity of data between different systems is protected, and data safety is greatly enhanced.

Description

Technical field [0001] The present invention relates to the field of information security, in particular to a data protection method and storage system. Background technique [0002] In today's chips and systems, the demand for data storage is increasing, and the demand for storage security is also increasing. Many systems have multiple host systems, and each host system has its own corresponding private storage space. For the situation where there are multiple hosts in a system, the storage medium often needs to be shared among multiple hosts due to cost considerations. In other words, each host can access the storage medium, and the difference between each host is only in the process of reading the storage space. Therefore, the integrity protection of data between different systems is extremely important. [0003] For a single host, since many of the current hosts support virtualization, after virtualization, a host can also run multiple host systems. These host systems have t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/64G06F21/79
CPCG06F21/6209G06F21/64G06F21/79
Inventor 朱华顾雪春
Owner NANJING SEMIDRIVE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products