Method and system for safely mounting storage device

A storage device and mounting technology, applied in the field of server security, can solve problems such as data security cannot be guaranteed, and achieve the effect of outstanding substantive features, simple structure, and wide application prospects

Pending Publication Date: 2021-11-09
SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the defect that the above-mentioned remote storage device can be mounted in the local computer system in the prior art, and data security c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for safely mounting storage device
  • Method and system for safely mounting storage device
  • Method and system for safely mounting storage device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] Such as figure 1 As shown, the present invention provides a method for securely mounting a storage device, comprising the following steps:

[0080] S1. When the local server node receives the request to mount the storage device from the remote end, it starts the system security detection module;

[0081] S2. The system safety detection module extracts the main startup data of the remote storage device to be mounted, and loads the key, and then saves the main startup data and the key of the remote storage device to the storage module;

[0082] S3. The BIOS of the local server node is set to read the main startup data and the key from the storage module, and calculate the main startup data through the HASH algorithm to generate a HASH value, and then encrypt the HASH value by the key to generate a digital signature;

[0083] S4. The system security detection module extracts the pre-stored key in the BIOS, and decrypts the digital signature through the pre-stored key, and...

Embodiment 2

[0086] Such as figure 2 As shown, the present invention provides a method for securely mounting a storage device, comprising the following steps:

[0087] S1. When the local server node receives the request to mount the storage device at the remote end, it starts the system security detection module; the specific steps are as follows:

[0088] S11. Configure the system security detection module at the local server node; the system security detection module is implemented by a script program;

[0089] S12. After the local server node is turned on, it is judged whether a request for mounting the storage device at the remote end is received;

[0090] If yes, go to step S13;

[0091] If not, return to step S12;

[0092] S13. The local server node starts the system security detection module;

[0093] S2. The system safety detection module extracts the main boot data of the remote storage device to be mounted, and loads the key, and then saves the main boot data and the key of ...

Embodiment 3

[0115] Such as image 3 As shown, the present invention provides a system for safely mounting storage devices, including:

[0116] Mounting request receiving and safety detection starting unit 1, used for starting the system safety detection module when the local server node receives a request to mount the storage device at the remote end;

[0117] The main boot data and key extraction unit 2 is used for the system security detection module to extract the main boot data of the remote storage device to be mounted, and load the key, and then save the main boot data and the key of the remote storage device to the storage module;

[0118] The digital signature generation unit 3 is used to set the BIOS of the local server node to read the main boot data and key from the storage module, and calculate the main boot data through the HASH algorithm to generate a HASH value, and then encrypt the HASH value through the key , to generate a digital signature;

[0119] Mounting security ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and system for safely mounting a storage device, and the method comprises the following steps that a system safety detection module is started when a local server node receives a request for mounting the storage device at a far end; main starting data of a remote storage device is executed, a key is loaded, and the main starting data and the key are stored into a storage module; the BIOS reads the main starting data and the secret key from the storage module, performs HASH calculation on the main starting data, and encrypts the main starting data through the secret key to generate a digital signature; and the system security detection module extracts a pre-stored key in the BIOS, decrypts the digital signature through the pre-stored key, allows the local server node to mount the remote storage device when decryption succeeds, and judges that the remote storage device is illegal and forbidden to mount when decryption fails. According to the method and system, the illegal remote storage device can be quickly identified, a system administrator can be timely pre-warned, and vulnerabilities of the BMC can be checked and timely repaired.

Description

technical field [0001] The invention belongs to the technical field of server security, and in particular relates to a method and system for securely mounting a storage device. Background technique [0002] With the development and application of technological networks, various storage devices can be arbitrarily mounted to the local side through the remote server. However, the data in the memory may be stolen or peeped during the transmission process. Encrypted security mechanism, but there is no security strategy to prevent loading of non-secure storage devices and protect local data. [0003] Mounting of remote storage devices can indirectly store local data and enter the local computer system. Data security is self-defeating. How to ensure the security of mounting remote storage devices is a major challenge for data security at present. . [0004] This is a deficiency of the prior art. Therefore, it is very necessary to provide a method and system for securely mounting ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F21/60G06F11/32
CPCG06F21/575G06F21/572G06F21/602G06F21/606G06F11/327
Inventor 洪炜哲
Owner SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products