[go: up one dir, main page]

CN108898005B - Hard disk identification method, system, equipment and computer readable storage medium - Google Patents

Hard disk identification method, system, equipment and computer readable storage medium Download PDF

Info

Publication number
CN108898005B
CN108898005B CN201810745205.0A CN201810745205A CN108898005B CN 108898005 B CN108898005 B CN 108898005B CN 201810745205 A CN201810745205 A CN 201810745205A CN 108898005 B CN108898005 B CN 108898005B
Authority
CN
China
Prior art keywords
hard disk
ciphertext
plaintext
unique identifier
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810745205.0A
Other languages
Chinese (zh)
Other versions
CN108898005A (en
Inventor
徐洪志
王艳清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201810745205.0A priority Critical patent/CN108898005B/en
Publication of CN108898005A publication Critical patent/CN108898005A/en
Application granted granted Critical
Publication of CN108898005B publication Critical patent/CN108898005B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0614Improving the reliability of storage systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0673Single storage device

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

本申请公开了一种硬盘识别的方法,包括:当设备上电启动或硬盘插入设备时,读取该硬盘的唯一标识;判断该硬盘的预留区内是否存有密文;若是,则读取该密文,并结合预设密钥将该密文解密为明文;判断该明文与该唯一标识是否相同;若该明文与该唯一标识不同,则禁止使用该硬盘。本申请所提供的技术方案,通过判断该明文与该唯一标识是否相同,若不同,则禁止使用该硬盘,避免了用户自行更换非服务器/存储厂商提供的硬盘的风险,进而避免了服务器/存储设备可靠性降低的问题,降低了出现巨大损失的概率。本申请同时还提供了一种硬盘识别的系统、设备及计算机可读存储介质,具有上述有益效果。

Figure 201810745205

The present application discloses a method for identifying a hard disk, which includes: when a device is powered on or a hard disk is inserted into the device, reading the unique identifier of the hard disk; judging whether there is ciphertext in the reserved area of the hard disk; if so, reading Take the ciphertext and decrypt the ciphertext into plaintext in combination with the preset key; determine whether the plaintext is the same as the unique identifier; if the plaintext is different from the unique identifier, the hard disk is prohibited from being used. In the technical solution provided by this application, by judging whether the plaintext and the unique identifier are the same, if they are different, the hard disk is prohibited to be used, which avoids the risk of users replacing hard disks not provided by server/storage manufacturers, thereby avoiding the risk of server/storage The problem of reduced equipment reliability reduces the probability of huge losses. The present application also provides a system, device and computer-readable storage medium for hard disk identification, which have the above beneficial effects.

Figure 201810745205

Description

Hard disk identification method, system, equipment and computer readable storage medium
Technical Field
The present application relates to the field of hard disk identification, and in particular, to a method, a system, a device, and a computer-readable storage medium for hard disk identification.
Background
For the server/storage device, it is required to have good reliability because the loss and cost of data loss, shutdown and line stop caused by hard disk failure are huge, and the maintenance cost is high, so the hard disk used by the server/storage device is generally an industrial hard disk, and the stability and reliability of the industrial hard disk are much higher than those of a consumer hard disk.
However, for the user, the hard disk provided by the server/storage manufacturer may be replaced by the consumer hard disk by himself or herself for the reason of cost or data transfer, which may reduce the reliability of the server/storage device and even bring about huge loss and cost.
Therefore, how to prevent the user from replacing the hard disk provided by the non-server/storage manufacturer by himself is a technical problem that needs to be solved by those skilled in the art.
Disclosure of Invention
The application aims to provide a method, a system, equipment and a computer readable storage medium for hard disk identification, which are used for preventing a user from replacing a hard disk provided by a non-server/storage manufacturer by himself.
In order to solve the above technical problem, the present application provides a hard disk identification method, including:
when equipment is powered on and started or a hard disk is inserted into the equipment, reading the unique identifier of the hard disk;
judging whether a ciphertext exists in a reserved area of the hard disk or not;
if so, reading the ciphertext, and decrypting the ciphertext into a plaintext by combining a preset key;
judging whether the plaintext is the same as the unique identifier;
and if the plaintext is different from the unique identifier, forbidding to use the hard disk.
Optionally, the decrypting the ciphertext into the plaintext by combining the preset key includes:
acquiring the equipment level of the current equipment;
searching a secret key corresponding to the equipment level in a preset secret key table;
and decrypting the ciphertext into plaintext by combining the key.
Optionally, when the ciphertext is not stored in the reserved area of the hard disk, the method further includes:
the hard disk is prohibited from being used.
Optionally, after prohibiting using the hard disk, the method further includes:
and outputting prompt information that the hard disk does not meet the standard.
The present application further provides a system for hard disk identification, the system comprising:
the reading module is used for reading the unique identifier of the hard disk when the equipment is powered on and started or the hard disk is inserted into the equipment;
the first judgment module is used for judging whether a ciphertext exists in a reserved area of the hard disk or not;
the decryption module is used for reading the ciphertext when the ciphertext exists in the reserved area of the hard disk and decrypting the ciphertext into plaintext by combining with a preset key;
the second judgment module is used for judging whether the plaintext is the same as the unique identifier or not;
and the first disabling module is used for disabling the hard disk when the plaintext is different from the unique identifier.
Optionally, the decryption module includes:
the obtaining submodule is used for obtaining the equipment level of the current equipment;
the searching submodule is used for searching the secret key corresponding to the equipment level in a preset secret key table;
and the decryption submodule is used for decrypting the ciphertext into plaintext by combining the secret key.
Optionally, the method further includes:
and the second forbidding module is used for forbidding to use the hard disk when the cipher text is not stored in the reserved area of the hard disk.
Optionally, the method further includes:
the determining module is used for determining the hard disk grade according to the input customization requirement;
the encryption module is used for encrypting the unique identifier of the hard disk by using the secret key corresponding to the hard disk level to obtain a ciphertext;
and the writing module is used for writing the ciphertext into the reserved area of the hard disk.
The present application further provides a hard disk identification device, which includes:
a memory for storing a computer program;
a processor for implementing the steps of the method for hard disk identification according to any one of the above claims when executing the computer program.
The present application also provides a computer-readable storage medium having stored thereon a computer program which, when being executed by a processor, carries out the steps of the method of hard disk identification according to any of the preceding claims.
The hard disk identification method provided by the application comprises the following steps: when the equipment is powered on and started or the hard disk is inserted into the equipment, reading the unique identifier of the hard disk; judging whether a ciphertext exists in a reserved area of the hard disk; if so, reading the ciphertext, and decrypting the ciphertext into a plaintext by combining a preset key; judging whether the plaintext is the same as the unique identifier; and if the plaintext is different from the unique identifier, forbidding to use the hard disk.
According to the technical scheme provided by the application, the ciphertext is preset for the hard disk, so that when the equipment is powered on and started or the hard disk is inserted into the equipment, the unique identifier of the hard disk is read, and whether the ciphertext exists in the reserved area of the hard disk or not is judged; if so, reading the ciphertext, and decrypting the ciphertext into a plaintext by combining a preset key; judging whether the plaintext is the same as the unique identifier; if the plaintext is different from the unique identifier, the hard disk is forbidden to be used, so that the risk that a user replaces the hard disk provided by a non-server/storage manufacturer by himself is avoided, the problem that the reliability of the server/storage equipment is reduced is further avoided, and the probability of huge loss is reduced. The application also provides a system, equipment and computer readable storage medium for hard disk identification, which have the beneficial effects and are not repeated herein.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a hard disk identification method according to an embodiment of the present disclosure;
FIG. 2 is a flow chart of an actual representation of S103 in the method for identifying a hard disk of FIG. 1;
fig. 3 is a block diagram of a system for hard disk identification according to an embodiment of the present disclosure;
fig. 4 is a block diagram of another hard disk identification system according to an embodiment of the present disclosure;
fig. 5 is a structural diagram of a hard disk identification device according to an embodiment of the present application.
Detailed Description
The core of the application is to provide a method, a system, equipment and a computer readable storage medium for hard disk identification, which are used for preventing a user from replacing a hard disk provided by a non-server/storage manufacturer by himself.
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
For the server/storage device, it is required to have good reliability because the loss and cost of data loss, shutdown and line stop caused by hard disk failure are huge, and the maintenance cost is high, so the hard disk used by the server/storage device is generally an industrial hard disk, and the stability and reliability of the industrial hard disk are much higher than those of a consumer hard disk.
However, for the user, considering the cost or data transfer, the hard disk provided by the server/storage manufacturer may be replaced by the consumer hard disk by himself, which causes the reliability of the server/storage device to be reduced and even brings huge loss and cost, and based on this, the present application provides a method for identifying the hard disk, which is used for solving the above problems.
Referring to fig. 1, fig. 1 is a flowchart of a hard disk identification method according to an embodiment of the present disclosure.
The method specifically comprises the following steps:
s101: when the equipment is powered on and started or the hard disk is inserted into the equipment, reading the unique identifier of the hard disk;
the unique identifier of the hard disk mentioned herein may specifically include, but is not limited to, at least one of a hard disk ID, an SN code, and a PN code.
S102: judging whether a ciphertext exists in a reserved area of the hard disk;
if yes, go to step S103;
optionally, when the cipher text is not stored in the reserved area of the hard disk, it is proved that the hard disk is not a hard disk provided by a server/storage manufacturer, and a consumer-grade hard disk replaced by a user with a high probability is provided, and at this time, the hard disk can be prohibited from being used, so as to further avoid the problem of reliability reduction of the server/storage device, and reduce the probability of occurrence of huge loss.
S103: reading the ciphertext, and decrypting the ciphertext into a plaintext by combining a preset key;
optionally, the ciphertext mentioned here is obtained by encrypting the unique identifier in combination with a preset key, and the ciphertext is set for the hard disk meeting the requirement in advance, so that the hard disk can be used by the device, where the process of setting the ciphertext for the hard disk in advance mentioned here may specifically be:
determining the level of the hard disk according to the input customization requirement;
encrypting the unique identifier of the hard disk by using the secret key corresponding to the hard disk level to obtain a ciphertext;
and writing the cipher text into the reserved area of the hard disk.
The encryption mentioned here may be encryption according to a preset symmetric encryption algorithm, which may include but is not limited to at least one of AES encryption algorithm, DES encryption algorithm, SM4 encryption algorithm, and the server/storage vendor may select according to the actual production environment;
when the reserved area of the hard disk has the ciphertext, the hard disk is indicated to be a hard disk provided by a server/storage manufacturer possibly, the ciphertext is read at the moment, and the ciphertext is decrypted into a plaintext by combining a preset key, so that whether the hard disk is the hard disk provided by the server/storage manufacturer is judged by judging whether the plaintext is the same as the unique identifier;
optionally, the ciphertext is decrypted into a plaintext by combining with a preset key, where the preset key may specifically be a key set by a server/storage manufacturer according to conditions such as a production environment, or may also be a key acquired by logging in a preset website by a system.
S104: judging whether the plaintext is the same as the unique identifier;
if not, the step S105 is executed;
when the plaintext is different from the unique identifier, the plaintext indicates that the hard disk and the device may not be manufactured by the same server/storage manufacturer, or the hard disk and the device belong to different grades, that is, the hard disk does not meet the requirements of the device, and the hard disk is forbidden at this moment;
optionally, when the plaintext is the same as the unique identifier, the hard disk can be normally used
S105: the hard disk is prohibited from being used.
Preferably, after the hard disk is forbidden to be used, prompt information that the hard disk does not meet the standard can be output, so that a user can replace the hard disk meeting the requirement in time.
Based on the technical scheme, the method for identifying the hard disk, provided by the application, has the advantages that the cipher text is preset for the hard disk, so that when equipment is powered on and started or the hard disk is inserted into the equipment, the unique identifier of the hard disk is read, and whether the cipher text exists in the reserved area of the hard disk or not is judged; if so, reading the ciphertext, and decrypting the ciphertext into a plaintext by combining a preset key; judging whether the plaintext is the same as the unique identifier; if the plaintext is different from the unique identifier, the hard disk is forbidden to be used, so that the risk that a user replaces the hard disk provided by a non-server/storage manufacturer by himself is avoided, the problem that the reliability of the server/storage equipment is reduced is further avoided, and the probability of huge loss is reduced.
For the step S103 of the previous embodiment, the ciphertext is decrypted into a plaintext by combining with the preset key, and specifically, the corresponding key may also be selected according to the device level of the current device, which is described below with reference to fig. 2.
Referring to fig. 2, fig. 2 is a flowchart illustrating an actual representation manner of S103 in the method for identifying a hard disk provided in fig. 1.
The method specifically comprises the following steps:
s201: acquiring the equipment level of the current equipment;
the device classes referred to herein may be specifically classified as low-end, medium-end, high-end devices.
S202: searching a key corresponding to the equipment level in a preset key table;
s203: the cipher text is decrypted into plaintext in combination with the key.
The equipment level can be divided according to the application environment and the equipment attribute of the equipment, and the equipment in different levels has different requirements on the rotating speed, the medium and the interface type of the hard disk, so that when the cipher text is set for the hard disk, the hard disks with different attributes can be encrypted by different secret keys, and based on the cipher text encryption method, when the cipher text is decrypted into the plaintext by combining with the preset secret key, the equipment level of the current equipment is firstly obtained; then, a secret key corresponding to the equipment level is searched in a preset secret key table; and finally, the cipher text is decrypted into a plaintext by combining the key, and the decryption of the cipher text is completed.
Referring to fig. 3, fig. 3 is a structural diagram of a hard disk identification system according to an embodiment of the present disclosure.
The system may include:
the reading module 100 is configured to read a unique identifier of a hard disk when the device is powered on and started or the hard disk is inserted into the device;
a first judging module 200, configured to judge whether a ciphertext exists in a reserved area of the hard disk;
the decryption module 300 is configured to, when a ciphertext exists in the reserved area of the hard disk, read the ciphertext and decrypt the ciphertext into a plaintext by combining with a preset key;
a second judging module 400, configured to judge whether the plaintext is the same as the unique identifier;
a first disabling module 500 for disabling the hard disk when the plaintext is different from the unique identifier.
Referring to fig. 4, fig. 4 is a block diagram of another hard disk identification system according to an embodiment of the present disclosure.
The decryption module 300 may include:
the obtaining submodule is used for obtaining the equipment level of the current equipment;
the searching submodule is used for searching the secret key corresponding to the equipment level in a preset secret key table;
and the decryption submodule is used for decrypting the ciphertext into a plaintext by combining the key.
The system may further comprise:
and the second forbidding module is used for forbidding to use the hard disk when the cipher text is not stored in the reserved area of the hard disk.
The system may further comprise:
the determining module is used for determining the hard disk grade according to the input customization requirement;
the encryption module is used for encrypting the unique identifier of the hard disk by using the secret key corresponding to the hard disk level to obtain a ciphertext;
and the writing module is used for writing the ciphertext into the reserved area of the hard disk.
The various components of the above system may be practically applied in the following embodiments:
when the equipment is powered on and started or the hard disk is inserted into the equipment, the reading module reads the unique identifier of the hard disk; the first judging module judges whether a ciphertext exists in a reserved area of the hard disk or not; when the reserved area of the hard disk does not contain the ciphertext, the second forbidding module forbids to use the hard disk;
when a cipher text is stored in a reserved area of the hard disk, the obtaining submodule obtains the equipment level of the current equipment; the searching submodule searches the secret key corresponding to the equipment level in a preset secret key table; the decryption submodule decrypts the ciphertext into a plaintext by combining the secret key; the second judging module judges whether the plaintext is the same as the unique identifier; when the plaintext is different from the unique identifier, the first disabling module disables the hard disk; the output module outputs prompt information that the hard disk does not meet the standard.
Referring to fig. 5, fig. 5 is a structural diagram of a hard disk identification device according to an embodiment of the present application.
The hard disk identification device 600 may have relatively large differences due to different configurations or performances, and may include one or more processors (CPUs) 622 (e.g., one or more processors) and memory 632, one or more storage media 630 (e.g., one or more mass storage devices) storing applications 642 or data 644. Memory 632 and storage medium 630 may be, among other things, transient or persistent storage. The program stored in the storage medium 630 may include one or more modules (not shown), each of which may include a sequence of instructions operating on the device. Still further, the central processor 622 may be configured to communicate with the storage medium 630 and execute a series of instruction operations in the storage medium 630 on the hard disk identification device 600.
Hard disk identification apparatus 600 may also include one or more power supplies 626, one or more wired or wireless network interfaces 650, one or more input-output interfaces 658, and/or one or more operating systems 641, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
The steps in the hard disk identification method described in fig. 1 to 2 above are implemented by the hard disk identification device based on the structure shown in fig. 5.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the apparatus and the module described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus, device and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of modules is merely a division of logical functions, and an actual implementation may have another division, for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
Modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a function calling device, or a network device) to execute all or part of the steps of the method of the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The method, system, device and computer readable storage medium for hard disk identification provided by the present application are described in detail above. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.
It is further noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.

Claims (6)

1.一种硬盘识别的方法,其特征在于,包括:1. a method for hard disk identification, is characterized in that, comprises: 当设备上电启动或硬盘插入设备时,读取所述硬盘的唯一标识;When the device is powered on or the hard disk is inserted into the device, read the unique identifier of the hard disk; 判断所述硬盘的预留区内是否存有密文;其中,所述密文为对所述唯一标识进行加密生成的;Judging whether there is ciphertext in the reserved area of the hard disk; wherein, the ciphertext is generated by encrypting the unique identifier; 若是,则读取所述密文,并结合预设密钥将所述密文解密为明文;If so, read the ciphertext, and decrypt the ciphertext into plaintext in combination with the preset key; 判断所述明文与所述唯一标识是否相同;Determine whether the plaintext is the same as the unique identifier; 若所述明文与所述唯一标识不同,则禁止使用所述硬盘;If the plaintext is different from the unique identifier, the hard disk is prohibited from being used; 其中,所述结合预设密钥将所述密文解密为明文,包括:Wherein, decrypting the ciphertext into plaintext in combination with the preset key includes: 获取当前设备的设备级别;Get the device level of the current device; 在预设秘钥表内查找到所述设备级别对应的秘钥;Find the key corresponding to the device level in the preset key table; 结合所述密钥将所述密文解密为明文;Decrypt the ciphertext into plaintext in combination with the key; 其中,所述密文的生成过程包括:Wherein, the generation process of the ciphertext includes: 根据输入的定制需求确定硬盘级别;Determine the hard disk level according to the input customization requirements; 利用所述硬盘级别对应的秘钥对所述硬盘的唯一标识进行加密,得到密文;Encrypt the unique identifier of the hard disk using the key corresponding to the level of the hard disk to obtain a ciphertext; 将所述密文写入所述硬盘的预留区内。Write the ciphertext into the reserved area of the hard disk. 2.根据权利要求1所述的方法,其特征在于,当所述硬盘的预留区内未存有所述密文时,还包括:2. The method according to claim 1, wherein when the ciphertext is not stored in the reserved area of the hard disk, the method further comprises: 禁止使用所述硬盘。Use of the hard disk is prohibited. 3.一种硬盘识别的系统,其特征在于,包括:3. a system of hard disk identification, is characterized in that, comprises: 读取模块,用于当设备上电启动或硬盘插入设备时,读取所述硬盘的唯一标识;The reading module is used to read the unique identifier of the hard disk when the device is powered on or the hard disk is inserted into the device; 第一判断模块,用于判断所述硬盘的预留区内是否存有密文;a first judging module for judging whether ciphertext exists in the reserved area of the hard disk; 解密模块,用于当所述硬盘的预留区内存有密文时,读取所述密文,并结合预设密钥将所述密文解密为明文;a decryption module, configured to read the ciphertext when there is ciphertext in the reserved area of the hard disk, and decrypt the ciphertext into plaintext in combination with a preset key; 第二判断模块,用于判断所述明文与所述唯一标识是否相同;The second judgment module is used for judging whether the plaintext is the same as the unique identifier; 第一禁用模块,用于当所述明文与所述唯一标识不同时,禁止使用所述硬盘;a first disabling module for disabling the use of the hard disk when the plaintext is different from the unique identifier; 其中,所述解密模块包括:Wherein, the decryption module includes: 获取子模块,用于获取当前设备的设备级别;Get the submodule to get the device level of the current device; 查找子模块,用于在预设秘钥表内查找到所述设备级别对应的秘钥;A search sub-module for finding the secret key corresponding to the device level in the preset secret key table; 解密子模块,用于结合所述密钥将所述密文解密为明文;a decryption submodule for decrypting the ciphertext into plaintext in combination with the key; 其中,所述系统还包括:Wherein, the system also includes: 确定模块,用于根据输入的定制需求确定硬盘级别;A determination module is used to determine the hard disk level according to the input customization requirements; 加密模块,用于利用所述硬盘级别对应的秘钥对所述硬盘的唯一标识进行加密,得到密文;an encryption module, configured to encrypt the unique identifier of the hard disk by using the secret key corresponding to the level of the hard disk to obtain a ciphertext; 写入模块,用于将所述密文写入所述硬盘的预留区内。The writing module is used for writing the ciphertext into the reserved area of the hard disk. 4.根据权利要求3所述的系统,其特征在于,还包括:4. The system of claim 3, further comprising: 第二禁用模块,用于当所述硬盘的预留区内未存有所述密文时,禁止使用所述硬盘。The second disabling module is used for disabling the use of the hard disk when the ciphertext is not stored in the reserved area of the hard disk. 5.一种硬盘识别设备,其特征在于,包括:5. A hard disk identification device, characterized in that, comprising: 存储器,用于存储计算机程序;memory for storing computer programs; 处理器,用于执行所述计算机程序时实现如权利要求1或2所述硬盘识别的方法的步骤。The processor is configured to implement the steps of the method for hard disk identification according to claim 1 or 2 when executing the computer program. 6.一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1或2所述硬盘识别的方法的步骤。6. A computer-readable storage medium, characterized in that, a computer program is stored on the computer-readable storage medium, and when the computer program is executed by the processor, the method for identifying the hard disk as claimed in claim 1 or 2 is realized. step.
CN201810745205.0A 2018-07-09 2018-07-09 Hard disk identification method, system, equipment and computer readable storage medium Active CN108898005B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810745205.0A CN108898005B (en) 2018-07-09 2018-07-09 Hard disk identification method, system, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810745205.0A CN108898005B (en) 2018-07-09 2018-07-09 Hard disk identification method, system, equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN108898005A CN108898005A (en) 2018-11-27
CN108898005B true CN108898005B (en) 2021-06-11

Family

ID=64349216

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810745205.0A Active CN108898005B (en) 2018-07-09 2018-07-09 Hard disk identification method, system, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108898005B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109657447B (en) * 2018-11-28 2023-03-14 腾讯科技(深圳)有限公司 Equipment fingerprint generation method and device
CN109582238B (en) * 2018-12-03 2022-02-18 郑州云海信息技术有限公司 Hard disk binding and matching method and system, electronic equipment and storage medium
CN109660609B (en) * 2018-12-07 2019-12-06 北京海泰方圆科技股份有限公司 equipment identification method and device and storage medium
CN110674522B (en) * 2019-09-27 2022-06-17 苏州浪潮智能科技有限公司 Hard disk encryption method, device, server, system and storage medium
CN111414606A (en) * 2020-03-18 2020-07-14 一汽-大众汽车有限公司 Robot interface management method and device
CN112905120B (en) * 2021-02-19 2023-08-04 山东英信计算机技术有限公司 Lock disc upgrading method and device, electronic equipment and storage medium
CN114465805B (en) * 2022-02-18 2025-03-21 深圳市优博讯科技股份有限公司 Active identification control method and system
CN115001702B (en) * 2022-05-19 2024-07-09 浪潮思科网络科技有限公司 Method, system, equipment and medium for encrypting and decrypting switch board card
CN114943072B (en) * 2022-07-25 2023-05-05 北京网藤科技有限公司 Method and system for realizing U disk linkage management and control among various software systems

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1745400A (en) * 2003-01-31 2006-03-08 松下电器产业株式会社 Semiconductor memory card and program for controlling it

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7758422B2 (en) * 2005-04-13 2010-07-20 Microsoft Corporation Hard drive authentication
US8065509B2 (en) * 2006-09-26 2011-11-22 Hewlett-Packard Development Company, L.P. Persistent security system and method
CN101615161B (en) * 2009-07-28 2012-07-18 成都市华为赛门铁克科技有限公司 Method for encrypting and decrypting hard disk, hard disk driving device and hard disk

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1745400A (en) * 2003-01-31 2006-03-08 松下电器产业株式会社 Semiconductor memory card and program for controlling it

Also Published As

Publication number Publication date
CN108898005A (en) 2018-11-27

Similar Documents

Publication Publication Date Title
CN108898005B (en) Hard disk identification method, system, equipment and computer readable storage medium
CN113971289B (en) Trusted startup method and device for blockchain all-in-one machine
CN108599930B (en) Firmware encryption and decryption system and method
CN113656806B (en) Trusted starting method and device of block chain all-in-one machine
CN108183972B (en) File processing method and terminal
US10032038B2 (en) File system support for rolling keys
CN103617401A (en) Method and device for protecting data files
CN110188555A (en) A kind of hard disk data protection method, system and associated component
CN110661748A (en) Log encryption method, log decryption method and log encryption device
CN104573548A (en) Information encryption and decryption methods and devices and terminal
CN107844707B (en) Card data management method and card data management system
US10289865B1 (en) Systems and methods for providing kinship-based accessibility to securely stored data
CN109977692B (en) Data processing method and device, storage medium and electronic equipment
CN117834137B (en) Password card switching method, device, computer equipment and storage medium
CN108985109B (en) Data storage method and device
CN110011807B (en) Key information maintenance method and system
US12323802B2 (en) Systems and methods for providing a secure notification service for mobile applications
CN112099901B (en) Method and device for configuring virtual machine memory data encryption mode and CPU chip
CN111079165B (en) Data processing method, data processing device, equipment and storage medium
CN112632586A (en) BIOS hard disk password retrieving method, device, equipment and readable storage medium
CN118551404B (en) Data processing method and device, storage medium and electronic equipment
CN115001716B (en) Network data processing method and system of education all-in-one machine and education all-in-one machine
CN104484611A (en) Partition-mounting control method and device of Android system
CN112506810B (en) Storage space distribution method applied to chip and chip
US20160239669A1 (en) User Terminal And Method For Protecting Core Codes Of Applications Using The Same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant