CN102375958B - Ways to Restrict File Access - Google Patents
Ways to Restrict File Access Download PDFInfo
- Publication number
- CN102375958B CN102375958B CN201010261092.0A CN201010261092A CN102375958B CN 102375958 B CN102375958 B CN 102375958B CN 201010261092 A CN201010261092 A CN 201010261092A CN 102375958 B CN102375958 B CN 102375958B
- Authority
- CN
- China
- Prior art keywords
- access
- file
- restricted
- controller
- restricting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
技术领域 technical field
本发明涉及一种限制文件存取的方法,特别是利用储存媒体的控制器执行一特殊命令,以对一限制存取文件设定存取限定条件的方法。The invention relates to a method for restricting file access, in particular to a method for setting access restriction conditions for an access-restricted file by using a storage medium controller to execute a special command.
背景技术 Background technique
由于传统硬盘、固态硬盘不断的发展,其速度以及容量都不断的提升,并且售价不断的降低。而固态硬盘又可广义的包含可携式的非易失性存储器,亦即俗称的随身碟,随身碟的容量亦足以容纳大量的数据。因此,储存媒体的发展帮助了数字数据的储存、携带与传输。Due to the continuous development of traditional hard drives and solid-state drives, their speed and capacity have been continuously improved, and their prices have been continuously reduced. The solid-state hard drive can broadly include portable non-volatile memory, also known as a flash drive, and the capacity of the flash drive is also sufficient to accommodate a large amount of data. Therefore, the development of storage media has helped the storage, carrying and transmission of digital data.
习知的储存技术如中国台湾专利公告第374161号“备有文件配置表存储器的硬盘机”,该前案所揭示的硬盘机包括许多扇区,每一扇区依序地包括一启动区域、一根目录区域以及一数据区域。而该硬盘机的特征在于包括:一用以写入数据至一硬盘机上并且用以从该硬盘机上读取数据的读写头,一用以储存一文件配置表信息的非依电性文件配置表存储器,以及一用以控制该读写头的移动、该硬盘机的旋转以及数据读写动作的控制器。Known storage technology such as China Taiwan Patent Announcement No. 374161 "Hard Disk Drive with File Configuration Table Memory", the hard disk drive disclosed in this previous case includes many sectors, and each sector sequentially includes a boot area, A directory area and a data area. And the hard disk drive is characterized in comprising: a read/write head for writing data to a hard disk drive and reading data from the hard drive, a non-electrical file configuration for storing information in a file configuration table Table memory, and a controller used to control the movement of the read-write head, the rotation of the hard disk drive, and data read-write actions.
由上述先前案件可知,习知的硬盘包括一控制器,并且将硬盘可存取空间区分为一数据储存区以及一地址储存区。其中该数据储存区被区隔为许多数据储存区块,并且每一数据储存区块具有固定的地址,而该地址储存区则储存了每一笔数据所储存的地址。控制器在储存或读取数据时,都需通过该地址储存区获得与该笔数据对应的地址才可从数据储存区找到对应的数据储存区块。It can be known from the above-mentioned previous cases that the conventional hard disk includes a controller and divides the accessible space of the hard disk into a data storage area and an address storage area. Wherein the data storage area is partitioned into many data storage blocks, and each data storage block has a fixed address, and the address storage area stores the address of each data storage. When the controller stores or reads data, it needs to obtain the address corresponding to the data through the address storage area to find the corresponding data storage block from the data storage area.
但由于数字数据过于便于复制、传输与携带,从保护数据内容的角度来看反而损害了保密性,甚至于任何人可通过可携式硬盘直接复制、储存有版权的数据内容,而侵害了知识产权。However, because digital data is too easy to copy, transmit and carry, it damages the confidentiality from the perspective of protecting data content, and even anyone can directly copy and store copyrighted data content through a portable hard disk, which infringes intellectual property rights. property.
而现有的数据保密技术可参阅中国台湾专利证书第I317502号“实时数据保密方法”,该前案揭示的方法运作于利用一数据夹所挂载成一保密分割区所在的一操作系统中。该方法包括:接收一文件的储存指令,由该操作系统的文件系统接收该文件的储存指令;执行一加密程序;附加一实时加解密控制项至该文件的属性中,依据该保密分割区建立的时候所加入的实时加解密控制项,将该文件附加该实时加解密控制项;以及执行储存作业。更进一步的,该先前案件的说明书揭示加密程序可使用一对称密钥或非对称密钥进行加密,并由对应的密钥解密。再者,该方法还可包括一执行身份辨识附加流程,通过确认身份后才可解密。通过上述方法,被选择加密的文件数据夹需通过至少一次的验证才可开启。For the existing data security technology, please refer to Taiwan Patent Certificate No. I317502 "Real-time Data Security Method". The method disclosed in this previous case operates in an operating system where a data folder is mounted as a security partition. The method includes: receiving a storage instruction of a file, and receiving the storage instruction of the file by the file system of the operating system; executing an encryption program; adding a real-time encryption and decryption control item to the attribute of the file, and establishing according to the security partition Add the real-time encryption and decryption control item when adding the real-time encryption and decryption control item to the file; and execute the storage operation. Furthermore, the specification of the prior case discloses that the encryption program can be encrypted using a symmetric key or an asymmetric key, and decrypted by the corresponding key. Furthermore, the method may also include performing an additional process of identity identification, and the decryption can only be performed after the identity is confirmed. Through the above method, the file folder selected to be encrypted needs to pass at least one verification before it can be opened.
但通过密钥以及身份验证的保密仍可能使加密的文件在开启后被复制外流,因此保密的机制仍有不断改进创新的空间。However, the confidentiality through key and identity verification may still cause the encrypted file to be copied and leaked after opening, so there is still room for continuous improvement and innovation in the confidentiality mechanism.
发明内容 Contents of the invention
为了改善现有技术中文件容易被复制、外流。因此本发明的目的在于提供一种通过存储器内的控制器限制文件读写次数或时间的技术,并在到达所限定的读写次数或时间后删除该文件,以限制该文件外流。In order to improve the prior art, files are easily copied and outflowed. Therefore, the object of the present invention is to provide a technology for limiting the number of reads and writes or time of a file by the controller in the memory, and delete the file after reaching the limited number of reads and writes or time, so as to limit the outflow of the file.
本发明为一种限制文件存取的方法,该方法由一储存媒体内的一控制器执行,且该储存媒体包括一实体存储区域以储存一个或多个文件,而该控制器接收一特殊命令则执行一判断该特殊命令所指定的一限制存取文件的步骤、建立一限制条件逻辑表以对应每一限制存取文件的步骤、一判断该限定条件是否达到的步骤,其中,该限制条件逻辑表内储存了限制存取文件的存取的至少一限定条件。当到达该限定条件后,该控制器删除在该限制条件逻辑表以及实体存储区域中对应该限制存取文件的内容。The present invention is a method of restricting file access, the method is executed by a controller in a storage medium, and the storage medium includes a physical storage area for storing one or more files, and the controller receives a special command Then execute a step of judging a restricted access file specified by the special command, a step of establishing a restriction logic table to correspond to each restricted access file, and a step of judging whether the restriction condition is reached, wherein the restriction condition At least one restriction condition for restricting the access of the access file is stored in the logic table. When the restriction condition is reached, the controller deletes the content corresponding to the access-restricted file in the restriction condition logic table and the physical storage area.
通过上述的方法,可限定文件的存取次数或可存取时间,并在超过存取次数或可存取时间删除,以限制该文件外流。Through the above method, the access times or the access time of the file can be limited, and deleted when the access times or the access time exceeds, so as to limit the outflow of the file.
附图说明 Description of drawings
图1为该储存媒体与信息处理系统的方块示意图;Fig. 1 is a schematic block diagram of the storage medium and the information processing system;
图2为本方法的实施流程方块图。Figure 2 is a block diagram of the implementation process of the method.
具体实施方式 Detailed ways
本发明为一种限制文件存取的方法,以下将配合附图说明本发明的技术。请参阅图1、图2,图1示出了一储存媒体1与一信息处理系统2电性连接。该储存媒体1可为磁盘硬盘、或固态硬盘、或非易失性存储器;该信息处理系统2可为桌上型电脑、或笔记本电脑、或一移动通讯装置。该储存媒体1包括一实体存储区域14以储存一个或多个文件,以及该储存媒体1内具有一控制器。连接该储存媒体1的信息处理系统2具有一应用程序,以输出兼容于该控制器的存取命令,且该应用程序还可产生被该控制器支持的一特殊命令。当该控制器接收该特殊命令后则首先执行一判断该特殊命令所指定的一限制存取文件的步骤。而后执行建立一限制条件逻辑表11以对应该限制存取文件的步骤,使该特殊命令所指定的文件皆有一限制条件逻辑表11相对应,且该限制条件逻辑表11储存了至少一限定条件以限制该限制存取文件的存取。接着执行一判断该限定条件是否达到的步骤,其中,该控制器在接收到针对限制存取文件的存取命令时,需经由该限制条件逻辑表11以取得储存于实体存储区域14的文件。若未达到该限定条件,该控制器自实体存储区域14存取该限制存取文件;若达到限定条件,则该控制器删除在该限制条件逻辑表11以及实体存储区域14中对应该限制存取文件的内容。上述的限定条件为该限制存取文件的存取次数限制,或者为限制存取文件储存于该储存媒体1的时限,该限定条件亦可同时包括限制存取文件的存取次数限制以及限制存取文件储存于该储存媒体1的时限。该储存媒体1的具体实施样态如图1所示,该储存媒体1还储存了一逻辑地址表10、一逻辑转实体地址表12、一实体地址表13,该控制器接收外部的存取命令或特殊命令而使该逻辑地址表11提供被该些命令所指定文件的逻辑地址。当该存取命令所请求存取的不是限制存取文件,可直接通过存取一般文件路径101以该逻辑地址映射(mapping)到该逻辑转实体地址表12而得到实体地址,再通过该实体地址表13映射(mapping)到被指定文件在实体存储区域14中的位置,从而自该实体存储区域14存取被指定文件的内容。当该存取命令所请求存取的为一限制存取文件,该逻辑地址表10所提供的逻辑地址将通过一存取限制存取文件路径100映射(mapping)到限制条件逻辑表11,并且此时由该控制器判断限制存取文件是否达到该限制条件逻辑表11所定义的限定条件。若未到达该限定条件,该逻辑地址将从该限制条件逻辑表11再映射(mapping)到该逻辑转实体地址表12而得到实体地址,再通过实体地址表13映射(mapping)到被指定文件在实体存储区域14中的位置,从而自该实体存储区域14存取被指定文件的内容。若控制器判断达到该限定条件后,该控制器将删除该限制存取文件在该储存媒体1内的一切内容,包括该逻辑地址表10、该限制条件逻辑表11、逻辑转实体地址表12、实体地址表13、实体存储区域14中映射该限制存取文件的内容都将被控制器删除。由于该信息处理系统2可能对多个文件输出特殊命令,因此该储存媒体1建立多个限制条件逻辑表11对应每一限制存取文件。如图1所示,假设该储存媒体1内具有两个限制存取文件,因此该储存媒体1内具有两个限制条件逻辑表11对应各限制存取文件。并且两个限制条件逻辑表11可具有不同的限定条件,限定条件的内容可由操作者通过信息处理系统2下达特殊命令时决定。该控制器的实施流程如图2所示,首先从该信息处理系统2接收输入的命令(如步骤方块31),先判断是否为特殊命令(如步骤方块32)。若是,则建立一限制条件逻辑表以对应限制存取文件(如步骤方块33)。若否,则代表该输入的命令为存取命令,此时进一步判断该命令所指定文件是否为限制存取文件(如步骤方块34),若该命令所指定文件并非限制存取文件,则可允许直接存取该文件(如步骤方块35)。如果该命令所指定文件为限制存取文件的话,控制器将通过限制条件逻辑表11判断是否达到该限定条件(如步骤方块36)。若未到达限定条件,则允许存取该限制存取文件(如步骤方块37)。若到达限定条件,则由控制器删除对应该限制存取文件的内容(如步骤方块38)。The present invention is a method for restricting file access, and the technology of the present invention will be described below with reference to the accompanying drawings. Please refer to FIG. 1 and FIG. 2 . FIG. 1 shows a storage medium 1 electrically connected to an information processing system 2 . The storage medium 1 can be a hard disk, a solid state disk, or a non-volatile memory; the information processing system 2 can be a desktop computer, a notebook computer, or a mobile communication device. The storage medium 1 includes a physical storage area 14 for storing one or more files, and the storage medium 1 has a controller therein. The information processing system 2 connected to the storage medium 1 has an application program to output access commands compatible with the controller, and the application program can also generate a special command supported by the controller. After the controller receives the special command, it first executes a step of judging an access-restricted file designated by the special command. Then execute the step of establishing a restriction logic table 11 to correspond to the restricted access file, so that the files specified by the special command all have a restriction logic table 11 corresponding, and the restriction logic table 11 stores at least one restriction to restrict access to the restricted access file. Then execute a step of judging whether the limiting condition is met, wherein, when the controller receives the access command for the restricted access file, it needs to obtain the file stored in the physical storage area 14 through the limiting condition logic table 11 . If the limited condition is not reached, the controller accesses the restricted access file from the physical storage area 14; Get the contents of the file. The above-mentioned limiting condition is the access times limit of the restricted access file, or the time limit for storing the restricted access file in the storage medium 1. Get the time limit for storing the file in the storage medium 1. The specific implementation state of this storage medium 1 is shown in Figure 1, this storage medium 1 also stores a logical address table 10, a logic-to-physical address table 12, a physical address table 13, and the controller receives external access commands or special commands so that the logical address table 11 provides the logical addresses of the files specified by these commands. When the requested access of the access command is not a restricted access file, the physical address can be obtained by directly mapping (mapping) the logical address to the physical address table 12 by accessing the general file path 101, and then passing the physical address The address table 13 is mapped to the location of the designated file in the physical storage area 14 , so as to access the content of the designated file from the physical storage area 14 . When the requested access of the access command is an access restricted file, the logical address provided by the logical address table 10 will be mapped to the restricted condition logic table 11 by an access restricted access file path 100, and At this time, the controller judges whether the access-restricted file meets the limit condition defined in the limit condition logic table 11 . If the restriction condition is not reached, the logical address will be remapped (mapped) from the restriction condition logic table 11 to the logical transfer entity address table 12 to obtain the entity address, and then mapped to the specified file by the entity address table 13 (mapping) A location in the physical storage area 14 from which to access the contents of the specified file. If the controller judges that the limiting condition is reached, the controller will delete all contents of the access-restricted file in the storage medium 1, including the logical address table 10, the limiting condition logical table 11, and the logical-to-physical address table 12. , the physical address table 13, and the contents of the physical storage area 14 that map the access-restricted file will all be deleted by the controller. Since the information processing system 2 may output special commands for multiple files, the storage medium 1 establishes multiple restrictive condition logic tables 11 corresponding to each restricted access file. As shown in FIG. 1 , it is assumed that the storage medium 1 has two access-restricted files, so the storage medium 1 has two restriction logic tables 11 corresponding to each restricted-access file. Moreover, the two restriction logic tables 11 may have different restriction conditions, and the content of the restriction conditions may be determined when the operator issues a special order through the information processing system 2 . The implementation flow of the controller is shown in FIG. 2 . First, an input command is received from the information processing system 2 (such as step block 31 ), and whether it is a special command is first judged (such as step block 32 ). If yes, create a restriction logic table corresponding to the restricted access file (such as step block 33). If not, then the command that represents this input is an access command, further judge this moment whether the specified file of this command is a restricted access file (as step square 34), if the specified file of this command is not a restricted access file, then you can Direct access to the file is allowed (eg step block 35). If the file specified by the command is a limited access file, the controller will judge whether the limited condition is met through the limited condition logic table 11 (such as step block 36). If the limiting condition is not met, then allow access to the restricted access file (such as step block 37). If the limiting condition is reached, the controller deletes the content corresponding to the access-restricted file (such as step block 38).
通过上述的方法,可限定文件的存取次数或可存取时间,并在超过存取次数或可存取时间删除,以限制该文件外流,更增加了一机制确保机密不会外泄。上述的控制器还可限定该信息处理系统2必须安装兼容的软件才可存取该限制存取文件。Through the above method, the access times or the access time of the file can be limited, and deleted when the access times or the access time exceeds, so as to limit the outflow of the file, and a mechanism is added to ensure that the secret will not be leaked. The above-mentioned controller can also restrict that the information processing system 2 must install compatible software to access the restricted-access file.
虽然本发明已以优选实施例揭露如上,然其并非用以限定本发明,任何本领域的技术人员在不脱离本发明的精神和范围内而所作的些许更动与润饰,皆应涵盖于本发明中,因此本发明的保护范围当视所附的申请专利范围所界定者为准。Although the present invention has been disclosed above with preferred embodiments, it is not intended to limit the present invention, and any changes and modifications made by those skilled in the art without departing from the spirit and scope of the present invention should be covered by this present invention. Invention, therefore, the protection scope of the present invention should be defined by the scope of the appended patent application.
Claims (9)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201010261092.0A CN102375958B (en) | 2010-08-23 | 2010-08-23 | Ways to Restrict File Access |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201010261092.0A CN102375958B (en) | 2010-08-23 | 2010-08-23 | Ways to Restrict File Access |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN102375958A CN102375958A (en) | 2012-03-14 |
| CN102375958B true CN102375958B (en) | 2015-09-16 |
Family
ID=45794549
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201010261092.0A Expired - Fee Related CN102375958B (en) | 2010-08-23 | 2010-08-23 | Ways to Restrict File Access |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN102375958B (en) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9015439B1 (en) * | 2014-05-30 | 2015-04-21 | SanDisk Technologies, Inc. | Event lock storage device |
| CN105893280A (en) * | 2015-01-26 | 2016-08-24 | 深圳市硅格半导体有限公司 | Memory card data encryption method and system |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1380999A (en) * | 2000-04-25 | 2002-11-20 | 松下电器产业株式会社 | Electronic device and production method therefor |
| CN1770696A (en) * | 2004-11-03 | 2006-05-10 | 易载国际股份有限公司 | File access control management method and system applied to digital rights management |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4872512B2 (en) * | 2006-08-02 | 2012-02-08 | ソニー株式会社 | Storage device, storage control method, and information processing device and method |
| CN101127067A (en) * | 2007-09-13 | 2008-02-20 | 深圳市融合视讯科技有限公司 | Electronic document attribute dynamic setting method |
-
2010
- 2010-08-23 CN CN201010261092.0A patent/CN102375958B/en not_active Expired - Fee Related
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1380999A (en) * | 2000-04-25 | 2002-11-20 | 松下电器产业株式会社 | Electronic device and production method therefor |
| CN1770696A (en) * | 2004-11-03 | 2006-05-10 | 易载国际股份有限公司 | File access control management method and system applied to digital rights management |
Also Published As
| Publication number | Publication date |
|---|---|
| CN102375958A (en) | 2012-03-14 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN103778075B (en) | Security management unit, host controller interface including same, method operating host controller interface | |
| CN114417436B (en) | Security subsystem | |
| CN104424016B (en) | Virtual tape concentration for self-encrypting drives | |
| US7984296B2 (en) | Content protection device and content protection method | |
| CN108573175A (en) | data storage device and operation method thereof | |
| KR20090067649A (en) | Memory system having a secure storage device and its security area management method | |
| US20220123932A1 (en) | Data storage device encryption | |
| US11644983B2 (en) | Storage device having encryption | |
| JP2009187547A (en) | Secure direct platter access | |
| US10331365B2 (en) | Accessing a serial number of a removable non-volatile memory device | |
| CN102375958B (en) | Ways to Restrict File Access | |
| CN106599701A (en) | Hard disk encryption method, hard disk and hard disk encryption equipment | |
| JP2013058179A (en) | External storage device and control method thereof | |
| TWI781464B (en) | Computing devices for encryption and decryption of data | |
| JP4717907B2 (en) | System and method for protecting access of flash memory device | |
| TWI424330B (en) | Limit the way files are accessed | |
| JP2008506298A5 (en) | ||
| KR20100133184A (en) | Solid state drive unit | |
| US20240220667A1 (en) | Storage device and computing device including the same | |
| JPWO2005045681A1 (en) | Information recording medium, access device for information recording medium, and area setting method | |
| JP5978260B2 (en) | Virtual band concentrator for self-encrypting drives | |
| KR101620685B1 (en) | Method and apparatus for managing time-out data stored | |
| KR101854192B1 (en) | Data protection apparatus of storage device and method thereof | |
| CN104391805A (en) | Data structure for encrypting solid state disk | |
| WO2007007493A1 (en) | Content moving method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| TR01 | Transfer of patent right | ||
| TR01 | Transfer of patent right |
Effective date of registration: 20220725 Address after: 3507a, SEG Plaza, No. 1002, Huaqiang North Road, Fuqiang community, Huaqiang North Street, Futian District, Shenzhen, Guangdong Province Patentee after: Shenzhen Quanxing Technology Co.,Ltd. Address before: Taipei County, Taiwan, China Patentee before: APACER TECHNOLOGY INC. |
|
| CF01 | Termination of patent right due to non-payment of annual fee | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150916 |