[go: up one dir, main page]

CN102375958B - Ways to Restrict File Access - Google Patents

Ways to Restrict File Access Download PDF

Info

Publication number
CN102375958B
CN102375958B CN201010261092.0A CN201010261092A CN102375958B CN 102375958 B CN102375958 B CN 102375958B CN 201010261092 A CN201010261092 A CN 201010261092A CN 102375958 B CN102375958 B CN 102375958B
Authority
CN
China
Prior art keywords
access
file
restricted
controller
restricting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201010261092.0A
Other languages
Chinese (zh)
Other versions
CN102375958A (en
Inventor
林坤德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Quanxing Technology Co ltd
Original Assignee
Apacer Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Apacer Technology Inc filed Critical Apacer Technology Inc
Priority to CN201010261092.0A priority Critical patent/CN102375958B/en
Publication of CN102375958A publication Critical patent/CN102375958A/en
Application granted granted Critical
Publication of CN102375958B publication Critical patent/CN102375958B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A method for limiting file access is carried out by a controller in a storage medium, the storage medium includes a physical storage area for storing one or more files, the controller receives a special command and executes a step of judging a file to be limited, a step of establishing a logic table of limiting conditions corresponding to each file to be limited, and a step of judging whether the limiting conditions are reached, wherein at least one limiting condition for limiting file access is stored in the logic table of limiting conditions. When the limit condition is reached, the controller deletes the content of the file corresponding to the limited access in the logical table of the limit condition and the physical storage area.

Description

限制文件存取的方法Ways to Restrict File Access

技术领域 technical field

本发明涉及一种限制文件存取的方法,特别是利用储存媒体的控制器执行一特殊命令,以对一限制存取文件设定存取限定条件的方法。The invention relates to a method for restricting file access, in particular to a method for setting access restriction conditions for an access-restricted file by using a storage medium controller to execute a special command.

背景技术 Background technique

由于传统硬盘、固态硬盘不断的发展,其速度以及容量都不断的提升,并且售价不断的降低。而固态硬盘又可广义的包含可携式的非易失性存储器,亦即俗称的随身碟,随身碟的容量亦足以容纳大量的数据。因此,储存媒体的发展帮助了数字数据的储存、携带与传输。Due to the continuous development of traditional hard drives and solid-state drives, their speed and capacity have been continuously improved, and their prices have been continuously reduced. The solid-state hard drive can broadly include portable non-volatile memory, also known as a flash drive, and the capacity of the flash drive is also sufficient to accommodate a large amount of data. Therefore, the development of storage media has helped the storage, carrying and transmission of digital data.

习知的储存技术如中国台湾专利公告第374161号“备有文件配置表存储器的硬盘机”,该前案所揭示的硬盘机包括许多扇区,每一扇区依序地包括一启动区域、一根目录区域以及一数据区域。而该硬盘机的特征在于包括:一用以写入数据至一硬盘机上并且用以从该硬盘机上读取数据的读写头,一用以储存一文件配置表信息的非依电性文件配置表存储器,以及一用以控制该读写头的移动、该硬盘机的旋转以及数据读写动作的控制器。Known storage technology such as China Taiwan Patent Announcement No. 374161 "Hard Disk Drive with File Configuration Table Memory", the hard disk drive disclosed in this previous case includes many sectors, and each sector sequentially includes a boot area, A directory area and a data area. And the hard disk drive is characterized in comprising: a read/write head for writing data to a hard disk drive and reading data from the hard drive, a non-electrical file configuration for storing information in a file configuration table Table memory, and a controller used to control the movement of the read-write head, the rotation of the hard disk drive, and data read-write actions.

由上述先前案件可知,习知的硬盘包括一控制器,并且将硬盘可存取空间区分为一数据储存区以及一地址储存区。其中该数据储存区被区隔为许多数据储存区块,并且每一数据储存区块具有固定的地址,而该地址储存区则储存了每一笔数据所储存的地址。控制器在储存或读取数据时,都需通过该地址储存区获得与该笔数据对应的地址才可从数据储存区找到对应的数据储存区块。It can be known from the above-mentioned previous cases that the conventional hard disk includes a controller and divides the accessible space of the hard disk into a data storage area and an address storage area. Wherein the data storage area is partitioned into many data storage blocks, and each data storage block has a fixed address, and the address storage area stores the address of each data storage. When the controller stores or reads data, it needs to obtain the address corresponding to the data through the address storage area to find the corresponding data storage block from the data storage area.

但由于数字数据过于便于复制、传输与携带,从保护数据内容的角度来看反而损害了保密性,甚至于任何人可通过可携式硬盘直接复制、储存有版权的数据内容,而侵害了知识产权。However, because digital data is too easy to copy, transmit and carry, it damages the confidentiality from the perspective of protecting data content, and even anyone can directly copy and store copyrighted data content through a portable hard disk, which infringes intellectual property rights. property.

而现有的数据保密技术可参阅中国台湾专利证书第I317502号“实时数据保密方法”,该前案揭示的方法运作于利用一数据夹所挂载成一保密分割区所在的一操作系统中。该方法包括:接收一文件的储存指令,由该操作系统的文件系统接收该文件的储存指令;执行一加密程序;附加一实时加解密控制项至该文件的属性中,依据该保密分割区建立的时候所加入的实时加解密控制项,将该文件附加该实时加解密控制项;以及执行储存作业。更进一步的,该先前案件的说明书揭示加密程序可使用一对称密钥或非对称密钥进行加密,并由对应的密钥解密。再者,该方法还可包括一执行身份辨识附加流程,通过确认身份后才可解密。通过上述方法,被选择加密的文件数据夹需通过至少一次的验证才可开启。For the existing data security technology, please refer to Taiwan Patent Certificate No. I317502 "Real-time Data Security Method". The method disclosed in this previous case operates in an operating system where a data folder is mounted as a security partition. The method includes: receiving a storage instruction of a file, and receiving the storage instruction of the file by the file system of the operating system; executing an encryption program; adding a real-time encryption and decryption control item to the attribute of the file, and establishing according to the security partition Add the real-time encryption and decryption control item when adding the real-time encryption and decryption control item to the file; and execute the storage operation. Furthermore, the specification of the prior case discloses that the encryption program can be encrypted using a symmetric key or an asymmetric key, and decrypted by the corresponding key. Furthermore, the method may also include performing an additional process of identity identification, and the decryption can only be performed after the identity is confirmed. Through the above method, the file folder selected to be encrypted needs to pass at least one verification before it can be opened.

但通过密钥以及身份验证的保密仍可能使加密的文件在开启后被复制外流,因此保密的机制仍有不断改进创新的空间。However, the confidentiality through key and identity verification may still cause the encrypted file to be copied and leaked after opening, so there is still room for continuous improvement and innovation in the confidentiality mechanism.

发明内容 Contents of the invention

为了改善现有技术中文件容易被复制、外流。因此本发明的目的在于提供一种通过存储器内的控制器限制文件读写次数或时间的技术,并在到达所限定的读写次数或时间后删除该文件,以限制该文件外流。In order to improve the prior art, files are easily copied and outflowed. Therefore, the object of the present invention is to provide a technology for limiting the number of reads and writes or time of a file by the controller in the memory, and delete the file after reaching the limited number of reads and writes or time, so as to limit the outflow of the file.

本发明为一种限制文件存取的方法,该方法由一储存媒体内的一控制器执行,且该储存媒体包括一实体存储区域以储存一个或多个文件,而该控制器接收一特殊命令则执行一判断该特殊命令所指定的一限制存取文件的步骤、建立一限制条件逻辑表以对应每一限制存取文件的步骤、一判断该限定条件是否达到的步骤,其中,该限制条件逻辑表内储存了限制存取文件的存取的至少一限定条件。当到达该限定条件后,该控制器删除在该限制条件逻辑表以及实体存储区域中对应该限制存取文件的内容。The present invention is a method of restricting file access, the method is executed by a controller in a storage medium, and the storage medium includes a physical storage area for storing one or more files, and the controller receives a special command Then execute a step of judging a restricted access file specified by the special command, a step of establishing a restriction logic table to correspond to each restricted access file, and a step of judging whether the restriction condition is reached, wherein the restriction condition At least one restriction condition for restricting the access of the access file is stored in the logic table. When the restriction condition is reached, the controller deletes the content corresponding to the access-restricted file in the restriction condition logic table and the physical storage area.

通过上述的方法,可限定文件的存取次数或可存取时间,并在超过存取次数或可存取时间删除,以限制该文件外流。Through the above method, the access times or the access time of the file can be limited, and deleted when the access times or the access time exceeds, so as to limit the outflow of the file.

附图说明 Description of drawings

图1为该储存媒体与信息处理系统的方块示意图;Fig. 1 is a schematic block diagram of the storage medium and the information processing system;

图2为本方法的实施流程方块图。Figure 2 is a block diagram of the implementation process of the method.

具体实施方式 Detailed ways

本发明为一种限制文件存取的方法,以下将配合附图说明本发明的技术。请参阅图1、图2,图1示出了一储存媒体1与一信息处理系统2电性连接。该储存媒体1可为磁盘硬盘、或固态硬盘、或非易失性存储器;该信息处理系统2可为桌上型电脑、或笔记本电脑、或一移动通讯装置。该储存媒体1包括一实体存储区域14以储存一个或多个文件,以及该储存媒体1内具有一控制器。连接该储存媒体1的信息处理系统2具有一应用程序,以输出兼容于该控制器的存取命令,且该应用程序还可产生被该控制器支持的一特殊命令。当该控制器接收该特殊命令后则首先执行一判断该特殊命令所指定的一限制存取文件的步骤。而后执行建立一限制条件逻辑表11以对应该限制存取文件的步骤,使该特殊命令所指定的文件皆有一限制条件逻辑表11相对应,且该限制条件逻辑表11储存了至少一限定条件以限制该限制存取文件的存取。接着执行一判断该限定条件是否达到的步骤,其中,该控制器在接收到针对限制存取文件的存取命令时,需经由该限制条件逻辑表11以取得储存于实体存储区域14的文件。若未达到该限定条件,该控制器自实体存储区域14存取该限制存取文件;若达到限定条件,则该控制器删除在该限制条件逻辑表11以及实体存储区域14中对应该限制存取文件的内容。上述的限定条件为该限制存取文件的存取次数限制,或者为限制存取文件储存于该储存媒体1的时限,该限定条件亦可同时包括限制存取文件的存取次数限制以及限制存取文件储存于该储存媒体1的时限。该储存媒体1的具体实施样态如图1所示,该储存媒体1还储存了一逻辑地址表10、一逻辑转实体地址表12、一实体地址表13,该控制器接收外部的存取命令或特殊命令而使该逻辑地址表11提供被该些命令所指定文件的逻辑地址。当该存取命令所请求存取的不是限制存取文件,可直接通过存取一般文件路径101以该逻辑地址映射(mapping)到该逻辑转实体地址表12而得到实体地址,再通过该实体地址表13映射(mapping)到被指定文件在实体存储区域14中的位置,从而自该实体存储区域14存取被指定文件的内容。当该存取命令所请求存取的为一限制存取文件,该逻辑地址表10所提供的逻辑地址将通过一存取限制存取文件路径100映射(mapping)到限制条件逻辑表11,并且此时由该控制器判断限制存取文件是否达到该限制条件逻辑表11所定义的限定条件。若未到达该限定条件,该逻辑地址将从该限制条件逻辑表11再映射(mapping)到该逻辑转实体地址表12而得到实体地址,再通过实体地址表13映射(mapping)到被指定文件在实体存储区域14中的位置,从而自该实体存储区域14存取被指定文件的内容。若控制器判断达到该限定条件后,该控制器将删除该限制存取文件在该储存媒体1内的一切内容,包括该逻辑地址表10、该限制条件逻辑表11、逻辑转实体地址表12、实体地址表13、实体存储区域14中映射该限制存取文件的内容都将被控制器删除。由于该信息处理系统2可能对多个文件输出特殊命令,因此该储存媒体1建立多个限制条件逻辑表11对应每一限制存取文件。如图1所示,假设该储存媒体1内具有两个限制存取文件,因此该储存媒体1内具有两个限制条件逻辑表11对应各限制存取文件。并且两个限制条件逻辑表11可具有不同的限定条件,限定条件的内容可由操作者通过信息处理系统2下达特殊命令时决定。该控制器的实施流程如图2所示,首先从该信息处理系统2接收输入的命令(如步骤方块31),先判断是否为特殊命令(如步骤方块32)。若是,则建立一限制条件逻辑表以对应限制存取文件(如步骤方块33)。若否,则代表该输入的命令为存取命令,此时进一步判断该命令所指定文件是否为限制存取文件(如步骤方块34),若该命令所指定文件并非限制存取文件,则可允许直接存取该文件(如步骤方块35)。如果该命令所指定文件为限制存取文件的话,控制器将通过限制条件逻辑表11判断是否达到该限定条件(如步骤方块36)。若未到达限定条件,则允许存取该限制存取文件(如步骤方块37)。若到达限定条件,则由控制器删除对应该限制存取文件的内容(如步骤方块38)。The present invention is a method for restricting file access, and the technology of the present invention will be described below with reference to the accompanying drawings. Please refer to FIG. 1 and FIG. 2 . FIG. 1 shows a storage medium 1 electrically connected to an information processing system 2 . The storage medium 1 can be a hard disk, a solid state disk, or a non-volatile memory; the information processing system 2 can be a desktop computer, a notebook computer, or a mobile communication device. The storage medium 1 includes a physical storage area 14 for storing one or more files, and the storage medium 1 has a controller therein. The information processing system 2 connected to the storage medium 1 has an application program to output access commands compatible with the controller, and the application program can also generate a special command supported by the controller. After the controller receives the special command, it first executes a step of judging an access-restricted file designated by the special command. Then execute the step of establishing a restriction logic table 11 to correspond to the restricted access file, so that the files specified by the special command all have a restriction logic table 11 corresponding, and the restriction logic table 11 stores at least one restriction to restrict access to the restricted access file. Then execute a step of judging whether the limiting condition is met, wherein, when the controller receives the access command for the restricted access file, it needs to obtain the file stored in the physical storage area 14 through the limiting condition logic table 11 . If the limited condition is not reached, the controller accesses the restricted access file from the physical storage area 14; Get the contents of the file. The above-mentioned limiting condition is the access times limit of the restricted access file, or the time limit for storing the restricted access file in the storage medium 1. Get the time limit for storing the file in the storage medium 1. The specific implementation state of this storage medium 1 is shown in Figure 1, this storage medium 1 also stores a logical address table 10, a logic-to-physical address table 12, a physical address table 13, and the controller receives external access commands or special commands so that the logical address table 11 provides the logical addresses of the files specified by these commands. When the requested access of the access command is not a restricted access file, the physical address can be obtained by directly mapping (mapping) the logical address to the physical address table 12 by accessing the general file path 101, and then passing the physical address The address table 13 is mapped to the location of the designated file in the physical storage area 14 , so as to access the content of the designated file from the physical storage area 14 . When the requested access of the access command is an access restricted file, the logical address provided by the logical address table 10 will be mapped to the restricted condition logic table 11 by an access restricted access file path 100, and At this time, the controller judges whether the access-restricted file meets the limit condition defined in the limit condition logic table 11 . If the restriction condition is not reached, the logical address will be remapped (mapped) from the restriction condition logic table 11 to the logical transfer entity address table 12 to obtain the entity address, and then mapped to the specified file by the entity address table 13 (mapping) A location in the physical storage area 14 from which to access the contents of the specified file. If the controller judges that the limiting condition is reached, the controller will delete all contents of the access-restricted file in the storage medium 1, including the logical address table 10, the limiting condition logical table 11, and the logical-to-physical address table 12. , the physical address table 13, and the contents of the physical storage area 14 that map the access-restricted file will all be deleted by the controller. Since the information processing system 2 may output special commands for multiple files, the storage medium 1 establishes multiple restrictive condition logic tables 11 corresponding to each restricted access file. As shown in FIG. 1 , it is assumed that the storage medium 1 has two access-restricted files, so the storage medium 1 has two restriction logic tables 11 corresponding to each restricted-access file. Moreover, the two restriction logic tables 11 may have different restriction conditions, and the content of the restriction conditions may be determined when the operator issues a special order through the information processing system 2 . The implementation flow of the controller is shown in FIG. 2 . First, an input command is received from the information processing system 2 (such as step block 31 ), and whether it is a special command is first judged (such as step block 32 ). If yes, create a restriction logic table corresponding to the restricted access file (such as step block 33). If not, then the command that represents this input is an access command, further judge this moment whether the specified file of this command is a restricted access file (as step square 34), if the specified file of this command is not a restricted access file, then you can Direct access to the file is allowed (eg step block 35). If the file specified by the command is a limited access file, the controller will judge whether the limited condition is met through the limited condition logic table 11 (such as step block 36). If the limiting condition is not met, then allow access to the restricted access file (such as step block 37). If the limiting condition is reached, the controller deletes the content corresponding to the access-restricted file (such as step block 38).

通过上述的方法,可限定文件的存取次数或可存取时间,并在超过存取次数或可存取时间删除,以限制该文件外流,更增加了一机制确保机密不会外泄。上述的控制器还可限定该信息处理系统2必须安装兼容的软件才可存取该限制存取文件。Through the above method, the access times or the access time of the file can be limited, and deleted when the access times or the access time exceeds, so as to limit the outflow of the file, and a mechanism is added to ensure that the secret will not be leaked. The above-mentioned controller can also restrict that the information processing system 2 must install compatible software to access the restricted-access file.

虽然本发明已以优选实施例揭露如上,然其并非用以限定本发明,任何本领域的技术人员在不脱离本发明的精神和范围内而所作的些许更动与润饰,皆应涵盖于本发明中,因此本发明的保护范围当视所附的申请专利范围所界定者为准。Although the present invention has been disclosed above with preferred embodiments, it is not intended to limit the present invention, and any changes and modifications made by those skilled in the art without departing from the spirit and scope of the present invention should be covered by this present invention. Invention, therefore, the protection scope of the present invention should be defined by the scope of the appended patent application.

Claims (9)

1.一种限制文件存取的方法,所述方法定义一储存媒体(1)以及与所述储存媒体(1)连接的信息处理系统(2),所述储存媒体(1)包括一逻辑地址表(10)、一逻辑转实体地址表(12)、一实体地址表(13)、一控制器以及储存一个或多个文件的一实体存储区域(14),而其特征在于,所述限制文件存取的方法包括下列步骤:1. A method for restricting file access, said method defines a storage medium (1) and an information processing system (2) connected to said storage medium (1), said storage medium (1) comprising a logical address table (10), a logic transfer physical address table (12), a physical address table (13), a controller and a physical storage area (14) for storing one or more files, and it is characterized in that the restriction The method of file access includes the following steps: 从所述信息处理系统输入指定一限制存取文件的特殊命令至所述控制器;inputting a special command designating a restricted-access file from the information handling system to the controller; 所述控制器判断所述特殊命令所指定的所述限制存取文件;The controller judges the restricted access file specified by the special command; 所述控制器建立一限制条件逻辑表(11)以对应所述限制存取文件,所述限制条件逻辑表(11)储存了限制所述限制存取文件存取的至少一个限定条件;The controller establishes a restrictive condition logic table (11) corresponding to the restricted access file, and the restricted condition logical table (11) stores at least one restrictive condition restricting access to the restricted access file; 从所述信息处理系统输入存取所述限制存取文件的存取命令至所述控制器;inputting an access command to access the restricted-access file from the information processing system to the controller; 所述控制器在接收到所述存取命令时,所述逻辑地址表(10)提供所述限制存取文件的一逻辑地址,并通过一存取限制文件路径(100)映射到所述限制条件逻辑表(11),由所述控制器判断所述限制存取文件是否达到所述限定条件;When the controller receives the access command, the logical address table (10) provides a logical address of the restricted-access file, and maps to the restricted-access file path (100) A conditional logic table (11), where the controller judges whether the access-restricted file meets the limiting condition; 若未达到所述限定条件,所述控制器经由所述限制条件逻辑表(11)将所述逻辑地址映射到所述逻辑转实体地址表(12)而得到一实体地址,再通过该实体地址表(13)映射所述实体地址至所述限制存取文件在所述实体存储区域(14)的位置,并且自所述实体存储区域(14)存取所述限制存取文件;If the limiting condition is not met, the controller maps the logical address to the logical-to-physical address table (12) through the limiting condition logic table (11) to obtain a physical address, and then passes the physical address The table (13) maps the physical address to the location of the restricted access file in the physical storage area (14), and accesses the restricted access file from the physical storage area (14); 若达到限定条件,则所述控制器删除在所述逻辑地址表(10)、所述限制条件逻辑表(11)、所述逻辑转实体地址表(12)、所述实体地址表(13)以及实体存储区域(14)中对应于所述限制存取文件的内容。If the limiting condition is reached, the controller deletes the logical address table (10), the limiting condition logic table (11), the logic-to-entity address table (12), and the entity address table (13) And the content corresponding to the access-restricted file in the entity storage area (14). 2.根据权利要求1所述的限制文件存取的方法,其特征在于,所述限定条件为限制存取文件的存取次数限制。2 . The method for restricting file access according to claim 1 , characterized in that the limiting condition is a limit on the number of access times of the restricted access file. 3 . 3.根据权利要求1所述的限制文件存取的方法,其特征在于,所述限定条件为限制存取文件储存于所述储存媒体(1)的时限。3 . The method for restricting file access according to claim 1 , wherein the restricting condition is a time limit for restricting access to files stored in the storage medium ( 1 ). 4 . 4.根据权利要求1所述的限制文件存取的方法,其特征在于,所述限定条件同时包括限制存取文件的存取次数限制以及限制存取文件储存于所述储存媒体(1)的时限。4. The method for restricting file access according to claim 1, characterized in that, the limiting conditions include the limit on the number of accesses of the restricted access file and the number of times the restricted access file is stored in the storage medium (1). time limit. 5.根据权利要求1所述的限制文件存取的方法,其特征在于,所述储存媒体(1)连接一信息处理系统(2),以接收所述信息处理系统(2)产生的存取命令或特殊命令。5. The method for restricting file access according to claim 1, characterized in that the storage medium (1) is connected to an information processing system (2) to receive the access generated by the information processing system (2) commands or special commands. 6.根据权利要求5所述的限制文件存取的方法,其特征在于,所述信息处理系统(2)为桌上型电脑、或笔记本电脑、或移动通讯装置。6. The method for restricting file access according to claim 5, characterized in that the information processing system (2) is a desktop computer, or a notebook computer, or a mobile communication device. 7.根据权利要求5所述的限制文件存取的方法,其特征在于,所述信息处理系统(2)具有一应用程序,以输出兼容于所述控制器的存取命令或特殊命令。7. The method for restricting file access according to claim 5, characterized in that the information processing system (2) has an application program to output access commands or special commands compatible with the controller. 8.根据权利要求1所述的限制文件存取的方法,其特征在于,所述储存媒体(1)为非易失性存储器。8. The method for restricting file access according to claim 1, characterized in that the storage medium (1) is a non-volatile memory. 9.根据权利要求8所述的限制文件存取的方法,其特征在于,所述储存媒体(1)为磁盘硬盘或固态硬盘。9. The method for restricting file access according to claim 8, characterized in that, the storage medium (1) is a magnetic disk hard disk or a solid state hard disk.
CN201010261092.0A 2010-08-23 2010-08-23 Ways to Restrict File Access Expired - Fee Related CN102375958B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010261092.0A CN102375958B (en) 2010-08-23 2010-08-23 Ways to Restrict File Access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010261092.0A CN102375958B (en) 2010-08-23 2010-08-23 Ways to Restrict File Access

Publications (2)

Publication Number Publication Date
CN102375958A CN102375958A (en) 2012-03-14
CN102375958B true CN102375958B (en) 2015-09-16

Family

ID=45794549

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010261092.0A Expired - Fee Related CN102375958B (en) 2010-08-23 2010-08-23 Ways to Restrict File Access

Country Status (1)

Country Link
CN (1) CN102375958B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9015439B1 (en) * 2014-05-30 2015-04-21 SanDisk Technologies, Inc. Event lock storage device
CN105893280A (en) * 2015-01-26 2016-08-24 深圳市硅格半导体有限公司 Memory card data encryption method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1380999A (en) * 2000-04-25 2002-11-20 松下电器产业株式会社 Electronic device and production method therefor
CN1770696A (en) * 2004-11-03 2006-05-10 易载国际股份有限公司 File access control management method and system applied to digital rights management

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4872512B2 (en) * 2006-08-02 2012-02-08 ソニー株式会社 Storage device, storage control method, and information processing device and method
CN101127067A (en) * 2007-09-13 2008-02-20 深圳市融合视讯科技有限公司 Electronic document attribute dynamic setting method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1380999A (en) * 2000-04-25 2002-11-20 松下电器产业株式会社 Electronic device and production method therefor
CN1770696A (en) * 2004-11-03 2006-05-10 易载国际股份有限公司 File access control management method and system applied to digital rights management

Also Published As

Publication number Publication date
CN102375958A (en) 2012-03-14

Similar Documents

Publication Publication Date Title
CN103778075B (en) Security management unit, host controller interface including same, method operating host controller interface
CN114417436B (en) Security subsystem
CN104424016B (en) Virtual tape concentration for self-encrypting drives
US7984296B2 (en) Content protection device and content protection method
CN108573175A (en) data storage device and operation method thereof
KR20090067649A (en) Memory system having a secure storage device and its security area management method
US20220123932A1 (en) Data storage device encryption
US11644983B2 (en) Storage device having encryption
JP2009187547A (en) Secure direct platter access
US10331365B2 (en) Accessing a serial number of a removable non-volatile memory device
CN102375958B (en) Ways to Restrict File Access
CN106599701A (en) Hard disk encryption method, hard disk and hard disk encryption equipment
JP2013058179A (en) External storage device and control method thereof
TWI781464B (en) Computing devices for encryption and decryption of data
JP4717907B2 (en) System and method for protecting access of flash memory device
TWI424330B (en) Limit the way files are accessed
JP2008506298A5 (en)
KR20100133184A (en) Solid state drive unit
US20240220667A1 (en) Storage device and computing device including the same
JPWO2005045681A1 (en) Information recording medium, access device for information recording medium, and area setting method
JP5978260B2 (en) Virtual band concentrator for self-encrypting drives
KR101620685B1 (en) Method and apparatus for managing time-out data stored
KR101854192B1 (en) Data protection apparatus of storage device and method thereof
CN104391805A (en) Data structure for encrypting solid state disk
WO2007007493A1 (en) Content moving method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220725

Address after: 3507a, SEG Plaza, No. 1002, Huaqiang North Road, Fuqiang community, Huaqiang North Street, Futian District, Shenzhen, Guangdong Province

Patentee after: Shenzhen Quanxing Technology Co.,Ltd.

Address before: Taipei County, Taiwan, China

Patentee before: APACER TECHNOLOGY INC.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150916