CN112825098A - Data protection method and device, computing equipment and storage medium - Google Patents

Data protection method and device, computing equipment and storage medium Download PDF

Info

Publication number
CN112825098A
CN112825098A CN201911147418.4A CN201911147418A CN112825098A CN 112825098 A CN112825098 A CN 112825098A CN 201911147418 A CN201911147418 A CN 201911147418A CN 112825098 A CN112825098 A CN 112825098A
Authority
CN
China
Prior art keywords
read
protection
write
address
area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911147418.4A
Other languages
Chinese (zh)
Inventor
李峰峰
乔晖
金跃伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN201911147418.4A priority Critical patent/CN112825098A/en
Publication of CN112825098A publication Critical patent/CN112825098A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a data protection method, a data protection device, a computing device and a storage medium. The data protection method comprises the following steps: setting at least one protection area of the storage device in response to the configuration instruction; responding to a read-write instruction, and detecting whether a read-write address in the read-write instruction belongs to an address range of the at least one protection area; and executing the read-write instruction when the read-write address is detected not to belong to the address range.

Description

Data protection method and device, computing equipment and storage medium
Technical Field
The present application relates to the field of embedded software technologies, and in particular, to a data protection method and apparatus, a computing device, and a storage medium.
Background
In application scenarios such as embedded devices, the device typically deploys one or more memories. The memory is, for example, nand flash, nor flash, magnetic disk, etc. The memory may store programs and user data.
In some application scenarios, in order to protect data in the memory, the embedded device needs to add dedicated hardware to protect the integrity of the data. However, this data protection method cannot avoid the trouble of requiring dedicated hardware. Another way of protecting data is to back up data from each other through multiple storage devices. However, the way of mutual backup is inefficient in data storage.
Therefore, a data protection mechanism that does not use dedicated hardware and improves data storage efficiency is currently lacking.
Disclosure of Invention
According to an aspect of the present application, there is provided a data protection method, including:
setting at least one protection area of the storage device in response to the configuration instruction;
responding to a read-write instruction, and detecting whether a read-write address in the read-write instruction belongs to an address range of the at least one protection area;
and executing the read-write instruction when the read-write address is detected not to belong to the address range.
In some embodiments, said setting at least one protection region of the storage device in response to the configuration instruction comprises: in response to a configuration instruction, the region protection module sets at least one protection region of the storage device; the detecting, in response to a read-write command, whether a read-write address in the read-write command belongs to an address range of the at least one protection area includes: the region protection module responds to the read-write command and detects whether a read-write address in the read-write command belongs to the address range of the at least one protection region; when the read-write address is detected not to belong to the address range, executing the read-write instruction, including: and when the region protection module detects that the read-write address does not belong to the address range, the device driving module executes the read-write instruction.
In some embodiments, the data protection method further comprises: and returning a read-write instruction execution error when detecting that the read-write address belongs to the address range.
In some embodiments, the data protection method further comprises: detecting whether at least one address area specified in the configuration instruction and an existing protection area in the storage device have address overlapping or not; performing the setting of at least one protection area on the storage device upon determining that there is no address overlap; upon determining that there is address overlap, setting failure information is generated.
In some embodiments, the data protection method further comprises: and deleting the configuration information of the protection area set for the storage equipment when the storage equipment is removed.
In some embodiments, the detecting, in response to a read/write instruction, whether a read/write address in the read/write instruction belongs to an address range of the at least one protection area includes:
traversing and detecting whether each protection area in the at least one protection area contains the read-write address; or
And detecting whether the read-write address belongs to the address range of the at least one protection area or not by a dichotomy mode for the at least one protection area arranged according to the address sequence.
In some embodiments, the data protection method further comprises: receiving an instruction for deleting a protected area, wherein the instruction comprises an identifier of the protected area to be deleted; and deleting the configuration information of the protected area to be deleted according to the identifier of the protected area to be deleted.
In some embodiments, the data protection method further comprises: recording access records to the area protection module, wherein the access records are used for recording read-write instructions and configuration instructions sent to the area protection module; and responding to the query request of the access record, and returning the access record.
According to one aspect of the present application, there is provided a data protection apparatus, including a device driving module and a region protection module;
the area protection module is used for responding to a configuration instruction and setting at least one protection area of the storage equipment; the region protection module responds to the read-write command and detects whether a read-write address in the read-write command belongs to the address range of the at least one protection region; and when the region protection module detects that the read-write address does not belong to the address range, the device driving module executes the read-write instruction.
According to an aspect of the present application, there is provided a computing device comprising: a processor; a storage device; wherein the processor is configured to perform a data protection method according to the present application.
According to an aspect of the present application, there is provided a storage medium storing one or more programs, the one or more programs including instructions, which when executed by a computing device, cause the computing device to perform a method of data protection.
In summary, according to the data protection scheme of the present application, the protection area of the storage device can be flexibly set in response to the configuration instruction, and data in the protection area can be prevented from being tampered by detecting whether the address in the read/write instruction belongs to the protection area, so that data security of the data protection area can be ensured. Particularly, the data protection scheme of the embodiment of the application can conveniently perform security protection on the device data on the premise of avoiding adopting special hardware to protect the data and avoiding mutual backup of a plurality of storage devices.
Drawings
FIG. 1 illustrates a flow diagram of a data protection method 100 according to some implementations of the present application;
FIG. 2 illustrates a flow diagram of a data protection method 200 in accordance with some implementations of the present application;
FIG. 3 illustrates a schematic diagram of a region protection module traversing a doubly linked list in sequence, according to some embodiments of the present application;
FIG. 4 illustrates a schematic diagram of a zone protection module dichotomy detection of protected zones according to some embodiments of the present application;
FIG. 5 illustrates a schematic diagram of a computing device 500, according to some embodiments of the present application;
FIG. 6 illustrates a schematic diagram of a computing device after deletion of a protected area according to some embodiments of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is further described in detail below by referring to the accompanying drawings and examples.
FIG. 1 illustrates a flow diagram of a data protection method 100 in accordance with some implementations of the present application. The method 100 may be performed, for example, in a computing device such as an embedded device. Here, the embedded device is, for example, a video camera or the like.
In step S101, at least one protection area of the storage device is set in response to the configuration instruction. In some embodiments, the embedded device may generate the configuration instructions from user input when the storage device is inserted into the embedded device, but is not limited to such. In some embodiments, step S101 may, for example, set a protection zone for one or more storage devices. Step S101 may generate configuration information of the protection area according to the configuration instruction, for example. The configuration information of each protection region may include, for example, an identification of the protection region, a start address, and a space size of the protection region.
In step S102, in response to the read/write command, it is detected whether the read/write address in the read/write command belongs to the address range of the protection area.
When it is detected in step S102 that the read/write address does not belong to the address range of the protection area, the method 100 may execute step S103 to execute the read/write command.
In summary, according to the data protection method 100 of the present application, the protection area of the storage device can be flexibly set in response to the configuration instruction, and data in the protection area can be prevented from being tampered by detecting whether the address in the read/write instruction belongs to the protection area, so that data security of the data protection area can be ensured. Particularly, the data protection scheme of the embodiment of the present application can implement security protection on device data on the premise of avoiding the trouble of protecting data by using dedicated hardware and avoiding the trouble of performing mutual backup on a plurality of storage devices.
FIG. 2 illustrates a flow diagram of a method 200 of data protection in accordance with some implementations of the present application. The method 200 may be performed, for example, in a computing device such as an embedded device.
As shown in fig. 2, in step S201, in response to a configuration instruction, it is detected whether there is an address overlap between at least one address region specified in the configuration instruction and an existing protection region in the storage device.
In some embodiments, the embedded device may generate the configuration instructions from user input when the storage device is inserted into the embedded device, but is not limited to such.
In some embodiments, the zone protection module may perform step S201. The zone protection module may be at an application layer, for example, and may manage configuration information of the protected zone. Here, the area protection module may be an application or a plug-in. Here, the embodiment of the present application may facilitate management of configuration information and conveniently load and unload the area protection module by deploying the area protection module in the application layer.
Upon determining in step S201 that there is no address overlap, the method 200 may perform step S202, setting at least one protection zone on the storage device. Step S202 may, for example, set a protection zone for one or more storage devices. Step S202 may generate configuration information of the protection area according to the configuration instruction, for example. The configuration information of each protection region may include, for example, an identification of the protection region, a start address, and a space size of the protection region.
In some embodiments, the zone protection module may perform step S202. In this way, the region protection module may set a protection region corresponding to an address region where there is no overlap.
In summary, through the combination of steps S201-S202, the method 200 can avoid the trouble of overlapping the data in the protection area, thereby ensuring the data security of the data protection area in the storage device.
Upon determining in step S201 that there is address overlap, the method 200 may perform step S203, generating setting failure information. Through step S203, the method 200 may prompt the user for a setting failure in order to regenerate the configuration instruction.
In step S204, in response to the read/write command, it is detected whether the read/write address in the read/write command belongs to the address range of the protection area.
In some embodiments, step S204 traverses detecting whether each protection region contains a read-write address. For example, the zone protection module may establish a doubly linked list of protected zones. Here, the protection areas in the doubly linked list may be arranged in address order, for example. As shown in fig. 3, the region protection module 250 sequentially traverses the doubly linked list. The region protection module may sequentially determine whether the read-write address belongs to the protection regions 1 to n. In this way, step S204 can accurately determine whether the read/write address belongs to the protection area by traversing the detection protection area.
In some embodiments, for the protection regions arranged in the address order, step S204 may detect whether the read/write address belongs to the address range of the protection region by a binary method. As shown in fig. 4, step S204 first determines whether the read/write address belongs to the n/2 th protection area. When the read/write address does not belong to the n/2 th protection area, step S204 may determine whether the read/write address belongs to a region before the n/2 th protection area. Before the read/write address belongs to the n/2 th protection region, step S204 may determine whether the read/write address belongs to the n/4 th protection region. After the read/write address belongs to the n/2 th protection region, step S204 may determine whether the read/write address belongs to the 3n/4 th protection region. By analogy, step S204 may quickly determine whether the read/write address belongs to the address range of the protection region by bisection. In addition, in step S204, it may also be determined whether the read-write address belongs to the range of the protection area by using a search method such as a red-black tree or a binary tree. When it is detected in step S204 that the read/write address does not belong to the address range of the protection area, the method 200 may execute step S205 to execute the read/write command. In some embodiments, the device driver module may perform step S205.
When it is detected in step S204 that the read/write address belongs to the address range of the protection area, the method 100 may execute step S206 to return to the read/write instruction execution error.
In summary, through the combination of steps S204-S206, the data protection method 200 in the embodiment of the present application may detect, in response to the read/write instruction, whether the read/write instruction is in the address range of the protected area, so that the read/write instruction whose read/write address is not in the protected area and the read/write instruction whose read/write address is in the protected area may be executed, so as to protect data in the protected area, and prevent an application service error or a system service operation abnormality caused by maliciously modifying data in an important area in the storage device.
In step S207, when the storage device has been removed, the configuration information for the protection area corresponding to the storage device is deleted.
In step S208, an instruction to delete the protected area is received. The instruction includes an identification of the protected area to be deleted.
In step S209, the configuration information of the protected area to be deleted is deleted according to the identifier of the protected area to be deleted.
In summary, through steps S207 to S209, according to the data protection method 200 of the embodiment of the present application, the protection area can be flexibly set and the protection area can be deleted.
In some embodiments, the data protection method 200 may further perform step S210, recording access records to the area protection module. The access record is used for recording a read-write instruction and a configuration instruction sent to the area protection module.
In step S211, the access record is returned in response to the inquiry request for the access record.
In summary, through steps S210 and S211, the data protection method 200 may provide a function of viewing access records, so as to facilitate a manager to check whether there is a service that has accessed the protected area by mistake. In summary, according to the data protection method 200 of the embodiment of the present application, the protection area can be flexibly set and deleted. On this basis, the data protection method 200 according to the embodiment of the present application may detect whether the read-write instruction is in the address range of the protection area in response to the read-write instruction, so that the read-write instruction whose read-write address is not in the protection area may be executed, and the read-write instruction whose read-write address is in the protection area may not be executed, so that data in the protection area may be protected, and abnormal operation of the system service caused by an application service error or malicious modification of data in an important area in the storage device may be prevented. It is particularly noted that the data protection method 200 according to the embodiment of the present application can avoid the trouble of protecting data by using dedicated hardware, and can also avoid the trouble of performing mutual backup on a plurality of storage devices, thereby improving the data storage efficiency.
FIG. 5 illustrates a schematic diagram of a computing device 500 according to some embodiments of the present application. As shown in fig. 5, computing device 500 may include an operating system 510 and at least one storage device (e.g., 520 and 530, labeled in fig. 5). The storage device is, for example, a magnetic disk, a flash memory, a solid state disk, or the like. The operating system 510 may be, for example, a software system such as embedded Linux, but is not limited thereto. Computing device 500 can additionally include an application layer 540 above operating system 510. Here, the application layer 540 may include one or more applications, such as 541, 542, and 543 shown in fig. 5. Each application may execute various types of business programs. The data protection apparatus according to an embodiment of the present application may include a device driver module 540 and a region protection module 550 in an operating system 510. Here, the device driver module 540 may manage the storage devices 520 and 530, for example, control reading and writing and erasing of data. The region protection module 550 may be at an application layer, for example, and may manage configuration information of the protected region. Here, the area protection module 550 may be an application or a plug-in. Here, the embodiment of the present application may facilitate management of configuration information and conveniently load and unload the region protection module 550 by deploying the region protection module 550 at an application layer.
In some embodiments, application 541 may generate configuration instructions in response to user input or remote instructions from a network. The configuration instruction specifies at least one address region. Here, the address area refers to an address range in which a protection area is to be created. Here, the address range may be expressed in terms of a start address and a space size, for example.
The region protection module 550, in response to the configuration instruction, may detect whether there is an address overlap between an address region in the instruction and an existing protection region in the storage device. In addition, when the configuration instruction specifies multiple address regions, the region protection module 550 may also detect whether there is an address overlap between different address regions in the instruction. When there is an address overlap, the region protection module 550 may return generation setting failure information to the application 541. The application 541 may re-determine the protection zone to be created.
Upon determining that there is no address overlap, the region protection module 550 may create a corresponding protection region according to the address region specified by the configuration instruction. The zone protection module may manage configuration information for each protected zone. For example, storage device 520 includes protection regions A1, A2, and An. n is an integer greater than 2. The storage device 530 may include protection regions B1, B2, and Bm. m is an integer greater than 2.
Application 542 may send read and write instructions. In response to the read/write command, the area protection module 550 detects whether the read/write address in the read/write command belongs to the address range of the protection area.
When detecting that the read/write address does not belong to the address range of the protection region, the region protection module 550 may send a read/write command to the device driver module 540. The device driver module 540 may execute read and write instructions, i.e., perform read and write operations. When the region protection module 550 detects that the read/write address belongs to the address range of the protection region, the device driver module 540 may return a read/write instruction execution error to the application 542. For another example, the application 543 sends read and write instructions to the zone protection module 550. When determining that the read-write address belongs to the protection range, the area protection module 550 returns an error message, i.e., a read-write instruction execution error.
In some embodiments, to determine whether the read and write addresses of the read and write instructions belong to the address ranges of the protection regions, the region protection module 550 may traverse the address range of each protection region to detect whether each protection region contains a read and write address. For example, the zone protection module 550 may establish a doubly linked list of protected zones. Here, the protection areas in the doubly linked list may be arranged in address order, for example. As shown in fig. 3, the region protection module 550 sequentially traverses the doubly linked list. The region protection module may sequentially determine whether the read-write address belongs to the protection regions 1 to n.
In some embodiments, the region protection module 550 may determine whether the read/write address belongs to a protected region in a binary manner. As shown in FIG. 4, the region protection module 550 first determines whether the read/write address belongs to the n/2 th protection region. When the read/write address does not belong to the n/2 th protection region, the region protection module 550 may determine whether the read/write address belongs to a region before the n/2 th protection region. When the read/write address belongs to the n/2 th protection region, the region protection module 540 may determine whether the read/write address belongs to the n/4 th protection region. After the read/write address belongs to the n/2 th protection zone, the zone protection module 540 may determine whether the read/write address belongs to the 3n/4 th protection zone. By analogy, the region protection module 550 may quickly determine whether the read/write address belongs to the address range of the protection region through bisection. In addition, the area protection module 550 may also determine whether the read/write address belongs to the range of the protection area by using a red-black tree, a binary tree, or other retrieval methods.
In some embodiments, the device driver module 540 may send a notification message to the zone protection module 550 when it determines that the storage device is removed. The region protection module 550 may delete the configuration information for the protected region on the removed storage device. As shown in FIG. 6, after the storage device 530 is removed, the region protection module 550 may delete the configuration information of the protected region on the storage device 530. Such as deleting the linked list corresponding to the protected region of the storage device 530.
In some embodiments, the region protection module 550 may receive an instruction to delete a protected region, the instruction including an identification of the protected region to be deleted. According to the identifier of the protected area to be deleted, the area protection module 550 may delete the configuration information of the protected area to be deleted.
In some embodiments, the region protection module 550 may also return configuration information for the protected region in response to a view request for the configuration information to present the configuration information to the user. In some embodiments, the region protection module 550 may also record access records to the region protection module 550. The access record may record read and write commands, configuration commands, etc. sent to the area protection module 550. The area protection module 550 may also provide a function of viewing access records, so that it is convenient for an administrator to check whether there is a service that wrongly accesses a protected area.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of the present application.

Claims (11)

1. A method for protecting data, comprising:
setting at least one protection area of the storage device in response to the configuration instruction;
responding to a read-write instruction, and detecting whether a read-write address in the read-write instruction belongs to an address range of the at least one protection area;
and executing the read-write instruction when the read-write address is detected not to belong to the address range.
2. The data protection method of claim 1,
the setting at least one protection area of the storage device in response to the configuration instruction includes: in response to a configuration instruction, the region protection module sets at least one protection region of the storage device;
the detecting, in response to a read-write command, whether a read-write address in the read-write command belongs to an address range of the at least one protection area includes: the region protection module responds to the read-write command and detects whether a read-write address in the read-write command belongs to the address range of the at least one protection region;
when the read-write address is detected not to belong to the address range, executing the read-write instruction, including: and when the region protection module detects that the read-write address does not belong to the address range, executing the read-write command by an equipment driving module.
3. The data protection method of claim 1, further comprising:
and returning a read-write instruction execution error when detecting that the read-write address belongs to the address range.
4. The data protection method of claim 1, further comprising:
detecting whether at least one address area specified in the configuration instruction and an existing protection area in the storage device have address overlapping or not;
performing the setting of at least one protection area on the storage device upon determining that there is no address overlap;
upon determining that there is address overlap, setting failure information is generated.
5. The data protection method of claim 1, further comprising:
deleting the configuration information for the at least one protection zone when the storage device has been removed.
6. The data protection method according to claim 1, wherein the detecting whether a read/write address in the read/write instruction belongs to an address range of the at least one protection area in response to the read/write instruction comprises:
traversing and detecting whether each protection area in the at least one protection area contains the read-write address; or
For the at least one protection area arranged according to the address sequence, detecting whether the read-write address belongs to the address range of the at least one protection area or not in a dichotomy mode; or
And detecting whether the read-write address belongs to the address range of the at least one protection area or not in a binary tree, red-black tree or hash table mode.
7. The data protection method of claim 1, further comprising:
receiving an instruction for deleting a protected area, wherein the instruction comprises an identifier of the protected area to be deleted;
and deleting the configuration information of the protected area to be deleted according to the identifier of the protected area to be deleted.
8. The data protection method of claim 2, further comprising:
recording access records to the area protection module, wherein the access records are used for recording read-write instructions and configuration instructions sent to the area protection module;
and responding to the query request of the access record, and returning the access record.
9. A data protection device is characterized by comprising an equipment driving module and an area protection module;
the area protection module is used for responding to a configuration instruction and setting at least one protection area of the storage equipment;
the region protection module responds to the read-write command and detects whether a read-write address in the read-write command belongs to the address range of the at least one protection region;
and when the region protection module detects that the read-write address does not belong to the address range, the device driving module executes the read-write instruction.
10. A computing device, comprising:
a processor;
a storage device;
wherein the processor is configured to perform the data protection method of any one of claims 1-8.
11. A storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by a computing device, cause the computing device to perform the data protection method of any of claims 1-8.
CN201911147418.4A 2019-11-21 2019-11-21 Data protection method and device, computing equipment and storage medium Pending CN112825098A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911147418.4A CN112825098A (en) 2019-11-21 2019-11-21 Data protection method and device, computing equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911147418.4A CN112825098A (en) 2019-11-21 2019-11-21 Data protection method and device, computing equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112825098A true CN112825098A (en) 2021-05-21

Family

ID=75906511

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911147418.4A Pending CN112825098A (en) 2019-11-21 2019-11-21 Data protection method and device, computing equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112825098A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113407453A (en) * 2021-06-29 2021-09-17 芯天下技术股份有限公司 Verification method and device of data protection bit, electronic equipment and storage medium
CN115712628A (en) * 2023-01-09 2023-02-24 江苏中天科技股份有限公司 Data storage and data sending method, device and equipment based on integrated controller

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101667161A (en) * 2008-09-02 2010-03-10 联想(北京)有限公司 Method and device for protecting data of storage device and computer system
CN101788958A (en) * 2010-02-04 2010-07-28 杭州晟元芯片技术有限公司 Method for protecting data of memorizer
CN102184143A (en) * 2011-04-25 2011-09-14 深圳市江波龙电子有限公司 Data protection method, device and system for storage device
CN105900105A (en) * 2014-02-06 2016-08-24 英特尔公司 Media protection policy enforcement for multiple-operating-system environments
CN107851170A (en) * 2015-07-20 2018-03-27 英特尔公司 Support the configurable level of security for memory address range

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101667161A (en) * 2008-09-02 2010-03-10 联想(北京)有限公司 Method and device for protecting data of storage device and computer system
CN101788958A (en) * 2010-02-04 2010-07-28 杭州晟元芯片技术有限公司 Method for protecting data of memorizer
CN102184143A (en) * 2011-04-25 2011-09-14 深圳市江波龙电子有限公司 Data protection method, device and system for storage device
CN105900105A (en) * 2014-02-06 2016-08-24 英特尔公司 Media protection policy enforcement for multiple-operating-system environments
CN107851170A (en) * 2015-07-20 2018-03-27 英特尔公司 Support the configurable level of security for memory address range

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113407453A (en) * 2021-06-29 2021-09-17 芯天下技术股份有限公司 Verification method and device of data protection bit, electronic equipment and storage medium
CN115712628A (en) * 2023-01-09 2023-02-24 江苏中天科技股份有限公司 Data storage and data sending method, device and equipment based on integrated controller

Similar Documents

Publication Publication Date Title
US7895394B2 (en) Storage system
US8024530B2 (en) Security erase of a delete file and of sectors not currently assigned to a file
EP3682332B1 (en) Method and apparatus for erasing or writing flash data
US20070005659A1 (en) Data deletion method, storage device, and computer system
US10572335B2 (en) Metadata recovery method and apparatus
CN112825098A (en) Data protection method and device, computing equipment and storage medium
WO2021169163A1 (en) File data access method and apparatus, and computer-readable storage medium
JP2003248596A (en) Method for taking over processing in multicomputer system
CN104657088B (en) A kind of acquisition methods and device of hard disk bad block message
US9009430B2 (en) Restoration of data from a backup storage volume
CN116089327A (en) Data protection method and related equipment
CN109508140B (en) Storage resource management method and device, electronic equipment and system
CN114327292B (en) File management method, system, electronic device and storage medium
CN115328851A (en) Data protection method, device, equipment and medium
US10831916B2 (en) Method for blocking access of malicious application and storage device implementing the same
US9703497B2 (en) Storage system and storage control method
KR102363182B1 (en) Module and method for detecting malicious activities in a storage device
US20130173851A1 (en) Non-volatile storage device, access control program, and storage control method
CN109597573B (en) Management metadata reading method and device
US11755223B2 (en) Systems for modular hybrid storage devices
CN112988672B (en) User data protection method and device
KR101265530B1 (en) Malicious program blocking apparatus and method
US11550506B2 (en) Systems and methods for accessing hybrid storage devices
KR102189607B1 (en) Write control method and disk controller for automated backup and recovery
US20220100614A1 (en) Systems and methods for backing up volatile storage devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210521