Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data protection method, device and system for storage device

A storage device and data technology, applied in the direction of preventing unauthorized use of memory, input/output to record carriers, etc., can solve the problems of costly legal user protection methods, inflexibility, etc., to maintain interests, prevent illegal transmission, and protect reading Take the effect

Active Publication Date: 2013-08-14
SHENZHEN NETCOM ELECTRONICS CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a storage device data protection method, device and system, aiming to solve the problems in the prior art that the storage device data protection method needs to consume a lot of time for legal users and the protection method is not flexible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method, device and system for storage device
  • Data protection method, device and system for storage device
  • Data protection method, device and system for storage device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] figure 1 It shows the implementation process of the storage device data protection method provided by Embodiment 1 of the present invention, and its specific steps are as follows:

[0040] In step S101, when the data written into the storage device is read-protected data, record the logical address range for writing the read-protected data;

[0041] In the embodiment of the present invention, the read-protected data is user-defined data, and the present invention can provide the user with a specific interface for the user to define the read-protected data.

[0042] In step S102, the logical address ranges of all read-protected data written are summarized to generate a logical read address range table of read-protected data;

[0043] In the embodiment of the present invention, the address range in the logical read address range table of the read-protected data can be set as required, and the size of the range can be different, and it can be a continuous range or a disco...

Embodiment 2

[0050] In this embodiment of the present invention, the method for protecting data of a storage device, in addition to including the steps in Embodiment 1, is as follows: figure 2 As shown, the following steps are also included:

[0051] In step S201, when the data written into the storage device is write-protected data, record the logical write address range for writing the write-protected data;

[0052] In step S202, the logical address ranges of all write-protected data are summarized to generate a logical write address range table of write-protected data;

[0053] In step S203, when the storage device receives the write command sent by the host, it is judged whether the address contained in the write command is located in the logical write address range table; if yes, then execute step S204, otherwise execute step S205;

[0054] In step S204, the storage device authenticates the host, and judges whether the authentication is passed; if yes, execute step S205, otherwise e...

Embodiment 3

[0059] The purpose of the embodiments of the present invention is to provide a protection device for storing device data, image 3 It shows a structural block diagram of an apparatus for protecting data of a storage device provided by an embodiment of the present invention. For ease of description, only parts related to the embodiment of the present invention are shown in the figure.

[0060] The device for protecting data of the storage device includes:

[0061] A logical read address range recording module 31, configured to record the logical address range of the read-protected data written into the read-protected data when the data written into the storage device is read-protected data;

[0062] Logical read address range table generating module 32, used for summarizing the logical address ranges of all read-protected data written, and generating the logical read address range table of read-protected data;

[0063] The first judging module 33 is configured to judge whether...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is applicable to the technical field of data storage and provides a data protection method, a device and a system for a storage device. The method comprises the following steps: when the data written in the storage device is subjected to read protection, the logical address extent of the written-in data subjected to read protection is recorded; the logical address ranges of all the written-in data subjected to read protection are summarized to generate a logical read address extent table of the data subjected to read protection; when the storage device receives the read command sent by the host machine, whether the address contained in the read command is positioned in the logical read address extent table is judged; if so, the storage device conducts authentication on the host machine, and the storage device executes the read command accurately if the authentication passes; if not, the storage device executes the read command virtually. The data protection method for the storage device can effectively protect the data subjected to read protection in the storage device, and the protection method is flexible.

Description

technical field [0001] The invention belongs to the technical field of data storage, and in particular relates to a method, device and system for protecting data of a storage device. Background technique [0002] Existing storage devices, including U disk, SD card, MMC card, CF card, MemoryStick card, etc., are composed of a main controller and a flash memory. When the storage device is in the working state, the main controller receives a command from the host, and performs corresponding operations according to the command request to realize data exchange between the device and the host, that is, to perform read / write operations on the storage. [0003] After the data is stored, it is easier to be accessed and shared by the public, but some protected distribution data. For example, map data provided by GPS navigation equipment publishers, learning data provided by learning machine manufacturers, or game data provided by mobile game publishers. Once these data are read or co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14G06F3/06
Inventor 邓恩华豆威
Owner SHENZHEN NETCOM ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products