TW200825743A - Method for protecting data in a hard disk - Google Patents

Method for protecting data in a hard disk Download PDF

Info

Publication number
TW200825743A
TW200825743A TW95144915A TW95144915A TW200825743A TW 200825743 A TW200825743 A TW 200825743A TW 95144915 A TW95144915 A TW 95144915A TW 95144915 A TW95144915 A TW 95144915A TW 200825743 A TW200825743 A TW 200825743A
Authority
TW
Taiwan
Prior art keywords
hard disk
disk
computer
area
partition table
Prior art date
Application number
TW95144915A
Other languages
Chinese (zh)
Other versions
TWI326411B (en
Inventor
Ying-Chih Lu
Ling-Hung Yu
Original Assignee
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Corp filed Critical Inventec Corp
Priority to TW95144915A priority Critical patent/TWI326411B/en
Publication of TW200825743A publication Critical patent/TW200825743A/en
Application granted granted Critical
Publication of TWI326411B publication Critical patent/TWI326411B/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention discloses a method for protecting data in a hard disk, and the method is applied to a hard disk, such that if a computer executes a power-on self test (POST) of a basic input/output system (BIOS) and completes initializing memories and calls an interrupt routine of the BIOS to read a hard disk area after the initialized program codes of all hard disk interface devices are executed, then the computer will determine whether or not the hard disk has added a protection description data with a portion matched with a computer identification code of the computer to access data or prevent accessing data in the hard disk.

Description

200825743 九、發明說明: 【發明所屬之技術領域】 本發明係有關於電腦,尤指一種電腦利用基本輪出輪 入系統的中斷指令,先讀取硬碟中所設之一保護描述資 料,再根據保護描述資料決定繼續完成啟動作業系統之方 法者。 【先前技術】 知:’電細(如·桌上型電腦、筆記型電腦或伺服機··· 等)通常安裝至少一硬碟機(Hard Disk),各硬碟機内皆具 有一主啟動磁區(電腦業界規定都存放於硬碟機的第零磁 柱(cylinder 0)、第零磁頭(Head 〇)、第一磁區(Sect〇r 1),也就是硬碟機最前面的磁區),主啟動磁區内儲存一 主開機記錄(Master Boot Record,簡稱:MBR )。而主開 機記錄依序包括有指定讀取硬碟機的開機碼區之啟始位 置之一跳躍區(Jump Area)、存放開機碼(Boot c〇de)之一 開機碼區(MBR Boot Code Area)、儲存各個磁碟分割表之 一磁碟分割表區(Partition Table Area),及作為識別主 啟動磁區的結束之一結束區(其為AA 55以兩個位元組表 不)等部份。當硬碟機被設定為用以啟動一作業系統 (Operation System 的—主硬碟機(Master Hard Disk)時, 則根據主開機記錄的内容,完成啟動作業系統的動作,如 此,電腦即可將資料存放於硬碟機中。 但是電腦失竊的案件層出不窮,對於許多電腦的使用 者來説,電腦被偷所造成的損失,往往不是電腦本身的價 -5- 200825743 值,而是硬碟機裡使用者的機密或私人的重要資料可能已 ’尤其是公司行號之電腦,一旦失竊後,若被有心 人士㈣腦硬碟中的資料轉交給競爭者,那更是一個*** 煩口此’系統業者有鑑於上述的問題,乃研發出一種硬 碟機之㈣倾方法,用贿護麵巾的㈣,避免發生 -資料外流之情況。 而上述的·機之資料保護方法,係在 設有一密碼保護程式(如:微軟作業⑽之使用者者密曰 :使得電腦凡成啟動作業系統後,再執行密碼保護程 式亚要求使用者輸入密碼,之後,當密碼保護程式接收 J正確的^碼後’才允許制者登人作鮮、統,再利用作 ”、、先之解、4碼*式’對硬碟機内之資料進行資料存取。 2碼保護程式沒接_正叙密碼,制者即無法登入 作業糸統,亦無法對·_之資料進行資料存取,硬碟 機内之資料因此即得到保護。 准田电細被竊取’且竊取者直接將㈣機安裳至另 —電腦時,竊取者只要再使用另一電腦的另一硬碟機,用 =動另;:健系統後,即復原工具或骇客工具侵入 =取的—之硬碟機中,並對被竊取的電腦之硬碟機進 仃貝料存取此日守’被竊取的電腦之硬碟機等同並無任何 ^保私2硬碟機之重要資料將被竊取者任意存取,換 吕之’目前的硬碟機對於倾的保護並不周延。 、 有鑑於硬碟機 之資料仍有外茂之虞,發明人經過長久 200825743 努力研究與實驗,開發設 機之資料之方法。 料月之—種保護硬碟 ^ 目的’翁供—麵護硬额之資料之 =,该方法係電腦在進行自我測試的階段,& 機已被加人保護描述歸,且 U見硬碟 述資料包自識別石馬與保護描 貝枓的特疋部份的内容相符時,硬碟機之磁碟 即具有磁碟分割表可供雷腦# ^ 、 ° 得電腦當完成自我測試後,使 、成,及完成啟動作業系統之處理,並可對硬 特定^=°而物1之電職別_述資料的 内容不相符時,硬碟機之磁碟分割區即被清 w %腦無法讀取雜何的與分難,當即 李處理後’補使得電腦不僅無法完成啟動健 處理’而且也無法對硬碟機進行資料存取,用以遠 到保護硬碟機的資料之目的。 為便f魅委貞騎本發明之特徵及其魏,做更 ^一步之認識與瞭解,_實_配合圖式,詳細說明如 下: 【實施方式】 本發明係一種保護硬碟機之資料之方法,係應用在一 請㈣第1圖所示,#電腦在執行基本輸出輸入系 、、、的自我峨P組,進行取成記憶體的初始化後,且在 所有硬碟介秘置之初始錄摘魏行之後,將依下列 步驟進行處理·· (⑻啤q基本輸出輪入系統的中斷指令,以便讀取所 200825743 有硬碟機; (11)判斷是否還有任-個硬碟機尚未被確認過,若 是,進行步驟(12),否則,進行步驟(15); 〇2)讀取其中—個尚未被確認過的硬碟機,並判斷硬 碟機内是否具有一保護描述資料4,若是,進行步 驟(13),否則,進行步驟⑼;在本發明之一^ 施例中,㈣第2目所示,保護描述資料4的 資料結構’係包括有一識別標識區40、一硬碟識 別碼儲存區42、一備份磁碟分割表儲存區44及- 檢查碼(check sum code)儲存區46。其中識別標 識區40存放的資料,係用以表示在硬碟機中具^ 保雜述資料4之識別訊息。硬碟識別碼儲存區 42係儲存一硬碟識別碼。而硬碟識別碼係與設定 硬碟機需要被保護的電腦之電腦識別碼相同,且 電腦識別關可為通用唯-識別碼(Uni versal toique Identificatic)n,簡稱:咖),例如為 系統管理基本輸入輪出系統(SMBI0S ; System Management BI0S)職 1(Type υ之通用唯一識 別碼⑽ID)攔位之值,換言之,硬碟識別碼亦為 通用唯一識別碼。備份磁碟分割表儲存區44 _ 以館存備份磁碟分職,㈣份_分割表的内 容,係與硬碟機被需要被保護時,硬碟機♦的主 開機記錄的磁碟分割表區5(如第7或8圖所示) 中存放的所有磁碟分割表的内容相同。檢查碼儲 -8- 200825743 存區46則儲存保護描述資料4被-檢查程式計算 後所得到的數值; (⑻判斷保護描述資料4是否具有與電腦所設之一電 腦識別碼相符的部份,若是,進行步驟⑽,否 則進订步驟(16);在該實施例中,判斷保護描 ,資料4是否具有與_所設之_電腦識別碼相 符的刀之步驟,即是讀取硬碟識別碼儲存區必 =硬碟識別碼,並判斷硬碟識別碼與電腦識別碼 疋否相同。纟於硬碟識別碼與電腦勤丨碼都是通 用唯-識別碼,而硬碟朗碼係與設定硬碟機需 要被保護的電腦之電腦識別碼相同,因此,若硬 j機在非叹疋硬碟機需要被保護的其他電腦上被 讀取,則其他電腦的電腦識別碼一定與硬碟識別 ,不相同。故’在此—定要檢餘護描述資料4 是否具有與電腦所設之一電腦識別碼相符的部 份,以決定後續要繼續處理步驟; (14)令磁碟分難區5存有_分财,再依步驟⑽ 進行處理;在該實施财,請參㈣3圖所示, 令磁碟分财區5存柄碟分絲之步驟為; (140) 判斷主開機記錄内的磁碟分割表區5是否為清 空的狀態’若是,進行步驟(141),否則,進 行步驟(142); (141) 將備份磁碟分齡儲存區44 _有備份磁碟 分割表複製到主開機記錄内的磁碟分割表區 200825743 5 ’用以作為各個磁碟分割表,即結束; (142)主開機記錄内的磁碟分割表區5已存在各個磁 碟分割表;此時將磁碟分割表區5之所有磁碟 分割表複製到備份磁碟分割表儲存區44以便 備份最新之财網分_,並麵依檢查程 到新數值,且將新數值儲存在檢 查碼儲存區46,即結束。 二 腦需要再確認主開機記錄内的磁 5否為清空的狀態,其原 叫硬碟機的磁碟分割表區5可 割表區5中讀取到任免電腦無法在磁碟分 ㈣聰何的磁碟分割表,故在此一 + 驟中需要再確魅開機骑⑽ = 否為清空的狀態; 5 ^ (15)繼續自我測試的處理,然後結束. ⑽令磁碟分區5不存在^磁 依步驟(11)進行處理 f刀表’再 圖所示,f腦°^_中,請參閱第4 表之處理方::::分割表區5不存在磁碟分割 (160)判斷主開機記錄 空的狀態,#=分咖5是否為清 行步驟⑽);丁步驟⑽),否則,進 (160將主職記錄㈣ 分割表複製到備份磁碟、區5的所有磁碟 票为割表儲存區44,用以 -10. 200825743 將所有磁碟分割表作為備份磁碟分割表; (162) 將主職記錄⑽磁碟分難區5的、 分割表清除,即結束; 礙碟 (163) 主職記__碟分絲區5已清 割表,即結束。 二某分 电㈣要再確認主開機記錄 碟f割^ 5是料毅陳態,其顧是硬碟楼 可能在W-次讀取時,係被設定㈣機需要被保、 的電《取,故在_分割表區5内已具有磁碟: 割表’因此’有必絲確定所有磁碟分割表是否: 被清空,以避免電腦讀取到磁碟分割表。又200825743 IX. Description of the invention: [Technical field to which the invention pertains] The present invention relates to a computer, and more particularly to a computer using an interrupt instruction of a basic wheel-in system, first reading a protection description data set in the hard disk, and then According to the protection description data, it is decided to continue to complete the method of starting the operating system. [Prior Art] Know: 'Electric fine (such as desktop computer, notebook computer or servo machine, etc.) usually install at least one hard disk machine (Hard Disk), each hard disk machine has a main starting magnetic Zone (the computer industry regulations are stored in the hard disk drive's zero cylinder (cylinder 0), the zeroth head (Head 〇), the first magnetic zone (Sect〇r 1), which is the front magnetic zone of the hard disk drive ), a master boot record (MBR) is stored in the main boot magnetic area. The main boot record includes a jump area (Jump Area) which is specified to read the boot code area of the hard disk drive, and one boot code area (Boot c〇de) to store the boot code area (MBR Boot Code Area). ), storing a partition partition table area (Partition Table Area) of each disk partition table, and as an end region for identifying the end of the main boot magnetic region (which is AA 55 with two bytes) Share. When the hard disk drive is set to start an operating system (Operation System - Master Hard Disk), the action of starting the operating system is completed according to the contents of the main boot record, so that the computer can The data is stored in the hard disk drive. However, the cases of computer theft are endless. For many computer users, the loss caused by the computer is often not the price of the computer itself -5 - 200825743, but the hard disk drive. The confidential or private important information of the user may have been 'especially the computer of the company's line number. If it is stolen, if the information in the hard disk of the person (4) is transferred to the competitor, it is a big problem. In view of the above problems, the industry has developed a (four) method of hard disk drive, using bribes to protect the face towel (4), to avoid the occurrence of data outflow. The above data protection method is based on a password. Protection program (such as: Microsoft user (10) user password: After the computer starts the operating system, then the password protection program is required to require the user to enter the password. After that, when the password protection program receives the correct ^ code of the J, it will allow the maker to log in to the system, and then use it as the ", first solution, 4 code * type" to access the data in the hard disk drive. If the 2 code protection program is not connected to the _ positive password, the system will not be able to log in to the operating system, nor can it access the data of the _, and the data in the hard disk will be protected. And if the thief directly puts the (four) machine into another computer, the thief only needs to use another hard disk drive of another computer, and then use the other machine; after the health system, the recovery tool or the hacking tool intrusion = take In the hard disk drive, and access to the hard disk drive of the stolen computer, access to the hard disk drive of the stolen computer is not the same as any important information of the 2 hard disk drive. The stolen person will be arbitrarily accessed, and Lu's current hard disk drive does not have a long-term protection for the tilt. In view of the fact that the hard disk drive data is still in the outer place, the inventor has worked hard for research and experimentation for a long time in 200825743. The method of setting up the information of the machine. The 'Weng's supply-face protection data=, the method is the computer at the stage of self-test, & machine has been added to protect the description, and U see hard disk description package self-identification stone horse and protection When the content of the special part of the drawing is consistent, the disk of the hard disk machine has a disk partitioning table for the Ray Brain #^, ° computer to complete the self-test, then make, complete, and complete the booting system The processing, and the hard specific ^ = ° and the electric power of the object 1 _ the contents of the data does not match, the disk partition of the hard disk machine is cleared, the brain can not read the miscellaneous and difficult Immediately after Lee's processing, 'compensation made the computer not only unable to complete the boot-up process' but also could not access the data on the hard disk drive, which was far from protecting the data of the hard disk drive. In order to make the characteristics of the invention and its Wei, to make a step by step of understanding and understanding, _ real_ with the schema, the detailed description is as follows: [Embodiment] The present invention is a kind of information for protecting the hard disk drive. The method is applied in the first picture of (4), #电脑 is performing the basic output input system, the self-峨P group, after the initialization of the memory, and at the beginning of all the hard disk After recording Wei Xing, it will be processed according to the following steps. ((8) Beer q basic output wheeled into the system interrupt command, in order to read the 200825743 hard disk machine; (11) to determine whether there is any hard disk drive Has not been confirmed, if yes, proceed to step (12), otherwise, proceed to step (15); 〇 2) read one of the hard disk drives that have not been confirmed, and determine whether there is a protection description data in the hard disk drive 4 If yes, proceed to step (13), otherwise, perform step (9); in one embodiment of the present invention, (4) shown in item 2, the data structure of the protection description material 4 includes an identification mark area 40, a hard Disc identification code storage area 42, a backup disk partition table Storage area 44 and - check sum code storage area 46. The information stored in the identification area 40 is used to indicate the identification information of the data 4 in the hard disk drive. The hard disk identification code storage area 42 stores a hard disk identification code. The hard disk identification code is the same as the computer identification code of the computer that needs to be protected by the hard disk drive, and the computer identification can be a universal unique identification code (Universal toique Identificatic), for example, a system management. The basic input round-out system (SMBI0S; System Management BI0S) job 1 (Type υ Universal Unique Identification Number (10) ID) block value, in other words, the hard disk identification code is also a universal unique identification code. Backup disk partition table storage area 44 _ with the library backup disk partition, (four) copies of the contents of the partition table, and the disk partition table of the master boot record of the hard disk drive ♦ when the hard disk drive needs to be protected The contents of all the disk partition tables stored in area 5 (as shown in Figure 7 or Figure 8) are the same. Check code storage-8- 200825743 Storage area 46 stores the value of the protection description data 4 after being checked by the inspection program; ((8) Judging whether the protection description data 4 has a part matching the computer identification code set by the computer, If yes, proceed to step (10), otherwise, the ordering step (16); in this embodiment, determining the protection description, whether the data 4 has a knife corresponding to the _ computer identification code set by _, that is, reading the hard disk identification The code storage area must be = hard disk identification code, and judge whether the hard disk identification code is the same as the computer identification code. The hard disk identification code and the computer hard work code are universal only-identification codes, and the hard disk code is The computer identification code of the computer that needs to be protected is the same. Therefore, if the hard machine is read on other computers that need to be protected by the non-squatting hard disk drive, the computer identification code of other computers must be with the hard disk. Identification, not the same. Therefore, 'here, check whether the description data 4 has a part that matches the computer identification code set by the computer to decide whether to continue the processing step; (14) Make the disk difficult to divide District 5 has _ cents, and then follow (10) Processing; in the implementation of the financial, please refer to (4) 3, the steps of the disk division of the disk partition is: (140) determine whether the disk partition table 5 in the main boot record is empty If yes, proceed to step (141), otherwise, proceed to step (142); (141) copy the backup disk age storage area 44_with backup disk partition table to the disk partition table area in the master boot record 200825743 5 'Use as a partition table for each disk, that is, end; (142) Each disk partition table exists in the disk partition table area 5 in the master boot record; at this time, the disk is divided into all the disks of the table area 5. The split table is copied to the backup disk partition table storage area 44 to back up the latest financial network _, and the check value is updated to the new value, and the new value is stored in the check code storage area 46, that is, the second brain needs to be reconfirmed. The magnetic 5 in the main boot record is in the empty state, and the disk partition table area 5 originally called the hard disk drive can be read in the cut-off area 5, and the disk partition table can be read in the disk. Therefore, in this + step, you need to confirm the charm to start riding (10) = No for emptying State; 5 ^ (15) Continue the self-test processing, and then finish. (10) Let the disk partition 5 not exist ^Magnetism according to step (11) processing f knife table 're-show, f brain ° ^ _, please Refer to the processing table of Table 4:::: split table area 5 does not exist disk partition (160) to judge the state of the main boot record empty, #=分咖5 is clear step (10)); step (10)), otherwise , (160 copies the main record (4) split table to the backup disk, all the disk tickets of the area 5 is the cut table storage area 44, for -10. 200825743 to use all the disk partition table as a backup disk partition table; (162) The master record (10) is divided into the partition table of the hard disk area 5, that is, the end is completed; the disk (163) main record __distribution area 5 has been cleared, that is, the end. Second sub-power (four) to re-confirm the main boot record disc f cut ^ 5 is expected to be ignorant, the Gu is that the hard disk building may be in W-time reading, is set (four) machine needs to be protected, the electricity "take Therefore, there is already a disk in the _ split table area 5: The cut table 'so' has to determine whether all the disk partition tables are: emptied to prevent the computer from reading the disk partition table. also

猎由丽述可知 免磁碟分縣區5崎有_分麵份磁碟八 割表不同,故需要在所有磁碟分割表被清除前,: 製到備份磁碟分割表儲存區44 ;在該實施例中 腦讀取硬之財_分#麻5所存放的磁碟 分割表後’係將麵依檢餘式計算並所得到新數 值’且將新紐齡麵查觸魏46 驟(11)進行處理。 y 藉由上柯知,料销之硬碟_碼與電腦 相同時’硬碟機内的磁碟分割表區5才會有磁碟分割表存 在,使得f職夠讀取酬有磁碟分難,當自我測試完 成後,其可並完成啟動作業系統的動作,否則,硬碟= 磁碟分割表區5將被輕,如此,當結束自酬試後,電 腦無法完姐動作m處理,亦無法讀取硬碟機。 -11 - 200825743 入佯ί=Π,請參閱第5圖所示,電腦在硬碟機寫 入保雜述貝科4,用以將硬碟機設定為被保 護的步驟,請參閱第5、6圖所示,係包括:° ^ ⑽等蝴撕 細内的硬碟,以供使用者選擇其中一电 進行後續的處理步驟; 更系铖 ⑼::用:擇其一硬碟機後,即輪出一硬碟保護 &早’硬碟保護選單包括—啟動 一取消保護硬碟選項; 項及 (22) =^_護硬·韻取雜護硬碟選項被 右疋啟動保護硬碟選項被選擇,進行步驟 進行二二即表示取消保護硬碟選項被選擇, (23) =:f碟她選擇,則判斷硬碟機是否 J;具有保相述資料4,若是進行步驟(24),否 、,進行步驟(29),在本發明中,判 否已具有保護描述資料4之方法, 取到識別標識區40所存放的資料;^ (24) =ΞΓ碼與電腦識別碼是否相同,若是進 乂驟(25),否則,進行步驟⑽)·, (⑸=開:記錄的磁碟分割表區5内所 ===份磁碟分割表儲存區44内作為備 ⑽將主開機記錄_物_ 5崎有的磁碟分 -12 - 200825743 割表清空; ⑽==識區4G、硬碟識別碼儲存區42、備份 Γΐΐ儲存區44的内容重新依檢查程式計 开,亚侍到新數值,且將 存區料作為檢查碼,即=值儲存在檢查碼儲 (28) 離開啟動保護硬碟的處理,即結束; (29) 建立保護插述資料 繼續進行· 碟中’再依照步驟(25) (3〇):=保護硬碟選項被選擇,則判斷硬碟機是否 護描述資料4,若是進行步酬,否 姑㈣Ρ、Ά ’在此—步驟巾’判斷硬碟機是否已 方法,亦為判斷判斷衫讀取到識別標 識區40所存放的資料; (31):硬,識別碼與目前執行開機碼的電腦之電腦 =石馬疋否相同’若是進行步驟(32),否則,即 茗口束; 丄刀?碟分吾'该儲存區44内之所有備份磁碟 =表複製到磁碟分割表區5,用以恢復磁碟分 &區5内所有的磁碟分割表; ⑶)將保護描述資料4刪除,即結束。 並夫j (可知’當硬碟在未啟純護時,主開機記錄 ’意'即,主開機記錄並未建立保護描述 统之卢理 ㈣取主職記錄,肋完成啟動作業系 '、, 而當硬碟啟動保護時,主開機記錄已建立保護 «13- 200825743 描述資料4,故,透過硬碟機讀取到保護描述資料4 表不硬碟機被保護,且透過判斷硬碟朗碼是否與 別碼相同,藉以匈斷目前讀取硬碟之電腦是否為設定硬碟 識別碼的電腦,若是,即表示硬碟並未被竊取或被安= 其他電腦上讀取,用以達到保護硬碟内的資料之目的。 在該實施例中,保護描述資料4係存放在硬碟的主啟 動磁區6的主開機記錄的跳躍區2與磁碟分割表區5間耒 被使用的儲存空間内(如第7圖所示),即在儲存開機碼 boot code)的開機碼儲存區3,而電腦搜尋主開機記錄的 跳躍區2與磁碟分割表區5間未被使用的空間内,是否具 有識別訊息,藉以判斷硬碟機岐否具有—保護描述轉 4另纟於硬碟識別碼儲存區42、傷份磁碟分割表 區44及檢查碼儲存區46的儲存容量是固定的大小,故, 當·讀取到_訊息後’即可由朗訊息計算出,硬碟 識別碼儲存區42、備份磁碟分縣齡區M及檢查碼儲 存區46在主啟動磁區的啟始位址,使得電腦可依硬碟識 別碼儲存區42、備份磁碟分割表儲存區44及檢查碼儲存 區46在主啟動磁區的啟始位址,讀取到硬碟識別碼、各 個備份磁碟分割表及檢查碼的數值。 由於〇更碟的主啟動磁區6的開機碼儲存區3,可能 不足用來儲存賴描述#料4,故,在本發明之另一實^ 例^ ’電腦係在_的磁碟分割表區5其中—個空閒磁區 7寫入保護描述資料4 ’及將磁碟分割表區5的其中一個 閒置的磁碟分標示成特殊_,並在閒㈣磁碟分割 -14- 200825743 表内寫入空間的磁區的啟始位置(如第δ圖所示),故 電腦透過鮮鄕的糾麵5,B :型的_磁碟分,私卿謝衫^ 磁碟分割表内中取侧 =料4在_磁區的啟始位置,即可讀取到識別訊 ^另’由於硬碟_補存區42、備份磁碟分割表 區44及檢查碼儲存區46的儲存容量是固定的大小,故, 當電腦讀取到識別訊息後,即可由識別訊息計算出, 儲存區42、備份磁碟分#]表_ 44 __ 存區46在主啟動磁區的啟始位址,使得電腦可依硬碟識 別碼儲魏42、備份_分#_魏&及檢查碼 ,46、在空閒的磁區的啟始姐止,讀取到硬碟識別瑪、各 個備份磁碟分割表及檢查碼的數值。 知’以上所述,僅為本發明較佳之具體實施例,惟 ,明之特徵亚不侷限於此,任何熟悉該項技藝者在本發明 領域内,可輕易思及之變化或修飾之均等物,皆可涵^在 以下本案之專利範圍。 里 【圖式簡單說明】 弟1圖係本發明之動作流程圖; 第2圖係保護描述資料的資料結構圖; 第3 _本發日狀_令_分·區騎磁碟分割 表之動作流程圖; ϋ 不存在磁碟 八第4圖係本發明之令電腦令磁碟分割表區 分割表之動作流程圖; -15- 200825743 腦在硬碟機寫入保護描述資料, 護之動作流程圖; 腦將硬碟機設定為取消保護之動 弟5圖係本發明之電 用以將硬碟機設定為被保 苐6圖係本發明之電 作流程圖; 第7圖係本發明之_實施例之保翻述資料存放在主 啟動磁區的示意圖;及 第8圖係本翻之另—實施例之倾描述資料存放閒 置磁區及標示祕殊_的閒㈣磁碟侧表的示意圖。 【主要元件符號說明】 跳躍區......... 保護描述資料 開機碼儲存區...............3 識別標識區..................40 硬碟識別碼儲存區...42備份磁碟分割表儲存區…44 檢查碼儲存區.........46 主啟動磁區............6 磁碟分割表區 空閒磁區...... 5 * 16 -Hunting from Li Shu knows that the free disk is divided into five regions, and that it is necessary to make all the disk partition tables clear: before the disk partition table is cleared: to the backup disk partition table storage area 44; In this embodiment, the brain reads the hard disk _ _ # #5 stored in the disk partition table, 'the face is calculated according to the check and the new value is obtained' and the new New Age face is touched by Wei 46 ( 11) Processing. y By using Kochi, the hard disk of the product is the same as the computer. The disk partition table 5 in the hard disk machine will have a disk partition table, so that it is difficult to read the disk. After the self-test is completed, it can complete the action of starting the operating system. Otherwise, the hard disk = disk partition table area 5 will be light, so after the end of the self-reward test, the computer can not finish the action of the m, also Unable to read the hard drive. -11 - 200825743 佯 Π Π Π 请 Π Π Π Π Π Π Π Π Π Π Π Π Π Π Π Π Π Π Π Π , , , , , , , , , , , , , , , , , , , 电脑 电脑 电脑Figure 6 shows: hard disk in the tearing of ° ^ (10), for the user to select one of the electricity for subsequent processing steps; more system (9):: use: after selecting a hard disk drive, That is, a hard disk protection & early 'hard disk protection menu includes - start a cancel protection hard disk option; item and (22) = ^ _ hard hard · rhyme to take care of the hard disk option is right to start the protection hard drive The option is selected, the step is carried out, the second step is to indicate that the unprotected hard disk option is selected, (23) =: f disc is selected by the disc, and it is judged whether the hard disk drive is J; if there is a preservation data 4, if the step (24) is performed If no, step (29) is performed. In the present invention, the method for protecting the description data 4 is determined, and the data stored in the identification mark area 40 is obtained; ^ (24) = whether the weight is the same as the computer identification code If it is a step (25), otherwise, proceed to step (10))·, ((5)=ON: Recorded in the disk partition table area 5 === part of the magnetic In the partition table storage area 44, as a backup (10), the main boot record_object_5 has a disk partition -12 - 200825743 cut table is cleared; (10) == identification area 4G, hard disk identification code storage area 42, backup storage area The content of 44 is re-inspected according to the inspection program, and the new value is applied to the new value, and the storage material is used as the inspection code, that is, the value of = is stored in the inspection code storage (28), and the process of leaving the startup protection hard disk is terminated; (29) Create a protection and insert the data to continue. In the disc, follow the steps (25) (3〇): = The protected hard disk option is selected, then it is judged whether the hard disk drive protects the description data 4. If it is a step, no (4) Ρ, Ά 'In this - step towel' to determine whether the hard disk drive has been used, and also to determine the data stored in the identification mark area 40 in the judgment shirt; (31): hard, identification code and the computer of the computer currently executing the boot code = stone horse 疋 is the same 'if it is step (32), otherwise, it is 茗 束; 丄 ? 碟 ' ' 'All the backup disks in the storage area 44 = table copied to the disk partition table area 5, with To restore all the disk partition tables in the disk partition & area 5; (3)) will protect the description data 4 In addition to that end. And husband j (can know that 'when the hard disk is not in the pure protection, the main boot record 'meaning' that the main boot record does not establish a protection description system Lu Li (four) take the main job record, the ribs complete the start-up operation ', When the hard disk boot protection is activated, the main boot record has been protected «13- 200825743 description data 4, so the protection description data is read through the hard disk drive. 4 The hard disk drive is protected, and the hard disk is judged by the hard disk. Whether it is the same as the other code, so that the computer that reads the hard disk is the computer that sets the hard disk identification code. If it is, it means that the hard disk has not been stolen or read by other computers. The purpose of the data in the hard disk. In this embodiment, the protection description data 4 is stored between the jump area 2 of the main boot record of the main boot area 6 of the hard disk and the disk partition table area 5 In the space (as shown in Figure 7), that is, in the boot code storage area 3 where the boot code is stored, and the computer searches for the unused space between the jump area 2 of the main boot record and the disk split table area 5 Whether there is an identification message to judge the hard disk Whether the machine has a protection description, and the storage capacity of the hard disk identification code storage area 42, the damage disk division table area 44, and the inspection code storage area 46 is a fixed size, so when After the message, it can be calculated from the Lang message. The hard disk identification code storage area 42, the backup disk divided into the county area M and the check code storage area 46 are at the starting address of the main starting magnetic area, so that the computer can be identified by the hard disk. The code storage area 42, the backup disk partition table storage area 44, and the check code storage area 46 read the hard disk identification code, each backup disk partition table, and the check code value at the start address of the main boot magnetic area. Since the boot code storage area 3 of the main boot sector 6 of the disc is not enough to store the material #4, in the other embodiment of the present invention, the computer is in the disc partition table of _. In the area 5, an idle magnetic area 7 writes the protection description data 4' and marks one of the disk divisions of the disk division table area 5 as a special _, and is in the idle (four) disk division-14-200825743 Write the start position of the magnetic area of the space (as shown in the δ diagram), so the computer passes through the fresh face correction 5, B: type _ disk disc, private 谢 谢 ^ ^ disk partition table Side = material 4 at the start position of the _ magnetic area, the identification information can be read ^ another 'since the storage capacity of the hard disk _ replenishment area 42, the backup disk division table area 44 and the check code storage area 46 is fixed The size, therefore, when the computer reads the identification message, it can be calculated by the identification message, the storage area 42, the backup disk partition #] table _ 44 __ storage area 46 in the starting address of the main boot magnetic area, so that The computer can store the Wei 42 according to the hard disk identification code, backup _ minute #_魏 & and check code, 46, in the idle magnetic zone start sister, read the hard disk identification Each backup disk partition table and checksum value. The above description is only a preferred embodiment of the present invention, and the features of the present invention are not limited thereto, and any equivalents that can be easily changed or modified in the field of the invention by those skilled in the art, All of them can be included in the following patent scope of this case. [Simplified description of the schema] The brother 1 is the flow chart of the operation of the present invention; the second diagram is the data structure diagram of the protection description data; the 3rd_this is the _ _ _ _ _ _ _ _ _ _ _ _ _ _ Flow chart; ϋ There is no disk 8th Figure 4 is a flow chart of the operation of the computer to divide the table partition table; -15- 200825743 The brain writes the protection description data on the hard disk machine, the action flow of the protection The brain is used to set the hard disk drive as the unprotected device. The figure is the electric power flow chart of the present invention for setting the hard disk drive to be protected. FIG. 7 is a circuit diagram of the present invention; _ The embodiment of the protection data is stored in the main starting magnetic zone; and the eighth figure is the other embodiment of the embodiment of the data storage idle magnetic zone and the identification of the secret _ idle (four) disk side table schematic diagram. [Main component symbol description] Jumping area......... Protection description data startup code storage area..................3 Identification identification area...... ...........40 Hard Disk Identification Code Storage Area...42 Backup Disk Partition Table Storage Area...44 Check Code Storage Area.........46 Main Start Magnetic Area. ...........6 Disk partition table area free magnetic area...... 5 * 16 -

Claims (1)

200825743 十、申請專利範圍: ,卜雜濩硬碟機之資料之方法,係應用在一電腦, ^該電腦執行-基本輪出輪人纽的自制試並完成記 L體的初始化後,且麵有硬碟介面裝置之初始化程式碼 被執行之後,將依下列步驟進行處理·· 呼叫该基本輪峻H制-巾斷齡,用以讀取所 有硬碟機; ' =是否還有任—個硬碟機尚未被確認過的; *還有硬韻的未被顧過,則讀取其巾-個尚未被 確認過的硬碟機’並判斷硬碟機岐否具有—保護描述資 料, 、 當判斷出保護描述f料具有與電腦所設之 別碼相符的部份,則令磁碟分細存有磁碟分割^ 井驟反=斷是否還有任一個硬碟機的响皮確認過的 =然後、=有硬碟機都被確認過後,繼續自我測試的處 如η月求項1所述之方法,其中當 述資料未=與電腦所設之_電腦識酬相符的部 令顧碟4表區不存在磁碟分割表,再依_是否還 t個硬碟機的尚未獅認過的步驟進行處理。、 3、如請求項1所述之方法,其中當判斷該硬碟_ -17- 200825743 未具有一保護描述資料,再依判 尚未被物過的步驟進行處理。^有任—個硬碟機 4、如請求項1所述之方法,1 資料結構,係包括: 4_触述資料的 一識職識區’伽以儲存表示切碟中 述貧料之一識別訊息; ”,、有保濩描 ㈣識別碼齡區,係麵— 識別碼係與設定硬碟機需要被 電^ : ’該硬碟 相同; 旻的电恥之電腦識別碼 -備份磁碟分難儲存區,_j 表,而該備份磁碟分割表的内容 茱刀」 護時,硬碟機中的主開機記錄的磁私被保 碟分割表的内容相同;及 、“表區中存放的磁 -檢查碼儲存區,係儲存該保護 式計算後所得到的數值。 达貝枓被-撿查程 5、如請求項1所述之方法,其中 區存有磁碟分割表之步驟為; ^碟分割表 狀態判Γ主開機記錄内的磁碟分割表區是否為清空的 料斷出該主開機記錄__ 狀恶時,將該備份磁碟分割表儲存區的=:的 表複製到該主開機記錄内的磁碟有7磁碟分割 分割表。 77舰’用以作為碌磲 、如請求項5所述之方法, 其中當判斷出該主 開機 -18- 200825743 記錄内的磁碟分割表區不為清空的狀態時,表示該主開機 記錄内的磁碟分割表區已存在磁碟分割表,可供電腦進行 讀取;及 並將磁碟分割表區之所有磁碟分割表複製到備份磁 碟分割表儲存區以便備份最新之所有磁碟分割表,並重新 依檢查程式計算並所得到新數值,且將新數值儲存在檢查 碼儲存區。 7、 如請求項2所述之方法,其中當電腦令磁碟分割 表區不存在磁碟分割表之處理方法,包括: 判斷該主開機記錄内的磁碟分割表區是否為清空的 狀態; 當判斷出主開機記錄内的磁碟分割表區不為清空的 狀悲時’將該主開機記錄内的磁碟分割表區的所有磁碟分 割表複製到該備份磁碟分割表儲存區,用以將磁碟分割表 作為備份磁碟分割表;及 將該主開機記錄内的磁碟分割表區的所有磁碟分割 表清除。 8、 如請求項7所述之方法,其中當判斷出該主開機 記錄内的磁碟分割表區為清空的狀態時,表示該主開機記 錄内的磁碟分割表區已清空磁碟分割表,已無法對硬碟進 行存取。 9、 如請求項4所述之方法,其中電腦在硬碟機寫入 保護描述資料,用以將硬碟機設定為被保護、取消保護的 步驟,係包括: -19- 200825743 輪出-硬碟選單,該 師更碟,以供使用者選擇其;:—早:^有安裝在電腦 备使用者選擇其一硬碟 认、4, 單,該硬碟保護選單包括一敌]p輪出一硬碟保護選 護硬碟選項; 保護硬碟選項及一取消保 判斷是該啟動保護硬碟 被選擇; 飞°亥取靖保護硬碟選項 當該啟動保護硬碟選項被 具有保護描述資料; 則判崎硬碟機是否已 當判斷出該硬碟機已具有保護插 硬碟識別碼與電腦識別碼是否相同;、+則再判斷該 當判斷出硬碟識別碼麵腦識 記錄的磁碟分«區内的所有 則將主開機 碟分割表儲存區内作為備份磁碟分 表设製到備份磁 表』所有磁碟分割 重新依檢查程式計算並所得 存在硬碟射之檢查蘭存㈣便作騎^將新數值储 二:=之方法’其中當_該硬碟識 理。 未具有保触iT練,_硬射社保3==碟^ 依照將主開機記錄的磁碟分割表區 、"、再 複製到備份磁碟分割表儲存區内作為備份== 200825743 步驟繼續進行處理。 12、如請求項9所述之方法, 選項被選擇後,其處理步驟,包括^取消保護硬碟 ,斷該硬碟機是否已具有賴描述資料. 以斷出該硬碟機已具有保護 識別碼與目前勃/ 貝料’判斷該硬石举 當判=:機:的電腦,識別碼是否相同 電腦識別碼相同,則將所有備 上=電腦之 割表區,·及 〒刀口彳表设製回磁碟分 將保護描述資料刪除。 機具求項,所述之方法,其中當判斷出該硬碟 執;调幾二:述貧料’且當判斷出辦更碟識別碼與目前 硬碟的處理。、电腦之電腦識別碼不相同,則離開取消保護 機未請求項12所述之方法,其中當判斷出該硬碟 未有该保護描述資料,則離開取消保護硬碟的處理。 15、如請求項4所述之方法,其中該保護描述資料係 存放在該主開機記錄的開機碼區與磁碟分區表間未被使 用的空間内。 16、 如请求項15所述之方法,其中該電腦搜尋嘎主 ,機記錄的跳躍區與磁碟分割表區間未被使用的空間内 是否具有該識別訊息,藉以判斷該硬碟機内是否具有該保 護描述資料。 17、 如请求項16所述之方法,其中該硬碟識別碼儲 -21· 200825743 碟=:細及檢查碼儲存區的館存容量 二二、田电腦碩取到識別訊息後,即可由識別訊 ;=;硬__存區、齡_分儲存區及 錢動麵的啟錄址,使得電腦可依硬 Γ _、騎磁_財_及射碼儲存區 =二動尸的啟始位址,讀取到硬碟識別碼、各個備份 磁碟分剎表及檢查碼的數值。 碑八項4所述之方法’其中電腦係在硬碟的磁 碟刀U表S其中-個空間的磁區寫人保護描述資料,及將 =分割,區的其中一個閒置的磁碟分割表標示成特殊 7,亚在閒置的磁碟分割表内寫入空間的磁區的啟始位 晋。 、士明求項18所述之方法,其巾該電腦透過搜尋 磁碟》f表區’是否具有標示成特殊類型的閒置的 W 觸硬碟巾是料有保護描述資料,進 而再從閒置的磁碟分割表内中取得保護描述資料在空閒 的磁區的啟始位置,即可讀取到識別訊息。 20如明求項19所述之方法,其中當電腦讀取到識 別讯心後’即可由識別訊息計算出,硬碟識別碼儲存區、 備份磁碟分#]表儲純及檢查顯存區社啟動磁區的 啟始位址’使得電腦可依硬碟_碼儲姐、備份磁碟分 割表儲存區及檢查碼儲存區在空間的磁區的啟始位址,讀 取到硬碟識別碼、各個備份磁碟分割表及檢查碼的數值。、 -22-200825743 X. The scope of application for patents: The method of data on the hard disk drive is applied to a computer, ^ the computer performs - the self-made test of the basic wheel and the completion of the L-body initialization, and After the initialization code of the hard disk interface device is executed, it will be processed according to the following steps. · Call the basic wheel H system - the towel is used to read all the hard disk drives; ' = Is there any? The hard disk drive has not been confirmed yet; * If there is a hard rhyme that has not been considered, read the towel - a hard disk drive that has not been confirmed yet - and judge whether the hard disk drive has - protection description data, When it is judged that the protection description material has a part that matches the code set by the computer, the disk is divided into a disk partition. ^ Well reversed = whether there is any hard disk machine that has been confirmed = then, = after the hard disk drive has been confirmed, continue to self-test, such as the method described in n month, item 1, where the information is not = the computer-related _ computer-related compensation There is no disk partition table in the 4th table area, and depending on whether it is still t hard disk drive Lion step not identified through the processes. 3. The method of claim 1, wherein when it is judged that the hard disk _ -17- 200825743 does not have a protection description material, the processing is performed according to the step of not yet being passed. ^有任硬硬机4, as described in claim 1, 1 data structure, including: 4_ touching the information of a knowledge area 'German storage means that the disc is said to be poor Identification message; ",, protection scan (4) identification code age area, system - identification code system and setting hard disk drive need to be charged ^ : 'The same hard disk; 旻 电 shame computer identification code - backup disk Dividing the hard storage area, the _j table, and the content of the backup disk partition table is the same, the content of the magnetic private partition of the main boot record in the hard disk drive is the same; and, "stored in the table area The magnetic-check code storage area is a value obtained by storing the protected-type calculation. The method of claim 1, wherein the step of storing the disk partition table is ; ^Disc split table status determines whether the disk partition table area in the main boot record is empty. The main boot record __ is invalid, and the table of the backup disk partition table storage area =: The disk in the main boot record has a 7-disc split table. The method of claim 5, wherein when it is determined that the disk partitioning table area in the main booting -18-200825743 record is not in an empty state, it indicates that the disk partitioning table area in the main booting record already exists. a disk partition table for reading by the computer; and copying all the disk partition tables of the disk partition table area to the backup disk partition table storage area to back up all the latest disk partition tables, and re-checking the program Calculate and obtain the new value, and store the new value in the check code storage area. 7. The method of claim 2, wherein when the computer causes the disk partition table area to have no disk partition table processing method, including: Determining whether the disk partition table area in the main boot record is in an empty state; when it is determined that the disk partition table area in the main boot record is not empty, the disk partition table in the main boot record Copying all the disk partition tables of the area to the backup disk partition table storage area for using the disk partition table as a backup disk partition table; and dividing the disk partition table area in the main boot record The disk partition table is cleared. The method of claim 7, wherein when it is determined that the disk partition table area in the master boot record is in an empty state, the disk partition table in the master boot record is indicated. The area has been emptied of the disk partition table, and the hard disk cannot be accessed. 9. The method of claim 4, wherein the computer writes a protection description data on the hard disk drive to set the hard disk drive to be protected. The steps to cancel the protection include: -19- 200825743 The wheel-hard disk menu, the teacher has a disc for the user to select;; - early: ^ is installed on the computer user to select a hard disk 4, single, the hard disk protection menu includes an enemy] p round out a hard disk protection option hard disk option; protection hard disk option and a cancellation guarantee is the boot protection hard disk is selected; Protect the hard disk option when the boot protected hard disk option is protected with a description data; whether the hard disk drive has judged whether the hard disk drive has the same protection disk hard disk identification code and the computer identification code; Judging when to judge The disk identification of the hard disk identification code face brain record «all of the area will be set as the backup disk partition table in the main boot disk partition table storage area to the backup magnetic table". All disk partitions are recalculated according to the check program. The result of the presence of the hard disk shot check Lancun (four) will be riding ^ will be the new value of the second: = method 'Where _ the hard disk is sensible. There is no protection iT training, _ hard shot social security 3 == disc ^ according to the main boot record of the disk partition table area, ", then copy to the backup disk partition table storage area as a backup == 200825743 steps continue deal with. 12. The method of claim 9, after the option is selected, the processing steps include: canceling the protection of the hard disk, and disconnecting the hard disk drive to have the description data. The hard disk drive has been protected and identified. The code and the current Bo/Bei material 'determine the hard stone to judge =: machine: the computer, the identification code is the same as the computer identification code, then all the preparations = computer cutting table area, · and the knife The system will delete the protection description data. The tool is claimed, wherein the method is as follows: when the hard disk is judged; the second is said to be poor; and when it is judged that the disc identification code and the current hard disk are processed. If the computer identification code of the computer is different, the method of canceling the protection device does not claim 12, wherein when it is determined that the hard disk does not have the protection description data, the process of canceling the protection hard disk is left. 15. The method of claim 4, wherein the protection description data is stored in a space that is not used between the boot code area of the main boot record and the disk partition table. The method of claim 15, wherein the computer searches for a location in the unused space of the jump zone and the disk partition table of the machine record, thereby determining whether the hard disk drive has the same Protect the description data. 17. The method of claim 16, wherein the hard disk identification code storage - 21. 200825743 is included in the storage capacity of the storage area of the code storage area, and the identification information is obtained by the computer computer. News; =; hard __ storage area, age _ sub-storage area and money moving surface of the opening address, so that the computer can rely on hard _, riding magnetic _ _ _ and the code storage area = the starting position of the second corpse Address, read the hard disk identification code, the value of each backup disk brake table and check code. The method described in the eighth item of the monument, wherein the computer is on the hard disk of the disk cutter U table S, the magnetic area of the space is written to protect the description data, and the = partition, one of the idle disk partition tables of the area Marked as special 7, the starting position of the magnetic region written in the space in the idle disk partition table. The method described in the item 18, the towel of the computer through the search disk "f table area" whether there is a special type of idle W-touch hard disk towel is protected with description data, and then from idle In the disk partition table, the protection description data is obtained at the start position of the free magnetic area, and the identification message can be read. The method of claim 19, wherein when the computer reads the identification message, the image can be calculated by the identification message, the hard disk identification code storage area, the backup disk is stored, and the memory is checked. The start address of the start magnetic zone enables the computer to read the hard disk identification code according to the hard disk _ code storage sister, the backup disk partition table storage area and the check code storage area at the starting address of the magnetic area of the space. , the value of each backup disk partition table and check code. , -twenty two-
TW95144915A 2006-12-04 2006-12-04 Method for protecting data in a hard disk TWI326411B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW95144915A TWI326411B (en) 2006-12-04 2006-12-04 Method for protecting data in a hard disk

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW95144915A TWI326411B (en) 2006-12-04 2006-12-04 Method for protecting data in a hard disk

Publications (2)

Publication Number Publication Date
TW200825743A true TW200825743A (en) 2008-06-16
TWI326411B TWI326411B (en) 2010-06-21

Family

ID=44772083

Family Applications (1)

Application Number Title Priority Date Filing Date
TW95144915A TWI326411B (en) 2006-12-04 2006-12-04 Method for protecting data in a hard disk

Country Status (1)

Country Link
TW (1) TWI326411B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI457754B (en) * 2010-06-04 2014-10-21 Hon Hai Prec Ind Co Ltd Application server and method for copying a hard disk drive
US11099856B2 (en) 2017-04-24 2021-08-24 Shannon Systems Ltd. Methods for uninstalling SSD (solid-state disk) cards and apparatuses using the same

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI457754B (en) * 2010-06-04 2014-10-21 Hon Hai Prec Ind Co Ltd Application server and method for copying a hard disk drive
US11099856B2 (en) 2017-04-24 2021-08-24 Shannon Systems Ltd. Methods for uninstalling SSD (solid-state disk) cards and apparatuses using the same

Also Published As

Publication number Publication date
TWI326411B (en) 2010-06-21

Similar Documents

Publication Publication Date Title
JP4287485B2 (en) Information processing apparatus and method, computer-readable recording medium, and external storage medium
TWI291629B (en) Method, system, and computer readable storage medium storing instructions for switching folder to be accessed based on confidential mode
KR101081118B1 (en) System and method for securely restoring a program context from a shared memory
KR101288700B1 (en) Multi-operating system(os) start device, computer-readable recording medium, and multi-os start method
US7480819B1 (en) Method for boot recovery
KR101054981B1 (en) Computer-implemented methods, information processing systems, and computer-readable recording media for securely storing the context of a program
US20140115316A1 (en) Boot loading of secure operating system from external device
CN1627274A (en) Backup system and backup method
US8955150B2 (en) Apparatus and method for managing digital rights using virtualization technique
CN105164657A (en) Selective backup of program data to non-volatile memory
US10380356B2 (en) Operating system partition protecting system, protecting device, and terminal
JP7146812B2 (en) Auxiliary storage device with independent restoration area and equipment to which this is applied
TW200408935A (en) Control over faults occurring during the operation of guest software in the virtual-machine architecture
WO2013030967A1 (en) Backup method and backup program
KR20110021183A (en) Computer system, control method thereof and recording medium storing computer program thereof
JP2009223787A (en) Information processor and processing method, and program
JP2008192126A (en) Information processor and program
CN100514305C (en) System and method for implementing safety control of operation system
TW200825743A (en) Method for protecting data in a hard disk
US7882353B2 (en) Method for protecting data in a hard disk
US20090055683A1 (en) Method of restoring previous computer configuration
JP6497157B2 (en) Information management apparatus, information management method, information management program, data structure, and software asset management system
JP4564477B2 (en) Thin client, thin client system, and program
TWI331748B (en) Method for protecting data in a hard disk
JP2018036695A (en) Information processing monitoring device, information processing monitoring method, monitoring program, recording medium, and information processing apparatus

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees