CN101201882B - Operating system protection method - Google Patents

Operating system protection method Download PDF

Info

Publication number
CN101201882B
CN101201882B CN200610168898A CN200610168898A CN101201882B CN 101201882 B CN101201882 B CN 101201882B CN 200610168898 A CN200610168898 A CN 200610168898A CN 200610168898 A CN200610168898 A CN 200610168898A CN 101201882 B CN101201882 B CN 101201882B
Authority
CN
China
Prior art keywords
sequence code
server
hidden file
operating system
protection method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200610168898A
Other languages
Chinese (zh)
Other versions
CN101201882A (en
Inventor
陈志伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yuan Wei
Original Assignee
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Corp filed Critical Inventec Corp
Priority to CN200610168898A priority Critical patent/CN101201882B/en
Publication of CN101201882A publication Critical patent/CN101201882A/en
Application granted granted Critical
Publication of CN101201882B publication Critical patent/CN101201882B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a method for protecting software, which is applied to a server provided with a memory cell which stores the operating system of the server. The invention first starts the operating system to carry out the action of opening the computer, detects hidden files recorded in the memory cell and captures the content of the hidden files, then reads the sequence code of the server and judges whether the content of the hidden files are same with the sequence code. If the answer is yes, the action of opening the computer is continued and if the answer is no, the action of openingthe computer is stopped.

Description

Operation system protection method
Technical field
The invention relates to a kind of method for protecting software, and particularly relevant for a kind of network attached storage (Network-Attached Storage, NAS) guard method of using on server of operating system.
Background technology
Network attached storage (NAS) system is the Network storage technology of being released at first by the network equipment (Network Appliance) company.NAS is on Ethernet (Ethernet), be with network convention (InternetProtocol, IP) be the basis, see through the information flow on the special file server management area network, data storage agreement common between various server, the workstation is provided.Because this server is specially taken charge of the data access action, makes other server need not distribute additional space to handle, and is had more space to go to handle other instruction.The characteristic of NAS maximum is can be with memory allocation at different servers or workstation, allow data file on network, use to share kenel, briefly, the NAS memory technology can allow a plurality of users of different platform see through the professional server access of data files.
Present NAS system is and the shared mainboard of server in the use, and embedded system operating system that the NAS system is used for starting shooting is to deposit in the flash ROM (Flash Read OnlyMemory, Flash ROM) of extra burning on mainboard.Yet this class practice must additionally increase in production procedure builds the processing procedure of putting flash ROM, causes the waste of time and resource.
It is to allow NAS system and the shared mainboard of server equally that another kind is made rule, but the operating system of NAS then is to leave the integration that generally can buy on the market in to drive electronics quickflashing (Integrated DriveElectronics Flash, IDE Flash) in the storage card, and, can utilize the resource of mainboard to carry out NAS operating system by this storage card is inserted mainboard.This kind practice does not need additionally to increase production procedure, can save time and resource.Yet because the mainboard and the IDE Flash storage card of server are standardized product, the user only need buy common on the market IDE Flash storage card, just can duplicate NAS operating system easily, uses the function of NAS.Therefore, the present practice still can't effectively be protected NAS operating system, causes the loss of the development company of NAS operating system.
Summary of the invention
In view of this; purpose of the present invention is providing a kind of operation system protection method exactly; by in operating system, setting up a hidden file; and records series sign indicating number therein; and can after during each start; guarantee that this operating system is to carry out on same server, and reach the purpose of protection operating system.
For reaching above-mentioned or other purposes; the present invention proposes a kind of operation system protection method; be applicable to server; this server comprises storage unit; then comprise the operating system of storing this server in this storage unit; the method comprises the following steps: at first to start the operating system to carry out boot action, then then detects the hidden file that writes down in this storage unit, and captures the content of this hidden file.Then, read the sequence code of server, and whether therewith sequence code is identical to judge the content of above-mentioned hidden file,, then proceeds boot action if identical; Otherwise,, then stop to carry out boot action if different.
According to the described operation system protection method of preferred embodiment of the present invention; the hidden file that in the detection of stored unit, writes down wherein; and comprise also after the step of the content of acquisition hidden file whether the content of judging this hidden file is empty; if it is empty; then read the sequence code of server, and this sequence code is write hidden file.
According to the described operation system protection method of preferred embodiment of the present invention; wherein before the step that sequence code is write hidden file, more comprise this sequence code is carried out an encipheror, carry out a decrypted program judging within the hidden file to hold within then comprising hidden file before holding whether identical step with sequence code.
According to the described operation system protection method of preferred embodiment of the present invention, wherein before starting the operating system, also comprise under the particular file folder with hidden file implant procedure system with the step of carrying out boot action.
According to the described operation system protection method of preferred embodiment of the present invention, said memory cells comprise integrate to drive electronics quickflashing (Integrated Drive Electronics Flash, IDE Flash) storer and hard disk one of them.
According to the described operation system protection method of preferred embodiment of the present invention, the aforesaid operations system comprises network attached storage (Network Attached Storage, NAS) operating system.
According to the described operation system protection method of preferred embodiment of the present invention; the mode that wherein reads the sequence code of server comprises that (System Management-BasicInput/Output System SM-BIOS) reads through the system management basic input/output system.
According to the described operation system protection method of preferred embodiment of the present invention, wherein, also comprise and send information warning judging this content and this sequence code not simultaneously.
The present invention proposes the recording medium that a kind of computer-readable is got; be suitable for storing a defence program; this defence program is suitable for carrying out the following step: at first start the operating system to carry out boot action, then then detect the hidden file that writes down in this storage unit, and capture the content of this hidden file.Then, read the sequence code of server, and whether therewith sequence code is identical to judge the content of above-mentioned hidden file,, then proceeds boot action if identical; Otherwise,, then stop to carry out boot action if different.
The present invention adopts and set up a hidden file in operating system; and before server dispatches from the factory; promptly in this hidden file, write earlier the sequence code of server itself; and after each when starting this operating system; check whether the sequence code that writes down in this hidden file is identical with the server of present use, use the purpose that reaches protection operating system.
For above-mentioned and other purposes, feature and advantage of the present invention can be become apparent, preferred embodiment cited below particularly, and conjunction with figs. is described in detail below.
Description of drawings
Fig. 1 is the method flow diagram of the setting hidden file that illustrates according to preferred embodiment of the present invention.
Fig. 2 is the operation system protection method process flow diagram that illustrates according to preferred embodiment of the present invention.
Embodiment
The present invention ties up in the operating system increases a defence program, and this defence program can be at each system boot, when starting the operating system, and promptly be performed earlier to be used for the sequence code of authentication server, and whether decision proceeds boot action according to this checking result.In order to make content of the present invention more clear, below the example that can implement according to this really as the present invention especially exemplified by embodiment.
Operation system protection method of the present invention is included in the recording medium that computer-readables such as the storer of storage operating system or hard disk get and deposits a defence program and a hidden file; and before server dispatches from the factory; can be by tester's execute protection program of going ahead of the rest; in the middle of hidden file, to add the sequence code of server, with usefulness as the comparison after follow-up the dispatching from the factory.The detailed step of this hidden file below promptly is set with an embodiment introduction earlier.
Fig. 1 is the method flow diagram of the setting hidden file that illustrates according to preferred embodiment of the present invention.Please refer to Fig. 1, present embodiment is applicable to server, then comprises a storage unit in order to storage operating system in this server.Wherein, this operating system for example is to be suitable for network attached storage (the NetworkAttached Storage of framework on server, NAS) operating system, above-mentioned storage unit then for example is to integrate to drive electronics quickflashing (Integrated Drive Electronics Flash, IDE Flash) storer or hard disk etc., and do not limit its scope.
The present invention is that employing is left operating system in the storage card in, and by storage card being inserted the mainboard of server, offers server and carry out to carry out boot action.Therefore, the present invention when producing the storage card of this class, promptly earlier a defence program and a hidden file burning in this storage card.Wherein this hidden file is implanted under the particular file folder of this operating system (step S110).The usefulness of this way is intended to and will has the file hiding of verification msg, avoids unworthy personage illegally to obtain or usurps this data.
Before this server dispatches from the factory, can start the operating system with execution boot action (step S120) by tester's start in advance, and at the beginning of start, the defence program that operating system deposits in before promptly can carrying out earlier.This defence program then can command server removes the hidden file that writes down in the detection of stored unit, also the content of hidden file is captured out (step S130) simultaneously.
Next step can judge then whether this hidden file content that captures is empty (step S140).Wherein, be empty if judge the content of hidden file, then representative is to use this starting operating system for the first time, this moment, defence program then can read the sequence code (step S150) of server.Wherein, the mode that reads the sequence code of server for example is to see through system management basic input/output system (System Management-Basic Input/Output System, SM-BIOS) read, yet the present invention does not limit the kind of sequence code and reads mode.
Then this sequence code can be write hidden file (step S160).At this moment,, do not need to carry out the checking action of sequence code, therefore after writing sequence code, can proceed normal boot action (step S170) owing to be to use starting operating system for the first time.
In addition, in step S140, be not empty if judge the content of hidden file, then representative has not been to use starting operating system for the first time, therefore can enter the proving program (step S180) of subsequent sequence sign indicating number, whether proceeds boot action with decision.
Usually, except step S180, above-mentioned step all is to finish before server dispatches from the factory, and has all implanted hidden file in this each station server that can guarantee to dispatch from the factory, and has set sequence code earlier, and the usefulness of checking is provided when starting shooting for the back of dispatching from the factory in the future at every turn.With the next detailed step that server subsequent authentication and protection operating system are described for an embodiment again.
Fig. 2 is the operation system protection method process flow diagram that illustrates according to preferred embodiment of the present invention.Please refer to Fig. 2, as described in a same embodiment, present embodiment also is applicable to server, and the employed operating system of this server is with all same or similar with preceding embodiment in order to the storage unit of storage operating system, so do not repeat them here.
After the user purchases server of the present invention, press the start button when starting the machine at it at every turn, promptly can start the operating system carrying out boot action (step S210), and at the beginning of start, the defence program that operating system deposits in before also can carrying out earlier.This defence program then can command server removes the hidden file that writes down in the detection of stored unit, also the content of hidden file is captured out (step S220) simultaneously.
Next step then is the sequence code (step S230) that is read server by defence program.Wherein, the mode that reads the sequence code of server for example is to see through the system management basic input/output system to read, yet the present invention does not limit the kind of sequence code and reads mode.
The defence program content whether identical with the sequence code that reads (step S240) that will judge hidden file then.Wherein, if sequence code is identical, then representing operating system is to work under legal server, and this moment, defence program promptly finished, and proceeded boot action and transfer to operating system; Yet if the sequence code difference, representing operating system is to work under illegal server, the boot action (step S240) of defence program shut-down operation this moment system, and avoid the user illegally to use operating system.Wherein, the sequence code of finding comparison at defence program also comprises and sends information warning first not simultaneously, buys or register legal software to remind the user.
What deserves to be mentioned is; in order to prevent that unworthy personage from utilizing the mode of search sequence sign indicating number to seek hidden file of the present invention in operating system; the present invention also is included in and originally sequence code is write before the hidden file, promptly earlier sequence code is carried out an encipheror, protects hidden file not to be found according to this.Relatively, after during with the sequence code comparison of the content of hidden file and the server that uses at present, then can carry out a decrypted program to the content of hidden file earlier, compare and can bring with sequence code.
In sum, operation system protection method of the present invention has following advantage at least:
1. adopt and in operating system, set up a hidden file, and in order to the checking sequence code, process is maintained secrecy and is difficult for being found.
2. operating system of the present invention promptly is configured in earlier before dispatching from the factory on the fixing server, also can only work on former server after dispatching from the factory, and can prevent unworthy personage's bootlegging.
3. operating system is stored in general integration commonly used and drives the electronics flash memory cards, not needing increases extra processing procedure when producing mainboard, time saving and energy saving.
Though the present invention discloses as above with preferred embodiment; right its is not in order to limiting the present invention, anyly has the knack of this skill person, without departing from the spirit and scope of the present invention; when can doing a little change and retouching, so protection scope of the present invention is when with being as the criterion that claim was defined.

Claims (9)

1. an operation system protection method is applicable to a server, and this server comprises a storage unit, and comprises an operating system of storing this server in this storage unit, and this operation system protection method comprises the following steps:
Start this operating system to carry out a boot action;
Detect a hidden file that writes down in this storage unit, and capture a content of this hidden file;
Read a sequence code of this server;
Whether this content of judging this hidden file is identical with this sequence code;
If identical, then proceed this boot action; And
If different, then stop to carry out this boot action.
2. operation system protection method as claimed in claim 1 is characterized in that, this hidden file that in detecting this storage unit, writes down, and also comprise after capturing the step of this content of this hidden file:
Whether this content of judging this hidden file is empty;
If empty, then read this sequence code of this server; And
This sequence code is write this hidden file.
3. operation system protection method as claimed in claim 2 is characterized in that, also comprises before the step that this sequence code is write this hidden file:
This sequence code is carried out an encipheror.
4. whether identical with this sequence code operation system protection method as claimed in claim 3 is characterized in that, also comprised before this content of judging this hidden file step:
This content of this hidden file is carried out a decrypted program.
5. operation system protection method as claimed in claim 1 is characterized in that, also comprises before this operating system of startup is with the step of carrying out this boot action:
This hidden file is implanted under the particular file folder of this operating system.
6. operation system protection method as claimed in claim 1 is characterized in that, this above-mentioned storage unit comprise integrate to drive electronics flash memory and hard disk one of them.
7. operation system protection method as claimed in claim 1 is characterized in that, this above-mentioned operating system comprises network attached storage operating system.
8. operation system protection method as claimed in claim 1 is characterized in that, the mode that reads this sequence code of this server comprises that seeing through the system management basic input/output system reads.
9. operation system protection method as claimed in claim 1 is characterized in that, is judging this content and this sequence code not simultaneously, also comprises:
Send an information warning.
CN200610168898A 2006-12-14 2006-12-14 Operating system protection method Expired - Fee Related CN101201882B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200610168898A CN101201882B (en) 2006-12-14 2006-12-14 Operating system protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200610168898A CN101201882B (en) 2006-12-14 2006-12-14 Operating system protection method

Publications (2)

Publication Number Publication Date
CN101201882A CN101201882A (en) 2008-06-18
CN101201882B true CN101201882B (en) 2010-05-19

Family

ID=39517044

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200610168898A Expired - Fee Related CN101201882B (en) 2006-12-14 2006-12-14 Operating system protection method

Country Status (1)

Country Link
CN (1) CN101201882B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104809065A (en) * 2015-04-27 2015-07-29 柳州市一呼百应科技有限公司 Development method for user software
CN109119012B (en) * 2018-08-27 2022-03-22 海信视像科技股份有限公司 Starting-up method and circuit

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6324649B1 (en) * 1998-03-02 2001-11-27 Compaq Computer Corporation Modified license key entry for pre-installation of software
CN1484152A (en) * 2002-09-18 2004-03-24 宏基股份有限公司 Method and device for restoring computer operation system and method for producing said system
US6823463B1 (en) * 2000-05-16 2004-11-23 International Business Machines Corporation Method for providing security to a computer on a computer network
CN1591363A (en) * 2003-08-25 2005-03-09 联想(北京)有限公司 Method for back-up protection of CMOS data
CN1755572A (en) * 2004-09-30 2006-04-05 联想(北京)有限公司 Computer security startup method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6324649B1 (en) * 1998-03-02 2001-11-27 Compaq Computer Corporation Modified license key entry for pre-installation of software
US6823463B1 (en) * 2000-05-16 2004-11-23 International Business Machines Corporation Method for providing security to a computer on a computer network
CN1484152A (en) * 2002-09-18 2004-03-24 宏基股份有限公司 Method and device for restoring computer operation system and method for producing said system
CN1591363A (en) * 2003-08-25 2005-03-09 联想(北京)有限公司 Method for back-up protection of CMOS data
CN1755572A (en) * 2004-09-30 2006-04-05 联想(北京)有限公司 Computer security startup method

Also Published As

Publication number Publication date
CN101201882A (en) 2008-06-18

Similar Documents

Publication Publication Date Title
CN101593261B (en) Computer system, method for protecting data thereof and mechanical readable media
CN101770552B (en) Method for clearing computer password, computer and system for clearing computer password
CN109873804A (en) Service identification method, device, equipment and the readable storage medium storing program for executing of Behavior-based control
CN102385671B (en) Software enciphering method and system
CN106155596B (en) Data writing method and device
CN103164523A (en) Inspection method, device and system of data consistency inspection
US10817211B2 (en) Method for completing a secure erase operation
WO2018006587A1 (en) File storage method, terminal, and storage medium
WO2017032312A1 (en) Method and apparatus for presenting to-be-cleaned data, and electronic device
CN110908865A (en) Memory leakage monitoring method and device and electronic equipment
CN107679421A (en) A kind of movable memory apparatus monitoring means of defence and system
CN103559098B (en) Smart card test number control, Apparatus and system
CN110458401A (en) Information processing unit, method and storage medium based on block chain
CN111259382A (en) Malicious behavior identification method, device and system and storage medium
CN101794232A (en) Method for quickly starting system
CN111338889A (en) Evidence obtaining method, device, equipment and storage medium supporting multiple operating systems
CN101201882B (en) Operating system protection method
CN102236748A (en) Computer software protection method
CN108256351B (en) File processing method and device, storage medium and terminal
CN104484211B (en) The method and device of shared image file
JP3600089B2 (en) IC card user authentication system and method, and recording medium storing program for determining authentication method in said system
CN109118273A (en) The recovery and treatment method and system of electronic equipment
CN104750579B (en) The method and apparatus for making memory mirror
JP5146880B2 (en) Information management apparatus, information management system, information management program, and information management method
CN113065867B (en) System, method and medium for upgrading incompatible blockchain based on data replay

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
CB03 Change of inventor or designer information

Inventor after: Yuan Wei

Inventor before: Chen Zhiwei

COR Change of bibliographic data
TR01 Transfer of patent right

Effective date of registration: 20170302

Address after: Tianjin city Wuqing District Huangzhuang Street Binhe Road on the north side of Linda garden 22-23-901

Patentee after: Yuan Wei

Address before: Taipei City, Taiwan Chinese Shilin District Hougang Street No. 66

Patentee before: Inventec Corporation

CP02 Change in the address of a patent holder
CP02 Change in the address of a patent holder

Address after: 541000 No. two, No. 5, West Road, Xiangshan District, Guilin, the Guangxi Zhuang Autonomous Region

Patentee after: Yuan Wei

Address before: 300000 Tianjin city Wuqing District Huangzhuang Street Binhe Road on the north side of Linda garden 22-23-901

Patentee before: Yuan Wei

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100519

Termination date: 20171214

CF01 Termination of patent right due to non-payment of annual fee