CN101201803A - Method for protecting data of hard disk - Google Patents

Method for protecting data of hard disk Download PDF

Info

Publication number
CN101201803A
CN101201803A CNA200610167099XA CN200610167099A CN101201803A CN 101201803 A CN101201803 A CN 101201803A CN A200610167099X A CNA200610167099X A CN A200610167099XA CN 200610167099 A CN200610167099 A CN 200610167099A CN 101201803 A CN101201803 A CN 101201803A
Authority
CN
China
Prior art keywords
hard disk
disk
identification code
sector
list area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA200610167099XA
Other languages
Chinese (zh)
Other versions
CN101201803B (en
Inventor
卢盈志
Original Assignee
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Corp filed Critical Inventec Corp
Priority to CN200610167099A priority Critical patent/CN101201803B/en
Publication of CN101201803A publication Critical patent/CN101201803A/en
Application granted granted Critical
Publication of CN101201803B publication Critical patent/CN101201803B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a method used for protecting data in a hard disk and is applied to the hard disk; when a computer implements X-code of the hard disk, the hard disk can be read and the processing of activating an operating system can be finished if an identification code of the hard disk recorded by the hard disk is judged to be identical to an identification code designed by a computer; or the content in a splitting area of a disk in record of a master boot is cleaned up, therefore the hard disk can not be read and the processing of activating the operating system can not be finished. When the hard disk is stolen, another computer can not read the hard disk and finish the boot action, thus achieving the aim of protecting the data of the hard disk.

Description

The method of the data of protection hard disk
Technical field
The present invention stores the hard disk identification code about hard disk in advance especially in regard to a kind of hard disk, and hard disk only can be read the method for data at the computing machine with the computer Recognition sign indicating number that meets the hard disk identification code, is a kind of method of protecting the data of hard disk concretely.
Background technology
Our life is now just marching toward an information age that electronic industry is flourish, various high-tech electronic products of being derived by counter are rapid very fast, really brought greatest breakthrough for human development in science and technology, yet, along with the continuous research and development of current various electronics technologies with progress greatly, the function of various computer systems from strength to strength, and these computer systems are equipped with at least one hard disk (Hard Disk) usually.No matter whether this hard disk possesses the function that activates its operating system, (the computer circle regulation is all deposited in the 0th magnetic post, the 0th magnetic head, first sector of hard disk all to have a main activation sector in each hard disk, the top sector of hard disk just), the main content that activates storage in the sector is called as main start record, and (Master Boot Record is called for short: MBR).Main start record includes a skip zone (Jump Area), a boot code district (MBR BootCode Area), a disk and cuts apart a list area (Partition Table Area) and an end zone etc., what tool was specified the boot code district read hard disk in the skip zone opens the beginning position, disk is cut apart list area stored disk contingency table, and the disk contingency table has the cutting state of hard disk and the information of DATA DISTRIBUTION, and the end zone then is as the main end that activates the sector of identification (its for AA 55 with two byte representations).When hard disk is set in order to the Primary Hard Drive (Master Hard Disk) that activates an operating system (Operation System), then according to the boot code in the boot code district (Boot Codes), finish the action of computer booting, so, computer system just can be carried out data access to significant data and the correlation parameter of depositing in hard disk.
And computing machine is for the data protection mode of hard disk; normally be equiped with a cryptoguard program (as: the gerentocratic password of operating system in order to the operating system on the Primary Hard Drive of activating computer system; OSAdministrator password); computing machine is before the activation manipulation system; must carry out this cryptoguard program earlier; make only after the cryptoguard program receives correct password; just allow to enter operating system; and utilize the coded program of separating of operating system that the data in the hard disk are carried out data access; when the cryptoguard program does not receive correct password; promptly can't enter operating system the data in the hard disk are carried out data access, therefore the data in the hard disk just are protected.
Yet; the password of being approved when the cryptoguard program is cracked or is stolen; or the hard disk in the computer system is stolen; and directly be mounted to after another computing machine starts shooting, another computing machine can be to carrying out data access, at this moment in the hard disk; there is no any safeguard measure in the hard disk; significant data in the hard disk will be stolen arbitrarily by other people, and in other words, there is the inconsiderate problem of information safety protection in present hard disk.
Summary of the invention
Because after hard disk was installed in any computer system, anyone can both obtain the problem of the data of hard disk after the activation of complete operation system, the inventor's purpose is to provide a kind of method of protecting the data of hard disk.
For realizing foregoing invention purpose of the present invention; the invention provides a kind of method of protecting the data of hard disk; be applied to hard disk; carry out the boot code of the main start record of hard disk when computing machine; and judge the hard disk identification code that hard disk writes down; with the set computer Recognition sign indicating number of computing machine when inequality; the content of the intrarecord disk cut section of main start is emptied; make hard disk to be read, promptly can't finish the processing of activation manipulation system, otherwise; when judging the hard disk identification code that hard disk writes down; a computer Recognition sign indicating number set with computing machine is identical, then can finish the processing of activation manipulation system, and can read hard disk.So, after hard disk was stolen, hard disk was mounted another computing machine; at this moment, the computer Recognition sign indicating number of another computing machine must be inequality with the hard disk identification code, makes another computing machine can't read hard disk; and can't finish the action of start, can reach the purpose of the data of protection hard disk.
For just feature of the present invention and effect thereof being done further understanding and are understood, cooperate graphicly especially exemplified by embodiment, be described in detail as follows.
Description of drawings
Fig. 1 is the main synoptic diagram that activates the sector of the present invention;
Fig. 2 is an action flow chart of the present invention;
Fig. 3 is the action flow chart of the setting harddisk protection of one embodiment of the invention;
Fig. 4 is the action flow chart of the cancellation hard disk protection of one embodiment of the invention;
The action flow chart of the setting harddisk protection of Fig. 5 another embodiment of the present invention;
The main sector and the new synoptic diagram that activates the sector of activating of Fig. 6 another embodiment of the present invention;
Fig. 7 another embodiment of the present invention reads the action flow chart of defence program;
The action flow chart of the cancellation hard disk protection of Fig. 8 another embodiment of the present invention;
Fig. 9 is of the present invention to enter setting harddisk be protected or the cancellation protection action flow chart.
The primary clustering symbol description:
1 hard disk identification code district, defence program storage area, 2 backup disks are cut apart list area 3
Main sector 4 disks that activate are cut apart 5 skip zones 6, list area
The disk contingency table 82 that storage area 80 calling zone 81 are left unused
New 9 new skip zones, sector, 90 boot code that activate open the district 91 of beginning
Embodiment
A kind of method of protecting the data of hard disk of the present invention; see also Figure 1 and Figure 2; the data method of protection hard disk of the present invention is applied in a hard disk; after hard disk is employed the program setting protection; in hard disk, cook up defence program storage area 1, hard disk identification code district 2 and backup disk in advance at least and cut apart list area 3; and when computing machine is finished selftest and initialization (BIOS POST); the defence program that elder generation fetch protection program storage area 1 is stored; and handle according to the step that defence program sets; and the step of defence program comprises:
Step 10, computing machine read the hard disk identification code that is stored in advance in the hard disk identification code district 2;
Step 11, computing machine judge that the hard disk identification code is whether identical with the set computer Recognition sign indicating number of computing machine, if, carry out step 12, otherwise, carry out step 15; In the present invention, the computer Recognition sign indicating number can be system management Basic Input or Output System (BIOS) (SMBIOS; System Management BIOS) general unique identifier (Universal Unique Identification, UUID) value of field of form 1 (Type 1);
Step 12, computing machine is judged main sector 4 (the 0th magnetic post of hard disk, the 0th magnetic head, first sector activated of hard disk, the top sector of hard disk just) disk in is cut apart the list area 5 (empty that whether is cleared, meaning promptly, disk is cut apart list area 5 no disk contingency tables), if carry out step 13, otherwise, carry out step 14;
Step 13, computing machine are cut apart each backup disk contingency table that list area 3 stores in advance with backup disk and are copied to disk and cut apart in the list area 5 respectively as a disk contingency table; In the present invention, each backup disk contingency table duplicates hard disk and is stored in all disk contingency tables that the main disk that activates sector 4 is cut apart list area 5 before not protected as yet, so, each backup disk contingency table is copied to disk cut apart in the list area 5, promptly be to be used for recovering disk to cut apart the original state in list area 5;
Step 14, computing machine are handled (function of this boot code is for loading and carry out the start sector program in the activation hard disk cut section) according to the main boot code that activates in the sector 4 again, in order to finish the activation manipulation system, promptly finish; Because computing machine is handled according to boot code again, can read the disk contingency table, the step of the line activating operating system of going forward side by side is prior art, so be not described in detail at this;
Step 15, computing machine judge that disk cuts apart list area 5 and whether be cleared, if, carry out step 18, otherwise, carry out step 16;
Step 16, computing machine are duplicated at present all disk contingency tables of cutting apart list area 5 at disk becomes each backup disk contingency table that this backup disk is cut apart list area 3 respectively;
Step 17, computing machine empty all disk contingency tables that disk is cut apart list area 5;
Step 18, computing machine is handled output notice information according to boot code, cuts apart list area 5 no disk contingency tables in order to the expression disk, promptly finishes.Because computing machine is handled according to boot code again, because of disk is cut apart list area 5 no any disk contingency tables, and then output notice information is prior art, so also no longer be repeated in this description at this.
By above-mentioned treatment step as can be known; when the hard disk identification code of hard disk is identical with the computer Recognition sign indicating number; disk in the hard disk is cut apart list area 5 and just can be stored the disk contingency table; make computing machine can read each disk contingency table, and finish the action of start, otherwise; disk in the hard disk is cut apart list area 5 and will be cleared; so, computing machine can't be finished the processing of activation manipulation system, promptly reaches the purpose of the data of protection hard disk.
Because; hard disk is employed the program setting protection; in hard disk, cook up hard disk identification code district 2, defence program storage area 1 and backup disk in advance at least and cut apart list area 3; could handle according to above-mentioned defence program; and reach the purpose of data of protection hard disk; so; in a preferred embodiment of the present invention; see also shown in Figure 3; computing machine is according to the application setting hard disk protection; cut apart the step of list area 3 in order in hard disk, to cook up hard disk identification code district 2, defence program storage area 1 and backup disk at least, comprising:
Step 20, computing machine is cut apart 5 of list areas at main sector 4 set skip zone 6 and the disks that activate, the promptly main sector 4 of activating is set up defence program storage area 1, hard disk identification code district 2 and backup disk in regular turn and is cut apart list area 3 (as shown in Figure 1) originally in order to store the storage area of boot code (boot code);
Step 21, computing machine write the jmp instruction in skip zone 6, this instruction will skip to defence program storage area 1 in the main address of activating in the sector 4 of beginning of opening;
Step 22, computing machine copies to hard disk identification code district 2 as the hard disk identification code with the computer Recognition sign indicating number;
Step 23, computer backup disk are cut apart 3 of list areas and as preparation disk are cut apart the storage area that all disk contingency tables in the list area 5 save as each backup disk contingency table;
Step 24, guard of computer program storage area 1 write protection program, hard disk identification code district 2 and backup disk are cut apart list area 3 in the main address of activating in the sector 4 of beginning of opening, and promptly finish.
In this embodiment, computing machine reads the step of defence program, for computing machine reads and carry out the instruction of skip zone 6 earlier, is leading the address of activating in the sector 4 of beginning of opening in order to skip to defence program storage area 1, and then is reading and the execute protection program.In addition; when computing machine in the process of execute protection program; hard disk identification code district 2 that fetch protection program storage area 1 is write and backup disk are cut apart list area 3 respectively in the main address of activating in the sector 4 of beginning of opening, and then obtain hard disk identification code and each backup disk contingency table.
In this embodiment, see also shown in Figure 4ly, after hard disk was employed program setting protection, computing machine comprised according to the step of application program cancellation hard disk protection:
Step 30, computing machine judge whether hard disk has the hard disk identification code, if carry out step 31, otherwise, carry out step 34;
Step 31, computing machine judge whether the hard disk identification code is identical with the computer Recognition sign indicating number of present computing machine, if carry out step 32, otherwise, carry out step 33;
Step 32, each backup disk contingency table that computing machine is cut apart list area 3 with backup disk duplicates back disk cuts apart list area 5, cut apart the state of list area 5 in order to recover this disk, and removing defence program storage area 1, hard disk identification code district 2 and backup disk are cut apart list area 3, and reservation boot code, anticipate promptly, protected states of former beginning and end are recovered in the main sector 4 of activating, and promptly finish;
Step 33, computing machine are exported another announcement information, and another announcement information does not allow to remove main defence program storage area 1, hard disk identification code district 2 and the backup disk that activates sector 4 in order to expression and cuts apart list area 3, promptly finishes;
Step 34, computing machine are left the processing of cancellation protection hard disk, promptly finish.
From the above, (boot code promptly in the storage area of step 14), cooks up hard disk identification code district 2, defence program storage area 1 and backup disk and cuts apart list area 3 this embodiment in order to store boot code originally in main activation sector 4.When hard disk be not protected and hard disk after cancellation protection, recover main sector 4 boot code originally that activates, promptly directly according to main sector 4 boot code originally that activates, in order to finish the processing of activation manipulation system.And when hard disk is protected, be to skip to open the begin address of defence program in main activation sector 4 through reading and carry out the instruction of skip zone 6, make hard disk need, in order to reach the purpose of the data in the protection hard disk according to the defence program execution.
In this embodiment; computing machine activates sector 4 originally in order to store boot code (boot code according to application program the master; be in the storage area of step 14); advise out hard disk identification code district 2; defence program storage area 1 and backup disk are cut apart list area 3; be (to be that step 14) is edited in fact to boot code originally; in order to add aforesaid step 10~step 13 and step 15~step 17; so; this kind practice may cause boot code originally to wreck; and then cause hard disk to be activated; perhaps main activate sector 4 in the skip zone 6 and disk cut apart the storage data space of 5 of list areas; be not enough to be used for store originally in order to store boot code; defence program storage area 1; hard disk identification code district 2 and backup disk are cut apart list area 3; so; in another embodiment of the present invention, see also Fig. 5 and shown in Figure 6, computing machine is according to the application setting hard disk protection; in order in hard disk, to advise out hard disk identification code district 2 at least; defence program storage area 1 and backup disk are cut apart the step of list area 3, comprising:
Step 40, computing machine is set up a calling zone 81 in boot code (boot code) residue storage area afterwards in the storage area 80 in order to storage boot code (boot code) originally in the main sector 4 of activating;
Step 41, computing machine are found out disk and are cut apart one of them idle disk contingency table 82 in the list area 5;
Step 42, computing machine writes the address that interrupt instruction (as: the INT 13h of BIOS) reaches idle disk contingency table 82 in calling zone 81;
Step 43, computing machine writes the address of specifying an idle sector in the hard disk at idle disk contingency table 82, and with this idle sector as new activation sector 9;
Step 44, computing machine is provided with new skip zone 90, hard disk identification code district 2, backup disk in regular turn and cuts apart list area 3, boot code and open beginning district 91 and defence program storage area 1 new the activation in the sector 9, as shown in Figure 6;
Step 45, computing machine write skip instruction (as jmp) in skip zone 6, this instruction will skip to calling zone 81 in the main address of activating in the sector 4 of beginning of opening;
Step 46, computing machine is inserted skip instruction in new skip zone 90, and this instruction will skip to defence program storage area 1 in the new address of activating in the sector 9 of beginning of opening;
Step 47, computing machine copies to hard disk identification code district 2 as the hard disk identification code with the computer Recognition sign indicating number;
Step 48, computer backup disk are cut apart list area 3 and still as preparation disk are cut apart the storage area that list area 5 interior all disk contingency tables save as each backup disk contingency table;
Step 49, the 1 storage protection program in guard of computer program storage area, hard disk identification code district 2, backup disk are cut apart list area 3 and are opened the beginning address new the activation in the sector 9, and boot code opens beginning district 91 and open the beginning address main the activation in the sector 4, promptly finish.
By above-mentioned setting, in this embodiment, see also shown in Figure 7ly, computing machine reads the step of defence program, comprising:
Step 50, computing machine read and carry out the skip instruction of skip zone 6, so that skip to calling zone 81 in the main address of activating in the sector 4 of beginning of opening;
Step 51, computing machine read calling zone 81, and the address of using and obtaining idle disk contingency table 82 after execution of step 52, is carried out interrupt instruction again and loaded in the primary memorys so that will newly activate sector 9;
Step 52, computing machine read idle disk contingency table 82, obtain the address of new activation sector 9 at hard disk;
Step 53, computing machine read new skip zone 90, obtain defence program storage area 1 in the new address of activating in the sector 9 of beginning of opening, and promptly read defence program; Go the processing of execute protection program by the step of Fig. 2.
And in this embodiment; when computing machine in the process of execute protection program; hard disk identification code district 2 that fetch protection program storage area 1 is inserted and backup disk are cut apart list area 3 respectively in the new address of activating in the sector 9 of beginning of opening, and then read hard disk identification code and each backup disk contingency table from new activation sector 9 respectively.
In this embodiment, see also shown in Figure 8ly, after hard disk was employed program setting protection, computing machine comprised according to the step of application program cancellation hard disk protection:
Step 60, computing machine judge whether hard disk has the hard disk identification code, if carry out step 61, otherwise, carry out step 64;
Step 61, computing machine judge whether the hard disk identification code is identical with the computer Recognition sign indicating number of present computing machine, if carry out step 62, otherwise, carry out step 63;
Step 62, each backup disk contingency table that computing machine is cut apart list area 3 with backup disk duplicates back disk cuts apart list area 5, cut apart the state of list area 5 in order to recover this disk, remove the new data that sector 9, calling zone 81 and idle disk contingency table 82 are written into that activate, in addition in the skip zone 6 write boot code main activate sector 4 open the beginning address, anticipate promptly, protected states of former beginning and end are recovered in the main sector 4 of activating, and promptly finish;
Step 63, computing machine are exported another announcement information, and another announcement information is cut apart list area 3 in order to defence program storage area 1, hard disk identification code district 2 and backup disk that expression does not allow to remove new activation sector 9, promptly finish;
Step 64, computing machine are left the processing of cancellation protection hard disk, promptly finish.
By as can be known above-mentioned; computing machine does not carry out any editor to hard disk boot code originally; but in the idle storage area of hard disk, edit; so; can reduce the ruined chance of boot code; and needn't consider the storage area of boot code originally, whether be not enough to be used for store originally and cut apart list area 3 in order to store boot code, defence program storage area 1, hard disk identification code district 2 and backup disk.
In these embodiment, it is protected or the step of cancellation protection that computing machine enters setting harddisk with hard disk according to application program, sees also shown in Figure 9ly, comprising:
Step 70, computing machine obtain the computer Recognition sign indicating number that stores in advance in the computing machine; As aforementioned, the computer Recognition sign indicating number can be system management Basic Input or Output System (BIOS) (SMBIOS; System Management BIOS) value of general unique identifier (UUID) field of form 1 (Type 1);
Step 71, computing machine are exported user's menu, and user's menu comprises that one activates a protection hard disk option and a cancellation protection hard disk option;
Step 72, computing machine judge it is that activation protection hard disk option or cancellation protection hard disk option are selected, protect the hard disk option selected if activate, and carry out steps 73, otherwise i.e. expression cancellation protection hard disk option is selected, carry out step 74;
Step 73, computing machine is selected when activating protection hard disk option, cuts apart the step of list area 3 and handles (step process of press Fig. 5), i.e. end according to setting up defence program, hard disk identification code and backup disk;
Step 74, computing machine is selected when cancellation protection hard disk option, handles (step process of pressing Fig. 8) according to the step of cancellation hard disk protection, promptly finishes.
In sum; after the computer for executing application programs; available setting harddisk is protected or the cancellation protection; and after hard disk is set protection; only, could cut apart list area 5 at disk and read the disk contingency table, but not originally hard disk is set at other computing machine of protection originally hard disk being set at the computing machine of protection; then can't cut apart list area 5 and read the disk contingency table, in order to reach the purpose of protecting data stored in the hard disk at disk.
Press, the above only is the preferable specific embodiment of the present invention, only structural attitude of the present invention is not limited thereto, anyly be familiar with this skill person in field of the present invention, can think easily and variation or the equipollent of modification, all can be encompassed in the claim of following this case.

Claims (22)

1. method of protecting the data of hard disk; it is characterized in that; the method of the data of described protection hard disk is applied in a hard disk; after described hard disk is set protection; in described hard disk, advise out a hard disk identification code district, a defence program storage area and a backup disk in advance at least and cut apart the list area; and when described computing machine is finished selftest and initialization; read the stored defence program in described defence program storage area earlier; and handle according to the step that described defence program sets; and the step of described defence program comprises:
Read a hard disk identification code that is stored in advance in the described hard disk identification code district;
Judge that described hard disk identification code is whether identical with the set computer Recognition sign indicating number of described computing machine;
Described hard disk identification code is identical with the computer Recognition sign indicating number when judging, and whether a main disk that activates in the sector of then judging described hard disk is again cut apart the list area and be cleared;
Cut apart the list area and be cleared when judging described disk, then described backup disk is cut apart each backup disk contingency table that the list area stores in advance and copied to described disk and cut apart in the list area respectively as a disk contingency table; And
Handle according to a main boot code that activates in the sector again, in order to finish the activation manipulation system.
2. the method for claim 1 is characterized in that, described hard disk identification code is identical with the computer Recognition sign indicating number when judging, and described disk is handled according to boot code, in order to finish the activation manipulation system when cutting apart the list area and not being cleared.
3. the method for claim 1 is characterized in that, when judging described hard disk identification code and computer Recognition sign indicating number when inequality, handles according to the following step:
Judge that described disk cuts apart the list area and whether be cleared;
Cut apart the list area and be not cleared as yet when judging described disk, then duplicating at present all disk contingency tables of cutting apart the list area at described disk becomes each backup disk contingency table that described backup disk is cut apart the list area respectively;
Empty described disk and cut apart all disk contingency tables of list area; And
Handle output notice information according to described boot code, described announcement information is cut apart the list area in order to the expression disk does not have the disk contingency table.
4. method as claimed in claim 3, it is characterized in that, described hard disk identification code and computer Recognition sign indicating number are inequality when judging, and judging disk cuts apart the list area and is cleared, handle output notice information according to boot code, described announcement information is cut apart the list area in order to the expression disk does not have the disk contingency table.
5. the method for claim 1; it is characterized in that; the described hard disk of described computer settings is protected, cuts apart the step of list area in order to cook up described hard disk identification code district, defence program storage area and backup disk at least in described hard disk, comprising:
In a described main set skip zone and the described disk contingency table interval, sector of activating, be the described main storage area that activates the sector script in order to the storage boot code, set up described defence program storage area, hard disk identification code district and backup disk in regular turn and cut apart the list area; And
In described skip zone, write described defence program storage area in the described main address of activating in the sector of beginning of opening; and described computer Recognition sign indicating number copied to described hard disk identification code district as described hard disk identification code; described backup disk is cut apart the list area and then as preparation described disk is cut apart the storage area that disk contingency tables all in the list area saves as each backup disk contingency table, and described defence program storage area writes described defence program, hard disk identification code district and backup disk and cuts apart the list area and open the beginning address described main the activation in the sector.
6. method as claimed in claim 5; it is characterized in that; the step that described computing machine reads described defence program is; described computing machine reads described skip zone earlier and leads the address of activating in the sector of beginning of opening to obtain described defence program storage area described, and then reads defence program.
7. method as claimed in claim 5; it is characterized in that; described computing machine is in the process of carrying out described defence program; described computing machine reads the described hard disk identification code district and the backup disk contingency table district that write in the described defence program storage area and leads the address of activating in the sector of beginning of opening described respectively, and then obtains described hard disk identification code and each described backup disk contingency table.
8. method as claimed in claim 5 is characterized in that, after described hard disk was set protection, the step of described computing machine cancellation hard disk protection comprised:
Computing machine judges whether described hard disk has described hard disk identification code;
Have described hard disk identification code when judging described hard disk, judge again whether described hard disk identification code is identical with the computer Recognition sign indicating number of present computing machine; And
Identical when judging described hard disk identification code with the computer Recognition sign indicating number of present computing machine; each backup disk contingency table of then described backup disk being cut apart the list area duplicates back disk cuts apart the list area; cut apart the state of list area in order to recover described disk; and removing defence program storage area, hard disk identification code district and backup disk are cut apart the list area; and the reservation boot code, the main sector of activating reverts to protected state of former beginning and end.
9. method as claimed in claim 8; it is characterized in that; judge described hard disk when described computing machine and have described hard disk identification code; and it is inequality with the computer Recognition sign indicating number of present computing machine to judge described hard disk identification code; then export another announcement information, described another announcement information does not allow to remove main defence program storage area, hard disk identification code district and the backup disk that activates the sector in order to expression and cuts apart the list area.
10. method as claimed in claim 8 is characterized in that, judges described hard disk when described computing machine and does not have described hard disk identification code, and described computing machine leaves the processing of cancellation protection hard disk.
11. the method for claim 1; it is characterized in that; the described hard disk of described computer settings is protected, cuts apart the step of list area in order to cook up described hard disk identification code district, defence program storage area and backup disk at least in described hard disk, comprising:
Set up a calling zone in the described main sector of activating in order to the residue storage area of storage area after boot code that stores boot code;
Find out described disk and cut apart one of them idle disk contingency table in the list area;
Write the address that interrupt instruction reaches idle disk contingency table in described calling zone;
Write the address of specifying an idle sector in the described hard disk at idle disk contingency table, and newly activate the sector as one with described idle sector;
Being provided with a new skip zone, described hard disk identification code district, described backup disk in described new activation sector in regular turn cuts apart list area, a boot code and opens beginning district and described defence program storage area;
In described skip zone, write calling zone in the described main address of activating in the sector of beginning of opening;
In described new skip zone, write described defence program storage area and in described new activation sector, open the beginning address, and described computer Recognition sign indicating number copied to hard disk identification code district as the hard disk identification code;
Backup disk is cut apart the list area as disk being cut apart the storage area that disk contingency tables all in the list area saves as each backup disk contingency table; And
Defence program storage area storage protection program, hard disk identification code district, backup disk are cut apart the list area and are opened the beginning address new the activation in the sector, and boot code opens the beginning district and opens the beginning address main the activation in the sector.
12. method as claimed in claim 11 is characterized in that, described computing machine reads the step of described defence program, comprising:
Read described skip zone, obtain described calling zone in the described main address of activating in the sector of beginning of opening;
Read described calling zone to obtain the address of described idle disk contingency table;
Read described idle disk contingency table, obtain described new activation sector in the address of hard disk, the execution interrupt instruction will newly activate the sector and read from hard disk to primary memory; And
Read described new skip zone, obtain described defence program storage area in described new activation sector open the beginning address, read defence program.
13. method as claimed in claim 11; it is characterized in that; when computing machine in the process of execute protection program; read the described hard disk identification code district that inserts described defence program storage area and described backup disk contingency table district and in described new activation sector, open the beginning address respectively, and then from described new activation sector, read described hard disk identification code and each described backup disk contingency table respectively.
14. method as claimed in claim 11 is characterized in that, after described hard disk was set protection, the protected step of described computing machine cancellation hard disk comprised:
Judge whether described hard disk has described hard disk identification code;
Have described hard disk identification code when judging described hard disk, judge then whether described hard disk identification code is identical with the computer Recognition sign indicating number of present computing machine; And
Described hard disk identification code is identical with the computer Recognition sign indicating number of present computing machine when judging, and then the described main sector of activating is reverted to protected state of former beginning and end.
15. method as claimed in claim 14; it is characterized in that; the step of former protected state of beginning and end is recovered in main activation sector; comprise that each backup disk contingency table that backup disk is cut apart the list area duplicates back disk and cuts apart the list area; cut apart the state of list area in order to recover described disk; remove the data that new activation sector, calling zone and idle disk contingency table are written into, and write boot code in the main address of beginning of opening of activating the sector in the skip zone.
16. method as claimed in claim 14; it is characterized in that; has described hard disk identification code when judging described hard disk; and judge that described hard disk identification code is inequality with the computer Recognition sign indicating number of present computing machine; then export another announcement information, another announcement information is cut apart the list area in order to defence program storage area, hard disk identification code district and backup disk that expression does not allow to remove new activation sector.
17. method as claimed in claim 14 is characterized in that, does not have described hard disk identification code when judging described hard disk, then leaves the processing of cancellation protection hard disk.
18., it is characterized in that it is protected or the step of cancellation protection that described computing machine enters setting harddisk with hard disk according to application program, comprising as claim 8 or 14 described methods:
Obtain the computer Recognition sign indicating number that stores in advance in the described computing machine;
Export user's menu, described user's menu comprises that one activates a protection hard disk option and a cancellation protection hard disk option;
Judgement is that described activation protection hard disk option or described cancellation protection hard disk option are selected; And
Protection hard disk option is selected when activating, and cuts apart the step of list area and handles according to setting up described defence program, hard disk identification code and backup disk.
19. method as claimed in claim 18 is characterized in that, and is selected when described cancellation protection hard disk option, handles according to the step of the described hard disk protection of cancellation.
20. the method for claim 1 is characterized in that, described computer Recognition sign indicating number can be general unique identification sign indicating number.
21. method as claimed in claim 20 is characterized in that, described general unique identification sign indicating number is the value of the general unique identifier field of system management Basic Input or Output System (BIOS) form 1.
22. the method for claim 1 is characterized in that, each backup disk contingency table duplicates hard disk and is stored in all disk contingency tables that the main disk that activates the sector is cut apart the list area before not protected as yet.
CN200610167099A 2006-12-14 2006-12-14 Method for protecting data of hard disk Expired - Fee Related CN101201803B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200610167099A CN101201803B (en) 2006-12-14 2006-12-14 Method for protecting data of hard disk

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200610167099A CN101201803B (en) 2006-12-14 2006-12-14 Method for protecting data of hard disk

Publications (2)

Publication Number Publication Date
CN101201803A true CN101201803A (en) 2008-06-18
CN101201803B CN101201803B (en) 2010-05-19

Family

ID=39516975

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200610167099A Expired - Fee Related CN101201803B (en) 2006-12-14 2006-12-14 Method for protecting data of hard disk

Country Status (1)

Country Link
CN (1) CN101201803B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103198029A (en) * 2012-01-05 2013-07-10 精品科技股份有限公司 USB drive with protection mechanism and data storage system
CN103294971A (en) * 2012-10-17 2013-09-11 西安晨安电子科技有限公司 Method for realizing burglary prevention and data protection of hard disk
CN117644101A (en) * 2023-11-20 2024-03-05 北京信佳伟业科技发展有限公司 Hard disk destroying machine with information acquisition function

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1450459A (en) * 2002-04-10 2003-10-22 联想(北京)有限公司 Hard disc data protector

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103198029A (en) * 2012-01-05 2013-07-10 精品科技股份有限公司 USB drive with protection mechanism and data storage system
CN103198029B (en) * 2012-01-05 2016-06-29 精品科技股份有限公司 There is Portable disk and the data storage system of preventing mechanism
CN103294971A (en) * 2012-10-17 2013-09-11 西安晨安电子科技有限公司 Method for realizing burglary prevention and data protection of hard disk
CN117644101A (en) * 2023-11-20 2024-03-05 北京信佳伟业科技发展有限公司 Hard disk destroying machine with information acquisition function
CN117644101B (en) * 2023-11-20 2024-05-07 北京信佳伟业科技发展有限公司 Hard disk destroying machine with information acquisition function

Also Published As

Publication number Publication date
CN101201803B (en) 2010-05-19

Similar Documents

Publication Publication Date Title
JP3653709B2 (en) Data security device
CN101359355B (en) Method for raising user's authority for limitation account under Windows system
CN102902672B (en) Method and device for cleaning file system
CN101201803B (en) Method for protecting data of hard disk
CN101520830B (en) Method for startup identity authentication of computer capable of protecting hard disk data
CN101167058A (en) Apparatus, method and system for restoring files
EP2428895A1 (en) Key information area in file system maintaining method and apparatus
US20050193195A1 (en) Method and system for protecting data of storage unit
CN101477484A (en) Method and equipment for recovering destroyed main bootstrap program
CN101349980B (en) Hard disk data backup and protection method
CN102142066A (en) Computing equipment and backup recovery method thereof
CN102968359B (en) Registration table transparent penetration method under disk operating system
TW201115384A (en) Read-only protection method for removable storage medium
TW588244B (en) Data protection method and system for storage unit
TWI331748B (en) Method for protecting data in a hard disk
JPH11212846A (en) Data retreat restoration method
JPS6154549A (en) Discrimination method for computer using identification number of central processing unit
CN101996053A (en) External storage device, control method for computer system, and control method for external storage device
JPH09244887A (en) Information recording medium and information processor
JPH08185347A (en) Method for retracting/restoring file
JPH02122348A (en) File protecting method
JPH1165886A (en) Program debugging system of computer
CN101201802A (en) Method for protecting data of hard disk
JPH06161611A (en) Information processor
JPH01137348A (en) Data writing system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
CB03 Change of inventor or designer information

Inventor after: Zou Lili

Inventor before: Lu Yingzhi

COR Change of bibliographic data
TR01 Transfer of patent right

Effective date of registration: 20170302

Address after: Wuqing District of Tianjin city under Zhuzhuang Street Beijing Tianjin highway junly garden 26-3-501

Patentee after: Zou Lili

Address before: Taipei City, Taiwan Chinese Shilin District Hougang Street No. 66

Patentee before: Inventec Corporation

CP02 Change in the address of a patent holder

Address after: 541000 No. two, No. 5, West Road, Xiangshan District, Guilin, the Guangxi Zhuang Autonomous Region

Patentee after: Zou Lili

Address before: 300000 Tianjin city Wuqing district under Zhuzhuang Street Beijing Tianjin highway junly garden 26-3-501

Patentee before: Zou Lili

CP02 Change in the address of a patent holder
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100519

Termination date: 20171214

CF01 Termination of patent right due to non-payment of annual fee