CN101377751A - Method for protecting computer working document - Google Patents

Method for protecting computer working document Download PDF

Info

Publication number
CN101377751A
CN101377751A CNA2007101471083A CN200710147108A CN101377751A CN 101377751 A CN101377751 A CN 101377751A CN A2007101471083 A CNA2007101471083 A CN A2007101471083A CN 200710147108 A CN200710147108 A CN 200710147108A CN 101377751 A CN101377751 A CN 101377751A
Authority
CN
China
Prior art keywords
computing machine
controller
data
working document
protector
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007101471083A
Other languages
Chinese (zh)
Inventor
周宏建
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNA2007101471083A priority Critical patent/CN101377751A/en
Publication of CN101377751A publication Critical patent/CN101377751A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a computer operation file protection method. In the protection method, a protector is connected between a computer and an input device or a keyboard or a mouse so that any data input through the keyboard and/or the mouse are intercepted, recorded or stored to become a completely clean data file which can not be destroyed and a data file can be re-established or restored in a computer quickly through the completely clean data file when the computer is destroyed. The protector comprises a controller connected between the computer and the keyboard so as to implement general computer operations. The controller comprises a micro-controller, a temporary storage area in whuch data can be stored, and a function key table which can receive and store computer data.

Description

Method for protecting computer working document
Technical field
The present invention relates to a kind of method for protecting computer working document, and relate in particular to the guard method of a kind of computer working document, data file or document files.
Background technology
Computing machine has become a kind of requirement in current social, and current can poisoning exactly of computed the time, being afraid of most, after each the poisoning, the data that the user was set up in the past all can be destroyed be fallen, and may take time again the computing machine format, and then needed software is reinstalled to computing machine, the effort that its not only previous significant period of time does all can be put to white stream, it more needs to spend considerable time and removes data reconstruction, quite puzzlement.
And general computing machine is destroyed by poisoning intrusion or having a mind to or unintentionally after the artificial destruction, nothing more than having following three kinds of bad results: operating system is when machine, data are stolen, data on the hard disk are destroyed etc.And the reason that data are destroyed on the hard disk also might be the damage of hard disk.And the present ruined mode of data that prevents is all nothing more than two kinds of main policies: the one and virus code do a comparison look into poison, another then is to get up the data backup of all foundation standby.
Wherein, the mode of virus code comparison is mainly antivirus software manufacturer and adopts.But gas defence mode at this class, all to have now in the virus that exists on the market be main demand to scan, and often take place after new computing machine poisoning a period of time afterwards, just having relative guard process code produces, and the computing machine that needs renewal protection sign indicating number just can be immune, and therefore present all antivirus softwares on the market all can't be kept out new virus completely.
In addition; the mode of backup is then mostly to back up the data of hard disk; can't produce protection to the execution of real time operating system; behind new and old virus damage hard disc data; though can be used as strategy to restore Backup Data; but hard disc data still has loss; and loss is time or cycle length and discussing with backup; and backed up data is many more or the cycle is short more; the medium that needs is big more relatively; cost is high more, and the cycle of certain backup is long more, and then the storage data of relative loss are just many more.
After the user has had above two kinds of means of defences, still unavoidably have loss sometimes, so most computing machine user all can quite pay attention to for the seriousness of data degradation.In addition, at present for computing machine if caused the situation of data degradation that following several classification are roughly arranged by virus or hacker attacks: application software wrecks; Operating system wrecks; Private data, for example email, technical information, photo etc. are destroyed; The work document that own blood fickle in love is done, for example paper, program source code, company's file etc. are destroyed, and wherein having many data is the most important intellecture property that the user had.
Moreover, at present according to investigation, the own institute plenty of time that spend of computing machine user construction on the market, editor and storage and wisdom and the document that produces by rogue program or viral destruction, and cause the loss of the useless and property of the painstaking effort of effort to reach New Taiwan Currency 1000.8 hundred million every year.Though antivirus software and backup software are arranged but also can't prevent this loss, and rogue program and Virus make rapid progress, who can't guarantee when have the Virus of renewal and the leak of software is developed and finds out, and result in greater loss, and the backup expensive hardware of data, be not that the standard that general user has is equipped with, and stand-by program is complicated, has taken user's considerable time.
For example, at present the protection mode of utilization backup on the market mainly is that the method for utilization backup prevents that file on the hard disk from by artificial destruction, for example having products such as FNet PCClone, IBMvitalfile, Storactive Livebackup, Lasso Logic being used on the market at present.And utilization prevents because of hard disk corruptions causes the method for corrupted data RAID (RedundantArray of Independent Disks) and S.M.A.R.T. (Self-Monitoring Analysis andReporting Technology) etc. are arranged, for example product such as RAID card, HDD Health monitoring software is arranged at present on the market, but the RAID cost is too high, and HDD Health then has only the function of warning.Recruit the mode tear trick open to protect the method for user's data file so present this usefulness is seen, cannot say for sure when to have the generation of new virus and cause damage, because data access and ruined approach exist always.
Summary of the invention
Because many shortcomings of the general method for protecting computer working document of using always; through research improvement design repeatedly; finally develop method for protecting computer working document of the present invention; so that a kind of any file that is produced at work that can protect the user fully to be provided, the also most important intellecture property that therefore can protect the user fully.It sees that with at present employed to recruit the mode of tearing trick open different fully, it is the data file that the special partition method of utilization is protected the user, make the generation of any new virus all can't destroy any data that the user works hard and sets up, so also can not cause any loss to its data file
The guard method that is designed primarily to a kind of computer working document of the present invention; It is characterized in that: it comprises provides a protector, and this protector is connected between a computing machine and the input media, so that intercepting and record or store any data that this input media imports and become one fully totally and the data file that can not wreck, so that when computing machine is destroyed, can promptly rebulid or recover a data file in this computing machine by this another complete clean data file.
Description of drawings
For further specifying structure of the present invention, feature and practical purpose thereof, the following drawings describes in detail as the back:
Fig. 1 is a use equipment connection diagram of the present invention;
Fig. 2 is a floor map of the present invention;
Fig. 3 is the floor map of more refinement of the present invention;
Fig. 4 is the floor map of the inside of use equipment of the present invention;
Fig. 5 is the use synoptic diagram of collocation computing machine of the present invention;
Fig. 6 is the use synoptic diagram of another kind of collocation computing machine of the present invention; And
Fig. 7 is the use synoptic diagram of another kind of again collocation computing machine of the present invention.
Embodiment
Method for protecting computer working document of the present invention; please cooperate and consult shown in Fig. 1-3; method for protecting computer working document mainly provides a kind of isolation or protector (10) and protector (10) is connected between a computing machine (30) and the input media (8); for example a keyboard (80) and/or a mouse (88) or speech input device etc. are so that separate computing machine (30) and input media (8) or keyboard (80) with mouse (88).Wherein must be pointed out that earlier, most of user is at editing files or figure shelves, all be to finish, so the generation of user's data file source mostly is keyboard (80) and mouse (88) by the input media (8) of keyboard (80) and mouse (88) or for example phonetic entry etc.And it must be noted that at this wherein this keyboard (80) all is the equipment that unidirectional output is gone into mouse (88), its do not have invaded or destroy by computer virus may.
This protector (10) mainly comprises a controller (11), can for example connect with wired or wireless or infrared ray and all can for being connected between this computing machine (30) and keyboard (80) and/or the mouse (88).Please be referring to shown in the 3rd figure, this controller (11) for example can comprise two connectivity ports (12,13) be connected to this keyboard (80) and mouse (88) and respectively, and another connectivity port (14) and be connected to this computing machine (30), these links (12,13,14) can be various connectivity port, for example usb connecting port.Controller (11) can comprise a control or processing or micro controller (15), a working area (16), and function key tables (17) etc. make computing machine (30) can carry out control various commonly used or the processing or the running of computing machine by this input media (8).
The present invention also provides a medium (18) to be connected to this computing machine (30), and for storing with the input signal acquisition of mouse (88) and keyboard (80) and with it, this acquisition data is clean data, and can never be destroyed.Wherein, sort controller (11) is in the signal of acquisition keyboard (80) that utilizes this medium (18) and mouse (88), it can also be sent to computing machine (30) inside with the signal of mouse (88) and keyboard (80), so the inner application program (31) of computing machine (30) can continue inerrably to finish the work of editing files or figure shelves.At last, the file that this computing machine (30) internal applications (31) produces, can be stored in computing machine (30) the inner hard disk or medium (32), and be can be described as two identical files by the inner hard disk of this computing machine (30) or medium (32) keyboard of being stored and the signal of mouse and the keyboard and the mouse signal that are stored in the external memory media (18), wherein this medium (18) also can be the hard disk of computing machine (30) inside.
These internal memories or medium (18,32) can for example get internal memory for various storages at random, the permanent storage internal memory, the erasable stored memory or the like that removes, these links (12,13) can also can arrive this micro controller (15) in order to connecting key dish (80) and mouse (88) for for example PS/2 (Personal Computer System 2) Host controller, one IDE (Integrated DriveElectronics) or SATA (Serial AT Attachment) or Flash controller (19) can be in order to connect magnetic disc storage media (18), this USB (Universal Serial Bus) Client side controller (14) then can be in order to be connected to the usb connecting port of computer terminal, and become the auxiliary device of this computing machine (30), wherein this controller (11) is connected in the usb connecting port of for example general computing machine.
When operation or use, controller (11) can receive a complete function key definition table (17) when computing machine (30) is started shooting, key up and down for example, the CTRL key, the scan code of ALT key, then as computing machine (30) end startup software for editing such as WORD, softwares such as POWERPOINT, and when on preassembled menu, pressing the opening entry option, micro controller (15) can be by the also newly-increased writing task of the opening entry information that USB controller (14) receives in the scratch-pad memory (16) of controller (11), controller (11) is when receiving the signal that external connection type keyboard (80) presses, it can be deposited in keyboard scancode in the scratch-pad memory (16), and transmit this scan code simultaneously and hold to computing machine (30), after receiving scan code, computing machine (30) termination returns confirmation, if the permanent time does not receive that the response of computer terminal then sends warning signal and notifies the user that possible computing machine suffers abnormal destruction or fault.
If receive responding then controller judges whether this information has the function key information of comprising, and comprises function key information if controller is judged, then can do relative action at this function, for example switches writing task, end record, charged timeout etc.; If judge be not function key then directly stored record in permanent internal memory (32), continue to receive keyboard and mouse signal if not power cut-off is then returned, if this writing task is then closed in power cut-off, newly-increased writing task is activated to wait for next time.The wherein explanation of function key: controller (11) time is to be in halted state in start, so opening entry when just needs the outside to notify.This notification controller enabling signal realizes that this kind enabling signal is a kind of of function key if press on the computing machine button notification controller (11) by the user.
And the flow process that computer terminal mouse (88) record also writes down as keyboard (80), behind the newly-increased writing task, when external mouse has action, micro controller (15) receives mouse signal by USB/PS2 controller (13) and deposits in the scratch-pad memory (16), and simultaneously mouse signal is passed to computer terminal, and judge whether response message of computer terminal, if the permanent time does not receive that the response of computer terminal then sends warning signal and notifies user, computing machine to suffer abnormal destruction or fault.If receive responding then controller judges whether this information has the functional menu of comprising information, comprises function key information if controller is judged, then does relative action at this function.For example switch writing task, end record, charged timeout, clip and paste internal memory etc.If judge be not function key then directly stored record in permanent internal memory, continue to receive keyboard signal if not power cut-off is then returned, if this writing task is then closed in power cut-off, newly-increased writing task is activated to wait for next time.The wherein explanation of function key: controller the time is to be in halted state in start, so opening entry when just needs the outside to notify.This notification controller enabling signal is come notification controller if press on the computing machine quick button by the user with mouse, and this kind enabling signal is a kind of of function key.
When log file or data file destroyed and need be recovered to data file the time; at first; computing machine (30) end needs to open script earlier and produces the employed application program of log file (31); and then computer terminal data file protected location select restored file name and import into inside the controller (11) by usb connecting port (14); after controller (11) receives this computer terminal function response signal; controller (11) can judge whether the startup release signal; then continue to handle other function if be not activated release signal; if there is release signal then to continue the filename that the receiving computer end restores; certainly this filename is that computing machine (30) end is chosen by the data file protected location in advance; and this controller (11) can read this log file in the permanent storage internal memory; the data-driven storage order is passed computer terminal back; this computer terminal has a driver and receives the controller returned data; and the signal of emulation mouse and keyboard imports application program into; then application program can repeat as user before with keyboard and mouse input signal and start working; after transmission finishes; control unit end restores flow process, and this moment, data ought also intactly be restored in computer terminal.
Wherein should be noted that, this external memory media (18) captures the back and the signal of storage, transmission enters in the application program (31) of computing machine (30) end, and this application program (31) has the editor's action before the repetition, and produces living file or figure shelves.So all can synchronously store the clean data of portion in medium (18) the inside of this controller (11) for work hard any data of setting up of user, the data file of this medium (18) the inside can never be by any new virus damage, so also can not cause any loss to it.If computer terminal application program (31) suffers virus damage and damages, reinstall application program (31) or operating system after also computer terminal can being removed fully.
When treating application program (31) operate as normal, carry out and restore flow process, then reducible file or figure shelves.Just in case computer terminal can't in time be prepared application program and do recovery, also this controller (11) can be connected to an other computing machine (30) with application program (31), carry out and restore flow process.Editor and backup so simultaneously, and the signal of isolation computer end invasion source so can protect this working document fully and can not be subjected to new or old virus damage and damage.This protector (10) can be carried into any occasion to make things convenient for the user, and can be connected to various computing machines (30) at any time as a structure that is convenient for carrying, and is quite convenient and practical.
It must be noted that in addition; wherein this can be used for protecting the controller (11) of working document so promptly to can be used to write down any data of mouse and keyboard; it also can write down these data on local machine hard disk or connectivity port (32); local machine has a resident watchdog routine; the data of record are passed back to server end by network, and server end also has a watchdog routine.If the server side to monitor program is found by judgment data then to warn by network if the user has improper activity at once.If the invalid server of warning can also be ordered local machine end watchdog routine, stop the activity of all keyboards and mouse, so the unique invasion approach of user just is cut off.For example the employee of intra-company connects the chatroom chat if be on duty the time, and then server can be learnt through the data judgement, and notifies this employee this improper activity through announcement, stops this employee's keyboard and mouse function in case of necessity.Therefore the present invention has more the function that prevents that drawback from taking place.Above-described technological thought or structure separate case are mentioned application.
The present invention then defines protector (10) of this case and the configuration relation between the computing machine (30), for example it can be arranged on a computing machine (30) outside, shown in Fig. 1-3 and 5 figure, or be arranged on computing machine (30) the inside but be arranged on mainboard (33) outside of computing machine (30), as shown in Figure 6, or the inboard person of mainboard (33) who is arranged on computing machine (30) the inside and is arranged on computing machine (30) is shown in the 7th figure, and these collocation modes all can be the present invention and adopt.Wherein, this medium (18) also can be arranged on outside the protector (10) looks like shown in Fig. 5-7, or the inside as Figure 1-3.And except the medium (32) of inside, this computing machine (30) can add one or more medium (34) in addition, to increase the capacity or the space of storage.
Must be noted that wherein that at present habitual antivirus software and backup software all adopt sees that trick tears the data file that the mode of trick is protected the user open, thus the generation that it at all can't anti-blocking any new virus, and at any time might be destroyed and cause damage.Antivirus software that these are habitual and the equal no-trump computing machine of backup software and keyboard or mouse are done the pattern of isolation; as long as so have the technological thought that computing machine and keyboard or mouse are done the pattern of isolation all will belong to category of the present invention, and should be subjected to protection of Intellectual Property Rights.
Then can be various conversion as for the connected mode between its assembly and implement, for example will build keyboard or mouse the inside in the protector of the present invention in, this medium also can be the hard disk of computer-internal etc.So no matter the connected mode between these assemblies why, also all will belong to category of the present invention, and should be subjected to protection of Intellectual Property Rights.

Claims (9)

1, a kind of method for protecting computer working document, it is characterized in that: it comprises:
One protector (10) is provided, and described protector (10) is connected between a computing machine (30) and the input media (8), so that intercepting and record or store any data that described input media (8) imported and become one fully totally and the data file that can not wreck, so that the data file in computing machine (30) can promptly rebulid by described another complete clean data file when being destroyed or recover a data file in described computing machine (30).
2, method for protecting computer working document as claimed in claim 1 is characterized in that: described protector (10) comprises that a controller (11) is connected between computing machine (30) and the input media (8), so that carry out the running of general computing machine.
3, method for protecting computer working document as claimed in claim 2; it is characterized in that: described controller (11) comprises a micro controller (15); one working area (16) but temporal data, and a function key table (17) can receive and store the function key table of described computing machine (30).
4, method for protecting computer working document as claimed in claim 2 is characterized in that: described protector (10) comprises that a medium (18) is connected to described controller (11), for the complete clean data file of this part of storage.
5, method for protecting computer working document as claimed in claim 1 is characterized in that: described input media (8) can be keyboard (80) or mouse (88) or other input media.
6, method for protecting computer working document as claimed in claim 1 is characterized in that: described protector (10) can in build described input media (8) the inside in.
7, method for protecting computer working document as claimed in claim 1 is characterized in that: described protector (10) can utilize wired or wireless or infrared ray is connected to described input media (8).
8, method for protecting computer working document as claimed in claim 1 is characterized in that: described protector (10) can utilize wired or wireless or infrared ray is connected to described computing machine (30).
9, method for protecting computer working document as claimed in claim 1; it is characterized in that: described protector (10) can be arranged on the outside of computing machine (30); or be arranged on the inside of computing machine (30) but be arranged on the outside of the mainboard (33) of computing machine (30), or be arranged on the inside of computing machine (30) and be arranged on the inboard of the mainboard (33) of computing machine (30).
CNA2007101471083A 2007-08-30 2007-08-30 Method for protecting computer working document Pending CN101377751A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2007101471083A CN101377751A (en) 2007-08-30 2007-08-30 Method for protecting computer working document

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007101471083A CN101377751A (en) 2007-08-30 2007-08-30 Method for protecting computer working document

Publications (1)

Publication Number Publication Date
CN101377751A true CN101377751A (en) 2009-03-04

Family

ID=40421304

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007101471083A Pending CN101377751A (en) 2007-08-30 2007-08-30 Method for protecting computer working document

Country Status (1)

Country Link
CN (1) CN101377751A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101819611B (en) * 2009-02-26 2012-08-08 周宏建 Real-time comparison and defending method of input data and hardware thereof
CN105022961A (en) * 2015-06-29 2015-11-04 北京深思数盾科技有限公司 Computer data protection method and computer data protection device
CN106060093A (en) * 2016-07-29 2016-10-26 成都轻车快马网络科技有限公司 Cloud platform development method used for mobile device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101819611B (en) * 2009-02-26 2012-08-08 周宏建 Real-time comparison and defending method of input data and hardware thereof
CN105022961A (en) * 2015-06-29 2015-11-04 北京深思数盾科技有限公司 Computer data protection method and computer data protection device
CN105022961B (en) * 2015-06-29 2018-07-06 北京深思数盾科技股份有限公司 A kind of guard method of computer data and device
CN106060093A (en) * 2016-07-29 2016-10-26 成都轻车快马网络科技有限公司 Cloud platform development method used for mobile device
CN106060093B (en) * 2016-07-29 2019-07-05 上海乐港信息科技有限公司 Cloud platform development approach for mobile device

Similar Documents

Publication Publication Date Title
US7392541B2 (en) Computer system architecture and method providing operating-system independent virus-, hacker-, and cyber-terror-immune processing environments
US8621282B1 (en) Crash data handling
US7805630B2 (en) Detection and mitigation of disk failures
CN103389928B (en) A kind of method of computer data backup and recovery
CN102279775A (en) Method for processing failure of hard disk under Linux system
CN104536860A (en) Hard disk sequence marshalling method based on real-time JBOD monitoring mode
CN101499027A (en) Intelligent memory system based on independent kernel and distributed architecture
CN101873462A (en) DVR (Digital Video Recorder) as well as data backup and recovery method and system thereof
CN2917099Y (en) 'Three-tolerant' digital black box for mission-critical computer system
CN101667161A (en) Method and device for protecting data of storage device and computer system
US20060288419A1 (en) Protection system and method regarding the same
CN102508760A (en) Early warning method for redundant array of independent disks (RAID) and early warning system for RAID
CN104123495A (en) Method for neutralizing malicious software blocking computer operation
JP2001142764A (en) Log file protecting system
CN112068990A (en) Storage device and backup method for setting special event as restore point
CN101901171A (en) Using method of computer data backup and restore software
CN102662787A (en) Method for protecting system disk RAID (redundant array of independent disks)
CN101377751A (en) Method for protecting computer working document
CN110287061A (en) Computer based maintenance of information system
CN103902401A (en) Virtual machine fault tolerance method and device based on monitoring
CN114218037A (en) Hard disk management method, device, equipment and machine readable storage medium
US10262135B1 (en) Systems and methods for detecting and addressing suspicious file restore activities
CN102142066A (en) Computing equipment and backup recovery method thereof
US9692773B1 (en) Systems and methods for identifying detection-evasion behaviors of files undergoing malware analyses
US8745001B1 (en) Automated remediation of corrupted and tempered files

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20090304