CN101785239B - Key based hidden partition system - Google Patents

Key based hidden partition system Download PDF

Info

Publication number
CN101785239B
CN101785239B CN200780053762.6A CN200780053762A CN101785239B CN 101785239 B CN101785239 B CN 101785239B CN 200780053762 A CN200780053762 A CN 200780053762A CN 101785239 B CN101785239 B CN 101785239B
Authority
CN
China
Prior art keywords
content
hidden partition
key
response
hidden
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200780053762.6A
Other languages
Chinese (zh)
Other versions
CN101785239A (en
Inventor
L·张
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Publication of CN101785239A publication Critical patent/CN101785239A/en
Application granted granted Critical
Publication of CN101785239B publication Critical patent/CN101785239B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • G06F21/805Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors using a security table for the storage sub-system

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

A key based hidden partition solution may provide a second hidden partition in a first storage device to store a second content that is synchronized with a first content of a first hidden partition of the first storage device. The solution may further provide a key that matches the first content and update the second content of the second hidden partition and the key based on the modified first content in response to an authorized modification to the first content of the first hidden partition.

Description

Hidden partition system based on key
Background technology
In order to adapt to protection vital document or data and to prevent the needs that confidential information is leaked, can use some based on the scheme of hidden partition.These schemes can be stored crucial data for the single hidden partition of user assignment at the hard disk of computing equipment.Hidden partition can be sightless to one or more softwares (for example, operating system), though therefore the operating system of computing equipment damage or hard disk formatted, the data in the hidden partition also can remain.Yet, if some mistakes occur in the hidden partition, for example, because corrupted data or lose, or by malware attacks, the user may not find basic reason or deal with problems so.
Summary of the invention
The application's a aspect relates to a kind of computing system, and it comprises: the first memory device, and it comprises the first hidden partition and the second hidden partition; And the logical block that is coupled to described the first memory device, wherein, described logical block is used for: at described the second hidden partition storage second content identical with the first content of described the first hidden partition, generate key based on described first content, and the validity of verifying described first content based on described key.
Preferably, described system also comprises: be coupled to the second memory device of described logical block, it is used for storing described key, wherein, provides described the second memory device in embedded system; Perhaps be coupled to the second memory device of described logical block, it is used for storing described key, wherein, provides described the second memory device at safety chip.
Preferably, described the second memory device comprises nonvolatile memory.
Preferably, described logical block is used for revising described first content and upgrading the value of described key and at least one of described second content based on the first content of revising.
Preferably, described logical block is used in response to definite described key and described first content does not mate and described key and described second content mate, with described second content and described first content synchronously to repair described first content.
Preferably, described logical block is used for providing about unmatched information between described key and described the first hidden partition and described the second hidden partition.
Preferably, described logical block is used for described key storage at the memory device of safety and access described key to verify the validity of described the first hidden partition.
The application relates to a kind of method for the management hidden partition on the other hand, comprising: provide the second hidden partition in the first memory device, with the storage second content synchronous with the first content of the first hidden partition of described the first memory device; Key with described first content coupling is provided; And in response to the modification to the mandate of the described first content of described the first hidden partition, upgrade described second content and the described key of described the second hidden partition based on the first content of revising.
Preferably, described method also comprises: in response to the instruction of the described first content of access, detect described first content whether with described cipher key match; In response to not mating between definite described first content and the described key, detect described second content whether with described cipher key match; And in response to definite described second content and described cipher key match, with described first content and described second content synchronously to repair described first content.
Preferably, described method also comprises: determine described first content whether with described cipher key match; In response to definite described first content and described cipher key match, determine described second content whether with described cipher key match; And in response to not mating between definite described key and the described second content, recover described second content based on described first content.
Preferably, described method also comprises: in response to definite described key and described first content coupling, determine that described first content is effective; In response to not mating between definite described key and the described second content, effective described first content is copied to described the second hidden partition.
Preferably, described method also comprises: in second memory device of described key storage on embedded chip.
Preferably, described method also comprises: in response to the access instruction of the mandate of accessing described the first hidden partition, determine whether described key mates with described first content; In response to definite described key and described first content coupling, access described the first hidden partition.
The application relates in one aspect to a kind of method for the management hidden partition again, comprising: the second hidden partition that the first content of the first hidden partition of memory device is copied to described memory device; Provide key based on described the second hidden partition; And do not mate in response to definite described first content and described key, described the first hidden partition and described the second hidden partition is synchronous.
Preferably, described method also comprises: the value coupling in response to the first content of determining described the first hidden partition and described key is stored in information in described the first hidden partition; Described the second hidden partition is synchronous with the first hidden partition of revising; And upgrade described key based on described the second hidden partition.
Preferably, described method also comprises: do not mate in response to the value of determining described key and the content of described two hidden partitions, determine the difference between the second content of described first content and described the second hidden partition, to recover described first content and described second content.
Preferably, described method also comprises: in response to the modification of the mandate on described the first hidden partition, upgrade the value of described key.
Preferably, described method also comprises: in response to the modification of the mandate on described the first hidden partition, upgrade the content of described the second hidden partition.
Preferably, described method also comprises: determine described key whether with the second content coupling of described the second hidden partition; And do not mate in response to the described second content of determining described key and described the second hidden partition, repair the described second content of described the second hidden partition based on the described first content of described the first hidden partition.
Description of drawings
Infinite mode illustrates invention described herein by example in the accompanying drawings.Simple and clear for what illustrate, the element of explanation needn't proportionally be drawn in the drawings.For example, for the sake of clarity, can usually amplify with respect to other yuan the size of some elements.In addition, in appropriate circumstances, the Reference numeral that repeats in the drawings is used to indicate corresponding or similar element.
Fig. 1 is the schematic diagram of the embodiment of computing equipment.
Fig. 2 is the schematic diagram of the embodiment of hard disk.
Fig. 3 is the schematic diagram of method of hidden partition that can be used for the hard disk of control chart 2.
Embodiment
Following declarative description be used for being provided for the technology that uses a model of assets control.The realization of these technology is not restricted in the computer system; Can use it by any execution environment (for example, other numeral/electronic equipment) for similar purpose.In the following description, a plurality of details have been set forth, for example logic realization, command code, the unit that is used to specify operand, resource partitioning/share/copy type and correlation and the logical partition/integrated selection of realization, system unit, so that the more thorough understanding to the present invention to be provided.But, can be in the situation that there be these concrete details to realize the present invention.In other example, for fuzzy the present invention, control structure and whole software instruction sequences are not shown at length.
" embodiment " who mentions in the specification, " embodiment ", " example embodiment " etc. have indicated the embodiment that describes can comprise special characteristic, structure or characteristics, but each embodiment must comprise these special characteristics, structure or characteristics.In addition, these phrases are not to refer to identical embodiment.In addition, when having described in conjunction with the embodiments specific feature, structure or characteristics, can think and in those skilled in the art's ken, can realize these features, structure or characteristics in conjunction with other embodiment, no matter whether describe clearly.
Can realize embodiments of the invention with hardware, firmware, software or its any combination.Embodiments of the invention can also be embodied as the instruction of storing at machine readable media, it can be read or be carried out by one or more processors.Machine readable media can comprise for any mechanism of storing or send with the information of machine (for example, computing equipment) readable form.For example, machine readable media can comprise read-only memory (ROM); Random access memory (RAM); Magnetic disk storage medium; Optical storage media; Flash memory device; The signal of the propagation of electricity, light, sound or other form (for example, carrier wave, infrared signal, digital signal etc.) etc.
Below describe the word that can comprise such as first, second grade, it only is used for descriptive purpose and is not interpreted as determinate.
Fig. 1 shows the exemplary embodiment of computing equipment 100.Computing equipment 100 can comprise one or more processors 110.Processor 110 can come execution action in response to the instruction of carrying out.For example, processor 110 can executive program, executing data operate and control task in computing equipment 100 grades.Processor 110 can be the processor that is suitable for carrying out any type of the operation in memory 130.For example, processor 110 can be microprocessor, digital signal processor, microcontroller or any other processor.In one embodiment, processor 110 can not be to use specially memory 130, and processor 110 can be carried out the operation in memory 130, also can carry out other systemic-function.
Memory 130 can comprise the memory devices that addressable memory cell is provided, and wherein, Memory Controller 122 can be from described memory cell reading out data and/or to its data writing.Memory 130 can comprise the memory devices that one or more are dissimilar, for example, dynamic random access memory (DRAM) equipment, Synchronous Dynamic Random Access Memory (SDRAM) equipment, read-only memory (ROM) equipment or any other volatibility or nonvolatile memory (NVM) equipment.In another embodiment, can arrange memory 130 by passage (channel), arrangement (rank), group (bank), page or leaf (page) and row (column).
Computing equipment 100 can also comprise chipset 120.Chipset 120 can comprise one or more integrated antenna packages or chip, it can be coupled to processor 110 memory 130, basic input/output (BIOS) 140, one or more memory device 150 and other parts (for example, other I/O equipment of mouse, keyboard, Video Controller or computing equipment 100 etc.).Chipset 130 can receive affairs and affairs are distributed to processor 110 from processor 110 via processor bus.Memory Controller 122 can be distributed to memory 140 with affairs via memory bus.Chipset 130 can comprise can be via the BIOS interface 124 of bus 142 access BIOS 140.
In another embodiment, memory device 150 can store archive information, such as code, program, file, data, application program or operating system etc.The example of memory device 150 can comprise tape, hard disk (HD) driver, floppy disk, compact disk (CD) ROM, flash memory device, any other mass storage facility, any other magnetic-based storage media, any other optical storage media, any other non-volatile memory devices etc.Chipset 120 can comprise can be via one or more storage device interfaces 126 of bus 142 each memory device 150 of access.
Fig. 2 has illustrated the exemplary embodiment of hard disk 210.In one embodiment, hard disk 210 can be partitioned, to comprise the first hidden partition 212 and the second hidden partition 214 and one or more normal subregion 216.For example, the first hidden partition 212 can be main hidden partition, and it is used for storing file, user data or any out of Memory most important or secret concerning authorized user.The second hidden partition 214 can be the inferior hidden partition at running background.In one embodiment, the first hidden partition 212 can have identical size with the second hidden partition 214; Yet, in certain embodiments, can not need identical size.In one embodiment, the first hidden partition 212 and the second hidden partition 214 can be sightless or inaccessibles for undelegated software (for example, operating system).The content of the first hidden partition 212 can with the content synchronization of the second hidden partition 214.For example, in response to revise the first hidden partition 212 with authorization, can upgrade the content of the second hidden partition 214.
In one embodiment, Fig. 2 has illustrated the logic 240 that can manage the first hidden partition 212 and the second hidden partition 214.For example, the content of the first hidden partition 212 can be stored or revise to logic 240.Change or revise the content of the first hidden partition 212 in response to logic 240, logic 240 can be with the content of the first hidden partition 212 and the content synchronization of the second hidden partition 214, to upgrade the content of the second hidden partition 214.For example, logic 240 can be with the content replication of the modification of the first hidden partition 212 to the second hidden partition 214.In one embodiment, in response to logic 240 (for example, based on the instruction from authorized user) revise the content of the first hidden partition 212, the second hidden partition 214 can be upgraded or revise to logic 240, with the storage content identical with the content of having stored in the first hidden partition 212.
In one embodiment, the content of the first hidden partition 212 is invalid in response to the content of determining the second hidden partition 214 is effectively, and the content of the first hidden partition 212 can also be recovered or repair with the content of the second hidden partition 214 to logic 240.In another embodiment, logic 240 can similarly format the first hidden partition 212 and the second hidden partition 214; Yet, can not need so yet.In another embodiment, in response to the undelegated change of the first hidden partition 212, logic 240 can not change the content of the second hidden partition 214.For example, if the first hidden partition 212 revised undesirably or unexpectedly, for example by virus or by any unauthorized or loss of data or damage that Malware causes, logic 240 can correspondingly not change the content of the second hidden partition 214.
Logic 240 can be managed this two hidden partitions with key 230.In one embodiment, logic 240 can be come computation key 230 based on one content in two hidden partitions 212 and 214.In another embodiment, (for example revise the first hidden partition 212 in response to logic 240, increase, deletion or modification information), logic 240 can be revised the second hidden partition 214 and comes the value of new key more or generate new key based on the content of the modification of the first hidden partition 212 and/or the second hidden partition 214 based on the content of the modification of the first hidden partition 212.For example, can use one or more key schedules (for example, logical operation) that key 230 is provided.In another embodiment, if because by virus or by malice or the non-authorised software loss of data or the damage that cause, the content of the first hidden partition 212 is unnecessarily changed, logic 240 can not change the second hidden partition 214 or key 230 so.In another embodiment, in corrupted data or lose, or under situation by the attack of virus or Malware occured hidden partition, the value of key 230 can not mated with the first or second hidden partition.
In another embodiment, logic 240 can detect or verify based on key 230 validity of the content of arbitrary hidden partition.For example, whether logic 240 can detect in arbitrary hidden partition wrong.Whether the content that in another embodiment, can check the first hidden partition 212 and/or the second hidden partition 214 with key 230 is damaged in undelegated mode or change.In one embodiment, key 230 can be stored in the nonvolatile memory (NVM) 222, and it can be invisible or inaccessible to undelegated software (for example, operating system).With reference to figure 2, NVM 222 can be in-line memory equipment or can provide in system 220.In one embodiment, safety or embedded chip, embedded system or the trusted module platform (TMP) that can provide at mainboard can be provided the example of system 220.Although Fig. 2 has illustrated the embodiment of NVM 222, can also use other memory device, such as flash memory device, DRAM equipment, SDRAM equipment etc.In addition, although Fig. 2 shows the NVM222 that separates with hard disk 210 for storage key 230, in certain embodiments, key 230 can be stored in the hard disk 210, for example, and in normal subregion 216.
Fig. 3 illustrated can by logic 240 make management (for example, carry out hidden partition the damage inspection, be stored in information in the hidden partition or carry out the automatic reparation of hidden partition) example of the hidden partition 212 of Fig. 2 and 214 method.With reference to figure 3, in frame 302, from the instruction that is used for information is moved to from normal subregion 216 the first hidden partition 212 of authorized user, logic 240 can obtain to put into from normal subregion 216 information of the first hidden partition 212 in response to for example.In frame 304, logic 240 can be fetched key 230 from safe NVM 222.
In frame 306, can scan the first hidden partition 212, and can check the content of whether mating the first hidden partition 212 with the value of determining key 230 at rhombus 308 places.For example, can determine whether the value of key 230 mates the content of the first hidden partition 212 with the algorithm identical with the algorithm that generates key 230.If determine the current content that the value of key 230 is mated the first hidden partition 212, for example, if the modification to the mandate of the content of the first hidden partition 212 is arranged, the content that can determine so the first hidden partition 212 be effectively and flow process can proceed to frame 310.In frame 310, the information that obtains from normal subregion 216 in frame 302 can be stored into the first hidden partition 212.Then, in frame 312, can the first hidden partition 212 and the second hidden partition 214 is synchronous, can upgrade thus the second hidden partition 214 to be added on the information that obtains in the frame 302.
On the contrary, if change undelegated or that do not expect occurs in the first hidden partition 212, for example, because corrupted data or premeditated malice or undelegated software, the value of key 230 can remain unchanged so, therefore can not mate with the content of the first hidden partition 212.In another embodiment, if key 230 is damaged, the content of the first hidden partition 212 can not mated with the value of key 230 so.In response to determining that at rhombus 308 places the value of key 230 and the content of the first hidden partition 212 do not mate, the flow process of Fig. 3 can proceed to rhombus 314, in this similar inspection that can carry out value and second hidden partition 214 of key 230.With reference to figure 3, the content of mating the second hidden partition 214 in response to the value of in rhombus 314, determining key 230, its can show the content of the second hidden partition 214 be effectively and the content of the first hidden partition 212 may be invalid, flow process can proceed to frame 316, and the information that wherein obtains at frame 302 can be stored in the second hidden partition 214.In addition, in frame 318, logic 240 can synchronous the first hidden partition 212 with the second hidden partition 214 so that the content identical with the revised context of the second hidden partition 214 is stored in the first hidden partition 212.Thus, can repair based on the content of effective the second hidden partition 214 invalid content of the first hidden partition 212.
In another embodiment, can show that in not mating of rhombus 314 place's keys 230 and the second hidden partition 214 key 230 or the second hidden partition 214 also are invalid, or damaged, or changed undesirably.In one embodiment, in frame 320, can with key 230 and these two hidden partitions all unmatched event report to the user.In another embodiment, in frame 320, the content that the user can notified the first hidden partition 212 is different from the content of the second hidden partition 214.In another embodiment, can determine difference between two hidden partitions 212 and 214 by logic 240; Yet, in certain embodiments, can determine this difference by any other logic.In another embodiment, can be with difference report to the user.Unmatched any out of Memory that can will be referred between key and two hidden partitions in another embodiment, reports to the user.For example, the user can be for example to decide in two hidden partitions 212 and 214 which based on the difference between two hidden partitions be better.In another embodiment, the user can recover or repair the content in this better hidden partition.In another embodiment, logic 240 can be determined better hidden partition and recover the content of this better hidden partition.
In addition, in frame 322, the information that obtains in frame 302 can be stored in this better hidden partition of being repaired by the user.In frame 324, the better hidden partition of another hidden partition and this can be stored synchronously the content identical with better hidden partition.With reference to figure 3, in response to these two hidden partitions 212 and 214 synchronously, can be updated in by logic 240 value (frame 326) of the key 230 of storage among the NVM 222 based on the content of the modification of hidden partition 212 or 214.
Although the flow process of Fig. 3 is depicted as the sequence of operation, in certain embodiments, can carries out operation in the shown flow process with different orders.For example, can before being checked, carry out the first hidden partition 212 inspection to the second hidden partition.In addition, start inspection to the content of the first hidden partition 212 of Fig. 3 or the second hidden partition although in response to user expectation information is moved to hidden partition 212 and 214 from normal subregion 216, but in certain embodiments, can revise this flow process to be applied in any other situation, for example in response to the request or the instruction that are used for the content of hidden partition is increased, deletes or carry out any other modification.In another embodiment, can check in response to any other instruction of the content that relates to arbitrary hidden partition the content of arbitrary hidden partition, this instruction for example is used for maybe can accessing from the granted access instruction of hidden partition accessed content the instruction of the content of hidden partition.
For example, can revise frame 302, with in response to about information being increased to the user instruction of hidden partition 212, come from other memory cell or from user's acquired information.In another embodiment, can revise frame 302, with the information of deletion in hidden partition.In another embodiment, the part of the flow process of Fig. 3 (for example, rhombus 308 and 314) can be used for checking whether effective the content of hidden partition is.In one embodiment, can make up to carry out any method described herein by hardware, firmware, software (comprising microcode) or its.For example, storage medium can be stored instruction thereon, when carrying out described instruction by machine, produces the characteristic according to any embodiment described herein.Although the flow process of Fig. 3 can be come synchronous two hidden partitions in response to the modification of authorizing, but in certain embodiments, can change this flow process effectively to recover in response to the content of determining another hidden partition or to repair hidden partition damage or that changed by unauthorized.In another embodiment, can determine termly the first hidden partition 212 or the second hidden partition 214 whether with cipher key match.In another embodiment, if the content of the first hidden partition 212 is revised in the authorized user expectation, can carry out so definite.
In addition, although the embodiment of Fig. 1 and 2 is shown as the equipment that comprises some, some embodiment can be applied to the equipment of varying number.For example, in one embodiment, can use one or more hidden partitions and can correspondingly revise the flow process of Fig. 3.In certain embodiments, can provide a hidden partition.For example, damaged in response to the content of determining hidden partition, the user can recover or repair the hidden partition that damages.Although Fig. 3 shows logic 240, in certain embodiments, can make up actuating logic 240 by hardware, firmware, software (comprising microcode) or its.For example, can realize logic 240 by the software of storing at hard disk 210 or any other memory device.
Although described some feature of the present invention with reference to embodiment, this description is not intended to the meaning that is interpreted as limiting.The various modification of these embodiment and concerning those skilled in the art in the invention apparent other embodiments of the invention considered to be in the spirit and scope of the present invention.

Claims (20)

1. computing system comprises:
The first memory device, it comprises the first hidden partition and the second hidden partition; And
Be coupled to the logical block of described the first memory device, wherein, described logical block is used for: at described the second hidden partition storage second content identical with the first content of described the first hidden partition, generate key based on described first content, and the validity of verifying described first content based on described key.
2. system according to claim 1 comprises:
Be coupled to the second memory device of described logical block, it is used for storing described key, wherein, provides described the second memory device in embedded system.
3. system according to claim 1 comprises:
Be coupled to the second memory device of described logical block, it is used for storing described key, wherein, provides described the second memory device at safety chip.
4. it is characterized in that according to claim 2 or 3 described systems:
Described the second memory device comprises nonvolatile memory.
5. each described system in 3 according to claim 1, wherein, described logical block is used for revising described first content and upgrading the value of described key and at least one of described second content based on the first content of revising.
6. each described system in 3 according to claim 1, wherein, described logical block is used in response to definite described key and described first content does not mate and described key and described second content mate, with described second content and described first content synchronously to repair described first content.
7. each described system in 3 according to claim 1, wherein, described logical block is used for providing about unmatched information between described key and described the first hidden partition and described the second hidden partition.
8. system according to claim 1, wherein, described logical block is used for described key storage at the memory device of safety and access described key to verify the validity of described the first hidden partition.
9. method that is used for the management hidden partition comprises:
In the first memory device, provide the second hidden partition, with the storage second content synchronous with the first content of the first hidden partition of described the first memory device;
Key with described first content coupling is provided; And
In response to the modification to the mandate of the described first content of described the first hidden partition, upgrade described second content and the described key of described the second hidden partition based on the first content of revising.
10. method according to claim 9 comprises:
In response to the instruction of the described first content of access, detect described first content whether with described cipher key match;
In response to not mating between definite described first content and the described key, detect described second content whether with described cipher key match; And
In response to definite described second content and described cipher key match, with described first content and described second content synchronously to repair described first content.
11. method according to claim 9 comprises:
Determine described first content whether with described cipher key match;
In response to definite described first content and described cipher key match, determine described second content whether with described cipher key match; And
In response to not mating between definite described key and the described second content, recover described second content based on described first content.
12. method according to claim 9 comprises:
In response to definite described key and described first content coupling, determine that described first content is effective;
In response to not mating between definite described key and the described second content, effective described first content is copied to described the second hidden partition.
13. each described method in 12 according to claim 9 comprises:
In second memory device of described key storage on embedded chip.
14. method according to claim 9 comprises:
In response to the access instruction of the mandate of accessing described the first hidden partition, determine whether described key mates with described first content;
In response to definite described key and described first content coupling, access described the first hidden partition.
15. a method that is used for the management hidden partition comprises:
The first content of the first hidden partition of memory device is copied to the second hidden partition of described memory device to generate the second content synchronous with described first content;
Second content based on described the second hidden partition provides key; And
Do not mate in response to definite described first content and described key, described the first hidden partition and described the second hidden partition is synchronous.
16. method according to claim 15 also comprises:
Value coupling in response to the first content of determining described the first hidden partition and described key will be stored in from the information of normal subregion in described the first hidden partition;
Described the second hidden partition is synchronous with described the first hidden partition of having stored described information; And
Upgrade described key based on the synchronous second content of the process of described the second hidden partition.
17. method according to claim 15 also comprises:
Do not mate in response to the value of determining described key and the content of described two hidden partitions, determine the difference between the second content of described first content and described the second hidden partition, to recover described first content and described second content.
18. method according to claim 15 also comprises:
In response to the modification of the mandate on described the first hidden partition, upgrade the value of described key.
19. method according to claim 15 also comprises:
In response to the modification of the mandate on described the first hidden partition, upgrade the content of described the second hidden partition.
20. method according to claim 15 also comprises:
Determine described key whether with the second content coupling of described the second hidden partition; And
Do not mate in response to the described second content of determining described key and described the second hidden partition, repair the described second content of described the second hidden partition based on the described first content of described the first hidden partition.
CN200780053762.6A 2007-07-13 2007-07-13 Key based hidden partition system Expired - Fee Related CN101785239B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2007/002156 WO2009009921A1 (en) 2007-07-13 2007-07-13 Key based hidden partition system

Publications (2)

Publication Number Publication Date
CN101785239A CN101785239A (en) 2010-07-21
CN101785239B true CN101785239B (en) 2013-01-02

Family

ID=40259278

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200780053762.6A Expired - Fee Related CN101785239B (en) 2007-07-13 2007-07-13 Key based hidden partition system

Country Status (2)

Country Link
CN (1) CN101785239B (en)
WO (1) WO2009009921A1 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101760778B1 (en) 2011-01-17 2017-07-26 에스프린팅솔루션 주식회사 Computer system and method for updating program therein
CN103870762B (en) * 2012-12-18 2017-08-29 联想(北京)有限公司 Regional addressing method and electronic equipment
CN104424047A (en) * 2013-08-20 2015-03-18 研祥智能科技股份有限公司 NVRAM data recovery method and NVRAM data recovery device
US10037286B2 (en) 2014-08-26 2018-07-31 Red Hat, Inc. Private partition with hardware unlocking
CN104794024A (en) * 2015-04-15 2015-07-22 四川神琥科技有限公司 Data recovery method
CN104751076A (en) * 2015-04-15 2015-07-01 四川神琥科技有限公司 Method for recovering disk data
CN105302671A (en) * 2015-11-11 2016-02-03 中国建设银行股份有限公司 Automatic backup and rollback method and device
CN110059028A (en) * 2018-01-17 2019-07-26 瑞昱半导体股份有限公司 Data storage chip and data access method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1417689A (en) * 2001-11-08 2003-05-14 联想(北京)有限公司 Fixed disk data enciphering back-up and restoring method
JP3477949B2 (en) * 1995-10-19 2003-12-10 富士ゼロックス株式会社 Keyword management device
CN1877539A (en) * 2005-06-07 2006-12-13 英业达股份有限公司 Data backup/recovery system under cold start mode and implementing method therefor

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040268079A1 (en) * 2003-06-24 2004-12-30 International Business Machines Corporation Method and system for providing a secure rapid restore backup of a raid system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3477949B2 (en) * 1995-10-19 2003-12-10 富士ゼロックス株式会社 Keyword management device
CN1417689A (en) * 2001-11-08 2003-05-14 联想(北京)有限公司 Fixed disk data enciphering back-up and restoring method
CN1877539A (en) * 2005-06-07 2006-12-13 英业达股份有限公司 Data backup/recovery system under cold start mode and implementing method therefor

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JP特许第3477949B2 2003.12.10

Also Published As

Publication number Publication date
CN101785239A (en) 2010-07-21
WO2009009921A1 (en) 2009-01-22

Similar Documents

Publication Publication Date Title
CN101785239B (en) Key based hidden partition system
US9836606B2 (en) Secure recovery apparatus and method
US8943491B2 (en) Systems and methods for maintaining CRTM code
TWI471726B (en) Managing cache data and metadata
CN101710323B (en) Computer storage deduplication
CN110413205B (en) Method, apparatus and computer readable storage medium for writing to disk array
US20090193193A1 (en) Translation table coherency mecahanism using cache way and set index write buffers
US20050085222A1 (en) Software updating process for mobile devices
CN102473223B (en) Information processing device and information processing method
US20130276128A1 (en) Secure option rom firmware updates
CN105164657A (en) Selective backup of program data to non-volatile memory
CN101981550B (en) Database system, database update method, database, and database update program
CN102323930B (en) Mirroring data changes in a database system
US20070073907A1 (en) Device, method and computer program product readable medium for determining the identity of a component
CN105122261A (en) Recovering from compromised system boot code
US8751817B2 (en) Data processing apparatus and validity verification method
CN114222975A (en) Data preservation using memory aperture flush sequence
KR20200068345A (en) Method for updating Boot ROM of Embedded system and booting of thereof
JPWO2020075303A1 (en) Software verification device, software verification method and software verification program
CN101246429B (en) Electronic systems using flash memory modules as main storage and related system booting methods
US20100115004A1 (en) Backup system that stores boot data file of embedded system in different strorage sections and method thereof
US20100030992A1 (en) Initializing of a memory area
WO2018059565A1 (en) Method and system for backing up flash memory data
US8972745B2 (en) Secure data handling in a computer system
CN101336411A (en) Access control mechanism of computer system in pre-stage of OS operation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130102

Termination date: 20180713