CN101789056A - Setting method for computer system - Google Patents

Setting method for computer system Download PDF

Info

Publication number
CN101789056A
CN101789056A CN 200910006062 CN200910006062A CN101789056A CN 101789056 A CN101789056 A CN 101789056A CN 200910006062 CN200910006062 CN 200910006062 CN 200910006062 A CN200910006062 A CN 200910006062A CN 101789056 A CN101789056 A CN 101789056A
Authority
CN
China
Prior art keywords
computer system
hard disk
virtual hard
setting method
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200910006062
Other languages
Chinese (zh)
Inventor
孙佑良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inventec Corp
Original Assignee
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Corp filed Critical Inventec Corp
Priority to CN 200910006062 priority Critical patent/CN101789056A/en
Publication of CN101789056A publication Critical patent/CN101789056A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to a setting method for a computer system in order to set the computer system. The setting method comprises the following steps: snap-shooting the computer system so as to generate a database snapshot set of the computer system; storing the database snapshot set in a virtual hard disk; and installing the virtual hard disk to the computer system. As a result, a user can operate the computer system through the database snapshot set stored by the virtual hard disk.

Description

Setting method for computer system
Technical field
The invention relates to a kind of computer system, and particularly relevant for a kind of establishing method of computer system.
Background technology
Thin Client (Thin Client) is to utilize the computer hardware (as not containing hard disk, CD ...) of comparatively simplifying, and allows enterprise staff carry out operational work.The server end operation is all transferred in the main computing work of Thin Client, so the speed requirement of Thin Client is harsh not as personal computer usually, so power consumption is lower than personal computer, can reduce the electricity charge expenditure of enterprise.
On the other hand, because information management system (management information system) is easy to the keyholed back plate Thin Client, thereby helpful to the enterprise network general safety.In addition, the performed application software of Thin Client all is installed on the server, carries out application software by server, so Thin Client do not need install software, can avoid the employee that the doubt of illegal software is installed voluntarily.
Because Thin Client is to carry out keyholed back plate by information management system, general user can't also can't possess the data of oneself according to oneself need set Thin Client.For example, the user can't stipulate the display packing of window on the Thin Client according to the needs of oneself, also the favorite browser of oneself can't be installed on Thin Client, and must use existing window and web browser on the Thin Client, cause many inconvenience.
Summary of the invention
Therefore a purpose of the present invention is to provide a kind of setting method for computer system, and the user can be set computer system, and the data of accessing computer system can guarantee that the data in the computer system can not leak simultaneously again.
To achieve these goals, according to one embodiment of the invention, the invention provides a kind of setting method for computer system, in order to a computer system is set, the method is that computer system is carried out snapshot (snapshot), to produce a database snapshot collection of computer system.Then the database snapshot collection is stored to virtual hard disk, then with the virtual hard disk carry to computer system.Whereby, the user can see through the stored database snapshot collection operational computations machine system of virtual hard disk.
According to the foregoing description, setting method for computer system is the virtual hard disk that the contained data of computer system is copied to encryption, and the user then can see through the data that this virtual hard disk of encrypting comes the accessing computer system, or the setting computer system.Because virtual hard disk is encrypted, can not leak so can guarantee the data on the computer system.
Description of drawings
For above and other objects of the present invention, feature, advantage and embodiment can be become apparent, appended the description of the drawings is as follows:
Fig. 1 is the setting method for computer system process flow diagram that illustrates an embodiment of the present invention;
Fig. 2 is the setting method for computer system process flow diagram that illustrates another embodiment of the present invention.
[primary clustering symbol description]
101~105: step 201~213: step
Embodiment
The setting method for computer system of following embodiment is copied to encrypted virtual hard disk with computer system data, and the user can see through data or the setting computer system that this virtual hard disk of encrypting comes the accessing computer system.Because virtual hard disk is encrypted, can not leak so can guarantee the data on the computer system.
Please refer to Fig. 1, it is the setting method for computer system process flow diagram that illustrates an embodiment of the present invention.Setting method for computer system is set a computer system, and the method is at first carried out snapshot (snapshot) to computer system, produces the database snapshot collection (step 101) of computer system.The function of snapshot collection is taking present " photo " for computer system.The snapshot collection that the different time sets up, representation database is in " appearance " of different time.So can obtain the content of computer system from the snapshot set of each time at certain time point.
The snapshot collection is to use the technology of copy-on-write, when database when the A time point is set up the snapshot collection, server can earlier be set up sparse file (Sparse File) for this database.Suppose after the A time point that change for the first time will take place the content of database page, server just can duplicate the data of this page or leaf a sparse file that arrives earlier, just the content of change can be write this page or leaf then.
After setting up the database snapshot collection, then the database snapshot collection is stored to virtual hard disk (step 103), and with virtual hard disk carry (Mount) to computer system (step 105).When carry was not to computer system, virtual hard disk only was a file at virtual hard disk, and carry just becomes a disk to computer system.Because carry needs password,, can prevent that the data in the virtual hard disk from leaking so the effect of encrypting virtual hard disk is arranged.After the virtual hard disk carry was finished, the user just can see through the stored database snapshot collection of virtual hard disk and come operational computations machine system.
Be used for the password of virtual hard disk carry to computer system can be provided by the computer system of enterprises, the password that can provide this to be used for encrypting for example by the Thin Client (Thin Client) of enterprises, and this password is stored in computer system, make computer system can decipher data on the virtual hard disk.Thus, even the user is linked to computer equipment outside the enterprise with virtual hard disk, also can deciphers, and can't decipher the contained data of virtual hard disk, and then prevent that the data of enterprises from leaking in default of password.
Please refer to Fig. 2, it illustrates the setting method for computer system process flow diagram of another embodiment of the present invention.Setting method for computer system is set a computer system, the method at first provides a null file (step 201), and with this null file formation virtual hard disk (step 203), wherein this null file can be provided by universal sequence bus unit, and this null file is to take the whole storage area of virtual hard disk.For example can use the null file that equates with carry-on dish storage volume in the carry-on dish of USB, form virtual hard disk (for example, if the dish capacity is 1G with oneself, then the size of null file also is 1G).
Since null file can after step in encrypted, need the password on the computer system to decipher; On the other hand, this null file takes whole virtual hard disk, in other words, except this null file, virtual hard disk can't store other data again, therefore the user can't be with the not encrypted zone to the virtual hard disk of the data storing in the computer system, and then unloading can guarantee so that to other computer equipment computer data can not leak.
Form after the virtual hard disk, then can be according to this virtual hard disk (step 205) of password encryption that computer system provided.In order to prevent that user's (for example enterprise staff) is downloaded to virtual hard disk with data, then with the data on the virtual hard disk again unloading to computing machine that nonbusiness had, cause computer system data to leak, therefore must encrypt virtual hard disk, for example computer system contained ascii text file or radix two computer file be encrypted.When encrypting, usually can be with file content according to the password recompile, re-use the file content that same password will encode during deciphering and be reduced into original apperance.
After virtual hard disk is encrypted, then computer system is carried out snapshot (snapshot), produce the database snapshot collection (step 207) of computer system, then the database snapshot collection be stored to virtual hard disk (step 209), and with the virtual hard disk carry to computer system (step 211).After carry is finished, the user can edit the stored database snapshot collection of virtual hard disk, with operational computations machine system (step 213), for example can edit the stored database snapshot collection of virtual hard disk, come the window display mode in the setting computer system.Because being used for the password of encryption and decryption virtual hard disk in the step 205 is stored in computer system, therefore need be connected the data that just can decipher on the virtual hard disk with computer system, so even if the user is linked to virtual hard disk the computer equipment of enterprise outside, also can decipher in default of password, and can't read data in the virtual hard disk, can prevent that just the data of enterprises from leaking.
According to the foregoing description, setting method for computer system is copied to the virtual hard disk of encryption with computer system data, and the user then can see through data or the setting computer system that this virtual hard disk of encrypting come the accessing computer system.Because virtual hard disk is encrypted, can not leak so can guarantee the data on the computer system.
Though the present invention discloses as above with embodiment; right its is not in order to limit the present invention; any the persond having ordinary knowledge in the technical field of the present invention; without departing from the spirit and scope of the present invention; when can being used for a variety of modifications and variations, so protection scope of the present invention is when being as the criterion with the scope that claims were defined.

Claims (8)

1. a setting method for computer system so that a computer system is set, is characterized in that, comprises:
This computer system is carried out snapshot, to produce a database snapshot collection of this computer system;
This database snapshot collection is stored to a virtual hard disk; And
To this computer system, whereby, a user can see through this stored database snapshot collection of this virtual hard disk and operate this computer system with this virtual hard disk carry.
2. setting method for computer system according to claim 1 is characterized in that, also comprises according to this virtual hard disk of a password encryption.
3. setting method for computer system according to claim 2 is characterized in that, this password is to be provided by this computer system, and is stored in this computer system.
4. setting method for computer system according to claim 1 is characterized in that, also comprises:
One null file is provided; And
Form this virtual hard disk with this null file.
5. setting method for computer system according to claim 4 is characterized in that, this null file is to be provided by a universal sequence bus unit.
6. setting method for computer system according to claim 4 is characterized in that this null file takes the storage area of this virtual hard disk.
7. setting method for computer system according to claim 1 is characterized in that, also comprises this stored database snapshot collection of this virtual hard disk is edited, to operate this computer system.
8. setting method for computer system according to claim 1 is characterized in that, this computer system is a Thin Client system.
CN 200910006062 2009-01-22 2009-01-22 Setting method for computer system Pending CN101789056A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200910006062 CN101789056A (en) 2009-01-22 2009-01-22 Setting method for computer system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200910006062 CN101789056A (en) 2009-01-22 2009-01-22 Setting method for computer system

Publications (1)

Publication Number Publication Date
CN101789056A true CN101789056A (en) 2010-07-28

Family

ID=42532265

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200910006062 Pending CN101789056A (en) 2009-01-22 2009-01-22 Setting method for computer system

Country Status (1)

Country Link
CN (1) CN101789056A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103365743A (en) * 2012-03-29 2013-10-23 国际商业机器公司 Method and system for treating snapshot in computing environment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103365743A (en) * 2012-03-29 2013-10-23 国际商业机器公司 Method and system for treating snapshot in computing environment

Similar Documents

Publication Publication Date Title
US10140370B1 (en) Systems and methods for maintaining encrypted search indexes on third-party storage systems
AU2012347883B2 (en) System and method for restoring application data
US11487885B2 (en) Enabling and validating data encryption
US20140156588A1 (en) Systems and methods for performing customized large-scale data analytics
CN100437618C (en) Portable information safety device
TW201638798A (en) Database server and client for query processing on encrypted data
CN104160407A (en) Using storage controller bus interfaces to secure data transfer between storage devices and hosts
CN102855452A (en) Method for following quick data encryption strategy based on encryption piece
CN101960442B (en) Method and apparatus for inputting/outputting data using virtualization technique
CN103488954A (en) File encryption system
CN103488919A (en) Protection method and device for executable programs
JP3528701B2 (en) Security management system
CN104361297B (en) A kind of file encryption-decryption method based on (SuSE) Linux OS
CN103049705B (en) A kind of based on virtualized method for secure storing, terminal and system
CN100595739C (en) Method and system for accessing finance data
CN101447009A (en) Method, device and system for installing software
CN116680715A (en) Database encryption configuration method and device, electronic equipment and storage medium
CN104463510A (en) Finance management system
CN104679781A (en) Data fuzzy processing method and device
CN101789056A (en) Setting method for computer system
CN109902453A (en) A kind of software enciphering method
US10019383B2 (en) Rotatable-key encrypted volumes in a multi-tier disk partition system
CN104036201A (en) Application-layer file hiding method on Windows operating system
CN201662809U (en) Data encryption and decryption conversion device
CN103795796B (en) A kind of file forces centralized management method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20100728