CN101789056A - Setting method for computer system - Google Patents
Setting method for computer system Download PDFInfo
- Publication number
- CN101789056A CN101789056A CN 200910006062 CN200910006062A CN101789056A CN 101789056 A CN101789056 A CN 101789056A CN 200910006062 CN200910006062 CN 200910006062 CN 200910006062 A CN200910006062 A CN 200910006062A CN 101789056 A CN101789056 A CN 101789056A
- Authority
- CN
- China
- Prior art keywords
- computer system
- hard disk
- virtual hard
- setting method
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention relates to a setting method for a computer system in order to set the computer system. The setting method comprises the following steps: snap-shooting the computer system so as to generate a database snapshot set of the computer system; storing the database snapshot set in a virtual hard disk; and installing the virtual hard disk to the computer system. As a result, a user can operate the computer system through the database snapshot set stored by the virtual hard disk.
Description
Technical field
The invention relates to a kind of computer system, and particularly relevant for a kind of establishing method of computer system.
Background technology
Thin Client (Thin Client) is to utilize the computer hardware (as not containing hard disk, CD ...) of comparatively simplifying, and allows enterprise staff carry out operational work.The server end operation is all transferred in the main computing work of Thin Client, so the speed requirement of Thin Client is harsh not as personal computer usually, so power consumption is lower than personal computer, can reduce the electricity charge expenditure of enterprise.
On the other hand, because information management system (management information system) is easy to the keyholed back plate Thin Client, thereby helpful to the enterprise network general safety.In addition, the performed application software of Thin Client all is installed on the server, carries out application software by server, so Thin Client do not need install software, can avoid the employee that the doubt of illegal software is installed voluntarily.
Because Thin Client is to carry out keyholed back plate by information management system, general user can't also can't possess the data of oneself according to oneself need set Thin Client.For example, the user can't stipulate the display packing of window on the Thin Client according to the needs of oneself, also the favorite browser of oneself can't be installed on Thin Client, and must use existing window and web browser on the Thin Client, cause many inconvenience.
Summary of the invention
Therefore a purpose of the present invention is to provide a kind of setting method for computer system, and the user can be set computer system, and the data of accessing computer system can guarantee that the data in the computer system can not leak simultaneously again.
To achieve these goals, according to one embodiment of the invention, the invention provides a kind of setting method for computer system, in order to a computer system is set, the method is that computer system is carried out snapshot (snapshot), to produce a database snapshot collection of computer system.Then the database snapshot collection is stored to virtual hard disk, then with the virtual hard disk carry to computer system.Whereby, the user can see through the stored database snapshot collection operational computations machine system of virtual hard disk.
According to the foregoing description, setting method for computer system is the virtual hard disk that the contained data of computer system is copied to encryption, and the user then can see through the data that this virtual hard disk of encrypting comes the accessing computer system, or the setting computer system.Because virtual hard disk is encrypted, can not leak so can guarantee the data on the computer system.
Description of drawings
For above and other objects of the present invention, feature, advantage and embodiment can be become apparent, appended the description of the drawings is as follows:
Fig. 1 is the setting method for computer system process flow diagram that illustrates an embodiment of the present invention;
Fig. 2 is the setting method for computer system process flow diagram that illustrates another embodiment of the present invention.
[primary clustering symbol description]
101~105: step 201~213: step
Embodiment
The setting method for computer system of following embodiment is copied to encrypted virtual hard disk with computer system data, and the user can see through data or the setting computer system that this virtual hard disk of encrypting comes the accessing computer system.Because virtual hard disk is encrypted, can not leak so can guarantee the data on the computer system.
Please refer to Fig. 1, it is the setting method for computer system process flow diagram that illustrates an embodiment of the present invention.Setting method for computer system is set a computer system, and the method is at first carried out snapshot (snapshot) to computer system, produces the database snapshot collection (step 101) of computer system.The function of snapshot collection is taking present " photo " for computer system.The snapshot collection that the different time sets up, representation database is in " appearance " of different time.So can obtain the content of computer system from the snapshot set of each time at certain time point.
The snapshot collection is to use the technology of copy-on-write, when database when the A time point is set up the snapshot collection, server can earlier be set up sparse file (Sparse File) for this database.Suppose after the A time point that change for the first time will take place the content of database page, server just can duplicate the data of this page or leaf a sparse file that arrives earlier, just the content of change can be write this page or leaf then.
After setting up the database snapshot collection, then the database snapshot collection is stored to virtual hard disk (step 103), and with virtual hard disk carry (Mount) to computer system (step 105).When carry was not to computer system, virtual hard disk only was a file at virtual hard disk, and carry just becomes a disk to computer system.Because carry needs password,, can prevent that the data in the virtual hard disk from leaking so the effect of encrypting virtual hard disk is arranged.After the virtual hard disk carry was finished, the user just can see through the stored database snapshot collection of virtual hard disk and come operational computations machine system.
Be used for the password of virtual hard disk carry to computer system can be provided by the computer system of enterprises, the password that can provide this to be used for encrypting for example by the Thin Client (Thin Client) of enterprises, and this password is stored in computer system, make computer system can decipher data on the virtual hard disk.Thus, even the user is linked to computer equipment outside the enterprise with virtual hard disk, also can deciphers, and can't decipher the contained data of virtual hard disk, and then prevent that the data of enterprises from leaking in default of password.
Please refer to Fig. 2, it illustrates the setting method for computer system process flow diagram of another embodiment of the present invention.Setting method for computer system is set a computer system, the method at first provides a null file (step 201), and with this null file formation virtual hard disk (step 203), wherein this null file can be provided by universal sequence bus unit, and this null file is to take the whole storage area of virtual hard disk.For example can use the null file that equates with carry-on dish storage volume in the carry-on dish of USB, form virtual hard disk (for example, if the dish capacity is 1G with oneself, then the size of null file also is 1G).
Since null file can after step in encrypted, need the password on the computer system to decipher; On the other hand, this null file takes whole virtual hard disk, in other words, except this null file, virtual hard disk can't store other data again, therefore the user can't be with the not encrypted zone to the virtual hard disk of the data storing in the computer system, and then unloading can guarantee so that to other computer equipment computer data can not leak.
Form after the virtual hard disk, then can be according to this virtual hard disk (step 205) of password encryption that computer system provided.In order to prevent that user's (for example enterprise staff) is downloaded to virtual hard disk with data, then with the data on the virtual hard disk again unloading to computing machine that nonbusiness had, cause computer system data to leak, therefore must encrypt virtual hard disk, for example computer system contained ascii text file or radix two computer file be encrypted.When encrypting, usually can be with file content according to the password recompile, re-use the file content that same password will encode during deciphering and be reduced into original apperance.
After virtual hard disk is encrypted, then computer system is carried out snapshot (snapshot), produce the database snapshot collection (step 207) of computer system, then the database snapshot collection be stored to virtual hard disk (step 209), and with the virtual hard disk carry to computer system (step 211).After carry is finished, the user can edit the stored database snapshot collection of virtual hard disk, with operational computations machine system (step 213), for example can edit the stored database snapshot collection of virtual hard disk, come the window display mode in the setting computer system.Because being used for the password of encryption and decryption virtual hard disk in the step 205 is stored in computer system, therefore need be connected the data that just can decipher on the virtual hard disk with computer system, so even if the user is linked to virtual hard disk the computer equipment of enterprise outside, also can decipher in default of password, and can't read data in the virtual hard disk, can prevent that just the data of enterprises from leaking.
According to the foregoing description, setting method for computer system is copied to the virtual hard disk of encryption with computer system data, and the user then can see through data or the setting computer system that this virtual hard disk of encrypting come the accessing computer system.Because virtual hard disk is encrypted, can not leak so can guarantee the data on the computer system.
Though the present invention discloses as above with embodiment; right its is not in order to limit the present invention; any the persond having ordinary knowledge in the technical field of the present invention; without departing from the spirit and scope of the present invention; when can being used for a variety of modifications and variations, so protection scope of the present invention is when being as the criterion with the scope that claims were defined.
Claims (8)
1. a setting method for computer system so that a computer system is set, is characterized in that, comprises:
This computer system is carried out snapshot, to produce a database snapshot collection of this computer system;
This database snapshot collection is stored to a virtual hard disk; And
To this computer system, whereby, a user can see through this stored database snapshot collection of this virtual hard disk and operate this computer system with this virtual hard disk carry.
2. setting method for computer system according to claim 1 is characterized in that, also comprises according to this virtual hard disk of a password encryption.
3. setting method for computer system according to claim 2 is characterized in that, this password is to be provided by this computer system, and is stored in this computer system.
4. setting method for computer system according to claim 1 is characterized in that, also comprises:
One null file is provided; And
Form this virtual hard disk with this null file.
5. setting method for computer system according to claim 4 is characterized in that, this null file is to be provided by a universal sequence bus unit.
6. setting method for computer system according to claim 4 is characterized in that this null file takes the storage area of this virtual hard disk.
7. setting method for computer system according to claim 1 is characterized in that, also comprises this stored database snapshot collection of this virtual hard disk is edited, to operate this computer system.
8. setting method for computer system according to claim 1 is characterized in that, this computer system is a Thin Client system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200910006062 CN101789056A (en) | 2009-01-22 | 2009-01-22 | Setting method for computer system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200910006062 CN101789056A (en) | 2009-01-22 | 2009-01-22 | Setting method for computer system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101789056A true CN101789056A (en) | 2010-07-28 |
Family
ID=42532265
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200910006062 Pending CN101789056A (en) | 2009-01-22 | 2009-01-22 | Setting method for computer system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101789056A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103365743A (en) * | 2012-03-29 | 2013-10-23 | 国际商业机器公司 | Method and system for treating snapshot in computing environment |
-
2009
- 2009-01-22 CN CN 200910006062 patent/CN101789056A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103365743A (en) * | 2012-03-29 | 2013-10-23 | 国际商业机器公司 | Method and system for treating snapshot in computing environment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10140370B1 (en) | Systems and methods for maintaining encrypted search indexes on third-party storage systems | |
AU2012347883B2 (en) | System and method for restoring application data | |
US11487885B2 (en) | Enabling and validating data encryption | |
US20140156588A1 (en) | Systems and methods for performing customized large-scale data analytics | |
CN100437618C (en) | Portable information safety device | |
TW201638798A (en) | Database server and client for query processing on encrypted data | |
CN104160407A (en) | Using storage controller bus interfaces to secure data transfer between storage devices and hosts | |
CN102855452A (en) | Method for following quick data encryption strategy based on encryption piece | |
CN101960442B (en) | Method and apparatus for inputting/outputting data using virtualization technique | |
CN103488954A (en) | File encryption system | |
CN103488919A (en) | Protection method and device for executable programs | |
JP3528701B2 (en) | Security management system | |
CN104361297B (en) | A kind of file encryption-decryption method based on (SuSE) Linux OS | |
CN103049705B (en) | A kind of based on virtualized method for secure storing, terminal and system | |
CN100595739C (en) | Method and system for accessing finance data | |
CN101447009A (en) | Method, device and system for installing software | |
CN116680715A (en) | Database encryption configuration method and device, electronic equipment and storage medium | |
CN104463510A (en) | Finance management system | |
CN104679781A (en) | Data fuzzy processing method and device | |
CN101789056A (en) | Setting method for computer system | |
CN109902453A (en) | A kind of software enciphering method | |
US10019383B2 (en) | Rotatable-key encrypted volumes in a multi-tier disk partition system | |
CN104036201A (en) | Application-layer file hiding method on Windows operating system | |
CN201662809U (en) | Data encryption and decryption conversion device | |
CN103795796B (en) | A kind of file forces centralized management method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20100728 |