CN102831031A - Recovery method and system for operating system - Google Patents
Recovery method and system for operating system Download PDFInfo
- Publication number
- CN102831031A CN102831031A CN201110163882XA CN201110163882A CN102831031A CN 102831031 A CN102831031 A CN 102831031A CN 201110163882X A CN201110163882X A CN 201110163882XA CN 201110163882 A CN201110163882 A CN 201110163882A CN 102831031 A CN102831031 A CN 102831031A
- Authority
- CN
- China
- Prior art keywords
- operating system
- recovery
- computing machine
- value
- standard encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Stored Programmes (AREA)
Abstract
The invention relates to a recovery method for an operating system, and the method comprises the following steps of: detection step: detecting whether the operating system is in a normal state or not when a computer is started and the a BIOS (Basic Input Output System) of the computer obtains a control right of the computer; and invoking step: invoking an operating system recovery software in the computer to recover the operating system when the operating system is not in the normal state. The invention further provides a recovery system for the operating system. According to the invention, the operating system recovery software can be automatically invoked to recover the operating system when the operating system is judged to be recovered.
Description
Technical field
The present invention relates to a kind of operating system recovery method and system, particularly a kind of operation system of computer restoration methods and system.
Background technology
Along with the popularization enhancing of computing machine, people also progressively strengthen the dependence of computing machine, and the capsule information of aspects such as increasing work and individual privacy are all stored on computers, supply the user that these capsule information are operated.But operation system of computer is collapsed because of instability sometimes.Existing a lot of operating system recovery software can utilize the system file recovery operation system of backup under the situation of the operating system of need not resetting.But these operating system recovery softwares all need be found could move through manually being provided with after the operating system collapse the user.The process of the manually opened operating system recovery software of user is very loaded down with trivial details, and the user also exactly the decision operation system whether need to recover.
Summary of the invention
In view of above content, be necessary to provide a kind of operating system recovery method, can be when judgement need the recovery operation system, call operation system recovery software recovers operating system automatically.
Also be necessary to provide a kind of operating system recovery system, can be when judgement need the recovery operation system, call operation system recovery software recovers operating system automatically.
A kind of operating system recovery method may further comprise the steps: detect step: work as computer starting, when the BIOS in this computing machine obtains the control of this computing machine, detect this operating system and whether be in normal condition; Invocation step: when this operating system was not in normal condition, the operating system recovery software that calls in the computing machine recovered this operating system.
A kind of operating system recovery system comprises: detection module, be used for working as computer starting, and when the BIOS in this computing machine obtains the control of this computing machine, detect this operating system and whether be in normal condition; Calling module is used for when this operating system is not in normal condition, and the operating system recovery software that calls in the computing machine recovers this operating system.
Compared to prior art, operating system recovery method and system of the present invention can be when judgement needs the recovery operation system, and call operation system recovery software recovers operating system automatically.
Description of drawings
Fig. 1 is the running environment figure of operating system recovery of the present invention system preferred embodiment.
Fig. 2 is the functional block diagram of operating system recovery of the present invention system preferred embodiment.
Fig. 3 is the process flow diagram of operating system recovery method of the present invention preferred embodiment.
The main element symbol description
Computing machine | 1 |
BIOS | 2 |
The operating |
20 |
Storer | 3 |
|
30 |
Operating system recovery software | 31 |
|
201 |
|
202 |
|
203 |
|
204 |
Following embodiment will combine above-mentioned accompanying drawing to further specify the present invention.
Embodiment
Consulting shown in Figure 1ly, is the running environment figure of operating system recovery of the present invention system preferred embodiment.
In the present embodiment, this operating system recovery system 20 (hereinafter to be referred as " recovery system 20 ") is embedded among the BIOS (Basic Input Output System, Basic Input or Output System (BIOS)) 2 of computing machine 1.This computing machine 1 also comprises storer 3.The operating system 30 of computing machine 1 is installed in this storer 3.Also comprise operating system recovery software 31 in this storer 3.This operating system recovery software 31 can back up operating system 30 when computing machine 1 start or shutdown automatically, also can back up operating system 30 according to being provided with of user.When needs recovery operation system 30, can also can come recovery operation system 30 by user's open operation system recovery software 31 recovery operation systems 30 by recovery system 20 call operation system recovery softwares 31.This operating system recovery software can be that a key recovers software.
Consulting shown in Figure 2ly, is the functional block diagram of operating system recovery of the present invention system preferred embodiment.This recovery system 20 comprises detection module 201, control module 202, reminding module 203 and calling module 204.
In the present embodiment; When operating system 30 is backed up; Detection module 201 all can be to system file packing carry out MD5 (the Message Digest Algorithm 5 relevant with operating system 30 normal operations; Message Digest Algorithm 5) calculates, obtain a standard MD5 value, and this standard MD5 value is deposited in the storer 3.If stored the standard MD5 value that obtains when last operating system 30 backs up in the storer 3, the standard MD5 value that obtains when then this operating system 30 backs up will cover and deposit the standard MD5 value in the storer 3 when last operating system 30 backs up in.
When computing machine 1 starts; When BIOS 2 obtained the control of computing machine 1,201 couples of system file packing carry out MD5s relevant with operating system 30 normal operations of detection module calculated, and obtain verification MD5 value; And with in this verification MD5 value and the storer 3 storage standard MD5 value compare; If this verification MD5 value is consistent with the standard MD5 value of storage in the storer 3, then explanation is not modified with the relevant system file of operating system 30 normal operations, and operating system 30 is in normal condition.If the standard MD5 value of storage is inconsistent in this verification MD5 value and the storer 3, then explanation is modified with the relevant system file of operating system 30 normal operations, and operating system 30 is not in normal condition.
Consulting shown in Figure 3ly, is the process flow diagram of operating system recovery method of the present invention preferred embodiment.
In the present embodiment, when operating system 30 backups, detection module 201 all calculates system file packing the carrying out MD5 relevant with operating system 30 normal operations, obtains a standard MD5 value, and this standard MD5 value is deposited in the storer 3.If stored the standard MD5 value that obtains when last operating system 30 backs up in the storer 3, the standard MD5 value that obtains when then this operating system 30 backs up will cover and deposit the standard MD5 value in the storer 3 when last operating system 30 backs up in.
Step S01, computing machine 1 starts, and BIOS 2 obtains the control of computing machine 1.
Step S02, whether detection module 201 detecting operation systems 30 are in normal condition.In the present embodiment; 201 couples of system file packing carry out MD5s relevant with operating system 30 normal operations of detection module calculate, and obtain verification MD5 value, and the standard MD5 value of storage in this verification MD5 value and the storer 3 is compared; If this verification MD5 value is consistent with the standard MD5 value of storage in the storer 3; Then explanation is not modified with the relevant system file of operating system 30 normal operations, and operating system 30 is in normal condition, execution in step S03.If the standard MD5 value of storage is inconsistent in this verification MD5 value and the storer 3, then explanation is modified with the relevant system file of operating system 30 normal operations, and operating system 30 is not in normal condition, execution in step S04.
Step S03, control module 202 is sent and is instructed to BIOS 2, makes BIOS 2 control operation systems 30 start process ends.
Step S04, reminding module 203 whether recovery operation systems of prompting user 30, and receive the affirmation information that the user imports, this confirmation has reflected whether the user confirms recovery operation system 30.If the user confirms recovery operation system 30, then get into step S05, if the user confirms not recovery operation system 30, then process ends.
Step S05,31 pairs of operating systems 30 of calling module 204 call operation system recovery softwares are recovered, and restart computing machine 1, return step S01.
In the present embodiment, 201 couples of system file packing carry out MD5s relevant with operating system 30 normal operations of detection module calculate, and obtain a standard MD5 value and verification MD5 value.Be appreciated that; In other embodiments; Detection module 201 also can utilize other AESs, like AES (Advanced Encryption Standard, Advanced Encryption Standard) algorithm; To carrying out computations, obtain a Standard Encryption value and verification secret value with the relevant system file packing of operating system 30 normal operations.Then; Detection module 201 compares the Standard Encryption value of storage in this verification secret value and the storer 3; If this verification secret value is consistent with the Standard Encryption value of storage in the storer 3; Then explanation is not modified with the relevant system file of operating system 30 normal operations, and operating system 30 is in normal condition.
Above embodiment is only unrestricted in order to technical scheme of the present invention to be described; Although the present invention is specified with reference to preferred embodiment; Those of ordinary skill in the art is to be understood that; Can make amendment or be equal to replacement technical scheme of the present invention, and not break away from the spirit and the scope of technical scheme of the present invention.
Claims (10)
1. an operating system recovery method is characterized in that, this method may further comprise the steps:
Detect step: work as computer starting, when the BIOS in this computing machine obtains the control of this computing machine, detect this operating system and whether be in normal condition;
Invocation step: when this operating system was not in normal condition, the operating system recovery software that calls in the computing machine recovered this operating system.
2. operating system recovery method as claimed in claim 1; It is characterized in that; This method also comprised calculation procedure before detecting step: when computing machine backs up this operating system; To carrying out computations, obtain the Standard Encryption value, and this Standard Encryption value is deposited in the storer of this computing machine with the relevant system file of the normal operation of this operating system.
3. operating system recovery method as claimed in claim 2; It is characterized in that; If the Standard Encryption value that has obtained when having stored last operating system backup in the storer, the Standard Encryption value when the Standard Encryption value that then obtains during this operating system backup covers last operating system backup.
4. operating system recovery method as claimed in claim 3 is characterized in that, said detection step comprises:
To carrying out computations, obtain the verification secret value with the relevant system file of the normal operation of this operating system;
The Standard Encryption value of storing in advance in this verification secret value and the storer is compared,, then detect operating system and be not in normal condition if this verification secret value and this Standard Encryption value are inconsistent.
5. operating system recovery method as claimed in claim 1 is characterized in that, when operating system is not in normal condition, and when receiving the affirmation information of recovery operation system of user's input, carries out said invocation step.
6. an operating system recovery system is characterized in that, this system comprises:
Detection module is used for working as computer starting, when the BIOS in this computing machine obtains the control of this computing machine, detects this operating system and whether is in normal condition;
Calling module is used for when this operating system is not in normal condition, and the operating system recovery software that calls in the computing machine recovers this operating system.
7. operating system recovery as claimed in claim 6 system; It is characterized in that; Said detection module also is used for when computing machine backs up this operating system; To carrying out computations, obtain the Standard Encryption value, and this Standard Encryption value is deposited in the storer of this computing machine with the relevant system file of the normal operation of this operating system.
8. operating system recovery as claimed in claim 7 system; It is characterized in that; If the Standard Encryption value that has obtained when having stored last operating system backup in the storer, the Standard Encryption value when the Standard Encryption value that then obtains during this operating system backup covers last operating system backup.
9. operating system recovery as claimed in claim 8 system; It is characterized in that; Said detection module pair carries out computations with the relevant system file of the normal operation of this operating system, obtains the verification secret value, and the Standard Encryption value of storing in advance in this verification secret value and the storer is compared; If this verification secret value and this Standard Encryption value are inconsistent, then detect operating system and be not in normal condition.
10. operating system recovery as claimed in claim 6 system; It is characterized in that; Said calling module is not when this operating system is in normal condition and receive the affirmation information of recovery operation system of user input, and the operating system recovery software that calls in the computing machine recovers this operating system.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110163882XA CN102831031A (en) | 2011-06-17 | 2011-06-17 | Recovery method and system for operating system |
TW100121784A TW201301017A (en) | 2011-06-17 | 2011-06-22 | Method and system for restoring operating system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110163882XA CN102831031A (en) | 2011-06-17 | 2011-06-17 | Recovery method and system for operating system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102831031A true CN102831031A (en) | 2012-12-19 |
Family
ID=47334180
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110163882XA Pending CN102831031A (en) | 2011-06-17 | 2011-06-17 | Recovery method and system for operating system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN102831031A (en) |
TW (1) | TW201301017A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104516791A (en) * | 2013-09-30 | 2015-04-15 | 贝壳网际(北京)安全技术有限公司 | Data processing method and device and electronic device |
CN104516787A (en) * | 2013-09-27 | 2015-04-15 | 联想(北京)有限公司 | Information processing method and electronic device |
CN104636217A (en) * | 2013-11-14 | 2015-05-20 | 厦门雅迅网络股份有限公司 | Root file system automatic backup and exception recovery method and partition structure |
WO2016062080A1 (en) * | 2014-10-21 | 2016-04-28 | 中兴通讯股份有限公司 | Profile protecting method and device, and storage medium |
CN107463466A (en) * | 2017-07-28 | 2017-12-12 | 苏州蓝越软件有限公司 | Software systems with recovery module |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108572886B (en) * | 2017-03-13 | 2022-11-04 | 鸿富锦精密工业(武汉)有限公司 | Operating system recovery circuit |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1530835A (en) * | 2003-03-10 | 2004-09-22 | 联想(北京)有限公司 | Method for detecting computer operating system normal start |
CN1598792A (en) * | 2003-09-15 | 2005-03-23 | 联想(北京)有限公司 | Safety repair method of computer operation system |
US20070011493A1 (en) * | 2003-05-06 | 2007-01-11 | Lenovo (Beijing) Limited | Method for renovating the computer operating system |
CN102081539A (en) * | 2011-01-12 | 2011-06-01 | 苏州汉辰数字多媒体有限公司 | Reliable software upgrade method for dual-mode terminal |
-
2011
- 2011-06-17 CN CN201110163882XA patent/CN102831031A/en active Pending
- 2011-06-22 TW TW100121784A patent/TW201301017A/en unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1530835A (en) * | 2003-03-10 | 2004-09-22 | 联想(北京)有限公司 | Method for detecting computer operating system normal start |
US20070011493A1 (en) * | 2003-05-06 | 2007-01-11 | Lenovo (Beijing) Limited | Method for renovating the computer operating system |
CN1598792A (en) * | 2003-09-15 | 2005-03-23 | 联想(北京)有限公司 | Safety repair method of computer operation system |
CN102081539A (en) * | 2011-01-12 | 2011-06-01 | 苏州汉辰数字多媒体有限公司 | Reliable software upgrade method for dual-mode terminal |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104516787A (en) * | 2013-09-27 | 2015-04-15 | 联想(北京)有限公司 | Information processing method and electronic device |
CN104516791A (en) * | 2013-09-30 | 2015-04-15 | 贝壳网际(北京)安全技术有限公司 | Data processing method and device and electronic device |
CN104636217A (en) * | 2013-11-14 | 2015-05-20 | 厦门雅迅网络股份有限公司 | Root file system automatic backup and exception recovery method and partition structure |
CN104636217B (en) * | 2013-11-14 | 2018-11-20 | 厦门雅迅网络股份有限公司 | A kind of root file system automated back-up and abnormal restoring method and partitioned organization |
WO2016062080A1 (en) * | 2014-10-21 | 2016-04-28 | 中兴通讯股份有限公司 | Profile protecting method and device, and storage medium |
CN105590065A (en) * | 2014-10-21 | 2016-05-18 | 中兴通讯股份有限公司 | Method and apparatus for protecting preset files |
CN105590065B (en) * | 2014-10-21 | 2020-07-31 | 南京中兴新软件有限责任公司 | Method and device for protecting preset file |
CN107463466A (en) * | 2017-07-28 | 2017-12-12 | 苏州蓝越软件有限公司 | Software systems with recovery module |
Also Published As
Publication number | Publication date |
---|---|
TW201301017A (en) | 2013-01-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102831031A (en) | Recovery method and system for operating system | |
TWI570552B (en) | Method, device, and machine-readable medium for self-managed processing | |
CN100504899C (en) | Software watchdog system and method | |
CN109325349A (en) | A kind of method for managing security, terminal device and computer readable storage medium | |
CN102650944A (en) | Operation system security bootstrap device and bootstrap device | |
WO2011143852A1 (en) | Managing method, device and terminal for application program | |
CN105825131A (en) | Computer security startup protection method on basis of UEFI (Unified Extensible Firmware Interface) | |
KR101369251B1 (en) | Apparatus, method, terminal and system for recovery protection of system files | |
CN108549550A (en) | A kind of hard disk hanging method and device | |
CN107943501A (en) | Embedded device upgrade method, device, computer equipment and storage medium | |
CN107967193A (en) | Boot starts method and embedded device | |
CN110990124A (en) | Cloud host recovery method and device | |
EP2194479A1 (en) | Data protecting method and computing apparatus | |
CN103049343A (en) | Method and device for restoring operating system blue screen | |
CN103902401B (en) | Virtual machine fault-tolerance approach and device based on monitoring | |
CN107657170B (en) | Trusted loading starting control system and method supporting intelligent repair | |
CN101340675A (en) | Method and apparatus for implementing backup and recovery by mobile terminal | |
WO2024113683A1 (en) | Flash device switching method and apparatus, computer device, and storage medium | |
CN112258137A (en) | Mail blocking method and device | |
CN100520796C (en) | Computer safety proxy self-guard method | |
CN1272717C (en) | Safety repair method of computer operation system | |
CN109829318A (en) | A kind of encrypted backup processing method and processing device of file | |
CN102902913A (en) | Preservation method for preventing software in computer from being damaged maliciously | |
CN114443356A (en) | Container cluster processing method and system | |
CN113986450A (en) | Virtual machine backup method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20121219 |