CN102831031A - Recovery method and system for operating system - Google Patents

Recovery method and system for operating system Download PDF

Info

Publication number
CN102831031A
CN102831031A CN201110163882XA CN201110163882A CN102831031A CN 102831031 A CN102831031 A CN 102831031A CN 201110163882X A CN201110163882X A CN 201110163882XA CN 201110163882 A CN201110163882 A CN 201110163882A CN 102831031 A CN102831031 A CN 102831031A
Authority
CN
China
Prior art keywords
operating system
recovery
computing machine
value
standard encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201110163882XA
Other languages
Chinese (zh)
Inventor
沈悦华
任凡
余小光
姜维
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hongfujin Precision Industry Shenzhen Co Ltd
Hon Hai Precision Industry Co Ltd
Original Assignee
Hongfujin Precision Industry Shenzhen Co Ltd
Hon Hai Precision Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hongfujin Precision Industry Shenzhen Co Ltd, Hon Hai Precision Industry Co Ltd filed Critical Hongfujin Precision Industry Shenzhen Co Ltd
Priority to CN201110163882XA priority Critical patent/CN102831031A/en
Priority to TW100121784A priority patent/TW201301017A/en
Publication of CN102831031A publication Critical patent/CN102831031A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Stored Programmes (AREA)

Abstract

The invention relates to a recovery method for an operating system, and the method comprises the following steps of: detection step: detecting whether the operating system is in a normal state or not when a computer is started and the a BIOS (Basic Input Output System) of the computer obtains a control right of the computer; and invoking step: invoking an operating system recovery software in the computer to recover the operating system when the operating system is not in the normal state. The invention further provides a recovery system for the operating system. According to the invention, the operating system recovery software can be automatically invoked to recover the operating system when the operating system is judged to be recovered.

Description

The operating system recovery method and system
Technical field
The present invention relates to a kind of operating system recovery method and system, particularly a kind of operation system of computer restoration methods and system.
Background technology
Along with the popularization enhancing of computing machine, people also progressively strengthen the dependence of computing machine, and the capsule information of aspects such as increasing work and individual privacy are all stored on computers, supply the user that these capsule information are operated.But operation system of computer is collapsed because of instability sometimes.Existing a lot of operating system recovery software can utilize the system file recovery operation system of backup under the situation of the operating system of need not resetting.But these operating system recovery softwares all need be found could move through manually being provided with after the operating system collapse the user.The process of the manually opened operating system recovery software of user is very loaded down with trivial details, and the user also exactly the decision operation system whether need to recover.
Summary of the invention
In view of above content, be necessary to provide a kind of operating system recovery method, can be when judgement need the recovery operation system, call operation system recovery software recovers operating system automatically.
Also be necessary to provide a kind of operating system recovery system, can be when judgement need the recovery operation system, call operation system recovery software recovers operating system automatically.
A kind of operating system recovery method may further comprise the steps: detect step: work as computer starting, when the BIOS in this computing machine obtains the control of this computing machine, detect this operating system and whether be in normal condition; Invocation step: when this operating system was not in normal condition, the operating system recovery software that calls in the computing machine recovered this operating system.
A kind of operating system recovery system comprises: detection module, be used for working as computer starting, and when the BIOS in this computing machine obtains the control of this computing machine, detect this operating system and whether be in normal condition; Calling module is used for when this operating system is not in normal condition, and the operating system recovery software that calls in the computing machine recovers this operating system.
Compared to prior art, operating system recovery method and system of the present invention can be when judgement needs the recovery operation system, and call operation system recovery software recovers operating system automatically.
Description of drawings
Fig. 1 is the running environment figure of operating system recovery of the present invention system preferred embodiment.
Fig. 2 is the functional block diagram of operating system recovery of the present invention system preferred embodiment.
Fig. 3 is the process flow diagram of operating system recovery method of the present invention preferred embodiment.
The main element symbol description
Computing machine 1
BIOS 2
The operating system recovery system 20
Storer 3
Operating system 30
Operating system recovery software 31
Detection module 201
Control module 202
Reminding module 203
Calling module 204
Following embodiment will combine above-mentioned accompanying drawing to further specify the present invention.
Embodiment
Consulting shown in Figure 1ly, is the running environment figure of operating system recovery of the present invention system preferred embodiment.
In the present embodiment, this operating system recovery system 20 (hereinafter to be referred as " recovery system 20 ") is embedded among the BIOS (Basic Input Output System, Basic Input or Output System (BIOS)) 2 of computing machine 1.This computing machine 1 also comprises storer 3.The operating system 30 of computing machine 1 is installed in this storer 3.Also comprise operating system recovery software 31 in this storer 3.This operating system recovery software 31 can back up operating system 30 when computing machine 1 start or shutdown automatically, also can back up operating system 30 according to being provided with of user.When needs recovery operation system 30, can also can come recovery operation system 30 by user's open operation system recovery software 31 recovery operation systems 30 by recovery system 20 call operation system recovery softwares 31.This operating system recovery software can be that a key recovers software.
Consulting shown in Figure 2ly, is the functional block diagram of operating system recovery of the present invention system preferred embodiment.This recovery system 20 comprises detection module 201, control module 202, reminding module 203 and calling module 204.
Detection module 201 is used for starting when computing machine 1, and when BIOS 2 obtained the control of computing machine 1, whether detecting operation system 30 was in normal condition.
Operating system 30 is not in normal condition and generally comprises following two kinds of situation: the one, and operating system 30 can normally start, but the system file of operating system 30 is in up-set condition, and for example by virus attack, or system file such as loses at state; The 2nd, operating system 30 is collapsed fully, can't normally start.Both of these case all can make with the relevant system file of operating system 30 normal operations and be modified.
In the present embodiment; When operating system 30 is backed up; Detection module 201 all can be to system file packing carry out MD5 (the Message Digest Algorithm 5 relevant with operating system 30 normal operations; Message Digest Algorithm 5) calculates, obtain a standard MD5 value, and this standard MD5 value is deposited in the storer 3.If stored the standard MD5 value that obtains when last operating system 30 backs up in the storer 3, the standard MD5 value that obtains when then this operating system 30 backs up will cover and deposit the standard MD5 value in the storer 3 when last operating system 30 backs up in.
When computing machine 1 starts; When BIOS 2 obtained the control of computing machine 1,201 couples of system file packing carry out MD5s relevant with operating system 30 normal operations of detection module calculated, and obtain verification MD5 value; And with in this verification MD5 value and the storer 3 storage standard MD5 value compare; If this verification MD5 value is consistent with the standard MD5 value of storage in the storer 3, then explanation is not modified with the relevant system file of operating system 30 normal operations, and operating system 30 is in normal condition.If the standard MD5 value of storage is inconsistent in this verification MD5 value and the storer 3, then explanation is modified with the relevant system file of operating system 30 normal operations, and operating system 30 is not in normal condition.
Control module 202 is used for when operating system 30 is in normal condition, sends and instructs to BIOS 2, and BIOS 2 control operation systems 30 are started.
Reminding module 203 is used for when operating system 30 is not in normal condition, whether recovery operation system of prompting user 30, and receive the affirmation information that the user imports, this confirmation has reflected whether the user confirms recovery operation system 30.Because possibly comprise the customized data of many users in the operating system 30, like software, certificate etc., recovery operation system 30 possibly make the customized data of user be capped, therefore need the user to confirm whether recovery operation system 30.
Calling module 204 is used for when the user confirms recovery operation system 30, and 31 pairs of operating systems 30 of call operation system recovery software are recovered, and restart computing machine 1 then.
Consulting shown in Figure 3ly, is the process flow diagram of operating system recovery method of the present invention preferred embodiment.
In the present embodiment, when operating system 30 backups, detection module 201 all calculates system file packing the carrying out MD5 relevant with operating system 30 normal operations, obtains a standard MD5 value, and this standard MD5 value is deposited in the storer 3.If stored the standard MD5 value that obtains when last operating system 30 backs up in the storer 3, the standard MD5 value that obtains when then this operating system 30 backs up will cover and deposit the standard MD5 value in the storer 3 when last operating system 30 backs up in.
Step S01, computing machine 1 starts, and BIOS 2 obtains the control of computing machine 1.
Step S02, whether detection module 201 detecting operation systems 30 are in normal condition.In the present embodiment; 201 couples of system file packing carry out MD5s relevant with operating system 30 normal operations of detection module calculate, and obtain verification MD5 value, and the standard MD5 value of storage in this verification MD5 value and the storer 3 is compared; If this verification MD5 value is consistent with the standard MD5 value of storage in the storer 3; Then explanation is not modified with the relevant system file of operating system 30 normal operations, and operating system 30 is in normal condition, execution in step S03.If the standard MD5 value of storage is inconsistent in this verification MD5 value and the storer 3, then explanation is modified with the relevant system file of operating system 30 normal operations, and operating system 30 is not in normal condition, execution in step S04.
Step S03, control module 202 is sent and is instructed to BIOS 2, makes BIOS 2 control operation systems 30 start process ends.
Step S04, reminding module 203 whether recovery operation systems of prompting user 30, and receive the affirmation information that the user imports, this confirmation has reflected whether the user confirms recovery operation system 30.If the user confirms recovery operation system 30, then get into step S05, if the user confirms not recovery operation system 30, then process ends.
Step S05,31 pairs of operating systems 30 of calling module 204 call operation system recovery softwares are recovered, and restart computing machine 1, return step S01.
In the present embodiment, 201 couples of system file packing carry out MD5s relevant with operating system 30 normal operations of detection module calculate, and obtain a standard MD5 value and verification MD5 value.Be appreciated that; In other embodiments; Detection module 201 also can utilize other AESs, like AES (Advanced Encryption Standard, Advanced Encryption Standard) algorithm; To carrying out computations, obtain a Standard Encryption value and verification secret value with the relevant system file packing of operating system 30 normal operations.Then; Detection module 201 compares the Standard Encryption value of storage in this verification secret value and the storer 3; If this verification secret value is consistent with the Standard Encryption value of storage in the storer 3; Then explanation is not modified with the relevant system file of operating system 30 normal operations, and operating system 30 is in normal condition.
Above embodiment is only unrestricted in order to technical scheme of the present invention to be described; Although the present invention is specified with reference to preferred embodiment; Those of ordinary skill in the art is to be understood that; Can make amendment or be equal to replacement technical scheme of the present invention, and not break away from the spirit and the scope of technical scheme of the present invention.

Claims (10)

1. an operating system recovery method is characterized in that, this method may further comprise the steps:
Detect step: work as computer starting, when the BIOS in this computing machine obtains the control of this computing machine, detect this operating system and whether be in normal condition;
Invocation step: when this operating system was not in normal condition, the operating system recovery software that calls in the computing machine recovered this operating system.
2. operating system recovery method as claimed in claim 1; It is characterized in that; This method also comprised calculation procedure before detecting step: when computing machine backs up this operating system; To carrying out computations, obtain the Standard Encryption value, and this Standard Encryption value is deposited in the storer of this computing machine with the relevant system file of the normal operation of this operating system.
3. operating system recovery method as claimed in claim 2; It is characterized in that; If the Standard Encryption value that has obtained when having stored last operating system backup in the storer, the Standard Encryption value when the Standard Encryption value that then obtains during this operating system backup covers last operating system backup.
4. operating system recovery method as claimed in claim 3 is characterized in that, said detection step comprises:
To carrying out computations, obtain the verification secret value with the relevant system file of the normal operation of this operating system;
The Standard Encryption value of storing in advance in this verification secret value and the storer is compared,, then detect operating system and be not in normal condition if this verification secret value and this Standard Encryption value are inconsistent.
5. operating system recovery method as claimed in claim 1 is characterized in that, when operating system is not in normal condition, and when receiving the affirmation information of recovery operation system of user's input, carries out said invocation step.
6. an operating system recovery system is characterized in that, this system comprises:
Detection module is used for working as computer starting, when the BIOS in this computing machine obtains the control of this computing machine, detects this operating system and whether is in normal condition;
Calling module is used for when this operating system is not in normal condition, and the operating system recovery software that calls in the computing machine recovers this operating system.
7. operating system recovery as claimed in claim 6 system; It is characterized in that; Said detection module also is used for when computing machine backs up this operating system; To carrying out computations, obtain the Standard Encryption value, and this Standard Encryption value is deposited in the storer of this computing machine with the relevant system file of the normal operation of this operating system.
8. operating system recovery as claimed in claim 7 system; It is characterized in that; If the Standard Encryption value that has obtained when having stored last operating system backup in the storer, the Standard Encryption value when the Standard Encryption value that then obtains during this operating system backup covers last operating system backup.
9. operating system recovery as claimed in claim 8 system; It is characterized in that; Said detection module pair carries out computations with the relevant system file of the normal operation of this operating system, obtains the verification secret value, and the Standard Encryption value of storing in advance in this verification secret value and the storer is compared; If this verification secret value and this Standard Encryption value are inconsistent, then detect operating system and be not in normal condition.
10. operating system recovery as claimed in claim 6 system; It is characterized in that; Said calling module is not when this operating system is in normal condition and receive the affirmation information of recovery operation system of user input, and the operating system recovery software that calls in the computing machine recovers this operating system.
CN201110163882XA 2011-06-17 2011-06-17 Recovery method and system for operating system Pending CN102831031A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201110163882XA CN102831031A (en) 2011-06-17 2011-06-17 Recovery method and system for operating system
TW100121784A TW201301017A (en) 2011-06-17 2011-06-22 Method and system for restoring operating system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110163882XA CN102831031A (en) 2011-06-17 2011-06-17 Recovery method and system for operating system

Publications (1)

Publication Number Publication Date
CN102831031A true CN102831031A (en) 2012-12-19

Family

ID=47334180

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110163882XA Pending CN102831031A (en) 2011-06-17 2011-06-17 Recovery method and system for operating system

Country Status (2)

Country Link
CN (1) CN102831031A (en)
TW (1) TW201301017A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104516791A (en) * 2013-09-30 2015-04-15 贝壳网际(北京)安全技术有限公司 Data processing method and device and electronic device
CN104516787A (en) * 2013-09-27 2015-04-15 联想(北京)有限公司 Information processing method and electronic device
CN104636217A (en) * 2013-11-14 2015-05-20 厦门雅迅网络股份有限公司 Root file system automatic backup and exception recovery method and partition structure
WO2016062080A1 (en) * 2014-10-21 2016-04-28 中兴通讯股份有限公司 Profile protecting method and device, and storage medium
CN107463466A (en) * 2017-07-28 2017-12-12 苏州蓝越软件有限公司 Software systems with recovery module

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108572886B (en) * 2017-03-13 2022-11-04 鸿富锦精密工业(武汉)有限公司 Operating system recovery circuit

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1530835A (en) * 2003-03-10 2004-09-22 联想(北京)有限公司 Method for detecting computer operating system normal start
CN1598792A (en) * 2003-09-15 2005-03-23 联想(北京)有限公司 Safety repair method of computer operation system
US20070011493A1 (en) * 2003-05-06 2007-01-11 Lenovo (Beijing) Limited Method for renovating the computer operating system
CN102081539A (en) * 2011-01-12 2011-06-01 苏州汉辰数字多媒体有限公司 Reliable software upgrade method for dual-mode terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1530835A (en) * 2003-03-10 2004-09-22 联想(北京)有限公司 Method for detecting computer operating system normal start
US20070011493A1 (en) * 2003-05-06 2007-01-11 Lenovo (Beijing) Limited Method for renovating the computer operating system
CN1598792A (en) * 2003-09-15 2005-03-23 联想(北京)有限公司 Safety repair method of computer operation system
CN102081539A (en) * 2011-01-12 2011-06-01 苏州汉辰数字多媒体有限公司 Reliable software upgrade method for dual-mode terminal

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104516787A (en) * 2013-09-27 2015-04-15 联想(北京)有限公司 Information processing method and electronic device
CN104516791A (en) * 2013-09-30 2015-04-15 贝壳网际(北京)安全技术有限公司 Data processing method and device and electronic device
CN104636217A (en) * 2013-11-14 2015-05-20 厦门雅迅网络股份有限公司 Root file system automatic backup and exception recovery method and partition structure
CN104636217B (en) * 2013-11-14 2018-11-20 厦门雅迅网络股份有限公司 A kind of root file system automated back-up and abnormal restoring method and partitioned organization
WO2016062080A1 (en) * 2014-10-21 2016-04-28 中兴通讯股份有限公司 Profile protecting method and device, and storage medium
CN105590065A (en) * 2014-10-21 2016-05-18 中兴通讯股份有限公司 Method and apparatus for protecting preset files
CN105590065B (en) * 2014-10-21 2020-07-31 南京中兴新软件有限责任公司 Method and device for protecting preset file
CN107463466A (en) * 2017-07-28 2017-12-12 苏州蓝越软件有限公司 Software systems with recovery module

Also Published As

Publication number Publication date
TW201301017A (en) 2013-01-01

Similar Documents

Publication Publication Date Title
CN102831031A (en) Recovery method and system for operating system
TWI570552B (en) Method, device, and machine-readable medium for self-managed processing
CN100504899C (en) Software watchdog system and method
CN109325349A (en) A kind of method for managing security, terminal device and computer readable storage medium
CN102650944A (en) Operation system security bootstrap device and bootstrap device
WO2011143852A1 (en) Managing method, device and terminal for application program
CN105825131A (en) Computer security startup protection method on basis of UEFI (Unified Extensible Firmware Interface)
KR101369251B1 (en) Apparatus, method, terminal and system for recovery protection of system files
CN108549550A (en) A kind of hard disk hanging method and device
CN107943501A (en) Embedded device upgrade method, device, computer equipment and storage medium
CN107967193A (en) Boot starts method and embedded device
CN110990124A (en) Cloud host recovery method and device
EP2194479A1 (en) Data protecting method and computing apparatus
CN103049343A (en) Method and device for restoring operating system blue screen
CN103902401B (en) Virtual machine fault-tolerance approach and device based on monitoring
CN107657170B (en) Trusted loading starting control system and method supporting intelligent repair
CN101340675A (en) Method and apparatus for implementing backup and recovery by mobile terminal
WO2024113683A1 (en) Flash device switching method and apparatus, computer device, and storage medium
CN112258137A (en) Mail blocking method and device
CN100520796C (en) Computer safety proxy self-guard method
CN1272717C (en) Safety repair method of computer operation system
CN109829318A (en) A kind of encrypted backup processing method and processing device of file
CN102902913A (en) Preservation method for preventing software in computer from being damaged maliciously
CN114443356A (en) Container cluster processing method and system
CN113986450A (en) Virtual machine backup method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20121219