CN1417689A - Fixed disk data enciphering back-up and restoring method - Google Patents

Fixed disk data enciphering back-up and restoring method Download PDF

Info

Publication number
CN1417689A
CN1417689A CN 01134571 CN01134571A CN1417689A CN 1417689 A CN1417689 A CN 1417689A CN 01134571 CN01134571 CN 01134571 CN 01134571 A CN01134571 A CN 01134571A CN 1417689 A CN1417689 A CN 1417689A
Authority
CN
China
Prior art keywords
backup
data
windows
file
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 01134571
Other languages
Chinese (zh)
Other versions
CN100389408C (en
Inventor
王卫
杜宾
杨文兵
李鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CNB011345713A priority Critical patent/CN100389408C/en
Publication of CN1417689A publication Critical patent/CN1417689A/en
Application granted granted Critical
Publication of CN100389408C publication Critical patent/CN100389408C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The fixed disk data enciphering back-up and restoring method includes the following steps: setting one subsection in fixed disk; hiding the subsection for the operation system and other program based on file system not to access, storing the user designated back-up data in the subsection, and restoring the data in the hidden subsection to fixed disk subsection capable of being accessed. The said method makes the back-up data safe and reliable, the data will not be destroyed by user's misoperation, computer virusand and hacker program. The user can back up and restore the fixed disk data in Windows operation system conveniently.

Description

Fixed disk data enciphering back-up and method of reducing
Technical field
The present invention relates to a kind of fixed disk data enciphering back-up and method of reducing that is used to ensure data security.
Background technology
At present, computer virus and online hacker's harmfulness is increasing, often directly threatens computer user's data security and normal the use.So computer user is also more and more higher to the security requirement of computing machine and computer data, particularly hard disc data.So computer security softwares such as antivirus software and fire wall occurred.But, up to the present, there is not theoretical model to show that antivirus software can be to removing all unknown virus or Hacker Program as yet, though therefore antivirus software can be removed most of virus, but it has certain hysteresis quality, the user often also needs the viral code of upgrading to the website, upgrading inconvenience, and also have the new virus of PI during online or become the object of assault; And, can not guarantee to remove all viruses and Hacker Program.
And fire wall has certain effect for the safety of network, but neither very reliable (particularly to taking precautions against the hacker).And antivirus software, firewall software generally all have real-time monitor (RTM) to move in system after installing, and can take the system resource of a part, reduces the performance of computing machine.And because be both system monitor, sometimes also have compatible problem, can clash and cause more serious consequences (for example anti-virus softwares such as KV3000, Rising, KILL and NORTON are installed on same the computing machine, will make the frequent blue screen of computing machine) such as systemic breakdown with other software.The file that this two classes software loss that misoperation of users is caused simultaneously or system crash cause is lost and is had no idea to avoid.
So, not only improved computer security, but also one of the way that do not influence computing power exactly system and significant data are backed up.Existing redundancy technique mainly contains following several: a kind of method is, data are backuped to (as the Ghost of Symentic company) in the ordinary file, the shortcoming of this method is that ordinary file is dangerous, the user may delete backup file because of maloperation, and perhaps backup file is by the program crash of some malice.So need transfer to other backup mediums (CDRW or tape) to backup file to guarantee safety usually.Another kind method is that Backup Data is write (as the Drive image of PowerQuest company) in the hidden partition.Also have a kind of method to be, on hard disk, create a mirror, the data of the subregion that back up are done a backup at mirror in subregion to subregion.The shortcoming of this method is a mirror once to be arranged to backup, if the user wishes to back up a plurality of subregions, is irrealizable so by this method.
The common shortcoming of above-mentioned several method must realize under the Dos environment exactly.The user ID data at first need repeatedly to restart computing machine, switching operating system.Do like this and can bring a lot of inconvenience, and the waste plenty of time is switched in system to user's operation.Particularly when switching from the Windows system to the DOS system, need to end the program of other normal operations in the Windows system, this program can not be ended if the user is moving very important application program, then can't realize backup.The main function of these softwares is the subregion backup simultaneously, but the most frequently used function is with own important data backup for the user, rather than whole subregion even DISK to Image.So above method all has certain limitation.
Summary of the invention
The objective of the invention is to a kind of security performance height, fixed disk data enciphering back-up and method of reducing easy to use, make the data security of backup in this machine hard disk reliable, the user can carry out data backup and reduction easily under Windows operating system.
Technical scheme of the present invention is as follows:
According to concealed encrypted backup of a kind of hard disc data of the present invention and method of reducing, may further comprise the steps:
(1) subregion is provided with step, and a subregion is set in hard disk;
(2) subzone hiding step is hidden this subregion, makes this subregion and data thereof can not be operated system or other routine accesses based on file system;
(3) data backup step is stored in this subregion with the hard disc data of the need of user's appointment backup;
(4) reduction of data step, with the reduction of data in the hidden partition in fdisk that can be accessed.
Described in the present invention subregion is provided with step, and the size of this hidden partition can be set according to need backed up data amount by the user.This feasible capacity that is used for the subregion of Backup Data is able to components utilising.
In the present invention, described subzone hiding step can be in hard disk partition table for specific types value of this partition definition, such offset is different from the types value of the subregion that other can be accessed by the user.
In the present invention, described data backup step can be that the need Backup Data of user's appointment is write this hidden partition with the form of sector.
In the present invention, described data backup step also can further may further comprise the steps:
(1) specifies file or the file directory that needs backup by the user;
(2) backup node information is write the first area in this Backup Data district, each backup node contains several backup data files, the essential information of this backup node information representation backup file comprises the data and the length of attribute in this backup node of file type about this backup node, title, deviation post, length, creation-time, backup file;
(3) backup data files is write the second area in this Backup Data district with the form of sector;
(4) attribute information of backup file is write the 3rd zone of this backup file, comprising filename, length, creation-time, access time and the relative position in the Backup Data district and the length of backup file.
In the present invention, before backup data files is write hidden partition, can earlier backup data files be compressed.
In data backup step of the present invention and reduction of data step, it can be by a cover interface function of hard disc physical sector operation to be realized that this interface function is to set up according to the hard disk access interface of Windows operating system that read and write access is carried out in the sector of hidden partition.
Described in the present invention reduction of data step can be that the Backup Data in the hidden partition is read with the sector form, is institute's backed up data file with the reduction of data of being read again.
In the present invention, described data backup step and reduction of data step can be to utilize the virtual device driver under the Windows operating system to realize.
In one embodiment of the invention, described Windows operating system comprises Windows 9x system (for example Windows 95 and Windows 98 systems), described virtual device driver is to be realized by the developing instrument of the virtual device driver of Windows 9x system, may further comprise the steps:
(1) buffer status of the current virtual machine of preservation;
(2) change virtual 86 modes over to;
(3) calling INT 13 interrupts;
(4) withdraw from virtual 86 modes;
(5) buffer status of the current virtual machine of recovery.
In the present invention, described Windows operating system can comprise Windows 2000 operating systems and Windows XP operating system, and described virtual device driver can be the driver of the SYS form that provided by Windows 2000 operating systems or Windows XP operating system.
In the present invention, described method can realize under Windows operating system.In an embodiment of the present invention, the present invention realizes by a software under the Windows operating system.
Utilize the present invention, the user can be in Windows operating system (as Windows98, Windows 2000, operating systems such as Windows XP) under, with short as far as possible time, the try one's best few space hold and the shirtsleeve operation process of trying one's best, directly with important data backup in very safe hidden partition, in the assurance system simultaneously simultaneously other programs of operation be not subjected to the influence of this backup procedure, the user does not need to end the program that other are moving.
Utilize the present invention, can under Windows, realize the management such as establishment, deletion of hidden partition; In Windows operating system, can directly leave the user's data backup in hidden partition, or the Backup Data in the hidden partition is reduced.The realization of all these functions under Windows can make things convenient for the user greatly, makes the user finish backup to significant data like a cork in the gap of work.
The present invention be go deep into system kernel, can be based on the profound expert data safeguard protection instrument of Windows system development, it can utilize exclusive mode to open up a hidden partition as safe as a house on hard disk, is used for Backup Data.Because virus and Hacker Program all are based on file system usually, therefore the safety of computer data is to be difficult to guarantee on file system.And the operation of the set hidden partition of the present invention is lower than this one deck of file system, make the Windows system can not discern this hidden partition, general program can not have access to this hidden partition, so, virus and Hacker Program also can not have access to this hidden partition usually, promptly allow to have access to, it does not know the data layout in the hidden partition yet, so just can guarantee the safety of data in the hidden partition.Institute's backed up data can not be subjected to the influence of virus, system crash, program conflict, as long as hard disk is not a physical damage, all information in the hidden partition just can be reduced safely.The user can select to protect the operating system on the hard disk, important catalogue or file arbitrarily, can be provided with arbitrarily hard disk, revises arbitrarily, arbitrary formatization or subregion and can not influence the backup subregion again.
Because the hard disk of computing machine has very big capacity usually at present, the user can be according to the sizeable hidden partition of how much creating of oneself wanting Backup Data, back up significant data with hidden partition, so just can buy other memory devices, thereby save relevant expense for the user.
Utilize the present invention can realize the data backup software of high-speed and high-efficiency.Per minute 200 megabyte can be reached when for example backing up between the two hard disks of DMA66, speed can be reached during reduction of data near per minute 400,000,000.The present invention's the running software time is fast, easy to operate.Need not restart computing machine during user ID, switch under the DOS; Also the time of the startup computer of just saving, become tens seconds short kinds from the BACKUP TIME that needs a few minutes even tens minutes! This backup simultaneously is can carry out at any time, can finish at any time, and in the time of backup, the user can also carry out other work with computer, and other important procedure that backup can the interference user operation more can not ended the operation of these programs.In addition, the user also not be used in and carries out any operation under the DOS, save study and be familiar with DOS operation trouble.Therefore very convenient.
Below in conjunction with the further embodiments of the invention of accompanying drawing.
Fig. 1 is the general flow chart of the present invention's method;
Fig. 2 is the process flow diagram of data back up method of the present invention's embodiment;
Fig. 3 is the program interface figure of data back up method of the present invention's embodiment;
Fig. 4 is the process flow diagram of reduction of data method of the present invention's embodiment;
Fig. 5 is the program interface figure of reduction of data method of the present invention's embodiment.
As shown in Figure 1, under Windows operating system, the user can call the program of the method that realizes the present invention at any time, enters corresponding user interfaces.The user can manage hidden partition as required, parameter and physical sector by the virtual device driver access hard disk, in conjunction with the partition table operational module, create a hidden partition, be used for Backup Data thereby on hard disk, constitute a data safety zone.The user also can delete this hidden partition, and can adjust the size of this hidden partition and harmless Backup Data.
In the present invention, be this one deck of physical sector to whole accessing operations of hard disk partition table and hidden partition at hard disk.Implementation method and operating system are closely related.In an embodiment of the present invention, realized under the Windows system specifying as follows to the visit of hard disc physical sector.
The interface of access hard disk has three layers on PC under the Dos system, and they are respectively operating system layer, Basic Input or Output System (BIOS) (BIOS) layer and input/output port (I/O Port) layer.Operating system layer provides various senior funcalls, and wherein the function about harddisk access comprises spanned file, deleted file, change filename, writes and read file etc.Also can be in this layer to the read-write of logic magnetic disc subregion.But in this layer, can not read hard disk partition table.Operating system layer is very easy to the operation of disk, but function is limited.Provide quite complete disk service among the BIOS (Basic Input/Output System), as read-write sector, the single magnetic track of format etc.The notion that does not have file in this one deck, read and the sector of disk are unit, so speed is fast more a lot of than operating system layer.I/O Port layer is very rudimentary interface, and it is directly issued orders to control card, so function is very powerful, and reading speed is the fastest.But it is connected closely with control card, if use the control card of another kind of type instead, and its just not effect so.Among the Windows9x, still have the DOS virtual machine environment, support the DOS program run, these programs can use BIOS/DOS to interrupt the hard disk visit, but can not use ATAPI interface accessing hard disk.Analyze discovery according to us, the DOS virtual machine provides DPMI (DOS protected mode interface), former DOS program is when using BIOS interrupt INT 13 or DOS interrupt INT 21, actually hard disk is conducted interviews by the DPMI interface, but these visits are subjected to the restriction of Windows protection, can not read and write the data of all hard disk sectors; For safety, the ATAPI visit has been under an embargo and has used simultaneously.And the 32-bit Windows program can only be moved in Windows 9x and Windows 2000/XP operating system, more because of security reason, uses above-mentioned hard disk access interface that hard disk is conducted interviews and be under an embargo.Can not use aforesaid way that hard disk is directly visited, therefore, a lot of backup softwares are DOS programs, and perhaps main program is the DOS program, moves under the DOS system.In an embodiment of the present invention, by adopting device driver can realize directly visit to the physical sector of hard disk.
Windows is one and operates in highest privilege, other multithreading operation system of the 0th level.All application programs all operate in the lowermost level privilege, and the 3rd level does not go up.So just limited the operation of application program to system.They can not use the CPU privileged instruction, can not directly visit the I/O port, physical sector of hard disk or the like.The control real power of system is grasped in the device driver hand.Windows9x is the extraordinary operating system of compatibility, and it can move most Dos programs, but because the Dos program has the different of essence with the Windows program, the Dos program thinks that they have all of system: keyboard, CPU, internal memory, hard disk or the like.How the Dos program does not know and other program cooperations, and the Windows program is the multitask partner systems.Just each Windows program all must exchange with other programs by GetMessage or PeekMessage.In order to address this problem, Windows9x is all Dos programs of operation on one 8086 virtual machine, and are called other all Windows programs of operation on the virtual machine of system virtual machine at another.Windows9x is responsible for giving each virtual machine to what CPU took turns operation time.Virtual machine is by an illusion of software creation.A virtual machine and the program interaction that moves on it are just as this program is operation on real machine.Like this, whether be on virtual machine move to a program if not knowing also to be indifferent to oneself.As long as virtual machine is accurately as a genuine machine responder, it just can be by as being a real machine.
The form of device driver is VxD (Virtual X Driver) under the Windows 9x.X represents the name of various device, as dummy keyboard driver (vkd), and virtual mouse driver (vmd) or the like.The VxD program is the initialized approach of hardware success.The VxD program is more virtual hardware devices usually, so, for example think it the time when a Dos program with the keyboard communication, actual be the dummy keyboard driver with the communication of Dos program.VxD program is the real hardware device of control and to shared manage of this equipment between each virtual machine usually.However, be not that each VxD program must link to each other with a hardware device.Though the VxD program is used for virtual hardware equipment, also can regard the VxD program at the 0th grade of other dll as.For example, do the work that some only just can be done in the 0th rank if desired, just can design a VxD program and finish this work.Like this, because this VxD program does not have virtual any equipment, can only regard it as the expansion of user program.
The developing instrument of VxD can adopt Windows 9x DDK or VToolsD.Its performing step is roughly as follows:
1. preserve the buffer status of current virtual machine
2. use Begin_Nest_V86_Exec to change virtual 86 (V86) mode over to
3. using Exec_Int (0x13) to call int 13 interrupts.
4. use End_Nest_Exec () to withdraw from virtual 86 modes
5. recover the buffer status of current virtual machine
The VxD program is the distinctive driver of Windows 9x, it at Windows NT, can not move for 2000 times.It can obtain 0 grade of authority of CPU, and direct access computer hardware.Device driver on the WindowsNT/2000/XP platform is the SYS form, and its principle and purpose and VxD are similar, all is in order to obtain the highest authority of CPU, and direct access computer hardware.
The software of the present invention's method is implemented in operation, need operate in simultaneously under Windows9x and the Windows2000/XP, so the driver of VxD and SYS form all needs.Under windows9x, can develop a VxD driver as stated above, and Windows2000/XP operating system provide one can the access hard disk parameter and the driver of physical sector.
The present invention with in the device driver of Windows as the basis, set up one group to hidden partition interface operable function, these functions are used to obtain the parameter (total size of hard disk sector, physics magnetic head number, physics cylinder number, physical sector number, logic magnetic head number, logic cylinder number, logic sector number etc.) of hard disk and visit (read-write) hard disc physical sector function are provided.We can realize the function to the backup file access in the hidden partition by this group function, thereby have set up the complete Windows development environment of a cover, directly hidden partition and backup file thereof are operated.
In the present invention, realize that the hiding of Backup Data district is the key that guarantees the Backup Data security, can forbid so any based on file system visit and based on the visit of operating system, thereby prevent to cause data corruption because of user misoperation or virus.
The principle that hidden partition is realized is:
0 magnetic track, 0 cylinder, 1 sector position at hard disk is MBR (MAIN BOOT RECORD), i.e. Main Boot Record district, and it comprises hard disk boot and partition table.The task that boot is finished checks exactly whether correct and definite which subregion can be operated system bootstrap to partition table.Partition table is positioned at the least significant end of this sector, at the deviation post 0x1BE of MBR, is opening flag with 80H or 00H, 0x40 byte altogether, and the information of every 0x10 byte records subregion can write down the information of four subregions altogether.The content of 2 follow-up bytes is 55AAH, and the data of expression MBR are legal available.What deserves to be mentioned is that MBR is produced by partition programs (for example FDISK.EXE of DOS), it does not rely on any operating system, and the hard disk boot neither be unalterable, can be changed by the user, as long as it can finish aforesaid task.This also is the reason that can realize that multisystem starts why.Can write down 4 subregions in MBR at most, in order to break through this restriction, the notion of extended partition is introduced into.The user can create an extended partition (being called as main extended partition) in MBR, in this main extended partition, can create again extended partition and logical partition again, (their storage format subregion item in MBR is identical), and extended partition can continue to divide again.So just can construct partition table more than 4 subregions.Operating system is by the partition table access hard disk.By analyzing the partition table structure, can realize the operations such as establishment, deletion, modification, extraction, reduction of partition table.The type that a byte representation subregion is arranged in 0x10 byte in each of partition table is 0xb as the types value of FAT32, and the NTFS types value is 0x7.
Defining a numerical value different with current all divisional type values in the present invention is the types value of a subregion, therefore, operating system just can not be discerned this subregion, so just can define a special subregion, as a subregion that operating system is hidden, and can operate this hidden partition.
When realizing operations such as hidden partition establishment, deletion, the present invention defines the storing mode of data in the hidden partition, i.e. all method of data in its file system structure, and the realization operation hidden partition, like this, the present invention has just realized technology that hidden partition is managed.
The basic structure of the data in the hidden partition is as follows:
1, the essential information of record backup file in the first area of hidden partition.As the data of the type of backup file, title, deviation post, length, creation-time, backup file and the length of attribute in this backup or the like information.This zone is called the backup node district.In one embodiment, this zone is first sector of hidden partition.
2, in the data of the second area storage backup file of hidden partition.These data compressions (user select compression) or do not compress (user selects not compress) order and be stored in this zone.This zone is called as the Backup Data district.
What 3, preserved in the 3rd of hidden partition the zone is the attribute information of backup file.As filename, length, establishment and access time and its data relative position in second portion and the attribute of length or the like file.This zone is called as the backup directory district.
In one embodiment of the invention, as shown in Figures 2 and 3, the process of hard disc data backup is as follows:
1, after the user selected the catalogue (file) that will back up and backup method (whether compress, compression method), the file access function that this program provides by Windows (CFile of MFC, CFileFinder class and some Windows api functions) was opened these files successively.
2, the content of all files of opening is read in internal memory, and their are compressed (if the user selects compression) in another memory block, and construct a file attribute tabulation, all properties of All Files is added in this tabulation.Form with the sector writes Backup Data district in the hidden partition then.
3, deviation post in hidden partition of the attribute (filename, length etc.) of top all file (by the file attribute tabulation) and their data, size etc. are write hidden partition backup directory district.
After 4, so top step is finished, in the backup node record backup node information of hidden partition.So just finish backup operation.
As shown in Figure 3, in the tree-like window on the left side of " backup " property pages, select the file that will back up, among the figure be C: My Documents catalogue, click " begin backup " button just just begin C: the file backup of MyDocuments catalogue to hidden partition.
In one embodiment of the invention, as shown in Figure 4 and Figure 5, the process of hard disc data reduction is as follows:
1, after the backup that the user selects to reduce, this program navigates to the backup node district, according to the essential information of the information initializing backup node in this district, as the position and the size of Backup Data district and directory area.
2, navigate to the backup directory district, read the data of directory area, obtain all properties and their positions in the data field of all backup files according to formats stored, use these files of file access function creation of Windows then, their attribute is set, and they data decompression (if compression) or corresponding files that writes direct in the data field.So just finish restoring operation.
As shown in Figure 5, in the tree-like window on the left side of " reduction " property pages, select the backup that to reduce, be among the figure " hidden partition 11 back up substantially ", click " reduction backup " or " reverting to ... " button and just begin to reduce the backup of choosing in the hidden partition.

Claims (12)

1, concealed encrypted backup of a kind of hard disc data and method of reducing may further comprise the steps:
(1) subregion is provided with step, and a subregion is set in hard disk;
(2) subzone hiding step is hidden this subregion, makes this subregion and data thereof can not be operated system or other routine accesses based on file system;
(3) data backup step is stored in this subregion with the hard disc data of the need of user's appointment backup;
(4) reduction of data step, with the reduction of data in the hidden partition in fdisk that can be accessed.
2, method according to claim 1 wherein, is provided with step at described subregion, and the size of this hidden partition is set according to need backed up data amount by the user.
3, method according to claim 1, wherein, described subzone hiding step be in hard disk partition table for specific types value of this partition definition, such offset is different from the types value of the subregion that other can be accessed by the user.
4, method according to claim 1, wherein, described data backup step is that the need Backup Data of user's appointment is write this hidden partition with the form of sector.
5, method according to claim 1, wherein, described data backup step further may further comprise the steps:
(1) specifies file or the file directory that needs backup by the user;
(2) backup node information is write the first area in this Backup Data district, each backup node contains several backup data files, the essential information of this backup node information representation backup file comprises the data and the length of attribute in this backup node of file type about this backup node, title, deviation post, length, creation-time, backup file;
(3) backup data files is write the second area in this Backup Data district with the form of sector;
(4) attribute information of backup file is write the 3rd zone of this backup file, comprising filename, length, creation-time, access time and the relative position in the Backup Data district and the length of backup file.
6, method according to claim 1 wherein, before backup data files is write hidden partition, is compressed backup data files earlier.
7, method according to claim 1, wherein, in described data backup step and reduction of data step, it is by a cover interface function of hard disc physical sector operation to be realized that this interface function is to set up according to the hard disk access interface of Windows operating system that read and write access is carried out in the sector of hidden partition.
8, method according to claim 1, wherein, described reduction of data step is that the Backup Data in the hidden partition is read with the sector form, is institute's backed up data file with the reduction of data of being read again.
9, method according to claim 1, wherein, described data backup step and reduction of data step are based on that virtual device driver under the Windows operating system realizes.
10, method according to claim 9, wherein, described Windows operating system comprises Windows 9x system, and described virtual device driver is to be realized by the developing instrument of the virtual device driver of Windows 9x system, may further comprise the steps:
(1) buffer status of the current virtual machine of preservation;
(2) change virtual 86 modes over to;
(3) calling INT 13 interrupts;
(4) withdraw from virtual 86 modes;
(5) buffer status of the current virtual machine of recovery.
11, method according to claim 9, wherein, described Windows operating system comprises Windows 2000 operating systems and Windows XP operating system, and described virtual device driver is the driver of the SYS form that provided by Windows 2000 operating systems or Windows XP operating system.
12, according to each described method in the claim 1 to 11, wherein, described method realizes under Windows operating system.
CNB011345713A 2001-11-08 2001-11-08 Fixed disk data enciphering back-up and restoring method Expired - Fee Related CN100389408C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB011345713A CN100389408C (en) 2001-11-08 2001-11-08 Fixed disk data enciphering back-up and restoring method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB011345713A CN100389408C (en) 2001-11-08 2001-11-08 Fixed disk data enciphering back-up and restoring method

Publications (2)

Publication Number Publication Date
CN1417689A true CN1417689A (en) 2003-05-14
CN100389408C CN100389408C (en) 2008-05-21

Family

ID=4672593

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB011345713A Expired - Fee Related CN100389408C (en) 2001-11-08 2001-11-08 Fixed disk data enciphering back-up and restoring method

Country Status (1)

Country Link
CN (1) CN100389408C (en)

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1296835C (en) * 2003-08-08 2007-01-24 Lg电子株式会社 Apparatus and method for controlling booting operation of computer system
JP2007200314A (en) * 2006-01-11 2007-08-09 Samsung Electronics Co Ltd Apparatus and method of managing hidden area
CN100440178C (en) * 2004-02-24 2008-12-03 深圳市朗科科技股份有限公司 Method for managing notations of disks of mobile storage device
CN100447765C (en) * 2005-05-20 2008-12-31 联想(北京)有限公司 Mapping method for mobile memory device
CN101349980B (en) * 2007-07-18 2010-10-06 深圳市顶星数码网络技术有限公司 Hard disk data backup and protection method
CN101546295B (en) * 2008-03-24 2010-12-22 上海梅山钢铁股份有限公司 Method for backing up and restoring data based on computer hard disc partitions
WO2010145269A1 (en) * 2009-10-13 2010-12-23 中兴通讯股份有限公司 Method and device for restoring terminal operation and data
CN101901171B (en) * 2009-05-27 2012-03-14 同方股份有限公司 Using method of computer data backup and restore software
CN102375782A (en) * 2010-08-17 2012-03-14 深圳市虹安信息技术有限公司 Method for preventing data leakage by using file disk, system restore and transfer control
CN101782955B (en) * 2009-01-16 2012-06-20 鸿富锦精密工业(深圳)有限公司 File protecting system
CN101615161B (en) * 2009-07-28 2012-07-18 成都市华为赛门铁克科技有限公司 Method for encrypting and decrypting hard disk, hard disk driving device and hard disk
CN102799798A (en) * 2011-05-23 2012-11-28 金宏中天(北京)科技有限公司 Method for not restoring write-ins in overall restoring condition of computer system
CN101785239B (en) * 2007-07-13 2013-01-02 英特尔公司 Key based hidden partition system
CN103019892A (en) * 2012-12-29 2013-04-03 盛耀无线通讯科技(北京)有限公司 NV data backup and recovery method based on high-pass platform
CN101828170B (en) * 2007-10-16 2013-04-03 国际商业机器公司 Creating a virtual machine containing third party code
CN103258170A (en) * 2013-04-24 2013-08-21 厦门市美亚柏科信息股份有限公司 Mobile storage medium data safety protective method
CN103324643A (en) * 2012-03-23 2013-09-25 联想(北京)有限公司 Terminal device and method for establishing or modifying files
CN103399875A (en) * 2013-07-12 2013-11-20 深圳市金立通信设备有限公司 File managing method and device
CN108009447A (en) * 2017-12-27 2018-05-08 湖南国科微电子股份有限公司 A kind of fdisk hidden method, device and hard disk
CN108062262A (en) * 2017-12-25 2018-05-22 厦门市美亚柏科信息股份有限公司 Operating system backup-and-restore method and its system based on storage sector data
CN108154043A (en) * 2016-12-05 2018-06-12 中标软件有限公司 The safety protecting method of software cryptography solid state disk
CN109255262A (en) * 2018-09-03 2019-01-22 湖南国科微电子股份有限公司 Data guard method and solid state hard disk
CN109766215A (en) * 2018-12-06 2019-05-17 合肥联宝信息技术有限公司 A kind of data processing method and device
CN111858185A (en) * 2020-08-26 2020-10-30 河南工业大学 Computer information backup and restoration system
CN112965861A (en) * 2021-03-15 2021-06-15 中电科技(北京)有限公司 System backup and recovery method, BIOS and computer
CN113408015A (en) * 2021-06-15 2021-09-17 北京安天网络安全技术有限公司 Product operation and maintenance method and device of terminal equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9812836D0 (en) * 1998-06-16 1998-08-12 Ncr Int Inc Data security arrangement
US6192488B1 (en) * 1998-07-13 2001-02-20 Chung-Ping Li Restoring method for hard disk

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1296835C (en) * 2003-08-08 2007-01-24 Lg电子株式会社 Apparatus and method for controlling booting operation of computer system
CN100440178C (en) * 2004-02-24 2008-12-03 深圳市朗科科技股份有限公司 Method for managing notations of disks of mobile storage device
CN100447765C (en) * 2005-05-20 2008-12-31 联想(北京)有限公司 Mapping method for mobile memory device
JP4685038B2 (en) * 2006-01-11 2011-05-18 三星電子株式会社 Hidden area management apparatus and method
JP2007200314A (en) * 2006-01-11 2007-08-09 Samsung Electronics Co Ltd Apparatus and method of managing hidden area
US7861311B2 (en) * 2006-01-11 2010-12-28 Samsung Electronics Co., Ltd. Apparatus and method of managing hidden area
CN101785239B (en) * 2007-07-13 2013-01-02 英特尔公司 Key based hidden partition system
CN101349980B (en) * 2007-07-18 2010-10-06 深圳市顶星数码网络技术有限公司 Hard disk data backup and protection method
CN101828170B (en) * 2007-10-16 2013-04-03 国际商业机器公司 Creating a virtual machine containing third party code
CN101546295B (en) * 2008-03-24 2010-12-22 上海梅山钢铁股份有限公司 Method for backing up and restoring data based on computer hard disc partitions
CN101782955B (en) * 2009-01-16 2012-06-20 鸿富锦精密工业(深圳)有限公司 File protecting system
CN101901171B (en) * 2009-05-27 2012-03-14 同方股份有限公司 Using method of computer data backup and restore software
CN101615161B (en) * 2009-07-28 2012-07-18 成都市华为赛门铁克科技有限公司 Method for encrypting and decrypting hard disk, hard disk driving device and hard disk
WO2010145269A1 (en) * 2009-10-13 2010-12-23 中兴通讯股份有限公司 Method and device for restoring terminal operation and data
CN102375782A (en) * 2010-08-17 2012-03-14 深圳市虹安信息技术有限公司 Method for preventing data leakage by using file disk, system restore and transfer control
CN102799798A (en) * 2011-05-23 2012-11-28 金宏中天(北京)科技有限公司 Method for not restoring write-ins in overall restoring condition of computer system
CN103324643B (en) * 2012-03-23 2017-02-08 联想(北京)有限公司 Terminal device and method for establishing or modifying files
CN103324643A (en) * 2012-03-23 2013-09-25 联想(北京)有限公司 Terminal device and method for establishing or modifying files
CN103019892A (en) * 2012-12-29 2013-04-03 盛耀无线通讯科技(北京)有限公司 NV data backup and recovery method based on high-pass platform
CN103258170A (en) * 2013-04-24 2013-08-21 厦门市美亚柏科信息股份有限公司 Mobile storage medium data safety protective method
CN103399875A (en) * 2013-07-12 2013-11-20 深圳市金立通信设备有限公司 File managing method and device
CN108154043A (en) * 2016-12-05 2018-06-12 中标软件有限公司 The safety protecting method of software cryptography solid state disk
CN108154043B (en) * 2016-12-05 2024-05-28 中标软件有限公司 Safety protection method for software encrypted solid state disk
CN108062262A (en) * 2017-12-25 2018-05-22 厦门市美亚柏科信息股份有限公司 Operating system backup-and-restore method and its system based on storage sector data
CN108009447A (en) * 2017-12-27 2018-05-08 湖南国科微电子股份有限公司 A kind of fdisk hidden method, device and hard disk
CN108009447B (en) * 2017-12-27 2021-05-14 湖南国科微电子股份有限公司 Hard disk partition hiding method and device and hard disk
CN109255262A (en) * 2018-09-03 2019-01-22 湖南国科微电子股份有限公司 Data guard method and solid state hard disk
CN109766215A (en) * 2018-12-06 2019-05-17 合肥联宝信息技术有限公司 A kind of data processing method and device
CN109766215B (en) * 2018-12-06 2022-03-25 合肥联宝信息技术有限公司 Data processing method and device
CN111858185A (en) * 2020-08-26 2020-10-30 河南工业大学 Computer information backup and restoration system
CN112965861A (en) * 2021-03-15 2021-06-15 中电科技(北京)有限公司 System backup and recovery method, BIOS and computer
CN113408015A (en) * 2021-06-15 2021-09-17 北京安天网络安全技术有限公司 Product operation and maintenance method and device of terminal equipment and storage medium

Also Published As

Publication number Publication date
CN100389408C (en) 2008-05-21

Similar Documents

Publication Publication Date Title
CN100389408C (en) Fixed disk data enciphering back-up and restoring method
US9785370B2 (en) Method and system for automatically preserving persistent storage
US9286098B1 (en) Using master file template area to increase density of virtual machines in a computer system
CN1241120C (en) Method for backing up and recovering data in hard disk of computer
US9164787B2 (en) Methods and systems for running multiple operating systems in a single mobile device
US7519806B2 (en) Virtual partition for recording and restoring computer data files
JP4627547B2 (en) Secure storage tracking for antivirus acceleration
EP3627368B1 (en) Auxiliary memory having independent recovery area, and device applied with same
CN1627274A (en) Backup system and backup method
US6961833B2 (en) Method and apparatus for protecting data in computer system in the event of unauthorized data modification
US7370165B2 (en) Apparatus and method for protecting data recording on a storage medium
CN100514305C (en) System and method for implementing safety control of operation system
CN1920731A (en) System and method for implementing operation system separation
CN102222185B (en) Method for preventing operating system starting file from being infected
CN110472443A (en) A kind of local device of data security methods and belt switch
CN100424652C (en) Had disk self-recovery protecting method based on embedded operation system
CN112580023B (en) Shadow stack management method and device, medium and equipment
CA2454107C (en) Apparatus and method for protecting data recorded on a storage medium
WO2002048844A2 (en) Changing of operating modes in a computer
EP1410139B1 (en) Method for protecting data recorded on a storage medium
JP5468490B2 (en) Method and computer for accessing disk drive in computer with virtualized environment
JP2005115552A (en) Information processor and program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080521

Termination date: 20201108

CF01 Termination of patent right due to non-payment of annual fee