CN1601430A - Method of carrying out hard disk protection by utilizing encryption of main zoning - Google Patents
Method of carrying out hard disk protection by utilizing encryption of main zoning Download PDFInfo
- Publication number
- CN1601430A CN1601430A CN 200410064967 CN200410064967A CN1601430A CN 1601430 A CN1601430 A CN 1601430A CN 200410064967 CN200410064967 CN 200410064967 CN 200410064967 A CN200410064967 A CN 200410064967A CN 1601430 A CN1601430 A CN 1601430A
- Authority
- CN
- China
- Prior art keywords
- usb
- hard disk
- host controller
- partition table
- primary partition
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides a method for more effectively implementing hard disk protection. In PC shutdown process said method adopts RS algorithm to make software encryption for hardware main partitioninformation. after the PC machine is started, in the stage of that the system is fed nito MBR the USB host controller control program is loaded so as to take over the USB host controller on them ain board, and can be used for making detection for USB key inserted onto the USB interface, and can utilize the RSA coprocessor on USB key to make hardware decryptment for main partion information stored in hard disk so as to implement the function of protecting hard disk.
Description
Technical field
The present invention is carrying out the software cryptography of RSA Algorithm to primary partition table specifically about realizing the method for hard disk protection, utilizes USB Key that primary partition table is carried out the hardware decryption of RSA Algorithm more then in start-up course, thereby reaches the purpose of hard disk protection.
Background technology
Along with the raising of computer technology, personal computer (PC), particularly laptop computer applications is more prevalent.Many people can be some to the hard disk the inside of the very useful data storage of individual or company at computer.How to prevent that data important in the computer from illegally being stolen, prevent that the problem of any computer of opening oneself of disabled user and so on relevant PC safety is subjected to people's attention, particularly business people day by day.People wish and can protect the hard disk of oneself not encroached on by the handlebar electron key very much, so the notion of USBKey has just produced.After present hard disk data protection still just was confined to the starting up and enters Windows operating system, the file that needs are encrypted carried out soft encryption and soft deciphering.A kind of like this method is also dangerous, and the disabled user can move below Windows by some little software, thereby cracks the file of encrypting, and it can not be protected DISK to Image.
According to the ABC of hard disk, the primary partition table of hard disk encrypted just equal DISK to Image is encrypted.In the PC start-up course, the primary partition table of encrypting can not correctly guide PC to go to the load operation system or read the file of hard disk.Need USB Key that the primary partition table of encrypting is decrypted this moment, so function that can extraordinary realization hard disk protection.
Summary of the invention
For above purpose, the invention provides a kind of the utilization and encrypt the method that primary partition table is realized the hard disk protection function, this method comprises:
Write based on the usb host controller control program under the BIOS environment, and write the hard drive space the inside that the 0th magnetic track the 0th magnetic head the 1st sector begins.This control program can compatible PC mainboard at present on the UHCI of main flow, OHCI is the usb host controller of standard;
In the PC shutdown process main partition information of hard disk MBR is carried out the software cryptography of RSA Algorithm and key is deposited among the USBKey;
Load the usb host controller driver in the MBR stage, the usb host controller of BIOS control is taken over come, and USB Key is detected;
After USB Key detected successfully, the primary partition table that reading encrypted is crossed also sent to USB Key and carries out hardware decryption, and deposits among the MBR, detected the primary partition table after the deciphering;
After detecting successfully, recover the control of bios program again, make it to continue to support the USB mouse usb host controller, the USB keyboard, USB floppy disks etc. enter normal PC start-up course then.
Description of drawings
In claims of present patent application, pointed out theme of the present invention particularly, and clearly it has been proposed patent protection.Yet with reference to following detailed description and accompanying drawing, relevant structure that can better understand the present invention and implementation method with and purpose, feature and advantage.
Fig. 1 when not having the hard disk protection function, the start-up course of PC;
When Fig. 2 has hard disk protection function of the present invention, the shutdown process of PC;
When Fig. 3 has hard disk protection function of the present invention, the start-up course of PC;
The main program flow chart of Fig. 4 usb host controller;
The interrupt routine process flow diagram of Fig. 5 usb host controller;
The hardware block diagram of the USB Key of Fig. 6 band RSA coprocessor, although the invention is not restricted to these aspects, for the realization of the understanding that cooperates Fig. 2 Fig. 3 and whole functional so in this proposition.
Specific implementation method
In the following detailed description, having described specific details comprehensively understands the present invention so that provide.Yet the professional and technical personnel will appreciate that the present invention also can implement with other similar details.
During the hard disk protection function mounting, will have MBR code based on usb host controller control program function under the BIOS environment and deposit the inside, space that the 1st sector, the 0th the 0th road of disk begins in;
In the PC shutdown process, the primary partition table of hard disk is carried out the software cryptography of RSA Algorithm, and key is deposited among the USB Key;
PC enters the MBR stage after starting, and takes over usb host controller based on usb host controller control program under the BIOS environment;
By the usb host controller control program, detect USB Key;
The hard disk primary partition table is carried out the hardware decryption of RSA Algorithm by USB Key;
If detect the primary partition table after the deciphering
If detect by recover the control of bios program to usb host controller, enter the start-up course of normal load operation system, if not by show to make mistakes and require and restart.
Though herein declarative description certain this feature of the present invention and a kind of implementation method, for the professional and technical personnel, many modifications, replacement, variation and equivalent substitution will appear.Therefore, protection scope of the present invention is as the criterion by the scope of appended claim.
Claims (8)
1. one kind is utilized the method for encrypting primary partition table realization hard disk protection, and this method may further comprise the steps:
-write based on the usb host controller control program under the BIOS environment, and write the hard drive space the inside that the 0th magnetic track the 0th magnetic head the 1st sector begins.This control program can compatible PC mainboard at present on the UHCI of main flow, OHCI is the usb host controller of standard;
-in the PC shutdown process, the main partition information of hard disk MBR is carried out the software cryptography of RSA Algorithm and key is deposited among the USB Key;
-load the usb host controller driver in the MBR stage, the usb host controller of BIOS control is taken over come, and USBKey is detected;
After-USB Key detected successfully, the primary partition table that reading encrypted is crossed also sent to USB Key and carries out hardware decryption, and deposits among the MBR, detected the primary partition table after the deciphering;
-detect successfully after, recover the control of bios program again to usb host controller, make it continue to support the USB mouse, the USB keyboard, USB floppy disks etc. enter normal PC start-up course then.
2. a kind of according to claim 1 the utilization encrypted the method that primary partition table is realized hard disk protection, it is characterized in that: write based on the usb host controller control program under the BIOS environment this program compatibility UHCI, OHCI standard;
3. a kind of according to claim 1 the utilization encrypted the method that primary partition table is realized hard disk protection, it is characterized in that: with usb host controller control program as claimed in claim 2, write the hard drive space the inside that the 0th magnetic track the 0th magnetic head the 1st sector begins;
4. a kind of according to claim 1 the utilization encrypted the method that primary partition table is realized hard disk protection, it is characterized in that: usb host controller control journey as claimed in claim 2 is supported UHCI, the usb host controller of OHCI;
5. a kind of according to claim 1 the utilization encrypted the method that primary partition table is realized hard disk protection, it is characterized in that: in the PC shutdown process main partition information of hard disk MBR is carried out the software cryptography of RSA Algorithm and key is deposited among the USB Key;
6. a kind of according to claim 1 the utilization encrypted the method that primary partition table is realized hard disk protection, it is characterized in that: load the usb host controller driver in the MBR stage, the usb host controller of BIOS control is taken over come, and USB Key is detected;
7. a kind of according to claim 1 method that primary partition table is realized hard disk protection of encrypting of utilizing, it is characterized in that: after USB Key detects successfully, the primary partition table that reading encrypted is crossed also sends to USB Key and carries out hardware decryption, and deposits among the MBR, detects the primary partition table after the deciphering;
8. a kind of according to claim 1 method that primary partition table is realized hard disk protection of encrypting of utilizing; it is characterized in that: after detecting successfully; again recover the control of bios program to usb host controller; make it to continue to support the USB mouse; the USB keyboard; USB floppy disks etc. enter normal PC start-up course then.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100649672A CN100389409C (en) | 2004-10-14 | 2004-10-14 | Method of carrying out hard disk protection by utilizing encryption of main zoning |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100649672A CN100389409C (en) | 2004-10-14 | 2004-10-14 | Method of carrying out hard disk protection by utilizing encryption of main zoning |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1601430A true CN1601430A (en) | 2005-03-30 |
CN100389409C CN100389409C (en) | 2008-05-21 |
Family
ID=34666432
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2004100649672A Expired - Fee Related CN100389409C (en) | 2004-10-14 | 2004-10-14 | Method of carrying out hard disk protection by utilizing encryption of main zoning |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100389409C (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100378689C (en) * | 2005-06-06 | 2008-04-02 | 付爱香 | Enciphered protection and read write control method for computer data |
CN100449560C (en) * | 2006-09-26 | 2009-01-07 | 南京擎天科技有限公司 | Computer data security protective method |
EP2161673A1 (en) * | 2008-08-26 | 2010-03-10 | ASUSTEK Computer Inc. | Method and system for protecting data |
CN101373457B (en) * | 2007-07-31 | 2010-04-14 | 北京理工大学 | Hard disk write-protection lock based on USB equipment under Windows environment |
CN101464934B (en) * | 2007-12-18 | 2010-12-22 | 中国长城计算机深圳股份有限公司 | Mutual binding and authenticating method for computer platform and storage device, and computer thereof |
CN101236535B (en) * | 2007-07-31 | 2010-12-22 | 北京理工大学 | Hard disk encryption method based on optical disk under Window environment |
CN101236532B (en) * | 2007-07-31 | 2011-06-29 | 北京理工大学 | Hard disk encryption method based on USB equipment under Window environment |
CN102446140A (en) * | 2011-09-02 | 2012-05-09 | 中国联合网络通信集团有限公司 | Data processing method and mobile storage equipment |
CN101741553B (en) * | 2008-11-04 | 2012-07-25 | 翊杰科技股份有限公司 | Method and system for secretly data storing and responding |
CN101632087B (en) * | 2007-01-24 | 2013-02-13 | 哈明头株式会社 | Method, device, and program for converting data in storage medium |
CN103532708A (en) * | 2013-08-14 | 2014-01-22 | 南通腾启电子商务有限公司 | Computer hardware encryption method of encrypting data through combining hardware |
CN103942482A (en) * | 2014-05-13 | 2014-07-23 | 西安邮电大学 | Mainframe security protection method based on embedded type |
CN104484625A (en) * | 2014-12-29 | 2015-04-01 | 北京明朝万达科技有限公司 | Computer with dual operating systems and implementation method thereof |
CN107025388A (en) * | 2016-02-02 | 2017-08-08 | 上海格尔软件股份有限公司 | It is a kind of that the method that system disk is bound with machine is realized based on TPM chips |
CN111045962A (en) * | 2019-12-18 | 2020-04-21 | 湖南国科微电子股份有限公司 | SD card data security method, system, equipment and computer medium |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1101024C (en) * | 1999-08-13 | 2003-02-05 | 王本中 | Method and device for encrypting computer hard disc |
JP2002259867A (en) * | 2001-02-28 | 2002-09-13 | Masataka Hattori | Electronic cash system using usb key |
CN1405686A (en) * | 2001-09-14 | 2003-03-26 | 东维成科技股份有限公司 | System and method for ensuring computer host safety |
CN2610415Y (en) * | 2002-09-24 | 2004-04-07 | 深圳市中数信技术开发有限公司北京分公司 | USB flash electronic disk capable of read-write multiple standard cards |
-
2004
- 2004-10-14 CN CNB2004100649672A patent/CN100389409C/en not_active Expired - Fee Related
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100378689C (en) * | 2005-06-06 | 2008-04-02 | 付爱香 | Enciphered protection and read write control method for computer data |
CN100449560C (en) * | 2006-09-26 | 2009-01-07 | 南京擎天科技有限公司 | Computer data security protective method |
CN101632087B (en) * | 2007-01-24 | 2013-02-13 | 哈明头株式会社 | Method, device, and program for converting data in storage medium |
CN101373457B (en) * | 2007-07-31 | 2010-04-14 | 北京理工大学 | Hard disk write-protection lock based on USB equipment under Windows environment |
CN101236535B (en) * | 2007-07-31 | 2010-12-22 | 北京理工大学 | Hard disk encryption method based on optical disk under Window environment |
CN101236532B (en) * | 2007-07-31 | 2011-06-29 | 北京理工大学 | Hard disk encryption method based on USB equipment under Window environment |
CN101464934B (en) * | 2007-12-18 | 2010-12-22 | 中国长城计算机深圳股份有限公司 | Mutual binding and authenticating method for computer platform and storage device, and computer thereof |
EP2161673A1 (en) * | 2008-08-26 | 2010-03-10 | ASUSTEK Computer Inc. | Method and system for protecting data |
CN101741553B (en) * | 2008-11-04 | 2012-07-25 | 翊杰科技股份有限公司 | Method and system for secretly data storing and responding |
CN102446140A (en) * | 2011-09-02 | 2012-05-09 | 中国联合网络通信集团有限公司 | Data processing method and mobile storage equipment |
CN103532708A (en) * | 2013-08-14 | 2014-01-22 | 南通腾启电子商务有限公司 | Computer hardware encryption method of encrypting data through combining hardware |
CN103942482A (en) * | 2014-05-13 | 2014-07-23 | 西安邮电大学 | Mainframe security protection method based on embedded type |
CN103942482B (en) * | 2014-05-13 | 2017-01-18 | 西安邮电大学 | Mainframe security protection method based on embedded type |
CN104484625A (en) * | 2014-12-29 | 2015-04-01 | 北京明朝万达科技有限公司 | Computer with dual operating systems and implementation method thereof |
CN107025388A (en) * | 2016-02-02 | 2017-08-08 | 上海格尔软件股份有限公司 | It is a kind of that the method that system disk is bound with machine is realized based on TPM chips |
CN111045962A (en) * | 2019-12-18 | 2020-04-21 | 湖南国科微电子股份有限公司 | SD card data security method, system, equipment and computer medium |
CN111045962B (en) * | 2019-12-18 | 2023-06-09 | 湖南国科微电子股份有限公司 | SD card data confidentiality method, system, equipment and computer medium |
Also Published As
Publication number | Publication date |
---|---|
CN100389409C (en) | 2008-05-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1601430A (en) | Method of carrying out hard disk protection by utilizing encryption of main zoning | |
US7725674B2 (en) | Hard drive eraser | |
US9767322B2 (en) | Data transcription in a data storage device | |
KR101311286B1 (en) | Apparatus and method for displaying a watermark on screen | |
CN101477676B (en) | Securing content for playback | |
US8438652B2 (en) | Restricted erase and unlock of data storage devices | |
US20090094698A1 (en) | Method and system for efficiently scanning a computer storage device for pestware | |
US20090222500A1 (en) | Information storage device and method capable of hiding confidential files | |
CN1924752A (en) | Information processing apparatus, information processing method, and program storage medium | |
CN1776563A (en) | File encrypting device based on USB interface | |
CN102831346A (en) | Method and system for file protection | |
US20100138932A1 (en) | Data protecting method and computing apparatus | |
CN100452076C (en) | Method for constructing transparent coding environment | |
CN102073597A (en) | Full disk encryption method of operating system disk based on user identity authentication | |
CN1266617C (en) | Computer data protective method | |
CN101847130A (en) | Logic binding method for preventing PC (personal computer)hard disk information from theft | |
CN1186732C (en) | Method and system for protecting hard disk of computer | |
JP2007206928A (en) | License authentication method and license authentication device | |
CN112711764A (en) | Data reading and writing method and device and electronic equipment | |
Hars | Discryption: Internal hard-disk encryption for secure storage | |
CN1609748A (en) | Method for realizing starting up lock function in network card bootstrap zone | |
CN1609747A (en) | Method for realizing starting up lock function in main guide zone | |
CN100346319C (en) | BIOS layer based linux hard disk data backup and restore method | |
CN1126038C (en) | Dynamic file protecting method | |
CN1949193A (en) | Hardisk protecting system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
DD01 | Delivery of document by public notice |
Addressee: Chaorui Microelectronics Co., Ltd., Suzhou Document name: Notification to Pay the Fees |
|
DD01 | Delivery of document by public notice |
Addressee: Chaorui Microelectronics Co., Ltd., Suzhou Document name: Notification of Termination of Patent Right |
|
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20080521 Termination date: 20141014 |
|
EXPY | Termination of patent right or utility model |