CN1645485A - Method for rapid copying hard disk with protective subareas - Google Patents

Method for rapid copying hard disk with protective subareas Download PDF

Info

Publication number
CN1645485A
CN1645485A CN 200510000556 CN200510000556A CN1645485A CN 1645485 A CN1645485 A CN 1645485A CN 200510000556 CN200510000556 CN 200510000556 CN 200510000556 A CN200510000556 A CN 200510000556A CN 1645485 A CN1645485 A CN 1645485A
Authority
CN
China
Prior art keywords
hard disk
subregion
replicated
protection
duplicate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200510000556
Other languages
Chinese (zh)
Inventor
张兴明
张勇
杨昆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING STARSOFT COMMUNICATION Co Ltd
Original Assignee
BEIJING STARSOFT COMMUNICATION Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING STARSOFT COMMUNICATION Co Ltd filed Critical BEIJING STARSOFT COMMUNICATION Co Ltd
Priority to CN 200510000556 priority Critical patent/CN1645485A/en
Publication of CN1645485A publication Critical patent/CN1645485A/en
Pending legal-status Critical Current

Links

Images

Abstract

A method for quick copying hard disc with protective zone includes converting copied protective zone of hard disc to be normal zone, connecting converted hard disc to copying device for fetching out all data in the disc and copying the data on hard disc to be copied, placing copied hard disc on computer to use processing module in the computer to set normal zone to be protective zone of computer hard disc accounting to designed parameters.

Description

Quick copy has the method for protection subregion hard disk
Technical field
The present invention relates to the method that a kind of quick copy has protection subregion hard disk; be meant that especially a kind of utilization has copying equipment now; hard disk with protection subregion is duplicated totally, and the hard disk that duplicates is provided with, make the hard disk that duplicates have the protection partitioned method.Belong to computer software and computing mechanism technology for making field.
Background technology
Hard disk as the most frequently used in the computing machine also be most important External memory equipment, be used for storage operating system file, a large amount of user profile and significant data.Therefore, the security of hard disk and reliability are most important for the computer user.At present, a lot of computer makers are divided the usefulness of a blocks of data district as operating system backup and user data backup on hard disc of computer when scheduler.Specific technological means is generally all adopted in this data field that is divided out, makes it to be operated system or the user directly visits by software or hardware technology, can not arbitrarily be deleted.This data field is commonly called the protection subregion.
Before dispatching from the factory, the operating system of installing under the environment of plant intactly can be backuped in the protection subregion.In the user uses a computer process, also can visit this protection subregion by the software of special customization, and, operating system or data can be backuped in the protection subregion, also can be from the protection subregion recovery operation system or data.
Above-mentioned protection subregion generally can be produced by following several method:
1) revises the divisional type sign, make it to become self-defining divisional type, thereby make operating system or common software normally not to visit, play hiding effect.The shortcoming of this mode is to shield identification and the visit of some software with rudimentary formatting hard disk function to the protection subregion.And still may directly destroy described protection subregion by these softwares with rudimentary formatting hard disk function.
2) utilize the hard disk areas defencive function that the new standard (as ATA5 and later hard disk standard) of IDE hard disk supported (as Host Protected Area feature---HPA) create the hard disk protection subregion; the protection subregion that utilizes this technology to realize has good security and reliability; can guarantee that most professional software instruments all can't destroy the protection subregion, also can't see the protection subregion even hard disk is articulated on other computing machines.
The hard disk protection subregion of Chuan Jianing has been realized the safeguard protection to operating system and user data by the way, but has brought trouble when producing to computer maker.Because, adopt special technique and can not be discerned by the copying equipment of specialty by the hard disk protection subregion that said method is created.These professional copying equipment only can criterion of identification fdisk, for example: file allocation table (file allocation table, abbreviation FAT), 32 file allocation table (FAT32), NTFS (NewTechnology Filesystem, be called for short NTFS, be that Microsoft company is a kind of brand-new zoned format of Windows NT operating system design), EXT (Extended FileSystem, the file system of standard in the GNU/Linux system) etc. follow the divisional type of open standard, then can't discern for fdisk through special processing.This causes in the computing machine production run, and the copying equipment of specialty can not be correctly copies to and waits to duplicate in the hard disk being replicated partition information on the hard disk and data.
For first kind of protection divisional type, can adopt the method for overall image copying to be produced, owing to need duplicate all disk tracks, therefore can cause the decrease in efficiency of copying.For the protection subregion that second method (HPA) produces, the security feature of its hardware-level causes the copying equipment of all specialties all can not correctly discern, thereby also can't be correctly according to the image file reflex hard disk to be duplicated that is replicated hard disk.
Because how tame copying service provider has,, just need protect a plurality of copying of the various information notifications service provider of subregion if will protect the form of subregion open simply.Obviously, this neither an effective method, also is unfavorable for safety.And; even disclose the form of protection subregion to copying service provider; copying service provider also needs copying equipment is carried out relevant hardware adjustment or upgrading, can cause the change of copying equipment and the increase of production cost like this, makes troubles for the production of computing machine.
Summary of the invention
Fundamental purpose of the present invention provides the method that a kind of quick copy has protection subregion hard disk, need not consider to protect the type of subregion, just can be fast be replicated hard disk the protection subregion and on data content copy to and a plurality ofly wait to duplicate among the hard disk; Simultaneously, need not copying equipment is done any change and upgrading, can not increase the production cost of computing machine.
The object of the present invention is achieved like this:
What will have the protection subregion is replicated hard disk conversion, it is become can be the common subregion of copying recognition of devices; To be connected to copying equipment through the hard disk that is replicated of conversion, and read the full detail that is replicated in the hard disk by described copying equipment, and copy to and wait to duplicate in the hard disk; Be installed on the computing machine duplicating the hard disk of finishing, and start computing machine; Be arranged on processing module in the computing machine when computer starting, according to the parameter of setting, described common subregion is set to the protection subregion of hard disc of computer.
Protection subregion of the present invention can be on hard disk the high-end regional space of logical address.But the present invention is not limited to this; in general; the protection subregion of being mentioned among the present invention can be by revising the hidden partition that subregion sign forms; it also can be any one section free space of hard disk; can be IBM standard subregion in addition through encrypting, or the divisional type of complete user-defined format.
Above-mentioned IBM subregion can be FAT subregion, FAT32 subregion, NTFS subregion, EXT subregion or other full disclosures and zoned format that obtain general support.The IBM subregion here can be made software by the image file of copying equipment and specialty and system discerns, for example GHOST.
In order to make above-mentioned protection subregion to be needed a processing module by traditional copying recognition of devices.For made and comprise above-mentioned any protection subregion be replicated hard disk, use above-mentioned processing module that the protection subregion is changed earlier, enable to be discerned by traditional copying equipment.
The deciphering module of being mentioned among the present invention is a program of finishing deciphering module, and it can be carried out in being set at BIOS (the Basic Input Output System Basic Input or Output System (BIOS)) program space.Also can be set at middle execution of MBR (master's guiding record), can also be arranged on central execution of kernel of master operating system (perhaps secondary operating system), also can not get rid of as on an application program operation and the operating system.No matter where this deciphering module is arranged on, and it all can realize the deciphering to self-defining data protection subregion, makes it to become the IBM subregion of standard.In addition, generally speaking the deciphering module among the present invention can only be used and operated by computer maker or enterprise administrator.
The bios program of being mentioned among the present invention can be traditional BIOS, also can be other the program module of finishing similar functions, for example EFI (Extensible Firmware Interface by the leading exploitation of Intel, is used for substituting traditional BIOS).
Through the subregion all on the hard disk that is replicated after the above-mentioned deciphering module processing all is IBM standard subregion, all can correctly be discerned by traditional copying equipment.Can be written in all dishes certainly by the image file that will be replicated in the hard disk in batches by copying equipment, the method for this batch duplicating is not limited by the present invention, and it can adopt following several method to realize the batch process of waiting to duplicate hard disk:
1) by professional disk copy machine, can comprise partition information and data message in the hard disk and get on being replicated, and make and wait to duplicate hard disk and be replicated the form that hard disk is consistent at the hard disk to be duplicated that the image file of interior formation once or repeatedly copies to the polylith blank.
2) method by network copy, can comprise partition information and data message in the hard disk and once or repeatedly copy to blank hard disk to be duplicated at the image file of interior formation by network and get on being replicated, and make and wait to duplicate hard disk and be replicated the form that hard disk is consistent.
After passing through the soft flow process of disk copy machine or network filling; all waits that duplicating hard disk all keeps the form consistent with being replicated hard disk; but during this time; because the self-defining data district (just protecting subregion) that remains to be duplicated in the hard disk is in decrypted state; can be operated system and the user visits, thereby be to be in unsafe state.Therefore, during this time, need a processing module to come again that visible and addressable self-defining data district reverts to initial state with this.The processing module of being mentioned among the present invention is finished this work exactly; when computing machine starts for the first time, (generally be on the production line of computer maker, to start for the first time; because carry out computer diagnosis), processing module can be automatically with and the self-defining data district that is decrypted into the IBM subregion of standard encrypt again and form the protection subregion.Protection subregion described here can not wherein can be preserved the image file or the user data of operating system by user and/or operating system visible and visit.When the user took this computing machine, this encrypted self-defining data district can become the protection subregion on user's hard disk, and wherein the data of Bao Cuning can not be discerned by user or operating system, unless just adopt special software can visit it.
In the present invention, above-mentioned processing module can be arranged among the BIOS, also can be arranged among the MBR, can also be arranged in the kernel of master operating system (perhaps secondary operating system), also can not get rid of as on an application program operation and the operating system.
In the present invention, above-mentioned processing module is when the computing machine of waiting to duplicate the hard disk place starts for the first time, can judge the current state of waiting to duplicate the self-defining data district of hard disk automatically, in case find that waiting to duplicate hard disk self-defining data district is in decrypted state, just immediately it is encrypted, to guarantee the security in self-defining data district.Do not limit processing module in principle by automatically actuated opportunity, but for security consideration, recommendation is arranged on processing module among the BIOS, can obtain the control to system like this when computing machine one starts, to realize treating the encryption acts of duplicating hard disk self-defining data district as early as possible.
By said method provided by the present invention; can solve computer maker production well and have the problem that hard-disk system faced of protecting subregion; can be under the situation that does not change existing production procedure of production firm and technology; can be quick; duplicate efficiently and have the hard-disk system of protecting subregion; improve the production efficiency of computing machine, guaranteed the security quality of computing machine.
Description of drawings
Fig. 1 is for realizing the transfer process process flow diagram in self-defining data of the present invention district;
Fig. 2 is the process flow diagram of copying of the present invention;
Fig. 3 for the present invention by copying device replication hard disk and be provided with the protection subregion process flow diagram;
Fig. 4 makes the process flow diagram that duplicates image file for the present invention;
Fig. 5 is the embodiment process flow diagram that another adopts the network copy method to duplicate of the present invention;
Fig. 6 will be provided with the process flow diagram of protection subregion by the hard disk that network mode is duplicated for the present invention.
Embodiment
The present invention is described in further detail below in conjunction with accompanying drawing and specific embodiment:
Have the self-defining data district being replicated hard disk, and be in encrypted state, promptly become a kind of protection subregion.At this moment, user program and/or operating system all can't be visited the protection subregion.
Referring to Fig. 1; duplicate when production is above-mentioned to have protection subregion hard disk; can be earlier be connected to one and have on the computing machine of subregion transfer capability being replicated hard disk; start the computing machine that this is replicated the hard disk place; and after starting successfully; load and move a deciphering module; the task of this deciphering module is that described self-defining data district (promptly protecting subregion) changed; the district is converted to common subregion with described self-defining data; this common subregion can be any zoned format that can be copying recognition of devices and reading of data, for example: FAT; FAT32; NTFS; EXT etc.
Through above-mentioned processing, being replicated hard disk can be discerned by copying equipment, and, the self-defining data district that is replicated in the hard disk is in decrypted state, can be by being replicated hard disc apparatus or other image file tools are correctly discerned, and can be duplicated into be a disk image file.
Referring to Fig. 2, copying process of the present invention is identical with existing copying process, and this is owing to adopted above-mentioned treatment step, a hard disk with protection subregion is converted to have common subregion hard disk.On this basis, copying equipment need not to do any change or upgrading just can be correctly to its identification, and carry out replicate run, with being replicated all information reproductions in the hard disk in the hard disk of a plurality of blank, finishes the preliminary replication work of the present invention.
Referring to Fig. 3; duplicate the hard disk finished and to be replicated hard disk the same before being converted in order to make; be one to have the hard disk of protection subregion, should make that duplicating the hard disk of finishing has not by the protection subregion of user and/or operating system access handling through the above-mentioned hard disk that duplicates.Concrete way is that the self-defining data district of duplicating in the hard disk of finishing is handled, and revises its zoned format parameter, makes it become the protection subregion.A concrete treatment step is:
Move a processing module (its effect is that the protection subregion is revised as in described self-defining data district) by after the automatic operation, processing module judges automatically whether duplicate the self-defining data district that finishes in the hard disk is in encrypted state (promptly whether for protecting subregion).If then processing module withdraws from automatically.Otherwise processing module is just made amendment to the self-defining data district that is in common subregion state, makes it become the protection subregion.After encryption was finished, processing module just withdrawed from automatically.
Through above-mentioned a series of processing, the self-defining data district that is replicated in the hard disk is waited to duplicate in the hard disk by copying to of success, and the self-defining data district that waits to duplicate in the hard disk is modified to the protection subregion, is in encrypted state.When computer sale was given the user, this user can't see also destroying the self-defining data district that this has become the protection subregion.
Above-mentioned processing module can be arranged among the BIOS, also can be in MBR, can also be in the kernel of operating system, even can be an application program that runs on the operating system.In order to realize better safe effect and production efficiency, preferred scheme is that processing module is arranged among the BIOS.Like this, when computer power supply is opened, processing module among the BIOS obtains the control of whole computer system prior to other equipment, and before any other software or system start-up (except BIOS), realizes that treating the self-defining data district of duplicating in the hard disk changes.
In the production procedure of network copy, utilize the present invention to realize the another one example of the automatic encryption in self-defining data district referring to Fig. 4, Fig. 5, Fig. 6.
As shown in Figure 4, at first the whole magnetic disk image file that is replicated hard disk to be made and become an image file, therefore, at first to start and articulate the computing machine that is replicated hard disk, at this moment, the self-defining data district that is replicated in the hard disk is common subregion, can utilize Ghost (Symantec Ghost, a kind of instrument that is used for disk image documenting and reduction) or similar tool software to make the complete disk image file that is replicated hard disk.After image file completes, just image file can be uploaded on the image file storage server; Perhaps, the image file that is replicated hard disk is burnt on the CD of a blank.So far, being replicated the hard disk image documenting finishes.
Referring to Fig. 5,6, be made into image file when being replicated hard disk, and after being saved on the image file storage server.The hard disk to be duplicated of blank can be assembled in the new computing machine this moment, and open the power supply of new computer.
Adopting network can software or data are this when waiting to duplicate the hard disk manufacture mode, general all can be in waiting to duplicate the computing machine at hard disk place network interface card of assembling, this network interface card can be supported PXE (PrebootExecution Environment, agreement by a kind of remote activation of Intel exploitation) agreement may not supported yet.For the network interface card of supporting the PXE agreement, can be connected to the image file storage server by the PXE agreement and download the image file that is replicated hard disk.If do not support PXE, then can start the computing machine of waiting to duplicate the hard disk place, and be arranged to be connected to the image file server by the mode of CD or floppy disk.Can also will be replicated the hard disk image file copy from CD duplicates in the hard disk to waiting.No matter the sort of mode can be waited to each to duplicate in the hard disk with being replicated the hard disk image file copy, and makes and wait to duplicate hard disk and be replicated the form that hard disk is consistent.When duplicate finish after, move above-mentioned processing module, the protection subregion is revised as in the self-defining data district that waits to duplicate in the hard disk, finish whole reproduction process.
It should be noted that at last: above embodiment only in order to the explanation the present invention and and unrestricted technical scheme described in the invention; Therefore, although this instructions has been described in detail the present invention with reference to each above-mentioned embodiment,, those of ordinary skill in the art should be appreciated that still and can make amendment or be equal to replacement the present invention; And all do not break away from the technical scheme and the improvement thereof of the spirit and scope of the present invention, and it all should be encompassed in the middle of the claim scope of the present invention.

Claims (8)

1, a kind of quick copy has the method for protection subregion hard disk, it is characterized in that:
Step 1: what will have the protection subregion is replicated hard disk conversion, it is become can be the common subregion of copying recognition of devices;
Step 2: will be connected to copying equipment through the hard disk that is replicated of conversion, and read the full detail that is replicated in the hard disk by described copying equipment, and copy to and wait to duplicate in the hard disk;
Step 3: will duplicate the hard disk of finishing and be installed on the computing machine, and start computing machine; Be arranged on processing module in the computing machine when computer starting, according to the parameter of setting, described common subregion is set to the protection subregion of hard disc of computer.
2, quick copy according to claim 1 has the method for protection subregion hard disk, and it is characterized in that: the described conversion of step 1 is that the boot section data that are replicated hard disk are made amendment, and makes parameter wherein consistent with described common subregion.
3, quick copy according to claim 1 and 2 has the method for protection subregion hard disk; it is characterized in that: step 2 is described duplicate be be replicated comprise in the hard disk partition information and data message the image file of interior formation once or repeatedly copy to the polylith blank wait duplicate in the hard disk, and make that waiting to duplicate hard disk is being replicated the back and is being replicated hard disk and is consistent.
4, quick copy according to claim 1 and 2 has the method for protection subregion hard disk; it is characterized in that: step 2 is described duplicates is to comprise partition information and data message in the hard disk and once or repeatedly copy to blank waiting at the image file of interior formation by network and duplicate in the hard disk being replicated, and makes hard disk to be duplicated be replicated the back and be replicated hard disk and be consistent.
5, quick copy according to claim 1 and 2 has the method for protection subregion hard disk, it is characterized in that: the first state to current fdisk when computer starting of processing module described in the step 3 detects, if there is the common subregion to be modified to the protection subregion in the described hard disk, then described common subregion is revised as the protection subregion that to be discerned by user program or operating system; Otherwise described processing module is left intact.
6, quick copy according to claim 5 has the method for protection subregion hard disk, and it is characterized in that: described modification is to make amendment finishing the boot section data of duplicating hard disk, makes parameter wherein consistent with the protection subregion of described setting.
7, quick copy according to claim 5 has the method for protection subregion hard disk; it is characterized in that: the described processing module of step 3 is arranged among bios program or the program MBR; perhaps be arranged in the kernel of master operating system or secondary operating system, perhaps directly install and run on the described operating system as application program.
8, quick copy according to claim 1 and 2 has the method for protection subregion hard disk, it is characterized in that: FAT, the FAT32 that described common subregion is a standard, NTFS or EXT subregion.
CN 200510000556 2005-01-10 2005-01-10 Method for rapid copying hard disk with protective subareas Pending CN1645485A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200510000556 CN1645485A (en) 2005-01-10 2005-01-10 Method for rapid copying hard disk with protective subareas

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200510000556 CN1645485A (en) 2005-01-10 2005-01-10 Method for rapid copying hard disk with protective subareas

Publications (1)

Publication Number Publication Date
CN1645485A true CN1645485A (en) 2005-07-27

Family

ID=34875078

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200510000556 Pending CN1645485A (en) 2005-01-10 2005-01-10 Method for rapid copying hard disk with protective subareas

Country Status (1)

Country Link
CN (1) CN1645485A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102142066A (en) * 2010-02-03 2011-08-03 研祥智能科技股份有限公司 Computing equipment and backup recovery method thereof
CN102799484A (en) * 2012-07-11 2012-11-28 中兴通讯股份有限公司 Method and device for running multiple operating systems by mobile terminal
CN105373339A (en) * 2014-08-29 2016-03-02 深圳市金胜电子科技有限公司 Hard disk data copy method and system
CN113177217A (en) * 2019-03-15 2021-07-27 神讯电脑(昆山)有限公司 Method and system for copying file

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102142066A (en) * 2010-02-03 2011-08-03 研祥智能科技股份有限公司 Computing equipment and backup recovery method thereof
CN102799484A (en) * 2012-07-11 2012-11-28 中兴通讯股份有限公司 Method and device for running multiple operating systems by mobile terminal
CN102799484B (en) * 2012-07-11 2017-11-03 中兴通讯股份有限公司 The method and device of running of mobile terminal multiple operating system
CN105373339A (en) * 2014-08-29 2016-03-02 深圳市金胜电子科技有限公司 Hard disk data copy method and system
CN113177217A (en) * 2019-03-15 2021-07-27 神讯电脑(昆山)有限公司 Method and system for copying file

Similar Documents

Publication Publication Date Title
CN1296835C (en) Apparatus and method for controlling booting operation of computer system
US8489552B1 (en) Generic granular restore of application data from a volume image backup
US7953948B1 (en) System and method for data protection on a storage medium
US7509530B2 (en) Method and system for use in restoring an active partition
US20100005531A1 (en) Isolated multiplexed multi-dimensional processing in a virtual processing space having virus, spyware, and hacker protection features
US8028158B1 (en) Method and apparatus for creating a self booting operating system image backup on an external USB hard disk drive that is capable of performing a complete restore to an internal system disk
CN102193817B (en) Simplify the management of physics and virtual deployment
US8037026B1 (en) Protected user-controllable volume snapshots
US7694169B2 (en) Restoring a client device
US20090019245A1 (en) Methods for implementation of data formats on a removable disk drive storage system
KR100978425B1 (en) Method of optimising the performance of a computer and a main non-volatile memory unit optimised using specific-use sections
US20070033361A1 (en) Apparatus, system, and method for fastcopy target creation
CN1297907C (en) Realization method of computer hard disk data restoring and back-up
AU2005248713A2 (en) Isolated multiplexed multi-dimensional processing in a virtual processing space having virus, spyware, and hacker protection features
CN101996109A (en) Computer system, control method thereof and recording medium storing computer program thereof
CN1645485A (en) Method for rapid copying hard disk with protective subareas
CN101236499A (en) Method for embedding inner core drive program in Window operation system by USB apparatus start-up
CN1991833B (en) File system and file information processing method
WO2005111809A1 (en) File management device, file management method, file management program, and computer-readable recording medium containing the file management program
CN1198209C (en) PC system and method for protecting BIOS
CN1317650C (en) Method for automatically recovering BIOS based on hard disk protective space
EP3910485B1 (en) Electronic data management device, electronic data management system, program therefor, and recording medium
JP2005506632A (en) Security device for mass storage devices
CN100547550C (en) Install and be written into the system and method for installation system supervisory routine behind the operating system of user
JP6559984B2 (en) Digital evidence creation device, digital evidence creation system, and digital evidence creation program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication