CN1952832A - Computer system and method for protecting backup data - Google Patents

Computer system and method for protecting backup data Download PDF

Info

Publication number
CN1952832A
CN1952832A CN 200510109367 CN200510109367A CN1952832A CN 1952832 A CN1952832 A CN 1952832A CN 200510109367 CN200510109367 CN 200510109367 CN 200510109367 A CN200510109367 A CN 200510109367A CN 1952832 A CN1952832 A CN 1952832A
Authority
CN
China
Prior art keywords
storage device
computer system
backup data
basic input
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200510109367
Other languages
Chinese (zh)
Inventor
谢安邦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lite On Technology Corp
Original Assignee
Lite On Technology Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lite On Technology Corp filed Critical Lite On Technology Corp
Priority to CN 200510109367 priority Critical patent/CN1952832A/en
Publication of CN1952832A publication Critical patent/CN1952832A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Techniques For Improving Reliability Of Storages (AREA)

Abstract

This invention provides one computer system and method to protect backup data, which comprises the following steps: firstly providing one first memory device to store the backup data at close status in normal situation to make the operation system directly read first memory device; then through basic output and input system controlling the master board leg to control the first memory device start and close; then through one application program software system management to interrupt the system to start first memory device to copy the second backup data to first device.

Description

The computer system and the method for protection Backup Data
Technical field
The invention relates to computing machine, especially about Data Protection in the computing machine.
Background technology
Because popularizing of personal computer, computing machine have become everybody work the every day necessary equipment and the main medium of recreation.Also just because of computing machine is so important and be the indispensable part of personal lifestyle, when suffering computer virus or hacker's program, computing machine invades, even make when stored corrupted data can't be started shooting in the computing machine, individual's work just sinks into to stop with life, and suffers great inconvenience.Therefore how to protect computing machine not to be subjected to the attack of computer virus or hacker's program,, just become one of hot issue of present information circle even how recovery system damages to reduce or to prevent after the attack that suffers computer virus or hacker's program.
Computer virus briefly, is that program sees through approach such as magnetic sheet, file transfer, program itself is duplicated and is propagated, and cause computing machine or peripheral malfunctioning, Rogue program and data etc. even by the instruction in the program.Computer virus can be borrowed computing machine infect computers when reading magnetic sheet or discs, also may when connecting to network, borrow by computing machine the network connectivity infect computers, carry the download Virus when for example borrowing the user to read webpage secretly, perhaps also may borrow Email to carry Virus secretly.As for the infection target of computer virus can comprise executable file, system file configuration table (file allocationtable, FAT), the start magnetic region of Word file file even system.FAT put down in writing is which file on the disk is placed on and troops under (cluster); When FAT suffers virus damage, the file on the disk will be disorderly and unsystematic, and can't find out the correct position of file.And the infection target of starting-up type virus is the start magnetic region and the hard disk cut section of system, in case the start magnetic region of store operation system is subjected to virus damage, operating system can't be written into, thereby computing machine can't be started shooting.
About preventing that computing machine from suffering the attack of computer virus or hacker's program, existing at present for counting extremely many antivirus softwares.Though antivirus software truly has the function of taking precautions against virus, yet still has careless omission, computing machine is taken place often by the situation of virus attack.Therefore the function that still need possess system recovery is to reduce or to exempt the infringement of the system after the attack that suffers computer virus or hacker's program.
About the method for the system of recovering to be subjected to virus damage, industry has proposed many settling modes.Present solution majority is that planning one block space is with the usefulness as the backup of the significant data of hard disk and system in hard disk, and the user can rely on application program carry out the backup of data in operating system.In the time of can't normal operation in case computing machine suffers virus attack, then can be with institute's backed up data reduction before entering operating system, but so just normal operation of computing machine.Yet if the hard disk cut section suffers the destruction of virus, because the data of hard disk cut section are removed, therefore hard disk is just as the new hard disk of data, and the Backup Data that then originally was stored in the hard disk also can't be read, thereby can't recover to be subjected to the system of virus damage.
Summary of the invention
In view of this, the object of the present invention is to provide a kind of computer system and method for protecting Backup Data not to be subjected to the infringement of computer virus and hacker's software, so that protect for backed up data.The access that stores the device of Backup Data can be independent of operating system, so that this device is hidden in operating system, as not being present in the operating system, can prevent that just virus from relying on the destruction of operating system execution for Backup Data.Also can be made as anti-writing in the operating system,, just can prevent the destruction of virus for Backup Data to stop any write activity of in operating system, carrying out with storing being installed on of Backup Data.
The invention provides a kind of guard method of Backup Data of computer system.This method comprises the following steps: at first, provides one first storage device to store the Backup Data of this computer system, and this first storage device is closed condition at ordinary times, so that the operating system of this computer system can't this first storage device of direct access.Then by basic input/output system (basic input output system BIOS) controls a pin position on the motherboard of this computer system, with the startup of controlling this first storage device with close (enable/disable).Then call out this basic input/output system through software system management interruption (software system management interrupt) and start this first storage device, to back up this Backup Data to this first storage device from one second storage device by an application program., to this first storage device, see through this basic input/output system of software system management interrupt call and close this first storage device in this Backup Data of backup.
The method of the Backup Data of protection computer system of the present invention, during the corrupted data that more comprises the following steps: in this second storage device, to store, start this first storage device by this basic input/output system, to recover this Backup Data to this second storage device in this first storage device certainly; And, close this first storage device by this basic input/output system in recovering this Backup Data to this second storage device.
The method of the Backup Data of protection computer system of the present invention, this pin position are a pin position of a south bridge wafer set of this computer system, and this pin position is coupled to a controller of this first storage device.
The method of the Backup Data of protection computer system of the present invention, this recovering step be a user by this computer system when start by next hot key, to carry out this recovering step.
The method of the Backup Data of protection computer system of the present invention, this recovering step are when finding to read the program of this operating system in this second storage device by when start, and automatically perform this recovering step by this computer system.
The method of the Backup Data of protection computer system of the present invention, this first storage device is a flash disc.
The method of the Backup Data of protection computer system of the present invention, this second storage device is a hard disk.
The method of the Backup Data of protection computer system of the present invention, one of them is coupled to this motherboard to this first storage device via ide interface, USB interface or pci interface.
The present invention provides a kind of guard method of Backup Data of computer system in other.This method comprises the following steps: at first, provides one first storage device to store the Backup Data of this computer system, and this first storage device is write state, this first storage device so that the operating system of this computer system can't be write direct for anti-at ordinary times.Then, by basic input/output system (basic input output system BIOS) controls a pin position on the motherboard of this computer system, with control this first storage device allow write and anti-write (writable/write protect).Then call out this basic input/output system through software system management interruption (software system management interrupt) this first storage device is made as the permission write state, to back up this Backup Data to this first storage device from one second storage device by an application program., to this first storage device, see through this basic input/output system of software system management interrupt call this first storage device is made as the anti-state of writing in this Backup Data of backup.
The method of the Backup Data of protection computer system of the present invention during the corrupted data that more comprises the following steps: to store, is recovered this Backup Data certainly to this second storage device in this first storage device in this second storage device.
The method of the Backup Data of protection computer system of the present invention, this pin position are a pin position of a south bridge wafer set of this computer system, and this pin position is coupled to a controller of this first storage device.
The method of the Backup Data of protection computer system of the present invention, this recovering step be a user by this computer system when start by next hot key, to carry out this recovering step.
The method of the Backup Data of protection computer system of the present invention, this recovering step are when finding to read the program of this operating system in this second storage device by when start, and automatically perform this recovering step by this computer system.
The method of the Backup Data of protection computer system of the present invention, this first storage device is a flash disc.
The method of the Backup Data of protection computer system of the present invention, this second storage device is a hard disk.
The method of the Backup Data of protection computer system of the present invention, one of them is coupled to this motherboard to this first storage device via ide interface, USB interface or pci interface.
The present invention is in a kind of computer system of protecting Backup Data also is provided.This computer system comprises: and a central processing unit (central processing unit, CPU), in order to the computing of handling this computer system and the running of controlling this computer system.One first storage device, in order to store the Backup Data of this computer system, this first storage device is closed condition at ordinary times, so that the data of the operating system of this computer system in can't this first storage device of direct access.One first storage device controller is coupled to this first storage device, in order to the startup of controlling this first storage device with close.One south bridge wafer set (south bridge chip-set), be coupled between this central processing unit and this first storage device controller, in order to a basic input/output system (the basic input output system that receives this computer system, BIOS) see through the order that this CPU (central processing unit) produces, a pin position that is coupled to this first storage device controller by this south bridge wafer set with the startup of controlling this first storage device with close (enable/disable).Wherein this computer system sees through software system management by an application program and interrupts (software system management interrupt) and call out this basic input/output system and start this first storage device when Backup Data, to back up this Backup Data to this first storage device from one second storage device; And in backing up this Backup Data to this first storage device, this computer system sees through this basic input/output system of software system management interrupt call and closes this first storage device.
The computer system of protecting Backup Data of the present invention, when the corrupted data that stores in this second storage device, this computer system starts this first storage device by this basic input/output system, to recover this Backup Data to this second storage device in this first storage device certainly; And in recovering this Backup Data to this second storage device, this computer system is closed this first storage device by this basic input/output system.
The computer system of protecting Backup Data of the present invention, this first storage device is a flash disc.
The computer system of protecting Backup Data of the present invention, this second storage device is a hard disk.
The computer system of protection Backup Data of the present invention and method can stop computer virus and the hacker's software destruction for Backup Data fully.
Description of drawings
Fig. 1 is the computer system according to the protection Backup Data of the embodiment of the invention;
Fig. 2 is the backup method according to the Backup Data of the computer system of the embodiment of the invention;
Fig. 3 is according to the restoration methods of the Backup Data of the computer system of the embodiment of the invention.
Embodiment
For above-mentioned and other purposes, feature and advantage of the present invention can be become apparent, several preferred embodiments cited below particularly, and cooperate appended diagram, be described in detail below:
For embodiments of the invention are described, the explanation of summary is done by elder generation to wafer set on the motherboard and the relation between central processing unit before introducing embodiment.Wafer set (chipset) is divided into north bridge, south bridge (south-bridge and north-bridge), and north bridge is specially taken charge of communication and the management between central processing unit (CPU) and display and storer; South bridge then is responsible for the connection of peripheral equipment, for example storage facilities (soft or hard dish, cd cd-ROM and CD writer etc.), network function, and provide pci interface to expand the more peripheral equipments of connection, south bridge also provides usb connecting port.The peripheral equipment part, except the signal that connects screen be responsible for by north bridge, printer, equipment for surfing the net, loudspeaker and multimedia audio etc., the I/O device that all are peripheral nearly all is responsible by south bridge.As for south bridge want and central processing unit between link up, then must be connected to central processing unit through north bridge.
Fig. 1 is the computer system according to the protection Backup Data of the embodiment of the invention.This computer system comprises that one is independent of the storage device 100 outside the hard disk 112 of the program of the operating system that stores this computer system and data, to store the Backup Data of this computer system.The south bridge wafer set (south-bridgechipset) 106 that this storage device 100 sees through on the motherboard couples with central processing unit (CPU) 102.Wherein south bridge wafer set 106 is to see through north bridge wafer set (north-bridge chipset) 104 to couple with central processing unit 102.In present embodiment, storage device 100 with a flash disc (flash disk) 110 for example.Storage device 100 still comprises a flash disc controller (flash disk controller) 108, the access action of these flash disc controller 108 may command flash discs 110 internal datas.And central processing unit 102 can be via south bridge wafer set 106 control flash disc controllers 108 with the data in the access flash dish 110, wherein the startup of A1 pin position (pin) the may command flash disc controller 108 of south bridge wafer set 106 with close (enable/disable) or allow to write and anti-write (writable/write protect).Certainly, the annexation of each element only for usefulness for example, can depending on the circumstances or the needs of the situation be changed in the present embodiment.And storage device 100 also is not limited to flash disc, and the storage device of other kenels also can apply to the present invention.In addition, storage device 100 might not directly be coupled to the pin position of south bridge wafer set 106; Storage device 100 can rely on can couple peripheral device to the interface of any kenel of motherboard to be connected to south bridge wafer set 106 or central processing unit 102, for example IDE (IntegratedDrive Electronics) interface, USB (Universal Serial Bus) interface or PCI (Peripheral Component Interconnect) interface.
Then please refer to Fig. 2.Fig. 2 is the backup method 200 according to the Backup Data of the computer system of the embodiment of the invention.Can rely on an application executing method 200, supply the usefulness of data recovery with the significant data of backup hard disk 112 and system.At first in step 202, start application program.Application program is in case start, just can interrupt as calling out software system management as in the step 204 (software system management interrupt, softwareSMI).
(system management interrupt SMI) is the highest interruption of priority of the x86 series central processing unit of Intel Company to system management interrupt.When central processing unit is received system management interrupt, the work that operating system is being carried out can suspend to be carried out, the state parameter of these work and execution thereof can be stored earlier, central processing unit can be delivered control to basic input/output system (basic inputoutput system by operating system then, BIOS) (the SystemManagement memory of the system-managed storage in the storer, SMRAM) zone is with first handles system management interrupt event.This moment system enter System Management Mode (System Management Mode, SMM).And because operating system is only used primary memory, can't access system diode-capacitor storage SMRAM zone, so operating system can't be learnt work performed in the System Management Mode fully.The wait interrupt event disposes, and can revert to the state before interrupting according to the state parameter work that operating system is performed of storage in advance, again the control of central processing unit is given operating system.In generally speaking, system management interrupt is used for power management (power management) mostly and detects (virus checking) with virus.In addition, system management interrupt can be divided for the system management interrupt of being called out by hardware, and by the system management interrupt of software call.What embodiments of the invention used, the latter's software system management interrupts just.
In case application program is the calling system management interrupt in step 204, system just enters System Management Mode as mentioned above, and the control of central processing unit 102 is transferred to BIOS by operating system.Just can rely on this moment BIOS to start the flash disc 110 in the storage device 100 in step 206, the mode that starts flash disc can be the A pin position that south bridge wafer set 106 control flash disc controllers 108 are opened and closed and is made as logical one.So flash disc 110 just starts (enable) or enters and allows to write (writable) pattern.This moment application program just can be in step 208 with the important data backup of hard disk 112 and system to flash disc 110, for the usefulness of data recovery in the future.If in step 210, important data backup is finished, just can be in step 212 calling system management interrupt once more, make system enter System Management Mode, and the control of central processing unit 102 transferred to BIOS by operating system.Then, rely on BIOS to close the flash disc 110 in the storage device 100 in step 214, the mode of closing flash disc can be the A1 pin position that south bridge wafer set 106 control flash disc controllers 108 are opened and closed and is made as logical zero.So flash disc 110 is just closed (disable) or is entered anti-(write protect) pattern of writing.Closing flash disc or make the anti-purpose of writing of flash disc, is in order to prevent that the virus or the trojan horse program of invading operating system from can destroy for the Backup Data in the flash disc 110 by means of the execution of operating system.If flash disc 110 is set as closed condition, then operating system can not get the response of flash disc when the state of poll (polling) peripheral device, just the existence of imperceptible at all flash disc 110, and virus or hacker's program also can't be learnt flash disc 110 certainly, more can't destroy data wherein.If flash disc 110 is set as the anti-state of writing, then operating system also can't be carried out the action that writes to flash disc, so virus or hacker's program also can't be borrowed certainly and write flash disc 110 and destroy wherein data.Like this then in the flash disc 110 stored hard disk and system backup data can not suffer the infringement of computer virus and hacker's software fully.Close in step 214 after the flash disc, system will jump out System Management Mode, and the control of central processing unit 102 is given operating system by BIOS.At last because the work of Backup Data finishes, but in step 216 just end application.
Then please refer to Fig. 3.Fig. 3 is the restoration methods 300 according to the Backup Data of the computer system of the embodiment of the invention.Suppose that the data in computer system this moment have suffered the infringement of computer virus and hacker's software and damage is arranged.Therefore this moment, the user may realize the damaged condition of data in the computer system, and attempted start again in step 302, to carry out the recovery of Backup Data.After starting shooting, at first in step 304, carry out start test (Power on self test) by BIOS.After the start test of BIOS is finished, just can in step 306, judge whether to carry out the action that data are recovered.Can judge whether that voluntarily the data of computer system suffer the virus damage and need to carry out the action that data are recovered this moment by the user.The predeterminable hot key of system (hot key), if the user presses this hot key when start, then system thinks that just the user requires to carry out the action that data are recovered.Do not recover action if need not carry out data in step 306, that is do not receive the information that hot key is pressed, BIOS is convenient to close in the step 310 flash disc 110.So flash disc 110 is just closed (disable) or is entered anti-(write protect) pattern of writing.Recover action if need to carry out data in step 306, that is system receives the information that hot key is pressed, this moment, BIOS was convenient to start flash disc 110 in the step 308, so that the system backup data in the flash disc 110 are returned in the hard disk 112.The mode that starts flash disc can be the A1 pin position that south bridge wafer set 106 control flash disc controllers 108 are opened and closed and is made as logical one.Then flash disc 110 can return to the system backup data in the hard disk 112.
If flash disc has returned the data in the hard disk 112 to deposit and finished in step 308, BIOS just can close flash disc 110 in step 310.The mode of closing flash disc can be the A1 pin position that south bridge wafer set 106 control flash disc controllers 108 are opened and closed and is made as logical zero.So flash disc 110 is just closed (disable) or is entered anti-(write protect) pattern of writing.Closing flash disc or make the anti-purpose of writing of flash disc, is in order to prevent that the virus or the trojan horse program of invading operating system from can destroy for the Backup Data in the flash disc 110 by means of the execution of operating system.
Then just can in step 312, operating system be loaded in the primary memory from hard disk 112.This moment if virus damage the start magnetic region on the hard disk 112, recover to carry out data and in step 306, press hot key as yet by the user, the program of operating system just can't be loaded into primary memory, also can't normally carry out.Therefore when in step 314, detecting this situation, also can get back to step 308 automatically and carry out the action that data are recovered to borrow BIOS by system.If hard disk start magnetic region is not destroyed in step 314, and operating system normally is written into primary memory, just can be in step 316 executive operating system.So the start step is finished, and just can complete execution recovers not to be subjected to the method 300 of Backup Data of the infringement of computer virus and hacker's software in start-up phase.
Therefore, the present invention provides a kind of Backup Data of protecting computer system not to be subjected to the method and apparatus of the infringement of computer virus and hacker's software in embodiment.The present invention is independent of the storage device of Backup Data outside the hard disk of stocking system data, and gets rid of the access of operating system for Backup Data.When needs with data backup to storage device the time, application program can be passed through the calling system management interrupt, to start storage device with Backup Data by BIOS.And restore data also can be carried out by BIOS when start to the work of hard disk., all can close storage device or it is made as anti-writing after data backup or the recovery owing to be finished by BIOS; Thereby for operating system, the storage device of Backup Data can be hidden fully as not existing, or operating system can't be carried out write activity to it.Therefore can stop computer virus and hacker's software destruction fully for Backup Data.
The above only is preferred embodiment of the present invention; so it is not in order to limit scope of the present invention; any personnel that are familiar with this technology; without departing from the spirit and scope of the present invention; can do further improvement and variation on this basis, so the scope that claims were defined that protection scope of the present invention is worked as with the application is as the criterion.
Being simply described as follows of symbol in the accompanying drawing:
100: storage device
102: central processing unit
104: the north bridge wafer set
106: the south bridge wafer set
108: the flash disc controller
110: flash disc
200: the method for Backup Data
300: the method for restore data.

Claims (12)

1. a method of protecting the Backup Data of computer system is characterized in that, the method for the Backup Data of described protection computer system comprises the following steps:
Provide one first storage device to store the Backup Data of this computer system, this first storage device is closed condition at ordinary times, so that the operating system of this computer system can't this first storage device of direct access;
Control the pin position on the motherboard of this computer system by basic input/output system, with the startup of controlling this first storage device with close;
See through this basic input/output system of software system management interrupt call by an application program and start this first storage device, to back up this Backup Data to this first storage device from one second storage device; And
, to this first storage device, see through this basic input/output system of software system management interrupt call and close this first storage device in this Backup Data of backup.
2. the method for the Backup Data of protection computer system according to claim 1 is characterized in that, more comprises the following steps:
When the corrupted data that stores in this second storage device, start this first storage device by this basic input/output system, to recover this Backup Data to this second storage device in this first storage device certainly; And
In recovering this Backup Data to this second storage device, close this first storage device by this basic input/output system.
3. the method for the Backup Data of protection computer system according to claim 1 is characterized in that, this pin position is a pin position of a south bridge wafer set of this computer system, and this pin position is coupled to a controller of this first storage device.
4. the method for the Backup Data of protection computer system according to claim 2 is characterized in that, this recovering step be a user by this computer system when start by next hot key, to carry out this recovering step.
5. the method for the Backup Data of protection computer system according to claim 2; it is characterized in that; this recovering step is when finding to read the program of this operating system in this second storage device by when start, and automatically performs this recovering step by this computer system.
6. a method of protecting the Backup Data of computer system is characterized in that, the method for the Backup Data of described protection computer system comprises the following steps:
Provide one first storage device to store the Backup Data of this computer system, this first storage device is write state, this first storage device so that the operating system of this computer system can't be write direct for anti-at ordinary times;
Control the pin position on the motherboard of this computer system by basic input/output system, to control allowing to write and writing of this first storage device with anti-;
See through this basic input/output system of software system management interrupt call by an application program this first storage device is made as the permission write state, to back up this Backup Data to this first storage device from one second storage device; And
, to this first storage device, see through this basic input/output system of software system management interrupt call this first storage device is made as the anti-state of writing in this Backup Data of backup.
7. the method for the Backup Data of protection computer system according to claim 6 is characterized in that, more comprises the following steps:
When the corrupted data that stores in this second storage device, recover this Backup Data certainly in this first storage device to this second storage device.
8. the method for the Backup Data of protection computer system according to claim 6 is characterized in that, this pin position is a pin position of a south bridge wafer set of this computer system, and this pin position is coupled to a controller of this first storage device.
9. the method for the Backup Data of protection computer system according to claim 7 is characterized in that, this recovering step be a user by this computer system when start by next hot key, to carry out this recovering step.
10. the method for the Backup Data of protection computer system according to claim 7; it is characterized in that; this recovering step is when finding to read the program of this operating system in this second storage device by when start, and automatically performs this recovering step by this computer system.
11. the computer system that can protect Backup Data is characterized in that, the described computer system of Backup Data of protecting comprises:
One central processing unit is in order to the computing of handling this computer system and the running of controlling this computer system;
One first storage device, in order to store the Backup Data of this computer system, this first storage device is closed condition at ordinary times, so that the data of the operating system of this computer system in can't this first storage device of direct access;
One first storage device controller is coupled to this first storage device, in order to the startup of controlling this first storage device with close;
One south bridge wafer set, be coupled between this central processing unit and this first storage device controller, see through the order that this CPU (central processing unit) produces in order to the basic input/output system that receives this computer system, a pin position that is coupled to this first storage device controller by this south bridge wafer set with the startup of controlling this first storage device with close;
Wherein this computer system starts this first storage device by an application program through this basic input/output system of software system management interrupt call when Backup Data, to back up this Backup Data to this first storage device from one second storage device; And in backing up this Backup Data to this first storage device, this computer system sees through this basic input/output system of software system management interrupt call and closes this first storage device.
12. the computer system of protecting Backup Data according to claim 11, it is characterized in that, when the corrupted data that stores in this second storage device, this computer system starts this first storage device by this basic input/output system, to recover this Backup Data to this second storage device in this first storage device certainly; And in recovering this Backup Data to this second storage device, this computer system is closed this first storage device by this basic input/output system.
CN 200510109367 2005-10-17 2005-10-17 Computer system and method for protecting backup data Pending CN1952832A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200510109367 CN1952832A (en) 2005-10-17 2005-10-17 Computer system and method for protecting backup data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200510109367 CN1952832A (en) 2005-10-17 2005-10-17 Computer system and method for protecting backup data

Publications (1)

Publication Number Publication Date
CN1952832A true CN1952832A (en) 2007-04-25

Family

ID=38059200

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200510109367 Pending CN1952832A (en) 2005-10-17 2005-10-17 Computer system and method for protecting backup data

Country Status (1)

Country Link
CN (1) CN1952832A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100547556C (en) * 2007-12-07 2009-10-07 中国科学院计算技术研究所 A kind of storage server system and data guard method thereof
CN101464818B (en) * 2007-12-20 2010-09-29 联想(北京)有限公司 Instant backup method for files, and its instant recovery method and system
CN103189840A (en) * 2011-12-27 2013-07-03 华为技术有限公司 Method for backing up startup information about storage device
CN104516787A (en) * 2013-09-27 2015-04-15 联想(北京)有限公司 Information processing method and electronic device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100547556C (en) * 2007-12-07 2009-10-07 中国科学院计算技术研究所 A kind of storage server system and data guard method thereof
CN101464818B (en) * 2007-12-20 2010-09-29 联想(北京)有限公司 Instant backup method for files, and its instant recovery method and system
CN103189840A (en) * 2011-12-27 2013-07-03 华为技术有限公司 Method for backing up startup information about storage device
WO2013097095A1 (en) * 2011-12-27 2013-07-04 华为技术有限公司 Method for backing up startup information about storage device
CN104516787A (en) * 2013-09-27 2015-04-15 联想(北京)有限公司 Information processing method and electronic device

Similar Documents

Publication Publication Date Title
US7707454B2 (en) Method for protecting backup data of a computer system from damage
US8898666B2 (en) Virtual machine system and virtual machine system control method for controlling program execution on a plurality of processors that have a plurality of privileged modes
US10853179B2 (en) Information handling system and method for restoring firmware in one or more regions of a flash memory device
JP3539907B2 (en) Computer with bootable program
US9454387B2 (en) Method and system for installing portable executable applications
US20100005531A1 (en) Isolated multiplexed multi-dimensional processing in a virtual processing space having virus, spyware, and hacker protection features
US20060015869A1 (en) Transitioning between virtual machine monitor domains in a virtual machine environment
CN100389408C (en) Fixed disk data enciphering back-up and restoring method
CN105164657A (en) Selective backup of program data to non-volatile memory
CN111353162B (en) TrustZone kernel-based asynchronous execution active trusted computing method and system
KR20010033687A (en) Information handling system with suspend/resume operation
US20080250165A1 (en) USB port access management
US20190004818A1 (en) Method of UEFI Shell for Supporting Power Saving Mode and Computer System thereof
JP2020520037A (en) Computer with isolated user computing section
AU2005248713A2 (en) Isolated multiplexed multi-dimensional processing in a virtual processing space having virus, spyware, and hacker protection features
US10037276B1 (en) Systems and methods for accelerating access to data by pre-warming the cache for virtual machines
CN207281744U (en) Os starting device and system mainboard
CN1952832A (en) Computer system and method for protecting backup data
US7565524B2 (en) Computer backup system at BIOS level
CN102467626A (en) Computer system data protection device and method
US11341063B2 (en) Systems and methods for safely detecting indeterminate states of ranges in a self-encrypting storage resource
US10255435B1 (en) Systems and methods for establishing a reputation for related program files
US20060080518A1 (en) Method for securing computers from malicious code attacks
CN102222185B (en) Method for preventing operating system starting file from being infected
KR100300584B1 (en) Method for recovering environment of computer system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication