CN1959587A - Method for realizing isolation among multiple users of using same computer - Google Patents
Method for realizing isolation among multiple users of using same computer Download PDFInfo
- Publication number
- CN1959587A CN1959587A CN 200510117089 CN200510117089A CN1959587A CN 1959587 A CN1959587 A CN 1959587A CN 200510117089 CN200510117089 CN 200510117089 CN 200510117089 A CN200510117089 A CN 200510117089A CN 1959587 A CN1959587 A CN 1959587A
- Authority
- CN
- China
- Prior art keywords
- user
- disk
- boot disk
- boot
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Stored Programmes (AREA)
Abstract
A method for realizing multi-user to the same set of computer in isolated mode includes erecting shared data information of all users at start-up disc on one of start-up disc among a numbers of start-up discs on computer and setting computer state at this moment to be reference protection point corresponding to said start-up disc, creating new account information under said state and setting computer state at this moment to be new protection point.
Description
Technical field
The present invention relates to a kind of computing machine using method, relate in particular to a kind of can be by the method for same computer resource of the use that some users isolate mutually.
Background technology
Universal day by day along with computing machine, the relation of people's work and life and computing machine is day by day close, and there has been computing machine in many families, can satisfy the different demands of one family at aspects such as study, lives; Simultaneously, risen the Internet bar in the society, be the place that people provide service on net, convenient more user.
In the use of home computer, the head of a family mainly is the needs that satisfy life, therefore, some application software has been installed on computers; And use a computer as children, more situation is in order to learn.The head of a family better learns for children, only wishes to see relevant learning software on the computer interface that children use, and can't see the application software that the head of a family installs.Present method is a kind of to be that more than one operating system is installed on a computing machine, different user ciphers is set in different operating system, like this, when the relative users start-up system and after, just can use own installed software resource by authentication; Another kind method is to register a plurality of users in same system simultaneously, and each user uses the password of oneself to land the use interface of oneself, satisfies user demand.But, no matter adopt above-mentioned which kind of mode, for hard disc of computer, wherein Cun Chu data are all shared, and each user can't accomplish the data resource of the real use of isolating oneself between the different users.
And for the Internet bar, the keeper is in the face of various users, wishes that operating system that the user uses and the operating system that the keeper uses isolates fully, is unlikely to the maloperation of hard disk computing machine to be destroyed because of the user, causes and can't use.
Used the multiple spot protection module on the computing machine at present; its ultimate principle is at first to set up the address table of actual valid data piece under each protection dotted state; and these address tables are left in protection zone on the hard disk; then by revising the INT13 function; the capturing operation system is for the request of access of hard disk; according to the residing protection dotted state of this request of access; find its corresponding valid data block address table; it is converted to the normal partition information table that operating system can be discerned, finish actual read-write then.
Adopt above-mentioned multiple spot protection module; can do corresponding protection to the different user modes of computing machine; this multiple spot protection module can be implemented in the switching between each protection dotted state; when computing machine breaks down; can return to previous user mode; but,, do not reach different user equally and isolate computed purpose fully because this kind technology only is that each user mode of computing machine is protected.
Summary of the invention
The invention provides a kind of different user and realize same computer method of a plurality of user isolation uses, different user is isolated fully to the operation of same computing machine, and each user can not have influence on other user's data data fully when the data information of operation oneself.
The method of the invention, step comprises:
Step 1 is installed all user's shared data information of this boot disk on one of them boot disk in a plurality of boot disk of computing machine, and this moment, computer mode was set to protect point corresponding to the benchmark of this boot disk;
Step 2 is created new account information under above-mentioned state, and this moment, computer mode was set to new protection point.
Adopt said method, can repeat to create a plurality of new account information, its concrete grammar only needs after having created a certain new account and being provided with new protection point, turns back to the computer mode at benchmark protection point place, and the operation of repeating step two gets final product then.
Among the present invention; after a plurality of account numbers of establishment finish on the boot disk; on other boot disk, continue to create user account number as need; then reselect boot disk; all user's shared data information of this boot disk are installed, and this moment, computer mode was set to another benchmark protection point that should boot disk.
Among the present invention, also provide a kind of method of creating a plurality of boot disk, step comprises:
Step 101 is divided into a plurality of continuous spaces with hard disc of computer, creates the partition information table corresponding to each continuous space, forms a plurality of virtual hard disks;
Step 102 is created hard disk partition table information and boot section information, the virtual disk that formation can start in above-mentioned virtual hard disk;
Step 103 is provided with read and write data physical address on boot disk of selected boot disk of computer booting and operating system.
In that being set, computer booting select concrete boot disk and operating system to read and write data in the physical address step on boot disk, can make amendment to the INT19 function, select module so that behind computer booting, start a boot disk, select to enter which boot disk by the user; Simultaneously, the INT13 function is made amendment, operating system in the boot disk of the current use of user is converted to the physical address of this boot disk on hard disk to the relative address of disk read-write, feed back to operating system again and finish the data write operation.
The present invention can set up any a plurality of account in a computing machine, can satisfy any a plurality of users' different user demands.Owing to adopted the multiple spot protection module in the present invention; make each user's the user mode of related resource be protected; the hard disc data that each user visited simultaneously all is on the different physical addresss of hard disk; thereby other users' operation behavior can not exert an influence to this user, realized same computer resource of use that different user is isolated fully.
Description of drawings
Fig. 1 is a process flow diagram of setting up new account of the present invention;
Fig. 2 is the process flow diagram of use new account of the present invention;
Fig. 3 is the method flow diagram of a plurality of boot disk of establishment of the present invention.
Embodiment
The present invention can create the user of a plurality of different account numbers on the same hard disk of a computing machine, these users use the identical operations system; Can be a plurality of boot disk also, different operating system is installed on each boot disk, satisfy the different demands of different user the hard disk partition of computing machine.
Shown in Figure of description 1, for create the process of a plurality of different account numbers on the same hard disk of a computing machine, method is as follows:
Step 101, computer booting carries out the BIOS self check;
Step 102 is installed the shareware that all users need on computers;
Step 103, shareware installs, and calls the multiple spot protection module state of this computer-chronograph is protected, and creates benchmark protection point;
Step 104 is created new account information, promptly creates a new account, and password is set, and the application software of this account user correspondence is installed;
Step 105, application software installs, and calls the multiple spot protection module state of this computer-chronograph is protected, and creates a new protection point;
Step 106 judges whether need to create other new account, and in this way, then execution in step 104; Otherwise, execution in step 107;
Step 107, setting completed for new account.
Because corresponding each different computer mode of each protection point that the multiple spot protection module is created; therefore can be by between different protection points, switching the state that changes computing machine; in the present invention; different computer mode correspondences the personal data of each different user, thereby can realize that a plurality of users use separately independently personal data.
Shown in Figure of description 2, after whole user account numbers establishments finish, just can carry out having landed of different user, it is as follows that it lands step:
Step 201, computer booting carries out the BIOS self check;
Step 202 enters the User login interface, and input user account number and password are verified by computing machine;
Step 203, computing machine enters into corresponding protection point according to usersaccount information, starts the computer mode of this protection point place correspondence;
Step 204, the user moves application software under this state.
Table 1
Account number | Password | The protection point | Physical location |
Account number 1 | Password 1 | Protection point 1 | Position 1 |
Account number 2 | Password 2 | Protection point 2 | Position 2 |
Account number m | Password m | Protection point m | Position m |
Above table 1 be the mapping table of different user account number, password, protection point, physical location, each user account number and a unique password, corresponding protection point, the physical location of corresponding data on hard disk are corresponding.Each user imports account and the password of oneself; after the process checking is passed through; the multiple spot protection module just finds the corresponding valid data address table of this protection point from the hard disk protection zone, it is converted to the normal partition information table that operating system can be discerned, and then satisfy user's user demand.Because each user's data in the physical address difference of hard-disc storage, has therefore been avoided the phase mutual interference of visit data between the different user, has accomplished that real isolation uses a computer.
The present invention also can form a plurality of boot disk with the fdisk of computing machine, creates a plurality of account numbers then on each boot disk.Shown in Figure of description 3, the step of creating a plurality of boot disk is as follows:
Step 301 is divided into a plurality of continuous spaces with hard disc of computer, creates the partition information table corresponding to each continuous space, forms a plurality of virtual hard disks;
Step 302, the table information that creates the division in each virtual hard disk and boot section information form bootable virtual hard disk;
Step 303 is made amendment to the function of INT19, makes computing machine start a boot disk after start and selects module, selects to enter which boot disk by the user;
The INT13 function is made amendment, make operation system of computer to the read-write of hard disc data by original read-write relative address, transfer the physical address that reads and writes data on hard disk to;
Step 304 is created a plurality of boot disk and is finished.
INT13 function described in the above-mentioned steps 303 and INT19 function are two functions commonly used among the computer motherboard BIOS, and wherein the INT13 function is that the sector data on the reading writing harddisk is removed in bottom instruction that direct access hard disk controller provides; The function of INT19 is to read the MBR (Master Boot Record: the main startup write down) that is positioned on the hard disk most significant end address, calls in to carry out in the internal memory to begin to start the operating system.
Created a plurality of boot disk, just can different sharewares be installed on different boot disk, different operating system for example has been installed, provide very big dirigibility for different users uses a computer.
Table 2
Account number | Boot disk | The protection point | Physical location |
Account number 1 | Boot disk 1 | Protection point 1 | Position 11 |
Account number 2 | Boot disk 1 | Protection point 2 | Position 12 |
Account number 3 | Boot disk 1 | Protection point k | Position 1k |
Account number 4 | Boot disk 2 | Protection point 1 | Position 21 |
Account number 5 | Boot disk 2 | Protection point 2 | Position 22 |
Account number 6 | Boot disk 2 | Protection point j | Position 2j |
Account number m | Boot disk m | Protection point k | Position mk |
Above table 2 be the mapping table of user account number, boot disk, protection point, physical location; therefrom as can be seen; different account number correspondences different boot disk, corresponding protection point on simultaneously corresponding this boot disk, corresponding simultaneously again the physical location of related data.When the user imports oneself account and password, after the computing machine checking, the protection point of its correspondence switches to corresponding boot disk, the data of user capture respective physical position.
Claims (7)
1. realize same computer method of a plurality of user isolation uses for one kind, it is characterized in that step comprises:
Step 1 is installed all user's shared data information of this boot disk on one of them boot disk in a plurality of boot disk of computing machine, and this moment, computer mode was set to protect point corresponding to the benchmark of this boot disk;
Step 2 is created new account information under above-mentioned state, and this moment, computer mode was set to new protection point.
2. a plurality of user isolation of realization as claimed in claim 1 are used same computer method, it is characterized in that user's data information is stored in the physical address mode of hard disk.
3. a plurality of user isolation of realization as claimed in claim 1 or 2 are used same computer method, it is characterized in that, user account number is corresponding with the protection point.
4. a plurality of user isolation of realization as claimed in claim 1 are used same computer method, it is characterized in that described protection point is corresponding at the physical address of hard disk with data.
5. a plurality of user isolation of realization as claimed in claim 1 are used same computer method, it is characterized in that the step of a plurality of boot disk of described establishment comprises:
Step 101 is divided into a plurality of continuous spaces with hard disc of computer, creates the partition information table corresponding to each continuous space, forms a plurality of virtual hard disks;
Step 102 is created hard disk partition table information and boot section information, the virtual disk that formation can start in above-mentioned virtual hard disk;
Step 103 is provided with read and write data physical address on boot disk of selected boot disk of computer booting and operating system.
6. a plurality of user isolation of realization as claimed in claim 5 are used same computer method, it is characterized in that described step 103 comprises:
Revise the INT19 function, make the boot disk that selection specifically enters through boot disk selection module behind the computer booting;
Revise the INT13 function, make operating system convert the physical address of this boot disk to the relative address of boot disk reading and writing data.
7. a plurality of user isolation of realization as claimed in claim 5 are used same computer method, it is characterized in that, user's account number is corresponding at the physical address of hard disk with boot disk, protection point and data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200510117089 CN1959587A (en) | 2005-11-01 | 2005-11-01 | Method for realizing isolation among multiple users of using same computer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200510117089 CN1959587A (en) | 2005-11-01 | 2005-11-01 | Method for realizing isolation among multiple users of using same computer |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1959587A true CN1959587A (en) | 2007-05-09 |
Family
ID=38071313
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200510117089 Pending CN1959587A (en) | 2005-11-01 | 2005-11-01 | Method for realizing isolation among multiple users of using same computer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1959587A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102945208A (en) * | 2012-10-25 | 2013-02-27 | 记忆科技(深圳)有限公司 | Multiuser hard disk system and implementation method thereof |
CN104933374A (en) * | 2015-07-07 | 2015-09-23 | 山东中孚信息产业股份有限公司 | Storage medium isolation method |
CN106385314A (en) * | 2016-08-29 | 2017-02-08 | 福建联迪商用设备有限公司 | Data isolation system, data isolation system and method for isolating data by using data isolation system |
CN112083879A (en) * | 2020-08-13 | 2020-12-15 | 杭州电子科技大学 | Physical partition isolation and hiding method for storage space of solid state disk |
-
2005
- 2005-11-01 CN CN 200510117089 patent/CN1959587A/en active Pending
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102945208A (en) * | 2012-10-25 | 2013-02-27 | 记忆科技(深圳)有限公司 | Multiuser hard disk system and implementation method thereof |
CN104933374A (en) * | 2015-07-07 | 2015-09-23 | 山东中孚信息产业股份有限公司 | Storage medium isolation method |
CN106385314A (en) * | 2016-08-29 | 2017-02-08 | 福建联迪商用设备有限公司 | Data isolation system, data isolation system and method for isolating data by using data isolation system |
WO2018040922A1 (en) * | 2016-08-29 | 2018-03-08 | 福建联迪商用设备有限公司 | Data isolation system and method, and method using data isolation system |
CN112083879A (en) * | 2020-08-13 | 2020-12-15 | 杭州电子科技大学 | Physical partition isolation and hiding method for storage space of solid state disk |
CN112083879B (en) * | 2020-08-13 | 2023-04-07 | 杭州电子科技大学 | Physical partition isolation and hiding method for storage space of solid state disk |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6050262B2 (en) | Virtual disk storage technology | |
CN1186715C (en) | Method and system supporting several operation systems | |
CN100489782C (en) | Virtual machine system and accessing control method of hardware equipment | |
US7577686B1 (en) | Dynamic table configuration in a virtual machine | |
CN1716204A (en) | Systems and methods for development of emulated devices in a virtual machine environment | |
US6934833B2 (en) | Operating system selector and data storage drive | |
CN1716203A (en) | Systems and methods for running a legacy 32-bit X86 virtual machine on a 64-bit X86 processor | |
CN101650660A (en) | Booting a computer system from central storage | |
CN1825283A (en) | Method for implementing hardware image starting optimizing of embedded operating system | |
AU2004220769A1 (en) | Systems and methods for bimodal device virtualization of actual and idealized hardware-based devices | |
CN1848087A (en) | Using usb memory device to recover operating system | |
CN105718206A (en) | Flash translation layer capable of perceiving RAID (Redundant Array of Independent Disks) and implementation method thereof | |
JP2008225765A (en) | Network storage system, its management method, and control program | |
CN1831787A (en) | Method for setting hard disk physical partition | |
US7200705B2 (en) | Method of checkpointing state of virtual memory for process | |
US20080140946A1 (en) | Apparatus, system, and method for protecting hard disk data in multiple operating system environments | |
US7861074B2 (en) | Electronic systems using flash memory modules as main storage and related system booting methods | |
CN103617133B (en) | Virtual memory compression method and device in a kind of Windows systems | |
CN1959587A (en) | Method for realizing isolation among multiple users of using same computer | |
CN110795213A (en) | Active memory prediction migration method in virtual machine migration process | |
CN1896960A (en) | Fast photographic system and method | |
CN107329836B (en) | Multi-system memory management method and device and mobile terminal | |
CN102968323B (en) | Terminal and the method that realizes computer system power-on acceleration | |
CN1920731A (en) | System and method for implementing operation system separation | |
EP1503283A1 (en) | Data processing system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |