GB2365544A - Storing back-up recovery files on a hidden partition of a disk - Google Patents
Storing back-up recovery files on a hidden partition of a disk Download PDFInfo
- Publication number
- GB2365544A GB2365544A GB9926922A GB9926922A GB2365544A GB 2365544 A GB2365544 A GB 2365544A GB 9926922 A GB9926922 A GB 9926922A GB 9926922 A GB9926922 A GB 9926922A GB 2365544 A GB2365544 A GB 2365544A
- Authority
- GB
- United Kingdom
- Prior art keywords
- secure
- access
- secure area
- hard disk
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1415—Saving, restoring, recovering or retrying at system level
- G06F11/1417—Boot up procedures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1415—Saving, restoring, recovering or retrying at system level
- G06F11/1435—Saving, restoring, recovering or retrying at system level using file system or storage system metadata
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
A hard disk (18) of a computer is partitioned into a secure (or hidden) area (21) and a non-secure area (22) using a SET MAX ADDRESS command. In this way the hidden area is not detected by the system BIOS on boot-up of the system. Access to the hidden area can be password protected. Back-up or recovery files are stored in the hidden area of the hard disk where they cannot be accidentally modified and/or deleted by a user. The system can be restored to its original state using a computer program supplied on a CD-ROM or floppy disk, which temporarily enables the system to access the hidden area in order to reload the original programs and settings.
Description
<Desc/Clms Page number 1>
A METHOD OF SECURELY STORING BACK-UP OR RECOVERY FILES ON A HARD DISK OF A COMPUTER SYSTEM This invention relates to a method of storing back-up or recovery files on a hard disk of a computer system in a secure manner.
It has now become customary to supply with a new computer system, a bundle of software for use with that system. Conveniently the software is provided pre-loaded onto the computer and a so called "reload" disk, usually in CD-ROM form, is provided which the user can use to reload all or part of the software onto the system in the event that the system becomes corrupted or there is another problem which prevents proper operation of the system. Reloading of the software using the "reload" disk sets the system back to the manufacturer's original configuration.
However, the supply of a - "reload" CD-ROM which contains proprietary software makes it relatively simple for the software to be copied from the "reload" disks which is obviously undesirable. In an attempt to combat this problem, it is become customary for those supplying -the "reload" disks to include on those disks a security code which must be entered correctly before any software can be reloaded onto the system from the "reload" disk. To further increase the level of security it is also usual for the security code on the "reload" disk supplied with the system to be stored in the BIOS by the manufacturer and when an attempt is made to reload software from the reload disk, the entered code is detected by the BIOS and
<Desc/Clms Page number 2>
the detected code is compared with the stored . If the detected code does not match the code recorded in the BIOS, reloading of software from the "reload" disk is not permitted.
However, the use of security codes which are detected by the BIOS of the computer system give rise to problems insofar as the use cannot be standardised for all computer systems because different manufacturers use different suppliers of the BIOS, and each BIOS may have important operational differences. Further, the details of BIOS systems are published on the Internet and are therefore readily available to persons who may wish to make unauthorised use or copies of software. A still further problem is that even if the codes are present on the disk it does not prevent files from all or part of the disk being copied since CD-ROM copying facilities are now readily available.
The present invention has arisen from a consideration of these problems.
It is accordingly an object of the present invention to obviate-the need to supply back-up or recovery files on a separate "reload" disk, e.g. CD-ROM and therefore it is the object to provide a method whereby back-up or "reload" software can be stored in a secure area of a hard disk of a computer system and in which access to that secure area is restricted.
Thus and in accordance with a first aspect of the present invention therefore there is provided a method of securely storing back-up or recovery
<Desc/Clms Page number 3>
files on a hard disk of a computer system comprising forming a secure partition on said hard disk which divides the disk into a secure area to which a user has restricted access and a non-secure area to which a user has unrestricted access and providing back-up or recovery files in said secure area.
. With this method it is possible to store back-up or recovery files in a nonuser accessible part of the hard disk of a computer system thereby obviating the need to supply these on a separate CD-ROM. The invention also renders it extremely difficult for any party other than the manufacturer of the system to gain access to back-up or recovery files which can include proprietary software such as operating systems, for illegal uses such as copying or use on other computer systems.
Preferably, the method also includes providing a security code associated with said secure area which must be given before access to the secure area is allowed.
Preferably, access to the secure area can only be gained by a user automatically using software which gives the security code, removes the secure partition, reconfigures the computer system using the back-up or recovery files and immediately reinstates the secure partition to prevent further access to the secure area.
Preferably, the secure partition is set up by use of the SET MAX ADDRESS command in a low level operating system. For example, the low
<Desc/Clms Page number 4>
level operating system may comprise a DOS operating system.
In accordance with a second aspect of the present invention there is provided a computer system comprising a storage device in the form of a hard disk, said hard disk being securely partitioned into a secure area to which user access is restricted and a non-secure area to which user access is unrestricted, wherein said secure area has located therein back-up or recovery files for use in reconfiguration of the system.
Preferably, the secure area has a security code associated therewith which must be given before access is allowed thereto.
Preferably, the secure partition is set up using a SET MAX ADDRESS command in a low level operating system used by the system.
Preferably, access to the secure area is only permitted to the user via use of software which removes the partition, reconfigures the system and reinstates the secure partition automatically.
The invention will now be described further by way of example only and with reference to the accompanying drawings of which: Fig. 1 shows a schematic representation of a conventional computer system; and Fig. 2 shows a schematic representation of a part of a computer system in accordance with the present invention.
Referring now to the drawings, Fig. 1 illustrates a conventional computer system.
<Desc/Clms Page number 5>
The system of Fig. 1 comprises a central processing device 10 operatively linked to various peripheral devices such as a monitor 11, keyboard 12, mouse 13, printer 14, scanner 16 and possibly a modem 17 for communication purposes.
The central processing device 10 is of conventional form and includes a storage device 18 in the form of a hard disk upon which data and operating system or other application software can be stored.
The central processing device 10 utilises a basic input and output system (BIOS) which controls operation of the main component parts of the central processing device including the hard disk. This BIOS is set up so that each component part is detected by the BIOS and the characteristics of each component part are stored. The BIOS is essentially a piece of software which is embedded in one component of the central processing device 10.
Each time the computer system is switched on it undergoes a "boot cycle" which involves the BIOS checking that all components which it fias detected previously are present and are functioning correctly. After this has occurred the BIOS looks to the hard disk 18 for an operating system to initiate and eventually the operating system will load along with any specified application software. In the conventional computer system of Fig. 1, during the "boot cycle", the BIOS will detect the presence of the hard disk 18 and will detect the total volume of that disk. This is the case even
<Desc/Clms Page number 6>
if the hard disk 18 is partitioned so as to be divided into more than one identifiable part.
The present invention is based upon the realisation that if a partition is set up on the hard disk which is a secure partition, and user or other unauthorised access to the partitioned area is prevented or at least restricted, it is possible to store in the partitioned area of the hard, disk back-up and/or recovery files for use in the case where the system has become inoperable. The secure partition will also act to prevent unauthorised copying and use of the files or user corruption of the files and that the secure area cannot be penetrated by a user except for the purposes of utilising the back-up or recovery files in a manner to be described hereinafter.
Referring now to Fig. 2, there is shown a schematic representation of a hard disk 18 of a central processing unit of a computer system utilising the.present invention.
A secure partition 19 has been set up on the hard disk which divides the hard disk 18 into secure and non-secure areas 21 and 22. This-is achieved by using the operating system of the computer to define the maximum volume of the hard disk 18 which can be accessed. Conveniently if a DOS (TM?) operating system is present, the SET MAX ADDRESS command is used to set the maximum volume of hard disk which can be accessed by the user. Thus, for example if an 850 Mb hard disk is used,
<Desc/Clms Page number 7>
the SET MAX ADDRESS command may be used to specify the maximum capacity of the hard disk which the user can access at 820 Mb. This means, in these circumstances, that essentially 30 Mb of capacity of the hard disk are available for secure storage. The reason that this area is secure is that when the SET MAX ADDRESS command is used in this way, the BIOS will only recognise the maximum capacity of the hard disk specified, i.e. 820 Mb and will not recognise the remaining 30 Mb. Thus, if the system undergoes a "boot cycle" and the BIOS checks the characteristics and functioning of each of the components of the central processing device, it will indicate that the hard disk has a capacity of 820 Mb and will not indicate to the user that there is a further 30 Mb of storage capacity on the disk. This means that any files or data stored in this 30 Mb secure area cannot be accessed by a user. In fact the user will not even realise that these files are present since the user will believe that the maximum capacity of the hard disk is confined to the volume of the hard disk detected by the BIOS (i.e. the volume of the non secure area). Furthermore, no files present in this non secure area will be detected by the system.
Recovery and/or back-up files are stored in the secure area of the hard disk defined by the secure partition. Operating system and other application software and data are stored in the non secure area of the hard disk.
<Desc/Clms Page number 8>
In use, if files or applications are corrupted or deleted such that the computer system will no longer operate properly, a user can return the computer system to its original configuration using a computer program, preferably on a CD-ROM or other disk. The user inserts the CD-ROM into a CD-ROM drive of the system and the system is caused to undergo the boot cycle. During the boot cycle the BIOS will detect the presence of the software and will cause this to run.
The program when run uses the SET MAX ADDRESS command to reset the accessible hard disk area to the total volume of the hard disk. The program then looks for a security code stored in the secure area 21 of the hard disk 18. Once the security code has been found, this is compared with a security code embedded in the program and if the two codes match the program then utilises the back-up or recovery files to restore the system to its original configuration. Once the system has been restored, the program immediately uses the SET MAX ADDRESS command to set up the secure partition 19 on the hard disk 18 to once again provide a secure area 21. If when the program is running, the security code in the program does not match the security code in the secure area 21 of the hard disk 18, or no security code is found, the program will immediately restore the secure partition 19 in the manner described above without utilising the back-up or recovery files.
By requiring the user to use a computer program to access the secure
<Desc/Clms Page number 9>
area and utilise the back-up or recovery files it means that a user never has direct access to those files which may, as previously mentioned, comprise proprietary software such as operating systems or application software. This means no unauthorised copying or use of these files can take place. Still further, as no complete operating system or application software forms a part of the computer program used by the user to restore the computer to its original configuration, even if the program is provided on a separate disk, it is not possible for an operating system or application software program or files to be copied or used in an unauthorised manner.
It will be realised that by using the present invention, it is possible to provide recovery or back-up files on the hard disk of a computer system in such a manner that they are secure and cannot be accessed by a user or any other person for unauthorised use or copy. A particular advantage of the present invention is that it has no dependency on the BIOS which means that it can be standardised for all computer systems.
It is of course to be understood that the invention is not intended to be restricted to the details of the above embodiment which are described by way of example only.
<Desc/Clms Page number 10>
Claims (11)
- CLAIMS 1. A method of securely storing back-up or recovery files on a hard disk of a computer system comprising forming a secure partition on said hard disk which divides the disk into a secure area to which a user has restricted access and a non-secure area to which a user has unrestricted access and providing back-up or recovery files in said secure area.
- 2. A method according to claim 1, wherein the method further includes providing a security code associated with the secure area which must be given before access to the secure area is allowed.
- 3. A method according to Claim 1 or Claim 2, wherein access to the secure area can only be gained by a user automatically using software which gives the security code, removes the secure partition, reconfigures the computer system using the back-up or recovery files and immediately reinstates the secure partition to prevent further access to the secure area.
- 4. A method according to any one of Claims 1 to 3, wherein the secure partition is set up by use of the SET MAX ADDRESS command in a low level operating system.
- 5. A method according to Claim 4, wherein the low level operating system comprises a DOS operating system.
- 6. A computer system as comprising a storage device in the form of a<Desc/Clms Page number 11>hard disk, said hard disk being securely partitioned into a secure area to which user access is restricted and a non-secure area to which user access is unrestricted, wherein said secure area has located therein back-up or recovery files for use in reconfiguration of the system.
- 7. A system according to Claim 6, wherein the secure area has a security code associated therewith which must be given before access is allowed thereto.
- 8. A system according to Claim 7, wherein the secure partition is set up using a SET MAX ADDRESS command in a low level operating system used by the system.
- 9. A system according to Claim 7 or Claim 8, wherein access is only permitted to the secure area by the user by use of software which removes the partition, reconfigures the system and reinstates the secure partition automatically.
- 10. A method substantially as hereinbefore described with reference to the drawings.
- 11. A computer system substantially as hereinbefore described with reference to Fig. 1 or Fig. 2 of the drawings.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9926922A GB2365544A (en) | 1999-11-15 | 1999-11-15 | Storing back-up recovery files on a hidden partition of a disk |
TW88120141A TW502205B (en) | 1999-11-15 | 1999-11-18 | A method of securely storing back-up or recovery files on a hard disk of a computer system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9926922A GB2365544A (en) | 1999-11-15 | 1999-11-15 | Storing back-up recovery files on a hidden partition of a disk |
Publications (2)
Publication Number | Publication Date |
---|---|
GB9926922D0 GB9926922D0 (en) | 2000-01-12 |
GB2365544A true GB2365544A (en) | 2002-02-20 |
Family
ID=10864494
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB9926922A Withdrawn GB2365544A (en) | 1999-11-15 | 1999-11-15 | Storing back-up recovery files on a hidden partition of a disk |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB2365544A (en) |
TW (1) | TW502205B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1351127A2 (en) * | 2002-04-04 | 2003-10-08 | Microsoft Corporation | Method and apparatus for restoring a device to a default state |
EP1469393A1 (en) * | 2001-11-12 | 2004-10-20 | Legend (Beijing) Limited | A method for backing up and recovering data in a hard disk |
EP1503284A1 (en) * | 2003-08-01 | 2005-02-02 | Hewlett-Packard Development Company, L.P. | Data processing system and method |
WO2006088838A2 (en) * | 2005-02-14 | 2006-08-24 | Nalpeiron | Methods of copy protecting software stored on portable memory |
CN100392593C (en) * | 2006-05-12 | 2008-06-04 | 张健 | Method for protecting hard disk last partition |
US8245054B2 (en) * | 2004-08-27 | 2012-08-14 | Lenovo (Singapore) Pte., Ltd. | Secure and convenient access control for storage devices supporting passwords for individual partitions |
CN107168818A (en) * | 2017-03-30 | 2017-09-15 | 努比亚技术有限公司 | Terminal and brush machine failure recovery method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0794484A2 (en) * | 1996-03-04 | 1997-09-10 | Nec Corporation | Partitioned hard disk drives and partitioning scheme for hard disk drives |
GB2336921A (en) * | 1998-04-28 | 1999-11-03 | Ibm | Recovery of data on computer non-volatile storage |
GB2345995A (en) * | 1998-11-24 | 2000-07-26 | Dell Usa Lp | A computer disk having one partition within another. |
GB2346719A (en) * | 1998-12-15 | 2000-08-16 | Dell Usa Lp | Restoration of a computer system hard drive using a protected software image |
US6195695B1 (en) * | 1998-10-27 | 2001-02-27 | International Business Machines Corporation | Data processing system and method for recovering from system crashes |
-
1999
- 1999-11-15 GB GB9926922A patent/GB2365544A/en not_active Withdrawn
- 1999-11-18 TW TW88120141A patent/TW502205B/en not_active IP Right Cessation
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0794484A2 (en) * | 1996-03-04 | 1997-09-10 | Nec Corporation | Partitioned hard disk drives and partitioning scheme for hard disk drives |
GB2336921A (en) * | 1998-04-28 | 1999-11-03 | Ibm | Recovery of data on computer non-volatile storage |
US6195695B1 (en) * | 1998-10-27 | 2001-02-27 | International Business Machines Corporation | Data processing system and method for recovering from system crashes |
GB2345995A (en) * | 1998-11-24 | 2000-07-26 | Dell Usa Lp | A computer disk having one partition within another. |
GB2346719A (en) * | 1998-12-15 | 2000-08-16 | Dell Usa Lp | Restoration of a computer system hard drive using a protected software image |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1469393A1 (en) * | 2001-11-12 | 2004-10-20 | Legend (Beijing) Limited | A method for backing up and recovering data in a hard disk |
EP1469393A4 (en) * | 2001-11-12 | 2009-03-04 | Legend Beijing Ltd | A method for backing up and recovering data in a hard disk |
EP1351127A2 (en) * | 2002-04-04 | 2003-10-08 | Microsoft Corporation | Method and apparatus for restoring a device to a default state |
EP1351127A3 (en) * | 2002-04-04 | 2008-06-25 | Microsoft Corporation | Method and apparatus for restoring a device to a default state |
US7437607B2 (en) | 2002-04-04 | 2008-10-14 | Microsoft Corporation | Method and apparatus for restoring a device to a default state |
US7441151B2 (en) | 2002-04-04 | 2008-10-21 | Microsoft Corporation | Method and apparatus for restoring a device to a default state |
EP1503284A1 (en) * | 2003-08-01 | 2005-02-02 | Hewlett-Packard Development Company, L.P. | Data processing system and method |
US8245054B2 (en) * | 2004-08-27 | 2012-08-14 | Lenovo (Singapore) Pte., Ltd. | Secure and convenient access control for storage devices supporting passwords for individual partitions |
WO2006088838A2 (en) * | 2005-02-14 | 2006-08-24 | Nalpeiron | Methods of copy protecting software stored on portable memory |
WO2006088838A3 (en) * | 2005-02-14 | 2006-12-14 | Nalpeiron | Methods of copy protecting software stored on portable memory |
CN100392593C (en) * | 2006-05-12 | 2008-06-04 | 张健 | Method for protecting hard disk last partition |
CN107168818A (en) * | 2017-03-30 | 2017-09-15 | 努比亚技术有限公司 | Terminal and brush machine failure recovery method |
Also Published As
Publication number | Publication date |
---|---|
TW502205B (en) | 2002-09-11 |
GB9926922D0 (en) | 2000-01-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6971018B1 (en) | File protection service for a computer system | |
US5012514A (en) | Hard drive security system | |
US6618735B1 (en) | System and method for protecting shared system files | |
US5432939A (en) | Trusted personal computer system with management control over initial program loading | |
EP1434135B1 (en) | Method for backing up and recovering data in the hard disk of a computer | |
US6266773B1 (en) | Computer security system | |
US5822771A (en) | System for management of software employing memory for processing unit with regulatory information, for limiting amount of use and number of backup copies of software | |
CN1185584C (en) | Use method of safety cipher in nonsafety programming environment | |
US8856927B1 (en) | System and method for using snapshots for rootkit detection | |
US6915420B2 (en) | Method for creating and protecting a back-up operating system within existing storage that is not hidden during operation | |
US7137034B2 (en) | Self repairing computer having user accessible switch for modifying bootable storage device configuration to initiate repair | |
US6167494A (en) | Method and system for recovering from operating system failure | |
JP2004038931A (en) | Method for implementing backup and recovery of data in computer hard disk | |
US6535977B1 (en) | Replacing a unique identifier in a cloned computer system using program module that runs only once during the next boot sequence | |
US20110145923A1 (en) | Computer having special purpose subsystems and cyber-terror and virus immunity and protection features | |
US7210013B2 (en) | Data protection for computer system | |
JPH03502263A (en) | COMPUTER DATA AND SOFTWARE INTEGRITY PROTECTION APPARATUS AND METHODS | |
US8775783B2 (en) | Method and apparatus for creating a self booting operating system image backup on an external USB hard disk drive that is capable of performing a complete restore to an internal system disk | |
WO1990013084A1 (en) | Computer file protection system | |
US20040268079A1 (en) | Method and system for providing a secure rapid restore backup of a raid system | |
NZ245756A (en) | Personal computer with access password in activated erasable memory | |
US20080072078A1 (en) | Information processor and information processing method | |
JPH0552967B2 (en) | ||
GB2304213A (en) | Safeguarding hard drive data and preventing certain user input | |
GB2365544A (en) | Storing back-up recovery files on a hidden partition of a disk |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AT | Applications terminated before publication under section 16(1) | ||
710B | Request of alter time limits |
Free format text: REINSTATED FOLLOWING THE EXERCISE OF DISCRETION UNDER RULE 110(4). |
|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) | ||
710B | Request of alter time limits |
Free format text: EXTENSION APPLICATION: APPLICATION FOR EXTENSION OF THE PERIOD(S) PRESCRIBED BY RULE(S) 33(2) FILEDON 20030930. |
|
9110 | Period prescribed has been extended under rule 110(6)/1990 |
Free format text: EXTENSION ALLOWED: PERIOD(S) PRESCRIBED BY RULE(S) 33(2) EXTENDED UNDER RULE 110(6) IN ACCORDANCE WITH THE DECISION OF THE COMPTROLLER DATED 20040716. THE PATENT/APPLICATION IS REINSTATED SUBJECT TO SPECIAL TERMS FOR THIRD PARTY INTERESTS. |
|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |