GB2365544A - Storing back-up recovery files on a hidden partition of a disk - Google Patents

Storing back-up recovery files on a hidden partition of a disk Download PDF

Info

Publication number
GB2365544A
GB2365544A GB9926922A GB9926922A GB2365544A GB 2365544 A GB2365544 A GB 2365544A GB 9926922 A GB9926922 A GB 9926922A GB 9926922 A GB9926922 A GB 9926922A GB 2365544 A GB2365544 A GB 2365544A
Authority
GB
United Kingdom
Prior art keywords
secure
access
secure area
hard disk
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB9926922A
Other versions
GB9926922D0 (en
Inventor
Michael Augustin Flanagan
Gary Anthony Holden
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TIME COMPUTERS Ltd
Original Assignee
TIME COMPUTERS Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TIME COMPUTERS Ltd filed Critical TIME COMPUTERS Ltd
Priority to GB9926922A priority Critical patent/GB2365544A/en
Priority to TW88120141A priority patent/TW502205B/en
Publication of GB9926922D0 publication Critical patent/GB9926922D0/en
Publication of GB2365544A publication Critical patent/GB2365544A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1415Saving, restoring, recovering or retrying at system level
    • G06F11/1417Boot up procedures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1415Saving, restoring, recovering or retrying at system level
    • G06F11/1435Saving, restoring, recovering or retrying at system level using file system or storage system metadata

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A hard disk (18) of a computer is partitioned into a secure (or hidden) area (21) and a non-secure area (22) using a SET MAX ADDRESS command. In this way the hidden area is not detected by the system BIOS on boot-up of the system. Access to the hidden area can be password protected. Back-up or recovery files are stored in the hidden area of the hard disk where they cannot be accidentally modified and/or deleted by a user. The system can be restored to its original state using a computer program supplied on a CD-ROM or floppy disk, which temporarily enables the system to access the hidden area in order to reload the original programs and settings.

Description

<Desc/Clms Page number 1> A METHOD OF SECURELY STORING BACK-UP OR RECOVERY FILES ON A HARD DISK OF A COMPUTER SYSTEM This invention relates to a method of storing back-up or recovery files on a hard disk of a computer system in a secure manner.
It has now become customary to supply with a new computer system, a bundle of software for use with that system. Conveniently the software is provided pre-loaded onto the computer and a so called "reload" disk, usually in CD-ROM form, is provided which the user can use to reload all or part of the software onto the system in the event that the system becomes corrupted or there is another problem which prevents proper operation of the system. Reloading of the software using the "reload" disk sets the system back to the manufacturer's original configuration.
However, the supply of a - "reload" CD-ROM which contains proprietary software makes it relatively simple for the software to be copied from the "reload" disks which is obviously undesirable. In an attempt to combat this problem, it is become customary for those supplying -the "reload" disks to include on those disks a security code which must be entered correctly before any software can be reloaded onto the system from the "reload" disk. To further increase the level of security it is also usual for the security code on the "reload" disk supplied with the system to be stored in the BIOS by the manufacturer and when an attempt is made to reload software from the reload disk, the entered code is detected by the BIOS and
<Desc/Clms Page number 2>
the detected code is compared with the stored . If the detected code does not match the code recorded in the BIOS, reloading of software from the "reload" disk is not permitted.
However, the use of security codes which are detected by the BIOS of the computer system give rise to problems insofar as the use cannot be standardised for all computer systems because different manufacturers use different suppliers of the BIOS, and each BIOS may have important operational differences. Further, the details of BIOS systems are published on the Internet and are therefore readily available to persons who may wish to make unauthorised use or copies of software. A still further problem is that even if the codes are present on the disk it does not prevent files from all or part of the disk being copied since CD-ROM copying facilities are now readily available.
The present invention has arisen from a consideration of these problems.
It is accordingly an object of the present invention to obviate-the need to supply back-up or recovery files on a separate "reload" disk, e.g. CD-ROM and therefore it is the object to provide a method whereby back-up or "reload" software can be stored in a secure area of a hard disk of a computer system and in which access to that secure area is restricted.
Thus and in accordance with a first aspect of the present invention therefore there is provided a method of securely storing back-up or recovery
<Desc/Clms Page number 3>
files on a hard disk of a computer system comprising forming a secure partition on said hard disk which divides the disk into a secure area to which a user has restricted access and a non-secure area to which a user has unrestricted access and providing back-up or recovery files in said secure area.
. With this method it is possible to store back-up or recovery files in a nonuser accessible part of the hard disk of a computer system thereby obviating the need to supply these on a separate CD-ROM. The invention also renders it extremely difficult for any party other than the manufacturer of the system to gain access to back-up or recovery files which can include proprietary software such as operating systems, for illegal uses such as copying or use on other computer systems.
Preferably, the method also includes providing a security code associated with said secure area which must be given before access to the secure area is allowed.
Preferably, access to the secure area can only be gained by a user automatically using software which gives the security code, removes the secure partition, reconfigures the computer system using the back-up or recovery files and immediately reinstates the secure partition to prevent further access to the secure area.
Preferably, the secure partition is set up by use of the SET MAX ADDRESS command in a low level operating system. For example, the low
<Desc/Clms Page number 4>
level operating system may comprise a DOS operating system.
In accordance with a second aspect of the present invention there is provided a computer system comprising a storage device in the form of a hard disk, said hard disk being securely partitioned into a secure area to which user access is restricted and a non-secure area to which user access is unrestricted, wherein said secure area has located therein back-up or recovery files for use in reconfiguration of the system.
Preferably, the secure area has a security code associated therewith which must be given before access is allowed thereto.
Preferably, the secure partition is set up using a SET MAX ADDRESS command in a low level operating system used by the system.
Preferably, access to the secure area is only permitted to the user via use of software which removes the partition, reconfigures the system and reinstates the secure partition automatically.
The invention will now be described further by way of example only and with reference to the accompanying drawings of which: Fig. 1 shows a schematic representation of a conventional computer system; and Fig. 2 shows a schematic representation of a part of a computer system in accordance with the present invention.
Referring now to the drawings, Fig. 1 illustrates a conventional computer system.
<Desc/Clms Page number 5>
The system of Fig. 1 comprises a central processing device 10 operatively linked to various peripheral devices such as a monitor 11, keyboard 12, mouse 13, printer 14, scanner 16 and possibly a modem 17 for communication purposes.
The central processing device 10 is of conventional form and includes a storage device 18 in the form of a hard disk upon which data and operating system or other application software can be stored.
The central processing device 10 utilises a basic input and output system (BIOS) which controls operation of the main component parts of the central processing device including the hard disk. This BIOS is set up so that each component part is detected by the BIOS and the characteristics of each component part are stored. The BIOS is essentially a piece of software which is embedded in one component of the central processing device 10.
Each time the computer system is switched on it undergoes a "boot cycle" which involves the BIOS checking that all components which it fias detected previously are present and are functioning correctly. After this has occurred the BIOS looks to the hard disk 18 for an operating system to initiate and eventually the operating system will load along with any specified application software. In the conventional computer system of Fig. 1, during the "boot cycle", the BIOS will detect the presence of the hard disk 18 and will detect the total volume of that disk. This is the case even
<Desc/Clms Page number 6>
if the hard disk 18 is partitioned so as to be divided into more than one identifiable part.
The present invention is based upon the realisation that if a partition is set up on the hard disk which is a secure partition, and user or other unauthorised access to the partitioned area is prevented or at least restricted, it is possible to store in the partitioned area of the hard, disk back-up and/or recovery files for use in the case where the system has become inoperable. The secure partition will also act to prevent unauthorised copying and use of the files or user corruption of the files and that the secure area cannot be penetrated by a user except for the purposes of utilising the back-up or recovery files in a manner to be described hereinafter.
Referring now to Fig. 2, there is shown a schematic representation of a hard disk 18 of a central processing unit of a computer system utilising the.present invention.
A secure partition 19 has been set up on the hard disk which divides the hard disk 18 into secure and non-secure areas 21 and 22. This-is achieved by using the operating system of the computer to define the maximum volume of the hard disk 18 which can be accessed. Conveniently if a DOS (TM?) operating system is present, the SET MAX ADDRESS command is used to set the maximum volume of hard disk which can be accessed by the user. Thus, for example if an 850 Mb hard disk is used,
<Desc/Clms Page number 7>
the SET MAX ADDRESS command may be used to specify the maximum capacity of the hard disk which the user can access at 820 Mb. This means, in these circumstances, that essentially 30 Mb of capacity of the hard disk are available for secure storage. The reason that this area is secure is that when the SET MAX ADDRESS command is used in this way, the BIOS will only recognise the maximum capacity of the hard disk specified, i.e. 820 Mb and will not recognise the remaining 30 Mb. Thus, if the system undergoes a "boot cycle" and the BIOS checks the characteristics and functioning of each of the components of the central processing device, it will indicate that the hard disk has a capacity of 820 Mb and will not indicate to the user that there is a further 30 Mb of storage capacity on the disk. This means that any files or data stored in this 30 Mb secure area cannot be accessed by a user. In fact the user will not even realise that these files are present since the user will believe that the maximum capacity of the hard disk is confined to the volume of the hard disk detected by the BIOS (i.e. the volume of the non secure area). Furthermore, no files present in this non secure area will be detected by the system.
Recovery and/or back-up files are stored in the secure area of the hard disk defined by the secure partition. Operating system and other application software and data are stored in the non secure area of the hard disk.
<Desc/Clms Page number 8>
In use, if files or applications are corrupted or deleted such that the computer system will no longer operate properly, a user can return the computer system to its original configuration using a computer program, preferably on a CD-ROM or other disk. The user inserts the CD-ROM into a CD-ROM drive of the system and the system is caused to undergo the boot cycle. During the boot cycle the BIOS will detect the presence of the software and will cause this to run.
The program when run uses the SET MAX ADDRESS command to reset the accessible hard disk area to the total volume of the hard disk. The program then looks for a security code stored in the secure area 21 of the hard disk 18. Once the security code has been found, this is compared with a security code embedded in the program and if the two codes match the program then utilises the back-up or recovery files to restore the system to its original configuration. Once the system has been restored, the program immediately uses the SET MAX ADDRESS command to set up the secure partition 19 on the hard disk 18 to once again provide a secure area 21. If when the program is running, the security code in the program does not match the security code in the secure area 21 of the hard disk 18, or no security code is found, the program will immediately restore the secure partition 19 in the manner described above without utilising the back-up or recovery files.
By requiring the user to use a computer program to access the secure
<Desc/Clms Page number 9>
area and utilise the back-up or recovery files it means that a user never has direct access to those files which may, as previously mentioned, comprise proprietary software such as operating systems or application software. This means no unauthorised copying or use of these files can take place. Still further, as no complete operating system or application software forms a part of the computer program used by the user to restore the computer to its original configuration, even if the program is provided on a separate disk, it is not possible for an operating system or application software program or files to be copied or used in an unauthorised manner.
It will be realised that by using the present invention, it is possible to provide recovery or back-up files on the hard disk of a computer system in such a manner that they are secure and cannot be accessed by a user or any other person for unauthorised use or copy. A particular advantage of the present invention is that it has no dependency on the BIOS which means that it can be standardised for all computer systems.
It is of course to be understood that the invention is not intended to be restricted to the details of the above embodiment which are described by way of example only.
<Desc/Clms Page number 10>

Claims (11)

  1. CLAIMS 1. A method of securely storing back-up or recovery files on a hard disk of a computer system comprising forming a secure partition on said hard disk which divides the disk into a secure area to which a user has restricted access and a non-secure area to which a user has unrestricted access and providing back-up or recovery files in said secure area.
  2. 2. A method according to claim 1, wherein the method further includes providing a security code associated with the secure area which must be given before access to the secure area is allowed.
  3. 3. A method according to Claim 1 or Claim 2, wherein access to the secure area can only be gained by a user automatically using software which gives the security code, removes the secure partition, reconfigures the computer system using the back-up or recovery files and immediately reinstates the secure partition to prevent further access to the secure area.
  4. 4. A method according to any one of Claims 1 to 3, wherein the secure partition is set up by use of the SET MAX ADDRESS command in a low level operating system.
  5. 5. A method according to Claim 4, wherein the low level operating system comprises a DOS operating system.
  6. 6. A computer system as comprising a storage device in the form of a
    <Desc/Clms Page number 11>
    hard disk, said hard disk being securely partitioned into a secure area to which user access is restricted and a non-secure area to which user access is unrestricted, wherein said secure area has located therein back-up or recovery files for use in reconfiguration of the system.
  7. 7. A system according to Claim 6, wherein the secure area has a security code associated therewith which must be given before access is allowed thereto.
  8. 8. A system according to Claim 7, wherein the secure partition is set up using a SET MAX ADDRESS command in a low level operating system used by the system.
  9. 9. A system according to Claim 7 or Claim 8, wherein access is only permitted to the secure area by the user by use of software which removes the partition, reconfigures the system and reinstates the secure partition automatically.
  10. 10. A method substantially as hereinbefore described with reference to the drawings.
  11. 11. A computer system substantially as hereinbefore described with reference to Fig. 1 or Fig. 2 of the drawings.
GB9926922A 1999-11-15 1999-11-15 Storing back-up recovery files on a hidden partition of a disk Withdrawn GB2365544A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
GB9926922A GB2365544A (en) 1999-11-15 1999-11-15 Storing back-up recovery files on a hidden partition of a disk
TW88120141A TW502205B (en) 1999-11-15 1999-11-18 A method of securely storing back-up or recovery files on a hard disk of a computer system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB9926922A GB2365544A (en) 1999-11-15 1999-11-15 Storing back-up recovery files on a hidden partition of a disk

Publications (2)

Publication Number Publication Date
GB9926922D0 GB9926922D0 (en) 2000-01-12
GB2365544A true GB2365544A (en) 2002-02-20

Family

ID=10864494

Family Applications (1)

Application Number Title Priority Date Filing Date
GB9926922A Withdrawn GB2365544A (en) 1999-11-15 1999-11-15 Storing back-up recovery files on a hidden partition of a disk

Country Status (2)

Country Link
GB (1) GB2365544A (en)
TW (1) TW502205B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1351127A2 (en) * 2002-04-04 2003-10-08 Microsoft Corporation Method and apparatus for restoring a device to a default state
EP1469393A1 (en) * 2001-11-12 2004-10-20 Legend (Beijing) Limited A method for backing up and recovering data in a hard disk
EP1503284A1 (en) * 2003-08-01 2005-02-02 Hewlett-Packard Development Company, L.P. Data processing system and method
WO2006088838A2 (en) * 2005-02-14 2006-08-24 Nalpeiron Methods of copy protecting software stored on portable memory
CN100392593C (en) * 2006-05-12 2008-06-04 张健 Method for protecting hard disk last partition
US8245054B2 (en) * 2004-08-27 2012-08-14 Lenovo (Singapore) Pte., Ltd. Secure and convenient access control for storage devices supporting passwords for individual partitions
CN107168818A (en) * 2017-03-30 2017-09-15 努比亚技术有限公司 Terminal and brush machine failure recovery method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0794484A2 (en) * 1996-03-04 1997-09-10 Nec Corporation Partitioned hard disk drives and partitioning scheme for hard disk drives
GB2336921A (en) * 1998-04-28 1999-11-03 Ibm Recovery of data on computer non-volatile storage
GB2345995A (en) * 1998-11-24 2000-07-26 Dell Usa Lp A computer disk having one partition within another.
GB2346719A (en) * 1998-12-15 2000-08-16 Dell Usa Lp Restoration of a computer system hard drive using a protected software image
US6195695B1 (en) * 1998-10-27 2001-02-27 International Business Machines Corporation Data processing system and method for recovering from system crashes

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0794484A2 (en) * 1996-03-04 1997-09-10 Nec Corporation Partitioned hard disk drives and partitioning scheme for hard disk drives
GB2336921A (en) * 1998-04-28 1999-11-03 Ibm Recovery of data on computer non-volatile storage
US6195695B1 (en) * 1998-10-27 2001-02-27 International Business Machines Corporation Data processing system and method for recovering from system crashes
GB2345995A (en) * 1998-11-24 2000-07-26 Dell Usa Lp A computer disk having one partition within another.
GB2346719A (en) * 1998-12-15 2000-08-16 Dell Usa Lp Restoration of a computer system hard drive using a protected software image

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1469393A1 (en) * 2001-11-12 2004-10-20 Legend (Beijing) Limited A method for backing up and recovering data in a hard disk
EP1469393A4 (en) * 2001-11-12 2009-03-04 Legend Beijing Ltd A method for backing up and recovering data in a hard disk
EP1351127A2 (en) * 2002-04-04 2003-10-08 Microsoft Corporation Method and apparatus for restoring a device to a default state
EP1351127A3 (en) * 2002-04-04 2008-06-25 Microsoft Corporation Method and apparatus for restoring a device to a default state
US7437607B2 (en) 2002-04-04 2008-10-14 Microsoft Corporation Method and apparatus for restoring a device to a default state
US7441151B2 (en) 2002-04-04 2008-10-21 Microsoft Corporation Method and apparatus for restoring a device to a default state
EP1503284A1 (en) * 2003-08-01 2005-02-02 Hewlett-Packard Development Company, L.P. Data processing system and method
US8245054B2 (en) * 2004-08-27 2012-08-14 Lenovo (Singapore) Pte., Ltd. Secure and convenient access control for storage devices supporting passwords for individual partitions
WO2006088838A2 (en) * 2005-02-14 2006-08-24 Nalpeiron Methods of copy protecting software stored on portable memory
WO2006088838A3 (en) * 2005-02-14 2006-12-14 Nalpeiron Methods of copy protecting software stored on portable memory
CN100392593C (en) * 2006-05-12 2008-06-04 张健 Method for protecting hard disk last partition
CN107168818A (en) * 2017-03-30 2017-09-15 努比亚技术有限公司 Terminal and brush machine failure recovery method

Also Published As

Publication number Publication date
TW502205B (en) 2002-09-11
GB9926922D0 (en) 2000-01-12

Similar Documents

Publication Publication Date Title
US6971018B1 (en) File protection service for a computer system
US5012514A (en) Hard drive security system
US6618735B1 (en) System and method for protecting shared system files
US5432939A (en) Trusted personal computer system with management control over initial program loading
EP1434135B1 (en) Method for backing up and recovering data in the hard disk of a computer
US6266773B1 (en) Computer security system
US5822771A (en) System for management of software employing memory for processing unit with regulatory information, for limiting amount of use and number of backup copies of software
CN1185584C (en) Use method of safety cipher in nonsafety programming environment
US8856927B1 (en) System and method for using snapshots for rootkit detection
US6915420B2 (en) Method for creating and protecting a back-up operating system within existing storage that is not hidden during operation
US7137034B2 (en) Self repairing computer having user accessible switch for modifying bootable storage device configuration to initiate repair
US6167494A (en) Method and system for recovering from operating system failure
JP2004038931A (en) Method for implementing backup and recovery of data in computer hard disk
US6535977B1 (en) Replacing a unique identifier in a cloned computer system using program module that runs only once during the next boot sequence
US20110145923A1 (en) Computer having special purpose subsystems and cyber-terror and virus immunity and protection features
US7210013B2 (en) Data protection for computer system
JPH03502263A (en) COMPUTER DATA AND SOFTWARE INTEGRITY PROTECTION APPARATUS AND METHODS
US8775783B2 (en) Method and apparatus for creating a self booting operating system image backup on an external USB hard disk drive that is capable of performing a complete restore to an internal system disk
WO1990013084A1 (en) Computer file protection system
US20040268079A1 (en) Method and system for providing a secure rapid restore backup of a raid system
NZ245756A (en) Personal computer with access password in activated erasable memory
US20080072078A1 (en) Information processor and information processing method
JPH0552967B2 (en)
GB2304213A (en) Safeguarding hard drive data and preventing certain user input
GB2365544A (en) Storing back-up recovery files on a hidden partition of a disk

Legal Events

Date Code Title Description
AT Applications terminated before publication under section 16(1)
710B Request of alter time limits

Free format text: REINSTATED FOLLOWING THE EXERCISE OF DISCRETION UNDER RULE 110(4).

WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)
710B Request of alter time limits

Free format text: EXTENSION APPLICATION: APPLICATION FOR EXTENSION OF THE PERIOD(S) PRESCRIBED BY RULE(S) 33(2) FILEDON 20030930.

9110 Period prescribed has been extended under rule 110(6)/1990

Free format text: EXTENSION ALLOWED: PERIOD(S) PRESCRIBED BY RULE(S) 33(2) EXTENDED UNDER RULE 110(6) IN ACCORDANCE WITH THE DECISION OF THE COMPTROLLER DATED 20040716. THE PATENT/APPLICATION IS REINSTATED SUBJECT TO SPECIAL TERMS FOR THIRD PARTY INTERESTS.

WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)