TW497029B - Method and system for protecting data in a rewritable storage medium - Google Patents
Method and system for protecting data in a rewritable storage medium Download PDFInfo
- Publication number
- TW497029B TW497029B TW88112464A TW88112464A TW497029B TW 497029 B TW497029 B TW 497029B TW 88112464 A TW88112464 A TW 88112464A TW 88112464 A TW88112464 A TW 88112464A TW 497029 B TW497029 B TW 497029B
- Authority
- TW
- Taiwan
- Prior art keywords
- storage area
- write
- storage medium
- hard disk
- write command
- Prior art date
Links
Landscapes
- Storage Device Security (AREA)
Abstract
Description
、發明説明(1 ) ----Description of the invention (1) ----
(¾先間讀背而之注意事項再硪寫本TJC 本毛月疋有關於-種保護可重寫儲存媒體如如ble g dia例如硬碟)之資料的系統及方法,藉以避免 琶腦^程式或其他破壞性程式之非法修改。 ^大。卩刀個人電腦是以硬碟作為大量儲存媒體。舉 J來A硬碟可以用來存放作業系統標案及使用者資料槽 案之原始碼。 第固(習知技術)疋表示在電腦系統之硬碟中存取資料 動作的方塊示意圖。如第1圖所示,使用者i係執行應用 私式2或作業I統命令解釋程式(QS shell)以完成所需的工 作。舉例來說,在磁碟作業系統(DQS)中,命令解譯程式是(¾ Read the notes before you write the TJC book. This month has a system and method for protecting data in rewritable storage media such as ble g dia such as hard disks. Or other destructive programs. ^ Big. A trowel personal computer uses a hard disk as a mass storage medium. For example, the hard drive A can be used to store the source code of the operating system project and user data slot project. Article No. (Known Technology) 示意图 indicates a block diagram of the operation of accessing data in the hard disk of a computer system. As shown in Fig. 1, the user i executes the application private 2 or the operation system command interpreter (QS shell) to complete the required work. For example, in Disk Operating System (DQS), the command interpreter is
、1T ⑺MMAND.CqM;而微軟視f 3ιι中,命令解譯程式則是 轾式b理貞PR〇GRAMEXE。當使用者丨試圖進行一需要 存取硬碟之工作時,應用程式2會呼叫應用程式界面(Αρι)3 以送出存取硬碟7之存取命令至作㈣統核心、4。應用程式 界面3則利用單一程式平台提供各種應用,藉以在作業系 統中執行預定之常式。 待分析接收之存取命令後,作業系統核心4會送出寫入 或讀取命令至某特定裝置之驅動程式(driver)5,用以控制硬 體控制器6以實際執行硬碟機7之寫入及讀出動作。明顯 地作業系統可以在正常情況下對於任何硬碟存取要求,辨 識出其來源。 如上所述,硬碟通常保存很多重要的資料,如作業系統 槽案及樓案描述區塊(file descriptor block,FDB)。大多數 電腦在開機時,存在硬碟之作業系統檔首先會被载入到電 ——……一…——‘ 3 人双垅川屮㈤阀家桴準((\NS ) AAim ( 210X297/^# ) 〜---- 497029 A7 s . ____ B7 五、發明説明(2 ) 腦之主記憶體,藉以建立作業平台。若與作業系統相關的 檔案無法正確找到或完整讀出,則電腦系統便無法啟動及 工作。另外,硬碟中各檔案還具有一檔案描述區塊,用以 儲存槽案相關 > 說。右播案描述區塊遭到毀壞或更改,則 對應槽案亦可能遺失或無法正常讀出。因此,保護硬碟中 資料便成為系統操作上相當關鍵的議題。 本發明是有關於一種保護可重寫儲存媒體(例如硬碟)資 料之系統及方法,以避免電腦病毒程式或其他破壞性程式 之非法修改,藉以強化電腦系統之穩定性。 儲存在可重寫儲存媒體上的資料,在實體上是由硬體控 制加以控制。預先定義的查表則是在可重寫儲存媒體中 定義出一個或多個寫入保護儲存區,其最好也存放於可重 寫儲存媒體中。這表示,對於寫入保護儲存區之任何存取 均會受到偵測及控制。軟體驅動程式則鏈結到作業系統, 用以接收可重寫媒體中特定儲存區之寫入命令、並檢查寫 入命令之特定儲存區是否位於寫入保護儲存區中。當寫入 命令及查表間存在對應關係時,寫入命令首先是由鏈結之 幸人體驅動程式的監視程式模組進行處理。監視程式模組合 根據作業系統之狀態,檢查寫入命令之合法性。若監視程 式模組確認寫入命令之合法性,則軟體驅動程式便可以執 行正常之寫入動作、並將資料填入寫入保護儲存區中的特 定儲存區。 為讓本發明之上述和其他目的、特徵、和優點能更明顯 易懂,下文特舉一較佳實施例,並配合所附圖式,作細 一 一—···一.——____i m- ^ A Jk JU .'l· 1¾ 1¾ %·. ^Ιή. ( CNS ) Λ( 210x297^^ ) 邡先閱讀背面之注意事項再硪寫本頁) 、1Τ A7 A7, 1T ⑺ MMAND.CqM; while in Microsoft's view f 3 ι, the command interpreter is 轾 式 理 理 〇 PRGRAMEXE. When the user tries to perform a task that requires access to the hard disk, the application program 2 will call the application program interface (Αρι) 3 to send the access command for accessing the hard disk 7 to the operating system core, 4. The application program interface 3 uses a single program platform to provide various applications, so as to execute predetermined routines in the operating system. After analyzing the received access command, the operating system core 4 will send a write or read command to the driver 5 of a specific device to control the hardware controller 6 to actually execute the write of the hard disk drive 7. Read and read actions. Obviously the operating system can identify the source of any hard disk access request under normal circumstances. As mentioned above, hard disks usually hold a lot of important data, such as the operating system slot file and the file descriptor block (FDB). When most computers are turned on, the operating system files that have hard disks will be loaded into the computer first ......... One ...—— '3 people Shuangxuan Chuanxi Valve Home 桴 (((\ NS) AAim (210X297 / ^ #) ~ ---- 497029 A7 s. ____ B7 V. Description of the invention (2) The main memory of the brain is used to establish the operating platform. If the files related to the operating system cannot be found or read out completely, the computer system It will not be able to start and work. In addition, each file on the hard disk also has a file description block to store the slot related > said. The right broadcast case description block is damaged or changed, the corresponding slot case may also be lost Or it cannot be read normally. Therefore, protecting the data in the hard disk becomes a very critical issue in system operation. The present invention relates to a system and method for protecting data in a rewritable storage medium (such as a hard disk) to avoid computer viruses Illegal modification of programs or other destructive programs to strengthen the stability of the computer system. Data stored on rewritable storage media is physically controlled by hardware control. Pre-defined lookup tables are in One or more write-protected storage areas are defined in the rewritable storage medium, which are also preferably stored in the rewritable storage medium. This means that any access to the write-protected storage area will be detected and Control. The software driver is linked to the operating system to receive a write command from a specific storage area in the rewritable medium and check whether the specific storage area of the write command is located in a write-protected storage area. When the write command When there is a corresponding relationship between the table and the lookup table, the write command is first processed by the monitoring program module of the linking human body driver. The combination of the monitoring program module checks the legality of the write command according to the status of the operating system. The program module confirms the legitimacy of the write command, so that the software driver can perform normal write operations and fill the data into a specific storage area in the write-protected storage area. In order for the above and other purposes of the present invention, Features, advantages and advantages can be more obvious and easy to understand. The following is a detailed description of a preferred embodiment, and in accordance with the accompanying drawings, make one by one ......... ____i m- ^ A Jk JU .'l · 1¾ 1¾% ·. ^ Ιή. (CNS) Λ (210x297 ^^ 邡 (Please read the precautions on the back before writing this page) 、 1Τ A7 A7
五、發叨説明(3 說明如下: 第1圖(習知技術)係在習知+ 處理示意肩; _錢硬碟中存取資料之 弟2圖係本發明實施例之系统方抽同 系統之硬碟資料免於非法之修改妨塊圖’其用以保護電腦 第3圖係本發明實施例中, 應關係圖; 存取表貧料及硬碟磁區之對 程圖第4圖係本發明實施例中,軟體驅動程式之詳細動作流 第5 _本發財施财,監視m组謂細 %圖;以及 第6圖係本發明實施例中,將資料寫入可重寫儲存媒體 之寫入保護儲存區之步驟流程圖。 立本實施例係揭露-種保護資料的方法及系統,特別是記 體(如硬碟)中重要的資料(如播案描述區塊),藉以避免非 法之修改。在正常狀態下,作業系統會根據主應用程式之 要求达出-存取命令(讀取或寫入)至儲存資料之裝置驅動程 式。因此,作業系統可以辨識出與硬碟相關之正常存取命 令之來源。若這個存取命令並非由作業系統之應用程式所 迗出,則這個存取命令便不屬於作業系統之合法應用程式。 而本發明便疋利用這個特性,藉以分辨出任何裝置驅動程 式所接收到的存取命令(特別是寫入命令)是否合法。 ^κJin η) ^ 1¾ (Fifth, the description of the hairpin (3 The description is as follows: Figure 1 (known technology) is in the conventional + processing schematic shoulder; _ the younger who accesses data in the hard disk 2 Figure is the system of the embodiment of the present invention The hard disk data is protected from illegal modification. The block diagram is used to protect the computer. The third diagram is the relationship diagram in the embodiment of the present invention; In the embodiment of the invention, the detailed action flow of the software driver program is 5th. This chart shows that the m group is a detailed% chart; and FIG. 6 is the writing of data to a rewritable storage medium in the embodiment of the invention The flow chart of the steps to enter the protected storage area. This embodiment is to disclose a method and system for protecting data, especially important data (such as broadcast description block) in the record (such as hard disk), so as to avoid illegal Modification. Under normal conditions, the operating system will issue-access commands (read or write) to the device driver that stores data according to the requirements of the main application. Therefore, the operating system can recognize the normality related to the hard disk The source of the access command. The command is not issued by an application program of the operating system, so this access command does not belong to a legitimate application program of the operating system. The present invention utilizes this feature to distinguish the access command received by any device driver. (Especially the write command) is legal. ^ ΚJin η) ^ 1¾ (
I 再 填 % 本 頁 訂 (210X 297公釐) 497029 部 中 導 消 合 ii 卬 A7 B7 五、發明説明(4 ) 另外,查表則用以在硬碟中定義寫入保護儲存區(或儲存 磁區)。查表(存取表)係定義欲保護之儲存區位置,如檔案 描述區塊資訊。在改變或修改屬於存取表中所界定之硬碟 位置前,裝置驅動程式會將這個寫入命令送至監視程式模 組,藉以檢查其合法性。待確認寫入命令之合法性後,裝 置驅動程式才會將資料寫入保護區。 第2圖係本發明實施例之系統方塊圖,其用以保護電腦 系統之硬碟資料免於非法修改。在第2圖中,電腦系統之 結構不同於第1圖所示之情況。其中,檔案控制之裝置驅 動程式20係用以代替第1圖中所示之特定裝置驅動程式5。 用以控制檔案存取的裝置驅動程式20較習知驅動程式增加 一功能,亦即會去檢查所有寫入命令所指定的存取區,這 點在稍後會詳細說明。控制器6中的檔案控制存取發送器61 只會對裝置驅動程式20所發出的有效存取要求回應。根據 本實施例,存取表40係設置在硬碟機7中,且用以辨識或 放置需要保護之儲存磁區。監視程式模組30鍵結到用以檔 案控制的裝置驅動程式20及作業系統10,用以檢查任何欲 改變保護磁區内容之寫入命令之合法性。 裝置驅動程式20(與習知裝置驅動程式之功能相似)係接 收有關於硬碟7中特定儲存磁區之讀取或寫入命令、並且 驅動控制器6及其中的檔案控制存取發送器61,藉以執行 對應之存取動作。檔案控制存取發送器61可以保證只有播 案控制裝置驅動程式20所發出的存取命令可以被執行。通 常,接收之讀取或寫入命令係由作業系統10根據其上執行 6 本紙张尺度说W十KK!家卑((、NS ) Λ4規格(210X297公釐) ---------------IT------ -* (¾先閱讀背面之注意事項再硪寫本頁) ^/029 '…-------一· - . _______ 五、發明説明(5 ) " '—~^ 之應用程式要求而送出。不過,當電腦中毒時,接收之讀 取或寫入命令亦可能由未知程式(如電腦病毒)送出。檔案控 制裝置驅動程式20之另一個功能是檢查,寫入命令之儲存 誚先閱讀背面之注意事項再M寫本IJ〔) 磁區是否定義於存取表40,其定義有重要資訊(如作業系統 檔及檔案描述區塊)之儲存磁區。若欲寫入之儲存磁區屬於 存取表40所疋義的保護儲存磁區,則寫入命令必須由監視 程式模組30處理。監視程式模組3〇耦接(鉤接)於作業系統 10,係用以監視作業系統之狀態。也就是說,監視程式模 組30係檢查,作業系統10之寫入命令是否為檔案控制裝 置驅動程式20所送出。因為合法應用程式之任何正常寫入 叩々均可以這種方式確認,故電腦病毒之寫入命令便可以 抓到。檔案控制存取發送器61係一對一地對應於檔案控制 裝置驅動裝置20,藉以避免存取表40被合法的擷取。因此, 檔案控制裝置驅動器20可根據監視程式模組3〇之檢查結 果,藉以接受或拒絕該寫入命令。也因此,以上所述之電 腦系統便可以防止硬碟之重要資料遭電腦病毒變動或修 改。 接下來詳細說明存取表40、檔案控制裝置驅動器2〇、 .义及監視程式模組30等三個元件。 f 如上述,存取表4()係定義重要資訊之儲存磁區,如作 I- 業糸統槽案及檔案描述區塊。在這個例子中,只以_案^ | 述區塊之保護為例。不過,對於熟習此技術者而言,任何 | 與檔案相關之儲存磁區均可以採用存取表40定義之方法予 ^ 以保護。 卬 7 _ — — -* — —* . — 丨一 X li ii 'ir W W t { CNS ) ( 210X 297公釐) _~~~' ·— ---- 497029 Λ7 B7I Refill% This page is ordered (210X 297 mm) 497029 Intermediate Guideline II 卬 A7 B7 V. Invention Description (4) In addition, the lookup table is used to define a write-protected storage area (or storage) in the hard disk Magnetic field). The look-up table (access table) defines the location of the storage area to be protected, such as file description block information. Before changing or modifying the location of the hard disk belonging to the access list, the device driver sends this write command to the monitor module to check its legitimacy. After the validity of the write command is confirmed, the device driver will write the data to the protected area. Fig. 2 is a system block diagram of an embodiment of the present invention, which is used to protect hard disk data of a computer system from illegal modification. In Fig. 2, the structure of the computer system is different from that shown in Fig. 1. Among them, the file-controlled device driver 20 is used instead of the specific device driver 5 shown in FIG. The device driver 20 for controlling file access adds a function to the conventional driver, that is, it will check the access area designated by all write commands, which will be explained in detail later. The file control access transmitter 61 in the controller 6 will only respond to a valid access request issued by the device driver 20. According to this embodiment, the access table 40 is set in the hard disk drive 7 and is used to identify or place a storage magnetic area to be protected. The monitoring program module 30 is keyed to the device driver 20 and the operating system 10 for file control, and is used to check the legitimacy of any write command that wants to change the content of the protected sector. The device driver 20 (similar in function to the conventional device driver) receives a read or write command on a specific storage area in the hard disk 7 and drives the controller 6 and the file control access transmitter 61 therein. To perform the corresponding access action. The file control access transmitter 61 can ensure that only the access command issued by the broadcast control device driver 20 can be executed. Generally, the received read or write command is executed by the operating system 10 based on 6 paper sizes on it, said W ten KK! Jiabei ((, NS) Λ4 specification (210X297 mm) -------- ------- IT -------* (¾Read the notes on the back before copying this page) ^ / 029 '...------- 一 ·-. _______ V. Invention Explanation (5) " '— ~ ^ application request is sent. However, when the computer is poisoned, the read or write command received may also be sent by an unknown program (such as a computer virus). File control device driver 20 Another function is to check the storage of write commands. Read the notes on the back first, and then write the MJ IJ [) whether the magnetic area is defined in the access table 40, which defines important information (such as operating system files and file description blocks). ) Storage magnetic area. If the storage magnetic field to be written belongs to the protected storage magnetic field defined by the access table 40, the writing command must be processed by the monitoring program module 30. The monitoring program module 30 is coupled to the operating system 10 and is used to monitor the status of the operating system. That is, the monitoring program module 30 checks whether the writing command of the operating system 10 is sent by the file control device driver 20. Because any normal writing of legitimate applications can be confirmed in this way, the writing command of the computer virus can be caught. The file control access transmitter 61 corresponds to the file control device driving device 20 one-to-one, so as to prevent the access list 40 from being legally retrieved. Therefore, the file control device driver 20 can accept or reject the write command according to the inspection result of the monitoring program module 30. Therefore, the computer system described above can prevent important data on the hard disk from being changed or modified by computer viruses. Next, the three components such as the access table 40, the file control device driver 20, and the definition and monitoring program module 30 will be described in detail. f As mentioned above, the access table 4 () is used to define the storage area of important information, such as the I-system case and file description block. In this example, we only take the protection of the case mentioned above as an example. However, for those who are familiar with this technology, any storage area related to the file can be protected by the method defined in access table 40 ^.卬 7 _ — —--— — *. — 丨 One X li ii 'ir W W t {CNS) (210X 297 mm) _ ~~~' · — ---- 497029 Λ7 B7
部 屮 卑 ι\ η屮 屮 ι \ η
五、發明説明( 第3圖係本發明實施例中,存取表4〇及硬碟7中磁區 之對應關係圖。存取表4〇可以存放在硬碟7巾,這有助於 =取表40之存取處理。通常,硬碟是以位元組騎位儲存 貧料,其具有八個位元。根據本實施例,存取表4〇之各位 元組係用定標示硬碟驅動器7之四個儲存磁區,因此,兩 個位元可用以表示一個儲存磁區的狀態。以下表一則表示 狀態排列之範例。 V' 狀態位元 意義 00 開放 01 鎖住 10 只寫入一次 11 檔案描述區堍 表一 如表一所示,若對應儲存磁區之兩個位元為〇〇時,表 不對應之儲存磁區未受㈣(開放);若對賴存磁區之兩個 位元為11日寺,表示對應之儲存磁區受保護且在存取前應先 確認(槽案描述區塊)。,,鎖住”狀態表示對應之儲存磁區係禁 止存取,而,,寫入一次”狀態則表示對應之儲存磁區只可 入一次。 馬 在第3圖中所例示之四位元組長度之存取表4〇,如硬碟 7之儲存磁區7a部分。存取表40之四個位元組依序表示成 Bn Bn+1、Bn+2、Bn+3,用以儲存十六個儲存磁區Sm〜s 之使用狀態。舉例來說,位元組Bn係表示儲存磁 m 15 m °m+i Λ ----------…------------ 一 尺及這;11屮⑸阄家打Φ ( CNS) AAim ( 210X 297^ 8 497029 A7 - - ------- -------- B 7 五、發明説明(7 )V. Description of the invention (FIG. 3 is a map of the magnetic disk in the access table 40 and the hard disk 7 in the embodiment of the present invention. The access table 40 can be stored on the hard disk 7, which helps = Take the access processing of table 40. Generally, the hard disk is stored in a byte riding position, which has eight bits. According to this embodiment, each byte of the access table 40 is a hard disk with a fixed label. Drive 7 has four storage sectors. Therefore, two bits can be used to indicate the status of a storage sector. The following table shows an example of the status arrangement. V 'Status Bit Meaning 00 Open 01 Locked 10 Write-once 11 Table 1 of the file description area is shown in Table 1. If the two bits corresponding to the storage area are 0, the storage area corresponding to the table is not affected (open). The unit is 11th Temple, which means that the corresponding storage magnetic area is protected and should be confirmed before access (slot case description block). The "locked" status indicates that the corresponding storage magnetic area is forbidden to access, and ", Write once" status means that the corresponding storage magnetic area can only be entered once. Horse in Figure 3 The four byte length access table 40 exemplified in the example is the storage magnetic area 7a part of the hard disk 7. The four bytes of the access table 40 are sequentially expressed as Bn Bn + 1, Bn + 2, Bn + 3 is used to store the use state of the sixteen storage magnetic areas Sm ~ s. For example, the byte Bn means storage magnetic m 15 m ° m + i Λ ---------- ...------------ One foot and this; 11 屮 ⑸ 阄 家 打 Φ (CNS) AAim (210X 297 ^ 8 497029 A7--------- ----- --- B 7 V. Description of the invention (7)
Sm+2、Sm+3之使用狀態。在此例中,這些磁區都是正常資料。 位兀組Bn+1係表示儲存磁區Sm“、\+5、Sm+6、之使用 狀態,其中前兩個磁區Sm+1、Sm+s包含有正常資料,後兩個 磁區Sm+6、Sm+7則具有欲保護之槽案描述區塊。位元組bw 係表示儲存磁區sm+8、sm+9、Sm+10、Sm+"之使用狀態。前 三個磁區Sm+8、Sm+9、sm+1G具有欲保護之檔案描述區塊, 磁區sm+11、Sm+7則是正常資料。位元組Bn+3係表示儲存磁 ^ ^m+12 Sm+13、Sm+M、Sm+15之使用狀態。這些磁區也都包 含正常資料。 當檔案控制裝置驅動程式20接收寫入命令,準備改變 具有保護資料之磁區(例如磁區U内容時,寫入命令首先 要送至監視程式模組30以檢查其合法性。若寫入命令為合 法的,則檔案控制裝置驅動程式20會驅動控制器6以執行 必要之寫入動作。另外,當檔案控制裝置驅動程式2〇所接 收到的寫入命令,是要改變儲存正常資料之磁區(例如磁區 Sm+n)内容時,寫入命令可直接由檔案控制裝置驅動程式2〇 處理,藉以啟動控制器6執行必要之寫入動作。任何非法 之存取要求均會被檔案控制存取發送器61擋下來。 第4圖係本發明實施例中,檔案控制裝置驅動程式2〇 之詳細動作流程圖。注意的是,本實施例之稽案控制裝置 驅動程式2G也都可以進行習知裝置驅動程式之各項功能。 如第4圖所示,㈣控制裝置驅動程式2()首錢收作業系 統(S1)或未知程式之命令。基本上,財控制裝置驅動程式 20此時並不能分辨出送出目前命令的程式。接著,槽案控 (讀先閱讀背面之注意事項再續寫本質 訂 1 射酬$ 彳#( (、NS ) ---—------ 497029 A7 五、發明説明(8) 制裝置驅動程式20辨識該命令之動作是讀取命令或寫入命 令(S2)。當此命令為讀取命令時(與本發明無關),檔案控制 裝置驅動程式20可以直接驅動控制器6以執行正常之讀取 動作(S3)。 當此命令為寫入命令時,檔案控制裝置驅動程式20則 執行以下兩個步驟,亦即檢查欲存取之儲存磁區是否受到 保護、以及檢查此寫入命令之合法性。如第4圖所示,播 案控制裝置驅動程式20首先透過檔案控制存取發送器61 讀取硬碟7之存取表40,藉以檢查是否為認可之存取要求 (S4)。根據存取表40,檔案控制裝置驅動程式20則檢查寫 入要求欲存取之磁區是否在存取表40中定義為受到存取保 護的標的(S5)。若這種關係不成立,則這個寫入命令不需要 進一步的檢查,而檔案控制裝置驅動程式20就可以直接地 驅動控制器6以執行正常寫入動作(S6)。若這種關係成立, 則必須確認寫入命令之合法性。 確認寫入命令之合法性係由監視程式模組30所執行。 因此,檔案控制裝置驅動程式20可以寫入命令送入監視程 式模組30,並等待回應(S7)。待確認寫入命令之合法性後, 監視程式模組30會將結果送回檔案控制裝置驅動程式20。 若寫入命令為合法的(S8),檔案控制裝置驅動程式20係驅 動控制器6以執行正常寫入動作(S6)。若寫入命令為不合法 的(S8),則檔案控制裝置控制程式20便將錯誤訊息送至作 業系統,並拒絕執行寫入動作(S9)。 第5圖係本發明實施例中,監視程式模組30之詳細動 10 冬紙ίί.尺度iC州十R阀家4卑((、NS ) /\4規格(210X297公釐) (誚先閱讀背面之注意事項再填寫本頁) Φ 訂 -6·. 497029 A7 五、發明説明(9) " 作流程圖。如上述,監視程式模組3〇係檢查被送至檐案控 制裝置驅動程式20之寫入命令之合法性,並將檢查結果送 回槽案控難置驅動H 2〇。在第5圖中,監視程式模組3〇 首先接收有關被送至檔案控制裝置驅動器2()之寫入命令之 資afl(Sll)在本貝施例中,監視程式模組以"釣接"裝置 耗接於作業系統,藉以得到作業系統之狀態。舉例來說, 在微軟視窗作業系統中,監視程式模組3G可以虛擬裝置驅 動器(VxD)達成。因此,監視程賴組π可檢查作業系统 以得知寫人命令是否由合法應用或常式所送出(si2)。通常, 任何執行應用之硬碟存取要求均可以由作業系統所辨識。 也就是說,藉鉤接作業系統,監視程式模組3〇可決定寫入 命令的合法性或正確性。最後,監視程式模組3〇會將寫入 〒令的正確性送回檔案控制裝置驅動程式2〇(si3)。因此, 檔案控制裝置驅動程式20便可以判斷寫入命令是否合法(第 4圖之S8),並適當地執行此命令(第4圖之%或s9)。 檔案控制裝置驅動器20及監視程式模組3〇之功能隨後 祝明。第6圖係本發明實施例中,將資料寫入可重寫儲存 媒體之寫入存取表40所定義的保護儲存區之步驟流程圖。 首先,電腦系統(或儲存系統)會在硬碟機7中建立並定義一 個存取表40,藉以指出重要檔案或資料(如檔案描述區塊) 之儲存磁區(S21)。存取表40可以隨著硬碟機7而機動變化。 接著,作業系統或病毒程式之寫入命令可送至檔案控制裝 置驅動程式20(S22)。此時,檔案控制裝置驅動程式2〇並 不月b辨識寫入命令的來源。 、 _________ ____ 本纸仄尺度垅川屮改丨句家ϋ—(-Usage status of Sm + 2, Sm + 3. In this example, these magnetic fields are normal data. Bit group Bn + 1 indicates the use status of storage magnetic areas Sm ", \ +5, Sm + 6, where the first two magnetic areas Sm + 1, Sm + s contain normal data, and the last two magnetic areas Sm +6, Sm + 7 have the slot description block to be protected. The byte bw indicates the use status of the storage magnetic areas sm + 8, sm + 9, Sm + 10, Sm + ". The first three magnetic fields Areas Sm + 8, Sm + 9, and sm + 1G have file description blocks to be protected, and magnetic areas sm + 11 and Sm + 7 are normal data. Bytes Bn + 3 indicate storage magnetics ^ ^ m + 12 The usage status of Sm + 13, Sm + M, Sm + 15. These magnetic areas also contain normal data. When the file control device driver 20 receives the write command, it is ready to change the magnetic area with protected data (for example, the content of magnetic area U) At this time, the write command is first sent to the monitoring program module 30 to check its legality. If the write command is legal, the file control device driver 20 will drive the controller 6 to perform the necessary write action. In addition, When the write command received by the file control device driver 20 is to change the content of the magnetic zone (such as the magnetic zone Sm + n) that stores normal data, the write command can be directly The file control device driver program 20 processes, thereby activating the controller 6 to perform necessary writing actions. Any illegal access request will be blocked by the file control access transmitter 61. Figure 4 is an embodiment of the present invention. The detailed operation flowchart of the file control device driver 20. Note that the audit control device driver 2G in this embodiment can also perform various functions of the known device driver. As shown in FIG. 4, The control device driver 2 () first money collection operating system (S1) or an unknown program command. Basically, the financial control device driver 20 cannot distinguish the program that sends the current command at this time. Then, the slot case control (read first Read the notes on the back and continue to write the essence of the order. 1 Shooting remuneration $ 彳 # ((, NS) ---------- 497029 A7 V. Description of the invention (8) Device driver 20 recognizes the action of the command It is a read command or a write command (S2). When this command is a read command (not related to the present invention), the file control device driver 20 can directly drive the controller 6 to perform a normal read operation (S3). When this command When writing a command, the file control device driver 20 performs the following two steps, that is, checking whether the storage magnetic zone to be accessed is protected, and checking the legality of the write command. As shown in FIG. The file control device driver 20 first reads the access table 40 of the hard disk 7 through the file control access transmitter 61 to check whether it is an authorized access request (S4). According to the access table 40, the file control device driver 20 then check whether the magnetic area to be accessed by the write request is defined as the subject of access protection in the access table 40 (S5). If this relationship does not hold, this write command does not require further inspection, and the file The control device driver 20 can directly drive the controller 6 to perform a normal write operation (S6). If this relationship holds, the legitimacy of the write order must be confirmed. The validity of the write command is confirmed by the monitor program module 30. Therefore, the file control device driver program 20 can write a command to the monitoring program module 30 and wait for a response (S7). After confirming the validity of the write command, the monitoring program module 30 sends the result back to the file control device driver 20. If the write command is legal (S8), the file control device driver 20 drives the controller 6 to perform a normal write operation (S6). If the write command is illegal (S8), the file control device control program 20 sends an error message to the job system and refuses to execute the write operation (S9). FIG. 5 is a detailed operation of the monitoring program module 30 in the embodiment of the present invention. Winter paper ί. Standard iC state ten R valve home 4 BC ((, NS) / \ 4 specifications (210X297 mm) (read first Note on the back, please fill in this page again) Φ Order-6 ·. 497029 A7 V. Description of Invention (9) " Work flow chart. As mentioned above, the monitoring program module 30 is sent to the eaves control device driver The legitimacy of the write command of 20, and the inspection result is returned to the slot. The case control hard drive H 2 0. In Figure 5, the monitoring program module 3 0 first receives the information sent to the file control device driver 2 (). Afl (Sll) of the write command In this example, the monitoring program module is connected to the operating system with the "fishing" device to obtain the status of the operating system. For example, operating in Microsoft Windows In the system, the monitoring program module 3G can be implemented by a virtual device driver (VxD). Therefore, the monitoring process group π can check the operating system to know whether the writer's command is sent by a legitimate application or routine (si2). Generally, any All hard disk access requests for running applications can be made by the operating system That is, by hooking the operating system, the monitoring program module 30 can determine the legitimacy or correctness of the write command. Finally, the monitoring program module 30 will send the correctness of the write command back to the file. The control device driver 20 (si3). Therefore, the file control device driver 20 can judge whether the write command is legal (S8 in FIG. 4) and execute this command appropriately (% or s9 in FIG. 4). The functions of the file control device driver 20 and the monitoring program module 30 will be described later. Fig. 6 is a protected storage area defined by a write access table 40 for writing data to a rewritable storage medium in the embodiment of the present invention. The flow chart of the steps: First, the computer system (or storage system) will create and define an access table 40 in the hard disk drive 7 to indicate the storage area of important files or data (such as file description blocks) (S21) The access table 40 can be changed dynamically with the hard disk drive 7. Then, the writing command of the operating system or virus program can be sent to the file control device driver 20 (S22). At this time, the file control device driver 2 Does not identify write Source commands, _________ ____ scale of this paper Chek Long Chuan Shu Che change the sentence at home ϋ - (-
i—I-iil··------,τ------φ (ii先閱讀背面之注意事項再功寫本1JC 11 497029 A7 B7 五、發明説明(10 ) 然後,檔案控制裝置驅動程式20可利用檔案控制存取 發送器61,檢查欲存取磁區與存取表40中所定義之保護儲 存區間關係(S23)。注意的是,只有檔案控制存取發送器61 可調整存取表40。若寫入命令欲存取存取表40定義之保護 儲存區,驅動程式20會將寫入命令送至監視程式模組 30(S24)。監視程式模組30會根據作業系統之狀態,檢查寫 入命令是否由合法應用程式所送出(S25)。最後,若寫入命 令為合法的,檔案控制裝置驅動程式20就可以驅動控制器 6以對保護儲存區執行正常寫入動作(S26)。不過,若寫入 命令為不合法的,則檔案控制裝置驅動程式20不會執行任 何寫入動作,並將錯誤訊息送到作業系統。 根據上述敘述,本發明之保護裝置及方法可成功地濾出 未知程式(如電腦病毒)之非法寫入要求、並避免因此而改變 碳碟中之重要資訊。另外,檔案控制裝置驅動程式20及檔 案控制存取發送器61可執行存取表40之存取。這個特徵 可確保存取表之完整性。 托浐部中呔ii導而He: r-,消於合卬f (詔先閱讀背面之注意事項再楨寫本頁) 雖然本發明已以較佳實施例揭露如上,然其並非用以限 定本發明,任何熟習此技藝者,在不脫離本發明之精神和 範圍内,當可做更動與潤飾,因此本發明之保護範圍當視 後附之申請專利範圍所界定者為準。 12 本纸汛尺度述《十网闯家樣卑(C、NS ) Λ4规格(210X 297公釐)i—I-iil · · ------, τ ------ φ (ii first read the notes on the back and then write the copybook 1JC 11 497029 A7 B7 V. Description of the invention (10) Then, the file control device The driver 20 can use the file control access transmitter 61 to check the relationship between the magnetic access zone and the protected storage interval defined in the access table 40 (S23). Note that only the file control access transmitter 61 can be adjusted. Access table 40. If the write command wants to access the protected storage area defined by the access table 40, the driver program 20 will send the write command to the monitor program module 30 (S24). The monitor program module 30 will State, check whether the write command is sent by a legitimate application (S25). Finally, if the write command is valid, the file control device driver 20 can drive the controller 6 to perform a normal write operation on the protected storage area (S26). However, if the write command is illegal, the file control device driver 20 will not perform any write action and send an error message to the operating system. According to the above description, the protection device and method of the present invention Can successfully filter out unknown processes (Such as a computer virus) for illegal writing and avoid changing important information in the carbon disk. In addition, the file control device driver 20 and file control access transmitter 61 can perform access to the access table 40. This The characteristics can ensure the integrity of the access table. The support section of the guideline He: r-, eliminates the combination of f (read the precautions on the back before writing this page) Although the present invention has been better implemented The example is disclosed as above, but it is not intended to limit the present invention. Any person skilled in the art can make changes and retouches without departing from the spirit and scope of the present invention. Therefore, the protection scope of the present invention shall be regarded as the attached patent. The definition in the scope shall prevail. 12 The scale of this paper is described in "The Ten Nets Chuang NS (C, NS) Λ4 Specification (210X 297 mm)
Claims (1)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16242998A | 1998-09-28 | 1998-09-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
TW497029B true TW497029B (en) | 2002-08-01 |
Family
ID=22585583
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW88112464A TW497029B (en) | 1998-09-28 | 1999-07-22 | Method and system for protecting data in a rewritable storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN1151438C (en) |
TW (1) | TW497029B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0523293D0 (en) * | 2005-11-16 | 2005-12-21 | Ibm | Apparatus and method for controlling data copy services |
CN101373452B (en) * | 2007-08-24 | 2010-06-16 | 英业达股份有限公司 | Method for testing hard disk read-write operations |
-
1999
- 1999-07-22 TW TW88112464A patent/TW497029B/en not_active IP Right Cessation
- 1999-09-24 CN CNB991194373A patent/CN1151438C/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN1151438C (en) | 2004-05-26 |
CN1250911A (en) | 2000-04-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7124301B1 (en) | Data protection method for a removable storage medium and a storage device using the same | |
US6324537B1 (en) | Device, system and method for data access control | |
US7725673B2 (en) | Storage apparatus for preventing falsification of data | |
JP2001297038A (en) | Data storage device, recording medium, and recording medium control method | |
KR20100107453A (en) | Storage sub-system for a computer comprising write-once memory devices and write-many memory devices and related method | |
KR100586063B1 (en) | Data structure of flash memory with variable size system field which can be updated, usb memory therewith and a control method of the system field | |
US8424081B2 (en) | Disk unit, magnetic disk unit and information storage unit | |
TWI396994B (en) | Controller capable of preventing spread of computer viruses and storage system and metho thereof | |
KR100661894B1 (en) | Autonomic binding of subsystems to system to prevent theft | |
TW497029B (en) | Method and system for protecting data in a rewritable storage medium | |
JP4829126B2 (en) | Method for controlling a data processing device | |
JP2005284816A (en) | Disk array system | |
GB2323951A (en) | Password processing | |
JP4057858B2 (en) | File management method and memory card and terminal device using the same | |
JPS61134836A (en) | Limiting system for application of software | |
JP4213704B2 (en) | Virtual file management device, virtual file management method, and virtual file management program | |
JP4030524B2 (en) | Data storage method for replaceable storage medium and storage device to which the method is applied | |
JP2001014219A (en) | Method and device for controlling cache | |
JP2000339154A (en) | Computer software illegal install detection system and its method | |
TWI251743B (en) | Method for disabling writing function of storage apparatus | |
JP5010191B2 (en) | Storage apparatus and operation control method thereof | |
JP5397617B2 (en) | Management system, information processing apparatus, management apparatus, management method, and program | |
JP2006236361A (en) | Protection of data in interchangeable storage medium, and storage apparatus, access method and control device applying same thereto | |
US20060007738A1 (en) | Area management type memory system, area management type memory unit and area management type memory controller | |
JP4773757B2 (en) | Area management type memory device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GD4A | Issue of patent certificate for granted invention patent | ||
MM4A | Annulment or lapse of patent due to non-payment of fees |