502205 A7 B7 五、發明說明(/) 本發明係關於一種以安全方式儲存備份或復原檔案於 電腦系統硬碟之方法。 已成爲慣常的是,供應一新的電腦系統一群使用於該 電腦系統之軟體。該軟體係爲方便地以預先載入於電腦上 而作·提供,且一種所謂“重新載入”(reload)式碟片(通常 爲CD-ROM形式)係作提供,使用者可使用其以重新載入 所有或部分之該軟體於電腦系統,當該系統變成毀壞或者 出現妨礙該系統之正常作業的另一問題時。運用“重新載 入”式碟片以重新載入軟體,可將系統設定回到製造商之 初始架構。 經濟部智慧財產局員工消費合作社印製 (請先閱讀背面之注意事項再填寫本頁) 線· 然而,含有所有權軟體之“重新載入”式CD-ROM ( 光碟唯讀記憶體)之供應係使得相當易於由“重新載入” 式碟片將該軟體作複製,此係明顯爲不符所願。在欲克服 此種問題之企圖中,對於供應“重新載入”式碟片者已成 爲慣常的是,於該等碟片上包括一安全碼,其必須在由該 “重新載入”式碟片將任何軟體作重新載入於系統前被正 確輸進。欲進一步提高安全階層,亦爲常用的是,由製造 •商將供給系統之“重新載入”式碟片上的安全碼作儲存於 BIOS(基本輸入/輸出系統)中,且當係企圖由該重新載入 式碟片將軟體重新載入時,所輸進之碼係由BIOS所檢測 ,該被檢測得之碼係與所儲存者作比較。若檢測出之碼係 不符合BIOS中記錄之碼,則不允許由該“重新載入”碟 片將軟體重新載入。 不,因爲不同製造商係運用不同供應商之BIOS,且各 個BIOS可能具有重大之作業差異,故只要該安全碼之使 3 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 502205 A7 B7 五、發明說明(γ) 用係無法針對所有電腦系統而標準化時,由電腦系統之 BIOS作檢測之安全碼的運用將會引發問題。再者,BIOS 系統之詳細內容係公佈於網際網路(Internet)上,且因此係 易於爲欲未經授權而使用或複製軟體之人士所取用。又一 問題係,由於CD-ROM複製設備現已易於取得,即使該等 安全碼係存在於碟片上,仍無法防止檔案由整個或部分之 碟片作複製。 本發明係基於此等問題而提出。 是以,本發明一個目的爲免除供應備份或復原檔案於 例如CD-ROM單獨的“重新載入”式碟片上之需求,因此 ,本發明之目的爲提出一種方法,藉此備份或“重新載入 ”軟體可係儲存於電腦系統之硬碟的一安全區域中,其中 係限制對該安全區域之存取。 經濟部智慧財產局員工消費合作社印製 因此,根本發明之第一個層面,係提出一種安全儲存 備份或復原檔案於電腦系統之硬碟上的方法,包含··於該 硬碟上構成一安全分區(partition),其將硬碟分割成一安全 區域與一非安全區域,使用者係具有限制存取於該安全區 域而具有未限制存取於該非安全區域;以及,提供備份或 復原檔案於該安全區域。 運用本發明之此種方法,係可能儲存備份或復原檔案 於電腦系統之硬碟之非使用者可存取的部分中,因而免除 將此等檔案供應於單獨之CD-ROM上的需求。本發明亦將 使得除了系統製造商之外的任何關係人極爲難以取得存取 作備份或復原檔案(其包括諸如作業系統之所有權軟體) 而供諸如複製或使用於其他電腦系統上之非法使用。 4 本紙張尺度適用中國國家標準(CNS)A4規格(21〇 X 297公釐)502205 A7 B7 V. Description of the invention (/) The present invention relates to a method for storing backup or restoring files on a hard disk of a computer system in a safe manner. It has become customary to supply a new computer system with software for use in that computer system. This software system is provided and conveniently provided in advance on a computer, and a so-called "reload" type disc (usually in the form of a CD-ROM) is provided, and users can use it to Reload all or part of the software into the computer system when the system becomes corrupted or another problem occurs that interferes with the normal operation of the system. Using "reload" discs to reload the software, the system can be set back to the original architecture of the manufacturer. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs (please read the precautions on the back before filling out this page) Line · However, the supply of "reload" CD-ROM (CD-ROM) with proprietary software It makes it quite easy to copy the software from a "reload" disc, which is obviously not what you want. In an attempt to overcome such problems, it has become customary for those who supply "reloaded" discs to include a security code on the discs that must be used by the "reloaded" discs. The video is correctly imported before reloading any software into the system. To further improve the security level, it is also common that the manufacturer / manufacturer stores the security code on the "reload" -type disc supplied to the system in the BIOS (Basic Input / Output System), and when an attempt is made by When the reloading disc reloads the software, the input code is detected by the BIOS, and the detected code is compared with the stored code. If the detected code does not match the code recorded in the BIOS, the software is not allowed to be reloaded from the "reload" disc. No, because different manufacturers use BIOS from different vendors, and each BIOS may have significant operating differences, as long as the security code enables 3 paper sizes to apply the Chinese National Standard (CNS) A4 specification (210 X 297 mm) ) 502205 A7 B7 V. Description of the Invention (γ) When the system cannot be standardized for all computer systems, the use of security codes detected by the computer system's BIOS will cause problems. Furthermore, the details of the BIOS system are published on the Internet and are therefore easily accessible to anyone who wants to use or copy software without authorization. Another problem is that, because CD-ROM duplication equipment is now readily available, even if such security codes exist on the disc, the files cannot be prevented from being copied in whole or in part by the disc. The present invention is based on these problems. Therefore, an object of the present invention is to eliminate the need to supply backup or restore files on a separate "reload" type disc such as a CD-ROM. Therefore, the object of the present invention is to propose a method whereby the backup or "reload" "Loading" software may be stored in a secure area of a hard disk of a computer system, where access to the secure area is restricted. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs Therefore, the first aspect of the fundamental invention is to propose a method for safely storing backup or restoring files on a hard disk of a computer system, which includes ... forming a security on the hard disk Partition, which partitions a hard disk into a secure area and a non-secure area, users have restricted access to the secure area and unrestricted access to the non-secure area; and provide backup or restore files in the Safe area. With this method of the present invention, it is possible to store backup or restore files in a non-user accessible portion of the hard disk of the computer system, thus eliminating the need to supply these files on a separate CD-ROM. The invention will also make it extremely difficult for anyone other than the system manufacturer to gain access to back up or restore files (which includes proprietary software such as operating systems) for illegal use such as copying or use on other computer systems. 4 This paper size applies to China National Standard (CNS) A4 (21〇 X 297 mm)
I A7 __B7 ___ 五、發明說明(3 ) 較佳而言,該種方法亦包括提供關連於該安全區域之 一安全碼,其必須在允許存取於該安全區域之前係給定。 較佳而言,該對安全區域之存取僅可由使用者運用軟 體所自動達成,其給予該安全碼、移去該安全分區、運用 該備份或復原檔案而重新建構電腦系統,且立即恢復該安 全分區以防止進一步存取至安全區域。 較佳而言,安全分區係運用於低階作業系統中之SET MAX ADDRESS(設定最大位址)指令所建立。舉例而言, 低階作業系統可包含一 DOS作業系統。 根據本發明之第二個層面,將提出一種電腦系統,其 包含硬碟形式之一儲存裝賃,該硬碟係安全分割爲一安全 區域與一非安全區域,使用者對該安全區域之存取係受限 制而對非安全區域之存取則未受限制,其中該安全區域內 係位有供用於系統之重新建構的備份或復原檔案。 •較佳而言,該安全區域具有關連於其之一安全碼,其 必須在允許對其存取之前係給定。 較佳而言,該安全分區係運用由系統所用之低階作業 系統中的一SET MAX ADDRESS指令作建立。 經濟部智慧財產局員工消費合作社印製 較佳而言,對該安全區域之存取係僅允許該使用者經 由軟體之使用,其移去該安全分區、重新建構系統,且自 動重新恢復該安全分區。 本發明將僅藉由實例而進一步敘述於後,並參照伴隨 之圖式,其中: 第一圖顯示一種習用電腦系統之示意圖;及 第二圖顯示根據本發明之一種電腦系統的部分示意圖 5 ^紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐)~麵 502205 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(+) 0 元件符號說明 1 0 中央處理裝置 1 1 監視器 1 2 鍵盤 1 3 滑鼠 1 4 印表機 1 6 掃描器 1 7 數據機 1 8 儲存裝置(硬碟) 1 9 安全分區 2 1 安全區域 2 2 非安全區域 參考圖式,第一圖說明一種習用電腦系統。 第一圖之系統包含一中央處理裝置1〇,其作動連結 至多種周邊裝置,例如一監視器1 1、鍵盤1 2、滑鼠1 3、印表機1 4、掃描器1 6及(可能)一數據機1 7、 數據機1 7係針對通訊之目的。 中央處理裝置1〇係爲習用形式並包括硬碟形式之一 儲存裝置1 8,資料與作業系統或其他應用軟體可係儲存 於該儲存裝置1 8。 中央處理裝置1 〇運用一基本輸入及輸出系統(BIOS) ,其控制中央處理裝置主要構件(包括硬碟)之操作。此 BIOS係建立使得各個構件係由BI0S所檢測,且各個構件 之特性係儲存。BIOS本質上係爲一件軟體,其係嵌入於中 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) IJ ------------^---------線 IAW. (請先閱讀背面之注意事項再填寫本頁) 502205 A7 B7 五、發明說明(厂) 央處理裝置10之一構件中。 每當電腦系統係開機時,其進行一 “啓動(boot)周期” ,涉及該BIOS檢查其先前已檢測之所有構件是否存在並 且係正確地作用。在此舉係發生之後’ BIOS至硬碟1 8尋 找一作業系統以啓始,且最後該作業系統對載入以任何指 定之應用軟體。於第一圖之習用電腦系統1之中,在“啓 動周期”內,BIOS將檢測該硬碟1 8之存在,並將檢測該 硬碟之整個體積。此係即使硬碟1 8被分區之情形,藉以 作分割爲一個以上可識別部分。 本發明係基於理解若一分區係建立於硬碟上,其爲一 安全分區,且使用者或其.他未授權之對於該分區的區域之 存取係被防止或至少受到限制,則係可能於硬碟之該分區 的區域儲存備份及/或復原檔案,其供用於當系統已成爲 無法操作之情形。該安全分區將亦作用以防止未經授權之 複製及使用檔案或者使用者損壞檔案,該安全區域係無法 由使用者所侵入,除非是針對以下文中所述方式運用備份 或復原檔案的目的。 參考第二圖,顯示運用本發明之一種電腦系統的中央 經濟部智慧財產局員工消費合作社印製 處理單元之硬碟1 8的示意圖。 一安全分區1 9係已建立於硬碟上,其將硬碟1 8分 割爲安全區域2 1與非安全區域2 2。此舉係藉由電腦作 業系統以界定該硬碟1 8可作存取的最大體積而達成。方 便而言,若一 DOS(TM7)作業系統係存在時,可使用SET MAX ADDRESS指令以設定該硬碟可由使用者作存取之最 大體積。因此,舉例而言,若使用850 MB之硬碟,則可 7 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公f )_ 502205 A7 _ _ B7 五、發明說明(么) (請先閱讀背面之注意事項再填寫本頁) 利用SET MAX ADDRESS指令以指定該硬碟可被使用者存 取之最大容量爲820MB。於此等情況下’此係意謂著基本 上該硬碟容量之30MB係可利用於安全儲存。此區域係安 全之理由爲,當以此方式而運用SET MAX ADDRESS指令 時,BIOS將僅認定該硬碟指定之最大容量,即820MB, 而將不會認出其餘之30MB。因此,若系統進行“啓動周 期”且BIOS檢查中央處理裝置之各個構件的特性與功能 ,則將指出該硬碟具有容量爲820MB而不會指示使用者係 尙有30MB之儲存容量於硬碟上。此意謂著儲存於此 30MB之安全區域中的任何檔案或資料係無法被使用者所 存取。事實上,由於使甩者將以爲硬碟之最大容量係限定 爲BIOS所檢測出之硬碟體積(即非安全區域之體積), 該使用者其至不會瞭解係存在於該30MB中之檔案。再者 ,存在於該非安全區域中的檔案將不會由系統所檢測出。 復原及/或備份檔案係儲存於硬碟之安全區域,其係 由安全分區所界定。作業系統、其他應用軟體及資料係儲 存於硬碟之非安全區域。 經濟部智慧財產局員工消費合作社印製 使用時,若檔案或應用軟體係損壞或遭刪除而致使電 腦系統將不再正常操作,使用者可利用電腦程式(較佳爲 於CD-ROM或其他碟片上)而將電腦系統回復至其初始架 構。使用者可將CD_ROM插入至系統之CD-ROM機,且 使得該系統進行啓動周期。於啓動周期內,BIOS將檢測該 軟體之存在並將使其執行? 該程式執行時使用SET MAX ADDRESS指令,以重置 可存取之硬碟區域爲硬碟之整個體積。該程式接著尋找係 8 冢紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 502205 A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明說明(^) 儲存於硬碟1 8之安全區域2 1之中的一安全碼。一旦已 發現安全碼,此係與嵌入於程式中之一安全碼作比較,若 該二安全碼係相符合時,程式接著利用備份或復原檔案以 將系統恢復至其初始架構。一旦系統已恢復,程式立即使 用SET MAX ADDERSS指令以於硬碟1 8上建立安全分區 1 9,以再次提供一安全區域2 1。若當該程式係執行時 ,於程式中之安全碼係不符於硬碟18之安全區域21中 的安全碼,或者未發現安全碼,則程式將立即以前述方式 而恢復安全分區1 9,無須利用備份或復原檔案。 藉著要求使用者利用電腦程式以存取該安全區域及運 用備份或復原檔案,意謂著使用者將永遠不會直接存取該 等包含諸如作業系統或應用軟體之所有權軟體的前述檔案 。此意謂著此等檔案之未經授權的複製或使用將不會發生 。甚者,正如並無完整之作業系統或應用軟體係構成被使 用者所用以恢復電腦至其初始架構之該電腦程式的一部分 ,即使該程式係設於單獨之碟片上,係不可能以未經授>翟 之方式而複製或使用一作業系統或應用軟體程式或檔案。 將可瞭解的是,係可能運用本發明以提供復原或備份 檔案於電腦系統之硬碟上,俾使其係安全且無法由使甩者 或未經授權使用或複製之任何其他人士所存取。本發明之 一個特別優點爲其並未取決於Bios,意謂著其可針對所有 電腦系統而標準化。 誠然,可理解的是,本發明係不欲受限於前述實施例 之細節,其僅係舉例而作說明。 9 (請先閲讀背面之注意事項再填寫本頁) ,¾ · •線- 本紙張尺度適用中國國家標準(CNS)A4規格(210 x 297公爱)I A7 __B7 ___ V. Description of the Invention (3) Preferably, this method also includes providing a security code related to the security area, which must be given before allowing access to the security area. Preferably, the access to the secure area can only be achieved automatically by the user using software, which gives the security code, removes the secure partition, uses the backup or restore file to reconstruct the computer system, and immediately restores the computer system. Secure partition to prevent further access to the secure area. Preferably, the secure partition is created by the SET MAX ADDRESS instruction used in low-level operating systems. For example, the low-level operating system may include a DOS operating system. According to the second aspect of the present invention, a computer system is proposed, which includes a storage device in the form of a hard disk. The hard disk is safely divided into a secure area and a non-secure area. Access is restricted and access to non-secure areas is unrestricted, where backup or restore files for system reconstruction are located in the secure area. • Preferably, the security zone has a security code associated with it, which must be given before allowing access to it. Preferably, the secure partition is established using a SET MAX ADDRESS instruction in a low-level operating system used by the system. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, preferably, the access to the security zone only allows the user to use the software, which removes the security zone, reconstructs the system, and automatically restores the security Partition. The present invention will be further described below by way of example only, with reference to accompanying drawings, wherein: the first diagram shows a schematic diagram of a conventional computer system; and the second diagram shows a partial diagram of a computer system according to the invention 5 The paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) to the surface 502205 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Description of the invention (+) 0 Description of component symbols 1 0 Central processing device 1 1 Monitor 1 2 Keyboard 1 3 Mouse 1 4 Printer 1 6 Scanner 1 7 Modem 1 8 Storage Device (Hard Disk) 1 9 Security Zone 2 1 Security Zone 2 2 Reference Pattern for Non-Security Zone, First The figure illustrates a conventional computer system. The system of the first figure includes a central processing unit 10 which is connected to various peripheral devices, such as a monitor 11, a keyboard 1 2, a mouse 1 3, a printer 1 4, a scanner 16 and (possibly ) A modem 17 and modem 17 are for communication purposes. The central processing device 10 is a conventional storage device and includes one of the hard disk storage devices 18. Data and operating systems or other application software may be stored in the storage device 18. The central processing unit 10 uses a basic input and output system (BIOS), which controls the operations of the main components of the central processing unit (including hard disks). This BIOS is established so that each component is detected by BIOS and the characteristics of each component are stored. The BIOS is essentially a piece of software, which is embedded in the Chinese paper standard and applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) IJ ------------ ^ --- ------ Line IAW. (Please read the notes on the back before filling this page) 502205 A7 B7 V. Description of the invention (factory) One of the components of the central processing device 10. Whenever a computer system is powered on, it performs a "boot cycle" that involves the BIOS checking that all components it has previously detected are present and functioning correctly. After this happens, the BIOS to hard disk 18 finds an operating system to start, and finally the operating system loads any specified application software. In the conventional computer system 1 in the first figure, during the "startup period", the BIOS will detect the existence of the hard disk 18 and will detect the entire volume of the hard disk. This is even if the hard disk 18 is partitioned, so that it is divided into more than one identifiable part. The present invention is based on the understanding that if a partition is built on a hard disk, it is a secure partition, and the user or he or she has unauthorized access to the area of the partition is prevented or at least restricted, it is possible Store backup and / or recovery files in this partitioned area of the hard drive for use when the system has become inoperable. This secure partition will also function to prevent unauthorized copying and use of files or damage to files by users. This secure area cannot be accessed by users, except for the purpose of using backup or restore files for the methods described below. Referring to the second figure, there is shown a schematic diagram of a hard disk 18 of a processing unit printed by a consumer cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs using a computer system of the present invention. A secure partition 19 series has been created on the hard disk, which divides the hard disk 18 into a safe area 2 1 and a non-safe area 22. This is achieved by a computer operating system to define the maximum volume that the hard disk 18 can access. Conveniently, if a DOS (TM7) operating system exists, you can use the SET MAX ADDRESS command to set the maximum volume that the hard disk can be accessed by the user. So, for example, if you use a 850 MB hard disk, you can use 7 paper sizes to apply the Chinese National Standard (CNS) A4 specification (210 X 297 male f) _ 502205 A7 _ _ B7 V. Description of the invention (?) ( (Please read the precautions on the back before filling out this page) Use the SET MAX ADDRESS command to specify that the maximum capacity of the hard disk that can be accessed by the user is 820MB. In these cases, 'this means that basically 30MB of the hard disk capacity is available for secure storage. The reason why this area is safe is that when the SET MAX ADDRESS instruction is used in this way, the BIOS will only recognize the maximum capacity specified by the hard disk, which is 820MB, and will not recognize the remaining 30MB. Therefore, if the system performs a "boot cycle" and the BIOS checks the characteristics and functions of the various components of the central processing device, it will indicate that the hard disk has a capacity of 820MB without indicating that the user has a 30MB storage capacity on the hard disk. . This means that any files or data stored in this 30MB secure area cannot be accessed by the user. In fact, because the dumper limited the maximum capacity of the hard disk to the volume of the hard disk detected by the BIOS (that is, the volume of the non-secure area), the user would not know that the file exists in the 30MB. . Furthermore, files that exist in this unsecured area will not be detected by the system. Recovery and / or backup files are stored in a secure area on the hard drive, which is defined by a secure partition. The operating system, other applications, and data are stored in a non-secure area on the hard drive. When printed and used by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, if the file or application software system is damaged or deleted, the computer system will no longer operate normally. On-chip) and restore the computer system to its original architecture. The user can insert the CD_ROM into the CD-ROM drive of the system and make the system perform the startup cycle. During the boot cycle, the BIOS will detect the presence of the software and make it run? The program uses the SET MAX ADDRESS command to reset the accessible hard disk area to the entire volume of the hard disk. The program then looks for the paper size of 8 mounds. Applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) 502205 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of the invention (^) Stored on hard disk 1 A security code in the security zone 2 1 of 8. Once the security code has been found, this is compared with one of the security codes embedded in the program. If the two security codes match, the program then uses a backup or restore file to restore the system to its original architecture. Once the system has been restored, the program immediately uses the SET MAX ADDERSS command to create a secure partition 19 on the hard disk 18 to provide a secure area 21 again. If, when the program is executed, the security code in the program does not match the security code in the safe area 21 of the hard disk 18, or no security code is found, the program will immediately restore the secure partition 19 in the aforementioned manner, without Use backup or restore files. By requiring the user to use a computer program to access the secure area and to use backup or restore files, it means that the user will never directly access such files containing proprietary software such as operating systems or application software. This means that unauthorized copying or use of these files will not occur. In addition, just as there is no complete operating system or application software system that forms part of the computer program used by the user to restore the computer to its original structure, even if the program is provided on a separate disc, it is impossible to use the Copying or using an operating system or application software program or file with permission from Zhai. It will be appreciated that it is possible to use the present invention to provide recovery or backup of files on a hard disk of a computer system, making it secure and inaccessible to the owner or anyone else who has unauthorized use or copying . A particular advantage of the present invention is that it is not dependent on Bios, meaning that it can be standardized for all computer systems. Of course, it is understood that the present invention is not intended to be limited to the details of the foregoing embodiments, and it is described by way of example only. 9 (Please read the precautions on the back before filling out this page), ¾ · • Line-This paper size applies to China National Standard (CNS) A4 (210 x 297 public love)