TW548542B - Data recovery method, said method stored on computer readable medium, and remote data control method and system - Google Patents

Data recovery method, said method stored on computer readable medium, and remote data control method and system Download PDF

Info

Publication number
TW548542B
TW548542B TW089111312A TW89111312A TW548542B TW 548542 B TW548542 B TW 548542B TW 089111312 A TW089111312 A TW 089111312A TW 89111312 A TW89111312 A TW 89111312A TW 548542 B TW548542 B TW 548542B
Authority
TW
Taiwan
Prior art keywords
data
information
damaged
fat
directory
Prior art date
Application number
TW089111312A
Other languages
Chinese (zh)
Inventor
Chae-Hong Lee
Original Assignee
Finaldata Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from KR1019990044098A external-priority patent/KR100342023B1/en
Priority claimed from KR1019990051140A external-priority patent/KR100308874B1/en
Priority claimed from KR1019990051139A external-priority patent/KR100308873B1/en
Application filed by Finaldata Inc filed Critical Finaldata Inc
Application granted granted Critical
Publication of TW548542B publication Critical patent/TW548542B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1415Saving, restoring, recovering or retrying at system level
    • G06F11/1435Saving, restoring, recovering or retrying at system level using file system or storage system metadata
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/40Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Library & Information Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management Or Editing Of Information On Record Carriers (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Indexing, Searching, Synchronizing, And The Amount Of Synchronization Travel Of Record Carriers (AREA)

Abstract

Disclosed is a method for recovering damaged data from a hard disk having damaged data which comprises the steps of reading the hard disk drive and detecting sector information; analyzing information on the file allocation table (FAT), root directory, and data sectors from the detected sector information, and searching damaged directory information; using a searcher interface and recovering the found directory; displaying sector viewers of the data and directories; checking, through the displayed sector viewer, and determining whether or not the clusters are fragmented; when the clusters are found to be fragmented, manually dragging and dropping an FAT editor, and automatically editing allocation values of the respective clusters so as to recover the data, and storing the recovered FAT information in a storage device; when the clusters are found not to be fragmented and after the recovered FAT information is stored, storing the recovered data in another drive; checking whether the stored data have been recovered normally; when the stored data has been recovered normally, marking the allocated FAT as the cluster used at the time of recovering the data; and when the stored data have been abnormally recovered, manually editing the allocation values of the clusters.

Description

五、發明說明(1 ) 發明領域 本發明係關於-種資料恢復方法、儲存資料恢復方法 的§己錄媒體、及遠端控制資料恢復方法和系統。更特別地, 本發明關於用來從在-硬碟上具有斷離資料和損壞資料的 目錄中之資訊恢復資料的方法,可為儲存用來恢復資料的 方法之電腦可讀取的記錄媒體,及用來由遠端控制恢復資 料的方法和系統。 相關技術之姑沭 -般上’-硬碟機把資料儲存在—磁碟上並因立之 高儲存容量而廣泛使用為電腦系統之儲存裝置。近來了, 個人電腦已大幅散播時,硬碟之使用也已增加。 ^ 硬碟因實體或電擊、使用者的錯誤、或程式間的違 規而易於損壞或喪失資料。 :著個人電腦之使用增加,現今的工作需要更多電 ::作,對電腦之依賴已增加使得許多資料標案鍺存在個 二電腦中,且使用者現在使用儲存的資料《來進行其工 隨著與電腦連繫的工作份量增加,當使用者 =地删除儲存的槽案、或甚至料與 個目錄時,受到的損壞變大。 整 人電二:’當使用者執行一免疫程式來消除在如設在個 —人電:内的軟碟的—儲存裝置中之電猫病毒時,謂收到 疋王又的保濩免於受到電腦病 經常經由網際伊λ + …而&來電月包病毋 際騎知入電腦,而當這發生時,儲存在電腦、V. Description of the Invention (1) Field of the Invention The present invention relates to a recorded data medium of a data recovery method, a stored data recovery method, and a remote control data recovery method and system. More particularly, the present invention relates to a method for recovering data from information in a directory having disconnected data and damaged data on a hard disk, and may be a computer-readable recording medium storing a method for recovering data, And method and system for recovering data by remote control. Aunt of the related technology-Generally, the hard disk drive stores data on a magnetic disk and is widely used as a storage device of a computer system because of its high storage capacity. Recently, the use of hard disks has increased when personal computers have been widely distributed. ^ Hard disks are prone to damage or loss of data due to physical or electrical shock, user error, or inter-program violations. : The use of personal computers has increased, and today ’s work requires more electricity :: work, dependence on computers has increased, and many data items have been stored in two computers, and users now use stored data to perform their work. As the amount of work associated with a computer increases, when a user deletes a stored slot, or even an inventory, the damage to the computer becomes greater. The whole human power two: 'When the user executes an immune program to eliminate the electric cat virus in the storage device such as the floppy disk set in the personal power: Computer sickness often passes through the Internet λ +… and & incoming call monthly sickness is known to enter the computer, and when this happens, it is stored in the computer,

五、發明說明(2) 或甚至電腦系統本身中的資料因電腦病毒而無法使用。 用來把損«料恢復到原始播案的錢方法已被提 供’但設置在-硬碟之損壞部份上的斷離㈣無法恢復成 其原始形式。 毛登明之概要 本發明之一目的係提供用來恢復一硬碟上的斷離資料 的方法,及用來儲存該斷離資料恢復方法之電腦可讀取的 記錄媒體。 在本發明之一層面中,用來從具有損壞資料的硬碟 恢復損壞資料的方法包含下列步驟: (a) 讀取硬碟機並檢測磁區資訊; (b) 從測出的磁區資訊分析在檔案配置表(FAT)、根目 錄、和資料磁區上的資訊,並搜尋損壞的目錄資訊; (c) 使用一搜尋器介面並恢復找到的目錄; (d) 顯不資料和目錄之磁區觀察器; (e) 透過顯示的磁區觀察器檢查並判定叢集是否斷 離; (〇當在上面步驟(e)中發現叢集為斷離時,手動地 拉曳並丟放一個FAT編輯器,並自動編輯個別叢集之配置 值以恢復資料,並把恢復的F AT資訊儲存在一儲存裝置中; (g) 當在上面步驟(e)中發現叢集不為斷離時且在步 驟(f)中恢復的FAT資訊被儲存後,把經恢復資料儲存在另 一機體中; (h) 檢查經儲存資料是否已被正常恢復; -5-5. Description of the invention (2) or even the data in the computer system itself cannot be used due to computer viruses. The money method used to restore the damage to the original case has been provided 'but the breakaway set on the damaged part of the hard disk cannot be restored to its original form. Summary of Mao Dengming An object of the present invention is to provide a method for recovering disconnected data on a hard disk, and a computer-readable recording medium for storing the disconnected data recovery method. In one aspect of the present invention, a method for recovering damaged data from a hard disk having damaged data includes the following steps: (a) reading a hard disk drive and detecting magnetic sector information; (b) from the detected magnetic field information Analyze the information on the file allocation table (FAT), the root directory, and the data volume, and search for damaged directory information; (c) use a searcher interface and restore the directories found; (d) display the data and directories Magnetic field viewer; (e) Check and determine whether the cluster is disconnected through the displayed magnetic field viewer; (0) When the cluster is found to be disconnected in step (e) above, manually drag and drop a FAT editor And automatically edit the configuration values of individual clusters to recover data, and store the recovered FAT information in a storage device; (g) When the cluster is found not to be disconnected in step (e) above and in step ( f) After the recovered FAT information is stored, store the recovered data in another body; (h) Check whether the stored data has been recovered normally; -5-

五、發明說明(3) (i) 當經儲存資料已被判定在上述步驟(h)中已被正常 儲存時,把經配置FAT標示為在恢復資料時使用的叢集; 及 、’ (j) 當經儲存資料已被異常恢復時,手動地編輯叢集 之配置值。 在本發明之另一層面中,在用來當在具有損壞資料 的目錄上之資訊也損壞時從具有損壞資料的硬碟恢復資料 的方法中,一資料恢復方法包含下列步驟: (a) 檢測來自具有損壞資料的一第一機體之磁區資 訊; (b) 從該第一機體讀取開機磁區值; (c) 根據經檢測磁區資訊和該等開機磁區值來分析碟 片資訊; (d) 當在上述步驟(c)中該碟片資訊不是檔案配置表 (F AT)資訊時,判定該碟片資訊是否一個NT(視窗NT)檔案 系統(NTFS),並恢復該NTFS ; (e) 當在上述步驟(c)中該碟片資訊被判定是FAT資訊 時,檢測該FAT資訊並把它儲存在一儲存裝置中; (f )檢測一根目錄資訊並把它儲存在該儲存裝置中; (g) 檢測來自資料磁區的損壞目錄和損壞播案資訊,· (h) 藉由使用在上述步驟(g)中測得的目錄資訊來分析 要被恢復的目錄資訊,並根據經分析目錄資訊來產生損壞 目錄資訊;及 (i) 藉由使用該損壞目錄資訊來恢復損壞目錄,並藉 五、發明說明(4) 由使用經恢復目錄和檔案資訊來恢復損壞資料而把經恢復 資料儲存在一第二機體中。 在本發明之進一步層面中,在用來藉由耦接至把一 資料恢復程式設於具有一損壞硬碟的一伺服器之一委託者 來恢復損壞資料的一資料恢復系統中,一遠端控制資料恢 復系統包含: 耦接該伺服器和該委託者的一網路; 一委吒者,連接至該網路,並輸入它將連接於其上 的该伺服器之一傳輸控制協定/網際網路協定(TCl^Ip)位 址和密碼,並讀取用來藉由胎連接路徑或使用一磁區讀取 功能來讀取該機而透過該網路以恢復資料的資訊,並恢復 该貝料γ並把經恢復資料儲存在一不同未損壞機體丨及 伺服器§ 一連接要求從一委託者透過網路提出 時,檢查密碼,並當通過者可接受時,允許連接,並當一 資料要求從該委託者透過允許路徑提㈣,分析該所要求 舅料並把響應資訊傳輸給該委託者。 1¾式之簡單指诫 被:入並構成說明書之一部份的伴隨圖式說明本發 明之+實施例’並與描述_起用來解說本發明之原理: 第圖係根據本發明之第一較佳實施例用來恢復在— 硬碟中的斷離檔案之方法的一流程圖; 之第一較佳實施例的一磁區編輯 第2圖係根據本發明 器之顯示螢幕; 第3圖係根據本發明 之第一較佳實施例的一檔案配置 五、發明說明(5) 表(FAT)之顯示螢幕; 第4圖係根據本發明之第二較佳實施例用來從在具有 損壞資料的損壞目錄上之資訊恢復資料的—方法之流程 圖; 第5圖係在如第4圖中顯示的步驟mg中用來恢復資料 的方法之流程圖;V. Description of the invention (3) (i) When the stored data has been determined to have been stored normally in step (h) above, the configured FAT is marked as the cluster to be used when recovering the data; and, '(j) When the stored data has been recovered abnormally, the cluster configuration values are manually edited. In another aspect of the present invention, in a method for recovering data from a hard disk having corrupted data when information on a directory with corrupted data is also damaged, a data recovery method includes the following steps: (a) detection Magnetic field information from a first body with damaged data; (b) Read boot sector values from the first body; (c) Analyze disc information based on the detected sector information and the boot sector values ; (D) when the disc information in the above step (c) is not file allocation table (FAT) information, determine whether the disc information is an NT (Windows NT) file system (NTFS), and restore the NTFS; (e) When the disc information is determined to be FAT information in the above step (c), detect the FAT information and store it in a storage device; (f) detect a directory information and store it in the In the storage device; (g) detecting the damaged directory and damaged broadcast information from the data sector, (h) analyzing the directory information to be restored by using the directory information measured in the above step (g), and Generate damaged catalog information based on analyzed catalog information ; And (i) restore the damaged directory by using the damaged directory information, and by five, the invention description (4) restore the damaged data by using the restored directory and file information and store the restored data in a second body . In a further aspect of the present invention, in a data recovery system for recovering corrupted data by coupling to a client that installs a data recovery program on a server having a damaged hard disk, a remote The control data recovery system includes: a network coupling the server and the client; a delegate connected to the network and entering one of the servers to which it will be connected Transmission Control Protocol / Internet Network protocol (TCl ^ Ip) address and password, and read the information used to read the machine through the tire connection path or use a sector read function and restore the information through the network and restore the It also stores the recovered data in a different undamaged body and the server. § A connection request is made from a client through the network, the password is checked, and when the passer is acceptable, the connection is allowed, and when The data request is extracted from the client through the permitted path, the requested data is analyzed, and the response information is transmitted to the client. The simple instruction of the formula is described in the accompanying drawings that form part of the description to explain the + embodiment of the present invention + together with the description to explain the principles of the present invention: The first figure is based on the first comparison of the present invention A flowchart of a method for recovering a disconnected file in a hard disk according to the preferred embodiment; a magnetic field editing of the first preferred embodiment; FIG. 2 is a display screen according to the present invention; FIG. 3 is a A file configuration according to the first preferred embodiment of the present invention V. Description of the invention (5) Display screen of a table (FAT); FIG. 4 is a diagram showing a second preferred embodiment according to the present invention Figure 5 is a flowchart of the method for recovering information from the damaged directory information; Figure 5 is a flowchart of the method for recovering data in step mg shown in Figure 4;

第6圖係供給如第5圖中顯示的恢復目錄和資料之步 驟的一詳細解說之流程圖; 第7圖係根據本發明之第三較佳實施例的—遠端控制 【〇 資料恢復系統之結構圖; 第8圖係根據本發明之第三較佳實施例供給解說用來 實施一遠端控制資料恢復方法的一委託者之操作的流程 圖; 第9圖係根據本發明之第三較佳實施例供給解說用來FIG. 6 is a detailed explanation flow chart of the steps for supplying the catalog and data recovery as shown in FIG. 5; FIG. 7 is a remote control according to the third preferred embodiment of the present invention. FIG. 8 is a flowchart illustrating the operation of a client for implementing a remote control data recovery method according to a third preferred embodiment of the present invention; FIG. 9 is a third embodiment according to the present invention The preferred embodiment provides explanations for

15實施一遠端控制資料恢復方法的一伺服器之操作的流程 圖; 第10圖係供給如第8圖中顯示的由委託者之一資料恢 復方法的一詳細解說之流程圖;及 第11圖係用來解說一個FAT檔案系統之資料恢復方法 ^0 的流程圖。 鼓盘實施例之詳知描故 在下面詳細描述中,只有發明之較佳實施例被顯示 和描述,只藉由實施本發明之發明者(等人)思考的最佳模 式之說明。如將被實現的,本發明能夠在都不偏離發明的 -8_ 五、發明說明(6 ) 各種明顯層面上做修正。據此,本質上圖式和描述被視為 說明的而非限制的。 第1圖係根據本發明之第一較佳實施例用來在一硬碟 中恢復斷離槽案之方法的一流程圖。 如第1圖中顯示的,在步驟S110中磁區資訊從一損壞 硬碟機讀出。磁區資訊具有分割區塊區分資訊。詳細上, 磁區 > 吼具有需要來把一機分割成許多不同分割區塊的資 訊。一般上,一個FAT檔案系統之碟片形成包含一開機磁 區、一第一FAT、一第二FAT、一根目錄進入點、及檔案。 在FAT檔案系統上的一詳細描述可從1986和1998年由微軟 出版、杜肯撰寫的’高等MS DOS程式撰寫,中獲得。 例如’如下述的FAT檔案系統包含一分割區塊表、一 開機磁區、 一 FAT、一根目錄、及資料磁區資訊 0 i割區塊f 開機磁區 FAT 根目錄 資料 一般上,分割區塊表在一實體硬碟已被分割成一或更多邏 輯機體時具有在一啟始位置和各機體之尺寸上的資訊。例 如,在把一 4千兆位元組硬碟分割成尺寸上各2千兆位元組 的兩邏輯機體之情形中,分割區塊表具有第一邏輯機體在 硬碟上佔據從〇到2千兆位元組之一位置而第二邏輯機體佔 據從2到4千兆位元組的資訊(請參考下列結構 PARTITION—TABLE)。 開機磁區設置在各分割區塊之一第一磁區上並具有 在檔案系統之分類、fat之尺寸、整個磁區之數目、一啟 始叢集之位置、及磁區數目上的資訊(請參考下面結構 548542 (7) 五、發明說明 A—BF一BPB= BIOS參數區塊)。 F A T則檢測配置檔案和儲存叢集之鏈路的一叢集之位 置。 根目錄’即槽案或目錄之最局目錄,儲存目錄结構、 5第一名稱、起始磁區、檔案尺寸、子目錄資訊、及機體標 蕺。當根目錄損壞時,檔案無法由一正常操作系統找到。 當在如此F AT檔案系統上使用諾頓用品碟片編輯器程 式(diskedit.exe)時,十六進位碼和資料可被傾倒以儲存 為一檔案或它們也可被印出。 0 此後,將描述分割區塊表之BIOS參數區塊(bpb)之結 構。 邏輯硬碟時,分割區塊 。詳細說,分割區塊表 //0x80-act ive //Starting head //Starting sector //Starting cylinder //What partition type //End head //End sector //End cylinder 當把一硬碟分割成一或更多 表具有各分割區塊之配置上的資料 具有下列内容: 結構 PARTITION_TABLE{ BYTE Part—Bootlnd; BYTE Part一FirstHead; BYTE Part—FirstSector; BYTE Part一FirstTrack; BYTE Part_FileSystem; BYTE Part_LastHead; BYTE Part一LastSector; BYTE Part—LastTrack; DWORD Part^StartSector; //從零計數的啟始磁 -10- 20 54 mr/ry™------ 年 Η —日 8¥以修正 *4. -· ^ ; 五、發明說明(8) 區 DWORD Part_NumSectors; //部份上的磁區數目 此處,Part一BootInd係供可開機分割區塊用 之’0x80’,且Part—Bootlnd係供不可開機分割區塊用 之,0,。 再者,Part_FileSystem具有下列意義: #define PART—UNKNOWN 0x00 //未知15 is a flowchart of the operation of a server implementing a remote control data recovery method; FIG. 10 is a flowchart providing a detailed explanation of the data recovery method by one of the clients as shown in FIG. 8; and FIG. The figure is a flowchart for explaining the data recovery method ^ 0 of a FAT file system. Detailed Description of Drum-Plate Embodiments In the following detailed description, only the preferred embodiments of the invention are shown and described, and only by the description of the best mode of thinking of the inventor (etc.) implementing the invention. As will be realized, the present invention can be amended on various obvious levels without departing from the invention. 5. Invention Description (6). Accordingly, the drawings and descriptions are to be regarded as illustrative in nature, and not as restrictive. FIG. 1 is a flowchart of a method for recovering a disconnection slot in a hard disk according to a first preferred embodiment of the present invention. As shown in Figure 1, the sector information is read from a damaged hard disk drive in step S110. The sector information has divisional block distinguishing information. In detail, the magnetic zone > has the information needed to divide a machine into many different divided blocks. Generally, a disc of a FAT file system includes a boot sector, a first FAT, a second FAT, a directory entry point, and files. A detailed description on the FAT file system can be obtained from the 'Advanced MS DOS Program' published by Microsoft in 1986 and 1998 and written by Dukane. For example, 'if the FAT file system described below includes a partition block table, a boot sector, a FAT, a directory, and data sector information 0 i cut block f boot sector FAT root directory data Generally, the partition The block table has information on a starting position and the size of each body when a physical hard disk has been divided into one or more logical bodies. For example, in the case of partitioning a 4-gigabyte hard disk into two logical bodies of 2 gigabytes each in size, the partition block table has the first logical body occupying from 0 to 2 on the hard disk. One gigabyte position and the second logical body occupying information from 2 to 4 gigabytes (please refer to the following structure PARTITION_TABLE). The boot sector is set on the first sector of each of the divided blocks and has information on the classification of the file system, the size of the fat, the number of the entire sector, the location of a starting cluster, and the number of sectors (please Refer to the following structure 548542 (7) V. Description of the invention A-BF_BPB = BIOS parameter block). F A T detects the location of a cluster of links between the configuration file and the storage cluster. The root directory 'is the most local directory of the slot or directory, and stores the directory structure, 5 first name, starting sector, file size, sub-directory information, and body logo. When the root directory is damaged, the files cannot be found by a normal operating system. When using the Norton supplies disk editor program (diskedit.exe) on such a FAT file system, the hexadecimal codes and data can be dumped to be stored as a file or they can be printed out. 0 Hereinafter, the structure of the BIOS parameter block (bpb) of the divided block table will be described. When partitioning a logical hard disk. In detail, the partition block table // 0x80-act ive // Starting head // Starting sector // Starting cylinder // What partition type // End head // End sector // End cylinder When a hard disk is divided into one or The data on the configuration of more tables with each partition block has the following contents: Structure PARTITION_TABLE {BYTE Part—Bootlnd; BYTE Part—FirstHead; BYTE Part—FirstSector; BYTE Part—FirstTrack; BYTE Part_FileSystem; BYTE Part_LastHead; BYTE Part—LastSector ; BYTE Part—LastTrack; DWORD Part ^ StartSector; // Starting magnetic count from zero -10- 20 54 mr / ry ™ ------ year Η — day 8 ¥ to correct * 4.-· ^ ; V. Description of the invention (8) DWORD Part_NumSectors; // Number of magnetic sectors on the part Here, Part-BootInd is used for bootable partition block '0x80', and Part-Bootlnd is for non-bootable partition block Use it, 0 ,. Furthermore, Part_FileSystem has the following meanings: #define PART—UNKNOWN 0x00 // Unknown

#define PART—D0S2—FAT 0x01 //12位元FAT#define PART—D0S2—FAT 0x01 // 12-bit FAT

#define PART—D0S3—FAT 0x04 //16位元FAT;小於32MB 的分割區塊 #define PART-EXTENDED 0x05 //延伸的 MS-DOS分割區塊 #define PART—D0S3—FAT 0x06 //16位元FAT ;大於或#define PART—D0S3—FAT 0x04 // 16-bit FAT; divided blocks smaller than 32MB #define PART-EXTENDED 0x05 // extended MS-DOS divided block #define PART—D0S3—FAT 0x06 // 16-bit FAT; greater than or

5 #define PART—D0S32 OxOB5 #define PART—D0S32 OxOB

#define PART—D0S32X OxOC#define PART—D0S32X OxOC

10 #def ine PART_D0S13 OxOE10 #def ine PART_D0S13 OxOE

#define PART—D0SX13X OxOF 等於32MB的分割區塊 //32位元FAT;高達2047 GB的分割區塊 //和 PART 一 D0S32(0Bh) 相同,但使用邏輯區塊 位址Int 13h延伸; //和 PART—D0S4 jAT(06h) 相同,但使用邏輯區塊 位址Int 13h延伸; "和 PART_EXTENDED(05h) 相同,但使用邏輯區塊 11- 五、發明說明(9) 位址Int 13h延伸; #define DOS—EXTENDED_PARTITION 0x05 #define LINUX—EXTENDED—PARTITION 0x85 #define WIN98一EnENDED—PARTITION OxOf 5 #define LINUX—SWAP—PARTITION 0x82 分割區塊表被討論於上。 請再參考第1圖,在前一步驟si 10中FAT資訊從硬碟 機讀出而在步驟S115和S120中根目錄資訊被讀出。 資料磁區被分析且在步驟S125中搜尋損壞目錄資 〇訊’並在步驟S130中使用一搜尋器介面來恢復經搜尋目 錄。如第2圖中顯示的,在步驟3135中資料和目錄之磁區 觀察器被顯示在螢幕上。 第2圖顯示根據本發明之第一較佳實施例的一磁區編 輯器之顯示螢幕。#define PART—D0SX13X OxOF is equal to 32MB of divided blocks // 32-bit FAT; up to 2047 GB of divided blocks // Same as PART-D0S32 (0Bh), but extended using logical block address Int 13h; // Same as PART-D0S4 jAT (06h), but using logical block address Int 13h extension; " Same as PART_EXTENDED (05h), but using logical block 11- V. Invention description (9) Address Int 13h extension; #define DOS—EXTENDED_PARTITION 0x05 #define LINUX—EXTENDED—PARTITION 0x85 #define WIN98—EnENDED—PARTITION OxOf 5 #define LINUX—SWAP—PARTITION 0x82 The partition block table is discussed above. Referring to FIG. 1 again, the FAT information is read from the hard disk drive in the previous step si 10 and the root directory information is read in steps S115 and S120. The data sector is analyzed and the damaged directory information is searched for in step S125, and a searcher interface is used to recover the searched directory in step S130. As shown in Figure 2, the magnetic field viewer of the data and directory is displayed on the screen in step 3135. Fig. 2 shows a display screen of a magnetic field editor according to a first preferred embodiment of the present invention.

螢幕上被切換到十六進位碼時可做資料和目錄之磁區觀察 器之編輯器螢幕。 一使用者然後可如第2圖中顯示的從在前一 中之資料或目錄磁區觀察ϋ來檢查在步驟S140中 月1J -步驟S135 被斷離。 叢集是否 示的藉由在磁區編輯器中檢查The editor screen of the sector viewer for data and directories when switched to hexadecimal on the screen. A user can then check from the data or directory sector in the previous one as shown in Fig. 2 to check that the month 1J-step S135 is disconnected in step S140. Whether the cluster is shown by checking in the sector editor

使用者可如第2圖中顯示 硬碟之磁區來檢查經斷離資料 文碼同時資料係以二 5mm% 五、發明說明(10) 當判定叢集在前一步驟S140中顯示的磁區編輯器螢 幕中被斷離時,使用者在步驟8145中手動地拉曳並丟放fat 編輯器以在經斷離鏈路上編輯資訊。此時,fat編輯器自 動並直接編輯個別叢集之配置值,並也可編輯實體磁區、 5 邏輯磁區、或叢集。 同時’用來根據格式把資料顯示為一特定圖案以储 存一預定區之磁區或叢集之取捨權也可被加入。 第3圖顯示其顯示整個fat和檔案與目錄之fat之一顯 不榮幕。 10 睛參考第3圖,當把磁區編輯器訊息傳輸給使用者 時,叢集可被直接顯示。例如,對應於檔案的叢集以不同 彩色顯示,而對應於顯示檔案的其他叢集可被配置,而其 餘者被手動編輯。 在儲存檔案後,當它們被發現是正常時,槽案之值 15被儲存在FAT1或FAT2中,或在FAT1和FAT2兩者中。 用來藉由點選一滑鼠從目前叢集選擇次一叢集的選 單也可被加入。此時,可從FAT表或磁區編輯器來選出次 一叢集。做一新的夾紙板格式來實施此功能。亦即,當使 用者按壓一 ’開機選擇下一個,FAT按鈕時,透過夾紙板和 -〇 視囪訊息來實施一功此以判定滑鼠指標控制器是否將透過 總體變數來控制。 在步驟S150中經恢復FAT資訊被儲存在記憶體中,而 在步驟S155中經恢復資料被儲存在其他機體之硬碟中。此 時,顯然的,其他機體之硬碟的容量必須等於或大於將從 五、發明說明(11 ) 損壞硬碟恢復的容量。 如上述的,當有一個一般資料恢復方法的初始恢復 資料,如當使用DOS或諾頓用品恢復刪除程式時,當使用 者刪除資料時,一FAT值被配置且FAT值被寫在硬碟上,並 因此貝料可能喪失。然而,在本發明中,FAT資訊在記憶 體中被處理,並在資料被恢復並檢查以判定經恢復資料是 否正吊後,FAT被指示來配置。藉此,資料以比習知技術 安全的一方式來處理,而資料恢復率大幅增加。 s電腦被重新開機時為了維持由記憶體管理的資 訊,儲存或載入FAT資訊作為一檔案的功能被加入。在此The user can display the magnetic disk of the hard disk as shown in Figure 2 to check the fragmented data code. At the same time, the data is 25mm%. 5. Description of the invention (10) When it is determined that the cluster is edited in the magnetic zone displayed in the previous step S140 When the monitor screen is disconnected, the user manually drags and drops the fat editor in step 8145 to edit the information on the disconnected link. At this time, the fat editor automatically and directly edits the configuration values of individual clusters, and can also edit the physical sector, 5 logical sectors, or clusters. At the same time, a trade-off right for displaying a data in a specific pattern to store a predetermined area of a magnetic region or cluster according to a format may also be added. Figure 3 shows a glorious display showing the entire fat and one of the fat files and directories. Refer to Figure 3 for details. When transmitting the zone editor message to the user, the cluster can be displayed directly. For example, clusters corresponding to a file are displayed in different colors, while other clusters corresponding to a displayed file can be configured, and the rest can be manually edited. After storing the files, when they are found to be normal, the slot value 15 is stored in FAT1 or FAT2, or both FAT1 and FAT2. A menu to select the next cluster from the current cluster by clicking a mouse can also be added. At this time, the next cluster can be selected from the FAT table or the sector editor. Make a new Clipboard format to implement this feature. That is, when the user presses a 'boot to select the next, FAT button, a piece of paper is implemented through the clip board and the -0 viewpan message to determine whether the mouse pointer controller will be controlled by the overall variable. The restored FAT information is stored in the memory in step S150, and the restored data is stored in the hard disks of other units in step S155. At this time, it is obvious that the capacity of the hard disks of other bodies must be equal to or larger than the capacity recovered from the damaged hard disk of the invention description (11). As mentioned above, when there is an initial recovery data for a general data recovery method, such as when using DOS or Norton supplies to recover and delete programs, when a user deletes data, a FAT value is configured and the FAT value is written on the hard disk. And therefore shell material may be lost. However, in the present invention, the FAT information is processed in the memory, and after the data is recovered and checked to determine whether the recovered data is suspended, the FAT is instructed to be configured. As a result, data is processed in a way safer than conventional technology, and the rate of data recovery has increased significantly. In order to maintain the memory-managed information when the computer is restarted, the function of storing or loading FAT information as a file is added. here

If形中,FAT資訊不儲存在損壞硬碟上,而是在其他安全 機體之硬碟上。 一般上,當一使用者誤用電腦時或當儲存在硬碟機 上的資料因某些電腦本身之硬體上的失誤而損壞時,記錄 在硬碟或登入檔之資料系統中的資訊也改變。因此,藉由 把此:貝汛與資料系統和登入檔之初始狀態比較,發現的差 異可指出其中發生差異的硬碟機之部份損壞。 第4圖係根據本發明之第二較佳實施例用來從在含有 損壞資料的損壞目錄本身上之資訊恢復資料的一方法之流 程圖。 如第4圖中顯示的,在步驟S21〇中從一磁區讀取功能 讀出損壞硬碟機或檢測磁區資訊。 在步驟S215中開機磁區之值被測出,並在步驟S22〇 中根據開機磁區之值來分析碟片資訊。此時,磁 五、發明說明(l2 10 >0 般含有供一機體用的資料系統資訊。例如,FAT16、FAT32、 及NT(視窗NT)檔案系統(NTFS)具有含不同資訊的開機磁 區。作為一例,在FAT32中使用的開機磁區之BPB的結構如 下: typedef struct_A—BF—BPB{ //FAT BIOS參數區塊 WORD A_BF_BPB_BytesPerSector; //每磁區之位元 組數目 BYTE A—BF_BPB_SectorPerCluster; //每叢集之磁區 數目 WORD A_BF_BPB_ReservedSectors; //保留的磁區 BYTE A_BF_BPB_NumberOfFATs; //FAT數目 WORD A_BF_BPB_RootEntries; / /最大根目錄表 數目 //分割區塊之磁區 尺寸 BYTE A_BF_BPB_MediaDescriptor; //媒體描述器 WORD A—BF—BPB_SectorsPerFAT; //每FAT之磁區 數目 WORD A_BF_BPB_SectorsPerTrack; //每執跡之磁區 數目 WORD A—BF_BPB—Heads; //— 機體之 R/W頭 數目 WORD A_BF_BPB_HiddenSectors ; //機體之隱藏磁區 之數目 WORD A_BF_BPB_TotalSrctors; -15-In the If form, the FAT information is not stored on the damaged hard disk, but on the hard disk of another secure body. Generally, when a user misuses a computer or when data stored on a hard drive is damaged due to an error on some computer's own hardware, the information recorded in the data system of the hard drive or login file also changes . Therefore, by comparing this: Beizun with the initial state of the data system and the login file, the difference found can indicate that the part of the hard disk drive where the difference occurred is damaged. Fig. 4 is a flowchart of a method for recovering data from information on a damaged directory itself containing corrupted data according to a second preferred embodiment of the present invention. As shown in FIG. 4, in step S21O, the read function from a magnetic sector reads out the damaged hard disk drive or detects the magnetic sector information. The value of the boot sector is measured in step S215, and the disc information is analyzed based on the value of the boot sector in step S22. At this time, Magnetic V. Invention Description (l2 10 > 0 generally contains data system information for one body. For example, FAT16, FAT32, and NT (Windows NT) File System (NTFS) have boot sectors with different information. As an example, the structure of the BPB of the boot sector used in FAT32 is as follows: typedef struct_A—BF—BPB {// FAT BIOS parameter block WORD A_BF_BPB_BytesPerSector; // Number of bytes per sector BYTE A—BF_BPB_SectorPerCluster; // Number of magnetic sectors per cluster WORD A_BF_BPB_ReservedSectors; // Reserved magnetic sectors BYTE A_BF_BPB_NumberOfFATs; // Number of FAT WORD A_BF_BPB_RootEntries; // Maximum number of root directory tables // Magnetic zone size of divided blocks BYTE A_BF_BPB_MediaDescriptor; // Media description WORD A—BF—BPB_SectorsPerFAT; // Number of sectors per FAT WORD A_BF_BPB_SectorsPerTrack; // Number of sectors per track WORD A—BF_BPB—Heads; //-Number of R / W heads of the unit WORD A_BF_BPB_HiddenSectors; // NUMBER A_BF_BPB_TotalSrctors; -15-

bo 五、發明說明(l3) WORD A—BF—BPB_HiddenSectorsHigh; //隱藏磁區值 之而字元 DWORD A_BF_BPB_BigTotalSectors;bo V. Description of the invention (l3) WORD A—BF—BPB_HiddenSectorsHigh; // Hide the value of the magnetic sector DWORD A_BF_BPB_BigTotalSectors;

DWORD A BF //FAT32機體之 整個磁區數目 //FAT32 基體 之每FAT的磁 區數目 DWORD A—BF—BPB—BigSectorsPerFATHi; WORD A—BF—BPB—ExFlags; WORD A—BF—BPB_FS_Version; DWORD A—BF—BPB—RootDirStrtClus; WORD A—BF—BPB—RootDirStrtClusHi WORD A—BF—BPB—FSInfoSec; WORD A—BF—BPB—BkUpBootSec; //FAT32 機體 之根目錄開始 的叢集之位置 //檔案系統資 訊之磁區數目 //一支持開機之 備份數目 //保留攔位 WORD A—BF—BPB_Reserved[6]; }A—BF—BPB, *PA_BF—BPB; 在步驟S225中實施一檢查來判定在先前步驟S220中 分析的碟片資訊是否為一FAT檔案系統,並當它不是一FAT 檔案系統時,它經判定為一NTFS檔案系統且在步驟S230中 資料被NTFS方法恢復。當它是一FAT檔案系統時,在步驟 -16- 548542 五、發明說明(l4 ) S240中資料由FAT檔案系統恢復。 第5圖係在如第4圖中顯示的步驟S240中用來恢復資料 的方法之流程圖。 請參考第5圖,硬碟之FAT資訊被檢測並然後在步驟 5 S610中儲存在記憶體中,而根目錄資訊被檢測並然後在步 驟S620中儲存在記憶體中。 在資料磁區不具有目錄資訊而只具有資料的情形 中,資料磁區根據資料型式來分析,而在步驟S630中測出 損壞目錄。 10 藉由使用在先前步驟S610至S630中獲得的資訊,要 被恢復的目錄資訊被分析,而在步驟S640中使用經分析目 錄資訊來產生目錄。 損壞目錄被恢復,並在步驟S650中儲存在經恢復目 錄中的損壞資料被恢復。 [5 第6圖係提供第5圖中表示的恢復目錄和資料之步驟 的一詳細解說之流程圖。 請參考第6圖,在一設定環境中手動找出的資料之初 始大小在步驟S6510中被改變到一任意大小。 根據檔案之副檔名找出的資料在步驟S652〇中被登記 ?0 在一目錄恢復螢幕上,而在資料名稱和大小上的資訊在步 驟S6530中被分析和產生。 當需要時,在步驟S6540中使用者在目錄恢復螢幕上 的表列中手動和任意地修正資料名稱和其大小。 所需資料在步驟S6550中被儲存在與第一機體不同的 -17- 五、發明說明(15) 一第二機體中。此時,第二機體必須具有等於或大於第一 機體之硬碟者的一儲存容量。 在先前步驟S6550中起初儲存的經恢復資料之大小在 步驟S6560中與損壞資料者比較,而如果損壞資料之大小 係大於經恢復資料者,則程序回到先前步驟%54〇以重新 配置資料之名稱和大小。 如果相壞資料之大小係小於經恢復資料者,則用來 項取經恢復貝料的一程式被使用來以一正常方式讀取經恢 復資料。 上面,本發明恢復損壞資料使得當使用者刪除一目 錄且經刪除目錄上的資訊喪失時,儲存在硬碟中的資料可 被恢復。 第7圖係根據本發明之第三較佳實施例的一遠端控制 資料恢復系統之結構圖。 如第7圖中顯示的,遠端控制資料恢復系統包含提供 一貝料恢復私式的一委託者丨〇〇、一委託者網際網路提供 器(ISP)200、一網際網路300、一伺服器Isp 4〇〇、及安裝 具有損壞資料的一硬碟之伺服器5〇〇。 當伺服器500經由網際網路3〇〇接收來自委託者1〇〇的 連接要求時,伺服器5 〇 〇檢查其密碼,並當密碼被發現 可以接文時,伺服器5〇〇提供連接許可,而當伺服器5〇〇經 由冻可路徑接收來自委託者的一資料要求時,伺服器 分析所要求資料並把對應資訊傳輸到委託者1〇〇。 詳言之,當伺服器500接收來自委託者1〇〇的一密碼 五、發明說明(16) 登入訊息時,祠服器5〇〇監測一 Tcp/lp協定連接要求是否 已由委4者1GG提供’而當要求被提供時,伺服器5⑽檢查 密碼以判定它是否可接受,而當密碼被發現可接受時,伺 服器500檢查一資料要求是否已由委託者100提供。 §所要求資料係用於碟片資訊時,伺服器5〇〇從損壞 硬碟讀取碟片資訊並把碟片f訊傳輸到委託者削,而當 所要求資料係用於磁區資訊時,伺服器5〇〇從損壞硬碟讀 取磁區資訊並把磁區資訊傳輸到委託者1〇〇,而當所要求 貪料係用於連接結束資訊時,伺服器5〇〇斷接該連接狀態 並終止對網路的連接。 現在將描述根據本發明之較佳實施例使用遠端控制 資料恢復系統的一資料恢復方法。 第8圖係根據本發明之第三較佳實施例解說用來實施 一遠端控制資料恢復方法的一委託者之操作的流程圖。 凊參考第8圖,委託者讀取如來自網際網路的一網路 機體,以在步驟S310中恢復資料,並連接_TCp/Ip協定和 輸入一密碼以在步驟S320中存取伺服器位址和對應的伺服 器。 此程序檢查在步驟S330中委託者是否連接至伺服器 500 ’而當委託者被連接時,它在步驟S34〇中檢查輸入密 碼是否可接受。 如果密碼不可接受,則在步驟S35〇中對伺服器之連 接被終止。 當密碼可接受時,機體被讀取或用來在網路上從磁 548542 五、發明說明(1?) 區讀取功能遠端地恢復資料的資訊被檢知,而在步驟S360 中根據檢知的資訊來恢復損壞資料。 弟9圖係根據本發明之第三較佳實施例解說用來實施 一遠端控制資料恢復方法的一伺服器之操作的流程圖。 請參考第9圖,伺服器在步驟S410中檢查密碼是否由 委託者提供,而當密碼被提供時,伺服器在步驟W2〇中監 測用來與一 TCP/IP協定連接的要求是否由委託者提供。 ιο 伺服器在步驟S430中檢查用於連接的要求是否被提 供,而當用於連接的要求未被提供時,它返回前一步驟% 20。然而,當用於連接的要求被提供時,伺服器在步驟 中檢查密碼是否可接受。如果密碼被發現不可接受,則用 來恢復資料的程序在步驟S450中被終止。 當伺服器判定密碼可接受時,它然後在步驟s46〇中 檢查關於一資料要求是否已由委託者提供。 15 ίΟ 當-資料要求被提供時,飼服器在步驟S47g中檢查 所要求資料是否用於碟片資訊,而如果經發現所要求" 係用於碟片資訊,則在步細5中伺服器把碟片資訊傳輸 到委先者。 當所要求資料不是用於碟片資訊時, 财檢查所要«料是否心碟片磁„訊,⑯ 現所要求資料是用於碟片磁果丄發 ΰ ^ 匕貝Λ,則在步驟S485中伺服 α足碟片頃取磁區並把它傳輸到委託者。 如果伺服器發現所要求資 丨文水貝枓不是用於碟片磁 訊,它然後在步_◦中檢查所要求資料是^ -20- 修正 補充 ""1 .-I -. 五、發明說明(18) 要求資訊。如果所要求資料不是一連接終止要求資訊,則 伺服器返回先前步驟S46〇。然而,當所要求資料是一連接 終止要求資訊時,在步驟S495中連接被終止且連完成。 第10圖係提供如第8圖中顯示的由委託者之一資料恢 5 復方法的一詳細解說之流程圖。 請參考第10圖,委託者在步驟31610中讀取損壞的第 一機體或經由如網際網路的一網路由磁區讀取功能來遠距 地檢測磁區資訊。 在步驟S1 620中開機磁區之值被檢知,而在步驟S1630 10 中根據開機磁區值來分析碟片資訊。 此程序然後在步驟S1 640中檢查碟片是否使用一 FAT ’而如果碟片不是一 fat,則在步驟S1650中經判定為 一 NTFS使得使用NTFS方法來恢復檔案資料。當碟片經發現 使用一FAT時,則在步驟sl66〇中經判定為一FAT檔案系統 15 且資料被恢復。 第11圖係用來解說一個FAT檔案系統之資料恢復方法 的流程圖。 請參考第11圖,在步驟S1710中委託者檢測FAT資訊 並把它儲存在記憶體中,並在步驟S1720中由儲存的FAT資 ⑴訊來檢測根目錄資訊而把它儲存在記憶體中。 委託者在步驟S1730中由資料磁區檢測損壞資料,並 在步驟S1740中根據檢知的FAT資訊和根目錄資訊來恢復檢 知的損壞資料。 在步驟S1750中委託者不把經恢復檔案儲存在具有損DWORD A BF // Number of entire magnetic sectors of the FAT32 body // Number of magnetic sectors per FAT32 of the FAT32 base DWORD A—BF—BPB—BigSectorsPerFATHi; WORD A—BF—BPB—ExFlags; WORD A—BF—BPB_FS_Version; DWORD A —BF—BPB—RootDirStrtClus; WORD A—BF—BPB—RootDirStrtClusHi WORD A—BF—BPB—FSInfoSec; WORD A—BF—BPB—BkUpBootSec; // FAT32 location of the cluster starting from the root directory of the body // file system information Number of sectors // Number of backups that support booting // Reserved block WORD A_BF_BPB_Reserved [6];} A_BF_BPB, * PA_BF_BPB; In step S225, a check is performed to determine whether it was previously Whether the disc information analyzed in step S220 is a FAT file system, and when it is not a FAT file system, it is determined to be an NTFS file system and the data is recovered by the NTFS method in step S230. When it is a FAT file system, in step -16- 548542 V. Invention description (l4) The data in S240 is restored by the FAT file system. Fig. 5 is a flowchart of a method for recovering data in step S240 shown in Fig. 4. Please refer to FIG. 5. The FAT information of the hard disk is detected and then stored in the memory in step 5 S610, and the root directory information is detected and then stored in the memory in step S620. In the case where the data sector does not have directory information but only data, the data sector is analyzed according to the data type, and the damaged directory is detected in step S630. 10 By using the information obtained in the previous steps S610 to S630, the directory information to be restored is analyzed, and the analyzed directory information is used to generate a directory in step S640. The damaged directory is restored, and the damaged data stored in the restored directory in step S650 is restored. [5 Figure 6 is a flowchart that provides a detailed explanation of the steps for restoring directories and data shown in Figure 5. Referring to FIG. 6, the initial size of the data manually found in a setting environment is changed to an arbitrary size in step S6510. The data found according to the file's extension is registered in step S652. 0 is on a directory recovery screen, and the information on the data name and size is analyzed and generated in step S6530. When necessary, the user manually and arbitrarily corrects the data name and its size in the list on the directory recovery screen in step S6540. The required information is stored in step S6550 in a different unit from the first unit -17- 5. Invention description (15) A second unit. At this time, the second body must have a storage capacity equal to or larger than that of the hard disk of the first body. The size of the recovered data initially stored in the previous step S6550 is compared with the person who damaged the data in step S6560, and if the size of the corrupted data is larger than the person who recovered the data, the procedure returns to the previous step% 54 to reconfigure the data Name and size. If the size of the corrupted data is smaller than that of the recovered data, a program for recovering the recovered material is used to read the recovered data in a normal manner. Above, the present invention recovers damaged data so that when a user deletes a directory and the information on the deleted directory is lost, the data stored in the hard disk can be recovered. Fig. 7 is a structural diagram of a remote control data recovery system according to a third preferred embodiment of the present invention. As shown in FIG. 7, the remote control data recovery system includes a client providing a private data recovery system, a client Internet provider (ISP) 200, an Internet 300, a Server Isp 400, and server 500 with a hard disk installed with corrupted data. When the server 500 receives a connection request from the client 100 through the Internet 300, the server 500 checks its password, and when the password is found to be able to receive a message, the server 500 provides a connection permission When the server 500 receives a data request from the client through the frozen path, the server analyzes the requested data and transmits the corresponding information to the client 100. In detail, when the server 500 receives a password from the client 100. 5. Description of the invention (16) The login message, the server 500 monitors whether a TCP / lp protocol connection request has been assigned by the commissioner 1GG Provide 'and when the request is provided, the server 5 伺服 checks the password to determine whether it is acceptable, and when the password is found acceptable, the server 500 checks whether a data request has been provided by the client 100. § When the requested data is used for the disc information, the server 500 reads the disc information from the damaged hard disk and transmits the disc f information to the client, and when the requested data is used for the sector information The server 500 reads the magnetic field information from the damaged hard disk and transmits the magnetic field information to the client 100, and when the requested data is used for the connection end information, the server 500 disconnects the Connection status and termination of the network connection. A data recovery method using a remote control data recovery system according to a preferred embodiment of the present invention will now be described. Fig. 8 is a flowchart illustrating the operation of a client for implementing a remote control data recovery method according to a third preferred embodiment of the present invention.凊 Referring to FIG. 8, the client reads a network body such as from the Internet to recover data in step S310, and connects the _TCp / Ip protocol and enters a password to access the server bit in step S320 Address and corresponding server. This procedure checks whether the client is connected to the server 500 'in step S330 and when the client is connected, it checks whether the input password is acceptable in step S34o. If the password is not acceptable, the connection to the server is terminated in step S350. When the password is acceptable, the body is read or used to recover the information remotely from the magnetic field on the network from magnetic 548542. 5. The reading function of the invention description (1?) Area is detected, and in step S360 according to the detection Information to recover damaged data. Figure 9 is a flowchart illustrating the operation of a server for implementing a remote control data recovery method according to a third preferred embodiment of the present invention. Referring to FIG. 9, the server checks whether the password is provided by the client in step S410, and when the password is provided, the server monitors in step W20 whether the request for connection with a TCP / IP protocol is provided by the client provide. The server checks whether a request for connection is provided in step S430, and when a request for connection is not provided, it returns to the previous step% 20. However, when a request for connection is provided, the server checks in step whether the password is acceptable. If the password is found to be unacceptable, the procedure for recovering the data is terminated in step S450. When the server determines that the password is acceptable, it then checks in step s46 to see if a data request has been provided by the client. 15 ίΟ When a data request is provided, the feeder checks whether the requested data is used for disc information in step S47g, and if it is found that " is used for disc information, it is servoed in step 5 The device transmits disc information to the first party. When the requested data is not used for the disc information, the financial checker asks whether the data is required for the disc magnet. Now the requested data is used for the disc magnet. ^ Dagger Λ, then in step S485 The servo α foot disc takes the magnetic area and transmits it to the client. If the server finds that the requested data is not used for disc magnetic information, it then checks in step _◦ that the requested data is ^- 20- Amendment Supplements ".- I-. V. Invention Description (18) Request Information. If the requested information is not a connection termination request information, the server returns to the previous step S46. However, when the requested information When it is a connection termination request information, the connection is terminated and the connection is completed in step S495. Figure 10 is a flowchart illustrating a detailed explanation of the method for recovering data from one of the clients as shown in Figure 8. Referring to FIG. 10, the client reads the damaged first body in step 31610 or remotely detects the magnetic field information through a network routing magnetic field reading function such as the Internet. In step S1 620, the magnetic field is turned on. The value is detected, and in step S1630 1 The disc information is analyzed based on the boot sector value in 0. This procedure then checks whether the disc uses a FAT 'in step S1 640 and if the disc is not a fat, it is judged as an NTFS in step S1650 so that NTFS is used Method to restore file data. When the disc is found to use a FAT, it is determined to be a FAT file system 15 and the data is restored in step s660. Figure 11 is used to explain the data recovery method of a FAT file system Please refer to FIG. 11. In step S1710, the client detects the FAT information and stores it in the memory, and in step S1720, the stored FAT information detects the root directory information and stores it in In the memory, the client detects the damaged data from the data sector in step S1730, and restores the detected damaged data based on the detected FAT information and root directory information in step S1740. In step S1750, the client does not use Restore files stored in damaged

54834¾. 8: 2〇 五、發明說明(I9 壞樓案的第-機體中,而儲存在第二機體中。此時,第二 機體之健存容量必須大於要從損壞硬碟恢復的容量。 上面’即使當硬碟具有損壞檔案時,可藉由使用經 由網際網路傳輸損壞硬碟資訊的一飼服器程式和使用經由 5網路遠距地恢復飼服器資料的-委託者程式來恢復損壞樓 案。54834¾. 8: 20.5. Description of the Invention (I9 The first body of the bad building case is stored in the second body. At this time, the healthy storage capacity of the second body must be greater than the capacity to be recovered from the damaged hard disk. The above 'even when the hard disk has a damaged file, it can be achieved by using a feeder program that transmits damaged hard disk information via the Internet and using a -client program that remotely restores feeder data via 5 networks. Rehabilitation of damaged buildings.

在本發明之第_較佳實施例中,當斷離出現在儲存 在一硬碟上的資料中時,FAT資訊被讀入記憶體且資料被 恢復’而在資料被恢復後’被檢測關於檔案是否正常。此 檢測後,FAT然後如配置的被指出,並因此,資料被安全 地恢復而資料恢復率增加。 在本發明之第二較佳實施例中,即使具有損壞資料 的目錄已從具有損壞資料的硬碟刪除,且即使經刪除目錄 資訊也損壞,損壞資料可被恢復到其原來狀態。In the _ preferred embodiment of the present invention, when the disconnection occurs in the data stored on a hard disk, the FAT information is read into the memory and the data is recovered 'and after the data is recovered' is detected. Whether the file is normal. After this detection, the FAT is then indicated as configured, and as a result, the data is safely recovered and the data recovery rate increases. In the second preferred embodiment of the present invention, even if the directory with damaged data is deleted from the hard disk with damaged data, and even if the directory information is deleted, the damaged data can be restored to its original state.

15 在本發明之第三較佳實施例中,可藉由使用委託者 和伺服器程式來遠距地恢復損壞資料。 藉由把資料恢復程式連接至網路,從電腦主體除掉 損壞硬碟以恢復損壞資料的不便可被消除。 當已與目前認為最實際和最佳實施例連結來描述本 '0發明時,請瞭解到本發明不限於揭露的實施例,而相反的, 思圖涵蓋包括在所附申請專利範圍之精神和範疇内的各種 修正和等效配置。 元件標號對照奉 -22- 五、發明說明(20) 1 0 0委託者 200網際網路服務提供器(ISP) 300網際網路 400祠服器ISP 5 500伺服器 S110、S115、S120、S125、S130、S135、S140、S145、S150 S155、S210、S215、S220、S225、S230S240、S310、S320 S330、S340、S350、S360、S410、S420、S430、S440、S450 S460、S470、S475、S480、S485、S490、S495、S610、S620 0 S630、S640、S650、S6510、S1610、S1 620、S1630、S1640 SI 650、SI 660、SI 710、SI 720、SI 730、SI 740、SI 750、S6520 S6530、S6540、S6550、S6560 步驟15 In the third preferred embodiment of the present invention, damaged data can be recovered remotely by using a client and a server program. By connecting the data recovery program to the network, the damaged hard disk can be removed from the main body of the computer to recover the damaged data. When the present invention has been described in connection with what is currently considered to be the most practical and preferred embodiment, please understand that the invention is not limited to the disclosed embodiments, but instead, the plan covers the spirit and Various corrections and equivalent configurations within the category. Component label comparison Feng-22- V. Description of the invention (20) 1 0 0 Client 200 Internet service provider (ISP) 300 Internet 400 server ISP 5 500 server S110, S115, S120, S125, S130, S135, S140, S145, S150, S155, S210, S215, S220, S225, S230, S240, S310, S320, S330, S340, S350, S360, S410, S420, S430, S440, S450, S460, S470, S475, S480, S485 , S490, S495, S610, S620 0 S630, S640, S650, S6510, S1610, S1 620, S1630, S1640 SI 650, SI 660, SI 710, SI 720, SI 730, SI 740, SI 750, S6520 S6530, S6540 , S6550, S6560 steps

Claims (1)

夂、申請專利範圍 1· 一種用來從具有損壞資料的硬碟恢復損壞資料的方法, 包含下列步驟: (a) 讀取該硬碟機並檢測磁區資訊; (b) 從該檢出的磁區資訊分析在檔案配置表 (FAT)、根目錄、和資料磁區上的資訊,並搜尋損壞的 目錄資訊; (c) 使用一搜尋器介面並恢復一找到的目錄; (d) 顯示資料和目錄之磁區觀察器; (e) 透過一顯示的磁區觀察器檢查叢集是否斷離; (f) 當在步驟(e)中發現該等叢集為斷離時,手動 地拉夷並丟放一個FAT編輯器,並自動編輯該等個別叢 集之配置值以恢復資料,並把恢復的FAT資訊儲存在_ 儲存裝置中; (g) 當在步驟(e)中發現該等叢集不為斷離時,及 在步驟(f)中恢復的FAT資訊被儲存後,把經恢復資料 儲存在另一機體中; (h) 檢查經儲存資料是否已被正常恢復; (i) 當經儲存資料在步驟(h)中已被正常恢復時, 把-經配置FAT標示為在恢復資料時使用的叢集,·以及 (j) 當經儲存資料在步驟(h)中已被異常恢復時, 手動地編輯該等叢集之配置值。 2.依據申請專利範圍第1項的方法,其令在步驟(e)中,在 由二進位碼轉換成十六進位碼或由十六進位碼轉換成二 進位碼後輪出在顯示磁區觀察器螢幕上的區塊被判 六、申請專利範圍 斷離資料。 3.依據申請專利範圍第1項的方法,其中該FAT資訊受-健 存裝置管理。 5 4·依據申請專利範圍第1項的方法,其中該等資料被恢復 並檢查至於是否正常,而對應於該等資料的FAT被配置 和顯示。 5·依據申請專利範圍第3項的方法,其中受該儲存裝置管 理的該FAT資訊被儲存並載入與該損壞機體不同的另一 機體中。 6· —種用來恢復安裝在可由電腦讀取的記錄媒體上之損壞 資料的方法,其係用在一種用來從具有損壞資料的硬碟 恢復損壞資料的方法中,並包含下列步驟: (a)讀取該硬碟機並檢測磁區資訊; (b) 從該檢出的磁區資訊分析在播案配置表(fat)、 根目錄、和資料磁區上的資訊’並搜尋損壞的目錄資訊; (c) 使用一搜尋器介面並恢復一找到的目錄; (d) 顯示資料和目錄之磁區觀察器; (e) 透過一顯示的磁區觀察器檢查叢集是否斷離; (f) 當在步驟(e)中發現該等叢集為斷離時,手動地 ^0 拉曳並丟放一個FAT編輯器’並自動編輯該等個別叢集 之配置值以恢復資料,並把恢復的FAT資訊儲存在一错 存裝置中; (g) 當在步驟(e)中發現該等叢集不為斷離時,及在 步驟(f )中恢復的F AT資訊被儲存後,把經恢復資料儲存 -25-范围 Scope of patent application1. A method for recovering damaged data from a hard disk with damaged data, including the following steps: (a) reading the hard disk drive and detecting the magnetic sector information; (b) from the detected The sector information analyzes the information on the file allocation table (FAT), the root directory, and the data sector, and searches for damaged directory information; (c) uses a searcher interface and restores a found directory; (d) displays the data And the magnetic field viewer of the directory; (e) check whether the cluster is disconnected through a displayed magnetic field viewer; (f) when such clusters are found to be disconnected in step (e), manually pull and discard Put a FAT editor and automatically edit the configuration values of these individual clusters to recover the data, and store the recovered FAT information in the _ storage device; (g) When it is found that the clusters are not broken in step (e) At the time of departure, and after the FAT information restored in step (f) is stored, the restored data is stored in another body; (h) Check whether the stored data has been restored normally; (i) When the stored data is in the When step (h) has been restored normally, put- FAT cluster configuration labeled for use in data recovery, · and (j) when the data has been stored by the abnormality recovery in step (h), the value of such manually edit the configuration of the cluster. 2. The method according to item 1 of the scope of patent application, which in step (e) turns the display magnetic field after converting from a binary code to a hexadecimal code or from a hexadecimal code to a binary code. The block on the screen of the viewer was sentenced. 6. The scope of the patent application disconnected the data. 3. The method according to item 1 of the patent application scope, wherein the FAT information is managed by a -memory device. 5 4. The method according to item 1 of the scope of patent application, in which the data is restored and checked as to whether it is normal, and the FAT corresponding to the data is configured and displayed. 5. The method according to item 3 of the scope of patent application, wherein the FAT information managed by the storage device is stored and loaded into another body different from the damaged body. 6. · A method for recovering damaged data installed on a computer-readable recording medium, which is used in a method for recovering damaged data from a hard disk with damaged data, and includes the following steps: ( a) Read the hard drive and detect the sector information; (b) Analyze the information on the broadcast configuration table (fat), root directory, and data sector from the detected sector information 'and search for damaged Directory information; (c) Using a searcher interface and restoring a found directory; (d) Displaying data and a directory viewer of the directory; (e) Checking whether the cluster is disconnected through a displayed disk viewer; (f) ) When the clusters are found to be disconnected in step (e), manually ^ 0 drag and drop a FAT editor 'and automatically edit the configuration values of the individual clusters to recover data, and restore the recovered FAT The information is stored in a misstored device; (g) When the clusters are not disconnected in step (e), and the FAT information recovered in step (f) is stored, the recovered data is stored -25- 六、申請專利範圍 在另一機體中; (h) 檢查經儲存資料是否已被正常恢復; (i) 當經儲存資料在步驟(h)中已被正常恢復時,把 -經配置FAT標示為在恢復資料時使用的叢集;以及 (j) 當經儲存資料在步驟(h)中已被異常恢復時,手 動地編輯該等叢集之配置值。 7· -種資枓恢復方法,該方法係用以於具有損壞資料的目 錄資訊在一具有該等損壞資料的硬碟中損壞時恢復資 料,該方法包含下列步驟: (a) 檢測來自具有該等損壞資料的一第一機體之磁 區資訊; (b) 從該第一機體讀取開機磁區值; (c) 根據所檢出磁區資訊和該等開機磁區值來分析 碟片資訊; (d) 田在步驟(c)中該碟片資訊不是檔案配置表(『Μ) 資訊時,判定該碟片資訊是一個町檔案系統(NTFS),並 恢復該NTFS ; (e) 當在步驟(c)中該碟片資訊是FAT資訊時,檢測 該FAT資訊並把它儲存在一儲存裝置中; (f )檢測根目錄資訊並把它儲存在該儲存裝置中; (g) 檢測來自資料磁區的損壞目錄和損壞檔案資 訊; (h) 藉由使用在步驟(g)中檢出的目錄資訊來分析要 被恢復的目錄資訊,並根據經分析目錄資訊來產生損壞 、申請專利範圍 目錄資訊;以及 (1)藉由使用該損壞目錄資訊來恢復該損壞目錄, 並藉由使用該經恢復目錄和檔案資訊來恢復損壞資料, 且把經恢復資料儲存在一第二機體中。 8·依據申請專利範圍第7項的方法,其中該步驟(丨)包含下 列步驟: (1-1)在一設定環境中把資料之初始大小改變成一 任意大小; (i-2)把由副檔名找出的資料登記在一目錄恢復螢 幕上; (1-3)針對資料之名稱和大小由程式本身分析和產 生資訊; (1 -4)在該目錄恢復螢幕上的一表列中隨機改變資 科之名稱和大小; (i - 5)儲存步驟(i—4)之該等資料、經改變的名稱和大 小;以及 (i 一 6)檢查步驟(i-5)之經儲存資料的大小,並於此 入小很小時,返回步驟(丨―4)。 ·/種恢復安裝在電腦可讀取記錄 法,該方法係於具有損壞資料之目 壞資料之硬碟内損壞時,使用於一 電腦可讀取記錄媒體上之資料之方法中 列步驟·’ 媒體之損壞資料之方 錄資訊在一具有該損 種用以恢復儲存於一 該方法包含下 一機體之斷 (a)檢測來自具有該等損壞資料的一第 548|426. The scope of patent application is in another body; (h) Check whether the stored data has been restored normally; (i) When the stored data has been restored normally in step (h), mark the -configured FAT as The clusters used in recovering the data; and (j) manually editing the configuration values of the clusters when the stored data has been abnormally recovered in step (h). 7. · A resource recovery method for recovering data when directory information with damaged data is damaged in a hard disk with such damaged data, the method includes the following steps: (a) detecting The magnetic sector information of a first body such as damaged data; (b) read the boot sector value from the first body; (c) analyze the disc information based on the detected sector information and the boot sector values ; (D) when Tian disc information in step (c) is not file configuration table ("M) information, it is determined that the disc information is a Machine File System (NTFS), and the NTFS is restored; (e) when in When the disc information in step (c) is FAT information, detect the FAT information and store it in a storage device; (f) detect the root directory information and store it in the storage device; (g) detect from Damaged directory and damaged file information of the data sector; (h) Analyzing the directory information to be restored by using the directory information detected in step (g), and generating damaged, patented scope based on the analyzed directory information Directory information; and (1) borrowing Use this information to restore the damaged directory corrupted directory, and recovered by using the directory and file information to restore corrupted data, and the recovered data is stored in a second body. 8. The method according to item 7 of the scope of patent application, wherein the step (丨) includes the following steps: (1-1) changing the initial size of the data to an arbitrary size in a set environment; (i-2) changing the The data found by the file name is registered on a directory recovery screen; (1-3) The program analyzes and generates information for the name and size of the data; (1-4) randomly selects a list on the directory recovery screen Change the name and size of the asset; (i-5) the information stored in step (i-4), the changed name and size; and (i-6) check the stored information in step (i-5). Size, and enter here for a very small time, return to step (丨 ―4). · / A recovery method installed on a computer-readable recording method, which is a method of using a computer-readable method to read data on a recording medium when the hard disk with damaged data or damaged data is damaged. ' The recorded information of the damaged data of the media is a piece of data with the type of damage used to recover stored in a method that includes the next body (a) detection from a section 548 | 42 六、申請專利範圍 離資訊; (b) 從該第一機體讀取開機磁區值; (c) 根據經檢出磁區資訊和該等開機 碟片資訊; 磁區值來分析 配置表(FAT) 個Ντ檔案系統(NTFS),並 (d)當在步驟(c)中該碟片資訊不是槽案 資訊時’判定該碟片資訊是一個Ντ槽案系每 恢復該NTFS ; ⑷當在步驟㈤中該碟片資訊是FAT資訊時,檢測 該FAT資訊並把它儲存在一儲存裝置中; (f) 檢測根目錄資訊並把它儲存在該儲存裝置中; (g) 檢測來自資料磁區的損壞目錄和損壞檔案資 (h)藉由使用在步驟(g)中檢出的目錄資訊來分析要 被恢復的目錄資訊,並根據經分析目錄資訊來產生損壞 目錄資訊;以及 (1)藉由使用該損壞目錄資訊來恢復該損壞目錄, 並藉由使用該經恢復目錄和檔案資訊來恢復損壞資料, 且把經恢復資料儲存在一第二機體中。 1 〇·依據申請專利範圍第9項的方法,其中該步驟(i )包含 下列步驟: (i -1 )在一設定環境中把資料之初始大小改變成一 任意大小; (i - 2 )把由副樓名找出的資料登記在一目錄卡灰復榮 幕上;6. The patent application range separation information; (b) read the boot sector value from the first body; (c) analyze the configuration table (FAT) based on the detected sector information and the boot disc information; ) NTS file system (NTFS), and (d) when the disc information in step (c) is not slot case information, 'determine that the disc information is an NT slot case, every time the NTFS is restored; When the disc information is FAT information, detect the FAT information and store it in a storage device; (f) detect the root directory information and store it in the storage device; (g) detect from the data sector (H) analyze the directory information to be restored by using the directory information detected in step (g), and generate the damaged directory information based on the analyzed directory information; and (1) borrow The damaged directory is restored by using the damaged directory information, the damaged data is restored by using the restored directory and file information, and the restored data is stored in a second body. 10. The method according to item 9 of the scope of patent application, wherein step (i) includes the following steps: (i -1) changing the initial size of the data to an arbitrary size in a set environment; (i-2) changing the The information found by the name of the auxiliary building is registered on a directory card gray revival curtain; -28- 、申请專利範圍 (1 一 3 )針對該資料之名稱和大小由程式本身分析和 產生資訊; (1-4)在該目錄恢復螢幕上的一表列中隨機改變資 料之名稱和大小; (1 -5)儲存步驟(卜4)之該等資料經改變的名稱和大 小;以及 (i-6)檢查步驟(i—5)之經儲存資料的大小,並於該 大小很小時,返回步驟(i-4)。 11· 一種遠端控制資料恢復方法,其係用在用來透過包括 含有損壞資料的硬碟之伺服器、一網路、經由該網路耦 接至该伺服器的一委託者來恢復資料之方法中,包含下 列步驟: (a )經由一個τ c p /丨p協定透過一網路來耦接該伺服 器和委託者; (b) 當一資料要求經由一耦接網路由該委託者提供 給該伺服器時,該伺服器檢測來自該委託者之一第一機 體的對應資料資訊,並把該資料資訊傳輸到該委託者; 以及 (c) 該委託者接收來自該伺服器的檢出資料資訊並 把資料資訊儲存在一儲存裝置中,並藉由使用經儲存資 訊來恢復損壞資料,並把經恢復資料儲存在與該損壞機 體不同的一第二機體中。 1 2 ·依據申请專利範圍第11項的方法,其中該步驟(乜)包含 下列步驟: 548542 、申清專利範圍 性,(二):二透過該耦接網路提供的-密竭之可接受 取;碼經判定不可接受時,終切委託者之存 是否=):該密碼經判定可接受時,檢查-資料要求 T否由该委託者提供,而當該委 時,等待到資料要求被產生4止,而—/貝料要求 却去μ山士 马止而當資料要求由該委 出;、檢查一碟片資訊要求是否由該委託者提 〇 α:當-碟片資訊要求由該委託者提出時,把碟 輸給該委託者,而當該委託者未提«片資訊 出.1及檢查一碟片磁區資料要求是否由該委託者提 〃(b-4)當-碟片磁區資料要求由該委託者提出時, 從該碟片讀取磁區並把該等磁區傳輸給該委託者,而當 該委託者未提出碟片磁區資料要求時,檢查—連接^ 要求是否被提出;而當一連接終止要求被提出時,終止 連接’而當未提出連接終止要求時,返回步驟(b_2)。 13.依據中請專利範圍㈣項的方法,其中該步驟⑹包含 下列步驟: (C-1)從該伺服器讀取該損壞第一機體之磁區資 訊,並把磁區資訊儲存在一儲存裝置中,· (c - 2)從該磁區資訊檢測開機磁區值; (c-3)從該磁區資訊分析碟片資訊,並檢查該碟片 資訊是否一檔案配置表(FAT); -30- 、申請專利範圍 (C-4)當在步驟(C-3)中該碟片資訊是一個FAT時, 判疋该損壞硬碟是一個FAT檔案系統,並恢復該FAT檔案 系統;以及 (c-5)當在步驟(c-3)中該碟片資訊不是一個fat 時,判定該損壞硬碟是一個Ντ(視窗NT)檔案系統 (NTFS),並恢復該NTFS檔案系統。 14·依據申請專利範圍第13項的方法,其中磁區資訊包含 針對一分割區塊表、開機磁區、FAT、根目錄、及資料 的資訊。 、 15·依據申請專利範圍第13項的方法,其中該步驟(c—4)包 含下列步驟: (c-4a)把該損壞硬碟之fat資訊儲存在該儲存裝置 中; (c-4b)從FAT資訊檢測該根目錄資訊並把根目錄資 訊儲存在該儲存裝置中; (c-4c)根據根目錄資訊來恢復該損壞資料;以及 (c-4d)把經恢復資料儲存在該第二機體中。 16· —種遠端控制資料恢復系統,其係用在用來藉由把安 裝資料恢復程式的委託者耦接至具有損壞硬碟之伺服器 來恢復損壞資料的資料恢復系統中,包含: 耦接一伺服器和一委託者的一網路; 連接於該網路的一委託者,其輸入要被連接至該伺 服器的一伺服器之一個TCP/IP位址和密碼,並藉由透過 所連接路徑讀取該硬碟機體或使用一磁區讀取功能透過 六、申請專利範圍 口亥、’罔路來碩取用以恢復資料的資訊,並恢復該資料,並 把經恢復資料儲存在一不同的未損壞機體中;以及 伺服器,當一連接要求從該委託者透過該網路提 出時,該伺服器檢查一密碼,而當該密碼經發現可接受 寺日允彳連接,且當一資料要求從該委託者透過允許路 控提出時,分析所要求資料並把響應資訊傳輸給該委託 者。 17·依據申請專利範圍第16項的系統,其中當一密碼登入 由委託者提供時,該伺服器監測一個TCP/IP協定連接要 求疋否由该委託者提出,而當一連接要求提出時,該伺 服器檢查该密碼之可接受性,而當該密碼經發現可接受 時,該伺服器檢查一資料要求是否由該委託者提出;以 及 田所要求資料係針對碟片資訊時,該伺服器從該損 壞硬碟讀取碟片資訊並把該碟片資訊傳輸給委託者,以 當所要求資料係針對磁區資訊時,該伺服器從該損 壞硬碟讀取磁區資訊並把該磁區資訊傳輸給委託者,而 虽所要求資料係連接終止資訊時,該伺服器終止對該網 路的連接。 U·依據申請專利範圍第17項的系統,其中磁區資訊包含 針對一分割區塊表、開機磁區、FAT、根目錄、及資料 的資訊。-28-. Scope of patent application (1 to 3) The program analyzes and generates information for the name and size of the data; (1-4) randomly changes the name and size of the data in a list on the catalog recovery screen (1 -5) the changed name and size of the data in the storage step (b. 4); and (i-6) checking the size of the stored data in step (i-5), and when the size is small, Return to step (i-4). 11. A remote control data recovery method, which is used to recover data through a server including a hard disk containing damaged data, a network, and a client coupled to the server via the network The method includes the following steps: (a) coupling the server and the client through a network via a τ cp / p protocol; (b) when a data request is routed to the client via a coupling network When the server, the server detects the corresponding data information from the first body of one of the clients and transmits the data information to the client; and (c) the client receives the checked-out data from the server The information is stored in a storage device, and the damaged data is restored by using the stored information, and the restored data is stored in a second body different from the damaged body. 1 2 · The method according to item 11 of the scope of patent application, wherein step (i) includes the following steps: 548542, clearing the scope of the patent, (b): two-the exhaustion provided by the coupling network is acceptable If the code is judged to be unacceptable, is the deposit of the final client =): When the code is judged to be acceptable, check whether the data request T is provided by the client, and when the committee waits for the data request to be There are only 4 occurrences, but-/ the shell material request goes to μ Shan Shima and the data request is assigned by the commission; check whether a disc information request is submitted by the client 0α: when-the disc information request is issued by the When the client submits, the disc is lost to the client, and when the client does not provide «disc information. 1 and check whether the request for a disc magnetic zone data is requested by the client (b-4) when-disc When the magnetic disk data request is submitted by the client, the magnetic disk is read from the disc and transmitted to the client, and when the client does not request the magnetic disk data, the check-connection ^ Whether the request was made; and terminated when a connection termination request is made Connect ', and when no connection termination request is made, return to step (b_2). 13. According to the method in the patent scope, the step 该 includes the following steps: (C-1) Read the magnetic field information of the damaged first body from the server, and store the magnetic field information in a storage In the device, (c-2) detects the boot sector value from the sector information; (c-3) analyzes the disc information from the sector information, and checks whether the disc information is a file allocation table (FAT); -30-. Patent application scope (C-4) When the disc information is a FAT in step (C-3), determine that the damaged hard disk is a FAT file system and restore the FAT file system; and (c-5) When the disc information is not a fat in step (c-3), it is determined that the damaged hard disk is an NT (Windows NT) file system (NTFS), and the NTFS file system is restored. 14. The method according to item 13 of the scope of patent application, wherein the sector information includes information for a partitioned block table, boot sector, FAT, root directory, and data. 15. Method according to item 13 of the scope of patent application, wherein step (c-4) includes the following steps: (c-4a) storing the fat information of the damaged hard disk in the storage device; (c-4b) Detecting the root directory information from the FAT information and storing the root directory information in the storage device; (c-4c) recovering the damaged data based on the root directory information; and (c-4d) storing the recovered data in the second In the body. 16. · A remote control data recovery system, which is used in a data recovery system for recovering damaged data by coupling a client who installs a data recovery program to a server with a damaged hard disk, including: A network connected to a server and a client; a client connected to the network, enters a TCP / IP address and password of a server to be connected to the server, and passes through The connected path reads the hard disk body or uses a magnetic field read function to obtain information for recovering data through six, patent application scopes, and “罔 路”, and restore the data, and store the recovered data In a different undamaged body; and a server, when a connection request is made from the client through the network, the server checks a password, and when the password is found to be acceptable for Teraday ’s connection, and When a data request is made from the client by allowing road control, the requested data is analyzed and the response information is transmitted to the client. 17. The system according to item 16 of the scope of patent application, wherein when a password login is provided by the client, the server monitors whether a TCP / IP protocol connection request is made by the client, and when a connection request is made, The server checks the acceptability of the password, and when the password is found to be acceptable, the server checks whether a data request was made by the client; and when the requested data is for disc information, the server reads The damaged hard disk reads the disc information and transmits the disc information to the client, so that when the requested data is for the magnetic sector information, the server reads the magnetic disc information from the damaged hard disk and transfers the magnetic disc information. The information is transmitted to the client, and although the requested data is connection termination information, the server terminates the connection to the network. U. The system according to item 17 of the scope of patent application, wherein the sector information includes information for a partitioned block table, boot sector, FAT, root directory, and data.
TW089111312A 1999-10-12 2000-06-09 Data recovery method, said method stored on computer readable medium, and remote data control method and system TW548542B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
KR1019990044098A KR100342023B1 (en) 1999-10-12 1999-10-12 Data recovering system of using a remote control function and method for the performing thereof
KR1019990051140A KR100308874B1 (en) 1999-11-17 1999-11-17 Data recovering method from a fragmented data of a hard disc and computer readable medium the same
KR1019990051139A KR100308873B1 (en) 1999-11-17 1999-11-17 Data recovering method from a damaged directory information with a damaged data and computer readable medium the same

Publications (1)

Publication Number Publication Date
TW548542B true TW548542B (en) 2003-08-21

Family

ID=27350072

Family Applications (1)

Application Number Title Priority Date Filing Date
TW089111312A TW548542B (en) 1999-10-12 2000-06-09 Data recovery method, said method stored on computer readable medium, and remote data control method and system

Country Status (4)

Country Link
JP (1) JP2001184247A (en)
AU (1) AU7038900A (en)
TW (1) TW548542B (en)
WO (1) WO2001027860A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102360318A (en) * 2011-09-27 2012-02-22 深圳市万兴软件有限公司 Recovery method and device of deleted files in FAT (File Allocation Table) file system
TWI393125B (en) * 2007-10-19 2013-04-11 Mitsubishi Electric Corp Information recording method and device, information recording medium, and manufacturing method and device of information recording medium
TWI461904B (en) * 2011-08-16 2014-11-21 Mstar Semiconductor Inc Recovery method and device for linux using fat file system

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1455276A1 (en) * 2003-03-06 2004-09-08 Hewlett-Packard Development Company, L.P. Data processing system and method to restore a backup
CN101051502B (en) * 2006-03-27 2010-05-26 联发科技股份有限公司 Method for the recovery of a damaged table of contents in an optical disc
CN100446000C (en) * 2006-08-16 2008-12-24 珠海金山软件股份有限公司 Method for re-setting up catalogue structure and restoring data in FAI volume
JP2010511923A (en) * 2006-09-30 2010-04-15 エヌティーエフエス カンパニー リミテッド Memory card reader for recovering a memory card
CN101669095B (en) * 2007-04-25 2011-12-28 松下电器产业株式会社 Information reproduction method and information reproduction device
KR101593184B1 (en) 2014-09-16 2016-02-15 한국전자통신연구원 Method and apparatus for recovering partition based on file system metadata

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5956745A (en) * 1997-04-23 1999-09-21 Novell, Inc. System and method for automatically resizing a disk drive volume
KR19990060338A (en) * 1997-12-31 1999-07-26 윤종용 Hard disk drive virus damage data recovery method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI393125B (en) * 2007-10-19 2013-04-11 Mitsubishi Electric Corp Information recording method and device, information recording medium, and manufacturing method and device of information recording medium
US8526281B2 (en) 2007-10-19 2013-09-03 Mitsubishi Electric Corporation Information recording method and apparatus, information recording medium, and information recording medium manufacturing method and apparatus
TWI461904B (en) * 2011-08-16 2014-11-21 Mstar Semiconductor Inc Recovery method and device for linux using fat file system
CN102360318A (en) * 2011-09-27 2012-02-22 深圳市万兴软件有限公司 Recovery method and device of deleted files in FAT (File Allocation Table) file system

Also Published As

Publication number Publication date
WO2001027860A3 (en) 2002-09-19
JP2001184247A (en) 2001-07-06
AU7038900A (en) 2001-04-23
WO2001027860A2 (en) 2001-04-19

Similar Documents

Publication Publication Date Title
US7941814B1 (en) Device driver processing for automated system restores
RU2434269C2 (en) Multiprotocol portable storage device
WO2017049828A1 (en) Method, device and system for data processing based on linux
US8577845B2 (en) Remote, granular restore from full virtual machine backup
JP4354233B2 (en) Backup system and method
US11687488B2 (en) Directory deletion method and apparatus, and storage server
JP5572163B2 (en) Recovering computers that contain virtual disks
EP1586997B1 (en) Method of data storage capacity allocation and management using one or more data storage drives
US7941599B2 (en) IT automation appliance imaging system and method
US7496783B1 (en) Merging cluster nodes during a restore
US20040172512A1 (en) Method, apparatus, and computer readable medium for managing back-up
US20090024757A1 (en) Automatic Protocol Determination For Portable Devices Supporting Multiple Protocols
US20070143097A1 (en) Systems and methods for selectively copying embedded data files
TW548542B (en) Data recovery method, said method stored on computer readable medium, and remote data control method and system
US20090204648A1 (en) Tracking metadata for files to automate selective backup of applications and their associated data
CN112000277B (en) Method, device and equipment for copying simplified backup file and readable storage medium
US20110289350A1 (en) Restoration of an Image Backup Using Information on Other Information Handling Systems
JP2004295462A (en) Recovery processing method, execution system of the same, and processing program of the same
US6687819B1 (en) System, apparatus and method for supporting multiple file systems in boot code
JP2003323314A (en) Automated method for installing and configuring test package on a unit under test
CN101366006A (en) Emulation component for data backup applications
KR100308874B1 (en) Data recovering method from a fragmented data of a hard disc and computer readable medium the same
US20130024726A1 (en) System and method for removable network attached storage enabling system recovery from backup
US8949588B1 (en) Mobile telephone as bootstrap device
EP1103895A2 (en) Disk data recovery method