TWI282923B - Method and apparatus for shielding and protecting data - Google Patents

Method and apparatus for shielding and protecting data Download PDF

Info

Publication number
TWI282923B
TWI282923B TW94125254A TW94125254A TWI282923B TW I282923 B TWI282923 B TW I282923B TW 94125254 A TW94125254 A TW 94125254A TW 94125254 A TW94125254 A TW 94125254A TW I282923 B TWI282923 B TW I282923B
Authority
TW
Taiwan
Prior art keywords
hidden
disk
area
disk drive
computer
Prior art date
Application number
TW94125254A
Other languages
Chinese (zh)
Other versions
TW200705194A (en
Inventor
Hong-Jien Chou
Original Assignee
Hong-Jien Chou
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hong-Jien Chou filed Critical Hong-Jien Chou
Priority to TW94125254A priority Critical patent/TWI282923B/en
Publication of TW200705194A publication Critical patent/TW200705194A/en
Application granted granted Critical
Publication of TWI282923B publication Critical patent/TWI282923B/en

Links

Landscapes

  • Storage Device Security (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

A method and an apparatus for protecting a disc of a computer facility, includes coupling a control device between a CPU and the disc, separating the disc into one or more protected areas and one or more unprotected areas, and shielding the protected areas, to allow only predetermined command from the control device to access into the protected area, and to prevent the protected area from being accessed and attacked by unauthorized persons and computer viruses. A key device may be coupled to the control device, to control and to shield the protected area via the control device.

Description

1282923 五、發明說明(1) 【發明所屬之技術領域】 及特ίΓ月係有關於一種電腦資料之儲存或運作方式,以 -寸7 ί'有關於一種電腦資料之隱藏裝置及方法。 一、【先前技術】 ,上的Ξ璁ί前市面上所習用的電腦必需插設一或一個以 .或硬;:更碟機,以供用來儲存資料之用,而這些磁碟 〇r μ铖句係利用一種索引式組織法(j n d e χ e d 磁;?;世? a n丨Z a t丨0 n )來管理檔案,此種方法將夂 心分成多個磁……;“*,::: 來記” 再以一個索引表格(FAT) 名及要存入空的磁碟或硬碟機裡面的時候,其檔 Y) f里會存入根目錄(R00T D I RE CTOR 為單^ ’而其播案内容則被打散,並且以每個磁簇大小 f入磁碟或硬碟機裡面,不滿—個磁簇大小的内容 記鎮計算,並將存放此槽案的第一個磁簇索引值 表袼2面的檔名及屬性中,其餘磁簇索引值則記於索引 、艮目;二在,種檔案的管理系統中’如果其索引表格或 聯繁而無法回復。中的所有資料即會失去 保作業系,或防護軟體可以有條件式地 D 1 s κ ^ D H錄’但S ή —般電腦裡面所必備的F delete ’ F〇RMAT等磁碟工具軟體1282923 V. INSTRUCTIONS INSTRUCTIONS (1) [Technical field to which the invention pertains] There is a way to store or operate a computer data, and a hidden device and method for computer data. First, [previous technology], the computer used in the market before the Ξ璁ί must be inserted one or one with a . or hard;: a disc player for storing data, and these disks 〇r μ The haiku system uses an indexed organization method (jnde ed ed magnetic; ?; world? an丨Z at丨0 n ) to manage files. This method divides the heart into multiple magnets...; "*,::: "When you use an index table (FAT) name and you want to store it in an empty disk or hard drive, the file Y) f will be stored in the root directory (R00T DI RE CTOR is a single ^ ' and its The content of the broadcast is broken up, and the size of each cluster is f into the disk or hard disk drive. The content of the magnetic cluster size is calculated and the first magnetic cluster index of the slot is stored. In the file name and attribute of the value table 2, the remaining magnetic cluster index values are recorded in the index and the project. Second, in the file management system, if the index table or the combination is unable to reply, all the data in the file. Will lose the operating system, or the protective software can be conditionally D 1 s κ ^ DH recorded 'but S ή - like the inside of the computer Required disk software such as F delete ’ F〇RMAT

第6頁 1282923 五、發明說明(2) 仍然可以用來更動 ^ ' 格或根目錄,而俨=正該等磁碟或硬碟機裡面的索引表 遺失。 于乂些索引表格或根目錄遭受到破壞或 目前市面上所、 技的P C〜c I L· L以看到的磁碟保護軟體,例如趨勢科 檔案或掃插記憶體的上為其中一例,其係以軟體掃描 •出各種遭受感染的广Γ式去比對各種不同的病毒,以便找 未破壞磁碟或硬碟:::::移二:在該等病毒尚 種防護方法有一· w 〜寻病毋移除或掃除。但是此 的防毒資料庫才杆、=的缺點,亦即其必需要保有最新 能無法谓测到並且 對於,& …、忐私除或知除這些病毒。 兮似^女為的主動破壞就必需使用硬體防穹+ A夕口 軟公司的還原卡在市面上流 司的運原卡只能用以監視Β ί〇S中斷的方,北軟公 軟體對於重要磁區的寫人, =防止骇客 直接對磁碟或硬碟機的輸出 :疋J:嶋或程式 駭客的入?,而仍然會很容易到=法防止此種 其他還有一種被稱之為“磁間隙 護技術被發展出來,例如台灣發明巾請^=的磁碟保 89125173號,亦即證書第工57 利用磁區與磁區之間的磁執間隙來儲存 :枓其:、 是磁間隙原本存在的目的是為了防止磁頭讀,貝=二可 下一個其他磁區而保留的。可是,當磁碟機♦後盍到 一速度的時候,其存放在磁軌間隙的保護資料即^ =某Page 6 1282923 V. Invention Description (2) Can still be used to change the 'grid or root directory, and 俨 = the index table in the disk or hard drive is missing. In the case of some index tables or root directories that have been damaged or currently on the market, PC~c IL·L is seen as a disk protection software, such as trend file or sweep memory, which is an example. Scanning with software • Various types of infected viruses are used to compare various viruses in order to find unbroken disks or hard disks::::: Move two: There are still some protection methods in these viruses. Remove or sweep after the disease. However, the anti-virus database has the disadvantage of being the best, that is, it must be kept up-to-date and can't be detected and used to & ..., smuggle or get rid of these viruses. The active destruction of the female-like female must use the hardware anti-mite + A eve soft company's recovery card in the market, the original card can only be used to monitor the Β 〇 〇 S interrupted side, the North soft male software Writer of important magnetic area, = prevent hackers from directly outputting to disk or hard drive: 疋J: 嶋 or program hacker's entry? And it will still be easy to get to the law to prevent this. There is also a kind of magnetic gap protection technology that has been developed. For example, the invention of the towel in Taiwan, please call the disk protection 89125173, that is, the certificate work 57 The magnetic gap between the magnetic zone and the magnetic zone is stored: 枓:, the magnetic gap originally exists to prevent the head from being read, and the shell = 2 can be reserved for the next other magnetic zone. However, when the disk drive ♦After picking up a speed, the protection data stored in the track gap is ^= some

圓II 第7頁 1282923 五、發明說明(3) _ 法準確地讀取。另外,若丄 候,其也可以很容易去破壞=者知逼喊保護的方式的時 有鑑於此,本私日日λ %主 可以將資料隱藏二:積究,期能發明—種 之隱藏方法。. 乂防止這受破壞之電腦資料 本發明的一個目的係在 •置及方法,其係包含有二種電腦資料之隱藏裝 磁碟或硬碟機分隔出一或上二用來將電腦裡面的 被其他未經授權的人進入或刿立七1破保護區域,以避免 ,本發明的另外一個目:c意地破壞。 藏裝置及方法,1中复可、於提供—種電腦資料之隱 以避免被1他夫^ π二 將该被保護的區域隱藏起來, 乂避兇被其他未經授權的人看 个 被其他未經授權的人任意進人或破^ £域,而可避免 藏敦ί;=又於提供-種電腦資料之隱 意進入或存取儲在/ΐ 以避免被其他未經授權的人任 ,\ 啫存在忒磁碟或硬碟機裡面的資料。 隱藏裝另::Γ的係在於提供一種電腦資料之 碟機之未被伴.的::巧以用來將電腦裡面的磁碟或硬 該磁碟或;壞之後,可以將位在 化之後立刻回復工作。 保持疋整,而可以在格式 二、【發明内容】 第8頁 ⑧ 1282923 五、發明說明(4) 法,?=的:種電腦資料之隱藏裝置及方 理哭t C P U ) Γ , ί私城裡面,並且聯結在一中央處 正常使用區域以及至少掏機成為至少-Circle II Page 7 1282923 V. INSTRUCTIONS (3) _ The method reads accurately. In addition, if you wait, it can be easily destroyed. In view of the way of knowing the protection of the shouting, this private day λ% can hide the data two: accumulate, period can be invented - kind of hiding method.乂 这 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂 乂It is entered or erected by other unauthorized persons to avoid the destruction of the other area of the invention: c intentionally destroyed. Hidden devices and methods, 1 in the re-delivery, provide a kind of computer data hidden to avoid being hidden by 1 夫 ^ π 2, to avoid being murdered by other unauthorized people to be seen by others Unauthorized persons can arbitrarily enter or break the domain, and can avoid hiding; = also provide a kind of hidden access or access to computer data to avoid being used by other unauthorized persons. , \ 啫 The data stored on the disk or hard drive. Hidden device:: The system is to provide a computer data disk player is not accompanied by:: used to use the disk inside the computer or hard disk or; after the bad, can be bitified Reply to work immediately. Keep it tidy, but it can be in the format 2, [invention content] Page 8 8 1282923 V. Invention description (4) Law,? =: The hiding device and the device of the computer data cry c C U U Γ , ί private city, and the connection in a central area of normal use and at least the downtime becomes at least -

…指♦,使得只;在:: ?;丄:及控制來自該C 藏的區域。 有在收到特-命令時才能進入到該隱 該隱藏的區域可以為該磁碟機的其 域或是為一個或一個以上的磁碟機。 次鬼U上的區 其可以經由一外接設備來發 該外接設備可以為外接磁片,光知:的命令。 碟,拇指碟,手提電腦,或是其:外工備手機,隨身 »亥磁碟機在格式化時,該控制器可 而使該隱藏的區域不被格式化。 也開忒fe賊的區域 四、【實施方式】 失間ί發,係有關於一種電腦資料之隱藏裝置及方法,靖 芩閱弟一至二圖所示,這種電腦資料之障 法β 要包括一控制器(20,第二圖),首.,衣置及方法主 控制器(2 0 )安裝到一般的電腦或類的2人需先將該 -圖的流程(10)所…該控備上,如第 微控器(2 1 )和一記憶體(2 2 ) ^ )係包含一 二憶體,永久儲存記憶體,可電氣抹除: 可’該控制器(2 〇 )係'聯結在一般的 °己f思體寻寺均 的中央處理器(C ρ ϋ,8 〇 )和硬碟旬,類似的設備 (9 〇 )之間,例如設置在所謂的南 ' =疋磁碟機 飞北橋之間或裡 1282923 五、發明說明(5) 面,或是直接設置在該硬碟機或磁碟機(9 〇 )裡面。 接著,如第一圖的流程(i i )所示,吾人可以將該 ^腦的磁碟機(9 〇 )格式化成為一般之可以使用或存取 乂正常使用的區域或未被保護的區域(9丄,第三圖), =且將其中的一或一個以上的份或區一 或是受到保護的區域(93,第三圖)成其;該: ;至小於該未被保護的區域(91),其區域大小均不或 ^例如,吾人可以將該等隱藏區域或受到保護的區域 i ϋ的Ϊ始位㉛(9 4 )和結束位址(9 5 )記錄起 吏侍位在该區域(9 3 )裡面的資料可以被保護住。 者J以經由第一圖之流程(工2 )而將電腦 =:=常;傳統的方式開機’⑹此即可正常操作該電 月包其中必需注意的是,該等磁碟機(9 〇 )的正當伟用 Ϊ Ξ:ΐ未被保護的區4 ( 9 1 )和該隱藏區域或受到保 ^^域(9 3 )僅係為一種實施例並且供作說明而 可直接將其中的—個或-個以上的磁碟機 ^ 或區ί為:種隱藏區域或受到保護的區域 ,所以不官该隱藏區域或受到保護的區域一 以):系;某一磁碟機(9 0 )的裡面的其中—部份, 或疋為一個或一個以上的磁碟機( 或多個隱藏區域或受到保護的區域(9 3 ) 。$視為一 =過該分割流程(:L i )之後,該電腦的磁碟機 )即會常態保有該可以正常使用的區域或未被保護 第10頁 1282923 五、發明說明(6) 的區域(9上)以;^ 一 (9 3) ’而該控制器/受到保護的區域 器(CPU,80)和硬 二置在電腦的申央處理 以該控制器(2 〇 )可以將兮;岔碟冑(9 〇 )之間,所 (9 3 )隱藏起來,並且=fe職區域或受到保護的區域 或其他未經授權的人均無法;旱= =以-般的人 裡面會另外包含有該障 =电恥的磁碟機(9 0 ) (93),除非使用==或受到保護的區域 道。 者本人或其他經過授權的人才能知 接設備::8 二::起見’使用者最好利用或插入-外 者設定的保護資料,如漭 j 3 )末下達或§又疋使用 (Q Q ) M ;]L ( 1 4 )所示,該外接設備 (8 8 )例如可以為外接磁片 =備 外接手機,外接隨身碟,外 ^先外接硬碟機, 是其他外接的設備(8 8) ,外接手提電腦,或 =面去',如Ϊ程(14)所示,該 域(q q Ρ α以進入该隱藏區域或受到保護的區 :一(9!)裡面去設定保護資料,接著,如流程(i 5 ) “到移除或拔除該外接設備(8 8),如此即 違到=枓保護的目的,如流程(1 6 )所示。 力古#著敬明芩看第四圖所示,當使用者欲使用電腦而 該外接設備(8 8 )的時候,其可以先由該控制 二j 2 〇 )取得或收到來自該C Ρ ϋ ( 8 0 )的命令,流 私 3 〇 ),此時,使用者可以和平常一樣地操作該電... means ♦, so only; at:: ? ;丄: and control the area from the C. The hidden area can be entered when receiving the special command. The hidden area can be the domain of the drive or one or more drives. The area on the secondary ghost U can be sent via an external device. The external device can be an external magnetic disk, and the command is known. Disc, thumb disc, laptop, or its: external work mobile phone, portable » When the HD drive is formatted, the controller can make the hidden area unformatted. Also open the area of the thief of the four thieves, [implementation] Loss, is a hidden device and method of computer data, as shown in the picture 1 to 2 of Jing Hao, this computer data barrier method A controller (20, second picture), first., clothing and method main controller (20) installed to a general computer or class of 2 people need to first the flow of the figure (10)... In preparation, such as the micro controller (2 1 ) and a memory (2 2 ) ^ ) contain a two-memory, permanent storage memory, can be electrically erased: can 'the controller (2 〇) system' Connected between the general CPU (C ϋ ϋ, 8 〇) and the hard disk, similar devices (9 〇), for example, set in the so-called South '=疋Disk Between the aircraft flying north bridge or 1282923 5, invention description (5) surface, or directly in the hard disk drive or disk drive (9 〇). Then, as shown in the flow (ii) of the first figure, we can format the disk drive (9 〇) into a general-purpose or unprotected area that can be used or accessed. 9丄, the third figure), = and one or more of the parts or areas or the protected area (93, the third picture) into it; the:: to less than the unprotected area ( 91), the size of the area is not or ^ For example, we can record the hidden area or the protected area i ϋ start bit 31 (9 4 ) and the end address (9 5 ) The information in the area (9 3 ) can be protected. J will use the process of the first figure (Work 2) to turn the computer =: = often; the traditional way to boot '(6) This will operate the electric moon package normally. It must be noted that the disk drive (9 〇 The proper use of Ϊ Ξ: ΐ unprotected area 4 ( 9 1 ) and the hidden area or protected area (9 3 ) are only an embodiment and can be directly explained for - One or more disk drives ^ or zone ί are: a hidden area or a protected area, so the hidden area or the protected area is not officially:); a disk drive (90) One of the insides, or one or more, is one or more drives (or multiple hidden areas or protected areas (9 3 ). $ is treated as one = after the splitting process (:L i ) , the computer's drive) will normally have the area that can be used normally or not protected. Page 10 1282923 5. The area of the invention (6) (9) is; ^ 1 (9 3) ' The controller/protected area device (CPU, 80) and the hard disk are placed in the computer's central processing to the controller (2 〇) can be 兮; Between the 岔 胄 (9 〇), the (9 3 ) is hidden, and the =fe area or the protected area or other unauthorized persons cannot; the drought == the person in the general will have The barrier = shame of the disk drive (90) (93), unless the == or protected zone is used. The person or other authorized person can know the equipment: 8:: See the 'users best use or insert - the protection data set by the outsider, such as 漭j 3) the end of the release or § and then use (QQ M;]L (1 4 ), the external device (8 8 ) can be, for example, an external magnetic disk = an external external mobile phone, an external portable disk, an external external hard disk drive, and other external devices (8 8 ), an external laptop, or = face to go, as shown in the process (14), the domain (qq Ρ α to enter the hidden area or protected area: one (9!) inside to set the protection data, then For example, the process (i 5) "to remove or remove the external device (8 8), so that the purpose of the protection = 枓 protection, as shown in the process (1 6). Li Gu # 着敬明芩 see the fourth figure As shown, when the user wants to use the computer and the external device (8 8 ), it can first obtain or receive the command from the C Ρ ϋ ( 8 0 ) by the control 2 (8 0 ), and the private device 3 〇) At this point, the user can operate the electricity as usual.

第11頁Page 11

1282923 五、發明說明(7) :動ίΐ:?:般的操作動作或命令,但是其所下達的操 if定該操作動作或命令是否位在保護資料的 :’則”接結束操作,而使用者不會知。二:裡 作,如流程(3 2 )。但暑,4里# p ^马Π然次备 是位在伴嚐次%L Aw σ果w钿作動作或命令並不 疋4在保4貝枓的位址裡面的話,則1 一 操作該電腦,並且可以下達 ;乍=艾二二樣地 機(9 0 ),如流程(3 3 ),作或命令到磁碟 傳送資料給CPU (80),如碟機(9〇) 使用者操控而結束操作,如流程(3 5 )。),其可以由 接著,敬請參看第五圖所 且有插入該外接設m ( 8 8 ) 田使=者欲使用電腦並 器(2 〇 )取得或收到來自胃寸;;’先由該控制 程(40),此時,使用者可=上80)的命令’流 月=,亚且下達一般的操作動作或命令,但 ^ $ 作動作或命令會先傳到該控制器 二斤下達的操 器(2 〇 )去判定該操作動作或务八a ,亚且由該控制 位址裡面,流程(4 i ),如果^ : ^位在保護資料的 位在保護資料的位址裡面,則复2 j命令並不是 電腦,並且下達一般的操作動作 人千/一樣地操作該 (9〇),如流程(4 2) 到磁碟機 送資料給C P u ( 8 0 ),如流程:1,機(9 〇 )傳 用者操控而結束操作,如流程(4 4 ) ,其可以由使 12829231282923 V. Invention description (7): move ΐ ΐ: ?: general operation action or command, but the action it is assigned determines whether the action action or command is in the protection data: 'then' then end the operation, and use I don't know. Two: Lie, such as the process (3 2). But the summer, 4 ri # p ^ Ma Π然次备 is in the accompanying taste %L Aw σ fruit w钿 action or command is not 疋4 If you are in the address of the 4B, you can operate the computer and release it; 乍=Ai 2nd (9 0), such as the process (3 3), or command to the disk transfer The data is sent to the CPU (80), such as the disc player (9〇), and the user ends the operation, such as the process (3 5 ).), which can be followed by, please refer to the fifth figure and insert the external connection m ( 8 8) Tian Cao = the person who wants to use the computer (2 〇) to get or receive from the stomach;; 'First by the control (40), at this time, the user can = 80) the command 'flow month =, and the general operation action or command is issued, but the action or command will be transmitted to the controller (2 〇) issued by the controller to determine the operation or service. , and by the control address, the flow (4 i ), if the ^ : ^ bit is in the protected data bit in the protected data address, then the complex 2 j command is not a computer, and the general operating action person is issued Thousands / same operation (9 〇), such as the process (4 2) to the disk machine to send data to CP u (8 0), such as the process: 1, the machine (9 〇) pass the user to control and end the operation, such as Process (4 4 ), which can be made by making 128223

位址=的令是位在保護資料的 位在保護資料的位址:妾言:備(88)而操作 亦可由兮成虚嬙r 〇, +,如流程(4 5 ),並且 ^由遠磁碟機(9 0 )傳送資料給C P u ( 8 〇 ),如 .7 以由使用者操控而結束操作,如流程 五、發明說明(8) • ( 9 3 ) * :1“ ’錢臧的區域或受到保護的區域 料之用來儲存或存放較為隱密而不為人知的資 或存放某些必要的或必備的或必需 1域(Π儲存或存放在該正常使用的區域或未被保護的區 所示,的資料遭到入侵或破壞的時候,如第六圖 化,此ϊ 刻將整個磁碟機(9〇)重新格式 會先傳到,㊉7樣地,其所下達的操作動作或命令亦 判=控制器(2 〇 ),並且由該控制器(2 0 )去 程(乍動作或命令是否位在保護資料的位址裡面,流 則其合避,二。果遇到位在保護資料的位址裡面的資料, 化,Li ί 保護資料的位址裡面的區域而不格式 外的資料(目,),可是如果遇到位在保護資料的位址以 ^ ’則其會直接將這些區域格式化,流程 的位址i面ί控制胃(2 Q )並且會將該等位在保護資料 力 的區域的貧料存入或還原於該磁碟機(g 〇 ) 用者;。54) ’而可結束格式化的動作(55),使 其中必ί立即回復或快速地恢復電腦的操作或運作。 而/思的是,不管該正常使用的區域或未被保護的The address=address is located at the address of the protected data at the address of the protected data: rumor: preparation (88) and the operation can also be performed by 兮 嫱 〇 〇, +, such as the process (4 5 ), and ^ by far The drive (9 0) transmits the data to CP u (8 〇), such as .7 to end the operation by the user, as shown in Flow 5, Invention Description (8) • ( 9 3 ) * : 1 “ '钱臧The area or protected area is used to store or store relatively hidden and unknown resources or to store certain necessary or necessary or required 1 fields (Π stored or stored in the area of normal use or not When the protected area shows that the data has been invaded or destroyed, such as the sixth picture, the entire disk drive (9〇) will be re-formatted first, and the operations will be released. The action or command is also judged = controller (2 〇), and the controller (2 0) goes to the process (whether the action or command is in the address of the protected data, the flow is evaded, and the second is encountered. The data in the address of the protected data, the area in the address of the protected data, and the data outside the format ( Head,), but if the address is in the protected data address ^ ' then it will directly format these areas, the address of the process i surface ί control stomach (2 Q) and will be in the protection of information The poor material of the area is stored or restored to the disk drive (g 〇) user; 54) 'and can end the formatting action (55), so that it must immediately reply or quickly restore the operation of the computer or Operating. And / thinking, regardless of the area of normal use or unprotected

第13頁 1282923 五、發明說明(9) 區域(9 1 )遭到何種 新格式化,並且讓位在 (9 3 )裡面的資料不 種不同的病毒而去準備 若是被任何更新或更惡 以迅速恢復操作或運作 * 用白話或用比諭來 一個鑰匙,使用者最好 出或下達操作命令(圖 > (4 6 )該隱藏的區域 然’其中必需注意的是 種實施例而已,吾人亦 (9 0 )來下達該操作 任何可以下達命令(4 受到保遠的區域(9 3 接設備(8 8 )亦均將 財產權的保護。 至目前為止,所有 I分割成一或一個以上的 (93) ’和一或一個 (91),所以只要有 或一個以上的隱藏磁碟 將屬於本發明之 於其如何發出或 病毒的破壞, 該隱藏的區域 被格式化,所 各種對應的掃 毒的病毒入侵 ,相當方便實 說,該等外接 必需經由該外 5,4 5 ), 或受到保護的 ’該等外接設 可直接利用或 命令(4 5 ) 5 )的方式來 )的方式,不 屬於本發明之 吾人均 或受到 以其可 毒檐案 或破壞 用。 設備( 接設備 以便進 區域( 備(8 經由該 ,所以 進入該 管有沒 範疇, 可予以 保護的 以不需 或程式 之後,8 8) (88 入或操 9 3) 8 )僅 磁碟機 只要能 隱藏的 有使用 而應受 立即重 區域 針對各 ’而且 其均可 專同於 )來發 作 。當 係為~ 夠經由 區域或 該等外 到智慧 的電腦均無法將一磁碟機(9 〇 思想均 護。至 隱藏磁碟或受到保護的區域 以上的未被保護的區域或磁 設置一或一塊以上的隱藏區 或受到保護的區域(9 3 ) 範疇’而應受到智慧財產權 下達該操作命令(4 5 ), 碟 域或一 的技術 的保 或如何Page 13 1282923 V. Description of the invention (9) What is the new format of the area (9 1 ), and let the information in (9 3 ) not be prepared with a different virus to prepare if it is updated or worse To quickly resume operation or operation* In a vernacular or to use a key to a key, the user is best to issue or release an operation command (Fig. > (4 6 ) The hidden area is 'there must be an embodiment, We also (9 0) come to the operation to issue any order (4 areas that are protected by fare (9 3 equipment (8 8) are also protected by property rights. So far, all I is divided into one or more ( 93) 'and one or one (91), so as long as one or more hidden disks will belong to the present invention on how it is emitted or the virus is destroyed, the hidden area is formatted, and the corresponding corresponding anti-virus Virus intrusion, quite convenient, said that the external connection must be via the external 5, 4 5), or the protected 'the external connection can be directly used or ordered (4 5) 5), not in this way Invented Everyone may be guilty of or damaging it. Equipment (connected equipment to enter the area (8 (via 8, so enter the tube has no scope, can be protected after no need or program, 8 8) (88 into or fuck 9 3) 8) only disk drive As long as the hidden can be used, it should be attacked by the immediate heavy area for each 'and all of them can be used. When the system is ~ enough to pass the area or such a computer to the outside, it is impossible to protect a disk drive (9 〇 thoughts. To the hidden disk or the unprotected area above the protected area or the magnetic setting) More than one hidden area or protected area (9 3 ) category 'should be subject to intellectual property rights to issue the operational order (4 5), the domain or one of the technical guarantees or how

第14頁 1282923 五、發明說明(10) _ 去野該磁碟機(g 、" 變镇實施。所以 進行分割的程序則可為各種不同之 卜去分割該磁 可’而應受到智慧財產權的保護。’、h將屬於本發明之範 丄還923 圖式簡單說明 【圖式簡單說明 第一圖係為一種電腦資料之隱 第二圖係為這種電腦資障 晋的流裎圖; 〜面示意圖; 賊衣置及方法的控制器的平 第圖:為這種電腦資料之隱藏裝置及方生 ,,L私圖, 及方去的分割磁碟的 第四圖係為未插入外拯_ 敍同· 卜接a又備時控制p调味次 ^矛圖, 過,慮貝料流的使用流 第五圖係為插入外* 圖·以》 妾σ又備日守控制器過滹資袓a 口,以及 I貝料流的使用流程 第六圖係為# # & 壤或遇到病毒感染的資 還原的回復流程圖 料 :為,種電腦之遭受到破 主 要元 0 ) 2 ) 4 6 (2 (3 (3 (3 0 1 2 3 4 件符號說明】 安裝控制器 安裝作業系統 使用者設定保護資料 完成資料的保護 微控器 4 0 )控制器收到指令4 1 )判定是否位力_益 &点位在fe職區裡面 35,44,47,以、 4 ?,zi a ^ 2 Z 5 )結束操作 )傳送命令到磁碟機 4 3 ,4 6 )择作哼菇十土 ’、钱 卞作fe臧或未隱藏磁區 1 1 )磁碟分割 1 3 )插入外接設備 1 5 )移除外接設備 2 〇 )控制器 2 2 )記憶體Page 14 1282923 V. Invention Description (10) _ Go to the disk drive (g, " change town implementation. So the process of splitting can be divided into different kinds of magnetic to separate the magnetic can' and should be subject to intellectual property rights Protection. ', h will belong to the invention. 923 is a simple description. [The diagram is a simple illustration of the first picture is a computer data hidden second picture system is a rogue diagram of this computer resource barrier; ~ 面 ; ; ; ; ; ; ; ; ; ; 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼 贼_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ The sixth picture of the use of the resource, and the flow of the I-bee stream is ## & the response flow of the soil or the recovery of the virus infection: for the computer to suffer the main element 0) 2 ) 4 6 (2 (3 (3 0 3 1 2 3 4 Symbol Description) Installing the Controller Installation Operating System User Set Protection data completion protection data micro controller 4 0) controller receives instruction 4 1) determines whether the force _ benefit & point in the fe area 35, 44, 47, to 4?, zi a ^ 2 Z 5 ) End operation) Transfer command to disk drive 4 3 , 4 6 ) Select as mushroom 十 ' ', 卞 卞 for fe臧 or unhidden magnetic area 1 1 ) Disk division 1 3 ) Insert external device 1 5) Remove external device 2 〇) Controller 2 2) Memory

麵 第16頁 1282923 圖式簡單說明 (5 0 )格式化磁碟機 (5 1 )判定是否位在隱藏區裡面 (5 2 )磁碟機之疯磁區不允許被格式化 (5 3 )磁碟機之非藏磁區允許被格式化 (5 4 )控制器將資料還原於磁碟機中 (80) CPU ( 9 0 )磁碟機 (9 1 )正常使用的區域或未被保護的區域 (9 3 )隱藏的區域或受到保護的區域 (9 4 )起始位址 (9 5 )和結束位址Page 16 1282923 Simple description of the diagram (5 0) Format the disk drive (5 1 ) to determine whether it is in the hidden area (5 2 ) The magnetic field of the disk drive is not allowed to be formatted (5 3 ) The non-magnetic area of the disc player is allowed to be formatted (5 4) to restore the data to the drive (80) CPU (90) disk drive (9 1) normal use area or unprotected area (9 3 ) Hidden area or protected area (9 4 ) Start address (9 5 ) and end address

Claims (1)

1282923 六、申請專利範圍 1 · 種包腦資料之隱藏裝置,包括一中央處理器(c p u ’ 8 〇 )和一磁碟機(9 〇 ),其特徵係在於: 一控制器(2 0 )設置在電腦裡面,並且聯結在中央 …)和磁碟·(9 〇)之間;該控、 用區域(9 7为副磁碟機(9 〇 )成為至少—正常使 次(9 1 )以及至少一隱藏的區域(9 3 日自,…(8〇)的指令,使得只有在收到 17 7 4才能進入到該隱藏的區域(9 3 )。 】:範圍第1項所述之電腦資料之隱藏襄 的其為該磁碟,(9〇) (90)。 Α 個以上的磁碟機 =·根據申請專利範圍第丄項所 ;,其中其更包括一外接設備(8 8以:之隱藏裝 该操作的命令。 T用來發出或下達 4 置 機 5 置 根據 其中 隨身 根據 其中 申請專利範圍第3項所述之電 该外接設備可以為外接磁片,二之隱藏裝 碟,拇指碟,手提電腦,气是二硬碟機,手 飞&其他外接的設備。 申請專利範圍第1項所述之 該磁碟機(9 〇 )在格式化护自貝料之隱藏骏1282923 VI. Patent Application 1 · The hidden device of the brain data includes a central processing unit (cpu ' 8 〇) and a magnetic disk drive (9 〇), which are characterized by: a controller (2 0 ) setting In the computer, and connected between the central ...) and the disk (9 〇); the control and use area (9 7 for the sub-disk drive (9 〇) becomes at least - normal make (9 1) and at least A hidden area (9 3rd, ... (8〇) instructions, so that only when receiving 17 7 4 can enter the hidden area (9 3).]: Computer data mentioned in the first item of the scope The hidden one is the disk, (9〇) (90). More than one disk drive = · according to the scope of the patent application; wherein it further includes an external device (8 8 to hide The command to install the operation. T is used to issue or release the 4 machine. According to the electric device mentioned in the third paragraph of the patent application, the external device can be an external magnetic disk, a hidden disk, a thumb disk, Laptop, gas is a hard disk drive, hand fly & other external settings The disk drive (9 〇) described in the first application of the patent scope is in the form of a hidden guard from the shell material. 第18頁 卞,該控制器 1282923 六、申請專利範圍 而使該隱藏的區域 (2 0 )可避開該隱藏的區 (9 3 )不被格式化。 2(93 6 ·根據申請專利範圍第1 ,置,其中該控制器(2 0 ) <所述之電腦資料之隱藏裝 (g 〇 )裡面。 Γ从直接設置在該磁碟機 7 · 一種電腦資料之隱藏方法,包括· 央,:f 7控制器(2 0) $電腦裡面,並且聯处在占 央處理态(c p u,8 〇 )和一减碟擁r n ^ %、、、口在一中 分割磁碟機(9 〇 )成為至少一正常使)之間; 及至少一隱藏的區域(9 3 );以及 品知、(1 1 )以 控制來自該C P U ( 8 〇 )的指令,使得只 命令時才能進入到該隱藏的區域(9 3 )。 到特定 8 ·根據申請專利範圍第7項所述之電腦資一 法,其中該隱藏的區域(9 3 )可以為該磁 了2 的其中一或一塊以上的區域或是為一或一 〇 ) (90)。 上的磁碟機Page 18 卞, the controller 1282923 VI. Apply for a patent scope so that the hidden area (2 0 ) can avoid the hidden area (9 3 ) without being formatted. 2 (93 6 · According to the scope of the patent application No. 1, set, wherein the controller (2 0) < said computer data hidden inside (g 〇) inside. Γ from directly set on the disk drive 7 · a The hidden method of computer data, including · Central,: f 7 controller (2 0) $ computer, and the joint in the central processing state (cpu, 8 〇) and a minus disc rn ^ %,, mouth in a split drive (9 成为) between at least one normal; and at least one hidden area (9 3 ); and a knowledge, (1 1 ) to control commands from the CPU (8 ,), This allows access to the hidden area (9 3 ) only when commanded. To a specific computer system according to claim 7, wherein the hidden area (9 3 ) may be one or more areas of the magnetic 2 or one or one) (90). Disk drive 第19頁 1 ·根據申請專利範圍第7項所述之電腦資料 法,其中其可以經由一外接設備(8 8 )來發出$職方上 操作的命令。 ^ 2下達該 1282923 r---:----—--- 、六、申請專利範f " ----- 法〇 根據申請專利範圍第9項所述之電腦資料之隱藏方 f中該外接設備可以為外接磁片,光碟,硬碟機,手 ^随身碟,拇指碟,手提電腦,或是其他外接的設備。 根據申凊專利範圍第7項所述之電腦資料之隱藏方 法,其中該磁碟機(9 〇 )在格式化時,該控制器心 .(2 0 )可避開該隱藏的區域(9 3 )而使該隱藏的區域 (9 3 )不被格式化。 1 2 ·根據申請專利範圍第7項所述之電腦資料之隱藏方 «法,其中該控制器(2 0 )可以直接設置在該磁碟^ (9 0 )裡面。Page 19 1 • The computer data method described in claim 7 of the patent application, wherein the command of the operation on the staff side can be issued via an external device (8 8 ). ^ 2 Released the 1282923 r---:--------, VI, the application for patents f " ----- The hidden side of the computer data according to item 9 of the patent application scope The external device can be an external magnetic disk, a compact disk, a hard disk drive, a hand flash drive, a thumb disk, a laptop computer, or other external devices. According to the method for hiding computer data according to claim 7, wherein the disk drive (9 〇) is formatted, the controller core (2 0 ) can avoid the hidden area (9 3 ) so that the hidden area (9 3 ) is not formatted. 1 2 · According to the hidden part of the computer data described in item 7 of the patent application scope, the controller (2 0 ) can be directly disposed in the disk ^ (90). 第20頁Page 20
TW94125254A 2005-07-26 2005-07-26 Method and apparatus for shielding and protecting data TWI282923B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW94125254A TWI282923B (en) 2005-07-26 2005-07-26 Method and apparatus for shielding and protecting data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW94125254A TWI282923B (en) 2005-07-26 2005-07-26 Method and apparatus for shielding and protecting data

Publications (2)

Publication Number Publication Date
TW200705194A TW200705194A (en) 2007-02-01
TWI282923B true TWI282923B (en) 2007-06-21

Family

ID=38828955

Family Applications (1)

Application Number Title Priority Date Filing Date
TW94125254A TWI282923B (en) 2005-07-26 2005-07-26 Method and apparatus for shielding and protecting data

Country Status (1)

Country Link
TW (1) TWI282923B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI547805B (en) * 2014-10-22 2016-09-01 鴻海精密工業股份有限公司 Sio device with spi bus gateway controller for write protection

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI547805B (en) * 2014-10-22 2016-09-01 鴻海精密工業股份有限公司 Sio device with spi bus gateway controller for write protection

Also Published As

Publication number Publication date
TW200705194A (en) 2007-02-01

Similar Documents

Publication Publication Date Title
US10289694B1 (en) Method and system for restoring encrypted files from a virtual machine image
EP3091472B1 (en) Storage system having security storage device and management method therefor
JP6785967B2 (en) Methods and systems to block phishing or ransomware attacks
US9842155B2 (en) Systems and methods for file loading
TW201106192A (en) Universal serial bus-hardware firewall (USB-HF) adaptor
TW201202973A (en) Systems, methods, and computer program products for providing high availability metadata about data
CN104166824B (en) The USB memory device of sandwich construction
KR101737794B1 (en) Method for monitoring malwares which encrypt user files
JP2011039720A (en) Log monitoring program and log monitoring system
US7805563B2 (en) Tape drive apparatus
TWI282923B (en) Method and apparatus for shielding and protecting data
KR102281901B1 (en) Apparatus and method for managing data using blockchain
US8886958B2 (en) Systems and methods for digital evidence preservation, privacy, and recovery
JP5359650B2 (en) Data file disguise processing device
WO2007000761A2 (en) Method and apparatus for protecting files from none authorized access
JP2011138514A (en) Method and device for detecting if computer file has been copied, and method and device for enabling the detection
US20100011226A1 (en) Data management method, data management system, and data storage system
JP5310075B2 (en) Log collection system, information processing apparatus, log collection method, and program
KR101544750B1 (en) Apparatus and method for secure cloud system using dummy authentification key
JP6690453B2 (en) Information processing device and program
Kiltz et al. Hidden in Plain Sight-Persistent Alternative Mass Storage Data Streams as a Means for Data Hiding With the Help of UEFI NVRAM and Implications for IT Forensics
EP1130494A2 (en) Distributed cryptography technique for protecting removable data storage media
KR101532250B1 (en) Apparatus and method for protecting log information
JP4899196B2 (en) Data management system, terminal computer, management computer, data management method and program thereof
WO2023119554A1 (en) Control method, information processing device, and control program