TWI326411B - Method for protecting data in a hard disk - Google Patents

Method for protecting data in a hard disk Download PDF

Info

Publication number
TWI326411B
TWI326411B TW95144915A TW95144915A TWI326411B TW I326411 B TWI326411 B TW I326411B TW 95144915 A TW95144915 A TW 95144915A TW 95144915 A TW95144915 A TW 95144915A TW I326411 B TWI326411 B TW I326411B
Authority
TW
Taiwan
Prior art keywords
disk
hard disk
computer
hard
area
Prior art date
Application number
TW95144915A
Other languages
Chinese (zh)
Other versions
TW200825743A (en
Inventor
Ying Chih Lu
Ling Hung Yu
Original Assignee
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Corp filed Critical Inventec Corp
Priority to TW95144915A priority Critical patent/TWI326411B/en
Publication of TW200825743A publication Critical patent/TW200825743A/en
Application granted granted Critical
Publication of TWI326411B publication Critical patent/TWI326411B/en

Links

Landscapes

  • Storage Device Security (AREA)

Description

1326411 . 九、發明說明: 【發明所屬之技術領域】 本發明係有關於電腦,尤指一種電腦利用基本輸出輪 入系統的中斷指令’先讀取硬碟中所設之一保護描述資 料’再根據保護描述資料決定繼續完成啟動作業系統之方 法者。 【先前技術】 按,電腦(如:桌上型電腦、筆記型電腦或伺服機... 專)通常安裝至少一硬碟機(Hard Disk),各硬碟機内皆具 有一主啟動磁區(電腦業界規定都存放於硬碟機的第零磁 柱(cylinder 0)、第零磁頭(Head 0)、第一磁區(Sector 1) ’也就是硬碟機最前面的磁區),主啟動磁區内儲存一 主開機記錄(Master Boot Record,簡稱:MBR )。而主開 機記錄依序包括有指定讀取硬碟機的開機碼區之啟始位 置之一跳躍區(Jump Area)、存放開機碼(Boot Code)之一 開機碼區(MBR Boot Code Area)、儲存各個磁碟分割表之 一磁碟分割表區(Partition Table Area),及作為識別主 啟動磁區的結束之一結束區(其為AA 55以兩個位元組表 示)等部份。當硬碟機被設定為用以啟動一作業系統 (Operation System 的一主硬碟機(Master Hard Disk)時, 則根據主開機記錄的内容,完成啟動作業系統的動作,如 此’電腦即可將資料存放於硬碟機中。 但是電腦失竊的案件層出不窮,對於許多電腦的使用 者來說,電腦被偷所造成的損失,往往不是電腦本身的價 -5- 1326411 ,外裡制麵機密棘人的重㈣料可能已 丄k U公物號之電腦’—旦失竊後,若被有心 人士絲腦硬碟㈣資料敎給辭者,那更是一個大麻 煩。因此,祕業者有齡上述_題,騎發出-種硬 碟機之倾倾綠,—倾硬射㈣料,避免發生 資料外流之情況。1326411 . IX. Description of the invention: [Technical field of the invention] The present invention relates to a computer, in particular to an interrupt instruction of a computer using a basic output wheeled system According to the protection description data, it is decided to continue to complete the method of starting the operating system. [Prior Art] Press, computer (such as: desktop computer, notebook computer or servo machine...) usually installs at least one hard disk machine (Hard Disk), each hard disk machine has a main boot magnetic area ( The computer industry regulations are stored in the hard disk drive's zero cylinder (cylinder 0), the zeroth head (Head 0), the first magnetic zone (Sector 1) 'that is the front of the hard disk drive area, the main start A master boot record (MBR) is stored in the magnetic zone. The main boot record includes a jump area (Jump Area) which is specified to read the boot code area of the hard disk drive, and a MBR Boot Code Area for storing the boot code. A partition partition table (Partition Table Area) of each of the disk partition tables is stored, and a portion of the end region (which is represented by two bytes in the AA 55) as an end of identifying the main boot sector. When the hard disk drive is set to start a working system (Master Hard Disk of the Operation System), the action of starting the operating system is completed according to the content of the main boot record, so that the computer can The data is stored in the hard disk drive. However, the cases of computer theft are endless. For many computer users, the loss caused by the computer is often not the price of the computer itself -5-1326411. The weight of the (four) material may have been 丄 k U public property number of the computer '--after the theft, if the person with the heart of the brain hard disk (four) information to the resignation, it is a big trouble. Therefore, the secret industry is older than the above _ questions , riding out - the kind of hard disk machine tilting green, - dumping hard shot (four) material, to avoid the occurrence of data outflow.

而上述的硬碟機之資料保護方法,係在作㈣統中增 設有-密碼賴程式(如:微軟作㈣統之使用者者密 碼)’使得電腦完成啟動作業系統後,再執行密碼保護程 式,並要求使用者輸人密碼,之後,當密碼保護程式接收 到正確的密碼後,才允許使用者登人作業纽,再利用作 業系統之解編碼程式’對硬碟機内之資料進行資料存取。 當密碼保触式沒接_正叙糾,制者即無法登入 作業系統’亦無法對硬碟_之龍進行資料存取,硬碟 機内之資料因此即得到保護。The above data protection method for the hard disk drive is added to the (four) system to add a password-based program (such as: Microsoft (four) unified user password) to enable the computer to complete the boot operating system, then execute the password protection program And ask the user to enter the password. After the password protection program receives the correct password, the user is allowed to log in to the job, and then the operating system's decoding program is used to access the data in the hard disk drive. . When the password is not touched, the system cannot access the operating system, and the data is not accessible to the hard disk. The data in the hard disk is protected.

惟,當電腦被竊取,域取者直接將硬碟機安裝至另 -電腦時,竊取者只要再使用另一電腦的另一硬碟機,用 以啟動另-作業系統後’即糊復原玉具或骇客工具侵入 被竊取的之硬碟機巾,並對賊取的電腦之硬碟機進 行資料存取。此時,被竊取的電腦之硬碟機等同並無任何 之保護措施,硬碟機之重要資料將被竊取者任意存取,換 言之,目前的硬碟機對於資料的保護並不周延。 【發明内容】 有鑑於硬碟機之資料仍有外洩之虞,發明人經過長久 -6- 1326411 . 背力研究與實驗,終於開發設 機之資料之方法。 之—種保護硬碟 本發明之一目的,係提供一種 _ 法’該方法係電腦在進行自我測試的階段=貧料之方 機已被加人簡描述·, 旦發現硬碟 述資料的較部份嫩爾與保護描 即具有磁碟分割表可供電 ·割區内However, when the computer is stolen, the domain extractor directly installs the hard disk drive to another computer, and the stealer only needs to use another hard disk drive of another computer to start the other operating system. The tool or the hacking tool invades the stolen hard disk towel and accesses the hard disk drive of the computer taken by the thief. At this time, the hard disk drive of the stolen computer is equivalent to no protection measures, and the important information of the hard disk drive will be arbitrarily accessed by the thief. In other words, the current hard disk drive does not have sufficient protection for the data. [Summary of the Invention] In view of the fact that the data of the hard disk drive is still leaking, the inventor finally developed the method of designing the machine after a long period of -6-1326411. One of the objects of the present invention is to provide a method of "computer" in the stage of self-testing of the computer = the device of the poor material has been described briefly, and the data of the hard disk is found. Part of the Nern and protection traces have a disk partition table that can be powered and cut

得電腦能夠完成田4自我戰後,使 碟機谁4 動作業系統之處理,並可對硬 特定部=取二而當電腦之電腦識別喝與保護描述資料的 空,此二=Γ、相符時’硬碟機之磁碟分割區即被清 、^.,,、法棘到任何的磁碟相表,當即結束 自我測成的處理後,不僅使 ° 李統w £不做料衫顧妓成啟動作業 系統之處理,而且也無法對硬顿 到保護硬碟機的資料之目的。 寸躲用以達 =便f審查委員能對本發明之特徵及其功效,做更 ^之認識與瞭解’兹舉實施例配合圖式,詳細說明如 下· 【實施方式】 …本發贿-魏護硬碟機之麵之方法,健用在一 電腦’凊參閱第1圖所示,t電腦在執行基本輸出輸入系 統的自我_糖段’ it制絲减體的初始化後 ’且在 所硬碟介面裝置之初始化程式碼被執行之後將依下列 步驟進行處理: (1〇)呼叫基本輸出輸人系統的中斷指令,以便讀取所 有硬碟機; (11) 判斷是否還有任-個硬碟機尚未被確認過,若 是,進行步驟⑽’否則,進行步驟(15); (12) 讀取其中-個尚未被破認過的㈣機,並判斷硬 碟機内是否具有一保護描述資料4,若是,進行步 驟⑽’否則,進行步驟(11);在本發明之一實 施例中。月參閱第2圖所示,保護描述資料4的 資料結構,係包括有一識別標識區40、一硬碟識 別碼儲存區42、-備份磁碟分割表儲存區44及一 檢查碼(check sum c〇de)儲存區其中識別標 識區40存放的資料,係用以表示在硬碟機中具^ 保護描述資料4之識別訊息。硬碟識別碼儲存區 42係儲存-硬碟識別碼。而硬碟識別碼係與設定 硬碟機需要被賴的電腦之電腦朗碼相同,且 電腦識別碼係可為通用唯一識別碼(㈤败⑽The computer can complete the field 4 self-war, make the disc player who operates the system, and can identify the data of the computer and the computer with the hard specific part = take two, the second = Γ, match When the disk partition of the hard disk drive is cleared, ^.,,, and the method is reversed to any disk phase table, immediately after the completion of the self-measurement process, not only makes Li Tong w £ do not make the shirt The processing of the startup operating system, and the inability to harden the data to protect the hard drive. Insects can be used to determine the characteristics and functions of the present invention, and to understand and understand the 'examples of the implementation of the drawings, detailed description is as follows · [Embodiment] ... this bribe - Wei protection The method of the hard disk machine, the use of a computer in a computer's 凊 第 第 第 第 第 第 , , , , , , 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑After the initialization code of the interface device is executed, it will be processed according to the following steps: (1) Calling the basic output input system interrupt command to read all the hard disk drives; (11) determining whether there is any hard disk The machine has not been confirmed yet, if yes, proceed to step (10) 'Otherwise, proceed to step (15); (12) read one of the (four) machines that have not been identified yet, and determine whether there is a protection description data 4 in the hard disk drive, If so, proceed to step (10) 'Otherwise, proceed to step (11); in an embodiment of the invention. Referring to FIG. 2, the data structure of the protection description material 4 includes an identification mark area 40, a hard disk identification code storage area 42, a backup disk partition table storage area 44, and a check code. 〇de) The storage area in which the identification information stored in the identification area 40 is used to indicate the identification information of the protection description data 4 in the hard disk drive. The hard disk identification code storage area 42 is a storage-hard disk identification code. The hard disk identification code is the same as the computer's computer code that the hard disk drive needs to be trusted, and the computer identification code can be the universal unique identification code ((5) defeat (10)

Unique Identification ,簡稱:UUiD),例如為 系統管理基本輸入輸出系統(SMBIOS ; System Management BIOS)形態 i〇ype i)之通用唯一識 別碼(UUID)娜[之值,換言之,硬賴別碼亦為 通用唯一識別碼。備份磁碟分割表儲存區44係用 以儲存備份磁碟分割表,而備份磁碟分割表的内 容,係與硬碟機被需要被保護時,硬碟機中的主 開機記錄的磁碟分割表區5(如第7或8圖所示) 中存放的所有磁碟分割表的内容相同。檢查碼儲 1326411 區46則儲存保護描述資料4被—檢查程式計算 後所得到的數值; (13=斷保麵料4是否具有與電騎設之一電 月向識別竭相符的部份,若是,進行步驟(14),否 則二進行步驟(16);在該實施例中,判斷保護描 ,貝料4疋否具有與電腦所設之—電腦識別碼相 付的部份之步驟,即是讀取硬碟識別碼儲存區42 ,硬碟識別碼,並判斷硬碟識別碼與電腦識別碼 疋否相同。由於㈣朗碼與電職別碼都是通 唯識別碼,而硬碟識別碼係與設定硬碟機需 要被保護的電腦之電腦識別碼相同,因此,若硬 二機在非&疋硬碟機需要被保護的其他電腦上被 讀取’則其他電腦的電腦識別媽一定與硬碟識別 碼不相同。故,在此一定要檢查保護描述資料4 是否具有與電腦所設之—電腦識別碼相符的部 份,以決定後續要繼續處理步驟; (14)令磁碟分割表區5存有磁碟分割表,再依步驟⑻ 進行處理;在該實施例中’請參閱第3圖所示, 令磁碟分割表區5存有磁碟分割表之步驟為; (140) 判斷綱機記錄内的磁碟分割表區5是否為清 空的狀態’若是’進行步驟(141) ’否則,進 行步驟(142); (141) 將備份磁碟分割表儲存區44的所有備份磁碟 分副表複製到主開機記錄内的磁碟分割表區 1326411 5 ’用以作為各個磁碟分割表,即結束; (142)主開機記錄内的磁碟分割表區5已存在各個磁 碟分割表;此時將磁碟分區5之所有磁碟 分割表複製到備份磁碟分割表儲存區44以便 備份f新之所有磁碟分,並重新依檢查程 式计异並所得觸數值,且將碰_存在檢 查碼儲存區46,即結束。Unique Identification (UUiD), for example, the system management basic input and output system (SMBIOS; System Management BIOS) form i〇ype i) universal unique identification code (UUID) Na [value, in other words, the hard code is also Universal unique identifier. The backup disk partition table storage area 44 is used for storing the backup disk partition table, and the contents of the backup disk partition table are separated from the disk of the main boot record in the hard disk drive when the hard disk drive needs to be protected. The contents of all the disk partition tables stored in Table Area 5 (as shown in Figure 7 or Figure 8) are the same. Check code storage 1326411 area 46 stores the value of the protection description data 4 after the check program is calculated; (13) whether the cut-off fabric 4 has the same part as the electric riding system, if it is, Step (14) is performed, otherwise step (16) is performed; in this embodiment, the step of determining the protection description, whether the material has a portion corresponding to the computer identification code set by the computer, is read. Take the hard disk identification code storage area 42, the hard disk identification code, and judge whether the hard disk identification code is the same as the computer identification code. Since (4) the Lang code and the electric service code are common identification codes, and the hard disk identification code is It is the same as the computer ID of the computer that needs to be protected by the hard disk drive. Therefore, if the hard disk machine is read on other computers that need to be protected by the non-hard disk drive, then the computer identification of the other computer must be The hard disk identification code is different. Therefore, it is necessary to check whether the protection description data 4 has a part corresponding to the computer identification code set by the computer to determine the subsequent processing steps; (14) Make the disk partition table Zone 5 has a disk partition table. According to the step (8), in the embodiment, 'please refer to FIG. 3, the step of storing the disk partition table in the disk partition table area 5; (140) determining the disk partition table in the machine record Whether the area 5 is in the empty state 'if yes' to the step (141) 'other, proceed to step (142); (141) copy all the backup disk sub-tables of the backup disk partition table storage area 44 into the main boot record The disk partition table area 1326411 5 ' is used as the individual disk partition table, that is, the end; (142) the disk partition table area 5 in the master boot record already exists in each disk partition table; at this time, the disk partition 5 All the disk partition tables are copied to the backup disk partition table storage area 44 to back up all the new disk partitions, and the touch value is again calculated according to the check program, and the touch code storage area 46 is End.

例中,電腦需要再確認主開機記錄内的磁 5是否為清空的狀態,其原因是硬碟機 I在别-轉取時,硬碟機的磁碟分割表區5可 月b已被i ’因此,為了以避免電腦無法在磁碟分 割表區5中讀取到任何_碟分·,故在此 驟中需要再確魅_記勒的磁碟分縣區^ 否為清空的狀態; (15)繼續自我測試的處理,然後結束;In the example, the computer needs to confirm whether the magnetic 5 in the main boot record is in the empty state. The reason is that the hard disk drive I is in the other-transfer, the hard disk drive's disk partitioning table area 5 may be b 'Therefore, in order to prevent the computer from being able to read any _ disc points in the disk partition table area 5, it is necessary to re-define the _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ (15) continue the processing of self-test and then end;

⑽令磁碟分絲區5不存在任;^刺分割表,再 依步驟(11)進行處理;在該實施例中,請參閱第4 圖所示,I令磁碟分割表區5不存在磁碟 表之處理方法,包括: (160)判斷主開機記錄内的磁碟分割表區 ㈣狀態’若是’進行步驟⑽,否則= 行步驟(161); (161)將主_記錄_磁碟分區5的所有磁 分割表複製到備份磁碟分割表儲存區44,用以 -10- 1326411 將所有磁碟分割表作為備份磁碟分 ⑽)將主職記__碟分 有 分割表清除,即結束; 所有磁碟 ⑽物咖5已清 割表’即結束。 Φ 的電腦1 時 奴·顺要被保護 二因5内已具有磁碟分 被、、“ b要辆定财_相表是否已 免電腦讀取到磁碟分割表。又,為避 割表不7 25内所有磁碟分割表與備份磁碟分 製到備份磁碟二::::分:表:清除前,複 腦讀取硬碟機之所有磁碟分割表【在5mj中、,電 :割::新:_依檢查程式計算並二:: 驟⑻存區《,才再依步 藉由上述可知,當硬碟機之硬 相同時’硬碟機内的磁碟分割表區5、;合有磁磾= 讀取到•碟恤== 成後’,、可超成啟動作㈣統的 磁碟分割表區5將被清空,如此,硬碟機的 -法完成啟動嶋統之處理,:==電 -11- 1326411 入仵T閱第5圖所示,在硬碟機寫 =保晶述貝料4 ’用以將硬碟機設定為被保護、取消保 護的步驟,請參閱第5、6圖所示,係包括: ” 單’硬碟選單係包括所有安裳在電 碟,讀使用者選擇其中-個硬碟機, 進行後續的處理步驟; ” (21) 當使用者選擇其—硬碟機後,即輪出(10) The disk separation area 5 does not exist; the thorn partition table is processed according to the step (11); in this embodiment, as shown in Fig. 4, I makes the disk division table area 5 not exist. The processing method of the disk table includes: (160) judging the disk partition table area in the main boot record (4) state 'if yes' performing step (10), otherwise = line step (161); (161) placing the main_record_disk All the magnetic partition tables of the partition 5 are copied to the backup disk partition table storage area 44, for the -10- 1326411 to use all the disk partition tables as the backup disk partition (10), and the main job __distribution partition table is cleared. That is to say; all the disks (10) of the coffee beans 5 have been cleared. Φ computer 1 when slaves are to be protected 2 because 5 has a disk partition, "b wants to save money _ phase table has been free from the computer to read the disk partition table. Also, for the avoidance table Not all the disk partition table and backup disk in 7 to 25 backup to the backup disk 2:::: points: Table: before clearing, the complex brain reads all the disk partition table of the hard disk machine [in 5mj, Electricity: cut:: new: _ according to the check program calculation and two:: (8) save area ", only then by the above, when the hard drive is the same hard" disk drive table area 5 , with the magnetic 磾 = read to / disc = = after the ',, can be super-starting (four) unified disk partition table area 5 will be emptied, so, the hard disk machine - method to complete the boot system The processing, :==Electronic -11- 1326411 into the 仵T read Figure 5, on the hard drive write = Baojing Shubei 4 ' to set the hard drive to be protected, unprotected steps, Please refer to the figures 5 and 6, which include: ” The single-hard disk menu includes all the fans on the disc, and the reader selects one of the hard drives for subsequent processing steps; ” (21) user Optional which - after hard drive, i.e., the wheel

選、硬碟保護選單包括一啟動保護硬碟 一取消保護硬碟選項; 、 (22) :是硬碟選項或取消倾硬碟選項被 呆護硬碟選項被選擇,進行步驟 彳卩絲取_護_選顿選擇, 進行步驟(30) ; ^ (23) 當啟祕護硬碟選項_擇,_斷硬 已具有傾描述簡4,若是進行步驟⑽The option, hard disk protection menu includes a boot protection hard disk - unprotect hard disk option; , (22): is a hard disk option or cancel the hard disk option is selected to protect the hard disk option, take the steps to take _ _ _ selection, step (30); ^ (23) When the secret hard disk option _ choice, _ break hard has a description of the simple 4, if the step (10)

則,進行賴29),在本翻中,_硬碟機是 否已具有保護描述資料4之方法,係判斷是否读 取到識別標識區40所存放的資料; 项 (24) 判斷硬碟識別碼與電腦識網是否相同 行步驟(25),否則,進行步驟(28); 疋 (25) 將主開機記錄的磁碟分割表區5 _有的磁 割表複製到備份磁碟分儲存區4 : 份磁碟分割表; 馬備 (26) 將主開機記錄_碟分割表區5崎有的磁碟分 -12 ς 割表清空; (27) 根據識別標識區40、硬碟識別碼儲存區42、備份 磁碟分割表儲存區44的内容4新依檢查程式計 算’並得到新數值’且將她值儲縣檢查碼儲 存區46中作為檢查碼,即結束; (28) 離開啟動保護硬碟的處理,即結束; (29) 建立保護描述資料4於硬碟中,再依照步驟⑽ 繼續進行處理; (30) 當取雜護硬項被選擇,糊斷硬碟機是否 已具有保護描述資料4,若是進行步驟⑼,否 則’即結束,在此-步驟中,判斷硬碟機是否已 被保護之方法’亦為判斷判斷是否讀取到識別標 識區40所存放的資料; (31) ^斷硬碟識別碼與目前執行開機碼的電腦之電腦 =碼是同,若是進行步職),否則,即 ⑽將備細碟相雜麵4 卿_5,^= 表區5内所有的磁碟分割表; ^3)將保護描述資料4刪除,即結束。 並未雜縣縣鋪時,謂機記錄 資料4 ’直接繼一’主開機記錄並未建立保護描述 統之處理,而當硬碟啟動保 啟動作業系 y、、主開機δ己錄已建立保護 -13- 1326411 . 描述資料4,故,透過硬碟機讀取到保護描述資料4,即 表示硬碟機被保護,且透過判斷硬碟識別碼是否與電腦識 別碼相同,藉關斷目前讀取補之電腦衫為設定硬碟 識別碼的電腦,若是’即表示硬碟並未被竊取或被安裳到 S他電腦上讀取,帛以制保護硬碟_#料之目的。 - 在該實施例中,保護描述資料4係存放在硬碟的主啟 動磁區6的主開機記錄的跳躍區2與磁碟分割表區5間未 % 被使用的儲存空間内(如第7圖所示〕,即在儲存開機石馬 (boot code)關機碼儲存區3 ’ 電腦搜尋主職記錄的 跳躍區2與_分酿區5間未被制的空_,是否具 . 麵觀息,藉以騎硬碟機内是否具有-保護描述_ 4。另,由於硬碟識別碼儲存區犯、備份磁碟分割表儲存 ,44及檢查碼儲存區46的儲存容量是固定的大小,故, 當電腦讀取到識別訊息後,即可由識別訊息計算出,硬碟 酬德42、備份_分割_能44及檢查顯 馨存區46在主啟動磁區的啟始位址,使得電腦可依硬碟識 別碼儲存區42、備份磁碟分割表儲存區44及檢查碼儲存 區46在主啟動磁區的啟始位址,讀取到硬碟識別碼、各 個備份磁碟分割表及檢查碼的數值。 由於,硬碟的主啟動磁區6的開機碼儲存區3,可能 不足用來儲存保護描述資料4,故,在本發明之另—實= 例令,電腦係在硬碟的磁碟分割表區5其中一個空間磁區 7寫入保護描述資料4,及將磁碟分·區5的其中 間置的磁碟分割表標示成特殊類型,並在閒置的磁碟分割Then, proceed to Lai 29), in this flip, whether the hard disk drive has the method of protecting the description material 4, it is judged whether the data stored in the identification mark area 40 is read; Item (24) Judging the hard disk identification code Whether it is the same as the computer network (25), otherwise, proceed to step (28); 疋 (25) Copy the disk partition table area of the main boot record 5 _ some magnetic cut table to the backup disk storage area 4 : Disk partition table; Ma Bei (26) will be the main boot record _ disc split table area 5 Sakizaki disk sub--12 ς cut table empty; (27) According to identification mark area 40, hard disk identification code storage area 42. The content of the backup disk partition table storage area 44 is newly calculated by the check program and the new value is obtained, and the value of the check value storage area 46 is used as the check code, that is, the end is completed; (28) leaving the boot protection hard The processing of the disc is finished; (29) The protection description data 4 is created on the hard disk, and then the processing is continued according to the step (10); (30) When the hard hardware item is selected, whether the hard disk drive has the protection description Data 4, if it is step (9), otherwise 'that is the end, in this - step, judge hard The method of whether the disc player has been protected is also judged whether or not the data stored in the identification mark area 40 is read; (31) The hard disk identification code is the same as the computer=code of the computer currently executing the boot code, if Carry out the step), otherwise, (10) will prepare the discs of the discs 4 qing _5, ^ = all the disc partition tables in the table area 5; ^3) delete the protection description material 4, that is, the end. When there is no miscellaneous county county shop, the machine records data 4 'directly following the first master boot record does not establish the protection description system, and when the hard disk starts to protect the startup operation system y, the main boot δ has recorded the protection has been established -13- 1326411 . Describes the data 4, so the protection description data 4 is read through the hard disk drive, which means that the hard disk drive is protected, and by determining whether the hard disk identification code is the same as the computer identification code, the current read is turned off. The computer shirt to be supplemented is a computer with a hard disk identification code. If it means 'the hard disk has not been stolen or read on the computer, it is used to protect the hard disk. - In this embodiment, the protection description material 4 is stored in the storage space of the jump area 2 of the main boot record 6 of the hard disk and the disk partition table area 5 which is not used (for example, the seventh As shown in the figure, it is stored in the boot code shutdown code storage area 3 ' computer search for the main record of the jump zone 2 and _ split zone 5 unprocessed empty _, whether it has. , in order to ride the hard disk drive has a - protection description _ 4. In addition, due to the hard disk identification code storage area, backup disk partition table storage, 44 and check code storage area 46 storage capacity is a fixed size, so, when After the computer reads the identification message, it can be calculated by the identification message, the hard disk reward 42, the backup_segment_ can 44 and the inspection start address 46 in the starting space of the main boot area, so that the computer can be hard The disc identification code storage area 42, the backup disk partition table storage area 44 and the check code storage area 46 are at the starting address of the main boot magnetic area, and the hard disk identification code, each backup disk partition table and the check code are read. Since the boot code of the main boot area 6 of the hard disk is 3, it may not be It is used to store the protection description data 4, so in the other embodiment of the present invention, the computer is in the disk division table area 5 of the hard disk, one of the spatial magnetic regions 7 is written with the protection description material 4, and the magnetic The disk partition table in the middle of the disc division/area 5 is marked as a special type and is divided in an idle disk.

-14- S 1326411-14- S 1326411

㈣馬八2_磁區的啟始位置(如第δ圖所示),故 電腦透過麟麵_碟分割麵5,衫具有標示成 殊類型的間置的磁碟分割表,藉以判斷硬射是否具= 護描述貧料4,進而再從職的磁碟分職内巾取得 描述資料4在空_的啟始位置,即可讀取到識別訊 息。另,由於硬碟識別碼儲存區42、備份磁碟分割表儲 區44及檢查碼儲存區46的儲存容量是固定的大小,故, 當電腦讀取到識別訊息後,即可由識職息計算出,硬 識別碼儲輕42、齡磁碟賴讀存區&及檢查碼儲 存區46在主啟動磁區的啟始位址,使得電腦可依硬碟識 別碼儲存區42、備份_分割表儲存區44及檢查瑪儲存 區46在空閒的磁區的啟始位址,讀取到硬碟識別碼 個備份磁碟分割表及檢查碼的數值。 按’以上所述,僅為本發明較佳之具體實施例,惟本 發明之特徵並不侷限於此’任何熟悉該項技藝者在本發明 領域内,可㈣思及之變化或修叙解物,皆可涵^ 以下本案之專利範圍。 【圖式簡單說明】 第1圖係本發明之動作流程圖; 第2圖係保護描述資料的資料結構圖; 第3圖係本發明之電腦令磁碟分縣區存有磁碟分割 表之動作流程圖; ° 第4圖係本發明之令電齡鋪分縣區不存在磁碟 分割表之動作流程圖; -15- s 第5圖係本發明之電腦在硬碟機寫人保護描述資料, 用以將硬碟機設定為被保護之動作流程圖; 第6圖係本發明之電腦將硬碟機設定為取消保 作流程圖; 第7 ®縣發明之—實_之保護描職料存放在主 啟動磁區的示意圖;及 、第8圖係本發明之另—實施例之倾描述資料存放閒(4) The starting position of the Ma 8 2_ magnetic area (as shown in the δ diagram), so the computer passes through the lining _ disc dividing surface 5, and the shirt has a disk partitioning table marked as a special type to judge the hard shot. Whether or not there is a description of the poor material 4, and then the descriptive information of the internal disk of the employee is obtained. The identification information is read at the start position of the empty space, and the identification message can be read. In addition, since the storage capacity of the hard disk identification code storage area 42, the backup disk partition table storage area 44, and the check code storage area 46 is a fixed size, when the computer reads the identification message, it can be calculated by the job information. The hard identification code storage light 42, the age disk storage area & and the check code storage area 46 are at the starting address of the main boot magnetic area, so that the computer can be based on the hard disk identification code storage area 42, and the backup_segment The table storage area 44 and the check mark storage area 46 read the hard disk identification code backup disk partition table and the value of the check code at the start address of the free magnetic area. The above description is only a preferred embodiment of the present invention, but the features of the present invention are not limited thereto. Any one skilled in the art may, within the field of the present invention, may (4) think about changes or modifications. , can be han ^ the following patent scope of the case. BRIEF DESCRIPTION OF THE DRAWINGS Fig. 1 is a flow chart of the operation of the present invention; Fig. 2 is a data structure diagram for protecting the description data; and Fig. 3 is a computer for the disk of the present invention. Action flow chart; ° Figure 4 is a flow chart of the operation of the present invention in the absence of a disk partition table in the county-age area; -15- s Figure 5 is a description of the computer protection of the computer of the present invention on a hard disk drive The data is used to set the hard disk drive as a protected action flow chart; the sixth figure is the computer of the present invention, the hard disk drive is set as the cancellation guarantee flow chart; the 7th county invention - the actual protection protection material A schematic diagram of the storage in the main starting magnetic zone; and, FIG. 8 is a separate embodiment of the present invention.

護之動Protection

f磁區及標示祕殊__置_碟分縣的示意圖。 【主要元件符號說明】 M 跳躍區................... 保護描述資料.........4 硬碟識別碼儲存區...42 檢查碼儲存區.........46 主啟動磁區............g 開機碼儲存區...............β 識別標識區.................. 備份磁碟分割表儲存區..·44 磁碟分割表區...............5 空閒磁區............... 7 # "16 -f magnetic zone and marking secrets __ set_distribution of the county. [Main component symbol description] M Jump zone........................ Protection description data.........4 Hard disk identification code storage area... 42 Check code storage area.........46 Main boot magnetic area............g Power-on code storage area.............. .β identification area.................. Backup disk partition table storage area..·44 Disk partition table area........... ....5 Idle magnetic zone.................. 7 # "16 -

Claims (1)

1326411 冷疹正替換頁 十、申請專利範圍: ㈣L、Γ種保護硬碟機之資料之方法,係翻在一電腦, 田吞〆病執仃-基本輸出輸入系統的自我測 =的初触後,且錢有觸介喊置之她化程式碼 被執行之後,將依下列步驟進行處理·· 有硬^該基本輸出輸入系統的一中斷指令,用以讀取所 判,是否還有任—個硬碟機尚未御認過的; 當《有硬碟機的未被續認過,則讀取其中一個尚未被 :認過的硬韻,朗斷硬韻内是否具有—賴描述資 +該保4描述㈣輸错構,係包括—識別標示區、 -硬碟識綱蹄區、_磁碟分縣辦區及一檢查 碼儲存區,其中該識別標識區,係用以儲存表示在硬碟中 具有^描述麟之-朗訊息,該硬顧觸儲存區, _存一硬碟識別碼’該硬碟識別與設定硬碟機需要 ^僻蔓的電腦之電腦酬碼_,該備份磁碟分割表儲存 =係用以儲存備份磁碟分割表,而該備份磁碟分割表的 ::磁:=機被需要被保護時’硬碟機中的主開機記 长的碟以表區中存放的磁碟分的内容相同,而該 檢查碼儲存區,係儲存該保護描述資料被 後所得到的數值; 一τ式-t# 伴資料,則再判斷 的負料疋否具有與電腦所設之—電腦識別碼相符 -17- 1326411 ¢1料月^日修正替換頁 當判斷出保翻述資料具有與電騎設之—電腦識 別碼相符的部份’則令磁碟分割表區存有磁碟分割表;及 反覆判斷是否還有任—個硬韻的尚未被確認過的 步驟直所有硬碟機都被確認過後,繼續自我測試的處 理,然後結束。 2、如請求項1所述之方法,其令電腦令磁碟分割表 區存有磁碟分割表之步驟為; “判斷該主職記錄㈣㈣分駐區是否為清空的 狀態,及 當判斷出社_記_的_分難區為清空的 =時’將該備份磁碟分割表儲存區的所有備份磁碟分割 到社開機記錄内的磁碟分割表區,用以作為磁碟 分割表。 说Hi求項2所述之方法’其中當判斷出該主開機 :内的磁碟分割表區不為清空的狀態時,表示該主開機 ::磁碟分割表區已存在磁碟分割表,可供電腦進行 磾分割表區之所有磁碟分割表複製到備份磁 碟刀J表雜α便備份最新之所有_分難 依檢查程式計算並所得刭斩I ° 、’重新 碼館存區。 ’,且將新餘儲存在檢查 4、如請求項丨所述之 保講指Μ資七L m 八中電腦在硬碟機寫入 ::描述貝科’用以將硬碟機 : 步驟,係包括: 7^卞"又、取冶保濩的 -18. 1326411 ----—___ I、' - >口修正替换頁I 内的群縣撕衫裝在電腦 更系赌使用者選擇其中—個硬碟機; 單,^擇其—硬销後,即輸出—硬碟保護選 早該硬碟保護選單包括—啟 護硬碟選項; 觀-取— 被選=斷妓⑽賴硬铜項絲料賴硬碟選項 菖該啟動保護硬碟選項被選胃 具有保護描述資料;、被⑼則麟硬碟機是否已 當崎出該硬碟機已具有保護描述資料,則再 硬禪識別碼與電腦識別碼是否相同; 、 δχ 當判斷出硬碟識別销電腦識 記錄的磁碟分區内的所有磁碟分"^ 碟分割表儲存區内作為備份磁碟分割表;表後衣到備伤磁 表清^該Γ機記錄的磁碟分割表區内的所有磁碟分割 重新依檢麵式計算麵得_數值,且將新數值儲 存在硬碟機巾之檢鹤齡㉞便料檢查碼。 5、如請求項4所叙枝,其 別碼,_相同,則離開啟動保護I: 未呈^f項4所述之方法,其中當判斷出該硬碟機 ㈣有保』迷資料’則在硬碟中建立保護描述資料,再 記錄的磁碟分割表區内的所有磁碟分割表 U備㈣碟分割表儲存區内作為備份磁碟分割表的 19- 〜〇4.1i <1年,月以曰修正替換頁 步驟繼續進行處理。 田判斷出5亥硬碟機已具有保護插述資料,判斷該硬碟 識別碼與目前執行開機瑪的電默電腦識別碼是否相同;、 田判斷出該硬碟識別碼與目前執行職碼的電腦之1326411 Cold rash is being replaced on page 10, the scope of application for patents: (4) L, the method of protecting the data of the hard disk drive, is turned over in a computer, the disease of the Swallow disease - the self-test of the basic output input system = after the initial touch After the money has been touched and the code is executed, it will be processed according to the following steps. · There is an interrupt instruction of the basic output input system, which is used to read the judgment and whether there is any responsibility. A hard disk drive has not been recognized; when "the hard disk drive has not been renewed, read one of the hard rhymes that have not been recognized: whether it has a hard rhyme or not - the description + Protection 4 describes (4) the wrong structure, including: identification area, - hard disk identification area, _ disk division county area and a check code storage area, wherein the identification area is used to store the representation The disc has a description of the Lin-Lang message, the hard-touch storage area, _ a hard disk identification code 'the hard disk identification and setting the hard disk machine requires a computer _ _ _ _, the backup magnetic Disc partition table storage = is used to store the backup disk partition table, and the backup disk partition Table::Magnetic:=When the machine needs to be protected, the disk of the main boot disk in the hard disk drive has the same content of the disk disk stored in the table area, and the check code storage area stores the protection description. The value obtained after the data is obtained; a τ-t# accompanied by the data, then the negative material is judged to be compatible with the computer-defined computer identification code -17- 1326411 ¢1 material month ^ day correction replacement page when It is judged that the part of the warranty data that has the computer identification code is the same as the computer identification code, so that the disk partition table is stored in the disk partition table; and it is repeatedly determined whether or not there is any hard rhyme that has not yet been confirmed. After the steps are confirmed, all the hard disk drives are confirmed, and the self-test process is continued, and then the process ends. 2. The method of claim 1, wherein the step of causing the computer to store the disk partition table in the disk partition table area is: "determining whether the master record (4) (4) is in a state of being emptied, and when judging the community _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ The method of claim 2, wherein when it is determined that the disk partitioning table area in the main booting state is not in the empty state, it indicates that the main booting: the disk partitioning table area already has a disk partitioning table, All the disk partition tables for the computer to split the table area are copied to the backup disk cutter J. The alpha is backed up by all the latest _ points and difficult to check the program calculation and obtained 刭斩I ° , 're-code library storage area.' And store the new balance in the inspection 4, as stated in the request item 保 Μ 七 L L L L 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑: 7^卞"And, take the yoke of -18. 1326411 -----___ I, ' - ≫ mouth correction replacement page I within the group of tearing shirt installed in the computer more gambling users choose which one - a hard disk machine; single, ^ select it - hard sales, that is, output - hard disk protection selected early this hard disk The protection menu includes - the protection of the hard disk option; the view - take - is selected = broken (10) depends on the hard copper item silk material on the hard disk option 菖 the boot protection hard disk option is selected to have a protective description of the stomach; Whether the hard disk drive has already had the protection description information on the hard disk drive, and then whether the hard zen identification code and the computer identification code are the same; δ χ when judging all the contents of the disk partition of the hard disk identification pin computer The disk partition "^ disc partition table storage area as a backup disk partition table; table back to the record of the magnetic record clear ^ all the disk partitions in the disk partition table of the machine record re-examine the face Calculate the _ value, and store the new value in the hard disk towel inspection crane age 34 check material. 5. As stated in item 4, the other code, _ the same, leave the start protection I: The method of item 4, wherein when the hard disk player (four) is determined to be protected [Materials] then create a protection description data on the hard disk, and then record all the disk partition table in the disk partition table area. (4) Disc partition table storage area as a backup disk partition table 19-~〇4.1i < 1 year, the month is replaced by the 曰 correction replacement page step. The field judges that the 5 hp hard disk drive has protection insertion data, and judges whether the hard disk identification code is the same as the current silent computer identification code of the currently executed power; , Tian judged the hard disk identification code and the computer that currently performs the job code. 電腦識別碼朗,所有備份剌分難複製回磁碟分 副表區,及 將保護描述資料删除。 8、如請求項7所述之方法,其中當判斷出該硬碟機 -有該碰描•料,且當判斷出該硬碟識別韻目前執 行開機碼的電腦之電腦識別碼不相同,則離開取消保護硬 碟的處理。The computer identification code is long, and all backup files are difficult to copy back to the disk sub-table area, and the protection description data is deleted. 8. The method of claim 7, wherein when it is determined that the hard disk drive has the touch data, and when it is determined that the computer identification code of the computer that currently performs the boot code is not the same, Leave the process of unprotecting the hard drive. 選項述之找,其+ #則保護硬碟 、項被k擇後,其處理步驟,包括: 判斷該硬碟機是否已具有保護描述資料; 3、如縣項7所述之方法,其中當判斷出該硬碟機 未具有該織描料,則_取_護硬碟的處理。 10、如請求項丨所述之方法,射雜翻述資料係 存放在該主職記錄關機職與磁碟分縣區間未被 使用的空間内。 門爐11如。月求項10所述之方法,其中該電腦搜尋該主 ,機記錄的跳輒與猶分割麵間未被錢的空間内 2具有該識觀息,#關_硬碟機岐否具有該保 邊描述資料。 12、如請求項U所述之麵,財該硬魏別碼儲 -20. 1326411 • 厂 ·, --- ‘ ----- 月W日修正替换頁 存區、備份磁碟分割表儲存區及檢查碼儲存區的儲存容量 是固,的大小,當電腦讀取到識別訊息後,即可由識別訊 息計算出,硬碟識別媽儲存區、備份磁碟分割表館存區及 檢查碼健械在主雌碰麟始恤,使得電腦可依硬 碟識別碼儲存區、備份磁碟分割表儲存區及檢查碼儲存區 在主啟動磁區的啟始位址,讀取到硬碟識別碼、各個備份 磁碟分割表及檢查碼的數值。 如請求項1所述之方法 idThe options are described, the + # is to protect the hard disk, after the item is selected, the processing steps thereof include: determining whether the hard disk drive has the protection description data; 3. The method according to the item 7, wherein If it is determined that the hard disk drive does not have the woven material, then the processing of the hard disk is taken. 10. In the method described in the claim item, the data of the miscellaneous data is stored in the space where the main job record is off and the disk is not used. Door furnace 11 such as. The method of claim 10, wherein the computer searches for the main machine, and the space between the flea and the judging face that is not in the money has the knowledge, #关_硬盘机岐有保保Describe the information. 12. As stated in the request item U, the financial Weiwei code store -20. 1326411 • Factory·, --- ' ----- month W day correction replacement page storage area, backup disk partition table storage The storage capacity of the area and check code storage area is solid. The size of the storage area can be calculated by the identification message when the computer reads the identification message. The hard disk identifies the mother storage area, the backup disk partition table storage area and the check code. The machine is in the main female collar, so that the computer can read the hard disk identification code according to the hard disk identification code storage area, the backup disk partition table storage area and the check code storage area at the starting address of the main boot magnetic area. , the value of each backup disk partition table and check code. Method id as described in claim 1 — ------具肀電腦係在硬碟的磁 碟分割表區其中—個空閒的磁區寫人保護描述資料,及將 * =77 J表d的其中—侧置的鄕分縣標示成特殊 献,並在閒置的磁碟分割表内寫人空閒的磁區的啟始位 置。 14 硬碟二=區 電腦透過搜尋 磁碟Γ彳表’似觸硬碟巾衫具有賴觀資料,進 2再仗閒置的磁碟分縣財取縣護描述資料在空閒 的磁區的啟始位置,即可讀取到識別訊息。 別後14所述之方法,其中#電腦讀取到識 另J訊,後’即可由識別却自々 =:表儲存二儲^^的 腦可依硬碟識別碼儲存區、備份磁碟分 取瑪儲存區在空閒的磁區的啟始位址,讀 …一=、各個#份磁碟分割表及檢查碼的數值。 、一種保護硬碟機之資料之方法,係應用在-電 • 21 - 腦,當該電腦執行-基本輸出輸入系统的自我測試並完成 記憶體的初靴後,且在所有硬碟介面裝置之初始化程式 碼被執行之後,將依下列步驟進行處理: 呼叫該基本輸出輸帽指令,用以讀取所 有硬碟機; =斷是否還有任—個硬_尚綠確認過的; ▲當還有硬碟機的未被確認過,則讀取其中一個尚未被 確〜過的硬顿’並躺硬销岐否具有-賴描述資 料,該保護描师料㈣聽構,係包括―備份磁碟分割 表儲存區; ▲當判斷出該硬碟機内具有該保護描述資料,則再判 保護描述資料是否具有與電腦所設之一電 的部份; 田判斷出保護描述資料具有與電腦所設之一電腦 ,瑪相相。卩份’則令磁碟分絲區存有鄕分割表, 、、主^斷更碟機中的主開機記錄内的磁碟分割表區是否 &空的狀態; 备判斷出主開機記錄内的磁碟分割表區不 狀悲時,將 ^肘孩主開機記錄内的磁碟分割表區的所有磁碟: 作割表_區’用以將磁碟分割; 今備份磁碟分割表; 表清:該主開機記錄内的磁碟分割表區的所有磁碟分! f *及 反覆判斷是否還有任—個硬碟機的尚未被確認過含 13264.11 作f月7½修正替換頁 步驟,直到所有硬碟機都被確認過後,繼續自我測試的處 理,然後結束。 17、如請求項16所述之方法,其中當判斷出該主開 機記錄内的磁碟分割表區為清空的狀態時,表示該主開機 記錄内的磁碟分割表區已清空磁碟分割表,已無法對硬碟 進行存取。 -23-— ------The computer is in the disk partition table area of the hard disk. Among them, the free magnetic zone writes the protection description data, and the *=77 J table d Marked as a special offer, and writes the starting position of the free magnetic zone in the idle disk partition table. 14 hard disk two = area computer through the search disk ' table 'like a hard disk towel with a view of the data, into the 2 and then idle disk, the county to take care of the county description data in the beginning of the free magnetic area Position, you can read the identification message. In addition to the method described in the following 14, wherein #电脑 reads to identify another J message, after the 'received but self-reported =: table to store the second storage ^ ^ brain can be based on the hard disk identification code storage area, backup disk Take the Ma storage area at the starting address of the free magnetic area, read the value of one =, each #Disk partition table and check code. A method of protecting the information of the hard disk drive is applied to the -Electronic 21 - brain, when the computer performs - the self-test of the basic output input system and completes the initial boots of the memory, and in all the hard disk interface devices After the initialization code is executed, it will be processed according to the following steps: Call the basic output and output cap command to read all the hard disk drives; = whether there is any hard-- still green-confirmed; If there is a hard disk drive that has not been confirmed, then read one of the hard drives that have not been confirmed to be 'hardened' and lay down the hard drive. If there is a description data, the protection profile material (4) is composed of the backup magnetic碟 partition table storage area; ▲When it is judged that the hard disk drive has the protection description data, it is determined whether the protection description data has a part that is electrically connected with the computer; the field determines that the protection description data has a computer-defined setting One computer, Ma Xiangxiang.卩 则 则 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁 磁When the disk partition table area is not sad, all the disks in the disk partition table area in the boot record of the elbow child are: the cut table_zone' is used to divide the disk; the backup disk partition table is now; Table clear: All the disk partitions in the disk partition table area in the main boot record! f * and repeatedly determine if there is any - hard drive that has not been confirmed to include 13264.11 for the f month 71⁄2 correction replacement page step, until all hard drives have been confirmed, continue the self-test process, and then end. The method of claim 16, wherein when it is determined that the disk partition table area in the main boot record is in an empty state, it indicates that the disk partition table area in the master boot record has been cleared of the disk partition table. , the hard drive is no longer accessible. -twenty three-
TW95144915A 2006-12-04 2006-12-04 Method for protecting data in a hard disk TWI326411B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW95144915A TWI326411B (en) 2006-12-04 2006-12-04 Method for protecting data in a hard disk

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW95144915A TWI326411B (en) 2006-12-04 2006-12-04 Method for protecting data in a hard disk

Publications (2)

Publication Number Publication Date
TW200825743A TW200825743A (en) 2008-06-16
TWI326411B true TWI326411B (en) 2010-06-21

Family

ID=44772083

Family Applications (1)

Application Number Title Priority Date Filing Date
TW95144915A TWI326411B (en) 2006-12-04 2006-12-04 Method for protecting data in a hard disk

Country Status (1)

Country Link
TW (1) TWI326411B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI457754B (en) * 2010-06-04 2014-10-21 Hon Hai Prec Ind Co Ltd Application server and method for copying a hard disk drive
CN108733479B (en) 2017-04-24 2021-11-02 上海宝存信息科技有限公司 Method for unloading solid state hard disk card and device using same

Also Published As

Publication number Publication date
TW200825743A (en) 2008-06-16

Similar Documents

Publication Publication Date Title
TWI291629B (en) Method, system, and computer readable storage medium storing instructions for switching folder to be accessed based on confidential mode
JP2004038931A (en) Method for implementing backup and recovery of data in computer hard disk
JP2007012032A (en) Usb-compliant personal key
TW200905546A (en) Harddisk security method
CN110622163A (en) Auxiliary storage device with independent recovery area and equipment suitable for auxiliary storage device
CN101021793B (en) Method and system for realizing Pre-OS Application utilizing extended BIOS technique
TW201915753A (en) Data storage apparatus
TW201020849A (en) Storage device, information processing apparatus and program
TWI326411B (en) Method for protecting data in a hard disk
TWI331748B (en) Method for protecting data in a hard disk
JP3652969B2 (en) Recording medium recording unused license detection method, unused license detection method, and unused license detection program
JP4197227B2 (en) Expansion external storage system
TWI274996B (en) Method for protecting data stored in a hard disk
JP2008077413A (en) Thin client, thin client system, and program
JP2002041292A (en) Computer recovery device
Image User's Guide
JP4968634B1 (en) Computer system
JP7093012B2 (en) Disk device equipment, information processing system, and restoration program
TWI297436B (en)
JP2005071314A (en) Software protection system by usb connection storage device or the like
JP2005535003A (en) A computer system capable of supporting multiple independent computing environments
JP5753457B2 (en) Memory system, security memory, and information protection method
TWI334100B (en) Computer system and control method
JP2005332042A (en) Apparatus for restoring deleted data, and apparatus for restoring deleted data as well as for copying data
JP5718746B2 (en) Memory system, security memory, and information protection method

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees