TWI326411B - Method for protecting data in a hard disk - Google Patents
Method for protecting data in a hard disk Download PDFInfo
- Publication number
- TWI326411B TWI326411B TW95144915A TW95144915A TWI326411B TW I326411 B TWI326411 B TW I326411B TW 95144915 A TW95144915 A TW 95144915A TW 95144915 A TW95144915 A TW 95144915A TW I326411 B TWI326411 B TW I326411B
- Authority
- TW
- Taiwan
- Prior art keywords
- disk
- hard disk
- computer
- hard
- area
- Prior art date
Links
Landscapes
- Storage Device Security (AREA)
Description
1326411 . 九、發明說明: 【發明所屬之技術領域】 本發明係有關於電腦,尤指一種電腦利用基本輸出輪 入系統的中斷指令’先讀取硬碟中所設之一保護描述資 料’再根據保護描述資料決定繼續完成啟動作業系統之方 法者。 【先前技術】 按,電腦(如:桌上型電腦、筆記型電腦或伺服機... 專)通常安裝至少一硬碟機(Hard Disk),各硬碟機内皆具 有一主啟動磁區(電腦業界規定都存放於硬碟機的第零磁 柱(cylinder 0)、第零磁頭(Head 0)、第一磁區(Sector 1) ’也就是硬碟機最前面的磁區),主啟動磁區内儲存一 主開機記錄(Master Boot Record,簡稱:MBR )。而主開 機記錄依序包括有指定讀取硬碟機的開機碼區之啟始位 置之一跳躍區(Jump Area)、存放開機碼(Boot Code)之一 開機碼區(MBR Boot Code Area)、儲存各個磁碟分割表之 一磁碟分割表區(Partition Table Area),及作為識別主 啟動磁區的結束之一結束區(其為AA 55以兩個位元組表 示)等部份。當硬碟機被設定為用以啟動一作業系統 (Operation System 的一主硬碟機(Master Hard Disk)時, 則根據主開機記錄的内容,完成啟動作業系統的動作,如 此’電腦即可將資料存放於硬碟機中。 但是電腦失竊的案件層出不窮,對於許多電腦的使用 者來說,電腦被偷所造成的損失,往往不是電腦本身的價 -5- 1326411 ,外裡制麵機密棘人的重㈣料可能已 丄k U公物號之電腦’—旦失竊後,若被有心 人士絲腦硬碟㈣資料敎給辭者,那更是一個大麻 煩。因此,祕業者有齡上述_題,騎發出-種硬 碟機之倾倾綠,—倾硬射㈣料,避免發生 資料外流之情況。1326411 . IX. Description of the invention: [Technical field of the invention] The present invention relates to a computer, in particular to an interrupt instruction of a computer using a basic output wheeled system According to the protection description data, it is decided to continue to complete the method of starting the operating system. [Prior Art] Press, computer (such as: desktop computer, notebook computer or servo machine...) usually installs at least one hard disk machine (Hard Disk), each hard disk machine has a main boot magnetic area ( The computer industry regulations are stored in the hard disk drive's zero cylinder (cylinder 0), the zeroth head (Head 0), the first magnetic zone (Sector 1) 'that is the front of the hard disk drive area, the main start A master boot record (MBR) is stored in the magnetic zone. The main boot record includes a jump area (Jump Area) which is specified to read the boot code area of the hard disk drive, and a MBR Boot Code Area for storing the boot code. A partition partition table (Partition Table Area) of each of the disk partition tables is stored, and a portion of the end region (which is represented by two bytes in the AA 55) as an end of identifying the main boot sector. When the hard disk drive is set to start a working system (Master Hard Disk of the Operation System), the action of starting the operating system is completed according to the content of the main boot record, so that the computer can The data is stored in the hard disk drive. However, the cases of computer theft are endless. For many computer users, the loss caused by the computer is often not the price of the computer itself -5-1326411. The weight of the (four) material may have been 丄 k U public property number of the computer '--after the theft, if the person with the heart of the brain hard disk (four) information to the resignation, it is a big trouble. Therefore, the secret industry is older than the above _ questions , riding out - the kind of hard disk machine tilting green, - dumping hard shot (four) material, to avoid the occurrence of data outflow.
而上述的硬碟機之資料保護方法,係在作㈣統中增 設有-密碼賴程式(如:微軟作㈣統之使用者者密 碼)’使得電腦完成啟動作業系統後,再執行密碼保護程 式,並要求使用者輸人密碼,之後,當密碼保護程式接收 到正確的密碼後,才允許使用者登人作業纽,再利用作 業系統之解編碼程式’對硬碟機内之資料進行資料存取。 當密碼保触式沒接_正叙糾,制者即無法登入 作業系統’亦無法對硬碟_之龍進行資料存取,硬碟 機内之資料因此即得到保護。The above data protection method for the hard disk drive is added to the (four) system to add a password-based program (such as: Microsoft (four) unified user password) to enable the computer to complete the boot operating system, then execute the password protection program And ask the user to enter the password. After the password protection program receives the correct password, the user is allowed to log in to the job, and then the operating system's decoding program is used to access the data in the hard disk drive. . When the password is not touched, the system cannot access the operating system, and the data is not accessible to the hard disk. The data in the hard disk is protected.
惟,當電腦被竊取,域取者直接將硬碟機安裝至另 -電腦時,竊取者只要再使用另一電腦的另一硬碟機,用 以啟動另-作業系統後’即糊復原玉具或骇客工具侵入 被竊取的之硬碟機巾,並對賊取的電腦之硬碟機進 行資料存取。此時,被竊取的電腦之硬碟機等同並無任何 之保護措施,硬碟機之重要資料將被竊取者任意存取,換 言之,目前的硬碟機對於資料的保護並不周延。 【發明内容】 有鑑於硬碟機之資料仍有外洩之虞,發明人經過長久 -6- 1326411 . 背力研究與實驗,終於開發設 機之資料之方法。 之—種保護硬碟 本發明之一目的,係提供一種 _ 法’該方法係電腦在進行自我測試的階段=貧料之方 機已被加人簡描述·, 旦發現硬碟 述資料的較部份嫩爾與保護描 即具有磁碟分割表可供電 ·割區内However, when the computer is stolen, the domain extractor directly installs the hard disk drive to another computer, and the stealer only needs to use another hard disk drive of another computer to start the other operating system. The tool or the hacking tool invades the stolen hard disk towel and accesses the hard disk drive of the computer taken by the thief. At this time, the hard disk drive of the stolen computer is equivalent to no protection measures, and the important information of the hard disk drive will be arbitrarily accessed by the thief. In other words, the current hard disk drive does not have sufficient protection for the data. [Summary of the Invention] In view of the fact that the data of the hard disk drive is still leaking, the inventor finally developed the method of designing the machine after a long period of -6-1326411. One of the objects of the present invention is to provide a method of "computer" in the stage of self-testing of the computer = the device of the poor material has been described briefly, and the data of the hard disk is found. Part of the Nern and protection traces have a disk partition table that can be powered and cut
得電腦能夠完成田4自我戰後,使 碟機谁4 動作業系統之處理,並可對硬 特定部=取二而當電腦之電腦識別喝與保護描述資料的 空,此二=Γ、相符時’硬碟機之磁碟分割區即被清 、^.,,、法棘到任何的磁碟相表,當即結束 自我測成的處理後,不僅使 ° 李統w £不做料衫顧妓成啟動作業 系統之處理,而且也無法對硬顿 到保護硬碟機的資料之目的。 寸躲用以達 =便f審查委員能對本發明之特徵及其功效,做更 ^之認識與瞭解’兹舉實施例配合圖式,詳細說明如 下· 【實施方式】 …本發贿-魏護硬碟機之麵之方法,健用在一 電腦’凊參閱第1圖所示,t電腦在執行基本輸出輸入系 統的自我_糖段’ it制絲减體的初始化後 ’且在 所硬碟介面裝置之初始化程式碼被執行之後將依下列 步驟進行處理: (1〇)呼叫基本輸出輸人系統的中斷指令,以便讀取所 有硬碟機; (11) 判斷是否還有任-個硬碟機尚未被確認過,若 是,進行步驟⑽’否則,進行步驟(15); (12) 讀取其中-個尚未被破認過的㈣機,並判斷硬 碟機内是否具有一保護描述資料4,若是,進行步 驟⑽’否則,進行步驟(11);在本發明之一實 施例中。月參閱第2圖所示,保護描述資料4的 資料結構,係包括有一識別標識區40、一硬碟識 別碼儲存區42、-備份磁碟分割表儲存區44及一 檢查碼(check sum c〇de)儲存區其中識別標 識區40存放的資料,係用以表示在硬碟機中具^ 保護描述資料4之識別訊息。硬碟識別碼儲存區 42係儲存-硬碟識別碼。而硬碟識別碼係與設定 硬碟機需要被賴的電腦之電腦朗碼相同,且 電腦識別碼係可為通用唯一識別碼(㈤败⑽The computer can complete the field 4 self-war, make the disc player who operates the system, and can identify the data of the computer and the computer with the hard specific part = take two, the second = Γ, match When the disk partition of the hard disk drive is cleared, ^.,,, and the method is reversed to any disk phase table, immediately after the completion of the self-measurement process, not only makes Li Tong w £ do not make the shirt The processing of the startup operating system, and the inability to harden the data to protect the hard drive. Insects can be used to determine the characteristics and functions of the present invention, and to understand and understand the 'examples of the implementation of the drawings, detailed description is as follows · [Embodiment] ... this bribe - Wei protection The method of the hard disk machine, the use of a computer in a computer's 凊 第 第 第 第 第 第 , , , , , , 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑After the initialization code of the interface device is executed, it will be processed according to the following steps: (1) Calling the basic output input system interrupt command to read all the hard disk drives; (11) determining whether there is any hard disk The machine has not been confirmed yet, if yes, proceed to step (10) 'Otherwise, proceed to step (15); (12) read one of the (four) machines that have not been identified yet, and determine whether there is a protection description data 4 in the hard disk drive, If so, proceed to step (10) 'Otherwise, proceed to step (11); in an embodiment of the invention. Referring to FIG. 2, the data structure of the protection description material 4 includes an identification mark area 40, a hard disk identification code storage area 42, a backup disk partition table storage area 44, and a check code. 〇de) The storage area in which the identification information stored in the identification area 40 is used to indicate the identification information of the protection description data 4 in the hard disk drive. The hard disk identification code storage area 42 is a storage-hard disk identification code. The hard disk identification code is the same as the computer's computer code that the hard disk drive needs to be trusted, and the computer identification code can be the universal unique identification code ((5) defeat (10)
Unique Identification ,簡稱:UUiD),例如為 系統管理基本輸入輸出系統(SMBIOS ; System Management BIOS)形態 i〇ype i)之通用唯一識 別碼(UUID)娜[之值,換言之,硬賴別碼亦為 通用唯一識別碼。備份磁碟分割表儲存區44係用 以儲存備份磁碟分割表,而備份磁碟分割表的内 容,係與硬碟機被需要被保護時,硬碟機中的主 開機記錄的磁碟分割表區5(如第7或8圖所示) 中存放的所有磁碟分割表的内容相同。檢查碼儲 1326411 區46則儲存保護描述資料4被—檢查程式計算 後所得到的數值; (13=斷保麵料4是否具有與電騎設之一電 月向識別竭相符的部份,若是,進行步驟(14),否 則二進行步驟(16);在該實施例中,判斷保護描 ,貝料4疋否具有與電腦所設之—電腦識別碼相 付的部份之步驟,即是讀取硬碟識別碼儲存區42 ,硬碟識別碼,並判斷硬碟識別碼與電腦識別碼 疋否相同。由於㈣朗碼與電職別碼都是通 唯識別碼,而硬碟識別碼係與設定硬碟機需 要被保護的電腦之電腦識別碼相同,因此,若硬 二機在非&疋硬碟機需要被保護的其他電腦上被 讀取’則其他電腦的電腦識別媽一定與硬碟識別 碼不相同。故,在此一定要檢查保護描述資料4 是否具有與電腦所設之—電腦識別碼相符的部 份,以決定後續要繼續處理步驟; (14)令磁碟分割表區5存有磁碟分割表,再依步驟⑻ 進行處理;在該實施例中’請參閱第3圖所示, 令磁碟分割表區5存有磁碟分割表之步驟為; (140) 判斷綱機記錄内的磁碟分割表區5是否為清 空的狀態’若是’進行步驟(141) ’否則,進 行步驟(142); (141) 將備份磁碟分割表儲存區44的所有備份磁碟 分副表複製到主開機記錄内的磁碟分割表區 1326411 5 ’用以作為各個磁碟分割表,即結束; (142)主開機記錄内的磁碟分割表區5已存在各個磁 碟分割表;此時將磁碟分區5之所有磁碟 分割表複製到備份磁碟分割表儲存區44以便 備份f新之所有磁碟分,並重新依檢查程 式计异並所得觸數值,且將碰_存在檢 查碼儲存區46,即結束。Unique Identification (UUiD), for example, the system management basic input and output system (SMBIOS; System Management BIOS) form i〇ype i) universal unique identification code (UUID) Na [value, in other words, the hard code is also Universal unique identifier. The backup disk partition table storage area 44 is used for storing the backup disk partition table, and the contents of the backup disk partition table are separated from the disk of the main boot record in the hard disk drive when the hard disk drive needs to be protected. The contents of all the disk partition tables stored in Table Area 5 (as shown in Figure 7 or Figure 8) are the same. Check code storage 1326411 area 46 stores the value of the protection description data 4 after the check program is calculated; (13) whether the cut-off fabric 4 has the same part as the electric riding system, if it is, Step (14) is performed, otherwise step (16) is performed; in this embodiment, the step of determining the protection description, whether the material has a portion corresponding to the computer identification code set by the computer, is read. Take the hard disk identification code storage area 42, the hard disk identification code, and judge whether the hard disk identification code is the same as the computer identification code. Since (4) the Lang code and the electric service code are common identification codes, and the hard disk identification code is It is the same as the computer ID of the computer that needs to be protected by the hard disk drive. Therefore, if the hard disk machine is read on other computers that need to be protected by the non-hard disk drive, then the computer identification of the other computer must be The hard disk identification code is different. Therefore, it is necessary to check whether the protection description data 4 has a part corresponding to the computer identification code set by the computer to determine the subsequent processing steps; (14) Make the disk partition table Zone 5 has a disk partition table. According to the step (8), in the embodiment, 'please refer to FIG. 3, the step of storing the disk partition table in the disk partition table area 5; (140) determining the disk partition table in the machine record Whether the area 5 is in the empty state 'if yes' to the step (141) 'other, proceed to step (142); (141) copy all the backup disk sub-tables of the backup disk partition table storage area 44 into the main boot record The disk partition table area 1326411 5 ' is used as the individual disk partition table, that is, the end; (142) the disk partition table area 5 in the master boot record already exists in each disk partition table; at this time, the disk partition 5 All the disk partition tables are copied to the backup disk partition table storage area 44 to back up all the new disk partitions, and the touch value is again calculated according to the check program, and the touch code storage area 46 is End.
例中,電腦需要再確認主開機記錄内的磁 5是否為清空的狀態,其原因是硬碟機 I在别-轉取時,硬碟機的磁碟分割表區5可 月b已被i ’因此,為了以避免電腦無法在磁碟分 割表區5中讀取到任何_碟分·,故在此 驟中需要再確魅_記勒的磁碟分縣區^ 否為清空的狀態; (15)繼續自我測試的處理,然後結束;In the example, the computer needs to confirm whether the magnetic 5 in the main boot record is in the empty state. The reason is that the hard disk drive I is in the other-transfer, the hard disk drive's disk partitioning table area 5 may be b 'Therefore, in order to prevent the computer from being able to read any _ disc points in the disk partition table area 5, it is necessary to re-define the _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ (15) continue the processing of self-test and then end;
⑽令磁碟分絲區5不存在任;^刺分割表,再 依步驟(11)進行處理;在該實施例中,請參閱第4 圖所示,I令磁碟分割表區5不存在磁碟 表之處理方法,包括: (160)判斷主開機記錄内的磁碟分割表區 ㈣狀態’若是’進行步驟⑽,否則= 行步驟(161); (161)將主_記錄_磁碟分區5的所有磁 分割表複製到備份磁碟分割表儲存區44,用以 -10- 1326411 將所有磁碟分割表作為備份磁碟分 ⑽)將主職記__碟分 有 分割表清除,即結束; 所有磁碟 ⑽物咖5已清 割表’即結束。 Φ 的電腦1 時 奴·顺要被保護 二因5内已具有磁碟分 被、、“ b要辆定财_相表是否已 免電腦讀取到磁碟分割表。又,為避 割表不7 25内所有磁碟分割表與備份磁碟分 製到備份磁碟二::::分:表:清除前,複 腦讀取硬碟機之所有磁碟分割表【在5mj中、,電 :割::新:_依檢查程式計算並二:: 驟⑻存區《,才再依步 藉由上述可知,當硬碟機之硬 相同時’硬碟機内的磁碟分割表區5、;合有磁磾= 讀取到•碟恤== 成後’,、可超成啟動作㈣統的 磁碟分割表區5將被清空,如此,硬碟機的 -法完成啟動嶋統之處理,:==電 -11- 1326411 入仵T閱第5圖所示,在硬碟機寫 =保晶述貝料4 ’用以將硬碟機設定為被保護、取消保 護的步驟,請參閱第5、6圖所示,係包括: ” 單’硬碟選單係包括所有安裳在電 碟,讀使用者選擇其中-個硬碟機, 進行後續的處理步驟; ” (21) 當使用者選擇其—硬碟機後,即輪出(10) The disk separation area 5 does not exist; the thorn partition table is processed according to the step (11); in this embodiment, as shown in Fig. 4, I makes the disk division table area 5 not exist. The processing method of the disk table includes: (160) judging the disk partition table area in the main boot record (4) state 'if yes' performing step (10), otherwise = line step (161); (161) placing the main_record_disk All the magnetic partition tables of the partition 5 are copied to the backup disk partition table storage area 44, for the -10- 1326411 to use all the disk partition tables as the backup disk partition (10), and the main job __distribution partition table is cleared. That is to say; all the disks (10) of the coffee beans 5 have been cleared. Φ computer 1 when slaves are to be protected 2 because 5 has a disk partition, "b wants to save money _ phase table has been free from the computer to read the disk partition table. Also, for the avoidance table Not all the disk partition table and backup disk in 7 to 25 backup to the backup disk 2:::: points: Table: before clearing, the complex brain reads all the disk partition table of the hard disk machine [in 5mj, Electricity: cut:: new: _ according to the check program calculation and two:: (8) save area ", only then by the above, when the hard drive is the same hard" disk drive table area 5 , with the magnetic 磾 = read to / disc = = after the ',, can be super-starting (four) unified disk partition table area 5 will be emptied, so, the hard disk machine - method to complete the boot system The processing, :==Electronic -11- 1326411 into the 仵T read Figure 5, on the hard drive write = Baojing Shubei 4 ' to set the hard drive to be protected, unprotected steps, Please refer to the figures 5 and 6, which include: ” The single-hard disk menu includes all the fans on the disc, and the reader selects one of the hard drives for subsequent processing steps; ” (21) user Optional which - after hard drive, i.e., the wheel
選、硬碟保護選單包括一啟動保護硬碟 一取消保護硬碟選項; 、 (22) :是硬碟選項或取消倾硬碟選項被 呆護硬碟選項被選擇,進行步驟 彳卩絲取_護_選顿選擇, 進行步驟(30) ; ^ (23) 當啟祕護硬碟選項_擇,_斷硬 已具有傾描述簡4,若是進行步驟⑽The option, hard disk protection menu includes a boot protection hard disk - unprotect hard disk option; , (22): is a hard disk option or cancel the hard disk option is selected to protect the hard disk option, take the steps to take _ _ _ selection, step (30); ^ (23) When the secret hard disk option _ choice, _ break hard has a description of the simple 4, if the step (10)
則,進行賴29),在本翻中,_硬碟機是 否已具有保護描述資料4之方法,係判斷是否读 取到識別標識區40所存放的資料; 项 (24) 判斷硬碟識別碼與電腦識網是否相同 行步驟(25),否則,進行步驟(28); 疋 (25) 將主開機記錄的磁碟分割表區5 _有的磁 割表複製到備份磁碟分儲存區4 : 份磁碟分割表; 馬備 (26) 將主開機記錄_碟分割表區5崎有的磁碟分 -12 ς 割表清空; (27) 根據識別標識區40、硬碟識別碼儲存區42、備份 磁碟分割表儲存區44的内容4新依檢查程式計 算’並得到新數值’且將她值儲縣檢查碼儲 存區46中作為檢查碼,即結束; (28) 離開啟動保護硬碟的處理,即結束; (29) 建立保護描述資料4於硬碟中,再依照步驟⑽ 繼續進行處理; (30) 當取雜護硬項被選擇,糊斷硬碟機是否 已具有保護描述資料4,若是進行步驟⑼,否 則’即結束,在此-步驟中,判斷硬碟機是否已 被保護之方法’亦為判斷判斷是否讀取到識別標 識區40所存放的資料; (31) ^斷硬碟識別碼與目前執行開機碼的電腦之電腦 =碼是同,若是進行步職),否則,即 ⑽將備細碟相雜麵4 卿_5,^= 表區5内所有的磁碟分割表; ^3)將保護描述資料4刪除,即結束。 並未雜縣縣鋪時,謂機記錄 資料4 ’直接繼一’主開機記錄並未建立保護描述 統之處理,而當硬碟啟動保 啟動作業系 y、、主開機δ己錄已建立保護 -13- 1326411 . 描述資料4,故,透過硬碟機讀取到保護描述資料4,即 表示硬碟機被保護,且透過判斷硬碟識別碼是否與電腦識 別碼相同,藉關斷目前讀取補之電腦衫為設定硬碟 識別碼的電腦,若是’即表示硬碟並未被竊取或被安裳到 S他電腦上讀取,帛以制保護硬碟_#料之目的。 - 在該實施例中,保護描述資料4係存放在硬碟的主啟 動磁區6的主開機記錄的跳躍區2與磁碟分割表區5間未 % 被使用的儲存空間内(如第7圖所示〕,即在儲存開機石馬 (boot code)關機碼儲存區3 ’ 電腦搜尋主職記錄的 跳躍區2與_分酿區5間未被制的空_,是否具 . 麵觀息,藉以騎硬碟機内是否具有-保護描述_ 4。另,由於硬碟識別碼儲存區犯、備份磁碟分割表儲存 ,44及檢查碼儲存區46的儲存容量是固定的大小,故, 當電腦讀取到識別訊息後,即可由識別訊息計算出,硬碟 酬德42、備份_分割_能44及檢查顯 馨存區46在主啟動磁區的啟始位址,使得電腦可依硬碟識 別碼儲存區42、備份磁碟分割表儲存區44及檢查碼儲存 區46在主啟動磁區的啟始位址,讀取到硬碟識別碼、各 個備份磁碟分割表及檢查碼的數值。 由於,硬碟的主啟動磁區6的開機碼儲存區3,可能 不足用來儲存保護描述資料4,故,在本發明之另—實= 例令,電腦係在硬碟的磁碟分割表區5其中一個空間磁區 7寫入保護描述資料4,及將磁碟分·區5的其中 間置的磁碟分割表標示成特殊類型,並在閒置的磁碟分割Then, proceed to Lai 29), in this flip, whether the hard disk drive has the method of protecting the description material 4, it is judged whether the data stored in the identification mark area 40 is read; Item (24) Judging the hard disk identification code Whether it is the same as the computer network (25), otherwise, proceed to step (28); 疋 (25) Copy the disk partition table area of the main boot record 5 _ some magnetic cut table to the backup disk storage area 4 : Disk partition table; Ma Bei (26) will be the main boot record _ disc split table area 5 Sakizaki disk sub--12 ς cut table empty; (27) According to identification mark area 40, hard disk identification code storage area 42. The content of the backup disk partition table storage area 44 is newly calculated by the check program and the new value is obtained, and the value of the check value storage area 46 is used as the check code, that is, the end is completed; (28) leaving the boot protection hard The processing of the disc is finished; (29) The protection description data 4 is created on the hard disk, and then the processing is continued according to the step (10); (30) When the hard hardware item is selected, whether the hard disk drive has the protection description Data 4, if it is step (9), otherwise 'that is the end, in this - step, judge hard The method of whether the disc player has been protected is also judged whether or not the data stored in the identification mark area 40 is read; (31) The hard disk identification code is the same as the computer=code of the computer currently executing the boot code, if Carry out the step), otherwise, (10) will prepare the discs of the discs 4 qing _5, ^ = all the disc partition tables in the table area 5; ^3) delete the protection description material 4, that is, the end. When there is no miscellaneous county county shop, the machine records data 4 'directly following the first master boot record does not establish the protection description system, and when the hard disk starts to protect the startup operation system y, the main boot δ has recorded the protection has been established -13- 1326411 . Describes the data 4, so the protection description data 4 is read through the hard disk drive, which means that the hard disk drive is protected, and by determining whether the hard disk identification code is the same as the computer identification code, the current read is turned off. The computer shirt to be supplemented is a computer with a hard disk identification code. If it means 'the hard disk has not been stolen or read on the computer, it is used to protect the hard disk. - In this embodiment, the protection description material 4 is stored in the storage space of the jump area 2 of the main boot record 6 of the hard disk and the disk partition table area 5 which is not used (for example, the seventh As shown in the figure, it is stored in the boot code shutdown code storage area 3 ' computer search for the main record of the jump zone 2 and _ split zone 5 unprocessed empty _, whether it has. , in order to ride the hard disk drive has a - protection description _ 4. In addition, due to the hard disk identification code storage area, backup disk partition table storage, 44 and check code storage area 46 storage capacity is a fixed size, so, when After the computer reads the identification message, it can be calculated by the identification message, the hard disk reward 42, the backup_segment_ can 44 and the inspection start address 46 in the starting space of the main boot area, so that the computer can be hard The disc identification code storage area 42, the backup disk partition table storage area 44 and the check code storage area 46 are at the starting address of the main boot magnetic area, and the hard disk identification code, each backup disk partition table and the check code are read. Since the boot code of the main boot area 6 of the hard disk is 3, it may not be It is used to store the protection description data 4, so in the other embodiment of the present invention, the computer is in the disk division table area 5 of the hard disk, one of the spatial magnetic regions 7 is written with the protection description material 4, and the magnetic The disk partition table in the middle of the disc division/area 5 is marked as a special type and is divided in an idle disk.
-14- S 1326411-14- S 1326411
㈣馬八2_磁區的啟始位置(如第δ圖所示),故 電腦透過麟麵_碟分割麵5,衫具有標示成 殊類型的間置的磁碟分割表,藉以判斷硬射是否具= 護描述貧料4,進而再從職的磁碟分職内巾取得 描述資料4在空_的啟始位置,即可讀取到識別訊 息。另,由於硬碟識別碼儲存區42、備份磁碟分割表儲 區44及檢查碼儲存區46的儲存容量是固定的大小,故, 當電腦讀取到識別訊息後,即可由識職息計算出,硬 識別碼儲輕42、齡磁碟賴讀存區&及檢查碼儲 存區46在主啟動磁區的啟始位址,使得電腦可依硬碟識 別碼儲存區42、備份_分割表儲存區44及檢查瑪儲存 區46在空閒的磁區的啟始位址,讀取到硬碟識別碼 個備份磁碟分割表及檢查碼的數值。 按’以上所述,僅為本發明較佳之具體實施例,惟本 發明之特徵並不侷限於此’任何熟悉該項技藝者在本發明 領域内,可㈣思及之變化或修叙解物,皆可涵^ 以下本案之專利範圍。 【圖式簡單說明】 第1圖係本發明之動作流程圖; 第2圖係保護描述資料的資料結構圖; 第3圖係本發明之電腦令磁碟分縣區存有磁碟分割 表之動作流程圖; ° 第4圖係本發明之令電齡鋪分縣區不存在磁碟 分割表之動作流程圖; -15- s 第5圖係本發明之電腦在硬碟機寫人保護描述資料, 用以將硬碟機設定為被保護之動作流程圖; 第6圖係本發明之電腦將硬碟機設定為取消保 作流程圖; 第7 ®縣發明之—實_之保護描職料存放在主 啟動磁區的示意圖;及 、第8圖係本發明之另—實施例之倾描述資料存放閒(4) The starting position of the Ma 8 2_ magnetic area (as shown in the δ diagram), so the computer passes through the lining _ disc dividing surface 5, and the shirt has a disk partitioning table marked as a special type to judge the hard shot. Whether or not there is a description of the poor material 4, and then the descriptive information of the internal disk of the employee is obtained. The identification information is read at the start position of the empty space, and the identification message can be read. In addition, since the storage capacity of the hard disk identification code storage area 42, the backup disk partition table storage area 44, and the check code storage area 46 is a fixed size, when the computer reads the identification message, it can be calculated by the job information. The hard identification code storage light 42, the age disk storage area & and the check code storage area 46 are at the starting address of the main boot magnetic area, so that the computer can be based on the hard disk identification code storage area 42, and the backup_segment The table storage area 44 and the check mark storage area 46 read the hard disk identification code backup disk partition table and the value of the check code at the start address of the free magnetic area. The above description is only a preferred embodiment of the present invention, but the features of the present invention are not limited thereto. Any one skilled in the art may, within the field of the present invention, may (4) think about changes or modifications. , can be han ^ the following patent scope of the case. BRIEF DESCRIPTION OF THE DRAWINGS Fig. 1 is a flow chart of the operation of the present invention; Fig. 2 is a data structure diagram for protecting the description data; and Fig. 3 is a computer for the disk of the present invention. Action flow chart; ° Figure 4 is a flow chart of the operation of the present invention in the absence of a disk partition table in the county-age area; -15- s Figure 5 is a description of the computer protection of the computer of the present invention on a hard disk drive The data is used to set the hard disk drive as a protected action flow chart; the sixth figure is the computer of the present invention, the hard disk drive is set as the cancellation guarantee flow chart; the 7th county invention - the actual protection protection material A schematic diagram of the storage in the main starting magnetic zone; and, FIG. 8 is a separate embodiment of the present invention.
護之動Protection
f磁區及標示祕殊__置_碟分縣的示意圖。 【主要元件符號說明】 M 跳躍區................... 保護描述資料.........4 硬碟識別碼儲存區...42 檢查碼儲存區.........46 主啟動磁區............g 開機碼儲存區...............β 識別標識區.................. 備份磁碟分割表儲存區..·44 磁碟分割表區...............5 空閒磁區............... 7 # "16 -f magnetic zone and marking secrets __ set_distribution of the county. [Main component symbol description] M Jump zone........................ Protection description data.........4 Hard disk identification code storage area... 42 Check code storage area.........46 Main boot magnetic area............g Power-on code storage area.............. .β identification area.................. Backup disk partition table storage area..·44 Disk partition table area........... ....5 Idle magnetic zone.................. 7 # "16 -
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW95144915A TWI326411B (en) | 2006-12-04 | 2006-12-04 | Method for protecting data in a hard disk |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW95144915A TWI326411B (en) | 2006-12-04 | 2006-12-04 | Method for protecting data in a hard disk |
Publications (2)
Publication Number | Publication Date |
---|---|
TW200825743A TW200825743A (en) | 2008-06-16 |
TWI326411B true TWI326411B (en) | 2010-06-21 |
Family
ID=44772083
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW95144915A TWI326411B (en) | 2006-12-04 | 2006-12-04 | Method for protecting data in a hard disk |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI326411B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI457754B (en) * | 2010-06-04 | 2014-10-21 | Hon Hai Prec Ind Co Ltd | Application server and method for copying a hard disk drive |
CN108733479B (en) | 2017-04-24 | 2021-11-02 | 上海宝存信息科技有限公司 | Method for unloading solid state hard disk card and device using same |
-
2006
- 2006-12-04 TW TW95144915A patent/TWI326411B/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
TW200825743A (en) | 2008-06-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI291629B (en) | Method, system, and computer readable storage medium storing instructions for switching folder to be accessed based on confidential mode | |
JP2004038931A (en) | Method for implementing backup and recovery of data in computer hard disk | |
JP2007012032A (en) | Usb-compliant personal key | |
TW200905546A (en) | Harddisk security method | |
CN110622163A (en) | Auxiliary storage device with independent recovery area and equipment suitable for auxiliary storage device | |
CN101021793B (en) | Method and system for realizing Pre-OS Application utilizing extended BIOS technique | |
TW201915753A (en) | Data storage apparatus | |
TW201020849A (en) | Storage device, information processing apparatus and program | |
TWI326411B (en) | Method for protecting data in a hard disk | |
TWI331748B (en) | Method for protecting data in a hard disk | |
JP3652969B2 (en) | Recording medium recording unused license detection method, unused license detection method, and unused license detection program | |
JP4197227B2 (en) | Expansion external storage system | |
TWI274996B (en) | Method for protecting data stored in a hard disk | |
JP2008077413A (en) | Thin client, thin client system, and program | |
JP2002041292A (en) | Computer recovery device | |
Image | User's Guide | |
JP4968634B1 (en) | Computer system | |
JP7093012B2 (en) | Disk device equipment, information processing system, and restoration program | |
TWI297436B (en) | ||
JP2005071314A (en) | Software protection system by usb connection storage device or the like | |
JP2005535003A (en) | A computer system capable of supporting multiple independent computing environments | |
JP5753457B2 (en) | Memory system, security memory, and information protection method | |
TWI334100B (en) | Computer system and control method | |
JP2005332042A (en) | Apparatus for restoring deleted data, and apparatus for restoring deleted data as well as for copying data | |
JP5718746B2 (en) | Memory system, security memory, and information protection method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Annulment or lapse of patent due to non-payment of fees |