WO2003050683A1 - Procede de sauvegarde et de recuperation de donnees sur le disque dur d'un ordinateur - Google Patents

Procede de sauvegarde et de recuperation de donnees sur le disque dur d'un ordinateur Download PDF

Info

Publication number
WO2003050683A1
WO2003050683A1 PCT/CN2001/001298 CN0101298W WO03050683A1 WO 2003050683 A1 WO2003050683 A1 WO 2003050683A1 CN 0101298 W CN0101298 W CN 0101298W WO 03050683 A1 WO03050683 A1 WO 03050683A1
Authority
WO
WIPO (PCT)
Prior art keywords
partition
hard disk
data
backup
boot record
Prior art date
Application number
PCT/CN2001/001298
Other languages
English (en)
French (fr)
Other versions
WO2003050683A8 (fr
Inventor
Changqing Wan
Dong Han
Danfeng Zhang
Original Assignee
Legend (Beijing) Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Legend (Beijing) Limited filed Critical Legend (Beijing) Limited
Priority to PCT/CN2001/001298 priority Critical patent/WO2003050683A1/zh
Priority to EP01982085A priority patent/EP1434135B1/en
Priority to AU2002213779A priority patent/AU2002213779A1/en
Priority to DE60131028T priority patent/DE60131028D1/de
Priority to US10/488,117 priority patent/US7146525B2/en
Priority to CN01823593.XA priority patent/CN1241120C/zh
Priority to AT01982085T priority patent/ATE376213T1/de
Publication of WO2003050683A1 publication Critical patent/WO2003050683A1/zh
Publication of WO2003050683A8 publication Critical patent/WO2003050683A8/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process

Definitions

  • the invention relates to a method for backing up and restoring data stored in a computer hard disk. Background technique
  • Hard disk as one of the most commonly used external memories of computers, is used to store a large amount of user profile data and system information. Its security and reliability are very important. Misoperations by users, defects in hard disk data management software, and attacks by computer viruses may destroy useful data on the hard disk. Some boot viruses can also destroy parameter files on the hard disk, causing the computer software system to be paralyzed and unable to start normally. It is necessary to make a backup of the hard disk data.
  • the purpose of the present invention is to provide a computer hard disk data backup and recovery method, which can safely and reliably back up and restore data in the hard disk, thereby preventing hard disk data due to various reasons such as user operation errors or various virus infections. The resulting damage can be quickly, easily and reliably recovered.
  • a computer hard disk data backup and recovery method includes the following steps:
  • a backup step for backing up hard disk data including:
  • a mirror partition for backing up the data of the partition is set for the backup partition in which data needs to be backed up;
  • the size of the mirror partition space can be equal to the backup partition, at least not less than the backup partition
  • the size of the backup partition can be specified by the user;
  • a recovery step which is used to completely restore the hard disk data of the mirror partition to the corresponding backup partition according to the user's designation.
  • the above backup steps and recovery steps can be implemented during the computer's startup or reset process.
  • the software implementing the present invention can also be run at other times while the computer is running. During each computer startup, the user can perform either or both of these steps as needed.
  • system master boot record MBR and the system boot record PBR in the hard disk may be backed up, and modification flags may be set in the master boot record and the system boot record, respectively. This modification flag is used to monitor and judge whether the data in the record has been modified.
  • the recovering step may further include: detecting the system master boot record MBR and the system boot record PBR modification flags in the hard disk, respectively, when detecting and judging that the system master boot record MBR and the system boot record PBR have been When destroyed, automatically Restore using the backed up system master boot record MBR and system boot record PBR, and use the file allocation table FAT2 to repair the file allocation table FAT1.
  • the premise of repairing the file allocation table in this way is that the FAT2 table is kept intact and not damaged.
  • the hidden mirror partition is implemented by modifying the number of sectors of the hard disk partition in the hard disk parameter table FDPT. Hide the mirrored partition by hiding the hard disk sectors of the mirrored partition. In fact, the hard disk sector can also be hidden by other methods, so that ordinary users' operating system applications and computer viruses cannot access the mirrored partition to achieve the purpose of protecting hard disk backup data.
  • the process of hiding a mirrored partition is generally implemented automatically by software after the mirrored partition is created.
  • the number of sectors of the hard disk partition in the hard disk parameter table FDPT can be modified to hide the backup partition. In this way, you can also protect the hard disk data. For example, the total number of sectors of all mirrored partitions is subtracted from the actual total number of sectors, so that hidden users cannot be accessed by unauthorized users.
  • the system configuration data stored in the computer can be backed up in the hard disk according to the user's designation. For example, back up the system configuration information stored in the computer in CMOS RAM (Complementary Metal Oxide Semiconductor Memory).
  • CMOS RAM Complementary Metal Oxide Semiconductor Memory
  • the data transmission mode of the hard disk data backup from the backup partition to the mirror partition, or from the mirror partition to the backup partition may use programmable input-output access (PIO) Mode, or direct memory access (DMA) mode.
  • PIO programmable input-output access
  • DMA direct memory access
  • data backup or data recovery can be performed on multiple hard disks connected to the computer.
  • the backup partition and the mirror partition corresponding to the backup partition can be respectively set in the spaces of different hard disks connected to the computer. Therefore, when the backup partition and the mirror partition respectively occupy the entire space of the corresponding hard disk, copy-backup of the hard disk can be achieved, that is, one hard disk can be used as a full mirror backup of another hard disk to restore Control all data in the entire hard disk.
  • the mirror partition space should be no less than the backup partition space.
  • the backup step or recovery step is started by a user pressing a preset hot key on the keyboard during a predetermined time during the startup process of the computer after it is turned on or reset.
  • multiple hot keys can be set in advance.
  • the interface of the started backup step or restore step is displayed on the computer monitor, and the displayed The interface content uses different text. For example, press different hot keys to enter the Chinese or English interface. Other text interfaces can be set to suit users in different languages.
  • a partition attribute is set by a user for prohibiting or allowing overwriting of a master boot record of a hard disk.
  • This partition attribute is used as a flag bit for prohibiting or allowing the master boot record from being overwritten.
  • the master boot record can be protected from unauthorized and malicious modification (such as the effect of a computer virus) without affecting the master boot record. Users install new systems and similar operations.
  • this flag is set to "disable”
  • any rewriting of the master boot record is prohibited, so that the master boot sector has a write-protection function; when the flag is set to "allow”, goodwill to the master boot record is allowed Modifications, such as modifications to the master boot record when users install a new operating system. If the above-mentioned modification marks in the master boot record are rewritten, it can be determined that such modifications are not in good faith.
  • the backed up system master boot record MBR, system boot record PBR, system configuration data, hard disk partition information data, and mirror partition information data may be stored in hard disk space other than the space that can be managed by the hard disk partition management program. This prevents ordinary users and computer viruses from reading and writing these data, thereby effectively protecting the backup data.
  • system master boot record MBR system boot record
  • system configuration data system configuration data
  • corresponding modification flags in the hard disk partition information data and mirror partition information data are found to be modified without permission
  • the above data is automatically backed up before system boot Perform recovery. You can also back up some important data (such as user passwords) and Rewrite monitoring, once non-good faith changes are found, automatic recovery is possible.
  • BIOS basic input / output system
  • the method of the present invention can be implemented during the startup process of the computer system after booting or resetting.
  • the user can set an active partition (also known as an activated partition) among the partitions with different operating systems installed on the hard disk.
  • the basic principle of the present invention is to divide a hard disk partition to be backed up in the same hard disk or other hard disks into a space of the same size, which is called a mirror partition.
  • the data in the backup partition is completely copied to the corresponding mirror partition to achieve
  • this mirrored partition is reserved for the hard disk and is not reported to the operating system, so it will not be accessed by the operating system, thereby improving the security and reliability of the backup data stored in the mirrored partition.
  • the only disadvantage of the present invention is that it takes up some hard disk space, and now hard disk technology has developed at a high speed, hard disk capacity has become larger and larger, and the cost is lower. Users can purchase large-capacity hard disks, so users will not The inconvenience caused by the lack of hard disk space of the user by applying the present invention. And for data security, it is very cost-effective and worthwhile to lose a small amount of hard disk space without increasing costs.
  • the invention can provide users with reliable hard disk data backup and data recovery, backup and recovery of CMOS setting information, and provides an easy-to-set multi-boot function, which enables users to install multiple operating systems on one hard disk through simple and fast settings. It can be started; even more commendable is that the present invention has good immunity to a variety of boot viruses, and highly destructive viruses such as CIH. By quickly and reliably recovering backup data and records, the virus can be completely removed. Any damage to user data and system information; combined with the anti-viras dual BIOS (FLASH ROM) write-protection function of the motherboard itself, it is a comprehensive solution to prevent CIH virus.
  • the software program for realizing the present invention is completely built in the BIOS chip, and does not occupy hard disks, memory, or system resources. After installation, it has no impact on system performance. It is the preferred protection tool for enterprises and personal computers, and is particularly suitable for Users with high requirements for the safety and reliability of hard disk data.
  • the partition of the hard disk can be completely mirrored and backed up and restored, so that even the hidden records in the partition will not be missed, and the user can even restore and delete
  • the computer software of the present invention is completely built in the BIOS and stored in the BIOS chip, does not occupy hard disk space, does not require other media during the entire installation process, and is difficult to be destroyed. At the same time, it improves the computer compatibility of the present invention and is very easy to implement Software upgrade.
  • the present invention modifies the FDPT (Fixed Disk Parameter Table), that is, a false interruption of 41h / 46h to hide the space occupied by the mirror partition to ensure the safety and reliability of the backup data. No temporary memory; before the computer is started each time, the present invention checks important data areas of the hard disk (such as the main boot partition and the system boot partition).
  • the invention also adds the CMOS data backup and recovery function, and the multi-boot function of the hard disk partition. A maximum of 4 operating systems can be installed on a hard disk and can be switched freely without restarting the system. In order to achieve multi-boot, it also provides a Extended partition (EXTENSION PARTITION) into a standard partition (PRIMARY PARTITION) function. The invention can automatically identify and prompt to restore the previous installation.
  • EXTENSION PARTITION Extended partition
  • PRIMARY PARTITION PRIMARY PARTITION
  • the invention has simple operation and fast running speed, and can display different interfaces in Chinese and English according to different hot keys (for example, two hot keys corresponding to the English interface are provided).
  • the software of the present invention can set a running password to prevent unauthorized modification of the hard disk partition and mirror partition.
  • the password is stored in the hard disk. Others cannot clear the password by clearing the CMOS, and the security is high.
  • FIG. 1 is a working flowchart of an embodiment of the present invention
  • FIG. 2 is a schematic diagram of a "partition interface” when performing a hard disk partition operation according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of a "mirror interface” during data recovery and backup operations according to an embodiment of the present invention.
  • a typical embodiment of the present invention is a software system for hard disk data backup developed by the applicant for a personal computer to protect data or data in the hard disk from being lost or infected by a virus. It uses build-in-BIOS technology to be built into the BIOS system code. That is, the functions of the present invention, including partitioning, backup, and recovery programs, are stored in the BIOS chip. It does not occupy hard disk space, memory, or system resources. Therefore, it can be compatible with various computer motherboards, suitable for various operating systems, and does not require any software installation by the user, no additional floppy disks or plug-in cards; it is also very convenient when the software needs to be upgraded, just download the latest BIOS from the Internet Just fine. This embodiment supports all types of IDE hard disks. For the basic flow and function description, please refer to the description in Figure 1 to Figure 3 and below.
  • BIOS Basic Input / Output System
  • BIOS is a low-level software system that directly interacts with computer hardware. It provides the operating system with basic functions for controlling hardware devices.
  • the BIOS is stored in a read-only memory chip ROM. These codes are stored even after shutdown or power failure. Will not disappear.
  • the BIOS is stored in a FLASH (Flash Memory) chip.
  • the system BIOS when the computer is turned on or reset, the system BIOS performs a power-on self-test (POST).
  • the BIOS detects the existence and normal operation of key devices in the system, performs a safety test on the hard disk, and initializes the power-on boot.
  • Perform system configuration according to the CMOS settings report the configuration table of the hardware system to the operating system, and prepare to submit system control to the operating system.
  • two hot keys are set for the user during the BIOS startup process, which are (Ctrl + Tab) and (Home) keys, and press (Ctrl + Tab) to enter to implement the "hard disk partition" function (including creating New partition and mirror partition) partition interface, as shown in Figure 2; press (Home) key to enter the mirror interface to implement the "partition mirror” function (including data backup and data recovery), as shown in Figure 3.
  • the system BIOS Continue the power-on self-test process.
  • starting related software that implements the functions of the present invention does not necessarily have to be through hot keys.
  • Other methods can also activate this function. For example, an option can be set in the CMOS setting interface and clicked by the user. enter.
  • the Lenovo computer motherboard may be equipped with functional software according to an embodiment of the present invention. They can back up, protect and immediately restore hard drive data to prevent loss of important data. Furthermore, in the embodiment of the present invention, data of CMOS can be protected and restored. Because the software of the embodiment of the present invention is built into the BIOS, as long as the computer enters the BIOS startup step, it can immediately enter the software interface of the embodiment of the present invention, and the user can choose whether to back up the system disk or data disk. The software will select an area on the hard disk to store the backed up data. From this area, other software or hardware will no longer be allowed to access, including viruses. For example, when a virus attacks the system disk, important data is lost, and the operating system cannot work at all.
  • the backup data can be restored to the system disk, and the user's computer returns to normal.
  • the software according to the present invention also has a strong anti-virus function, which can lock any virus out of the backup area. If coupled with the invincible lock function of Lenovo QDI (mainly to protect the BIOS's physical storage medium such as FLASH ROM from some malicious attacks), then the embodiments of the present invention can completely prevent virus attacks (such as CIH virus). And unlike ordinary rescue cards, which can only protect one hard disk, the embodiment of the present invention can protect up to four hard disks.
  • the program analyzes the original partition system of the hard disk and displays the status of the first 4 partitions. If the original hard disk has extended partitions and the number of partitions exceeds 4, the system will prompt the user Delete more than 4 partitions, this is because each hard disk can support up to 4 primary partitions; if the number of partitions is not more than 4, the system will prompt the user whether to install and run the system based on the original partitions, which will The original extended partition is converted into a normal partition, and the order of partition drive letters may be changed, but the content in the original partition is not changed. The system will also provide another option for users to choose, which is to delete all the original partition records and provide a completely clean hard disk space.
  • Figure 2 lists the functions included in the "Partition Interface", where "New Partition” is used to create a new partition. After entering, the system will prompt whether to set the mirror for the current partition. If you want to set the mirror, you can enter the partition The maximum allocable space suggested at this time is half of the remaining space, because the system will draw a mirror of the same size for the new partition on the hard disk, and the hard disk capacity reported to the operating system will be reduced accordingly.
  • the "Delete Partition” in Figure 2 is used to delete the last partition in the existing partition and its mirror. To ensure continuity of hard disk space, only the last partition is allowed to be deleted.
  • the "activated partition” in Figure 2 is used to enable the user to select a partition among multiple operating system partitions that have been installed on the hard disk, and set it as the active partition to implement the multi-boot function.
  • the C and D partitions in the hard disk are installed with Chinese Windows 98 and English Windows 95 systems, respectively.
  • the user selects C or D as the active partition to start the corresponding system.
  • "A" marked to the left of “Partition C” indicates that Partition C has been activated (set as the active partition).
  • “Create image” is to add a mirror to a partition that does not exist in the existing partition, unless the hard disk has insufficient free space. Partitions C and E in the figure have created corresponding mirrored partitions.
  • Delete Mirror is to delete the mirror for the partition with mirror in the existing partition. To ensure continuity of hard disk space, only the mirror of the last partition with mirror is allowed to be deleted.
  • Uninstall software is to uninstall the program of the present invention. The uninstall process can be completed in an instant after the user confirms.
  • partition backup in the figure is used to back up the contents of the user-specified partition to the mirror partition. If the partition has been backed up before, the system will prompt the time of the last backup and ask the user to confirm. Data backup. "Partition recovery” is used to restore the contents of the mirrored partition to the corresponding partitions, such as the existing partitions C, D, E, and F, and establish mirrored partitions C 'and E' for C and E. If partition C is restored, then Split the mirror Zone c 'is restored to partition c. When there are more than two hard disks, the partition ID is changed from C, D, E, and F to 1, 2, 3, and 4 to show the difference, as shown in Figure 3.
  • Partition backup or partition recovery can be performed in programmable input-output access (PIO) mode or direct memory access (DMA) mode.
  • PIO programmable input-output access
  • DMA direct memory access
  • the BIOS since the BIOS is in the power-on self-test phase (POST) at this time, it can make full use of the current large memory space as a buffer (at this time the operating system has not loaded the memory), and read from the hard disk each time Take a piece of quantitative data without seeking, and then place it in memory.
  • the data stored in the free space of the memory is full, the data in the memory is written to the mirror partition or backup partition in blocks, thereby improving data backup. Or recovery speed.
  • This embodiment can achieve a copy speed of 5M per second. Using, for example, ultra DMA (super DMA) mode, the data copy speed can theoretically reach 100M per second.
  • the "partition properties” setting in Figure 3 allows the computer to reset the partition properties after entering the operating system. For example, when installing the operating system, or if you need to modify the partition properties (such as changing FAT16 to FAT32), the user sets this to "On”. At this time, the partition is a general-purpose IDE device. Modify the property in good faith, and cancel the monitoring of MBR; Automatically back up MBR and PBR after the system is installed. When the partition attribute is set to "off”, any rewrite operation on the partition attribute is prohibited.
  • the "CMOS backup” in Figure 3 is used to back up the contents of CMOS on the hard disk.
  • CMOS generally stores computer system configuration memory, graphics card, hard disk, floppy drive, optical drive, serial communication port, parallel output port and other configuration device parameters, as well as time, password and other setting information. Once it is damaged, the system cannot start. According to the present invention, the contents of the CMOS are backed up, safe and reliable, and easy to restore.
  • CMOS Recovery in Figure 3 is used to restore the backup settings in CMOS.
  • Password Setting is used to set the password for the user to enter the "Division Interface” in Figure 2 and the "Mirroring Interface” in Figure 3.
  • the first sector of track 0 of the hard disk is called MBR, and its size is 512 bytes, and this area can be divided into two parts.
  • the first part is the pre-boot area, which occupies 446 bytes; the second part is the Partition table (partition table), which occupies 66 bytes.
  • Partition table partition table
  • the present invention can recover the user file through the recovery of the mirror partition.
  • the present invention has a strong defense ability against the virus in the boot zone, and can also well resist the attack of the highly destructive CIH virus. If the user's computer is damaged by the CIH virus, the present invention can automatically recover the master boot record MBR of the main boot sector and the boot sector PBR of each partition before the computer starts the boot system, and attempt to recover the file allocation table FAT, (see In the case of CIH virus damage, CIH usually occurs on the 26th of each month. If the system fails to boot normally on the day, it should be shut down immediately to reduce the degree of damage), so that the system can basically boot.
  • This function is existing Anti-virus software does not have it; then use anti-virus software to remove the virus. It is more reliable to use the partition recovery function of the present invention to restore the mirrored content to a backup partition, but only if the data of the backup partition has been backed up and mirrored before being infected by a virus.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Techniques For Improving Reliability Of Storages (AREA)

Description

说明书 计算机硬盘数据备份及恢复方法 技术领域
本发明涉及一种用于对存储在计算机硬盘中的数据进行备份及 恢复的方法。 背景技术
硬盘作为计算机的一种最常用的外部存储器, 用于存储大量的 用户资料数据和系统信息, 其安全性和可靠性是十分重要的。 而用 户的误操作、 硬盘数据管理软件的缺陷和计算机病毒的袭击都有可 能破坏硬盘上有用数据, 一些引导型病毒还可以破坏硬盘上的参数 文件, 导致计算机软件系统的瘫痪及无法正常启动。 所以有必要对 硬盘数据进行备份。
在用于备份硬盘数据的现有技术中, 有一种硬盘救援卡, 它一 般安装在一个计算机扩展槽上或外接扩展接口上, 安装救援卡后, 需设置相应的参数并运行安装程序, 因此将占用系统资源, 如果其 中的软件升级, 则必须将该卡中存储软件的 ROM芯片及安装程序 升级, 因此使用不方便。 此外, 其硬件的质量和维护将变得复杂。 由于这种救援卡的程序和参数有部分存在硬盘的操作系统中, 如果 硬盘因病毒或其他原因而被破坏, 救援卡也就失去了作用。 而且一 般的救援卡只能保护一个硬盘, 并有可能同计算机主板不兼容。 因 此, 这种硬盘救援卡的作用受到了限制, 从而使得硬盘数据的安全 性和可靠性得不到充分的保障。 发明内容 本发明的目的在于提供一种计算机硬盘数据备份及恢复方法, 它能对硬盘中的数据进行安全可靠的备份及恢复, 从而对于因用户 操作失误或各种病毒感染等各种原因而对硬盘数据产生的破坏能够 进行迅速、 方便、 可靠的恢复。
本发明的技术方案如下:
根据本发明的一种计算机硬盘数据备份及恢复方法, 该方法包 括以下步骤:
( 1 )备份步骤, 用于对硬盘数据进行备份, 包括:
(a) . 在该硬盘中, 为该硬盘中存有需备份数据的备份分区 设置用于备份该分区之数据的镜像分区; 该镜像分区空间的大小可 与备份分区相等, 至少不小于备份分区的大小, 而备份分区的大小 可由用户指定;
(b) .将用户指定的备份分区的数据完整地备份到已设置的 对应的镜像分区内;
(c) . 隐藏镜像分区的空间;
(2)恢复步骤, 用于根据用户的指定而将镜像分区的硬盘数据 完整地恢复到所对应的备份分区内。
上述的备份步骤和恢复步骤可实现于计算机的开机或复位后的 启动过程中。 也可在计算机运行中的其它时间运行实现本发明的软 件。 在每一次的计算机启动过程中, 用户可根据需要执行这两个步 骤或其中的一个步骤。
在本发明中, 可以将硬盘中的系统主引导记录 MBR和系统引 导记录 PBR进行备份, 并分别在主引导记录和系统引导记录中设置 修改标志。 该修改标志用于监视和判断记录中的数据是否已被修改。
在本发明中, 所述的恢复步骤还可包括: 分别检测硬盘中的系 统主引导记录 MBR和系统引导记录 PBR中的修改标志位, 当检测 判断系统主引导记录 MBR和系统引导记录 PBR已被破坏时, 自动 用已备份的系统主引导记录 MBR和系统引导记录 PBR进行恢复, 并利用文件分配表 FAT2修复文件分配表 FAT1。 采用这种方式实现 文件分配表修复的前提是 FAT2表保存完整且未被破坏。
在本发明的一个实施例中, 隐藏镜像分区是通过对硬盘参数表 FDPT 中硬盘分区的扇区数进行修改实现的。 通过隐藏镜像分区的 硬盘扇区实现对镜像分区的隐藏。 实际上也可以通过其它的方法实 现对硬盘扇区的隐藏, 从而使得一般用户操作系统应用程序及计算 机病毒不能对镜像分区进行存取访问, 以达到保护硬盘备份数据的 目的。 隐藏镜像分区过程一般是在创建镜像分区之后由软件自动实 现的。
在本发明的一个实施例中, 可以通过对硬盘参数表 FDPT 中硬 盘分区的扇区数进行修改, 实现对备份分区的隐藏。 通过这种方式 也可以实现对硬盘数据的保护。 例如, 从实际总扇区数中减去所有 镜像分区的扇区数之和, 这样, 未经许可的用户访问不到隐藏分区。
在本发明中, 可以根据用户的指定, 将存储在计算机中的系统 配置数据备份在硬盘中。 例如将计算机中保存在 CMOS RAM (互补 金属氧化物半导体存储器) 中的系统配置信息进行备份。
在本发明的一个实施例中, 在进行数据备份或恢复时, 硬盘数 据从备份分区备份到镜像分区、 或从镜像分区恢复到备份分区的数 据传输模式可以采用可编程的输入输出访问 (PIO) 模式, 或者采用 直接存储器访问 (DMA) 模式。
在本发明的一个实施例中, 可以对计算机连接的多个硬盘进行 数据备份或数据恢复。
在本发明中, 备份分区及其所设置与之相对应的镜像分区可分 别设置在计算机所连接的不同的硬盘之空间中。 因此, 当备份分区 和镜像分区分别占用相应之硬盘的全部空间时, 可以实现硬盘的对 拷备份, 即可以用一个硬盘作为另一个硬盘的完整镜像备份, 以复 制整个硬盘中所有的数据。 镜像分区空间应不小于备份分区空间。 在本发明的一个实施例中, 所述的备份步骤或恢复步骤是由用 户在计算机开机或复位后之启动过程中的一段预定时间内按键盘上 一个预先设置的热键而启动的。
为了在计算机启动过程中启动本发明之方法, 可预先设置多个 热键, 当用户按不同的热键时, 所启动的备份步骤或恢复步骤之界 面显示在计算机的显示器上, 且所显示的界面内容采用不同的文字。 例如按不同的热键可进入中文界面或英文界面。 也可设置其它文字 的界面, 以适用于采用不同语言的用户。
在本发明的一个实施例中, 由用户设置一个分区属性, 用于禁 止或允许改写硬盘的主引导记录。 该分区属性作为一个用于禁止或 允许改写主引导记录的标志位, 利用它, 既可以保护主引导记录不 会受到未经允许的、 恶意的修改 (如计算机病毒的作用), 又不会影 响用户安装新系统等类似操作。 当该标志位被设置为 "禁止" 时, 禁止任何对主引导记录的改写, 使主引导扇区具有防写功能; 当该 标志位被设置为 "允许" 时, 允许对主引导记录的善意修改, 例如 用户在安装新的操作系统时对主引导记录的修改。 如果主引导记录 中上述的修改标志被改写, 可以确定这种修改是非善意修改。
在本发明中, 所备份的系统主引导记录 MBR、 系统引导记录 PBR、 系统配置数据以及硬盘分区信息数据、 镜像分区信息数据可 以存储在硬盘分区管理程序所能管理的空间之外的硬盘空间中, 使 得一般用户和计算机病毒不能对这些数据进行读写, 从而有效地保 护备份数据。
当发现系统主引导记录 MBR、 系统引导记录 PBR、 系统配置数 据以及硬盘分区信息数据、 镜像分区信息数据中相应的修改标志位 未经许可而被修改时, 在系统引导前自动将上述数据之备份进行恢 复。 还可根据需要对一些重要数据 (例如用户密码等) 进行备份及 改写监视, 一旦发现非善意的修改, 即可进行自动恢复。 本发明的方法可以是通过存储在计算机主板内的 ROM芯片中 的系统 BIOS (基本输入 /输出系统) 程序实现的。
本发明的方法可实现于计算机系统在开机或复位后的启动过程 中。 在该启动过程中, 可以由用户在硬盘上安装有不同操作系统的 分区中设置一个活动分区 (也称为已经激活的分区)。
本发明的基本原理就是为需备份的硬盘分区在同一硬盘或其它 硬盘中划分出一块相同大小的空间, 称作镜像分区, 将该备份分区 中的数据完整地复制到对应的镜像分区中, 达到安全备份的目的, 这块镜像分区作为硬盘的保留空间, 没有向操作系统报告, 因此是 不会被操作系统访问到的, 从而提高了存储在镜像分区中的备份数 据的安全可靠性。 本发明的唯一不足之处是它需要占用一些硬盘空 间, 而现在硬盘技术得到了高速发展, 硬盘容量变得越来越大, 成 本更低, 用户可以购买到大容量硬盘, 因此用户不会因应用本发明 而使用户的硬盘空间不足造成不便。 而且为了数据安全, 丧失小部 分硬盘空间不增加成本是很划算、 很值得的。
本发明能为用户提供可靠的硬盘数据备份及数据恢复、 CMOS 设置信息的备份和恢复, 并提供易于设置的多引导功能, 可使用户 在一个硬盘上安装的多个操作系统通过简单快捷的设置就可启动; 更加难能可贵的是本发明对各种引导型病毒、 以及 CIH等破坏力 极强的病毒有很好的免疫力, 通过迅速可靠地、 完全地恢复备份数 据和记录, 能够完全清除病毒对用户数据和系统信息的任何破坏; 与主板本身带有的 anti-viras的双重 BIOS (FLASH ROM) 防写功 能结合, 是一个防 CIH病毒的万全的解决方案。 另外实现本发明的 软件程序完全内建于 BIOS 芯片中, 不占硬盘, 不占内存, 不占系 统资源, 安装后对系统性能无任何影响, 是企业和个人电脑的首选 保护工具, 特别适用于对硬盘数据的安全可靠性要求较高的用户。 本发明对硬盘的分区可以进行完全地镜像备份、 恢复, 这样即 使是分区中的隐藏记录也不会被遗漏, 用户甚至可以恢复删除
(undelete)备份前的新删除文件; 而且这样的备份、 恢复将不会受 操作系统的限制。 本发明的计算机软件完全内建于 BIOS 中并存储 于 BIOS 芯片, 不占用硬盘空间, 整个安装过程也无需其他介质, 并很难被破坏, 同时提高了本发明对计算机的兼容性, 非常容易实 现软件的升级。本发明通过修改 FDPT(Fixed Disk Parameter Table), 即伪中断 41h/46h来隐藏镜像分区所占用的空间, 确保备份数据的 安全可靠性。 无暂驻内存; 在计算机每次启动前, 本发明会对硬盘 重要的数据区 (如主引导分区, 系统引导分区) 进行检査, 如果这 些重要数据被破坏, 可自动用预先的存储在硬盘镜像分区中的数据 备份去恢复, 同时, 如果硬盘文件分配表 FAT被破坏, 可进行修复 FAT表。 本发明同时附加了 CMOS的数据备份及恢复功能, 以及硬 盘分区的多引导功能, 在一个硬盘最多安装 4种操作系统, 并可以 自如切换, 而无需重启系统, 为了实现多引导, 还提供了将扩展分 区 (EXTENSION PARTITION ) 转化成标准分区 (PRIMARY PARTITION) 的功能。 本发明可自动识别并提示恢复以前的安装。 本发明操作简便, 运行速度快, 并可根据不同热键显示中英文两种 语言的不同界面(如另设置两个对应英文界面的热键)。 本发明的软 件可设置运行密码, 防止对硬盘分区及镜像分区做未经允许的修改, 密码存于硬盘内, 他人无法通过清除 CMOS而清除密码, 保密性高。 图面说明:
以下结合附图进一步说明本发明的优选实施例
图 1是本发明之实施例的工作流程图;
图 2是本发明之实施例在进行硬盘分区操作时的 "分区界面" 示意图; 图 3 是本发明之实施例在进行数据恢复和备份操作的 "镜像界 面"示意图。 本发明的实施例:
本发明的一个典型的实施例是申请人为个人计算机开发的关于 硬盘数据备份的软件系统, 用于保护硬盘中的数据或资料不丢失或 被病毒感染。 它采用 build-in-BIOS技术内建于 BIOS系统代码中, 即本发明的各项功能包括分区、 备份和恢复等程序都存储于 BIOS 芯片, 不占硬盘空间, 不占内存, 不占系统资源, 因此可兼容各种 计算机主板, 适用于各种操作系统, 且无需用户作任何软件安装, 无需额外的软盘或插卡; 当软件需要升级时也很方便, 只需从互连 网上下载最新的 BIOS即可。 该实施例支持所有类型的 IDE硬盘。 其基本流程和功能说明参见图 1至图 3及其以下的说明。
BIOS (基本输入 /输出系统) 是直接与计算机硬件打交道的底层 软件系统, 它为操作系统提供控制硬件设备的基本功能, BIOS存放 在只读存储芯片 ROM中, 即使关机或掉电后这些代码也不会消失。 优选的是, BIOS存储在 FLASH (快速擦写存储器) 芯片中。
如图 1所示, 当计算机开机启动或复位时, 系统 BIOS进行加 电自检 (POST), 由 BIOS检测系统关键设备是否存在和能否正常 工作, 对硬盘做安全检测, 初始化上电自举, 根据 CMOS设置进行 系统配置, 向操作系统报告硬件系统的配置表, 准备向操作系统提 交系统控制权。 在本实施例中, 在 BIOS 启动过程中为用户设置两 个热键, 分别为 (Ctrl+Tab)键和 (Home)键, 按 (Ctrl+Tab)键进 入实现 "硬盘分区" 功能(包括创建新分区和镜像分区) 的分区界 面, 如图 2所示; 按 (Home)键进入实现 "分区镜像"功能 (包括 数据备份和数据恢复) 的镜像界面, 如图 3 所示。 当用户完成了本 发明所提供的备份或恢复功能后、 或用户中断退出后, 由系统 BIOS 继续进行加电自检过程。
本领域技术人员应该理解的是, 启动实现本发明之功能的相关 软件并不一定非要通过热键, 其他方法也可以激活此功能, 例如可 以在 CMOS的设置界面中设置一个选项, 由用户点击进入。
联想计算机主板就可配备根据本发明之实施例的功能软件。 它 们可以备份、 保护并且立即恢复硬盘资料, 防止重要资料丢失。 进 一步, 在本发明之实施例中还能保护和恢复 CMOS 的数据。 因为 本发明之实施例的软件是建立 BIOS 中, 只要计算机进入 BIOS 启 动步骤后, 就可以立即进入本发明之实施例的软件界面, 用户可以 选择是否备份系统盘或数据盘。 该软件就会在硬盘中选择一个区域 存放备份的资料, 从此这块区域就不再允许其它软件或硬件的访问, 包括病毒。 例如, 当病毒袭击了系统盘, 重要的数据丢失了, 操作 系统根本无法工作了, 利用本发明的软件系统就可以把备份资料恢 复到系统盘中, 用户的计算机又恢复了正常。 根据本发明的软件还 有很强的防病毒功能, 它可以把任何病毒都关在备份区外。 如果再 加上联想 QDI的无敌锁功能 (主要是保护 BIOS的物理存储介质比 如 FLASH ROM免受一些恶意攻击的病毒), 则利用本发明之实施 例完全可以防止病毒袭击 (如 CIH病毒)。 而且不像一般的救援卡 只能保护一个硬盘, 利用本发明的实施例最多可以保护四个硬盘。
当用户计算机是第一次运行本发明之系统时, 程序会分析硬盘 的原有分区系统, 并显示前 4个分区的状况, 如果原硬盘存在扩展 分区且分区数目超过 4个, 系统会提示用户删除多于 4个的分区, 这是因为每个硬盘最多能支持 4个主分区; 如果分区数目并不多于 4个, 系统会提示用户是否在原分区基础上安装运行本系统, 这将 会把原有扩展分区转化为正常分区, 并有可能改变分区盘符的顺序, 但并不改变原有分区中的内容。 系统还会提供另一种方案供用户选 择, 即删除原有的全部分区记录, 提供一个完全干净的硬盘空间, 但这样做会导致原有数据全部丢失, 用户在使用这一方案时应注意。 图 2列出了 "分区界面"所包括的功能, 其中的 "新建分区" 用于创建一个新分区, 进入后, 系统会提示是否对当前分区设置镜 像, 如果用户要设置镜像, 则可输入分区的大小, 此时提示的最大 可分配空间为剩余空间的一半, 因为系统将会在硬盘上为新分区划 出一块相同大小的镜像, 另外向操作系统汇报的硬盘容量也会相应 减少。 图 2 中的 "删除分区"用于删除现有分区中的最后一个分区 及其镜像。 为了保证硬盘空间的连续性, 只允许删除最后一个分区。 图 2 中的 "激活分区"用于使用户根据需要在硬盘已安装好的多个 操作系统分区中选择一个分区, 设置为活动分区, 实现多引导功能。 例如硬盘中的 C、D分区分别安装有中文 Windows 98和英文 Windows 95系统,用户选择 C或 D为活动分区以启动相应的系统。在图 2中, 在 "分区 C"左边所标示的 "A"表示该分区 C 已被激活(设置为 活动分区)。 "创建镜像"是为现有分区中不存在镜像的分区追加镜 像, 除非硬盘可用空间不足。 图中的分区 C和 E已创建相应的镜像 分区。 "删除镜像"是为现有分区中带有镜像的分区删除镜像。 为了 保证硬盘空间的连续性, 只允许删除最后一个带有镜像的分区的镜 像。 "卸载软件"是将本发明之程序卸载, 卸载过程在用户确认后, 瞬间即可完成。
当用户进入图 2所示的分区界面或图 3所示的镜像界面时, 仍 可以通过热键进行两界面间的直接切换。 如按 Home键或 Ctrl+Tab 键。
如图 3 所示, 图中的 "分区备份"用于将用户指定分区中的内 容备份到镜像分区中, 如果该分区以前做过备份, 系统会提示上一 次备份的时间并让用户确认, 确认后进行数据备份。 "分区恢复"用 于将镜像分区中的内容恢复到对应分区中, 例如现有分区 C、 D、 E、 F中, 为 C、 E建立镜像分区 C'、 E', 如恢复分区 C, 则将镜像分 区 c' 恢复到分区 c中。 当存在两个以上的硬盘时, 分区的标识由 C、 D、 E、 F转化为 1、 2、 3、 4, 以示区别, 如图 3所示。
执行分区备份或分区恢复时, 可采用可编程的输入输出访问 (PIO) 模式或直接存储器访问 (DMA)模式。 采用 PIO模式时, 由于此时 BIOS 的运行处于加电自检阶段 (POST), 可充分利用当 前较大的内存空间作为缓存器(此时操作系统尚未载入内存), 每次 从硬盘中读取一块定量的数据且无需寻道, 再放置在内存中, 当内 存可用空间中存放的数据已满后, 再将内存中的数据成块地写入镜 像分区或备份分区, 从而提高了数据备份或恢复的速度。 本实施例 可以达到每秒 5M的拷贝速度。 采用例如 ultra DMA (超级 DMA) 模式, 则数据拷贝速度在理论上可达到每秒 100M。
图 3 的 "分区属性"的设置, 允许计算机在进入操作系统后, 重新设置分区属性。 例如在安装操作系统时, 或需要对分区属性进 行修改(如将 FAT16改为 FAT32) 时, 用户设置此项为 "开", 这时 该分区为通用 IDE设备, 允许如安装操作系统时对系统属性的善意 修改, 并取消对 MBR的监视; 系统安装后自动备份 MBR和 PBR。 当分区属性设为 "关"时, 禁止任何对分区属性的改写操作。 图 3 的 "CMOS备份"用于将 CMOS中的内容备份在硬盘中。 CMOS中 一般存储有计算机系统配置的内存、 显卡、 硬盘、 软驱、 光驱、 串 行通信口、 并行输出口等配置设备参数、 以及时间、 密码等设置信 息, 一旦被破坏, 系统也无法启动。 根据本发明将 CMOS的内容进 行备份, 安全可靠, 易于恢复。 图 3 中的 "CMOS恢复"是用于恢 复 CMOS中的备份设置。 "密码设置"用于设置用户进入图 2的 "分 区界面"和图 3的 "镜像界面"的密码。
硬盘的 0磁道的第一个扇区称为 MBR, 它的大小是 512字节, 而这个区域可以分为两个部分。 第一部分为 pre-boot区, 占 446字 节; 第二部分是 Partition table (分区表), 占 66个字节, 这个区相 当于一个小程序, 它的作用就是判断哪个分区被标记为活动分区, 然后去读取那个分区的 boot区, 并运行该区中的代码。 一旦该扇区 的数据被破坏, 硬盘可能无法启动。
本发明对于感染文件的病毒, 通过镜像分区的恢复即可将用户 文件恢复。 另一方面, 本发明对于引导区病毒有较强的防御能力, 而且也能很好地抵御破坏性非常强的 CIH病毒的攻击。 如果用户计 算机受到了 CIH病毒的破坏, 本发明可在计算机启动引导系统前自 动恢复主引导扇区之主引导记录 MBR及每个分区的引导扇区 PBR, 并试图恢复文件分配表 FAT, (视 CIH病毒破坏的情况, CIH—般在 每个月的 26号发作, 如果当天系统不能正常引导, 应立刻关机, 以 减少受破坏的程度), 使系统能基本引导, 这一功能是现有的反病毒 软件所不具备的; 然后再用杀毒软件清除病毒。 更可靠的是利用本 发明的分区恢复功能, 将镜像的内容恢复到备份分区, 但前提是在 受病毒感染前已对备份分区的数据进行备份镜像分区。

Claims

权利要求
1、一种计算机硬盘数据备份及恢复方法,该方法包括以下步骤:
( 1 ) 备份步骤, 用于对硬盘数据进行备份, 包括:
(a) . 在该硬盘中, 为该硬盘中存有需备份数据的备份分区 设置用于备份该分区之数据的镜像分区;
(b) . 将用户指定的备份分区的数据完整地备份到已设置的 对应的镜像分区内;
(c) . 隐藏镜像分区的空间;
(2) 恢复步骤, 用于根据用户的指定而将镜像分区的硬盘数据 完整地恢复到所对应的备份分区内。
2、根据权利要求 1所述的方法, 其中, 所述的备份步骤还包括: 将硬盘中的系统主引导记录 MBR和系统引导记录 PBR进行备份, 并分别在主弓 I导记录和系统弓 I导记录中设置修改标志。
3、根据权利要求 2所述的方法, 其中, 所述的恢复步骤还包括: 分别检测硬盘中的系统主引导记录 MBR和系统引导记录 PBR中的 修改标志位, 当检测判断系统主引导记录 MBR和系统引导记录 PBR 已被破坏时, 自动用已备份的系统主引导记录 MBR和系统引导记 录 PBR进行恢复, 并利用完好的文件分配表 FAT2修复文件分配表 FATl c
4、 根据权利要求 1所述的方法, 其中, 在所述备份步骤中, 隐 藏镜像分区是通过对硬盘参数表 FDPT 中硬盘分区的扇区数进行修 改实现的。
5、 根据权利要求 1所述的方法, 其中还包括: 通过对硬盘参数 表 FDPT中硬盘分区的扇区数进行修改, 实现对备份分区的隐藏。
6、 根据权利要求 1所述的方法, 其中, 所述的备份步骤还包括: 根据用户的指定, 将存储在计算机中的系统配置数据备份在硬盘中。
7、 根据权利要求 1所述的方法, 其中, 在所述的备份步骤和恢 复步骤中, 备份数据和恢复数据的传输模式是采用可编程的输入输 出访问 (PIO) 模式或直接存储器访问 (DMA)模式。
8、 根据权利要求 1所述的方法, 其中, 对计算机连接的多个硬 盘进行数据备份或数据恢复。
9、 根据权利要求 1所述的方法, 其中, 备份分区及其对应的镜 像分区分别被设置在计算机的不同的硬盘之空间中。
10、 根据权利要求 1 所述的方法, 其中, 所述的备份步骤或恢 复步骤是由用户在计算机开机或复位后之启动过程中的一段预定时 间内按键盘上一个预先设置的热键而启动的。
11、 根据权利要求 10所述的方法, 其中, 预先设置多个热键, 当用户按不同的热键时, 所启动的备份步骤或恢复步骤之界面显示 在计算机的显示器上, 且所显示的界面内容采用不同的文字。
12、 根据权利要求 1 所述的方法, 其中还包括: 由用户设置一 个分区属性, 用于禁止或允许改写硬盘的主引导记录。
13、 根据权利要求 1或 2、 或 4至 12中任一项所述的方法, 其 中, 所备份的系统主引导记录 MBR、 系统引导记录 PBR、 系统配置 数据以及硬盘分区信息数据、 镜像分区信息数据存储在操作系统之 硬盘管理程序所能管理的空间之外的硬盘空间中。
14、 根据权利要求 1或 2、 或 4至 12中任一项所述的方法, 其 中, 当发现系统主引导记录 MBR、 系统引导记录 PBR、 系统配置数 据以及硬盘分区信息数据、 镜像分区信息数据中相应的修改标志位 未经许可而被修改时, 在系统引导前自动将上述数据之备份进行恢 复。
15、 根据权利要求 1或 2、 或 4至 12中任一项所述的方法, 其 中, 该方法的各步骤是通过存储在计算机主机板内的 ROM芯片中 的系统 BIOS程序实现的。
16、 根据权利要求 1或 2、 或 4至 12中任一项所述的方法, 其 中, 该方法实现于计算机系统开机或复位后进行启动引导的过程中。
17、 根据权利要求 16所述的方法, 其中还包括: 在硬盘上安装 有不同操作系统的分区中设置一个活动分区。
PCT/CN2001/001298 2001-08-31 2001-08-31 Procede de sauvegarde et de recuperation de donnees sur le disque dur d'un ordinateur WO2003050683A1 (fr)

Priority Applications (7)

Application Number Priority Date Filing Date Title
PCT/CN2001/001298 WO2003050683A1 (fr) 2001-08-31 2001-08-31 Procede de sauvegarde et de recuperation de donnees sur le disque dur d'un ordinateur
EP01982085A EP1434135B1 (en) 2001-08-31 2001-08-31 Method for backing up and recovering data in the hard disk of a computer
AU2002213779A AU2002213779A1 (en) 2001-08-31 2001-08-31 Method for backing up and recovering data in the hard disk of a computer
DE60131028T DE60131028D1 (de) 2001-08-31 2001-08-31 Verfahren zum sichern und wiederherstellen von daten in der festplatte eines computers
US10/488,117 US7146525B2 (en) 2001-08-31 2001-08-31 Method for backing up and recovering data in the hard disk of a computer
CN01823593.XA CN1241120C (zh) 2001-08-31 2001-08-31 计算机硬盘数据备份及恢复方法
AT01982085T ATE376213T1 (de) 2001-08-31 2001-08-31 Verfahren zum sichern und wiederherstellen von daten in der festplatte eines computers

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2001/001298 WO2003050683A1 (fr) 2001-08-31 2001-08-31 Procede de sauvegarde et de recuperation de donnees sur le disque dur d'un ordinateur

Publications (2)

Publication Number Publication Date
WO2003050683A1 true WO2003050683A1 (fr) 2003-06-19
WO2003050683A8 WO2003050683A8 (fr) 2004-05-21

Family

ID=4574857

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2001/001298 WO2003050683A1 (fr) 2001-08-31 2001-08-31 Procede de sauvegarde et de recuperation de donnees sur le disque dur d'un ordinateur

Country Status (7)

Country Link
US (1) US7146525B2 (zh)
EP (1) EP1434135B1 (zh)
CN (1) CN1241120C (zh)
AT (1) ATE376213T1 (zh)
AU (1) AU2002213779A1 (zh)
DE (1) DE60131028D1 (zh)
WO (1) WO2003050683A1 (zh)

Families Citing this family (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1421854A (zh) * 2001-11-28 2003-06-04 劲永国际股份有限公司 用于硬盘及固态盘上对资料加密保护资料安全性的方法
TW591395B (en) * 2003-02-27 2004-06-11 Acer Inc Recovery method of multi-functional operating system and system thereof
US7305577B2 (en) * 2003-04-11 2007-12-04 Star Softcomm Pte Ltd Data isolation system and method
JP4462849B2 (ja) * 2003-05-30 2010-05-12 株式会社日立製作所 データの保護装置、方法およびプログラム
KR101115486B1 (ko) * 2003-08-08 2012-02-27 엘지전자 주식회사 컴퓨터 시스템의 부팅 제어 장치 및 방법
JP2005107608A (ja) * 2003-09-29 2005-04-21 Nec Electronics Corp 電子機器、不揮発性メモリ及び不揮発性メモリのデータ書き換え方法
US7516355B2 (en) * 2004-11-05 2009-04-07 Broadcom Corporation Method and computer program product for backing up and restoring online system information
US20060200414A1 (en) * 2005-02-14 2006-09-07 Roberts Henry A Jr Methods of copy protecting software stored on portable memory
US7991850B2 (en) 2005-07-28 2011-08-02 Advanced Micro Devices, Inc. Resilient system partition for personal internet communicator
KR100750132B1 (ko) 2005-09-27 2007-08-21 삼성전자주식회사 부팅, 소프트웨어 자동 업데이트 및 에러 복원 방법과 그시스템, 그 방법을 기록한 컴퓨터 판독 가능한 기록매체
KR100698141B1 (ko) * 2005-10-26 2007-03-22 엘지전자 주식회사 무선 주파수 교정 데이터 복구 기능을 갖는 이동통신단말기 및 교정 데이터 백업 및 복원 방법
US8595387B2 (en) * 2005-10-26 2013-11-26 Hewlett-Packard Development Company, L.P. SMM-dependent GPIO lock for enhanced computer security
US7480829B2 (en) * 2005-11-15 2009-01-20 International Business Machines Corporation Method, system and computer program product for recovery of formatting in repair of bad sectors in flash memory
CN100437501C (zh) * 2005-12-14 2008-11-26 英业达股份有限公司 资料备份系统与方法及其恢复系统与方法
KR100746032B1 (ko) * 2006-01-04 2007-08-06 삼성전자주식회사 마스터 부트 레코드를 관리하는 저장 매체 및 상기 저장매체를 이용한 컴퓨터 시스템의 부팅 방법
US8347137B1 (en) * 2006-02-03 2013-01-01 Acronis International Gmbh System and method for bare metal restore of a computer over a network
US7793148B2 (en) * 2007-01-12 2010-09-07 International Business Machines Corporation Using virtual copies in a failover and failback environment
US7617374B2 (en) * 2007-02-26 2009-11-10 Inventec Corporation Hard disk testing method under extensible firmware interface
US8117162B2 (en) * 2007-03-21 2012-02-14 International Business Machines Corporation Determining which user files to backup in a backup system
US20090083580A1 (en) * 2007-09-20 2009-03-26 Postage Robert B Techniques for Background Testing a Hard Disk Drive
US8412905B2 (en) * 2009-01-01 2013-04-02 Sandisk Il Ltd. Storage system having secondary data store to mirror data
US8949565B2 (en) * 2009-12-27 2015-02-03 Intel Corporation Virtual and hidden service partition and dynamic enhanced third party data store
US8521972B1 (en) 2010-06-30 2013-08-27 Western Digital Technologies, Inc. System and method for optimizing garbage collection in data storage
CN101916234A (zh) * 2010-08-16 2010-12-15 深圳市江波龙电子有限公司 一种存储设备的信息维护方法及系统
CN102135926A (zh) * 2011-03-18 2011-07-27 浪潮电子信息产业股份有限公司 一种可防硬盘清零或低格的数据保存方法
US9189392B1 (en) 2011-06-30 2015-11-17 Western Digital Technologies, Inc. Opportunistic defragmentation during garbage collection
US9158670B1 (en) 2011-06-30 2015-10-13 Western Digital Technologies, Inc. System and method for dynamically adjusting garbage collection policies in solid-state memory
US8826080B2 (en) 2011-07-29 2014-09-02 The Boeing Company Methods and systems for preboot data verification
CN102298545B (zh) * 2011-08-23 2014-03-19 晨星软件研发(深圳)有限公司 一种系统启动引导处理方法及装置
US8819375B1 (en) 2011-11-30 2014-08-26 Western Digital Technologies, Inc. Method for selective defragmentation in a data storage device
US8788778B1 (en) 2012-06-04 2014-07-22 Western Digital Technologies, Inc. Garbage collection based on the inactivity level of stored data
CN102831036A (zh) * 2012-08-30 2012-12-19 天津火星科技有限公司 一种基于磁盘分区的持续数据保护方法
TWI468913B (zh) * 2012-12-12 2015-01-11 Asustek Comp Inc 電腦系統及其啟動與設定方法
CN103577246B (zh) * 2013-11-12 2017-05-31 浙江云巢科技有限公司 防止虚拟机逃逸的方法和装置
CN105373339B (zh) * 2014-08-29 2019-02-12 深圳市金胜电子科技有限公司 一种硬盘数据的拷贝方法及系统
CN104657236A (zh) * 2015-03-11 2015-05-27 深圳市新岸通讯技术有限公司 基于32位MCU的嵌入式Linux文件系统及其运行方法
JP6543122B2 (ja) * 2015-07-17 2019-07-10 キヤノン株式会社 情報処理装置と、前記情報処理装置による不揮発記憶装置の初期化方法、及びプログラム
US10191811B2 (en) * 2015-08-13 2019-01-29 Quanta Computer Inc. Dual boot computer system
CN107765990A (zh) * 2016-08-17 2018-03-06 中兴通讯股份有限公司 一种系统磁盘管理方法和装置
CN106528345B (zh) * 2016-11-11 2020-03-06 郑州云海信息技术有限公司 一种基于云平台的节点硬盘自动化恢复方法
US11704197B2 (en) * 2019-10-22 2023-07-18 Ncr Corporation Basic input/output system (BIOS) device management
CN112416657B (zh) * 2020-12-09 2023-05-09 成都傲梅科技有限公司 一种系统克隆方法
CN112965861A (zh) * 2021-03-15 2021-06-15 中电科技(北京)有限公司 系统备份及还原的方法、bios和计算机

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1173669A (zh) * 1997-07-31 1998-02-18 周恽 计算机硬盘存储内容透明保护的方法及其装置
TW337011B (en) * 1997-08-06 1998-07-21 Jyh-Yeong Lay Protective recovery card for hard disk system
US5887128A (en) * 1994-04-14 1999-03-23 International Business Machines Corporation Method and apparatus for redundant disk storage system with offset
CN1310389A (zh) * 2000-02-21 2001-08-29 英业达股份有限公司 计算机硬盘数据复制方法及系统

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5544347A (en) * 1990-09-24 1996-08-06 Emc Corporation Data storage system controlled remote data mirroring with respectively maintained data indices
DE69131551T2 (de) * 1990-11-09 2000-02-17 Emc Corp Logische Aufteilung eines Speichersystems mit redundanter Matrix
US6381694B1 (en) * 1994-02-18 2002-04-30 Apple Computer, Inc. System for automatic recovery from software problems that cause computer failure
US5764903A (en) * 1994-09-26 1998-06-09 Acer America Corporation High availability network disk mirroring system
US5826012A (en) * 1995-04-21 1998-10-20 Lettvin; Jonathan D. Boot-time anti-virus and maintenance facility
JPH09305328A (ja) * 1996-05-13 1997-11-28 Fujitsu Ltd ディスクアレイ装置
US5819310A (en) * 1996-05-24 1998-10-06 Emc Corporation Method and apparatus for reading data from mirrored logical volumes on physical disk drives
US5857208A (en) * 1996-05-31 1999-01-05 Emc Corporation Method and apparatus for performing point in time backup operation in a computer system
US6477627B1 (en) * 1996-05-31 2002-11-05 Emc Corporation Method and apparatus for mirroring data in a remote data storage system
KR100275900B1 (ko) * 1996-09-21 2000-12-15 윤종용 알에이아이디 서브시스템에 있어서 분할패러티 예비 디스크 구현방법
US6233696B1 (en) * 1997-12-31 2001-05-15 Emc Corporation Data verification and repair in redundant storage systems
US6430663B1 (en) * 1998-07-06 2002-08-06 Adaptec, Inc. Methods for selecting a boot partition and hiding a non-selected partition
US6195695B1 (en) * 1998-10-27 2001-02-27 International Business Machines Corporation Data processing system and method for recovering from system crashes
JP2001356945A (ja) * 2000-04-12 2001-12-26 Anetsukusu Syst Kk データバックアップ・リカバリー方式
US6792556B1 (en) * 2000-05-31 2004-09-14 Dell Products L.P. Boot record recovery
GB2368412A (en) * 2000-10-26 2002-05-01 Hewlett Packard Co Managing disk drive replacements
US6813688B2 (en) * 2000-12-04 2004-11-02 Sun Microsystems, Inc. System and method for efficient data mirroring in a pair of storage devices
US6785838B2 (en) * 2001-02-13 2004-08-31 Sun Microsystems, Inc. Method and apparatus for recovering from failure of a mirrored boot device
US6742138B1 (en) * 2001-06-12 2004-05-25 Emc Corporation Data recovery method and apparatus
US6711660B1 (en) * 2001-06-22 2004-03-23 Western Digital Ventures, Inc. System and method for performing disk drive diagnostics and restoration using a host-inaccessible hidden partition
US7000142B2 (en) * 2002-07-25 2006-02-14 Lsi Logic Corporation Mirrored extensions to a multiple disk storage system
US7188272B2 (en) * 2003-09-29 2007-03-06 International Business Machines Corporation Method, system and article of manufacture for recovery from a failure in a cascading PPRC system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5887128A (en) * 1994-04-14 1999-03-23 International Business Machines Corporation Method and apparatus for redundant disk storage system with offset
CN1173669A (zh) * 1997-07-31 1998-02-18 周恽 计算机硬盘存储内容透明保护的方法及其装置
TW337011B (en) * 1997-08-06 1998-07-21 Jyh-Yeong Lay Protective recovery card for hard disk system
CN1310389A (zh) * 2000-02-21 2001-08-29 英业达股份有限公司 计算机硬盘数据复制方法及系统

Also Published As

Publication number Publication date
EP1434135A1 (en) 2004-06-30
EP1434135A4 (en) 2005-01-12
WO2003050683A8 (fr) 2004-05-21
EP1434135B1 (en) 2007-10-17
AU2002213779A1 (en) 2003-06-23
DE60131028D1 (de) 2007-11-29
US20050015652A1 (en) 2005-01-20
CN1241120C (zh) 2006-02-08
CN1545657A (zh) 2004-11-10
US7146525B2 (en) 2006-12-05
ATE376213T1 (de) 2007-11-15

Similar Documents

Publication Publication Date Title
WO2003050683A1 (fr) Procede de sauvegarde et de recuperation de donnees sur le disque dur d'un ordinateur
JP3539907B2 (ja) ブート可能プログラムを備えたコンピュータ
US7818617B2 (en) Operating system and data protection
US7111203B2 (en) Method for implementing data backup and recovery in computer hard disk
US7913113B2 (en) Self-managed processing device
CN100389408C (zh) 硬盘数据加密备份及还原方法
JP4690310B2 (ja) セキュリティシステム及びその方法
US6167494A (en) Method and system for recovering from operating system failure
WO2003042840A1 (fr) Procede de sauvegarde et de recuperation de donnees dans un disque dur
US7827376B2 (en) System and method for protecting hidden protected area of HDD during operation
EP3627368B1 (en) Auxiliary memory having independent recovery area, and device applied with same
WO2006058472A1 (fr) Procede d'etablissement d'un environnement d'execution securisee dans un ordinateur
US6016536A (en) Method for backing up the system files in a hard disk drive
US20040268079A1 (en) Method and system for providing a secure rapid restore backup of a raid system
US6907524B1 (en) Extensible firmware interface virus scan
US8522084B2 (en) Computer system and method employing separate storage area for computer program recovery
US20030182527A1 (en) Write Protection State Change Initiation Sequence
CN113553006A (zh) 一种实现向只读分区写数据的安全加密存储系统
CN100437500C (zh) 用于软件系统保护的软件系统保护点还原方法和装置
CN100514305C (zh) 实现操作系统安全控制的系统及方法
JP3194900B2 (ja) ハードディスクドライブを有するコンピュータのメモリ管理方法
KR101008939B1 (ko) 펌웨어기반 데이터 삭제 방지 시스템 및 방법
US20240152469A1 (en) Self-Detecting and Data Rewriting System and Application Method Thereof
CN110622163B (zh) 具有独立恢复区域的辅助存储装置及适用其的设备
KR20020037610A (ko) 하드디스크 백업 및 복구방법

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2001823593X

Country of ref document: CN

WWE Wipo information: entry into national phase

Ref document number: 2001982085

Country of ref document: EP

CFP Corrected version of a pamphlet front page

Free format text: UNDER (72, 75) THE NAME OF "ZHANG , DANFENG" IN CHINESE CORRECTED

WWP Wipo information: published in national office

Ref document number: 2001982085

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 10488117

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: JP

WWG Wipo information: grant in national office

Ref document number: 2001982085

Country of ref document: EP