Data transparency protected safety read-write system and method

A technology of transparent protection and data protection, applied in electronic digital data processing, computer security devices, protection of internal/peripheral computer components, etc., can solve the problems of intercepting I/O instructions, occupation, and inability to completely prevent viruses and Trojan programs. , to achieve the effect of high availability and security

Inactive Publication Date: 2009-02-25
LENOVO (BEIJING) LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] But this method has three major problems. The first problem is that there is no way to completely prevent viruses and Trojan programs from directly modifying the hard disk sector data through the I / O instructions provided by the hard disk controller itself, because the existing technical solutions have no way to intercept from the lower layer. I / O commands, such as Crdisk, a hard disk protection nemesis software circulating on the Internet, can crack all hard disk protection systems, and even clear the data of the entire partition. The countermeasures taken by hard disk protection system software developers are only It may be based on the principle of preventing known viruses to monitor this known malicious software and prevent it from running in the operating system, but the software Crdisk can easily avoid this monitoring
[0005] The second problem is that a hard disk access filter driver needs to be installed on the operating system, and different filter drivers need to be developed for different types of operating systems. This is not a transparent protection method. The function of accessing the hard disk should be limited, including the disk manager and defragmentation function. This kind of complexity prevents the popularization of such functions among ordinary computer users.
[0006] The third problem is that this kind of protection software needs to occupy one or several of the reserved sectors sector1~sector62 in the main boot sector (Main Boot Record, MBR). Sector software conflicts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transparency protected safety read-write system and method
  • Data transparency protected safety read-write system and method
  • Data transparency protected safety read-write system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] Attached below Figure 1~5 The system and method for transparent protection of storage device data of the present invention are further described in detail.

[0062] The present invention is particularly described in terms of a computer data transparent protection system and method, but the present invention is equally applicable to any device other than the above-mentioned storage device, such as the case of a storage device of a mobile communication device.

[0063] The core point of the present invention is to run a virtual machine monitor (Virtual Machine Monitor, VMM) earlier on the hardware platform, reside and run the data protection module 1 in the virtual machine monitor, and the operating system runs on the virtual machine monitor (VMM) , the data protection module 1, with the support of the CPU, intercepts all the I / O instructions of the operating system itself and programs running on the operating system to access the computer storage device, and redirects t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses one data transparent protection safety write system and method, which comprises hardware platform, virtual monitor and at least one operation system, wherein, the platform comprises memory device composed of data preservation area to store each data protection point MBR and file align list and status list; the virtual monitor comprises data protection module to set protection points and to store the MBR and list and point status into the preservation area for change operation on the protection point; capture operation system and the program in it visit memory device I / O operation order and directing the orders into accurate position on the memory device.

Description

technical field [0001] The invention relates to the technical field of data storage security, in particular to a secure writing system and method for data transparent protection. Background technique [0002] It has become a common demand to protect the data in the hard disk partition from intentional damage or accidental deletion, especially in the context of the increasing frequency of unknown new viruses, the operating system and application software installed in the hard disk Real-time protection of user data has obvious economic value. Therefore, in the past 10 years, hard disk protection software and hard disk protection cards have gradually been applied to ordinary office computers and even home computers. . [0003] The technical schemes used by various existing hard disk data protection systems are very similar. It corresponds to the existing computer architecture, that is, after the BIOS is initialized, a real-mode program is run to replace the interface INT13 for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14G06F21/00G06F21/79
Inventor 王晚丁
Owner LENOVO (BEIJING) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products