Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for protecting data of hard disk

A hard disk and data technology, which is applied in the fields of electrical digital data processing, internal/peripheral computer component protection, instruments, etc., can solve problems such as theft and insufficient hard disk information security protection

Inactive Publication Date: 2008-06-18
邹丽丽
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when the password approved by the password protection program is cracked or stolen, or the hard disk in the computer system is stolen, and it is directly installed in another computer and turned on, the other computer can access the data in the hard disk. , at this time, there is no protective measure in the hard disk, and the important data in the hard disk will be stolen by others arbitrarily. In other words, the current hard disk has the problem of insufficient information security protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting data of hard disk
  • Method for protecting data of hard disk
  • Method for protecting data of hard disk

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention is a method for protecting hard disk data, please refer to figure 1 and figure 2 As shown, the method for protecting hard disk data of the present invention is applied to a hard disk. After the hard disk is set and protected by the application program, at least the protection program storage area 1, the hard disk identification code area 2 and the backup disk partition table area 3 are planned in the hard disk in advance. And when the computer completes the self-test and initialization (BIOS POST), it first reads the protection program stored in the protection program storage area 1, and performs processing according to the steps set by the protection program. The steps of the protection program include:

[0023] Step 10. The computer reads the hard disk identification code previously stored in the hard disk identification code area 2;

[0024] Step 11. The computer judges whether the hard disk identification code is the same as a computer identifica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method used for protecting data in a hard disk and is applied to the hard disk; when a computer implements X-code of the hard disk, the hard disk can be read and the processing of activating an operating system can be finished if an identification code of the hard disk recorded by the hard disk is judged to be identical to an identification code designed by a computer; or the content in a splitting area of a disk in record of a master boot is cleaned up, therefore the hard disk can not be read and the processing of activating the operating system can not be finished. When the hard disk is stolen, another computer can not read the hard disk and finish the boot action, thus achieving the aim of protecting the data of the hard disk.

Description

Technical field [0001] The present invention relates to a hard disk, in particular to a method in which the hard disk stores the hard disk identification code in advance, and the hard disk can only read data on a computer with a computer identification code that matches the hard disk identification code, and specifically is a method for protecting the hard disk data method. Background technique [0002] Nowadays, our lives are entering an information age where the electronics industry is booming. All kinds of high-tech electronic products derived from calculators are swift and rapid. They have indeed brought great breakthroughs to the development of human science and technology. However, with the current With the continuous development and advancement of various electronic technologies, various computer systems have become more and more powerful, and these computer systems are usually equipped with at least one hard disk (Hard Disk). Regardless of whether the hard disk has the fu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F12/14G06F9/445G06F21/02G06F21/79
Inventor 卢盈志
Owner 邹丽丽
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products