Hard disk copying-proof method
A hard disk and recording technology, applied in the direction of preventing unauthorized use of memory, etc., can solve problems such as increased hardware cost, difficulty in large-scale duplication, different hard disk capacity and specifications, and achieve the effect of improving reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] The file system is the basis for the operating system to access files in the disk. Any data file system stored on the disk will have records, and the operating system uses these records to achieve the purpose of file access.
[0024] Referring to Figure 1, user 1 issues a read or write command to operating system 2. The operating system 2 searches the file system 3 according to the command from user 1 and the file name of the target data 4, and executes the command when the target is found. .
[0025] After a general electronic device such as a desktop computer (hereinafter referred to as a computer) is turned on and the POWER On Self Test (POST) is completed, an instruction (INT 19) is called, and the instruction sets the 0th magnetic column ( Cylinder), the 0th side (Head), and the first sector (Sector) are loaded to the hard disk, and this sector loaded is the master boot record of the disk, and then the command transfers the control of the system to the master boot reco...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 