Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for data protection of memory device

A technology for storing devices and data, applied in program control devices, preventing unauthorized use of memory, program loading/starting, etc. It can solve hidden partitions that are easy to be mounted, lack of MBR protection, and it is difficult for third-party tools to clear HPA, etc. question

Active Publication Date: 2008-09-24
LENOVO (BEIJING) CO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this method also has certain problems, using the Readmaxaddress (ext) and Setmaxaddress (ext) instructions in the ATA / ATAI6 instruction means that the storage device needs to be customized to use this method, which increases the cost; The execution of the above instructions by the storage device involves the correlation between the motherboard and the storage device, and the manufacturer's program needs to be customized and upgraded for different motherboards; at the same time, it is difficult for users to use third-party tools to clear the HPA
[0004] Another method in the current industry is to store the manufacturer's program in a certain partition of the storage device, which is marked as 12H or 1CH (or other industry-specified values) in the master boot record (MBR, Master Boot Record). In this way, the operating system will think that the partition is a hidden partition. Although it can be seen in the disk manager that the partition is of the Extended Industry Standard Architecture (EISA, Extended Industry Standand Architecture) type, there is no way to operate it, and the Bootloader is stored in the MBR. , the Bootloader program will be called when the BIOS ends
The disadvantage of this method is that it relies too much on the MBR, and the MBR lacks the necessary protection and is easily damaged; at the same time, such a hidden partition is easy to be mounted, resulting in the visibility of the manufacturer's program and loss of protection; at the same time, the structure stored in some manufacturer's programs is easy to be cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for data protection of memory device
  • Method and apparatus for data protection of memory device
  • Method and apparatus for data protection of memory device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to be able to provide more reliable protection for the manufacturer’s programs stored in the computer storage device, the present invention proposes a method for protecting the data in the storage device. At the same time, in order to describe the technical solution of the present invention more clearly, implement The specific data in the example specifically refers to the manufacturer's program.

[0031] In the computer architecture, the computer's boot loader is composed of BIOS and the boot loader located in the storage device MBR; and the BIOS is actually a piece of firmware program.

[0032] The MBR part of the storage device mainly includes the bootloader, the end flag and the partition table; the partition table is such as figure 1 As shown in A, each partition table corresponds to a partition. The number of partition tables is usually four or less than four. Each partition table contains an index pointing to the corresponding partition and several bytes of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method for protecting the data of a storage device. An analogical HPA area is divided from the partition of the storage device and the mark position of the corresponding record in the partition table of the analogical HPA area is marked as bad, so as to store the special data to be protected in the analogical HPA area. In the process of computer BIOS power-on self-examination, the computer calculates the initial address of the analogical HPA area by obtaining the terminal address of the analogical HPA area and obtains the special data stored in the analogical HPA area. The method provided by the present invention ensures that the special data stored in the storage device analogical HPA area is no longer dependent on the safety of MBR for protection.

Description

Technical field [0001] The present invention relates to the technical field of computer security, in particular to a method and device for protecting data in a storage device. Background technique [0002] With the development of computer technology, especially the continuous emergence of large-capacity storage devices, people have higher and higher requirements for the security of data stored on storage devices. Many PC manufacturers will provide different programs. Before the operating system is started (PreOS), the condition of the user's computer is detected through the trigger of the system hot key or automatic judgment, and then the above-mentioned program executes the corresponding operation. [0003] Since the capacity of current storage devices is relatively large, in order to save costs, the program is generally stored in the storage device. At present, there are mainly two methods in the industry: one is the Host Protected Area (HPA) method. In this method, the storage...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F12/14G06F9/445
Inventor 汪飞徐晓靖
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products