Data protection method

A data protection and data technology, applied in electrical digital data processing, protection of internal/peripheral computer components, instruments, etc., can solve problems such as inability to see or use directories or/and files, inability to access data, etc., to improve convenience security, data security, and the effect of maintaining data security

Inactive Publication Date: 2009-04-29
ASUSTEK COMPUTER INC
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Similarly, for users B and C, after logging into the computer system, they cannot see or use any directories or/and files belonging to other users' exclusive directories
In other words, although each user's data is stored in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method
  • Data protection method
  • Data protection method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0022] In the hard disk architecture of the computer system, the hard disk can be divided into multiple partitions for the convenience of management for different users. In the first sector of each partition, most of the data related to the partition is recorded, such as the type of file system, the location of the root directory, and the number of subdirectories corresponding to the root directory. , And information such as the location of the subdirectory on the hard disk. Since the file system is a tree-like serial structure, once the data in the first sector is destroyed, the content of this partition cannot be read. The present invention is based on the characteristics of such a file system and develops a kind of data Protection method. In order to make the content of the present invention clearer, the following embodiments are specifically cited as examples on which the present invention can indeed be implemented.

[0023] figure 2 It is a flowchart of a data protection me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A data protection method is used in an electronic device with a storage media, wherein, the storage media comprises a plurality of partitions and a partition table. In the method, when the electronic device enters a shutdown program, the partition entry points corresponding to specific partitions and partition data are acquired, and the partition entry points and the partition data are transmitted to an external storage device, and then, the partition entry points in the partition table are deleted, and the partition data are removed from the storage media. When starting the electronic device, a user must provide a corresponding external storage device by which the partition entry points and the partition data are written back in the storage media, thus preventing personal data in the storage media from being used optionally by others so as to realize the purpose of maintaining data security.

Description

technical field [0001] The invention relates to a data protection method, and in particular to a data protection method for protecting personal data security under the condition that electronic devices are shared by multiple people. Background technique [0002] With the advancement of technology and the popularization of computer systems, more and more modern people are accustomed to using computer systems to process files, browse the Internet, play audio-visual files or store data. Therefore, computer systems have become an indispensable part of modern people's work or life. One of the missing tools. In order to maintain the privacy of users, many mechanisms to prevent others from peeping or using the data stored in the computer system have also emerged as the times require. [0003] Generally speaking, users can create hard disk passwords to maintain the security of hard disk data. The user can enter the Basic Input / Output System (BIOS) setting menu during the booting p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14G06F21/02G06F21/79
Inventor 王锦煜
Owner ASUSTEK COMPUTER INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products