Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data protection method

A data protection and data technology, applied in electrical digital data processing, protection of internal/peripheral computer components, instruments, etc., can solve problems such as inability to see or use directories or/and files, inability to access data, etc., to improve convenience security, data security, and the effect of maintaining data security

Inactive Publication Date: 2009-04-29
ASUSTEK COMPUTER INC
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Similarly, for users B and C, after logging into the computer system, they cannot see or use any directories or / and files belonging to other users' exclusive directories
In other words, although each user's data is stored in the hard disk, after the user logs in to the computer system with the account password, he can only access the file data in a specific directory, and cannot arbitrarily access files belonging to other users. data to access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method
  • Data protection method
  • Data protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In the hard disk structure of the computer system, for the convenience of management, the hard disk can be divided into multiple partitions for use by different users. In the first sector of each partition, most of the data related to the partition is recorded, such as the type of file system, the location of the root directory, and the number of subdirectories corresponding to the root directory. , and information such as the location of the subdirectory in the hard disk. Since the file system is a tree-like serial structure, once the data in the first sector is destroyed, the content of the partition cannot be read. protection method. In order to make the content of the present invention more clear, the following specific examples are given as examples in which the present invention can indeed be implemented.

[0023] figure 2 It is a flowchart of a data protection method according to an embodiment of the present invention. In this embodiment, several users share...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A data protection method is used in an electronic device with a storage media, wherein, the storage media comprises a plurality of partitions and a partition table. In the method, when the electronic device enters a shutdown program, the partition entry points corresponding to specific partitions and partition data are acquired, and the partition entry points and the partition data are transmitted to an external storage device, and then, the partition entry points in the partition table are deleted, and the partition data are removed from the storage media. When starting the electronic device, a user must provide a corresponding external storage device by which the partition entry points and the partition data are written back in the storage media, thus preventing personal data in the storage media from being used optionally by others so as to realize the purpose of maintaining data security.

Description

technical field [0001] The invention relates to a data protection method, and in particular to a data protection method for protecting personal data security under the condition that electronic devices are shared by multiple people. Background technique [0002] With the advancement of technology and the popularization of computer systems, more and more modern people are accustomed to using computer systems to process files, browse the Internet, play audio-visual files or store data. Therefore, computer systems have become an indispensable part of modern people's work or life. One of the missing tools. In order to maintain the privacy of users, many mechanisms to prevent others from peeping or using the data stored in the computer system have also emerged as the times require. [0003] Generally speaking, users can create hard disk passwords to maintain the security of hard disk data. The user can enter the Basic Input / Output System (BIOS) setting menu during the booting p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F12/14G06F21/02G06F21/79
Inventor 王锦煜
Owner ASUSTEK COMPUTER INC
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More