Hard disk data protection method
A hard disk and data technology, applied in the field of convenient and practical hard disk data protection, can solve impractical problems, achieve the effect of protecting security and improving convenience and practicability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0014] FIG. 1 is a flowchart of a method for protecting hard disk data according to an embodiment of the present invention. Wherein, the hard disk data protection method is applicable to a computer system, and the computer system includes multiple hard disks.
[0015] Please refer to FIG. 1 , firstly, in step S110 , one of a plurality of hard disks is selected as a specific hard disk. After that, in step S120, it is judged whether the model of the specific hard disk matches one of the preset models. When the model of the specific hard disk matches one of the preset models, the preset password string stored in the computer system is read. In this way, the specific hard disk can use the preset password string to perform automatic decryption, and then step S130 is completed.
[0016] That is to say, the computer system described in this example will store a plurality of preset models and a plurality of preset password strings, and the default models are in one-to-one correspond...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
