Logic binding method for preventing PC (personal computer)hard disk information from theft

A hard disk and logic technology, applied in the field of computer information security protection, can solve the problems of no protection and can not prevent the computer hard disk from reproducing the information in it, and achieve the effect of preventing the leakage of hard disk information and eliminating information leakage

Inactive Publication Date: 2010-09-29
DALIAN NATIONALITIES UNIVERSITY
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, none of these softwares can prevent the computer hard disk from being stolen and reproduce the information therein. With the development of computer hardware technology, the volume of large-capacity hard disks has beco

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Logic binding method for preventing PC (personal computer)hard disk information from theft
  • Logic binding method for preventing PC (personal computer)hard disk information from theft
  • Logic binding method for preventing PC (personal computer)hard disk information from theft

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] A logical binding method for anti-theft of PC hard disk information, which uses software to logically bind the hard disk of the computer to the computer where it is located, so that the hard disk is in one-to-one correspondence with the computer where it is located, and the hard disk does not work in an uncorresponding computer environment.

[0020] The software includes a CPUID judging program, which is composed of a binding module, a storage module, a reading module and a judging module. The binding module binds the hard disk with the CPUID, stores the binding information of the hard disk and the CPUID in the storage module, rewrites the MBR code of the hard disk, and the function of the rewritten MBR code is to judge the CPUID and restore the original MBR code and partition table , the original MBR code and partition table are stored in the empty backup sector of the hard disk. The flowchart of the MBR code is as follows figure 1 shown. After the computer is start...

Embodiment 2

[0022] A logical binding method for anti-theft of PC hard disk information, which uses software to logically bind the hard disk of the computer to the computer where it is located, so that the hard disk is in one-to-one correspondence with the computer where it is located, and the hard disk does not work in an uncorresponding computer environment.

[0023] The software includes a CPUID judging program, which is composed of a binding module, a storage module, a reading module and a judging module. The binding module binds the hard disk with the CPUID, stores the binding information of the hard disk and the CPUID in the storage module, rewrites the MBR code of the hard disk, and the function of the rewritten MBR code is to judge the CPUID and restore the original MBR code and partition table , the original MBR code and partition table are stored in the empty backup sector of the hard disk. The flowchart of the MBR code is as follows figure 1 shown. After the computer is start...

Embodiment 3

[0086] On the basis of embodiment 2, the hidden hard disk partition table program is added in the software, for preventing the hard disk from being read after being installed with the slave mode (slave machine responds to the master mode), rewrite the MBR (MasterBootRecode master boot sector code) code, and Destroy the partition table, and the original partition table is stored in the backup sector, which will be restored when used, and destroyed after use, ensuring that the hard disk will be visible and unreadable even if it is installed on other machines.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a safety protection method of computer information, in particular to a logic binding method for preventing PC hard disk information from theft, which is characterized in that the hard disks of the computers and computers where the hard disks are located are logically bound by a software mode to enable the hard disks to correspond to the computers where the hard disks are located one to one, and the hard disks which do not correspond to the environments of the computers do not work. The logic binding method can carry out protection by CPUID (Central Processing Unit Identification), and each hard disk corresponds to CPUID information, which ensures that the computers can be started after the hard disks correspond the CPUID. In the invention, a network card MAC (Media Access Control) address judgment procedure is installed, and under the condition that the repeat happens on CPUID, the started computers carry out network card MAC address judgment; the MAC address of each network card is unique, and thereby, the hard disk information of the computers is further protected. The invention logically binds the hard disks and the assorted computers from multiple angles, and thereby ensuring that the hard disk information can not be illegally stolen by computer hard disk crackers, effectively preventing the hard disk information from being revealed, and achieving the goal for information safety.

Description

technical field [0001] The invention relates to the field of information security, in particular to a computer information security protection method. Background technique [0002] With the advent of the information age, computers have become an important information carrier for businesses, governments and various other organizations. However, while computers bring high efficiency to information processing, the security of their stored information has also become a widely concerned issue. The confidentiality of data and the prevention of illegal leaks have gradually become urgent security needs. [0003] At present, computer information security products in the software market all protect computer information from the level of illegal copying and transmission of computer information. Such as anti-virus software, encryption and decryption software, and dynamic encryption and decryption software, etc. However, none of these softwares can prevent the computer hard disk from ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14
Inventor 魏晓鸣王德高王立明、魏喜磊
Owner DALIAN NATIONALITIES UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products