Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Restoring protection method for magnetic disk

A disk and disk equipment technology, applied in the direction of instruments, electrical digital data processing, computer security devices, etc., can solve problems such as long time for scanning and killing, unclean virus scanning, and virus occurrence

Inactive Publication Date: 2012-12-12
北京思创银联科技股份有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, once infected with a virus or Trojan horse, it is difficult to clean it with antivirus software
Maybe there is no virus in the inspection at that time, but if the virus source file is not damaged, the virus will reappear in the system after a period of time through replication
In the process of scanning and killing, because virus files need to be deleted, some system files will also be deleted by antivirus software after being infected with viruses, resulting in unstable system operation
[0003] There are many problems in the existing protection system scheme: firstly, the antivirus software has dirty virus detection and killing time, the virus database needs to be updated from time to time, and operating system files may be deleted by mistake during the killing process; secondly, , the existing disk restore software or Windows system comes with restore software, need to manually save the image file Image, if the user wants to restore sectors, but also manually select the target disk and the image file Image, then the restore operation can be performed
When operating the system, such as: installing software, creating and modifying files, creating and modifying the registry, etc., it seems that operations are performed in this sandbox. Although traces of the operation were left at that time, when the computer is restarted, these traces will disappear. will disappear on the surface of the sand

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Restoring protection method for magnetic disk

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0026] Such as figure 1 As shown, a disk recovery protection method includes the following steps:

[0027] S1: setting the sandbox to start synchronously with the Windows system;

[0028] S2: The sandbox captures the disk load I plug-and-play request and the power state request, and calls the AddDevice function; the sandbox driver software adopts the WDM driver mode. When the U disk is inserted into the computer, since the Usb bus in Windows supports PNP plug-and-play operation (PLUG AND PLAY), the insertion request of the Usb device is captured. The Usb bus driver is identified by hardware, and the corresponding driver is searched and installed, and finally the Usb dev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a restoring protection method for a magnetic disk. The restoring protection method comprises the following steps of: S1, setting a sand box to be synchronously started with a Windows system; S2, capturing a plug and play request and a power supply state request loaded on the magnetic disk by the sand box and calling an AddDevice function; S3, obtaining a magnetic disk equipment object by using the AddDevice function; S4, establishing magnetic disk filtering equipment and binding the magnetic disk filtering equipment to the magnetic disk equipment object in the step S3; S5, obtaining magnetic disk format information; S6, creating a temporary Map file according to the magnetic disk format information in the step S5 and formatting and enabling the formatted temporary Map file to be used for saving magnetic disk read-write operation information; S7, opening a read-write thread of a magnetic disk drive program of the magnetic disk equipment in the step S3 and enabling the read-write thread to be used for processing an I / O (Input / Output) read-write request of the magnetic disk; and S8, when the system restarts, deleting the temporary Map file created in the step S6. According to the restoring protection method disclosed by the invention, the magnetic disk filtering equipment is bound to the magnetic disk drive equipment by adopting the magnetic disk drive program, and thus the aim of intercepting an IRP (Information Resource Planning) request of the magnetic disk is achieved.

Description

technical field [0001] The invention relates to the technical field of data restoration protection, in particular to a disk restoration protection method, in particular to a sandbox-based disk restoration protection method. Background technique [0002] There are many ways to protect your computer, the most commonly used methods are anti-virus, GHOST disk backup and restore, etc. Viruses and Trojan horses have high technical content, not only destructive to computer systems and files, but also self-replicating and spreading. Therefore, once a virus or a Trojan horse is infected, it is difficult to clean it with antivirus software. Maybe there was no virus in the inspection at that time, but if the virus source file is not damaged, the virus will reappear in the system after a period of time through replication. In the process of scanning and killing, because virus files need to be deleted, some system files will also be deleted by antivirus software after virus infection, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00
Inventor 于晓军万雪松赵辰清
Owner 北京思创银联科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products