Method for realizing burglary prevention and data protection of hard disk

A data protection and hard disk technology, applied in the direction of internal/peripheral computer component protection, etc., can solve the problems of loss, easy theft, security threats of hard disk use, etc., to achieve the effect of protecting data

Inactive Publication Date: 2013-09-11
XIAN CHENAN ELECTRONICS TECH
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The existing hard disk stores a large amount of data, which can be used at will, and is easy to be stolen, resulting in data leakage or loss, which greatly threatens the security of the hard disk.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing burglary prevention and data protection of hard disk
  • Method for realizing burglary prevention and data protection of hard disk
  • Method for realizing burglary prevention and data protection of hard disk

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] The method for realizing hard disk theft prevention and data protection in this embodiment includes the following steps:

[0072] (1) Bind the hard disk and the computer through a manual program, that is, read the computer feature code, and send it to the embedded main control module through the control line and save it in the embedded memory;

[0073] (2) When the system is started, it is authenticated through the server program or manual program or network, that is, the system feature code is read, sent to the embedded main control module through the control line, and compared with the computer feature code held in the memory , Pass it to make the dedicated hard drive available, and if it fails, it will restrict the dedicated hard drive from being unavailable.

[0074] In the step (2), during the set time, if there is no authentication or the authentication fails, the use of the dedicated hard disk is also restricted. The set time is 5 seconds.

[0075] The described binding...

Embodiment 2

[0078] The method for realizing hard disk theft prevention and data protection in this embodiment includes the following steps:

[0079] (1) Bind the hard disk and the computer through a manual program, that is, read the computer feature code, and send it to the embedded main control module through the control line and save it in the embedded memory;

[0080] (2) When the system is started, it is authenticated through the server program or manual program or network, that is, the system feature code is read, sent to the embedded main control module through the control line, and compared with the computer feature code held in the memory , Pass it to make the dedicated hard drive available, and if it fails, it will restrict the dedicated hard drive from being unavailable.

[0081] In the step (2), during the set time, if there is no authentication or the authentication fails, the use of the dedicated hard disk is also restricted. The set time is 8 seconds.

[0082] The described binding...

Embodiment 3

[0085] The method for realizing hard disk theft prevention and data protection in this embodiment includes the following steps:

[0086] (1) Bind the hard disk and the computer through a manual program, that is, read the computer feature code, and send it to the embedded main control module through the control line and save it in the embedded memory;

[0087] (2) When the system is started, it is authenticated through the server program or manual program or network, that is, the system feature code is read, sent to the embedded main control module through the control line, and compared with the computer feature code held in the memory , Pass it to make the dedicated hard drive available, and if it fails, it will restrict the dedicated hard drive from being unavailable.

[0088] In the step (2), during the set time, if there is no authentication or the authentication fails, the use of the dedicated hard disk is also restricted. The set time is 10 seconds.

[0089] The described bindin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for realizing burglary prevention and data protection of a hard disk. The method can effectively prevent the hard disk from being burgled. The method comprises the following steps of (1) binding the hard disk with a computer by a manual program: reading a computer feature code, transmitting to an embedded master control module through a control line, and storing in an embedded memorizer, and (2) performing authentication with a server program or the manual program when a system is started up: reading a system feature code, transmitting to the embedded master control module through the control line, comparing with the computer feature code stored in the memorizer, allowing the dedicated hard disk to be available if the feature code passes, and allowing the dedicated hard disk to be unavailable if the computer feature code fails. According to the method for realizing the burglary prevention and the data protection of the hard disk, the data interaction between a mainboard and the hard disk is conducted by a data line, so that the data security purposes such as the burglary prevention of the hard disk, and prevention of starting from win pe, an optical disk or a slave disk are achieved, and the purpose of the data protection is achieved.

Description

Technical field [0001] The invention relates to a data protection method, in particular to a method for realizing hard disk theft prevention and data protection. Background technique [0002] Existing hard disks store a large amount of data, which can be used at will, and are easily stolen, causing data leakage or loss, which greatly threatens the safety of the hard disk. Summary of the invention [0003] The invention provides a method for realizing hard disk theft prevention and data protection, which can effectively prevent the hard disk from being stolen. [0004] A method for realizing hard disk theft prevention and data protection to achieve the objective of the present invention includes the following steps: [0005] (1) Bind the hard disk and the computer through a manual program, that is, read the computer feature code, and send it to the embedded main control module through the control line and save it in the embedded memory; [0006] (2) When the system is started, it is au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/78G06F21/86
Inventor 上雅丽刘炜赵本立冉淑兰何轶
Owner XIAN CHENAN ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products