Computer with dual operating systems and implementation method thereof

A dual-operating system, operating system technology, applied in the protection of internal/peripheral computer components, instruments, digital data authentication, etc., can solve the problems of file leakage, inability to encrypt at the disk level, and inability to support multi-system computer encryption processing, etc. The effect of ensuring availability and ensuring system security

Active Publication Date: 2015-04-01
北京明朝万达科技股份有限公司
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] (1) Security software needs to be installed in the free computer, which affects the normal system performance and work efficiency
[0016] (2) It is not possible to perform disk-level encryption only for virtual security environments
If the redirection is unstable, it will cause file leakage
[0018] (4) The free computer cannot be completely separated from the security protection system and exist independently
Moreover, the existing disk encryption technology cannot support encryption for computers running multiple systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer with dual operating systems and implementation method thereof
  • Computer with dual operating systems and implementation method thereof
  • Computer with dual operating systems and implementation method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] The dual operating systems in the computer in Example 1 are dual Win7 dual systems.

[0074] The detailed implementation process of the technical solution of embodiment 1 is as follows, see attached Figure 4 :

[0075] 1) Partition the hard disk. In this example, the disk is divided into 6 partitions, where C: and D: are the main partition types, and then all the remaining space is created as an extended partition, and then logical partitions E:, F are created separately :, G: and H:.

[0076] Install Win7 A to C: partition and Win7 B to D: partition. The plan is used for the partitions of Win7 A and Win7 B respectively. In this example, partitions C:, E: and F: are used for Win7 A, and partitions D:, G: and H: are used for Win7 B.

[0077] 2) Make sure that Win7 A is a free system and Win7 B is a safe system.

[0078] 3) Use the bcdedit.exe program that comes with the Win7 system to delete each other's startup items from the startup items of Win7 A and Win7 B.

[0079] 4) Mod...

specific Embodiment 2

[0089] The dual operating systems in the computer in Example 1 are WinXP / Win7 dual systems

[0090] With reference to the above drawings, the detailed implementation process of the technical solution of the second embodiment is described as follows, see attached Figure 5 :

[0091] 1) Partition the hard disk. In this example, the disk is divided into 6 partitions, where C: and D: are the main partition types, and then all the remaining space is created as an extended partition, and then logical partitions E:, F are created separately :, G: and H:.

[0092] Install WinXP to C: partition and Win7 to D: partition. It is planned to be used for WinXP and Win7 partitions respectively. In this example, partitions C:, E: and F: are used for WinXP, and partitions D:, G: and H: are used for Win7.

[0093] 2) Make sure that Win7 is a free system and WinXP is a safe system.

[0094] 3) Use the bcdedit.exe program that comes with the Win7 system to delete the WinXP startup items from the Win7 s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for implementing dual operating systems of a computer. The method comprises the following steps: partitioning a disk of the computer into a first main disk partition, a second main disk partition and a plurality of logical disk partitions, and respectively installing a first operating system and a second operating system in the first main disk partition and the second main disk partition; deleting starting items of the other operation system from startup options of the first and second operation systems; modifying the master boot record (MBR) of the disk, so as to automatically start the first operating system during the startup of the computer; configuring the first operating system, so as to hide the second main disk partition of the second operating system and the logical disk partitions used by the second operating system; modifying the partition boot record (PBR) of the second operating system, so as to start the second operating system when the condition that UKey is plugged into the computer is detected; configuring the second operating system, so as to hide the first main disk partition of the first operating system and the logical disk partitions used by the first operating system.

Description

Technical field [0001] The invention relates to the technical field of testing, in particular to a disk encryption testing method. Background technique [0002] Definitions of acronyms and key terms [0003] MBR: Master Boot Record, also known as the master boot sector, is the first sector that must be read when the computer is turned on to access the hard disk. Its three-dimensional address on the hard disk is (cylinder, head, fan Zone)=(0, 0, 1). [0004] PBR: Partition boot record, also known as VBR (Volume Boot Record), is the boot record of each partition of the disk. [0005] Sector: Each side of the disk is divided into many tracks, that is, some concentric circles on the surface. The closer to the center, the smaller the circle. Each track is divided into equal parts based on 512 bytes, called sectors. [0006] UKey: It is a small storage device that is directly connected to the computer via USB, has a password verification function, and is reliable and high-speed. The UKey ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/74G06F21/34
CPCG06F21/34G06F21/74G06F2221/2105
Inventor 杨蕴毅李海京王志海白佳亮王志刚
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products