A computer with dual operating systems and its implementation method

A dual-operating system, operating system technology, applied in the protection of internal/peripheral computer components, instruments, digital data authentication, etc., can solve the problems of file leakage, inability to encrypt at the disk level, and inability to support multi-system computer encryption processing, etc. The effect of ensuring system security and ensuring availability

Active Publication Date: 2017-11-03
北京明朝万达科技股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] (1) Security software needs to be installed in the free computer, which affects the normal system performance and work efficiency
[0016] (2) It is not possible to perform disk-level encryption only for virtual security environments
If the redirection is unstable, it will cause file leakage
[0018] (4) The free computer cannot be completely separated from the security protection system and exist independently
Moreover, the existing disk encryption technology cannot support encryption for computers running multiple systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A computer with dual operating systems and its implementation method
  • A computer with dual operating systems and its implementation method
  • A computer with dual operating systems and its implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] The dual operating systems in the computer in Embodiment 1 are dual Win7 dual systems.

[0074] The detailed implementation process of the technical solution of embodiment 1 is as follows, refer to the appended Figure 4 :

[0075] 1) Partition the hard disk. In this example, the disk is divided into 6 partitions, among which the C: and D: partitions are the main partition types, and then all the remaining space is created as an extended partition, and then logical partitions E: and F are created from them :, G: and H:.

[0076] Install Win7A to C: partition and Win7B to D: partition. Plan partitions for Win7A and Win7B respectively. In this example, partitions C:, E: and F: are used for Win7A, and partitions D:, G: and H: are used for Win7B.

[0077] 2) Make sure Win7A is a free system, and Win7B is a safe system.

[0078] 3) Use the bcdedit.exe program that comes with the Win7 system to delete each other's startup items from the startup items of Win7A and Win7B. ...

specific Embodiment 2

[0089] The dual operating system in the computer in embodiment 1 is WinXP / Win7 dual system

[0090] In combination with the above drawings, the detailed implementation process of the technical solution of Embodiment 2 is described as follows, see the attached Figure 5 :

[0091] 1) Partition the hard disk. In this example, the disk is divided into 6 partitions, among which the C: and D: partitions are the main partition types, and then all the remaining space is created as an extended partition, and then logical partitions E: and F are created from them :, G: and H:.

[0092] Install WinXP to C: partition and Win7 to D: partition. Plan partitions for WinXP and Win7 respectively. In this example, partitions C:, E: and F: are used for WinXP, and partitions D:, G: and H: are used for Win7.

[0093] 2) Make sure Win7 is a free system, and WinXP is a safe system.

[0094] 3) Use the bcdedit.exe program that comes with the Win7 system to delete the WinXP startup item from the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for implementing dual operating systems of a computer. The method comprises the following steps: partitioning a disk of the computer into a first main disk partition, a second main disk partition and a plurality of logical disk partitions, and respectively installing a first operating system and a second operating system in the first main disk partition and the second main disk partition; deleting starting items of the other operation system from startup options of the first and second operation systems; modifying the master boot record (MBR) of the disk, so as to automatically start the first operating system during the startup of the computer; configuring the first operating system, so as to hide the second main disk partition of the second operating system and the logical disk partitions used by the second operating system; modifying the partition boot record (PBR) of the second operating system, so as to start the second operating system when the condition that UKey is plugged into the computer is detected; configuring the second operating system, so as to hide the first main disk partition of the first operating system and the logical disk partitions used by the first operating system.

Description

technical field [0001] The invention relates to the technical field of testing, in particular to a disk encryption testing method. Background technique [0002] Acronyms and key term definitions [0003] MBR: Master Boot Record, also known as the master boot sector, is the first sector that must be read when the computer is turned on to access the hard disk. Its three-dimensional address on the hard disk is (cylinder, head, sector area) = (0, 0, 1). [0004] PBR: Partition boot record, also known as VBR (Volume Boot Record), is the boot record of each partition of the disk. [0005] Sector: Sector, each side of the disk is divided into many tracks, that is, some concentric circles on the surface, the closer to the center, the smaller the circle. And each track is divided into equal parts by 512 bytes, called sectors. [0006] UKey: It is a reliable high-speed small storage device that is directly connected to a computer via USB, has a password verification function, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/74G06F21/34
CPCG06F21/34G06F21/74G06F2221/2105
Inventor 杨蕴毅李海京王志海白佳亮王志刚
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products