Method for repairing P table of Seagate hard disk

A technology of hard disk and table data, applied in the field of information security, can solve the problems of hard disk identification, compiler abnormality, and unsuccessful compiler recovery, etc., to shorten the time, reduce the probability of errors, and improve the success rate.

Inactive Publication Date: 2016-02-24
XLY SALVATIONDATA TECHNOLOGY INC
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such a normal entry can ensure the normal operation of the compiler, otherwise the compiler will be abnormal, ranging from being unable to access the data area correctly, or severely, the hard disk cannot be recognized by the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for repairing P table of Seagate hard disk
  • Method for repairing P table of Seagate hard disk
  • Method for repairing P table of Seagate hard disk

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0020] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the following examples are given to further describe the present invention in detail.

[0021] S101: Read the system file corresponding to the P list through the serial port, and the P list is in the position corresponding to the head 0, volume 3, and file descriptor of the hard disk;

[0022] S102: Analyze the effective data body of the P list to distinguish abnormal entries;

[0023] S103: Clear all abnormal entries;

[0024] S104: Starting from the offset position of the effective data body of the P table, take 14 bytes as a group, and use the two groups of bytes as the unit to first sum, and then calculate the modulus; loop until the end of the effective data body of the P table, and calculate The result is written into the last 2 bytes of the P table to cover;

[0025] The specific algorithm is as follows:

[0026]

[0027]

[0028] S105: Perform compiler reconstruction on ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method for repairing a P table of a Seagate hard disk. The method comprises the following steps: S101, reading a system file corresponding to a P table; S102, analyzing an effective data volume of the P table, and distinguishing abnormal entries; S103, removing the abnormal entries; S104, calculating an effect and writing the effect into the last two bytes of the P table; and S105, carrying out compiler reconstruction on the re-modified P table. The method has the following beneficial benefits that the abnormal defect entries of the P table can be directly modified, and the P table effect after modification can be calculated, so that the error probability of hard disk repair is reduced, time of hard disk repair is shortened, and the success rate of hard disk repair is improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for repairing the P list of a Seagate hard disk. Background technique [0002] The P list of Seagate hard disk is one of the most important firmware modules in Seagate hard disk firmware. For a Seagate hard disk to correctly access the data area, the hard disk's P-list and non-resident G-list must be guaranteed to be normal entries, and there are no redundant entries added from the outside. Such a normal entry can ensure the normal operation of the compiler, otherwise the compiler will be abnormal, ranging from being unable to access the data area correctly, to severely affecting the hard disk being unable to be recognized by the motherboard BIOS. [0003] At present, the restoration of the hard disk in the prior art is mainly to directly restore the compiler on the hard disk, but if the entry in the P table is abnormal, the restoration of the compiler will...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/07
CPCG06F11/0793
Inventor 梁效宁董超赵飞
Owner XLY SALVATIONDATA TECHNOLOGY INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products