Unlock instant, AI-driven research and patent intelligence for your innovation.

A data protection method and device

A data protection and data technology, applied in digital data protection, electrical digital data processing, computer security devices, etc., can solve problems such as terminal system damage

Active Publication Date: 2019-03-15
ZHUHAI BAOQU TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Specifically, for the data in the MBR, malicious software can modify the data in the MBR by calling the system kernel function NtWriteFile, causing the terminal system to be damaged, and the existing technology has not been able to defend against this kind of damage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data protection method and device
  • A data protection method and device
  • A data protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0058] The embodiment of the present invention provides a data protection method and device to prevent MBR data from being modified by an application program in the terminal, thereby ensuring the security of the terminal system.

[0059] The following first introduces a data protection method provided by an embodiment of the present invention.

[0060] It should be noted that the data protection method provided by the embodiment of the prese...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a data protection method and device applied to a first application program. The method comprises following steps: intercepting a data operation instruction sent by a second application program, wherein the data operation instruction comprises label information of the second application program and label information of target data; determining whether label information of the target data belongs to label information corresponding to main root record MBR data and determining the target process path corresponding to the second application program if so according to label information of the second application program; determining whether the target process path belongs to the set of pre-set process paths; and discarding the data operation instruction if so. By applying the embodiment of the invention, MBR data is not corrected by application programs in a terminal so that safety of a terminal system is ensured.

Description

Technical field [0001] The invention relates to the field of computer system optimization, in particular to a data protection method and device. Background technique [0002] For the hard disk in the terminal, the hard disk 0 cylinder, 0 head and 1 sector is called the dominant sector, also known as the master boot record (Master Boot Record-MBR), and the MBR belongs to the boot area, the boot area records Some basic hardware information, such as hard disk partition information. Among them, the information recorded in the boot area can ensure the normal operation of the user's hard disk. If the information is modified, the data stored in the hard disk will be lost, which will seriously damage the terminal system. [0003] In recent years, various malicious applications have emerged one after another, and various data in the terminal has great hidden dangers, especially the data in the MBR. Specifically, for the data in the MBR, the malware can modify the data in the MBR by callin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/6281G06F2221/2149
Inventor 杨峰
Owner ZHUHAI BAOQU TECH CO LTD