UEFI (Unified Extensible Firmware Interface)-based backup and one-key startup item guiding method
A startup item and backup technology, applied in the direction of boot program, program loading/starting, error detection of redundant data in operation, etc., can solve problems such as lack of system backup, reduce the difficulty of use, avoid data leakage, Simple to use effects
Pending Publication Date: 2022-03-11
成都傲梅科技有限公司
0 Cites 0 Cited by
AI-Extracted Technical Summary
Problems solved by technology
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreAbstract
The invention discloses a UEFI (Unified Extensible Firmware Interface)-based backup method. The UEFI-based backup method comprises the following steps of: judging a system; a system partition detection step; a recovery partition detection step; a recovery partition capacity judgment step; a file moving step; a one-key guide creation step; a one-key guide configuration step; and a one-key guide adjustment step. According to the method and the device, the operating system of the user is backed up to the self-defined recovery environment, and the user is guided to enter the recovery environment in a one-key manner through the one-key recovery method provided by the invention, so that the user can conveniently and quickly recover the system to the optimal state.
Application Domain
Technology Topic
Key recoveryUnified Extensible Firmware Interface +4
Image
Examples
- Experimental program(4)
Example Embodiment
Example Embodiment
Example Embodiment
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more Similar technology patents
Keyboard with one-key screen locking function
InactiveCN108459724APrevent Data LeakageInput/output for user-computer interactionInternal/peripheral component protectionEmbedded systemControl switch
Owner:XIANGYANG NO 42 MIDDLE SCHOOL
Remote access method, computing device and readable storage medium
PendingCN114756317AAvoid visitingPrevent Data LeakageDigital data protectionExecution for user interfacesComputer securityEngineering
Owner:UNIONTECH SOFTWARE TECH CO LTD
User plane function information reporting method, access network equipment and core network equipment
PendingCN114071791APrevent Data LeakageAssess restrictionConnection managementReal-time computingCore network
Owner:BAICELLS TECH CO LTD
Decentralization-based mobile hard disk encryption and decryption method and system
ActiveCN106980580APrevent Data LeakageUnauthorized memory use protectionDigital data authenticationDisk encryptionDisk loading
Owner:宁夏凯速德科技有限公司
Data transmission method and system, data sending device and data receiving device
InactiveCN109547172APrevent data leakageIntegrity guaranteedError prevention/detection by using return channelData switching networksData transmissionData information
Owner:DONGGUAN JIANDA INFORMATION TECH CO LTD
Classification and recommendation of technical efficacy words
- Prevent Data Leakage
- Easy to operate
Method and apparatus for dynamically regulating visual angle of screen
ActiveCN101488326APrevent Data LeakageImprove convenienceCathode-ray tube indicatorsInstrumental componentsVisual rangeScreen viewing
Owner:HTC CORP
General database transparent encryption system
ActiveCN106934298APrevent Data LeakageImprove versatilityEncryption apparatus with shift registers/memoriesDigital data protectionDatabase encryptionUser-defined function
Owner:戴林
Secure storage device
ActiveCN104239820AAchieve securityPrevent Data LeakageInternal/peripheral component protectionLocal machineComputer hardware
Owner:POTEVIO INFORMATION TECH
Protection method and device for executable programs
ActiveCN103488919APrevent memory dumpsPrevent Data LeakageProgram/content distribution protectionData informationExecutable
Owner:BEIJING SENSESHIELD TECH
Data protection method and data protection device of movable storage equipment and movable storage equipment
InactiveCN101634972APrevent Data LeakageEnsure safetyUnauthorized memory use protectionStorage cellEngineering
Owner:HUAWEI DIGITAL TECH (CHENGDU) CO LTD