Method of carrying out hard disk protection by utilizing encryption of main zoning

A hard disk protection and main partition technology, applied in the direction of preventing unauthorized use of memory, instruments, electronic digital data processing, etc., can solve the problem that the main partition table cannot correctly guide the PC to load the operating system, etc.

Inactive Publication Date: 2005-03-30
苏州超锐微电子有限公司
View PDF0 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During the PC startup process, the encrypted primary partition table cannot corre

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of carrying out hard disk protection by utilizing encryption of main zoning
  • Method of carrying out hard disk protection by utilizing encryption of main zoning
  • Method of carrying out hard disk protection by utilizing encryption of main zoning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In the following detailed description, specific details are described in order to provide a thorough understanding of the present invention. Those skilled in the art will recognize, however, that the invention may be practiced with other similar details.

[0019] When the hard disk protection function is installed, store the MBR code with the function of controlling the program of the USB host controller based on the BIOS environment into the space starting from the 0th, 0th, 0th, and 1st sectors of the disk;

[0020] During the shutdown process of the PC, software encryption of the RSA algorithm is performed on the primary partition table of the hard disk, and the key is stored in the USB Key;

[0021] After the PC is started, it enters the MBR stage, and the USB host controller control program takes over the USB host controller based on the BIOS environment;

[0022] Detect the USB Key through the USB host controller control program;

[0023] Perform hardware decryp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for more effectively implementing hard disk protection. In PC shutdown process said method adopts RS algorithm to make software encryption for hardware main partitioninformation. after the PC machine is started, in the stage of that the system is fed nito MBR the USB host controller control program is loaded so as to take over the USB host controller on them ain board, and can be used for making detection for USB key inserted onto the USB interface, and can utilize the RSA coprocessor on USB key to make hardware decryptment for main partion information stored in hard disk so as to implement the function of protecting hard disk.

Description

technical field [0001] The present invention is about the method for realizing hard disk protection, specifically is to carry out the software encryption of RSA algorithm to the main partition table, and then utilizes USB Key to carry out the hardware decryption of RSA algorithm again to the main partition table in the startup process, thereby reaches the hard disk protection Purpose. Background technique [0002] With the improvement of computer technology, personal computers (PCs), especially notebook computers, are widely used. Many people store personal or business-useful data on their computer's hard drive. How to prevent the important data in the computer from being illegally stolen, how to prevent illegal users from arbitrarily opening their own computers, etc., have attracted increasing attention from people, especially business people. People very much hope to have an electronic key to protect their hard disk from infringement, so the concept of USBKey was born. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F1/00G06F12/14
Inventor 吴俊辉
Owner 苏州超锐微电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products