Enciphered protection and read write control method for computer data
A data encryption, read-write control technology, applied in computing, electrical digital data processing, digital data processing components and other directions, can solve the problems of data loss, inconvenient operation, inability to protect existing data, etc., to prevent leakage, prevent Destroyed, easy-to-use effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0054] 1. Sector-level read-write interception
[0055] a) First analyze the starting and ending sector numbers of the partition to be protected.
[0056] We have to analyze the entry parameters of int13h and the hard disk partition table chain.
[0057] The entry parameters of int13h are:
[0058] ah function number
[0059] al the number of sectors to read / write ch cylinder number cl sector number dh head number dl drive number (where 0 is a:, 1 is b:, and 80h is the first hard disk)
[0060] From ah, determine whether it is a write operation and decide whether to intercept it. From dl, you can determine whether it is a floppy disk or a hard disk. The last question is how to determine whether it is a logical c area or a d area, e area... whether they should be write-protected partitions .
[0061] We use debug to enter a short assembler
[0062] mov dl, 80h; drive letter
[0063] mov dh, 0; head number 0
[0064] mov ch, 0; cylinder number 0
[0065] mov cl, 1; sector 1
[0066]...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com