Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System protecting method based on data security

A system protection and data security technology, applied in the redundancy of computing for data error detection, protection of storage content to prevent loss, response to errors, etc. Achieve the effect of ensuring security, small impact on reading and writing, and improving speed

Active Publication Date: 2012-07-25
WUHAN OPENKER COMPUTING
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage is that not only it needs to take up a large space to back up the valid data in the partition, but also it takes a long time to realize the backup and recovery
The disadvantage is that when writing valid data, the latest written data is always mapped to other hard disk areas. When the mapping relationship is lost, the user data will be permanently lost and cannot be restored.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System protecting method based on data security
  • System protecting method based on data security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0031] see figure 1 As shown, the system protection method based on data security provided by the embodiment of the present invention includes the following steps:

[0032] Step 101: Analyze the valid data of the system partition, and establish a sector valid data bit data stream. The sector valid data bit data stream is a data stream used to indicate whether the hard disk partition sector is valid data, 1 byte=8 bits, Wherein each 1 bit represents 1 sector, if the sector is valid data, the corresponding bit is marked as 1; otherwise, it is marked as 0.

[0033] Step 102: In order to improve the operating efficiency of the system, the sectors in the hard disk partition are divided into blocks according to every 128 sectors as a sector block, the 0-127 sectors in the partition are a sector block, and the 128-255 sectors are A sector block, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system protecting method based on data security, which relates to the field of program control of computers. The system protecting method includes steps: analyzing effective data of a partition of a system, building a data flow of effective data bits of a sector, dividing the sector in the partition of the hard disk system into a plurality of sector blocks, and building a sector block protecting state data flow according to the data flow of the effective data bits of the sector; intersecting write operation of the partition of the system, inquiring the sector block protecting state data flow, copying original data into a free block if the current sector block to be written is a protected block, recording copying information, marking the free block as a buffering block, marking the sector block to be written as a copied block and then completing write operation; and finding back a file before the system is restored when the system is severely damaged and cannot be guided and the partition of the system has important data files, and directly restoring the system if the system is not severely damaged and the partition of the system does not have the important data files. By the aid of the system protecting method, security of data of users can be guaranteed, loss of the data of the users can be avoided, restoring speed is fast, and influence on writing and reading of a hard disk is low.

Description

technical field [0001] The invention relates to the field of computer program control, in particular to a system protection method based on data security. Background technique [0002] First, explain the technical terms involved in the article: [0003] NTFS: New Technology File System, is the file system of Windows NT operating environment and Windows NT advanced server network operating system environment. [0004] FAT32: File Allocation Table 32, is a kind of Windows system hard disk partition format, this format uses a 32-bit file allocation table. [0005] Interrupt No. 13H: It is the interrupt for reading and writing of the hard disk used in the boot process of the operating system. [0006] Data stream: It is a piece of binary data, using n bits to represent a specific meaning (n>0, n is an integer). [0007] Bit data stream: It is a bit-by-bit effective data stream, and each bit represents a specific meaning. [0008] Windows PE: Windows PreInstallation Enviro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/16G06F11/14
Inventor 曾丽星
Owner WUHAN OPENKER COMPUTING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products