1331328 099年06月29日梭正雜頁| 六 [0001] 發明說明: 【發明所屬之技術領域】 本發明涉及一種硬碟保護系統及方法。 [0002] 【先前技術】 電腦已經大量裝備到各行各業的重要部門,各種秘密資 訊都會送入電腦進行加工、存儲和傳遞。爲保證這些秘 密資訊不被剽竊、篡改、複製,建立了龐大的網路安全 設備和機制,但卻忽視了另一個問題:電腦放在辦公桌 上也並不安全,因爲竊密分子完全可能以合法身份打開 電腦,毫無顧忌地拷貝走所有需要的文件,甚至直接盜 取電腦中的硬碟。 [0003] 爲了對秘密資訊進行更嚴密的保護,需要—種更安全的 保護機制且獨立性更強的系統,對非法操作人員可能進 行私下的資料盜取、複製等行爲,予以更有效的防止。 [0004] 【發明内容】 因此,有必要提供一種硬碟保護系統及方法,對每台電 腦的合法硬碟設置隨機密碼,做獨立性的安全保 護 [0005] 094137010 一種硬碟保護系統,該系統可安裝於—電腦,其包括: 一檢查模組,用於檢查連接到該電腦的硬 檢查該電腦輸人輸出系統唯讀記憶體中是否存在隨機密 ^及檢查該硬碟中的密碼是否與輪入輸出系統唯讀記 ^中的隨機密碼或用戶密碼-致…讀取模組,用於 储存在輸人輸出系統唯讀記憶體中的隨機密碼或用 碼;一命令模組’用於向該硬碟發送解鎖命令;及 表2模組’用於向輸人輸出系統料記憶體及合法硬 |蝙號 A0101 % 4 I/* 13 1 0993230953-0 1331328 099年06月29日核正替換頁 碟寫入隨機密碼,並以該隨機密碼取代合法硬碟中的用 戶密碼。 [0006] 其中,所述的合法硬碟是指由用戶在使用前寫入所述的 用戶密碼並以該用戶密碼加鎖進行保護的硬碟。 [0007] 一種硬碟保護方法,該方法包括以下步驟:(A)檢查連 接到電腦的硬碟是否被鎖;(B)若硬碟被鎖,則檢查該 電腦輸入輸出系統唯讀記憶體中是否有隨機密碼;(C) 若輸入輸出系統唯讀記憶體中無隨機密碼,則將一組亂 數寫入輸入輸出系統唯讀記憶體中作爲隨機密碼;(D) 讀取輸入輸出系統唯讀記憶體中的用戶密碼;(E)以該 用戶密碼向硬碟發出解鎖命令;(F)檢查硬碟中的密碼 與該用戶密碼是否一致;(G)若一致,則解除硬碟鎖定 ,將輸入輸出系統唯讀記憶體中的隨機密碼寫入該硬碟 ,取代硬碟中預設的用戶密碼。 [0008] 若步驟(F)檢查硬碟中的密碼與該用戶密碼是否一致的 結果爲否,則提示該硬碟非法並中止操作。 [0009] 若步驟(A)檢查連接到電腦系統的硬碟是否被鎖的結果 爲否,則提示該硬碟非法並中止操作。 [0010] 若步驟(B)檢查輸入輸出系統唯讀記憶體中是否有隨機 密碼的結果爲是,則執行以下步驟:(B1)讀取輸入輸 出系統唯讀記憶體中的隨機密碼;(B2)以該隨機密碼 向硬碟發出解鎖命令;(B3)檢查該硬碟中的密碼與該 隨機密碼是否一致;(B4)若不一致,則轉入讀取輸入 輸出系統唯讀記憶體中的用戶密碼的步驟。 094137010 表單編號A0101 第5頁/共13頁 0993230953-0 [0011] [0011] [0012] [0013] [0014] 094137010 从 I 099年〇6月29日修正替換頁 '驟(B3)檢查該硬碟中的密碼與該隨機密碼是否一 的結果爲是,則解除硬碟鎖定。 ^較亍習知技術,所述的硬碟保護线及方法可對每台 腦的硬軌魏機密碼,作獨錄时全保護。 【實施方式】 11所ητ係'本發明硬碟保護系統較佳實施例的功 月二組圖。該硬碟保護系統3()可安裝於—電腦其包括, 一檢—模、、且310、-讀取模組32〇、一命令模組訓及 核’A34G。檢查模組31()用於檢查連接到該電腦的 硬碟是否被鎖,檢查輪人輸出系統唯讀記憶體中是否有 隨機密碼,及檢查該硬碟中的密碼是否與輸人輸出系統 唯讀記憶體中的隨機密碼或用戶密碼―致。檢查模組31〇 還用於提示硬碟非法並中止操作。讀取模組32〇用於讀取 儲存在輸人輸出系統唯讀記憶體中的隨機密碼或用戶密 碼。命令模組330用於以輸入輸出系統唯讀記憶體中的隨 機密碼或用戶密碼向該硬碟發送解鎖命令。寫人模組34〇 用於向輸人輸出系統唯讀記憶體及合法硬碟寫入隨機密 碼’並以隨機密縣代該合法硬射的用戶密碼。其中 所述的。法硬碟是指由用戶在使用前寫入所述的用戶 密碼並以該用戶密碼加鎖進行保護的硬碟。 如第二圖卿,係树明硬料财純佳實施例的流 程圖。首先’電腦上電’檢查模組31〇檢查連接到該電腦 的硬碟是否被鎖(步驟S101)。若該硬碟被鎖,則檢查 模組31〇檢查該電腦輸入輸出系統唯讀記憶體中是否有隨 機密碼(步驟S102)。若輸入輪出系統唯讀記憶體中無 表單編號_ 第6頁㈣頁 __ 1331328 099年06月29日修正替换頁 隨機密碼,則寫入模組340將一組亂數寫入輸入輸出系統 唯讀記憶體作爲隨機密碼(步驟S103)。讀取模組320讀 取輸入輸出系統唯讀記憶體中的用戶密碼(步驟S104) 。命令模組330以該用戶密碼向該硬碟發出解鎖命令(步 驟S105)。檢查模組310檢查該硬碟中的密碼與該用戶密 碼是否一致(步驟S106)。若一致,則解除硬碟鎖定, 即該硬碟是爲該電腦配備的合法硬碟,寫入模組340將上 述的隨機密碼寫入該硬碟取代其中預設的用戶密碼(步 驟S107)。 [0015] 在步驟S101中,若檢查模組310檢查得到的結果爲該硬碟 未鎖,表明該硬碟是非法硬碟,則提示該硬碟非法並中 止操作(步驟S111 )。 [0016] 在步驟S106中,若檢查模組310檢查得到的結果爲該硬碟 中的密碼與該用戶密碼不一致,則該硬碟爲非法硬碟, 執行步驟S111。 [0017] 在步驟S102中,若檢查模組310檢查得到的結果爲輸入輸 出系統唯讀記憶體中有隨機密碼,則讀取模組320讀取輸 入輸出系統唯讀記憶體中的隨機密碼(步驟S108)。命 令模組330以該隨機密碼向該硬碟發出解鎖命令(步驟 S109)。檢查模組310檢查該硬碟中的密碼是否與該隨機 密碼一致(步驟S110)。若不一致,則轉入步驟S104; 若一致,則解除硬碟鎖定,結束流程。 [0018] 本發明雖以較佳實施例揭露如上,然其並非用以限定本 發明。任何熟悉此項技藝者,在不脫離本發明之精神和 094137010 表單編號A0101 第7頁/共13頁 0993230953-0 1331328 099年06月29日修正替换頁 範圍内,當可做更動與潤飾,因此本發明之保護範圍當 視後附之申請專利範圍所界定者為準。 【圖式簡單說明】 [0019] 第一圖係本發明硬碟保護系統較佳實施例的功能模組圖 〇 [0020] 第二圖係本發明硬碟保護方法較佳實施例的流程圖。 【主要元件符號說明】 [0021] 硬碟保護系統30 [0022] 檢查模組 310 [0023] 讀取模組 320 [0024] 命令模組 330 [0025] 寫入模組 340 0993230953-0 094137010 表單編號A0101 第8頁/共13頁1331328 00:00, 1989, the present invention relates to a hard disk protection system and method. [0002] [Prior Art] Computers have been heavily equipped to important departments in all walks of life, and various secret information is sent to computers for processing, storage, and delivery. In order to ensure that these secret information are not plagiarized, falsified, and copied, a huge network security device and mechanism have been established, but another problem has been overlooked: it is not safe to put the computer on the desk, because the stealing molecule may be legal. Open the computer as an identity, copy all the required files without hesitation, and even steal the hard drive from the computer. [0003] In order to protect secret information more closely, it is necessary to have a more secure protection mechanism and a more independent system, and it is possible to prevent illegal operators from privately stealing and copying data. . [0004] SUMMARY OF THE INVENTION Therefore, it is necessary to provide a hard disk protection system and method, set a random password for each computer's legal hard disk, to do independent security protection [0005] 094137010 A hard disk protection system, the system It can be installed in a computer, which comprises: an inspection module for checking a hard check connected to the computer, whether the computer has a random memory in the read-only memory, and checking whether the password in the hard disk is The random access code or user password in the input/output system is only used to read the random password or code used in the read-only memory of the input output system; a command module is used for Send the unlock command to the hard disk; and the table 2 module 'is used to output the system memory and legal hard | bat number A0101 % 4 I/* 13 1 0993230953-0 1331328 099 June 29 Replace the page and write a random password, and replace the user password in the legal hard disk with the random password. [0006] wherein the legal hard disk refers to a hard disk that is written by the user to write the user password before use and is locked by the user password. [0007] A hard disk protection method, the method comprising the steps of: (A) checking whether a hard disk connected to a computer is locked; (B) checking if the hard disk is locked, checking the computer input/output system in a read-only memory Whether there is a random password; (C) If there is no random password in the read-only memory of the input/output system, a set of random numbers is written into the read-only memory of the input and output system as a random password; (D) read input and output system only Read the user password in the memory; (E) issue the unlock command to the hard disk with the user password; (F) check whether the password in the hard disk is consistent with the user password; (G) if the same, the hard disk lock is released. Write the random password in the I/O system read-only memory to the hard disk instead of the default user password in the hard disk. [0008] If the step (F) checks whether the password in the hard disk is consistent with the user password, the result is that the hard disk is illegal and the operation is aborted. [0009] If the step (A) checks whether the hard disk connected to the computer system is locked, the result is no, the hardware is prompted to be illegal and the operation is aborted. [0010] If the step (B) checks whether the result of the random password in the read-only memory of the input/output system is YES, the following steps are performed: (B1) reading the random password in the read-only memory of the input/output system; (B2) () issuing an unlock command to the hard disk with the random password; (B3) checking whether the password in the hard disk is consistent with the random password; (B4) if not, transferring to the user in the read-only memory of the read input/output system The steps for the password. 094137010 Form No. A0101 Page 5 / Total 13 Page 0993230953-0 [0011] [0014] [0014] 094137010 From I 099 〇 June 29 revised replacement page 'B (B3) check the hard If the password in the disc is one of the random passwords, the hard disk is unlocked. ^ Compared with the conventional technology, the hard disk protection line and the method can fully protect each hard track password of each brain. [Embodiment] 11 ητ is a diagram of a second embodiment of a preferred embodiment of the hard disk protection system of the present invention. The hard disk protection system 3() can be mounted on a computer including: a test module, and 310, a read module 32, a command module, and a core 'A34G. The checking module 31() is used to check whether the hard disk connected to the computer is locked, check whether there is a random password in the read-only memory of the wheel output system, and check whether the password in the hard disk is related to the input output system. Read the random password or user password in the memory. The check module 31〇 is also used to prompt the hard disk to be illegal and to abort the operation. The reading module 32 is used to read a random password or a user password stored in the read-only memory of the input output system. The command module 330 is configured to send an unlock command to the hard disk by using a random password or a user password in the read-only system read-only memory. The write module 34 is used to output the system read-only memory and the legal hard disk write random password to the input and replace the legal password of the user with a random password. Among them. A hard disk is a hard disk that is written by a user to write the user password before use and is locked with the user password. For example, the second figure is a flow chart of the embodiment of the tree. First, the 'computer power-on' check module 31 checks whether the hard disk connected to the computer is locked (step S101). If the hard disk is locked, the checking module 31 checks whether there is a random password in the read-only memory of the computer input/output system (step S102). If the input round-out system has no form number in the read-only memory _ page 6 (four) page __ 1331328 on June 29, 2008 to correct the replacement page random password, the write module 340 writes a set of random numbers into the input and output system. The read-only memory is used as a random password (step S103). The reading module 320 reads the user password in the read-only memory of the input/output system (step S104). The command module 330 issues an unlock command to the hard disk with the user password (step S105). The checking module 310 checks whether the password in the hard disk matches the user password (step S106). If it is consistent, the hard disk lock is released, that is, the hard disk is a legal hard disk provided for the computer, and the write module 340 writes the random password described above to the hard disk to replace the preset user password (step S107). [0015] In step S101, if the result of the check by the inspection module 310 is that the hard disk is unlocked, indicating that the hard disk is an illegal hard disk, the hard disk is prompted to be illegal and the operation is suspended (step S111). [0016] In step S106, if the result of the check by the inspection module 310 is that the password in the hard disk does not match the password of the user, the hard disk is an illegal hard disk, and step S111 is performed. [0017] In step S102, if the result of the inspection by the inspection module 310 is that the input/output system has a random password in the read-only memory, the reading module 320 reads the random password in the read-only memory of the input/output system ( Step S108). The command module 330 issues an unlock command to the hard disk with the random password (step S109). The checking module 310 checks if the password in the hard disk matches the random password (step S110). If they do not match, the process proceeds to step S104. If they match, the hard disk lock is released and the flow is terminated. The present invention has been described above by way of a preferred embodiment, and is not intended to limit the invention. Anyone who is familiar with the art, without departing from the spirit of the invention and 094137010 Form No. A0101 Page 7 / Total 13 Page 0993230953-0 1331328 099 June 29, when the replacement page is modified, when it can be changed and retouched, therefore The scope of the invention is defined by the scope of the appended claims. BRIEF DESCRIPTION OF THE DRAWINGS [0019] The first drawing is a functional block diagram of a preferred embodiment of the hard disk protection system of the present invention. [0020] The second drawing is a flow chart of a preferred embodiment of the hard disk protection method of the present invention. [Main Component Symbol Description] [0021] Hard Disk Protection System 30 [0022] Inspection Module 310 [0023] Reading Module 320 [0024] Command Module 330 [0025] Write Module 340 0993230953-0 094137010 Form Number A0101 Page 8 of 13