Computer system and method for accessing a protected partition of a disk drive that lies beyond a limited address range of a host computer's BIOS
First Claim
1. In a computer system including a host computer with a native drive-access routine having an address range, and including a disk drive with a user area having data sectors that are accessible to a user'"'"'s preferred operating system and a protected area having data sectors that are inaccessible to the user'"'"'s preferred operating system, a method for accessing data sectors of the protected area having addresses that lie beyond the address range of the native drive-access routine, the method comprising:
- receiving a command in the disk drive for reading a master boot record for the user'"'"'s preferred operating system to initiate a bootload of the user'"'"'s preferred operating system; and
detecting the command in the disk drive and, in response to detecting the command, transferring a drive-selected master boot record that, when executed in the computer system, initiates a process that;
enables address spoofing in the disk drive, loads an extended-address disk-access routine from the protected area using spoofed addresses associated with data sectors that lie within the address range of the native drive-access routine, and executes the extended-address disk-access routine to replace the native drive-access routine for providing access to data sectors having addresses that lie within the protected area.
8 Assignments
0 Petitions
Accused Products
Abstract
The invention may be embodied in a method and a related computer system. The computer system includes a host computer with a native drive-access routine having a limited address range, and a disk drive with a protected area that is inaccessible to a user'"'"'s preferred operating system. The protected area also lies beyond the limited address range. The method includes receiving and detecting a command in the disk drive for reading a master boot record to initiate a bootload of the operating system. In response to detecting the command, the method includes transferring a drive-selected master boot record that, when executed in the computer system, initiates a process that enables address spoofing, loads an extended-address drive-access routine from the protected area using spoofed addresses within the limited address range, and executes the extended-address drive-access routine to replace the native drive-access routine for providing access to the protected area.
203 Citations
13 Claims
-
1. In a computer system including a host computer with a native drive-access routine having an address range, and including a disk drive with a user area having data sectors that are accessible to a user'"'"'s preferred operating system and a protected area having data sectors that are inaccessible to the user'"'"'s preferred operating system, a method for accessing data sectors of the protected area having addresses that lie beyond the address range of the native drive-access routine, the method comprising:
-
receiving a command in the disk drive for reading a master boot record for the user'"'"'s preferred operating system to initiate a bootload of the user'"'"'s preferred operating system; and
detecting the command in the disk drive and, in response to detecting the command, transferring a drive-selected master boot record that, when executed in the computer system, initiates a process that;
enables address spoofing in the disk drive, loads an extended-address disk-access routine from the protected area using spoofed addresses associated with data sectors that lie within the address range of the native drive-access routine, and executes the extended-address disk-access routine to replace the native drive-access routine for providing access to data sectors having addresses that lie within the protected area. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer system, comprising:
-
a host computer having a native drive-access routine having an address range;
a disk drive having a user area including data sectors that are accessible to a user'"'"'s preferred operating system and a protected area including data sectors that are inaccessible to the user'"'"'s preferred operating system and that lie beyond the address range of the native drive-access routine;
means for receiving a command in the disk drive for reading a master boot record for the user'"'"'s preferred operating system to initiate a bootload of the user'"'"'s preferred operating system;
means for detecting the command in the disk drive and, in response to detecting the command, transferring a drive-selected master boot record; and
means for executing the drive-selected master boot record in the computer system to initiate a process that;
enables address spoofing in the disk drive, loads an extended-address disk-access routine from the protected area using spoofed addresses associated with data sectors that lie within the address range of the native drive-access routine, and executes the extended-address disk-access routine to replace the native drive-access routine thereby providing access to data sectors having addresses that lie within the protected area. - View Dependent Claims (9, 10, 11, 12, 13)
-
Specification