FIELD: information technology.
SUBSTANCE: method involves configuring a hardware control module (1) so as to store data in a hidden region (31) which is not identifiable, not readable and not writable for the operating system unit (4) which supports communication with the hardware control module (1); and upon reception of a restoration request command from an input device (2) which supports direct communication with the hardware control module (1), the hardware control module (1) is configured such that, when a certain predetermined condition is satisfied, the restoration request command (22) is executed so as to transfer data from the hidden region (31) into a working region (32) which is identifiable, readable and writable for the operating system unit (4).
EFFECT: improved method for efficient protection of data from interference or destruction by computer viruses and malicious software.
16 cl, 4 dwg
Authors
Dates
2012-05-10—Published
2009-11-26—Filed