Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for logining BIOS based on fingerprint verification

A technology of fingerprint authentication and login method, which is applied in the field of BIOS login based on fingerprint authentication, can solve the problems of inability to fundamentally solve the problem, increase the user's memory burden, and the system cannot be protected, and achieves improved security and strong concealment. , the effect of reducing costs

Inactive Publication Date: 2007-11-21
中国瑞达系统装备公司
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1) The system prevents password theft by requiring users to change their passwords in time. The disadvantage of this method is that it increases the user's memory burden and cannot fundamentally solve the problem
The defect of this method is: this protection is based on the operating system, if an illegal user starts the system with other operating systems, the system will still not be protected
[0006] To sum up, although there are many methods of system identity authentication and access control, some of them are only protection methods at the operating system level, and some use frequent password changes to protect the system. , the above methods are useless.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for logining BIOS based on fingerprint verification
  • Method for logining BIOS based on fingerprint verification
  • Method for logining BIOS based on fingerprint verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the purpose, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail below with reference to the accompanying drawings and examples:

[0036] The idea of ​​the present invention is: fingerprint recognition and fingerprint image collection are both carried out in the BIOS. In order to save users' expenses, fingerprint identification and image acquisition do not use embedded system solutions. Insert the fingerprint authentication module complying with the module format of the BIOS into the BIOS, start the computer, and when the BIOS self-check is completed, the computer automatically invokes the fingerprint authentication module, which completes the management of fingerprint information and the fingerprint authentication login work of the BIOS. Users can choose fingerprint information management and fingerprint authentication. If fingerprint authentication is selected, the fingerprint...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A BIOS logging method based on fingerprint certification includes inserting fingerprint module observing module format of BIOS into BIOS, starting computer up to finalize self-detection, calling up fingerprint module by BIOS to scan user fingerprint for collecting fingerprint image, comparing collected fingerprint image with fingerprint of fingerprint information bank and starting up operation system after BIOS is operated normally by system if certification is passed or otherwise switching system off by protection.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a bios login method based on fingerprint authentication. Background technique [0002] With the popularity of computers and the improvement of the Internet, security is the first consideration for many computers and their systems. In many current computer systems, including many very confidential systems, the traditional identity authentication method is used for user identity authentication and access control, that is, the method of "user ID+password". In fact, this scheme has some hidden problems, often resulting in a situation where the code is recognized but the person is not recognized. Once the password is forgotten, stolen or cracked, it will cause trouble or even heavy losses to the user. The usual workaround is as follows: [0003] 1) The system prevents password theft by requiring users to change their passwords in time. The disadvantage of this method is th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F9/445G06K9/00G06F21/32
Inventor 杨九雁肖继烈
Owner 中国瑞达系统装备公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products