Safety identification method based on safe computer

A security computer, security authentication technology, applied in computer security devices, computing, internal/peripheral computer component protection, etc., can solve the problems of low availability, lack of uniform friendly interface, complex security authentication operations, etc., to reduce the complexity of operations. degree, enhance usability, and improve the effect of log management

Active Publication Date: 2008-04-23
CHINA GREATWALL TECH GRP CO LTD
View PDF0 Cites 64 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a security authentication method based on a secure computer, aiming to solve the problem of security authentication in the prior art due to the identity authentication of the host user identity security and the double security authentication of the identity control of user access data. Complicated operation, lack of unified friendly interface, and low usability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety identification method based on safe computer
  • Safety identification method based on safe computer
  • Safety identification method based on safe computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0039] On the basis of the two key subsystems of the secure hard disk and the TPM chip, the present invention uses BIOS to realize the underlying two-way authentication communication between the host computer and the secure hard disk. The two functions of hard disk access control to users are combined into one, and on this basis, the log management of the system is further improved.

[0040] figure 1 The architecture of the computer security system is shown, and only the parts related to the present invention are shown for convenience of description. The architecture includes a computer motherboa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Said security computer comprises a computer mother board, a security hard drive, a basic input/output system (BIOS) located on said mother board and a trusted platform module (TPM) chip. Both Said TPM chip and the security hard drive are respectively connected to the BIOS. The method comprises: after said BIOS completes the system self-testing and initialization and before the mutual authentication is made between the BIOS and security hard drive, the BIOS make a forced ID authentication for user powering the computer; after passing through the ID authentication, the BIOS and the security hard drive make mutual authentication each other; if the authentication is passed, then the security authentication is successful.

Description

technical field [0001] The invention belongs to the field of computer communication, in particular to a safety authentication method based on a safety computer. Background technique [0002] With the rapid development of computer networks, people pay more and more attention to the security of computers. Once the computer host is illegally invaded, all the data stored in the computer host may be stolen and tampered with, thus causing serious losses to users. . The existing computer system builds a security system based on two key subsystems, the secure hard disk and the Trusted Computing Group (Trusted Computing Group, TCG) Trusted Platform Module (TPM) chip, to improve and strengthen the security of the computer system . [0003] The TPM chip is supported by cryptographic technology and designed with a secure operating system as the core hardware system, which is equivalent to starting from the chip, motherboard and other hardware structures, as well as basic input and out...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F9/445G06F21/31G06F21/71
Inventor 童广胜石明贾兵
Owner CHINA GREATWALL TECH GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products