Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for implementing power-on protection

A technology for protecting programs and computers, applied in the field of information security, can solve problems such as unguaranteed binding of physical identity and digital identity, security risks, password leakage, etc., to achieve the effect of saving R&D investment, reducing demand, and improving security level

Active Publication Date: 2010-12-29
FEITIAN TECHNOLOGIES
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] To sum up, there are potential safety hazards in computer power-on protection in the prior art, which may easily cause password leakage; there is no guarantee for the binding of the operator's physical identity and digital identity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for implementing power-on protection
  • Method and system for implementing power-on protection
  • Method and system for implementing power-on protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] see figure 1 , the embodiment of the present invention provides a method for realizing power-on protection. In the embodiment of the present invention, the dynamic password generation factor is used as an example for the authentication password obtained by the user using the dynamic password generation device according to the challenge data generated by the computer. The specific content as follows:

[0077] Step 101: the computer is powered on, the BIOS self-checks, and the dynamic password power-on protection program is loaded into the computer memory address;

[0078] In this embodiment, the dynamic password power-on protection program can be placed in the BIOS program, as a part of the BIOS program, and can also be located in the master boot record of the computer boot hard disk. in,

[0079] If the dynamic password protection program is located in the BIOS, the dynamic password protection program is written into the preset position of the BIOS by the motherboard ...

Embodiment 2

[0109] see figure 2 , the embodiment of the present invention provides a system for realizing power-on protection, the system includes: a computer and a dynamic password generating device; see image 3 , the computer includes: a preprocessing module, a receiving module, a judging module, a loading module and a processing module; the dynamic password generating device includes a receiving module and a generating module; wherein,

[0110] In the computer,

[0111] The preprocessing module is used to load and execute the dynamic password protection program; and transfer the control of the computer to the dynamic password protection program;

[0112] The receiving module is used to use the dynamic password protection program to receive the authentication password input by the user after the preprocessing module processes it;

[0113] Judgment module, used for when the receiving module receives the authentication password, the dynamic password protection program judges whether t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system, which realize the startup protection and belong to the information safety field. The method includes that the computer loads and executes the dynamic password protection program; the computer delivers the control authority to the dynamic password protection program; the dynamic password protection program receives the authentication password inputtedby the user; wherein, the authentication password is acquired by the user from a dynamic password generation device; the dynamic password generation device generates the authentication password through the generation algorithm; the dynamic password protection program judges that if the authentication password is valid, the computer startup program is loaded. The system includes a computer and thedynamic password generation device. The dynamic encryption technology is adopted to improve the safety rank of the system; the safety token is not connected with the host computer to save the development investment and improve the system stability; the configuration requirement for the user computer is lowered; because the dynamic password is not needed to be remembered by the user, the usabilityof the system is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and system for realizing power-on protection. Background technique [0002] In the field of computer application, during the boot protection process of the computer or the process of the client accessing the remote server, for example, in the normal boot mode, when the user starts the computer, the commonly used boot protection method is to confirm the user password by requiring the user to enter a password. status is legal. As long as the user can enter the password correctly, the computer (or remote server) will consider him as a legitimate user and allow him to log in and visit. Usually, the password of each user is set by the user himself, theoretically only he himself knows, so as long as the password can be entered correctly, the computer considers him to be the legal user of the machine. [0003] Moreover, computers can only recognize the user's digital ident...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F9/445G06F21/46
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES