Method and system for implementing power-on protection
A technology for protecting programs and computers, applied in the field of information security, can solve problems such as unguaranteed binding of physical identity and digital identity, security risks, password leakage, etc., to achieve the effect of saving R&D investment, reducing demand, and improving security level
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0076] see figure 1 , the embodiment of the present invention provides a method for realizing power-on protection. In the embodiment of the present invention, the dynamic password generation factor is used as an example for the authentication password obtained by the user using the dynamic password generation device according to the challenge data generated by the computer. The specific content as follows:
[0077] Step 101: the computer is powered on, the BIOS self-checks, and the dynamic password power-on protection program is loaded into the computer memory address;
[0078] In this embodiment, the dynamic password power-on protection program can be placed in the BIOS program, as a part of the BIOS program, and can also be located in the master boot record of the computer boot hard disk. in,
[0079] If the dynamic password protection program is located in the BIOS, the dynamic password protection program is written into the preset position of the BIOS by the motherboard ...
Embodiment 2
[0109] see figure 2 , the embodiment of the present invention provides a system for realizing power-on protection, the system includes: a computer and a dynamic password generating device; see image 3 , the computer includes: a preprocessing module, a receiving module, a judging module, a loading module and a processing module; the dynamic password generating device includes a receiving module and a generating module; wherein,
[0110] In the computer,
[0111] The preprocessing module is used to load and execute the dynamic password protection program; and transfer the control of the computer to the dynamic password protection program;
[0112] The receiving module is used to use the dynamic password protection program to receive the authentication password input by the user after the preprocessing module processes it;
[0113] Judgment module, used for when the receiving module receives the authentication password, the dynamic password protection program judges whether t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 