Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for implementing start-up protection

A technology for protecting programs and computers. It is applied in the field of information security and can solve problems such as security risks, password leakage, and no guarantee of the binding of physical and digital identities.

Active Publication Date: 2011-08-17
FEITIAN TECHNOLOGIES
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] To sum up, there are potential safety hazards in computer power-on protection in the prior art, which may easily cause password leakage; there is no guarantee for the binding of the operator's physical identity and digital identity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for implementing start-up protection
  • Method and system for implementing start-up protection
  • Method and system for implementing start-up protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0086] In this embodiment, the dynamic password power-on protection program can be placed in the BIOS program, as a part of the BIOS program, and can also be located in the master boot record of the computer boot hard disk. in,

[0087] If the dynamic password protection program is located in the BIOS, the dynamic password protection program is written into the preset position of the BIOS by the motherboard development tool of the computer;

[0088] If the dynamic password protection program is located in the master boot record, then write the dynamic password protection program into the position of the master boot record of the computer boot hard disk through the development tool of the computer, and keep the partition table information, for example, the 0 cylinder surface 0 magnetic head of the boot hard disk 1 sector and its subsequent sectors, etc.

[0089] Step 102, load and execute the dynamic password boot protection program after the BIOS self-check is successful, and...

Embodiment 2

[0139] The preprocessing module is used for powering on the computer, loading and executing the dynamic password protection program;

[0140] The receiving module is used to use the dynamic password protection program to receive the authentication password input by the user after the preprocessing module processes it;

[0141] Judging module, used for when the receiving module receives the authentication password, the dynamic password protection program judges whether the authentication password is valid;

[0142] The loading module is used to load the startup program of the computer into the dynamic password protection program after the judgment result of the judging module is that the authentication password is valid;

[0143] The processing module is used for when the judgment result of the judging module is that the authentication password is invalid, the dynamic password protection program does not load the boot program of the computer through the processing module;

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for protecting the startup of a computer, which belongs to the field of information security. The method for protecting the startup comprises the steps as follows: a computer is electrified, and dynamic password protection programs are loaded and implemented; the dynamic password protection programs receive authentication passwords input by a user; the authentication passwords are acquired by sending dynamic password generation orders to a dynamic password generation device by the user; the dynamic password generation device generates the authentication passwords according to current time and the dynamic password generating algorithms of the dynamic password generation device; the dynamic password protection programs determine whether the authentication passwords are valid, and if the authentication passwords are valid, the startup programs of the computer are loaded. The system comprises a computer and a dynamic password generation device. The safe class of the system is improved by adopting the dynamic cryptographic technique; in addition, a security token does not need to be connected with a host computer, thus saving the research and development investment and improving the system stability; the requirement for user computer configurations is reduced; as the user does not need to remember the passwords due to the dynamic passwords, the easiness to use the system is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and system for realizing power-on protection. Background technique [0002] In the field of computer application, during the boot protection process of the computer or the process of the client accessing the remote server, for example, in the normal boot mode, when the user starts the computer, the commonly used boot protection method is to confirm the user password by requiring the user to enter a password. status is legal. As long as the user can enter the password correctly, the computer (or remote server) will consider him as a legitimate user and allow him to log in and visit. Usually, the password of each user is set by the user himself, theoretically only he himself knows, so as long as the password can be entered correctly, the computer considers him to be the legal user of the machine. [0003] Moreover, computers can only recognize the user's digital ident...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F9/445G06F21/31
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products