Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer system and safety powering method

A computer system and security technology, applied in computer security devices, electrical digital data processing, instruments, etc., can solve problems such as stealing data, and achieve the effect of protecting privacy, protecting security, and complete use rights

Inactive Publication Date: 2009-03-11
INVENTEC CORP
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this method, the computer system must be protected by the operating system after the computer system is turned on and enters the operating system.
[0003] However, at this time, the computer system has entered the power-on state, and the user can still make relevant settings on the computer system without entering the operation mode of the operating system, or steal the internal data of the computer system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer system and safety powering method
  • Computer system and safety powering method
  • Computer system and safety powering method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] figure 1 Illustrated as a computer system 100 according to an embodiment of the present invention, including a power supply unit 110, a south bridge chip 120, a baseboard management controller (Baseboard Management Controller, BMC) 130, a security card slot 140, a security card 150 and Boot unit 160 . Wherein the power supply unit 110 supplies the standby power V SB with system supply V SYS Give the computer system 100. System Power V SYS It can supply the power required by each component inside the computer system 100 for normal operation.

[0035] In this embodiment, the power supply unit 110 is controlled by the south bridge chip 120 . When the south bridge chip 120 receives the second power-on signal sent by the baseboard management controller 130, the south bridge chip 120 will output a power-on signal to the power supply unit 110, so that the power supply unit 110 can supply the system power V SYS Give the computer system 100.

[0036] The baseboard managem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a computer system and a safe start-up method thereof. The computer system comprises a power supply unit, a start-up unit, a security card slot and a substrate management controller. The power supply unit is used for supplying standby power and system power to the computer system. The start-up unit is used for supplying a first start-up signal. The security card slot is used for inserting a security card which is provided with identifying information. After receiving the first start-up signal, the substrate management controller judges whether the identifying information on the security card is in accordance with information carried by self so as to determine whether a second start-up signal is to be output. While the power supply unit judges whether the system power is supplied to the computer system according to the second start-up signal.

Description

technical field [0001] The present invention relates to a computer system, and in particular to a computer system that uses a security card to power on (Power on) and a method for safely powering on. Background technique [0002] In order to protect the data inside the computer system from being stolen and changed, general users will use the user account of the Microsoft operating system to set the account password to protect the computer system. However, in this method, the computer system must be protected by the operating system after the computer system is powered on and enters the operating system. [0003] However, at this time, the computer system has entered the power-on state, and the user can still make relevant settings on the computer system without entering the operation mode of the operating system, or steal the internal data of the computer system. Therefore, to protect the computer system, it is best to be able to perform relevant security confirmation actio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/34
Inventor 卢盈志
Owner INVENTEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products