Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for startup identity authentication of computer capable of protecting hard disk data

A technology for identity authentication and data protection, which is applied in computer security devices, computing, and electronic digital data processing. It can solve the problem of low security of identity authentication when booting up, achieve strong hard disk data protection capabilities, avoid sensitive information leakage, and improve security. sexual effect

Inactive Publication Date: 2009-09-02
NORTHWESTERN POLYTECHNICAL UNIV
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

From the perspective of system security level, this kind of autonomous power-on identity authentication has low security and is not suitable for use in environments with high security requirements.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Concrete steps when the present invention is realized are realized as follows:

[0033] (1) Preparatory stage: First, equip a Netac 1G ordinary USB disk (referred to as U disk), format the U disk into FAT format and insert it into the protected computer. Then do the following on that computer:

[0034] ①Copy the boot sector, disk partition table information and operating system boot sector in the hard disk to the free sector of the U disk by reading and writing the disk sector. The free sectors here are sector 002 and sector 003 ;

[0035] ②Prompt the user to enter a password of no less than 6 characters, and store the password information on the free sector of the U disk in the way of reading and writing disk sectors. The free sector here is sector 004, and the entered password is 12345678 ;

[0036] ③ Write the new boot program into the boot sector in the way of reading and writing disk sectors, and the new boot program can perform the steps of U disk device identi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for the startup identity authentication of a computer capable of protecting hard disk data, which comprises the following steps: after formatting, inserting a U disk into a computer; copying a bootstrap sector, disk partition table information, an operation system boot sector in a hard disk to the U disk, storing password information in the U disk, writing a new bootstrap program into the bootstrap sector to render the hard disk in an unknown system state, and withdrawing the U disk; after the insertion of the U disk, starting the computer to execute the modified bootstrap program in the hard disk, to give a prompt for password input, and to compare an input password with a preserved password; if the two passwords are the same, copying the disk partition table information and a operation system bootstrap sector of an original disk to the hard disk; executing an original bootstrap program and starting the program; and before the completion of the startup of an operation system, rendering the hard disk in an unknown system state again. The invention effectively protects all data files stored in the hard disk and greatly improves the safety of the hard disk data.

Description

technical field [0001] The invention belongs to the field of computer system security, and relates to a computer boot identity authentication method, which is used for controlling the unauthorized use of the computer and the protection of hard disk data. Background technique [0002] In order to ensure the security of the user's computer system and avoid unauthorized use by others, the computer startup identity authentication technology is usually used to identify the user's identity by entering a password during the startup process of the computer. General computer systems usually provide two kinds of power-on identity authentication technologies: one is based on Basic Input Output System (Basic Input Output System, BIOS)-level power-on identity authentication, referred to as BIOS password authentication, that is, a password is set on the computer BIOS in advance, The BIOS prompts you to enter a password for identity authentication; the second is based on the operating syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F9/445G06F12/14G06F21/51
Inventor 蔡皖东丁军平马富达
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products