Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

BIOS-based computer security protection method and system

A computer security and protection system technology, applied in computer security devices, computing, instruments, etc., can solve problems such as inability to achieve effective protection and unprotected computer systems.

Inactive Publication Date: 2010-03-17
中国瑞达系统装备公司
View PDF1 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the defect of this computer security protection method is that if an illegal user starts the system with other operating systems, the computer system still cannot be protected.
[0017] To sum up, although there are many methods of system identity authentication and access control, some of them are only protection methods at the operating system level, and some use frequent password changes to protect the system, which often does not work. really effective protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • BIOS-based computer security protection method and system
  • BIOS-based computer security protection method and system
  • BIOS-based computer security protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0048] figure 1 It is a flowchart of a specific embodiment of the inventive method, as shown in the figure, the specific implementation process of the inventive method is as follows:

[0049] Insert the USBKEY identity authentication function module complying with the BIOS format into the BIOS; start the computer and complete the BIOS self-check; then the BIOS calls the USBKEY identity authentication function module, first detects whether the USBKEY is inserted into the interface of the computer, and if so, performs USBKEY identity authentication, Otherwise prompt the user to insert the USBKEY.

[0050] After the USBKEY identity authentication is successful, enter the device management menu, and load the operating system after the device management operation is completed; if the USBKEY identity authentication fails, it is prevented f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a BIOS-based computer security protection method and a BIOS-based computer security protection system. The method comprises the following steps of: a, authenticating identity of a USBKEY after completing self-check of a computer and before loading an operation system; B, if the USBKEY passes the identity authentication, performing a step C, and if the USBKEY does not pass the identity authentication, stopping the subsequent operation; and C, judging whether to need managing BIOS-grade equipment or not, if so, loading the operation system after managing the BIOS-grade equipment, and otherwise, directly loading the operation system. The system comprises a USBKEY identity authentication module and an equipment management module, wherein the USBKEY identity authentication module is used for authenticating the identity of the USBKEY after completing the self-check of the computer and before loading the operation system; and the equipment management module is used formanaging the equipment after the identity authentication and before loading the operation system. The USBKEY identity authentication module and the equipment management module are embedded into a BIOS which has burning prevention function.

Description

technical field [0001] The invention belongs to the technical field of computer security, and in particular relates to a computer security protection method and system based on BIOS (Basic Input / Output System, Basic Input / Output System). Background technique [0002] With the popularity of computers and the improvement of the Internet, security is the first consideration for many computers and their systems. In many current computer systems, including many very confidential systems, the traditional identity authentication method is used for user identity authentication and access control, that is, the method of "user ID+password". In fact, there are some problems hidden in this scheme. Once the password is forgotten, stolen or cracked, it will bring trouble or even heavy loss to the user. The usual workaround is as follows: [0003] 1) The system prevents password theft by requiring users to change their passwords in time. The disadvantage of this method is that it increas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/06G06F9/445G06F21/34
Inventor 肖继烈
Owner 中国瑞达系统装备公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products