Unlock instant, AI-driven research and patent intelligence for your innovation.

Starting method

A hard disk and password technology, applied in computer security devices, internal/peripheral computer component protection, instruments, etc., can solve problems such as unable to open the computer system

Inactive Publication Date: 2010-05-26
江西联速科技有限公司 +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, unplugging the hard disk requires dismantling the mainframe of the computer system, and it is not difficult to imagine that it will cause considerable inconvenience to the user.
[0004] Accordingly, a solution is proposed to prevent the failure to open the computer system due to not knowing the hard disk password of some hard disks when multiple people use one computer system. At the same time, it is very important to have a mechanism to keep the data of private hard disks confidential. important

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Starting method
  • Starting method
  • Starting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] For a computer system configured with multiple hard disks, if the computer system can still be turned on and use the public hard disk without knowing the hard disk password of some hard disks, it will definitely increase the convenience of use. Based on the above point of view, the present invention proposes a boot method that skips asking for the password of the hard disk. While the computer system can be turned on smoothly, it also has a mechanism for keeping private hard disk data private. In order to make the content of the present invention clearer, the following specific examples are given as examples in which the present invention can actually be implemented.

[0019] figure 1 It is a flow chart of a boot method according to an embodiment of the present invention. Please refer to figure 1 , first in step S101, the user presses the power button to start the computer system, and the computer system has more than one hard disk. At this time, all hard disks in the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a starting method for a computer system with at least one hard disk. The method comprises the following steps of: firstly, starting the computer system; secondly, acquiring a set value whether the inquiry of the hard disk password can be skipped at present when one of the hard disks is detected to be set with a hard disk password; thirdly, hiding the content of the hard disk which can skip the inquiry of the hard disk password if the set value indicates that the inquiry of the hard disk password can be skipped; and finally, loading a starting program to finish the starting. Thereby, the hard disk which is set with the hard disk password can be skipped to improve the flexibility of using the computer system.

Description

technical field [0001] The present invention relates to a booting method, and in particular to a booting method capable of skipping a hard disk provided with a hard disk password. Background technique [0002] With the increasing popularity of computer systems, ordinary people gradually get used to using computers as a tool for daily office work, communication, information browsing, and even financial management. In addition to using computer systems to improve the efficiency of transaction processing, modern people are also very accustomed to storing important data in computer systems. There are many private data stored in the computer system, such as personal financial details, financial account passwords, private documents and photos, emotional letters, business documents, and intelligent creations. However, in order to maintain the security of data stored in the computer system, generally speaking, users are allowed to perform data security work by setting account passw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/445G06F21/00G06F21/80
Inventor 罗圣心
Owner 江西联速科技有限公司