System operation method using hardware lock and electronic device thereof

A technology of electronic devices and operating methods, applied in computer security devices, electrical digital data processing, instruments, etc., can solve data theft and other problems, and achieve the effect of preventing data from being stolen, maliciously intruded or cracked by hackers

Inactive Publication Date: 2010-08-18
GIGA BYTE TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] But as long as there is enough time, people who are familiar with computer programming languages ​​or use the developed cracking program can crack the p

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System operation method using hardware lock and electronic device thereof
  • System operation method using hardware lock and electronic device thereof
  • System operation method using hardware lock and electronic device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] figure 1 It is a flow chart of the system operation method using hardware lock according to the first embodiment of the present invention.

[0032] Please refer to figure 1 , the method for operating a system using a hardware lock in this embodiment is applied to an electronic device having at least one connection unit.

[0033] In the method for operating a system using a hardware lock according to the present embodiment, the first step (step 20 ) starts up the electronic device to run a Basic I / O System (BIOS).

[0034] Wherein, the method for starting the electronic device can be by turning on the power actuator (such as: power switch, power button, etc. or plugging a hardware device with a Universal Serial Bus (Universal Serial Bus, USB) interface into the electronic device correspondingly. connection port), or other means to activate the electronic device.

[0035] Among them, using a hardware device with a Universal Serial Bus (Universal Serial Bus, USB) interf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a system operation method using a hardware lock and an electronic device which is started by using the hardware lock. The method comprises the following steps of: detecting the connection state of connection units; reading each hardware identification (ID) code of a hardware device which is connected with the connection units and comparing a key ID code with a hardware ID code which are stored in the electronic device; when the hardware ID code is matched with the key ID code, performing a startup program of the electronic device; when all the connection units are not connected with the hardware device, shutting down the electronic device; and when the key ID code which is not matched with the hardware ID code exists, shutting down the electronic device. Therefore, the electronic device is started by plugging the hardware lock and whether the hardware lock is plugged is continuously detected, so a data protection function is realized.

Description

technical field [0001] The invention relates to a system operation method, in particular to a system operation method using a hardware lock and an electronic device started by using the hardware lock. Background technique [0002] As the concept of intellectual property rights has become more and more popular, developers of both hardware and software have invested a lot of manpower and materials to develop ways to protect software or hardware usage rights. [0003] In the past, in order to protect the data in the electronic device and prevent the data in the electronic device from being stolen by those who want to steal it, you can set a power-on password in the operating system (such as Windows window operating system, Linux operating system, etc.) running on the electronic device. In order to prevent other people from using the operating system to steal data in the hard disk; or setting a standby password in the operating system, when the owner of the electronic device tem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/60
Inventor 谢升达
Owner GIGA BYTE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products