Computer security access control system and method

A computer security and access control technology, applied in the field of information security, can solve the problems of low reliability, insecure storage of user identity information, lack of identity protection, etc., to increase security, increase access control security, and achieve secure storage protection. Effect

Inactive Publication Date: 2011-03-16
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF3 Cites 51 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] The technical task of the present invention is to provide a computer based on UEFI, TCM and USBKey, which solves the problems of low reliability of access control under the operating system, insecure storage of user identity information, and lack of runtime identity protection after login by legal users. Security access control system and control method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer security access control system and method
  • Computer security access control system and method
  • Computer security access control system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0054] A computer security access control system and control method of the present invention include a UEFI chip and a TCM chip.

[0055] Such as figure 1 As shown, the control system includes an operating system pre-start access control subsystem and an operating system runtime access control subsystem;

[0056] The operating system pre-boot access control subsystem includes:

[0057] USBKey device: As a login user authentication key, the USBKey stores PIN code data and encrypted user identity information;

[0058] USBKey device initialization module: Embedded in the UEFI chip, it is used to establish the USBKey file system, set the initial PIN code, and create initial user information;

[0059] User management module: embedded in the UEFI chip, used to manage user information. Including two levels of user management rights, user information can be added, deleted, and modified.

[0060] Operating system pre-boot authentication module: embedded in UEFI chip, used to verify...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer security access control system and a computer security access control method, and belongs to the technical field of information security. A unified extensible firmware interface (UEFI) chip and a transmission control module (TCM) chip are included; a control system comprises an operating system pre-booting access control subsystem and an operating system running access control subsystem, wherein the operating system pre-booting access control subsystem comprises USBKey equipment, a USBkey equipment initialization module, a user management module, an operating system pre-booting identity authentication module and an encryption storage module; and the operating system running access control subsystem comprises USBKey equipment, an operating system user logon module, and an operating system user running protection module. The control method comprises an initialization method, an operating system pre-booting access control method and an operating system running access control method. The invention solves the problems that in the operating system, the reliability of access control is low, user identity information storage is insecure, and identity protection is insufficient in the running process after a user with legal identity logs on.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a computer security access control system and control method. Background technique [0002] With the rapid development of today's computer technology, all walks of life use tens of thousands of computers for calculation and processing, and enjoy the informationization convenience provided by application software and data processing. However, information security issues follow, such as illegal use, virus Security risks such as malicious attacks and malicious attacks have always threatened the information security of governments, enterprises and institutions, especially related organizations with confidentiality needs. User data urgently needs security protection, and users urgently require comprehensive access control security policies. [0003] At present, most of the computer access control methods adopt identity verification methods, including: [0004] Authorize ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/34
Inventor 赵斌宋营军冯磊
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products