Computer system and identification method and device for user

A computer system and identification technology, applied in the computer field, can solve the problem of low security of identification methods and achieve the effect of improving security

Inactive Publication Date: 2011-06-29
CHINA GREATWALL TECH GRP CO LTD
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the embodiment of the present invention is to provide a computer user identificatio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer system and identification method and device for user
  • Computer system and identification method and device for user
  • Computer system and identification method and device for user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0021] In the embodiment of the present invention, the biological information processing chip is driven during the BIOS power-on self-test, and after the BIOS power-on self-test is completed, before the operating system startup file is read, the computer system is controlled to enter the protection state and an identity is generated. Recognition command; the biological information processing chip responds to the identification command, collects the biological information of the computer user, compares the collected biological information with the biological template information pre-stored in the bio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applied in the field of computers, and provides a computer system and an identification method and an identification device for a computer user. The method comprises the following steps of: driving a biological information processing chip during power-on automatic detection of a basic input output system (BIOS), controlling the computer system to enter a protected state after the power-on automatic detection of the BIOS is completed and before a start file of an operating system is read, and generating an identification command; responding to the identification command by the biological information processing chip, acquiring the biological information of the computer user, and comparing the acquired biological information with the biological template information pre-stored in the biological information processing chip to generate a biological information comparison result; and releasing the protection of the computer system according to the comparison result, reading the start file of the operating system and starting the operating system, or keeping the protected state of the computer system. According to the embodiment of the invention, the security of the computer system can be greatly improved.

Description

technical field [0001] The invention belongs to the field of computers, and in particular relates to a computer system and an identification method and device for users thereof. Background technique [0002] With the continuous development of computer technology, information security has become the focus of general concern of computer users. Many computer manufacturers set a set of high-security mechanism identity in the Basic Input Output System (Basic Input Output System, BIOS) or Unified Extensible Firmware Interface (Unified Extensible Firmware Interface, UEFI) layer after the computer is started and before the operating system is started. The identification method is used to identify the identity of the computer user and control the operation and access authority of the computer. [0003] The prior art provides a method for identifying computer users through password identification, which is briefly described as follows: after the computer starts and completes the BIOS...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06K9/00G06F21/32
Inventor 林诗达贾兵王淼宋靖刘欣房顾文锦
Owner CHINA GREATWALL TECH GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products