Method and computer for protecting computer security based on bios password

A computer security and password protection technology, applied in the computer field, can solve problems such as low protection performance and easy cracking, and achieve the effect of protecting security and preventing illegal modification

Inactive Publication Date: 2011-11-30
HISENSE INTELLIGENT COMML SYST CO LTD
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem that the existing computer security protection method has low protection performance and is eas...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and computer for protecting computer security based on bios password
  • Method and computer for protecting computer security based on bios password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] Embodiment one, see figure 1 Shown, the method for protecting computer security based on BIOS password of the present embodiment, comprises the following steps:

[0038] S01, storage step, the background writes the BIOS password in the BIOS chip, sets the parameter of the password check option in the BIOS, and stores this parameter in the CMOS chip; wherein, the password check option is whether to carry out password verification when controlling the execution of the BIOS unit, the BIOS will determine whether to implement this password protection according to the parameter setting;

[0039] S02, computer starting step, press the computer switch, start the computer, after the power supply voltage is stable, the CPU jumps;

[0040] S03, the block code start step, the BIOS starts the block code;

[0041] S04, the self-inspection step, the hardware device is self-inspected, and when the self-inspection is passed, the control display pops up a password input dialog box, req...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for protecting computer security based on a BIOS password and a computer adopting the method, comprising the following steps: a storage step, writing the BIOS password in the BIOS chip in the background, setting parameters of the password checking option in the BIOS, and storing the password in the BIOS chip. The parameters are stored in the CMOS chip; the computer startup step, after the power supply voltage is stable, the CPU jumps; the block code startup step, the BIOS starts the block code; the self-test step, the device performs self-test, after the self-test passes, the control display pops up to enter the password dialog box; password capturing step, computer captures the password typed from the keyboard; password caching step, stores the captured password in the keyboard register; password comparison step, CPU reads out the input password, and compares it with the BIOS password ;Security execution steps, perform corresponding operations according to the result of password comparison. The method of the invention has high security performance, the password cannot be deciphered, and can effectively protect the setting security of the computer and the security of data in the computer.

Description

technical field [0001] The invention relates to a method for protecting computer security, in particular to a computer protection method using BIOS encryption, which belongs to the technical field of computers. Background technique [0002] With the development of science and technology and the advancement of the network, computer applications have expanded to various fields, but the security problems of local computers have also become increasingly serious. At first, people set up login accounts under the system to protect the security of local computers, but this method exists. Many loopholes have many cracking methods. Therefore, the system login account method cannot guarantee the security of the computer very reliably. [0003] In addition, there are some computer security protection methods, such as software encryption. However, the current software encryption methods have more or less defects. For example, serial number authentication is used, which is easier to be tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/04G06F21/30
Inventor 乔国辉
Owner HISENSE INTELLIGENT COMML SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products