Unlock instant, AI-driven research and patent intelligence for your innovation.

HID (human interface device)-based method for setting access rights of host machine

A technology of access rights and equipment, applied in computer security devices, instruments, digital data authentication, etc., can solve the problems of decreased utility ratio and increased cost

Inactive Publication Date: 2012-01-11
SUGON INFORMATION IND
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This is very suitable for individual users, but for companies or enterprises with many computers, it will increase a lot of costs, and the utility ratio will drop significantly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • HID (human interface device)-based method for setting access rights of host machine
  • HID (human interface device)-based method for setting access rights of host machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] (1) When designing a HID device with a USB interface, it is necessary to realize the support of the HID device for necessary character string descriptor functions. A part of these descriptors is used for the function of the HID device itself, and another part is used for the security protection function of the BIOS and the operating system. There is no less than one string descriptor for security protection functions, and the device driver can set and read it.

[0020] (2) According to the use of the computer by the personnel, the personnel and the computer are combined, that is, which computers can be accessed by a certain person, and which personnel can access a certain computer. At the same time, the characteristics of the collected computer are associated with the personnel. For example, collect the MAC address of a computer and associate it with a person. Here is an example to illustrate:

[0021] Assuming that the company has three computers and two employees, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an HID (human interface device)-based for setting access rights of a host machine, which comprises the following steps: writing hardware identification codes in HIDs; offering corresponding HIDs to personnel according to the access need of the personnel; and inserting an UID (user interface device) when the host machine is accessed, wherein the host machine can be started when the hardware identification codes are coincident. According to the method provided by the invention, the safety verification for the starting of a BIOS (basic input output system) and an operating system is realized through storing content of relevant formats in character string descriptors of the HIDs; and the safety verification is ensured and meanwhile the cost is not increased under the condition of not adding redundant equipment.

Description

technical field [0001] The invention relates to computer security applications, in particular to a method for setting host access authority based on HID equipment. Background technique [0002] At present, computers sold on the market and in actual use all use passwords to protect the BIOS and operating systems by default, so as to safely implement tasks such as starting the BIOS and logging into the operating system. But the password itself is easy to crack, so this method is not a very safe protection method. [0003] In response to this problem, different manufacturers have proposed different solutions, such as fingerprint recognition, face recognition, and eyelid recognition based on human biometrics. This method requires that each computer be equipped with a corresponding external device, or that the computer itself integrates the device. This is very suitable for individual users, but for companies or enterprises with many computers, it will increase a lot of costs, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/20G06F21/34
Inventor 李永成郑臣明尹宁宁李丰旺邵宗有刘新春杨晓君
Owner SUGON INFORMATION IND