Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A computer security protection method and system

A technology for computer security and protection system, applied in the field of computer security protection, can solve the problems of insufficient password security, use, and failure to simultaneously guarantee user authentication for computer security protection, etc., to achieve strong security protection performance and simple operation. Effect

Active Publication Date: 2016-05-25
CELESTICA TECH CONSULTANCY SHANGHAI
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] In view of the above-mentioned shortcoming of prior art, the object of the present invention is to provide a kind of computer security protection method and system, be used to solve the security deficiency of only based on password in the prior art; Utilize portable memory need install specific driver program; the computer's own security protection and user identity verification cannot be guaranteed at the same time; additional chips or specific equipment are required

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A computer security protection method and system
  • A computer security protection method and system
  • A computer security protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention.

[0033] see Figure 1 to Figure 4 . It should be noted that the diagrams provided in this embodiment are only schematically illustrating the basic idea of ​​the present invention, and only the components related to the present invention are shown in the diagrams rather than the number, shape and shape of the components in actual implementation. Dimensional drawing, the type, quantity and proportion of each component can be changed arb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a computer safety protection method and a computer safety protection system. The computer safety protection method includes that portable storage device information in a portable storage device and a secret key stored in the portable storage device are matched with a first secret key and a second secret key which are stored in a computer BIOS (basic input / output system) firmware, so that the computer can be safely protected. No password is needed in computer protecting process, the computer safety protection and the user authentication can be realized by the aid of common portable storing devices, a specific drive program is not needed to be downloaded and installed or extra chips or specific devices are not required. The method is easy to operate, no redundant use cost is generated and safe and protective value is high.

Description

technical field [0001] The present invention relates to a computer security protection method and system, in particular to a computer security protection method and system utilizing a Basic Input Output System (BIOS for short) and a portable storage device. Background technique [0002] With the wide application of computer technology in life and work, computer security protection has increasingly become the focus of attention. The security protection method of traditional computer mainly adopts setting BIOS password, operating system login password and so on. Security measures using passwords are a kind of identity verification for computer users. However, the confidentiality and protection of BIOS passwords and operating system login passwords are not strong, and there are many ways to crack them. not safe. [0003] The method of carrying out identity verification to the computer user also has the method of utilizing portable memory to protect computer and system securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/34G06F21/70
Inventor 姜家平
Owner CELESTICA TECH CONSULTANCY SHANGHAI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products