Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for booting operating system of terminal equipment based on usb controller

A technology of operating system and terminal equipment, applied in the field of information security, which can solve the problems that attackers cannot use, cannot provide user identity information, and cannot use terminal equipment.

Active Publication Date: 2018-03-09
北京创安恒宇科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the attacker steals the terminal device, the attacker cannot use it due to the lack of a bound USB controller; if the attacker steals the terminal device and the bound USB controller, the attacker cannot provide the bound user identity information, and cannot use the terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for booting operating system of terminal equipment based on usb controller
  • A method for booting operating system of terminal equipment based on usb controller
  • A method for booting operating system of terminal equipment based on usb controller

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the above objects, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the embodiments of the present invention will be described completely and in detail below in conjunction with the accompanying drawings of the present invention.

[0051] figure 1 Describe a connection block diagram of each software module in the storage module based on USBKEY, in which the communication module, the boot module and the recovery module are the hubs connecting other modules.

[0052] Communication module: transfer the system boot control right in the BIOS to the boot module, pass user identity information to the identity verification module, pass the data of the disk boot sector in the recovery module to the trusted measurement module, and provide a hash algorithm for the original Check the integrity of the data in the boot sector of the disk, decrypt and recover the data and repair the original boot sector o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for guiding a terminal equipment operation system based on a USB controller, and belongs to the technical field of terminal equipment information security. The method is characterized in that on the premise that the hardware, the structure and the BIOS module of terminal equipment are not changed, and only an MBR of a magnetic disk, a PBR of a guiding sector and BootLoader are modified, identity information of a user, the USB controller and the terminal equipment are bound, and after user identity verification and credibility verification of the guiding sector of the magnetic disk are passed, the control right of guiding the terminal equipment operation system is transferred to all appointed memory regions, including the MBR, appointed by the decrypted system MBR, so that the operation system is guided. Self-guiding security of the terminal equipment is considered, security of the user identity is considered, a data recovery mechanism is provided for the terminal equipment, and the guiding sector is prevented from being tempered. The method supports a domestic code algorithm, is particularly suitable for the application scene where the user carries a portable computer for working in travel, and improves the working security for the user.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method for using a USB controller to guide the operating system of a terminal device. An operating system is installed on the terminal device, and the operating system is guided through a USB controller, so that the terminal device cannot be started independently. Background technique [0002] With the development of information technology, the problem of information security is becoming more and more serious. At present, some important information systems still use a large number of desktop computers and portable computers as terminal equipment. Due to the oversimplification of the security mechanism of the hardware structure of the terminal equipment and the lack of security design of the relevant modules, there are many security problems in the information system. To solve the security problems of the information system, we must start with the security of the term...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F21/31G06F21/34
CPCG06F21/31G06F21/34G06F21/575
Inventor 张建标阎林公备张艾
Owner 北京创安恒宇科技有限公司