A method for booting operating system of terminal equipment based on usb controller
A technology of operating system and terminal equipment, applied in the field of information security, which can solve the problems that attackers cannot use, cannot provide user identity information, and cannot use terminal equipment.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050] In order to make the above objects, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the embodiments of the present invention will be described completely and in detail below in conjunction with the accompanying drawings of the present invention.
[0051] figure 1 Describe a connection block diagram of each software module in the storage module based on USBKEY, in which the communication module, the boot module and the recovery module are the hubs connecting other modules.
[0052] Communication module: transfer the system boot control right in the BIOS to the boot module, pass user identity information to the identity verification module, pass the data of the disk boot sector in the recovery module to the trusted measurement module, and provide a hash algorithm for the original Check the integrity of the data in the boot sector of the disk, decrypt and recover the data and repair the original boot sector o...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


