A Computer Bios Design Method Based on Authentication and Credibility Metrics

A design method and reliability technology, applied in the direction of internal/peripheral computer component protection, digital data authentication, etc., can solve problems such as unsatisfactory security, loss, high requirements, etc., to ensure security, increase credibility, The effect of security protection

Active Publication Date: 2020-09-01
成都三零嘉微电子有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For ordinary users, these functions are enough to meet the needs of life and production, but in some special fields, such as national defense and party and government departments with high security levels, these functions obviously cannot meet the high requirements for security
For example, an ordinary PC does not provide an alarm when the host is unpacked, and does not provide an alarm when the hard disk or optical drive is replaced, or the contents of the hard disk are changed. Confidential information, causing heavy losses to the country
In addition, identity authentication is limited to operating system login authentication. Once criminals crack administrator or user passwords, important information will be exposed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Computer Bios Design Method Based on Authentication and Credibility Metrics
  • A Computer Bios Design Method Based on Authentication and Credibility Metrics
  • A Computer Bios Design Method Based on Authentication and Credibility Metrics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0036] Such as Figure 1-4 as shown,

[0037] A computer BIOS design method based on authentication and trusted measurement, applied to computer security protection, comprising the following steps:

[0038] S01: After the BIOS is initialized, read the serial number of the SSD to determine whether it is an encrypted SSD; if it is an encrypted SSD, generate an encryption key for the encrypted SSD and execute the next step; if it is not an encrypted SSD, execute the next step;

[0039] S02: Generate a hard disk access password, select whether to insert the access password and verify the access password according to whether the hard disk is currently in a locked mode;

[0040] S03: Read the local authentication policy after passing the verifi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer BIOS design method based on authentication and trusted measurement. The method comprises the steps that S01, the serial number of an SSD is read after a BIOS is initialized, whether the SSD is an encrypted SSD or not is judged, and if yes, an encryption key of the encrypted SSD is generated and the next step is executed; if not, the next step is executed; S02, ahard disk admission password is generated, whether the admission password is placed or not is selected according to whether a hard disk is in a locked mode or not, and the admission password is verified; S03, a local authentication strategy is read after verification; S04, identity authentication is performed according to the acquired authentication strategy, if the authentication is successful, the next step is executed, and if the authentication fails, re-authentication is conducted; S05, an IO port strategy and trusted measurement are started. According to the scheme, hard disk identification is introduced in the BIOS stage, and the safety of a computer can be improved by means of an authentication strategy acquisition module, an identity authentication module, an IO port strategy application module and a trusted measurement module.

Description

technical field [0001] The invention relates to one, in particular to a computer BIOS design method based on authentication and credibility measurement. Background technique [0002] Computer booting mainly goes through two processes, the BIOS boot process and the operating system boot process. After the user enters the user name and password of the operating system, any function provided by the system can be used. For ordinary users, these functions are enough to meet the needs of life and production, but in some special fields, such as national defense and party and government departments with high security levels, these functions obviously cannot meet the high requirements for security. For example, an ordinary PC does not provide an alarm when the host is unpacked, and does not provide an alarm when the hard disk or optical drive is replaced, or the contents of the hard disk are changed. Confidential information, causing heavy losses to the country. In addition, identi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/79G06F21/32G06F21/44
CPCG06F21/32G06F21/44G06F21/79
Inventor 王烨黄臻邓俊邹式论
Owner 成都三零嘉微电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products