Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mthod for verifying the login of BIOS user through mobile phone two-dimensional code

A technology of two-dimensional codes and mobile phones, applied in the field of BIOS security, can solve troubles and other problems, and achieve the effect of a wide range of applicable environments

Active Publication Date: 2018-12-21
南京百敖软件有限公司 +2
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But every time I turn on the computer, I have to enter the user name and password, which sometimes feels very troublesome.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mthod for verifying the login of BIOS user through mobile phone two-dimensional code
  • Mthod for verifying the login of BIOS user through mobile phone two-dimensional code
  • Mthod for verifying the login of BIOS user through mobile phone two-dimensional code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Such as figure 2 As shown, a method for verifying BIOS user login through a mobile phone two-dimensional code includes the following steps:

[0027] (1) The operation library for camera driver and analysis of two-dimensional code images is added to the BIOS program;

[0028] (2) Use the open source tool openssl to generate a pair of asymmetric encryption and decryption passwords. Using the RSA2048 algorithm, the generated key contains three factors: N, e, d, where N and e are public keys that can be known by others, and N and d are private keys that need to be kept properly and cannot be known by others. The private key is put into the BIOS storage space and protected to a certain extent. Use mathematical XOR operation (XOR) to protect the key. First, use a tool to generate a string of random numbers and store them. Before putting the key into the BIOS, use the random number to perform an XOR operation on the key, so that the key will not will appear in plaintext. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for verifying the login of a BIOS user through a two-dimensional code of a mobile phone, which dynamically generates a two-dimensional code on the mobile phone, and points a mobile phone screen at a camera in a login interface, so that the BIOS will soon verify the login information contained in the two-dimensional code, thereby avoiding the trouble of keyboard input. And users don't have to remember their usernames and passwords to use the computer more smoothly.

Description

technical field [0001] The invention relates to the technical field of BIOS security, in particular to a method for verifying BIOS user login through a mobile phone two-dimensional code. Background technique [0002] BIOS is the first layer of software above the computer hardware. BIOS can set the boot login password on its setup interface to prevent others from using your computer illegally. At present, the commonly used way to verify the user's identity is to input the user name and password through the keyboard. But every time I turn on the computer, I have to enter the user name and password, which sometimes feels very troublesome. Contents of the invention [0003] The technical problem to be solved by the present invention is to provide a method for verifying BIOS user login through the two-dimensional code of the mobile phone, which can avoid the trouble of repeatedly inputting the user name and password every time the user starts up, and has a wider application en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/34G06F21/36G06K17/00G06F21/46
CPCG06F21/34G06F21/36G06F21/46G06K17/00
Inventor 张琳谢乾陈道林徐家武彭先兵杨合林
Owner 南京百敖软件有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products