Firmware starting method based on PIN code authorization

A PIN code and firmware technology, applied in the field of firmware booting based on PIN code authorization, to achieve the effect of protecting illegal access and leakage, and high security

Pending Publication Date: 2019-07-09
昆仑太科(北京)技术股份有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, although there is a method of granting authorization through an encrypted hard disk in the firmware layer, this scheme has bypassability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Firmware starting method based on PIN code authorization
  • Firmware starting method based on PIN code authorization
  • Firmware starting method based on PIN code authorization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on this The embodiments in the invention, and all other embodiments obtained by persons of ordinary skill in the art without creative efforts, all belong to the scope of protection of the present invention.

[0027] In the description of the present invention, it should be understood that the terms "upper", "lower", "front", "rear", "left", "right", "top", "bottom", "inner", "outer" ” and other indicated orientations or positional relationships are based on the orientations or positional relationships shown in the drawings, which are only for the convenience of describing the present invention and simplifying the description, and do not indicate or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a firmware starting method based on PIN code authorization. The method comprises the following steps that 1, a TCM security card is used in a computer integrated with the TCM security card; step 2, starting up and electrifying, and detecting the TCM security card by the security firmware; 3, when it is detected that the state of the security card is normal and the firmwareflag bit is not started, the screen pops up a prompt box to prompt a user to input a PIN code; 4, the user inputs the PIN code in a manual input mode or in a mode of reading the file from the storagedevice; step 5, the firmware sends the received PIN code to the TCM for verification; and step 6, after the verification is passed, the firmware starts the mark position and continues to start the system, and if the verification is not passed, prompts re-input and prompts the remaining input times, and shuts down when the maximum fault-tolerant times are exceeded. The method can prevent TCM resources from being exposed in an unsafe environment, prevent the computer from being started in the unsafe environment and use the computer resources, and is better in safety.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a firmware startup method based on PIN code authorization. Background technique [0002] Firmware is an important basic software in a computer system, and is generally solidified and stored in a flash chip. The motherboard, graphics card, network card, and hard disk of the computer all have firmware. Although they have different functions, they all use and drive hardware in essence. The most important firmware in the computer is called BIOS (Basic Input / Output System), which is used to initialize the motherboard hardware, manage hardware resources, and boot the operating system. It is a bridge connecting the basic computer hardware and system software. [0003] The development of BIOS has gone through two eras. The BIOS of the first era is called legacy BIOS, and the BIOS of the second era is called UEFI (Unified Extensible Firmware Interface). Legacy BIOS was born in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/57G06F9/445
CPCG06F9/44505G06F21/121G06F21/572
Inventor 陈小春肖思莹张超朱立森
Owner 昆仑太科(北京)技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products