BIOS hard disk password retrieving method, device and equipment, and readable storage medium
A password recovery and encrypted storage technology, which is applied in the storage field and can solve problems such as inability to obtain important data of users
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] see figure 1 , figure 1 It is a kind of implementation flowchart of BIOS hard disk password retrieval method in the embodiment of the present invention, and this method can comprise the following steps:
[0042] S101: Receive a BIOS hard disk password retrieval request.
[0043] When the hard disk needs to be accessed, if the access terminal currently forgets the password, a BIOS hard disk password retrieval request is generated, and the BIOS hard disk password retrieval request is sent to the hard disk password retrieval center. The hard disk password retrieval center receives the BIOS hard disk password retrieval request.
[0044] S102: Obtain a target secret key corresponding to the target public key that encrypts and stores the BIOS hard disk password.
[0045] Preset the public-private key pair consisting of the target public key and the target secret key. When the user sets the hard disk password in the BIOS setup interface (setup), the BIOS hard disk password ...
Embodiment 2
[0051] see figure 2 , figure 2 Another implementation flowchart of the BIOS hard disk password retrieval method in the embodiment of the present invention, the method may include the following steps:
[0052] S201: Receive a BIOS hard disk password retrieval request.
[0053] S202: Send permission verification information to the target internal server, so that the target internal server performs permission verification according to the permission verification information.
[0054] When receiving the BIOS hard disk password retrieval request, send authority verification information to the target internal server, and the target internal server performs authority verification according to the authority verification information. The authority of the key acquirer is verified by the target internal server, and formal decryption authorization authentication is performed, thus ensuring the legality of the current key acquisition behavior. For example, the identity information of ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


