Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for realizing computer safety and enciphering based on identity confirmation by using BIOS

An identity authentication and hard disk technology, applied in the usage of multiple keys/algorithms, preventing unauthorized use of memory, program loading/starting, etc., can solve the problems of undisclosed motherboard BIOS system security and identity authentication, increase hardware costs, etc. , to achieve the effect of not easy to crack, improve security, and flexible application

Inactive Publication Date: 2005-12-28
LENOVO (BEIJING) LTD
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] These inventions do not disclose the use of motherboard BIOS to achieve system security and identity authentication, but need to increase the cost of other hardware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing computer safety and enciphering based on identity confirmation by using BIOS
  • Method for realizing computer safety and enciphering based on identity confirmation by using BIOS
  • Method for realizing computer safety and enciphering based on identity confirmation by using BIOS

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The device of the embodiment of the present invention comprises five functional modules of key storage, hardware security detection, identity authentication, encryption engine and hard disk encryption, wherein the encryption engine adopts DES (Data Encryption Standard, data encryption standard) and IDEA (IDEA: International Data Encryption A1gorithm (International Data Encryption Algorithm) two algorithms, all are prior art, this paper does not describe in detail. The key storage is completed by the user and the system BIOS. If the key is fingerprint identification, there is no need to use other media to save the user key; The algorithm judges whether it is a legitimate user; the function of the encryption engine is to realize the encryption and decryption of the hard disk data

[0025] Implementation method and steps of the embodiments of the present invention:

[0026] (1) The user has his own key, and uses this key every time he starts, and the security module in th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for safely accessing a hard disk through identity authentication by using BIOS. The method comprises: after the static and dynamic passwords input by the BIOS authentication user are correct, and when the BIOS authentication hardware has not changed to a safe state, the BIOS creates a dynamic key output to the user as the dynamic key to be authenticated next time; and according to The storage location of the hard disk decryption key recorded in the BIOS, read the hard disk decryption key, and read the encrypted partition table information and root directory content from the hidden partition of the hard disk; use the decryption key to decrypt the encrypted content and put it in the partition Table and root directory location; the BIOS program jumps to the hard disk boot partition and passes control to the operating system. The invention has flexible application and improves system security.

Description

technical field [0001] The invention relates to the field of computer and information technology, in particular to a method for safely accessing a hard disk through identity authentication using BIOS. Background technique [0002] With the wide application of computers in various fields and the development of networks, the issue of information security is becoming more and more important. From communication security, computer security, to information system security, the development of society puts forward higher and higher requirements for security research. For personal and commercial computers, especially portable computers, it is far from enough to rely solely on the security protection of the operating system. Reliable user identification is the best barrier for system security. [0003] The security system disclosed in Chinese patent application 00132142 "Computer security system and its starting method" includes: a memory for storing identification data; a smart card...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/445G06F12/14H04L9/14
Inventor 徐顺利
Owner LENOVO (BEIJING) LTD