Computer information protection method and device

A computer and control device technology, applied in the field of computer information protection, can solve the problems of not making full use of BIOS, etc., and achieve the effects of avoiding theft of user data, high security, and convenient and quick use

Inactive Publication Date: 2006-05-17
LENOVO (BEIJING) LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the BIOS of the PC system has the highest level of hardware control. Currently, the password locks implemented in the BIOS are all power-on password locks, which do not make full use of the characteristics of the BIOS in controlling hardware.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer information protection method and device
  • Computer information protection method and device
  • Computer information protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The current PC system chip has the I / O trap function, which can detect the I / O operation on the current PC system bus. When the I / O operation on the bus meets its set requirements, this function can be realized. The I / O operation is intercepted, and a system management interrupt is triggered, and the result of the I / O operation is determined by the system management interrupt program. Such as: realize the actual operation result of this I / O. Cut off the operation of the I / O to invalidate the operation of the I / O.

[0037] Working principle of the present invention utilizes these I / O trap functions exactly, by the setting of I / O trap function, after corresponding register fills in the I / O port value that needs interception, then enable its system management to interrupt, like this, Once there is an I / O port access operation that meets the settings on the system bus, the chip will intercept the I / O operation and prevent it from being passed down (executed), and at the sa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a computer information protection method and device. The method includes: setting a computer protection password; establishing a computer BIOS system control program corresponding to the password; when the computer is working normally, if it needs to enter protection, trigger the system control program, set the I / O trap state, and enter the protection state; In the protected state, if data is input, the system control program judges whether the input data is the same as the password, and if it is the same, resumes the normal working state of the computer; if it is different, prohibits the operation. With the present invention, the hardware core is controlled by the BIOS, and external programs cannot be invaded, and the security is high.

Description

technical field [0001] The invention relates to computer and information technology, in particular to a method and device for protecting computer information; in particular, it relates to a method and device for protecting computer information by using BIOS (Basic Input Output System). Background technique [0002] The current PC system uses a variety of operating systems. In the working state, when the user needs to leave temporarily and does not want to shut down the system (because it is a very cumbersome thing to shut down the system and restart the system, or the system is processing Important work, cannot be interrupted), but worried that non-authorized users of the computer will destroy the current working state or steal the data in the system. At this time, the user needs to enter a password-protected mode to protect the current working state from interference , the user is allowed to use the system normally only when the user enters the correct password. However, m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14G06F9/48
Inventor 章丹峰
Owner LENOVO (BEIJING) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products