Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for realizing starting up lock function in network card bootstrap zone

A technology of boot area and power-on lock, which is applied in the direction of instrument, program loading/starting, electrical digital data processing, etc., and can solve problems such as inability to run cracked software

Inactive Publication Date: 2007-01-31
U COM TELECOM EQUIP CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In both cases, the PC has not yet loaded the operating system, so it cannot run various cracking software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing starting up lock function in network card bootstrap zone
  • Method for realizing starting up lock function in network card bootstrap zone
  • Method for realizing starting up lock function in network card bootstrap zone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] In the following detailed description, specific details are described in order to provide a thorough understanding of the present invention. Those skilled in the art will recognize, however, that the invention may be practiced with other similar details.

[0014] Write the program with USB host controller control and USB Key detection and authentication based on BIOS environment into the Boot Rom of the network card;

[0015] After the PC starts up and completes the BIOS detection program, the program in the network card Boot Rom is automatically loaded and run;

[0016] The USB host controller control program takes over the USB host controller based on the BIOS environment;

[0017] Through the USB host controller control program, detect the USB Key and use the dedicated USB data transmission command for the USB Key to perform identity verification;

[0018] If the detection and identity verification pass, the control of the USB host controller by the BIOS program is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides one kind of effective method of unlocking PC. The control program of USB system unit controller based on BIOS environment and the USB Key detection and identity verification program are written into Boot Rom in network card. After the PC is booted and when the system loads the control program of USB system unit controller and the USB Key detection and identity verification program from Boot Rom in network card and runs the programs, the system performs the detection and identity distinction on USB Key inserted in the USB interface to complete unlocking PC.

Description

technical field [0001] The present invention relates to the method for realizing the PC lock, specifically, after the PC is started, the USB host controller control and the USB Key detection and identity verification program are loaded and run from the Boot Rom of the network card, so as to realize the method of the boot lock in the starting process . Background technique [0002] With the improvement of computer technology, personal computers (PCs), especially notebook computers, are widely used. Many people store personal or business-useful data on their computer's hard drive. How to prevent the important data in the computer from being illegally stolen, how to prevent illegal users from arbitrarily opening their own computers, etc., have attracted increasing attention from people, especially business people. People very much hope to have an electronic key to protect their computers from infringement, so the concept of USBKey has just emerged, and how to identify the USB...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F1/00G06F9/445
Inventor 吴俊辉
Owner U COM TELECOM EQUIP CO LTD