Method for back-up protection of CMOS data

A data and backup technology, applied in the direction of preventing unauthorized use of memory, etc., can solve problems such as trouble for network administrators, locked computers, and unusable machines, so as to reduce the possibility of CMOS being invaded, easily crack passwords, and improve security. sexual effect

Inactive Publication Date: 2007-01-31
LENOVO (BEIJING) LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the public computer environment, such as electronic classrooms, Internet cafes, etc., due to the special environment, it is generally not possible to set a power-on password, or only a simple public password can be set; in this way, some well-intentioned CMOS password settings often occur (out of curiosity) And malicious CMOS password settings (hacker damage); this not only affects the normal use of the computer by others, but also brings trouble to the network administrators, once the password cannot be unlocked, the machine will not be able to use; therefore, we have to ask professional technical engineers for help Clear the CMOS to crack the password
[0003] For a computer environment that has not yet set a password, it is very easy to set a password, as long as you turn on the computer and enter COMS to set it; For the convenience of after-sales maintenance, the motherboard manufacturer will set some secret universal passwords before leaving the factory. These secret universal passwords can also be found on the Internet.
In short, the COMS password setting is not safe for the public network environment, as long as someone wants to destroy it, it can be realized; the direct consequence is to affect the normal network management, lock the computer, and even destroy the network environment
At present, after this situation occurs, the network management personnel can only ask professional technical engineers to use special software to crack the password and then correct it, but this often takes several hours; you can also use jumpers from the hardware. First, you need to cut off the power and disassemble the machine. , use a jumper cap to perform jumper operation to realize COMS reset, but this is not only troublesome (disassembly and assembly of the machine is required), but also may damage the machine if the operation is not done properly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for back-up protection of CMOS data
  • Method for back-up protection of CMOS data
  • Method for back-up protection of CMOS data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Such as figure 1 As shown in the flowchart, the method for backup protection of CMOS data according to the present invention comprises the steps:

[0020] The computer starts up;

[0021] Enter the password to make the computer start to detect the hardware normally;

[0022] Handle interrupt events and intercept the startup of the operating system;

[0023] Read the BIOS setting data stored on the hard disk and compare it with the BIOS data in the CMOS; the comparison results can be divided into the following situations:

[0024] (1) If there is no BIOS setting data on the hard disk, then save the BIOS data in the CMOS on the hard disk;

[0025] (2) If the BIOS setting data on the hard disk is inconsistent with the BIOS data in the CMOS, write the data on the hard disk to the CMOS BANK, then restart and turn on the computer.

[0026] (3) If the BIOS setting data on the hard disk is consistent with the BIOS data in the CMOS, then the interrupt event is returned to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method for making standby protection of CMOS data. Said method includes the following steps: starting computer; inputting cipher code, making computer start of operation system; fetching BIOS set data stored on the hard disk and making comparison with BIOS data; if on the hard disk there is not BIOS set data, the BIOS data in CMOS can be stored on the hard disk; if BIOS set data on the hard disk and BIOS data in CMOS are not identical, the data on the hard disk can be written into CMOS BANK, then it can be again started, if BIOS set data on the hard disk and BIOS data in CMOS are identical, the interruptive event can be back-given into operation system, continuously making normal starting. Said invention utilizes the processes of fetching CMOS data, preparing stand-by and comparison to raise safety of machine.

Description

technical field [0001] The invention relates to a technology for improving the security of CMOS data, in particular to a method for backing up and protecting the CMOS data by backing up and comparing the CMOS data. Background technique [0002] In the public computer environment, such as electronic classrooms, Internet cafes, etc., due to the special environment, it is generally not possible to set a power-on password, or only a simple public password can be set; in this way, some well-intentioned CMOS password settings often occur (out of curiosity) and malicious CMOS password settings (hacker damage); this not only affects the normal use of computers by others, but also brings trouble to network managers. Clear the CMOS to crack the password. [0003] For a computer environment that has not yet set a password, it is very easy to set a password, as long as you turn on the computer and enter COMS to set it; For the convenience of after-sales maintenance, motherboard manufa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14
Inventor 李宇龙刘子寅
Owner LENOVO (BEIJING) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products