Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for realizing computer safety and enciphering based on identity confirmation

A technology of computer security and identity authentication, which is applied in the field of computers and information, can solve the problems of undisclosed motherboard BIOS system security and identity authentication, increase hardware costs, etc., and achieve the effect of not being easy to crack, improving security, and uniqueness

Inactive Publication Date: 2004-09-08
LENOVO (BEIJING) CO LTD
View PDF2 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] These inventions do not disclose the use of motherboard BIOS to achieve system security and identity authentication, but need to increase the cost of other hardware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing computer safety and enciphering based on identity confirmation
  • Method and device for realizing computer safety and enciphering based on identity confirmation
  • Method and device for realizing computer safety and enciphering based on identity confirmation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The device of the embodiment of the present invention comprises five functional modules of key storage, hardware security detection, identity authentication, encryption engine and hard disk encryption, wherein the encryption engine adopts DES (Data Encryption Standard, data encryption standard) and IDEA (IDEA: International Data Encryption Algorithm (International Data Encryption Algorithm) two algorithms, all are prior art, this paper does not describe in detail. The key storage is completed by the user and the system BIOS. If the key is fingerprint identification, there is no need to use other media to save the user key; The algorithm judges whether it is a legitimate user; the function of the encryption engine is to realize the encryption and decryption of the hard disk data

[0034] Implementation method and steps of the embodiments of the present invention:

[0035] (1) The user has his own key, and uses this key every time he starts, and the security module in th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides method and device for realizing computer safety and enciphering based on identity confirmation. The method includes confirming the identity of the user, verifying the safety of hardware, generating one random number as dynamic cipher key output, reading out enciphered content from the hidden hard disc sector, deciphering the enciphered content and setting it in the partition table and the root directory position, jumping the BIOS program to the boosting hard disc sector and handing the control authority to the operation system. The device includes cipher key storing unit, hardware safety detecting unit, identity confirming unit and enciphering engine unit. The present invention is flexible and can raise the system safety.

Description

technical field [0001] The invention relates to the field of computer and information technology, in particular to a method and device for realizing computer security and encryption based on identity authentication. Background technique [0002] With the wide application of computers in various fields and the development of networks, the issue of information security is becoming more and more important. From communication security, computer security, to information system security, the development of society puts forward higher and higher requirements for security research. For personal and commercial computers, especially portable computers, it is far from enough to rely solely on the security protection of the operating system. Reliable user identification is the best barrier for system security. [0003] The security system disclosed in Chinese patent application 00132142 "Computer security system and its starting method" includes: a memory for storing identification dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/445G06F12/14H04L9/14
Inventor 徐顺利
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products