Computer system of bottom identity identification and method therefor

A computer system and identity authentication technology, applied in the field of the underlying identity authentication computer system, can solve problems such as heavy workload, limitation, complexity, etc., and achieve the effect of powerful supporting functions, practical realization of value, and making up for security loopholes.

Inactive Publication Date: 2007-03-28
LENOVO (BEIJING) CO LTD
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Defect 1: Does not support the network remote authentication function of the BIOS layer
[0009] Defect 2: In the traditional BIOS, the implementation method of adding hardware device interfaces is more complicated
Due to the historical principles of traditional BIOS, the scalability of network support was not considered at the beginning of its design, and the existing design framework and mechanism of BIOS make it very complicated to add network units to it. Therefore, it is more secure to achieve remote security authentication. It is difficult to implement the required network functions on the existing BIOS
(2) The non-openness of the existing BIOS makes it relatively complicated to add a hardware device interface. If we want to adopt a security authentication method supported by secure hardware, we need to expand the corresponding security hardware device interface on the BIOS. The workload is also relatively large. At the same time, due to the poor portability of the added security hardware device interface unit on the BIOS firmware provided by different BIOS manufacturers, it actually limits the identity of more secure and reliable hardware support on the traditional BIOS. Development of authentication methods
[0011] Based on the above reasons, there is currently no feasible design scheme to implement a relatively complete low-level remote BIOS user authentication method on a general-purpose BIOS.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer system of bottom identity identification and method therefor
  • Computer system of bottom identity identification and method therefor
  • Computer system of bottom identity identification and method therefor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0084] As shown in Figure 1-2, the underlying identity authentication computer system in this embodiment includes hardware and software, and the hardware includes a motherboard, a central processing unit (CPU), memory, hard disk and peripherals.

[0085] The motherboard and the CPU are respectively a motherboard and a CPU supporting the EFI specification, and the hard disk includes an EFI memory storing the EFI specification.

[0086] The hardware also includes a safety device, the safety device is a peripheral device connected to the local control bus, and the device has a safe protected storage area for supporting the safe storage of user identity information. The device can be a USB-connected Ikey equipment, such as ikey USB key of SafeNet company, fingerprint reader, such as fingerprint identification system products of BIOSCRYPT (BII) company and other identity authentication hardware devices.

[0087] Described software comprises EFI Firmware layer 3, EFI application lay...

Embodiment 2

[0118] The present embodiment will be described in detail below in conjunction with accompanying drawings 3-6.

[0119] The underlying identity authentication computer system client 4 and server 5 of this embodiment.

[0120] The server end 5 is used for verifying the identity of the user in the remote network, it responds to the authentication request sent by the client end 4, decrypts the identity authentication information, and verifies the legitimacy of the information through the server end 5. The server end includes three units: the server end network connection function unit 51 , the server end user identity verification unit 52 , and the data encryption and decryption unit 25 .

[0121] The server-side network connection function unit 51 responds to the connection request of the client 4 through the network protocol TCP / IP unit, so that the client can access and control the server 5 .

[0122] The user identity verification unit 52, in response to the received authent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A computer system and method for the bottom identity authentication, it contains the trigger unit for the identity authentication of the users of EFI (21), The identification unit of the identity of the users of EFI (22), the certification unit of the identity of the users of EFI (23), and the management unit of the safety for the EFI. The trigger unit for the identity authentication of the users of EFI (21) will be started after the users has started the computer system and finished the initialization of the platform. It will judge the safe grade of the computer system and enter directly the start of the operation system or execute the next step according to the safe grade assigned. It will remind the users to execute the identity authentication, and the users must input information. And then the identification unit of the identity of the users of EFI (22) will be started to obtain the identification information of the users. The certification unit of the identity of the users of EFI (23) will be activated to verify the legitimacy of the identity information of the user. The operation system will be started if the users is legitimate, otherwise, the operation of the user will be refused and not to start the operation system. The method is easy and useful, and has some advantages, such as the supporting function and the applicability of it are very strong.

Description

technical field [0001] The invention relates to the field of computer applications, in particular to a bottom-layer identity authentication computer system and method. Background technique [0002] At present, computer network technology has widely affected all aspects of individuals and enterprises, and the demand for computer security has also been further improved. Among them, user identity authentication is one of the important mechanisms to realize computer security. User identity authentication, also known as user authentication, means that the user submits his identity certificate to the service system in a safe way, and the service system confirms whether the user's identity is true, and then allows the user to legally access the computer. Records, identity authentication usually adopts local authentication and remote authentication. In remote authentication, the database information that guarantees legal authentication is stored on a secure remote server. The "remot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F1/00H04L9/00
Inventor 张怡席振新周建田宏萍
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products