Method and system for allocating and protecting subscriber software-hardware configuration information

A technology of hardware information and software information, applied in the direction of digital data processing parts, instruments, computing, etc., can solve problems such as inconvenience of use, inability to solve users' illegal copying, viewing files, and inability to solve the problem of different use rights.

Inactive Publication Date: 2007-07-04
LENOVO (BEIJING) CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Nowadays, computers are usually used by multiple people, and related hardware devices are shared. At the same time, the files on the hard disk are also shared by all users of the computer, which is inconvenient to use in some cases, such as unauthorized users through USB U disk may illegally copy data, view other people's data or files
The current practice of Microsoft Windows is to solve the c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for allocating and protecting subscriber software-hardware configuration information
  • Method and system for allocating and protecting subscriber software-hardware configuration information
  • Method and system for allocating and protecting subscriber software-hardware configuration information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Preferred embodiments of the present invention will be described below with reference to the accompanying drawings.

[0026] FIG. 1 is a schematic diagram showing the basic framework of a system for configuring and protecting user software and hardware configuration information according to the present invention.

[0027] As shown in Figure 1, assuming that there are three users (i.e., User 1, User 2, and User 3), the system will construct VTPM1, VTPM2, and VTPM3 for these three different users through a VMM (Virtual Machine Monitor) (VTPM is a virtual trusted platform module). Then, the software and hardware configuration information corresponding to each user is managed through VTPM1, VTPM2 and VTPM3. Meanwhile, for three different users, the virtual machine monitor can create different operating systems for each user, namely, OS1, OS2 and OS3. Therefore, the virtual machine monitor provides different operating platforms for these three users. On this platform, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for allocating and protecting the allocation information of software and hardware, the method includes following steps: the VMM allocates the user's information for the user, the relative hardware information and software information, and stores them in the TPM, when the user input the user's information, the VMM read the relative hardware information and software information from the TPM to form the relative hardware information and software information of present user, and the present hardware information and present software information are stored in the VTPM; the VMM uses the hardware information and software information stored in the VTPM, and constructs the virtual hardware and available software corresponding to present user.

Description

technical field [0001] The invention relates to a method and system for configuring and protecting user software and hardware configuration information, which can prevent unauthorized users from tampering with the corresponding software and hardware configuration information. Background technique [0002] Nowadays, computers are usually used by multiple people, and related hardware devices are shared. At the same time, the files on the hard disk are also shared by all users of the computer, which is inconvenient to use in some cases, such as unauthorized users through USB U disk may illegally copy data, view other people's data or files. The current practice of Microsoft's Windows is to solve the problem of configuring computer equipment through administrator accounts and other accounts, but it cannot solve the problems of users illegally copying and viewing files. The system manufacturer solves the problem of illegal duplication through the USB port by configuring the USB ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F1/00
Inventor 谢巍吕渊毛兴中成嵩
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products