Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer starting up identifying system and method

An identity authentication and authentication method technology, applied in the computer boot identity authentication system and its authentication field, can solve the problems of easy intrusion and low security, and achieve the effect of not easy to illegally intrude and improve security.

Active Publication Date: 2008-11-12
CHINA GREATWALL TECH GRP CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the deficiencies of the above-mentioned prior art, a computer power-on identity authentication system and its authentication method are provided, thereby solving the problem that the current power-on identity authentication system is not high in security and easy to be invaded

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer starting up identifying system and method
  • Computer starting up identifying system and method
  • Computer starting up identifying system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] see Figure 4, the computer power-on identity authentication system of the present invention comprises sequentially connected CPU, graphics and storage centralized controller (hereinafter referred to as North Bridge) and peripheral equipment integrated centralized controller (hereinafter referred to as South Bridge), display and DRAM (hereinafter referred to as internal memory) respectively Connect with North Bridge, keyboard, BIOS ROM and trusted embedded system (hereinafter referred to as TPM module) are respectively connected with South Bridge, and a password card reader device is connected with TPM module. Wherein, the TPM module includes the TPM hardware integrated circuit and micro-operating system (μOS) software that can set and operate the bottom layer of the hardware. The password card reader device in this embodiment can be an IC card reader drive device or a fingerprint photoelectric collector.

[0040] The password card reading device of the computer startup...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A status certification system at start up of computer consists of CPU, integrated controller for pattern and storage, integrated controller for peripheral devices, display, dynamic random storage, keyboard, BIOS, ROM, TPM module connecting to external devices and device of reading card with code. The certifying method can realize enciphered signal collection, transmission and forced certification of user's status by its independent system at unfinished time of initialization and start up self - checking of BIOS since communication mode is improved.

Description

technical field [0001] The invention relates to a computer startup identity authentication system and an authentication method thereof, in particular to a computer startup identity authentication system and an authentication method capable of enhancing computer information security. Background technique [0002] In today's society, computers are widely used and popular. With the development of technology and the needs of financial systems and personal privacy, especially with the development of network identification and payment systems, people are more and more worried about the security of computers. , once the host computer is illegally invaded, all the data stored in the host computer will be stolen or tampered with. [0003] The existing identity authentication process for protecting the security of a computer host usually uses the operating system (OS) for authentication after booting. However, this authentication method cannot completely prevent hackers' intrusions b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F1/00G06F9/445
Inventor 童广胜郑兆妙
Owner CHINA GREATWALL TECH GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products