Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer system and its confidential method

A computer system and computer technology, applied in computing, instruments, electrical digital data processing, etc., can solve the problem that the power-on password cannot achieve the computer security function, etc.

Inactive Publication Date: 2008-11-19
QUANTA COMPUTER INC
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Therefore, the above-mentioned smart card, fingerprint identification system, and boot password in BIOS cannot achieve complete computer security functions. Therefore, how to achieve complete computer security so that users can better protect the data in the computer is one of the problems that the industry needs to solve urgently. one

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer system and its confidential method
  • Computer system and its confidential method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The invention provides a perfect computer security method. By storing the basic input / output system (Basic Input / Output System, hereinafter referred to as BIOS) in a plug-in memory or designing it as a memory card, and designing a corresponding slot on the host computer, the plug-in card The flash memory or memory card can be selectively separated or connected with the computer host. In this way, when the plug-in memory card or memory card is pulled out of the computer host, the computer host cannot be booted up or wake up from the power saving mode because there is no BIOS, thereby achieving a more complete computer security method .

[0023] Please refer to figure 1 , which shows a schematic diagram of a computer system according to a preferred embodiment of the present invention. The computer system 100 is, for example, a general desktop computer (DESKTOP), a server (SERVER), a barebones system, a notebook computer (NOTEBOOK), or a personal digital mobile device. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

It is a computer system and a protection method thereof that the host machine and the card plug-in type storage can optionally detached or attached, by storing BIOS (Basic Input / Output System) in the card plug-in type storage, and the host machine of the computer system providing the corresponding slot. Thus, when the card plug-in type storage is pulled out from the host machine, the computer cannot bootstrap or aroused without BIOS, in order to obtain the perfect computer protection purpose.

Description

technical field [0001] The present invention relates to a computer system and its security method, and in particular to a computer system using a plug-in memory stored in a Basic Input / Output System (BIOS) and its security method . Background technique [0002] Traditional computer security application methods include, for example, smart cards, fingerprint readers, or power-on passwords in the Basic Input / Output System (BIOS). [0003] The current method of using smart cards for computer security usually only restricts the computer from logging into the network. The computer must be inserted into the corresponding smart card before the computer can log in to the relevant network. Safeguard in case of wake up in power mode. Therefore, the third party can still turn on the computer without a smart card, but cannot enter the relevant network, so the protection of the data in the computer is not perfect. [0004] The method of using a fingerprint identification system (finger...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F1/00
Inventor 陈钰辉吕俊毅
Owner QUANTA COMPUTER INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products