Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for safely guiding operating system of user

An operating system and secure boot technology, applied in the field of information security, can solve the problems of insufficient security, easy to be cracked, and insufficient security for users, and achieve the effect of ensuring secure boot.

Inactive Publication Date: 2010-12-15
WUHAN TIANYU INFORMATION IND
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These two kinds of booting have been proved to be not safe enough and can be easily cracked, so they are not safe enough for users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for safely guiding operating system of user
  • Method and system for safely guiding operating system of user
  • Method and system for safely guiding operating system of user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be described in detail below through specific implementation examples in conjunction with the accompanying drawings.

[0021] Such as figure 1 , which is a schematic diagram of the normal computer startup process.

[0022] Such as figure 2 , is a schematic diagram of the startup process of the computer used in the present invention. It is different from the normal one in that the microkernel is run before the user's operating system is guided, and the authentication operation is performed. After the authentication is successful, the user's operating system is then guided.

[0023] According to different authentication devices, it is divided into network server authentication version and usb key authentication version. For detailed workflow, see image 3 (usb key authentication version) and Figure 4 (web server certified version). The working process is described in detail below.

[0024] The installation process steps are as follows:

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of information security, and in particular relates to a method for performing login authentication and safely guiding another operating system by using a microkernel. The method comprises the following steps of: running the microkernel after starting a computer; by using security environment provided by the microkernel, performing authentication on a microkernel local computer and performing authentication on a network server or a USB key; and performing secondary authentication on a user account and a password input by a user. After two-time authentication is successful, the microkernel guides the operating system of the user, so that the information security of the user is protected and the safety and confidentiality of computer user information are improved.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a method and system for safely guiding a user operating system, performing login authentication through a microkernel, and realizing access to a user operating system through the microkernel safely guiding. The invention guarantees the safe start-up guidance of the operating system of the computer, and improves the security and confidentiality of the computer user information. technical background [0002] With the popularization of computers and notebooks, computers have become an indispensable part of life and work. In addition to storing personal privacy information, they also store business information of units and institutions. Important data are stored in government agencies, military computers and notebooks. Once the sensitive data is stolen or lost by criminals, it will cause immeasurable consequences. The first step in the protection of the user's compute...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/20G06F9/445G06F21/44
Inventor 熊彩辉唐相雄
Owner WUHAN TIANYU INFORMATION IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products