CN101256610A - Method for ciphering computer system - Google Patents
Method for ciphering computer system Download PDFInfo
- Publication number
- CN101256610A CN101256610A CNA2008100664632A CN200810066463A CN101256610A CN 101256610 A CN101256610 A CN 101256610A CN A2008100664632 A CNA2008100664632 A CN A2008100664632A CN 200810066463 A CN200810066463 A CN 200810066463A CN 101256610 A CN101256610 A CN 101256610A
- Authority
- CN
- China
- Prior art keywords
- bios
- hard disk
- computer system
- sequence number
- encryption method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention discloses a method for encrypting computer system, comprising the following steps of: a, coding and translating encryption and decryption program codes into a BIOS; b, running a password program; c, reading the serial number of hard disks, if the serial numbers are present, entering the step h, or entering the step e; e, executing backups of the serial numbers of hard disks in the BIOS; f, encrypting the hard disc guide sectors and partition table sectors; g, rebooting the hardware system and performing the step c after the BIOS is electrified; h, reading the backup serial numbers of hard disks in the BIOS; I, judging whether the two serial numbers of hard disks match with each other, if so, entering the step k, or entering the step j; j, showing an error hint and shutting down the computer; k, decrypting the hardware system guide sectors and partition table sectors. As the encryption and decryption programs are coded and translated by the BIOS at the same time, and embedded into the BIOS in the binary manner, the passive following is avoided and the computer has higher safety.
Description
Technical field
The present invention relates to a kind of computing machine and count a tree name safeguard protection field, specifically, be meant a kind of encryption method of computer system.
Background technology
At present, the research and development input of computer software is very huge, particularly computer system software.Yet the user in a lot of areas is really very thin to the intellectual property right consciousness of computer software at present, cause pirate market extensively to exist, flourishing long time, each fatware company not only will keep on improving on software function, and not irrevocably lost in order to prevent that research and development from dropping into, and also need rack one's brains in software cryptography, software enciphering method commonly used at present has manufacturer that serial number encryption is provided, or USB is provided, softdogs such as LPT are encrypted, omnifarious encryption methods such as over-network registration authentication.
Yet present software enciphering method all has defective more or less.
Such as our common sequence number authentication, it is followed the tracks of and cracks by the people than being easier to, and network authentication is to the dependence of network, and is also very unpractical.USB, softdogs such as LPT are encrypted has not only increased cost, and is easier to be followed the tracks of and crack by the people.
Summary of the invention
The object of the present invention is to provide a kind of encryption method of computer system, it can overcome existing defective, and encrypting and decrypting program and BIOS are compiled simultaneously, is embedded among the BIOS with binary mode, avoids dynamically being followed the tracks of, and security is stronger.
In order to achieve the above object, the technical solution adopted in the present invention is:
A kind of encryption method of computer system, it may further comprise the steps:
A, the password program code compile is stored among the BIOS;
B, BIOS move password program to the Equipment Inspection of computer system and after just exerting finished;
Every computer all can have the firmware of a connection hardware and operating system, we are appellation BIOS, we are the some of encrypting and decrypting program as BIOS, be compiled among the whole BIOS, at BIOS to hardware CPU for example, chipset, and after some Equipment Inspections such as hard disk and initialization finish, rerun our encrypting and decrypting program is to judge whether the being system of validated user.
C, read the hard disk sequence number;
D, judge whether backed up the hard disk sequence number among the BIOS,, enter step h,, enter step e if do not have if having;
E, backup hard disk sequence number are to BIOS;
F, hard disk boot sector and partition table sector are encrypted;
G, restart hardware system, BIOS is re-powered after, operating procedure c then;
Encryption to system is only carried out in female BIOS, female BIOS is meant that firm compiling comes out, also the BIOS that on hardware system, did not move, it some be used for preserving the space of hard disk sequence number, female BIOS start writes this with the hard disk sequence number and partly just becomes behind space and be sub-BIOS, so we we female BIOS can read the sequence number of hard disk earlier when starting shooting, detect simultaneously and whether backed up sequence number, if explanation is not backup for the first time, so current hard disk sequence number is preserved the space of the sequence number that BIOS reserves after by cryptographic calculation, afterwards the boot sector and the partition table sector number a tree name of current hard disk are encrypted, after finishing the encryption of sequence number preservation and hard disk boot sector and partition table sector, restart hardware system.
H, read the hard disk sequence number of BIOS backup;
I, judge whether two hard disk sequence numbers mate,,, enter step j if do not match if coupling enters step k;
J, the wrong shutdown of prompting;
K, deciphering hard-disk system boot sector and partition table sector.
In above-mentioned steps e, current hard disk sequence number is to backup among the BIOS by cryptographic algorithm.
In above-mentioned steps f, its described encryption method is that selected specific character string and data are carried out XOR, and carries out byte shift.
In above-mentioned steps k, it is deciphering hard-disk system boot sector and partition table sector in internal memory.
After adopting said method, because the encrypting and decrypting program all is to compile simultaneously with BIOS, be embedded among the BIOS with binary mode, so the dynamic tracking of having no idea basically to accomplish, so compared with prior art, its security has obvious enhancing than other.
Description of drawings
Fig. 1 is a structured flowchart of the present invention.
Embodiment
Please refer to shown in Figure 1ly, the invention discloses a kind of encryption method of computer system, it may further comprise the steps:
A, encryption and decryption program code compiling is stored among the BIOS;
B, BIOS move password program to the Equipment Inspection of computer system and after just exerting finished;
C, read the hard disk sequence number;
D, judge whether backed up the hard disk sequence number among the BIOS,, enter step h,, enter step e if do not have if having;
E, current hard disk sequence number is backuped among the BIOS by cryptographic algorithm;
F, hard disk boot sector and partition table sector are encrypted, its encryption method is that selected specific character string and data are carried out XOR, and carries out byte shift;
G, restart hardware system, BIOS is re-powered after, operating procedure c then;
H, read the hard disk sequence number of BIOS backup;
I, judge whether two hard disk sequence numbers mate,,, enter step j if do not match if coupling enters step k;
J, the wrong shutdown of prompting;
K, in internal memory deciphering hard-disk system boot sector and partition table sector.
Specific embodiment is enumerated in the invention, is not in order to restriction the invention, in not breaking away from the present invention's spirit scope, to those skilled in the art, can do various variations, modification and application, and all this all still belongs to the protection domain of this patent.
Claims (4)
1, a kind of encryption method of computer system, it is characterized in that: it may further comprise the steps:
A, the password program code compile is stored among the BIOS;
B, BIOS move password program to the Equipment Inspection of computer system and after just exerting finished;
C, read the hard disk sequence number;
D, judge whether backed up the hard disk sequence number among the BIOS,, enter step h,, enter step e if do not have if having;
E, backup hard disk sequence number are to BIOS;
F, hard disk boot sector and partition table sector are encrypted;
G, restart hardware system, BIOS is re-powered after, operating procedure c then;
H, read the hard disk sequence number of BIOS backup;
I, judge whether two hard disk sequence numbers mate,,, enter step j if do not match if coupling enters step k;
J, the wrong shutdown of prompting;
K, deciphering hard-disk system boot sector and partition table sector.
2, the encryption method of computer system as claimed in claim 1 is characterized in that: in step e, current hard disk sequence number is to backup among the BIOS by cryptographic algorithm.
3, the encryption method of computer system as claimed in claim 1 is characterized in that: in step f, its described encryption method is that selected specific character string and data are carried out XOR, and carries out byte shift.
4, the encryption method of computer system as claimed in claim 1 is characterized in that: in step k, it is deciphering hard-disk system boot sector and partition table sector in internal memory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008100664632A CN101256610A (en) | 2008-04-08 | 2008-04-08 | Method for ciphering computer system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008100664632A CN101256610A (en) | 2008-04-08 | 2008-04-08 | Method for ciphering computer system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101256610A true CN101256610A (en) | 2008-09-03 |
Family
ID=39891426
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2008100664632A Pending CN101256610A (en) | 2008-04-08 | 2008-04-08 | Method for ciphering computer system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101256610A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102385671A (en) * | 2010-09-02 | 2012-03-21 | 研祥智能科技股份有限公司 | Method and system for encrypting software |
CN104361298A (en) * | 2014-10-30 | 2015-02-18 | 中国人民解放军信息工程大学 | Method and device for information safety and confidentiality |
CN107025388A (en) * | 2016-02-02 | 2017-08-08 | 上海格尔软件股份有限公司 | It is a kind of that the method that system disk is bound with machine is realized based on TPM chips |
CN107633185A (en) * | 2017-09-21 | 2018-01-26 | 联想(北京)有限公司 | A kind of method and electronic equipment for protecting storage device data safety |
CN108197477A (en) * | 2017-12-29 | 2018-06-22 | 山东超越数控电子股份有限公司 | A kind of method prevented hard disk and replaced |
CN113485757A (en) * | 2021-07-22 | 2021-10-08 | 北京青云科技股份有限公司 | Decryption method, device, equipment and storage medium in system starting process |
-
2008
- 2008-04-08 CN CNA2008100664632A patent/CN101256610A/en active Pending
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102385671A (en) * | 2010-09-02 | 2012-03-21 | 研祥智能科技股份有限公司 | Method and system for encrypting software |
CN102385671B (en) * | 2010-09-02 | 2016-05-04 | 研祥智能科技股份有限公司 | Software enciphering method and system |
CN104361298A (en) * | 2014-10-30 | 2015-02-18 | 中国人民解放军信息工程大学 | Method and device for information safety and confidentiality |
CN104361298B (en) * | 2014-10-30 | 2017-10-10 | 中国人民解放军信息工程大学 | The method and apparatus of Information Security |
CN107025388A (en) * | 2016-02-02 | 2017-08-08 | 上海格尔软件股份有限公司 | It is a kind of that the method that system disk is bound with machine is realized based on TPM chips |
CN107633185A (en) * | 2017-09-21 | 2018-01-26 | 联想(北京)有限公司 | A kind of method and electronic equipment for protecting storage device data safety |
CN108197477A (en) * | 2017-12-29 | 2018-06-22 | 山东超越数控电子股份有限公司 | A kind of method prevented hard disk and replaced |
CN113485757A (en) * | 2021-07-22 | 2021-10-08 | 北京青云科技股份有限公司 | Decryption method, device, equipment and storage medium in system starting process |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10331376B2 (en) | System and method for encrypted disk drive sanitizing | |
CN101256610A (en) | Method for ciphering computer system | |
CN1329787C (en) | Method of preventing firmware piracy | |
US7325126B2 (en) | System and method for distributed module authentication | |
CN101968834A (en) | Encryption method and device for anti-copy plate of electronic product | |
JP2012118956A (en) | Index table-based code encryption and decryption device and method therefor | |
US20080263542A1 (en) | Software-Firmware Transfer System | |
CN110555290A (en) | industrial control software copyright protection method and system based on FPGA | |
CA2830100A1 (en) | Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme | |
CN104636685A (en) | Method for protecting linux operation system on loongson hardware platform | |
CN101930521A (en) | File protecting method and device thereof | |
JP2009080772A (en) | Software starting system, software starting method and software starting program | |
KR101558914B1 (en) | How multimedia source files generated by the usb otg memory not applied anti-piracy system and to play | |
CN111191194B (en) | Off-line use permission system for multi-core processor software integrated development environment | |
CN1673982A (en) | Method for realizing hard disk protection | |
CN104751042A (en) | Credibility detection method based on password hash and biometric feature recognition | |
CN107958141A (en) | A kind of method for protecting software based on chip ID number | |
US8490208B2 (en) | Method and device for detecting if a computer file has been copied and method and device for enabling such detection | |
CN116383779A (en) | Software authorization and permission system for preventing software piracy | |
JP2009252142A (en) | Data processing apparatus | |
KR101405915B1 (en) | Method for writing data by encryption and reading the data thereof | |
KR20120001656A (en) | Method, system and secure processor for executing a software application | |
CN103377327A (en) | PHP program protection method and system | |
Kang et al. | Softmark: software watermarking via a binary function relocation | |
CN101587723B (en) | Anti-copy optical storage medium and manufacturing method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Open date: 20080903 |