CN101256610A - Method for ciphering computer system - Google Patents

Method for ciphering computer system Download PDF

Info

Publication number
CN101256610A
CN101256610A CNA2008100664632A CN200810066463A CN101256610A CN 101256610 A CN101256610 A CN 101256610A CN A2008100664632 A CNA2008100664632 A CN A2008100664632A CN 200810066463 A CN200810066463 A CN 200810066463A CN 101256610 A CN101256610 A CN 101256610A
Authority
CN
China
Prior art keywords
bios
hard disk
computer system
sequence number
encryption method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008100664632A
Other languages
Chinese (zh)
Inventor
吴荣华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN NORCO INTELLIGENT TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN NORCO INTELLIGENT TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN NORCO INTELLIGENT TECHNOLOGY Co Ltd filed Critical SHENZHEN NORCO INTELLIGENT TECHNOLOGY Co Ltd
Priority to CNA2008100664632A priority Critical patent/CN101256610A/en
Publication of CN101256610A publication Critical patent/CN101256610A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a method for encrypting computer system, comprising the following steps of: a, coding and translating encryption and decryption program codes into a BIOS; b, running a password program; c, reading the serial number of hard disks, if the serial numbers are present, entering the step h, or entering the step e; e, executing backups of the serial numbers of hard disks in the BIOS; f, encrypting the hard disc guide sectors and partition table sectors; g, rebooting the hardware system and performing the step c after the BIOS is electrified; h, reading the backup serial numbers of hard disks in the BIOS; I, judging whether the two serial numbers of hard disks match with each other, if so, entering the step k, or entering the step j; j, showing an error hint and shutting down the computer; k, decrypting the hardware system guide sectors and partition table sectors. As the encryption and decryption programs are coded and translated by the BIOS at the same time, and embedded into the BIOS in the binary manner, the passive following is avoided and the computer has higher safety.

Description

A kind of encryption method of computer system
Technical field
The present invention relates to a kind of computing machine and count a tree name safeguard protection field, specifically, be meant a kind of encryption method of computer system.
Background technology
At present, the research and development input of computer software is very huge, particularly computer system software.Yet the user in a lot of areas is really very thin to the intellectual property right consciousness of computer software at present, cause pirate market extensively to exist, flourishing long time, each fatware company not only will keep on improving on software function, and not irrevocably lost in order to prevent that research and development from dropping into, and also need rack one's brains in software cryptography, software enciphering method commonly used at present has manufacturer that serial number encryption is provided, or USB is provided, softdogs such as LPT are encrypted, omnifarious encryption methods such as over-network registration authentication.
Yet present software enciphering method all has defective more or less.
Such as our common sequence number authentication, it is followed the tracks of and cracks by the people than being easier to, and network authentication is to the dependence of network, and is also very unpractical.USB, softdogs such as LPT are encrypted has not only increased cost, and is easier to be followed the tracks of and crack by the people.
Summary of the invention
The object of the present invention is to provide a kind of encryption method of computer system, it can overcome existing defective, and encrypting and decrypting program and BIOS are compiled simultaneously, is embedded among the BIOS with binary mode, avoids dynamically being followed the tracks of, and security is stronger.
In order to achieve the above object, the technical solution adopted in the present invention is:
A kind of encryption method of computer system, it may further comprise the steps:
A, the password program code compile is stored among the BIOS;
B, BIOS move password program to the Equipment Inspection of computer system and after just exerting finished;
Every computer all can have the firmware of a connection hardware and operating system, we are appellation BIOS, we are the some of encrypting and decrypting program as BIOS, be compiled among the whole BIOS, at BIOS to hardware CPU for example, chipset, and after some Equipment Inspections such as hard disk and initialization finish, rerun our encrypting and decrypting program is to judge whether the being system of validated user.
C, read the hard disk sequence number;
D, judge whether backed up the hard disk sequence number among the BIOS,, enter step h,, enter step e if do not have if having;
E, backup hard disk sequence number are to BIOS;
F, hard disk boot sector and partition table sector are encrypted;
G, restart hardware system, BIOS is re-powered after, operating procedure c then;
Encryption to system is only carried out in female BIOS, female BIOS is meant that firm compiling comes out, also the BIOS that on hardware system, did not move, it some be used for preserving the space of hard disk sequence number, female BIOS start writes this with the hard disk sequence number and partly just becomes behind space and be sub-BIOS, so we we female BIOS can read the sequence number of hard disk earlier when starting shooting, detect simultaneously and whether backed up sequence number, if explanation is not backup for the first time, so current hard disk sequence number is preserved the space of the sequence number that BIOS reserves after by cryptographic calculation, afterwards the boot sector and the partition table sector number a tree name of current hard disk are encrypted, after finishing the encryption of sequence number preservation and hard disk boot sector and partition table sector, restart hardware system.
H, read the hard disk sequence number of BIOS backup;
I, judge whether two hard disk sequence numbers mate,,, enter step j if do not match if coupling enters step k;
J, the wrong shutdown of prompting;
K, deciphering hard-disk system boot sector and partition table sector.
In above-mentioned steps e, current hard disk sequence number is to backup among the BIOS by cryptographic algorithm.
In above-mentioned steps f, its described encryption method is that selected specific character string and data are carried out XOR, and carries out byte shift.
In above-mentioned steps k, it is deciphering hard-disk system boot sector and partition table sector in internal memory.
After adopting said method, because the encrypting and decrypting program all is to compile simultaneously with BIOS, be embedded among the BIOS with binary mode, so the dynamic tracking of having no idea basically to accomplish, so compared with prior art, its security has obvious enhancing than other.
Description of drawings
Fig. 1 is a structured flowchart of the present invention.
Embodiment
Please refer to shown in Figure 1ly, the invention discloses a kind of encryption method of computer system, it may further comprise the steps:
A, encryption and decryption program code compiling is stored among the BIOS;
B, BIOS move password program to the Equipment Inspection of computer system and after just exerting finished;
C, read the hard disk sequence number;
D, judge whether backed up the hard disk sequence number among the BIOS,, enter step h,, enter step e if do not have if having;
E, current hard disk sequence number is backuped among the BIOS by cryptographic algorithm;
F, hard disk boot sector and partition table sector are encrypted, its encryption method is that selected specific character string and data are carried out XOR, and carries out byte shift;
G, restart hardware system, BIOS is re-powered after, operating procedure c then;
H, read the hard disk sequence number of BIOS backup;
I, judge whether two hard disk sequence numbers mate,,, enter step j if do not match if coupling enters step k;
J, the wrong shutdown of prompting;
K, in internal memory deciphering hard-disk system boot sector and partition table sector.
Specific embodiment is enumerated in the invention, is not in order to restriction the invention, in not breaking away from the present invention's spirit scope, to those skilled in the art, can do various variations, modification and application, and all this all still belongs to the protection domain of this patent.

Claims (4)

1, a kind of encryption method of computer system, it is characterized in that: it may further comprise the steps:
A, the password program code compile is stored among the BIOS;
B, BIOS move password program to the Equipment Inspection of computer system and after just exerting finished;
C, read the hard disk sequence number;
D, judge whether backed up the hard disk sequence number among the BIOS,, enter step h,, enter step e if do not have if having;
E, backup hard disk sequence number are to BIOS;
F, hard disk boot sector and partition table sector are encrypted;
G, restart hardware system, BIOS is re-powered after, operating procedure c then;
H, read the hard disk sequence number of BIOS backup;
I, judge whether two hard disk sequence numbers mate,,, enter step j if do not match if coupling enters step k;
J, the wrong shutdown of prompting;
K, deciphering hard-disk system boot sector and partition table sector.
2, the encryption method of computer system as claimed in claim 1 is characterized in that: in step e, current hard disk sequence number is to backup among the BIOS by cryptographic algorithm.
3, the encryption method of computer system as claimed in claim 1 is characterized in that: in step f, its described encryption method is that selected specific character string and data are carried out XOR, and carries out byte shift.
4, the encryption method of computer system as claimed in claim 1 is characterized in that: in step k, it is deciphering hard-disk system boot sector and partition table sector in internal memory.
CNA2008100664632A 2008-04-08 2008-04-08 Method for ciphering computer system Pending CN101256610A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008100664632A CN101256610A (en) 2008-04-08 2008-04-08 Method for ciphering computer system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008100664632A CN101256610A (en) 2008-04-08 2008-04-08 Method for ciphering computer system

Publications (1)

Publication Number Publication Date
CN101256610A true CN101256610A (en) 2008-09-03

Family

ID=39891426

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008100664632A Pending CN101256610A (en) 2008-04-08 2008-04-08 Method for ciphering computer system

Country Status (1)

Country Link
CN (1) CN101256610A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102385671A (en) * 2010-09-02 2012-03-21 研祥智能科技股份有限公司 Method and system for encrypting software
CN104361298A (en) * 2014-10-30 2015-02-18 中国人民解放军信息工程大学 Method and device for information safety and confidentiality
CN107025388A (en) * 2016-02-02 2017-08-08 上海格尔软件股份有限公司 It is a kind of that the method that system disk is bound with machine is realized based on TPM chips
CN107633185A (en) * 2017-09-21 2018-01-26 联想(北京)有限公司 A kind of method and electronic equipment for protecting storage device data safety
CN108197477A (en) * 2017-12-29 2018-06-22 山东超越数控电子股份有限公司 A kind of method prevented hard disk and replaced
CN113485757A (en) * 2021-07-22 2021-10-08 北京青云科技股份有限公司 Decryption method, device, equipment and storage medium in system starting process

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102385671A (en) * 2010-09-02 2012-03-21 研祥智能科技股份有限公司 Method and system for encrypting software
CN102385671B (en) * 2010-09-02 2016-05-04 研祥智能科技股份有限公司 Software enciphering method and system
CN104361298A (en) * 2014-10-30 2015-02-18 中国人民解放军信息工程大学 Method and device for information safety and confidentiality
CN104361298B (en) * 2014-10-30 2017-10-10 中国人民解放军信息工程大学 The method and apparatus of Information Security
CN107025388A (en) * 2016-02-02 2017-08-08 上海格尔软件股份有限公司 It is a kind of that the method that system disk is bound with machine is realized based on TPM chips
CN107633185A (en) * 2017-09-21 2018-01-26 联想(北京)有限公司 A kind of method and electronic equipment for protecting storage device data safety
CN108197477A (en) * 2017-12-29 2018-06-22 山东超越数控电子股份有限公司 A kind of method prevented hard disk and replaced
CN113485757A (en) * 2021-07-22 2021-10-08 北京青云科技股份有限公司 Decryption method, device, equipment and storage medium in system starting process

Similar Documents

Publication Publication Date Title
US10331376B2 (en) System and method for encrypted disk drive sanitizing
CN101256610A (en) Method for ciphering computer system
CN1329787C (en) Method of preventing firmware piracy
US7325126B2 (en) System and method for distributed module authentication
CN101968834A (en) Encryption method and device for anti-copy plate of electronic product
JP2012118956A (en) Index table-based code encryption and decryption device and method therefor
US20080263542A1 (en) Software-Firmware Transfer System
CN110555290A (en) industrial control software copyright protection method and system based on FPGA
CA2830100A1 (en) Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme
CN104636685A (en) Method for protecting linux operation system on loongson hardware platform
CN101930521A (en) File protecting method and device thereof
JP2009080772A (en) Software starting system, software starting method and software starting program
KR101558914B1 (en) How multimedia source files generated by the usb otg memory not applied anti-piracy system and to play
CN111191194B (en) Off-line use permission system for multi-core processor software integrated development environment
CN1673982A (en) Method for realizing hard disk protection
CN104751042A (en) Credibility detection method based on password hash and biometric feature recognition
CN107958141A (en) A kind of method for protecting software based on chip ID number
US8490208B2 (en) Method and device for detecting if a computer file has been copied and method and device for enabling such detection
CN116383779A (en) Software authorization and permission system for preventing software piracy
JP2009252142A (en) Data processing apparatus
KR101405915B1 (en) Method for writing data by encryption and reading the data thereof
KR20120001656A (en) Method, system and secure processor for executing a software application
CN103377327A (en) PHP program protection method and system
Kang et al. Softmark: software watermarking via a binary function relocation
CN101587723B (en) Anti-copy optical storage medium and manufacturing method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20080903