CN115640552A - Method, device, equipment and medium for preventing Linux operating system from being stolen - Google Patents

Method, device, equipment and medium for preventing Linux operating system from being stolen Download PDF

Info

Publication number
CN115640552A
CN115640552A CN202211368327.5A CN202211368327A CN115640552A CN 115640552 A CN115640552 A CN 115640552A CN 202211368327 A CN202211368327 A CN 202211368327A CN 115640552 A CN115640552 A CN 115640552A
Authority
CN
China
Prior art keywords
operating system
mainboard
preset
computer
matching
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211368327.5A
Other languages
Chinese (zh)
Inventor
刘永平
胡学云
林元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Realbom Information Co Ltd
Original Assignee
Shenzhen Realbom Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Realbom Information Co Ltd filed Critical Shenzhen Realbom Information Co Ltd
Priority to CN202211368327.5A priority Critical patent/CN115640552A/en
Publication of CN115640552A publication Critical patent/CN115640552A/en
Pending legal-status Critical Current

Links

Images

Abstract

The application relates to a method, a device, equipment and a medium for preventing the Linux operating system from being stolen, wherein the method comprises the following steps: when a starting-up instruction is detected, acquiring a mainboard ID, and judging whether the mainboard ID is consistent with a preset mainboard ID, wherein the preset mainboard ID is the preset mainboard ID of a computer capable of entering an operating system; if yes, judging whether the operation system is entered for the first time; if the first time of entering the operating system, entering an activation interface of the operating system; acquiring an activation key of an operating system, and matching the activation key with a preset activation key; if the matching fails, the operating system is prevented from being activated; and if the matching is successful, the operating system is allowed to be activated so as to be normally used. The binding of the operating system and the computers is carried out by using the same mainboard ID of the same batch of computers, so that the problem that each computer needs to bind the operating system one by one is effectively solved, the execution operation is simpler, and the labor cost is reduced.

Description

Method, device, equipment and medium for preventing Linux operating system from being stolen
Technical Field
The present application relates to the field of computer security technologies, and in particular, to a method, an apparatus, a device, and a medium for anti-theft of a Linux operating system.
Background
In the open Internet era, the software anti-piracy task is highlighted, and the software is used as an intangible product and condenses the hard work of developers. However, due to the reproducibility of software and the extremely low copying cost, the copying work of a pirate is greatly facilitated. The software is pirated in a large quantity, and great loss is caused to software distributors and related industries and users. Nowadays, computers are one of the key points in the development of network information systems, wherein an operating system is an important component of computer software, and the operating system is a fundamental stone for application software development and national, collective and personal information security, so that the use of a legal operating system is the most fundamental factor for ensuring the stable and safe operation of the computers. Moreover, the installation files of the pirated operating system are often modified, viruses and trojans are embedded in the installation files, the stability and the reliability of the computer are seriously influenced, and even personal information can be leaked.
The Linux operating system plays a special role in bearing other application software in the system, has the characteristics of stability, high efficiency, less vulnerability, capability of quick repair and relatively no resource consumption, is deeply favored by the majority of users, and therefore, the copyright protection of the Linux operating system is more important. In the related art, in order to implement the anti-piracy function of the Linux operating system, the Linux operating system needs to be bound with a unique hard disk ID (Identity identification number) of the computer, however, when the Linux operating system is installed on computers produced in a batch industry, the Linux operating system needs to be bound with the computer one by one, which consumes higher labor cost and is more complex in execution operation.
Therefore, how to solve the above technical problems is a problem to be solved urgently by those skilled in the art.
Disclosure of Invention
The present application aims to provide a method, an apparatus, a device and a medium for anti-theft of a Linux operating system, which are used for solving at least one technical problem.
The above object of the present invention is achieved by the following technical solutions:
in a first aspect, the present application provides a method for preventing theft of a Linux operating system, which adopts the following technical scheme:
a method for anti-theft of a Linux operating system, the method comprising:
when a starting-up instruction is detected, acquiring a mainboard ID of a computer, and judging whether the mainboard ID is consistent with a preset mainboard ID, wherein the preset mainboard ID is the preset mainboard ID of the computer capable of entering an operating system and is stored in a BIOS of the mainboard;
if not, quitting the operating system and carrying out shutdown processing; if yes, judging whether the operation system is entered for the first time;
if the operation system is not entered for the first time, the operation system is normally used; if the first time of entering the operating system, entering an activation interface of the operating system;
acquiring an activation key of an operating system, and matching the activation key with a preset activation key;
if the matching fails, the operating system is prevented from being activated; and if the matching is successful, the operating system is allowed to be activated so as to be normally used.
By adopting the technical scheme, after the starting instruction is detected, whether the mainboard ID is consistent with the preset mainboard ID is judged, wherein the preset mainboard ID is the preset mainboard ID of the computer capable of entering the operating system. If the key is consistent with the preset key, judging whether the operating system is entered for the first time, if so, matching the activation key with the preset activation key, and activating the operating system and normally using the operating system after the matching is successful. By the mode, the operating system and the computers are bound by the same mainboard ID of the same batch of computers, namely, the operating system can be suitable for the same batch of computers, the problem that each computer needs to be bound one by one is effectively solved, the executing operation is simpler, and the labor cost is reduced.
The present application may be further configured in a preferred example to: judging whether the mainboard ID is consistent with a preset mainboard ID or not comprises the following steps:
judging whether the mainboard ID is consistent with a preset mainboard ID or not, if not, updating the mainboard ID matching times to obtain the updating times, wherein the initial mainboard ID matching times is zero;
after a preset time period, judging whether the updating times are not more than preset times;
if so, judging whether the mainboard ID is consistent with a preset mainboard ID again;
and if not, finally determining that the mainboard ID is inconsistent with a preset mainboard ID.
By adopting the technical scheme, under the condition that the mainboard ID is inconsistent with the preset mainboard ID at one time, the inconsistency between the mainboard ID and the preset mainboard ID is not directly confirmed, but the matching condition between the mainboard ID and the preset mainboard ID is finally determined after the judgment of the maximum preset times, and by utilizing the mode, the wrong shutdown treatment caused by the wrong judgment due to matching can be avoided, and the accuracy of the inconsistency judgment between the mainboard ID and the preset mainboard ID is improved.
The present application may be further configured in a preferred example to: in the process of normally using the operating system, the method further comprises the following steps:
monitoring whether abnormal operation exists in real time, wherein the abnormal operation is operation of illegally copying or modifying an operating system;
if the abnormal operation exists, the abnormal operation is intercepted, and alarm information is generated to play a warning role.
Through adopting above-mentioned technical scheme, whether real time monitoring has unusual operation, if have unusual operation, then intercept unusual operation, and generate alarm information, can promote the ability that operating system prevented the theft and used, simultaneously, also convenient to use person in time learns whether the computer suffers illegal invasion.
The present application may be further configured in a preferred example to: the abnormal operation includes operations of copying operating system files and destroying the anti-theft function of the operating system, if the abnormal operation exists, the abnormal operation is intercepted, alarm information is generated, and the method includes the following steps:
if the file operation of the copy operation system is detected to exist, the copy operation is terminated, and first alarm information corresponding to the copy operation is generated, wherein the first alarm information is used for enabling a user to know that the illegal copy operation exists;
if the operation of destroying the anti-theft function of the operating system is detected, stopping the destroying operation and generating second alarm information corresponding to the destroying operation, wherein the second alarm information is used for enabling a user to know that the destroying operation exists;
the alarm information comprises the first alarm information and the second alarm information. .
By adopting the technical scheme, if the operation of copying the file of the operating system and the operation of destroying the anti-theft function of the operating system are detected, the corresponding operation is terminated, and the alarm information corresponding to the operation is generated, so that the anti-theft capability of the operating system is improved, and a user can know that the illegal copying operation and the destroying operation exist in the computer in time.
The application may be further configured in a preferred example to: after entering the operating system for the first time and activating the operating system, the method further comprises the following steps:
detecting the partition condition of the hard disk, if the hard disk is divided into at least two partitions, determining the partition stored by an operating system and marking as a first partition;
and transplanting part of key program files in the operating system files to any partition in a second partition, wherein the second partition is all the other partitions except the first partition in the hard disk.
By adopting the technical scheme, after the operating system is entered for the first time and is activated, the partition condition of the hard disk is detected, if the hard disk is divided into at least two partitions, the partition stored by the operating system is determined and marked as a first partition, and part of the key program files in the operating system files are transplanted to any partition in a second partition. By using the method, the operating system files are respectively stored in different hard disk partitions, and if the operating system files are illegally copied by a pirate, the operating system files cannot be copied to a complete operating system, so that the anti-theft capability of the operating system is improved.
The application may be further configured in a preferred example to: after the startup instruction is detected, acquiring a mainboard ID of the computer, including:
acquiring past time judged by a previous mainboard ID and a preset mainboard ID, and calculating a time interval between the current time and the past time;
judging whether the time interval is smaller than a regular detection interval or not;
and if the detection interval is not less than the regular detection interval, acquiring the mainboard ID of the computer.
By adopting the technical scheme, the time interval between the current time and the past time is calculated, and if the time interval is not less than the regular detection interval, the mainboard ID of the computer is obtained. By the mode, the mainboard ID is prevented from being acquired by each time of starting, and the operation of matching and judging with the preset mainboard ID is avoided, so that the speed of starting to enter the operating system is increased to a certain extent, and the experience of a user is improved.
The present application may be further configured in a preferred example to: further comprising:
acquiring an operating system code and a mainboard ID, wherein the operating system code is generated based on a preset mainboard ID and an operating system code rule;
decoding the operating system code to obtain the preset mainboard ID;
matching the mainboard ID with the preset mainboard ID, and if the matching is successful, normally using an operating system;
and if the matching fails, quitting the operating system and performing shutdown processing.
By adopting the technical scheme, the operating system code and the mainboard ID are obtained, and then the operating system code is decoded to obtain the preset mainboard ID; and matching the mainboard ID with a preset mainboard ID, and performing corresponding operation based on a matching result. The operating system code is generated based on a preset mainboard ID of a computer with an operating system copyright and an operating system code rule, and if the computer has the operating system copyright, the mainboard ID can be successfully matched with the preset mainboard ID; if the operating system of the computer is an illegally copied operating system, the mainboard ID cannot be successfully matched with the preset mainboard ID, so that the operating system is quitted, and the shutdown processing is carried out. By the method, even the copied operating system of the computer without the operating system copyright can not be normally used, and the operating system is further prevented from being stolen.
In a second aspect, the present application provides an apparatus for preventing Linux operating system from being stolen, which adopts the following technical solutions:
an anti-theft device for Linux operating system comprises,
the system comprises a mainboard ID detection module, a main Board Identification (BIOS) module and a main board Identification (ID) processing module, wherein the mainboard ID detection module is used for acquiring a mainboard ID of a computer after a starting instruction is detected, and judging whether the mainboard ID is consistent with a preset mainboard ID or not, and the preset mainboard ID is a preset mainboard ID of the computer capable of entering an operating system and is stored in the BIOS of the mainboard;
the first processing module is used for quitting the operating system and carrying out shutdown processing if the operating system is inconsistent with the first processing module; if yes, judging whether the operation system is entered for the first time;
the second processing module is used for normally using the operating system if the operating system is not entered for the first time; if the first time of entering the operating system, entering an activation interface of the operating system;
the activation key matching module is used for acquiring an activation key of an operating system and matching the activation key with a preset activation key;
the third processing module is used for preventing the operating system from being activated if the matching fails; and if the matching is successful, the operating system is allowed to be activated so as to be normally used.
By adopting the technical scheme, after the starting instruction is detected, whether the mainboard ID is consistent with the preset mainboard ID is judged, wherein the preset mainboard ID is the preset mainboard ID of the computer capable of entering the operating system. If the key is consistent with the preset key, judging whether the operating system is entered for the first time, if so, matching the activation key with the preset activation key, and activating the operating system and normally using the operating system after the matching is successful. By the mode, the operating system and the computers are bound by the same mainboard ID of the same batch of computers, namely, the operating system can be suitable for the same batch of computers, the problem that each computer needs to be bound one by one is effectively solved, the executing operation is simpler, and the labor cost is reduced.
In a third aspect, the present application provides an electronic device, which adopts the following technical solutions:
at least one processor;
a memory;
at least one application, wherein the at least one application is stored in the memory and configured to be executed by the at least one processor, the at least one application configured to: the above-described method is performed.
By adopting the technical scheme, after the starting instruction is detected, whether the mainboard ID is consistent with the preset mainboard ID or not is judged, wherein the preset mainboard ID is the preset mainboard ID of the computer capable of entering the operating system. If the key is consistent with the preset key, judging whether the operating system is entered for the first time, if so, matching the activation key with the preset activation key, and activating the operating system and normally using the operating system after successful matching. By the mode, the binding of the operating system and the computers is carried out by utilizing the same mainboard ID of the same batch of computers, namely, the operating system can be suitable for the same batch of computers, the problem that each computer needs to bind the operating system one by one is effectively solved, the execution operation is simpler, and the labor cost is reduced.
In a fourth aspect, the present application provides a computer-readable storage medium, which adopts the following technical solutions:
a computer-readable storage medium, on which a computer program is stored which, when executed in a computer, causes the computer to carry out the method described above.
By adopting the technical scheme, after the starting instruction is detected, whether the mainboard ID is consistent with the preset mainboard ID is judged, wherein the preset mainboard ID is the preset mainboard ID of the computer capable of entering the operating system. If the key is consistent with the preset key, judging whether the operating system is entered for the first time, if so, matching the activation key with the preset activation key, and activating the operating system and normally using the operating system after the matching is successful. By the mode, the binding of the operating system and the computers is carried out by utilizing the same mainboard ID of the same batch of computers, namely, the operating system can be suitable for the same batch of computers, the problem that each computer needs to bind the operating system one by one is effectively solved, the execution operation is simpler, and the labor cost is reduced.
In summary, the present application includes at least one of the following beneficial technical effects:
1. and when a starting-up instruction is detected, judging whether the mainboard ID is consistent with a preset mainboard ID, wherein the preset mainboard ID is the preset mainboard ID of a computer capable of entering an operating system. If the key is consistent with the preset key, judging whether the operating system is entered for the first time, if so, matching the activation key with the preset activation key, and activating the operating system and normally using the operating system after the matching is successful. By the mode, the operating system and the computers are bound by the same mainboard ID of the same batch of computers, namely, the operating system can be suitable for the same batch of computers, the problem that each computer needs to be bound one by one is effectively solved, the executing operation is simpler, and the labor cost is reduced.
Drawings
Fig. 1 is a flowchart illustrating a method for preventing theft of a Linux operating system according to an embodiment of the present application.
Fig. 2 is a schematic flowchart illustrating a process of monitoring abnormal operation and intercepting an alarm by the Linux operating system according to an embodiment of the present application.
Fig. 3 is a schematic structural diagram of an apparatus for anti-theft of a Linux operating system according to an embodiment of the present application.
Fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The present application is described in further detail below with reference to the drawings.
The present embodiment is only for explaining the present application, and it is not limited to the present application, and those skilled in the art can make modifications of the present embodiment without inventive contribution as needed after reading the present specification, but all of them are protected by patent laws within the scope of the present application.
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In addition, the term "and/or" herein is only one kind of association relationship describing an associated object, and means that there may be three kinds of relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship, unless otherwise specified.
The embodiments of the present application will be described in further detail with reference to the drawings attached hereto.
The Linux operating system plays a special role in bearing other application software in the system, has the characteristics of stability, high efficiency, less vulnerability, capability of quick repair and relatively no resource consumption, is deeply favored by the majority of users, and therefore, the copyright protection of the Linux operating system is more important. In the related art, in order to implement the anti-piracy function of the Linux operating system, the Linux operating system needs to be bound with the unique hard disk ID of the computer, that is, the anti-theft module in the Linux operating system matches the preset hard disk ID pre-stored in the anti-theft module with the acquired hard disk ID of the current computer, so as to prevent the Linux operating system from being stolen. However, the applicant finds that, when installing the Linux operating system in a computer produced in a batch industry, the Linux operating system needs to be bound with the computer one by one, which consumes higher labor cost and is more complex to execute operation. Therefore, the operating system is bound with the mainboard ID, namely, the anti-theft module in the Linux operating system matches the pre-stored mainboard ID pre-stored in the anti-theft module with the acquired mainboard ID of the current computer, wherein the mainboard IDs of a plurality of computers produced in the same batch are the same, so that the Linux operating system can be conveniently bound with the batch computers to prevent the operating system from being stolen.
The embodiment of the application provides an anti-theft method for a Linux operating system, which is executed by electronic equipment, wherein the electronic equipment can be a server or terminal equipment, the server can be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, and a cloud server for providing cloud computing service. The terminal device may be a smart phone, a tablet computer, a notebook computer, a desktop computer, and the like, but is not limited thereto, the terminal device and the server may be directly or indirectly connected through a wired or wireless communication manner, and an embodiment of the present application is not limited thereto, as shown in fig. 1, the method includes step S101, step S102, step S103, step S104, and step S105, where:
step S101: when a starting-up instruction is detected, acquiring a mainboard ID of the computer, and judging whether the mainboard ID is consistent with a preset mainboard ID, wherein the preset mainboard ID is the preset mainboard ID of the computer capable of entering an operating system and is stored in a BIOS of the mainboard;
for the embodiment of the application, in order to prevent the operating system from being stolen, an anti-theft module may be arranged in the operating system, and the anti-theft module performs subsequent operations. Judging whether the mainboard ID of the current computer is consistent with a preset mainboard ID, wherein the preset mainboard ID is written to a Basic Input Output System (BIOS) of the mainboard in advance by a technician, the preset mainboard ID is the mainboard ID of a batch of computers with operating System copyright, and the mainboard IDs of the computers in the same batch are the same.
The mainboard ID is matched with the preset mainboard ID, so that the operating system can be suitable for the same batch of computers, and if the operating system needs to be updated, upgraded and the like in the subsequent use process, the updated and upgraded operating system can be suitable for a batch of computers, so that the later maintenance of the operating system is simpler.
Step S102: if not, quitting the operating system and performing shutdown processing; if yes, judging whether the operation system is entered for the first time;
step S103: if the operation system is not entered for the first time, the operation system is normally used; if the first time of entering the operating system, entering an activation interface of the operating system;
for the embodiment of the application, if the mainboard ID is inconsistent with the preset mainboard ID, the current computer does not have the authority to use the operating system, the operating system is quitted, and shutdown processing is performed, so that a pirate is prevented from copying and deploying the operating system to other computers. If the mainboard ID is inconsistent with the preset mainboard ID, the computer is indicated to have the authority of using the operating system at present, whether the computer enters the operating system for the first time needs to be judged, and if the computer enters the operating system for the first time, the operating system needs to be activated by using an activation key so as to normally use the operating system; if the operation system is not entered for the first time, the operation is activated and can be normally used.
The method comprises the steps of judging whether an operating system is entered for the first time or not, wherein in an realizable mode, judging whether a computer enters the operating system for the first time or not by acquiring the activation time of the operating system, and specifically, if the activation time of the operating system exists, indicating that the computer does not enter the operating system for the first time; if the operating system activation time does not exist, the first time the operating system is entered is indicated. In another implementation manner, the operating system use time is obtained to determine whether the computer enters the operating system for the first time, specifically, if the operating system use time exists, it indicates that the computer does not enter the operating system for the first time; if the operating system use time does not exist, the first time the operating system is entered is indicated. The embodiment of the present application is not limited to determine whether the operating system is entered for the first time.
Step S104: acquiring an activation key of an operating system, and matching the activation key with a preset activation key;
for the embodiment of the application, an activation key of an operating system is obtained, where the activation key is input into a computer by a user when the system is activated, and the activation key is generally attached to a packaging box when the computer leaves a factory, or is sent by a mail when the user purchases the computer. Since the preset activation key is used as a criterion for determining the activation system, the preset activation keys of each computer are usually different, and the embodiment of the present application is not limited to the rule for generating the preset activation key. In one implementation, the default activation key may be generated based on a default algorithm based on a motherboard ID, a hard disk ID, or other information that uniquely identifies the computer. In another implementation, a character string in a preset format may be composed based on the device serial number and the basic information, and a preset algorithm may be used to generate the preset activation key for the character string. Then, matching the activation key with a preset activation key, wherein the matching process is as follows: and matching the acquired activation key with a preset activation key bit by bit.
Step S105: if the matching fails, the operating system is prevented from being activated; and if the matching is successful, the operating system is allowed to be activated so as to be normally used.
For the embodiment of the present application, the activation key is matched with a preset activation key, and if the matching fails, it indicates that the activation key is not matched with the computer, the activation of the operating system is prevented, where the manner of preventing the activation of the operating system may be: returning to an activation interface of the operating system or quitting the operating system; and if the matching is successful, the operating system is allowed to be activated and used normally.
Therefore, in the embodiment of the application, after the power-on instruction is detected, whether the mainboard ID is consistent with the preset mainboard ID is judged, wherein the preset mainboard ID is a preset mainboard ID of a computer capable of entering an operating system. If the key is consistent with the preset key, judging whether the operating system is entered for the first time, if so, matching the activation key with the preset activation key, and activating the operating system and normally using the operating system after the matching is successful. By the mode, the binding of the operating system and the computers is carried out by utilizing the same mainboard ID of the same batch of computers, namely, the operating system can be suitable for the same batch of computers, the problem that each computer needs to bind the operating system one by one is effectively solved, the execution operation is simpler, and the labor cost is reduced.
Further, in order to improve the mainboard ID and the inconsistent precision of judging of predetermineeing mainboard ID, in the embodiment of the present application, judge whether mainboard ID is unanimous with predetermineeing mainboard ID, include:
judging whether the mainboard ID is consistent with a preset mainboard ID or not, if not, updating the mainboard ID matching times to obtain the updating times, wherein the initial mainboard ID matching times are zero;
after a preset time period, judging whether the updating times are not more than preset times or not;
if yes, judging whether the mainboard ID is consistent with the preset mainboard ID again;
if not, finally determining that the mainboard ID is inconsistent with the preset mainboard ID.
For the embodiment of the application, when judging whether the mainboard ID is consistent with the preset mainboard ID, the program for judging whether the ID is consistent has a fault condition, so that the operating system is withdrawn and the shutdown processing is carried out only by means of inconsistency between the mainboard ID and the preset mainboard ID, a certain degree of error judgment probability exists, and a bad experience feeling is brought to a user. Therefore, if the motherboard ID is inconsistent with the preset motherboard ID, the determination operation is performed several times to avoid the computer being stopped by mistake due to the failure of the program for determining whether the ID is consistent.
Specifically, if the motherboard ID is not consistent with the preset motherboard ID, the motherboard ID matching times are updated, the initial motherboard ID matching times is zero, each update adds one to the motherboard ID matching times, and after a preset time period, it is determined whether the update times are not greater than the preset times, and if the update times are less than the preset times, the determination operation is performed again; if the number of times is not less than the preset number of times, finally determining that the mainboard ID is inconsistent with the preset mainboard ID; the preset time interval is used for giving a certain stop time to a program for judging whether the IDs are consistent, and the preset times is the set highest threshold value of the times of executing the judgment operation.
Therefore, in the embodiment of the application, under the condition that the primary mainboard ID is inconsistent with the preset mainboard ID, the inconsistency between the mainboard ID and the preset mainboard ID is not directly confirmed, but the matching condition between the mainboard ID and the preset mainboard ID is finally determined after the judgment of the maximum preset times.
Further, in order to improve the ability of operating system to prevent theft, the user of convenience can know whether the computer suffers from illegal intrusion in time, in this embodiment of the application, in the process of normally using the operating system, the method further includes:
monitoring whether abnormal operation exists in real time, wherein the abnormal operation is operation of illegally copying or modifying the operating system;
if the abnormal operation exists, the abnormal operation is intercepted, and alarm information is generated to play a warning role.
For the embodiment of the application, in the process of normally using the operating system, a software pirate may perform some abnormal operations, for example, operations of illegally copying the operating system, operations of privately tampering files of the operating system, and the like, so as to obtain the use right of the software in an illegal manner. Thus, there is a need to monitor in real time whether there is an abnormal operation, i.e., whether there is an operation of illegally copying or modifying the operating system. Specifically, the operation of illegally copying the operating system includes copying an operating system file by using a usb disk, or copying the operating system file after mirroring the operating system file. The operation of illegally modifying the operating system is usually to tamper with the anti-theft function module of the operating system privately so that the operating system no longer has the anti-theft function.
If the abnormal operation is detected, the abnormal operation needs to be immediately intercepted, specifically, for stopping the abnormal operation and generating alarm information, the alarm information can be displayed in a form of a pop-up box of the computer interface, so that a user can quickly know that the current computer operating system is subjected to illegal intrusion.
Therefore, in the embodiment of the application, whether abnormal operation exists is monitored in real time, if the abnormal operation exists, the abnormal operation is intercepted, the alarm information is generated, the anti-theft capacity of the operating system can be improved, and meanwhile, a user can conveniently know whether the computer is illegally invaded or not in time.
Further, in order to improve the anti-theft capability of the operating system, in the embodiment of the present application, the abnormal operation includes an operation of copying files of the operating system and an operation of destroying the anti-theft function of the operating system,
if the abnormal operation exists, intercepting the abnormal operation, and generating alarm information, including step Sa and step Sb, as shown in fig. 2, wherein:
step Sa: if the file operation of the copy operation system is detected to exist, the copy operation is terminated, and first alarm information corresponding to the copy operation is generated, wherein the first alarm information is used for enabling a user to know that the illegal copy operation exists;
for the embodiment of the application, usually, when a pirate pirates software, the pirate pirates the software, and the copied operating system file is deployed on a computer which does not purchase the copyright of the operating system, which causes great loss to software distributors and related industries and users. Therefore, if it is detected that there is an operation to copy the operating system file, the copy operation is terminated, specifically, an instruction is sent to the process management program, so that the process management program terminates the process of the copy operation. And generating first alarm information corresponding to the copying operation, wherein the first alarm information includes but is not limited to: the name of the abnormal operation process and the type of the abnormal operation are illegal copy and time for generating the abnormal operation. The first alarm information can be displayed in a form of a computer interface pop-up frame, so that a user can quickly know that the illegal copying operation exists in the current computer operating system.
Step Sb: if the operation of destroying the anti-theft function of the operating system is detected, the destroying operation is stopped, and second alarm information corresponding to the destroying operation is generated, wherein the second alarm information is used for enabling a user to know that the destroying operation exists; the alarm information comprises first alarm information and second alarm information.
For the embodiment of the application, if the operation of destroying the anti-theft function of the operating system is detected, the process of destroying the anti-theft function of the operating system is determined, and an instruction is sent to the process management program, so that the process management program stops the process of destroying the anti-theft function of the operating system. Specifically, before the computer is started and enters the operating system, the mainboard ID is matched with the preset mainboard ID, so that the operating system is prevented from being illegally stolen. In order to enable the operating system to be used by other unauthorized computers, pirates may illegally tamper with the anti-theft modules in the operating system, for example, an operation of matching the motherboard ID when the power is turned off, deletion of the anti-theft modules in the operating system, and the like. The specific operation of destroying the anti-theft function of the operating system is not limited in the embodiment of the application.
Certainly, in the computer execution process, there are also operations of simultaneously detecting the file of the operating system and destroying the anti-theft function of the operating system, that is, if there are two kinds of abnormal operations, two kinds of alarm information are correspondingly generated, so that the user can know that there are illegal copy operations and destruction operations.
Therefore, in the embodiment of the application, if the operation of copying the file of the operating system and the operation of destroying the anti-theft function of the operating system are detected, the corresponding operation is terminated, and the alarm information corresponding to the operation is generated, so that the anti-theft capability of the operating system is improved, and a user can know that the computer has illegal copying operation and destroying operation in time.
Further, in order to improve the anti-theft capability of the operating system, in this embodiment of the application, after entering the operating system for the first time and activating the operating system, the method further includes:
detecting the partition condition of the hard disk, if the hard disk is divided into at least two partitions, determining the partition stored by an operating system, and marking as a first partition;
and transplanting part of key program files in the operating system files to any partition in a second partition, wherein the second partition is all the other partitions except the first partition in the hard disk.
For the embodiment of the present application, in order to further ensure that the operating system file is not copied by a pirate, after the computer enters the operating system for the first time and activates the operating system, part of the critical program files in the operating system file are migrated to other partitions of the disk, so that the operating system file copied by the pirate is incomplete and cannot be used in an unauthorized computer.
Specifically, the partition condition of the hard disk is detected, and the partition condition of the hard disk is set by a user, so that the partition condition of the hard disk is a partition, two partitions and a plurality of partitions respectively, and if the partition condition of the hard disk is two partitions or a plurality of partitions, the name of each partition needs to be marked in detail in the partition condition. If the hard disk is divided into at least two partitions, determining a partition stored by an operating system, marking as a first partition, and transplanting a part of key program files in the operating system files to any one of second partitions, wherein the first partition is a partition in the hard disk, and the second partition is all the partitions except the first partition in the hard disk and is at least a partition in the hard disk. The key program files include, but are not limited to: hardware drive files, memory management files and architecture core code files.
For example, if the hard disk is divided into two partitions, the partition stored by the operating system is determined to be the first partition, and thus, the other disk partition is the second partition, and part of the key program files in the operating system files are migrated to the second partition. If the hard disk is divided into three partitions, determining the partition stored by the operating system, recording the partition as a first partition, recording the partitions of the remaining two hard disks as a second partition, and then transplanting part of the key program file in the system file into any one of the two hard disk partitions in the second partition.
As can be seen, in the embodiment of the present application, after an operating system is entered and activated for the first time, a partition condition of a hard disk is detected, if the hard disk is divided into at least two partitions, a partition stored by the operating system is determined and marked as a first partition, and a part of key program files in operating system files are migrated to any partition in a second partition. By using the method, the operating system files are respectively stored in different hard disk partitions, and if the operating system files are illegally copied by a thief, the operating system files cannot be copied to a complete operating system, so that the anti-theft capability of the operating system is improved.
Further, in order to increase the speed of entering the operating system when booting, in the embodiment of the present application, after a boot instruction is detected, obtaining a motherboard ID of a computer includes:
acquiring past time judged by a previous mainboard ID and a preset mainboard ID, and calculating a time interval between the current time and the past time;
judging whether the time interval is smaller than a regular detection interval or not;
and if the detection interval is not less than the regular detection interval, acquiring the mainboard ID of the computer.
For the embodiment of the application, in the actual operation of the computer, if the operation of judging the mainboard ID and the preset mainboard ID is executed every time the computer is started to enter the operating system, the speed of starting the computer to enter the operating system is slowed to a certain extent, and the experience of a user is influenced. Therefore, the regular detection interval is set, that is, after every regular detection interval, the operation of judging the mainboard ID and the preset mainboard ID is performed once, and the speed of starting up and entering the operating system can be improved to a certain extent.
Specifically, the past time judged by the previous mainboard ID and the preset mainboard ID is obtained, the time interval between the current time and the past time is calculated, and whether the time interval is smaller than the regular detection interval or not is judged, wherein the regular detection interval is pre-stored in the computer, and a user can set the regular detection interval according to the actual situation. If the time interval is smaller than the regular detection interval, directly entering an operating system; and if the time interval is not less than the regular detection interval, acquiring the mainboard ID of the computer, and judging the mainboard ID and the preset mainboard ID to determine whether the current computer has the use right of the operating system.
Therefore, in the embodiment of the application, the time interval between the current time and the past time is calculated, and if the time interval is not less than the regular detection interval, the motherboard ID of the computer is acquired. By the mode, the mainboard ID is prevented from being acquired by each time of starting, and the operation of matching and judging with the preset mainboard ID is avoided, so that the speed of starting to enter the operating system is increased to a certain extent, and the experience of a user is improved.
Further, in order to make a computer without the operating system copyright unable to normally use even a copied operating system, and further avoid the operating system from being stolen, in this embodiment of the present application, the method further includes:
acquiring an operating system code and a mainboard ID, wherein the operating system code is generated based on a preset mainboard ID and an operating system code rule;
decoding the operating system code to obtain a preset mainboard ID;
matching the mainboard ID with a preset mainboard ID, and if the matching is successful, normally using an operating system;
and if the matching fails, quitting the operating system and performing shutdown processing.
For the embodiment of the application, in order to prevent the operating system from being stolen, on one hand, a pirate is prevented from copying the operating system in a computer with the copyright of the operating system; on the other hand, on a computer without operating system copyright, relevant measures are also taken, so that the copied operating system cannot be normally used, and the operating system can be further prevented from being stolen.
Specifically, the operating system code and the preset mainboard ID have a one-to-one correspondence relationship, wherein the preset mainboard ID is the mainboard ID with the copyright of the operating system, and the operating system coding rule is not limited in the embodiment of the application, so that a user can define the operating system code and the mainboard ID by himself according to actual conditions. In an implementation manner, the process of generating the os code based on the preset motherboard ID and the os code rule is as follows: random numbers are added at certain fixed numbers and fixed positions of the preset motherboard ID so that the operating system code is composed of the preset motherboard ID and the random numbers. Correspondingly, decoding the operating system code to obtain the preset mainboard ID by the following steps: the fixed number in the operating system code and the random number added at the fixed position are removed so that the preset motherboard ID can be obtained.
Matching the mainboard ID with a preset mainboard ID, and if the computer has the copyright of the operating system, successfully matching the mainboard ID with the preset mainboard ID, so that the operating system is normally used; if the computer does not have the copyright of the operating system, the mainboard ID of the computer cannot be successfully matched with the preset mainboard ID, so that the operating system is quitted, and shutdown processing is performed.
Therefore, in the embodiment of the application, the operating system code and the mainboard ID are obtained, and then the operating system code is decoded to obtain the preset mainboard ID; and matching the mainboard ID with a preset mainboard ID, and performing corresponding operation based on a matching result. The operating system code is generated based on a preset mainboard ID of a computer with an operating system copyright and an operating system code rule, and if the computer has the operating system copyright, the mainboard ID and the preset mainboard ID can be successfully matched; if the operating system of the computer is an illegally copied operating system, the mainboard ID cannot be successfully matched with the preset mainboard ID, so that the operating system is quitted, and shutdown processing is performed. By the method, even the copied operating system of the computer without the operating system copyright can not be normally used, and the operating system is further prevented from being stolen.
The foregoing embodiments describe a method for preventing theft of a Linux operating system from the perspective of a method flow, and the following embodiments describe a device for preventing theft of a Linux operating system from the perspective of a virtual module or a virtual unit, which are described in detail in the following embodiments.
The embodiment of the present application provides an apparatus 200 for preventing theft of a Linux operating system, as shown in fig. 3, the apparatus 200 for preventing theft of a Linux operating system may specifically include:
the motherboard ID detection module 210 is configured to, after detecting a power-on instruction, obtain a motherboard ID of the computer, and determine whether the motherboard ID is consistent with a preset motherboard ID, where the preset motherboard ID is a motherboard ID of a preset computer that can enter an operating system and is stored in a BIOS of the motherboard;
the first processing module 220 is configured to quit the operating system and perform shutdown processing if the operating system is inconsistent with the operating system; if yes, judging whether the operation system is entered for the first time;
a second processing module 230, configured to normally use the operating system if the operating system is not entered for the first time; if the first time, entering an activation interface of the operating system;
an activation key matching module 240, configured to obtain an activation key of the operating system, and match the activation key with a preset activation key;
a third processing module 250, configured to, if matching fails, prevent activation of the operating system; and if the matching is successful, the operating system is allowed to be activated so as to be normally used.
For the embodiment of the application, after the startup instruction is detected, whether the mainboard ID is consistent with the preset mainboard ID is judged, wherein the preset mainboard ID is the preset mainboard ID of the computer capable of entering the operating system. If the key is consistent with the preset key, judging whether the operating system is entered for the first time, if so, matching the activation key with the preset activation key, and activating the operating system and normally using the operating system after the matching is successful. By the mode, the operating system and the computers are bound by the same mainboard ID of the same batch of computers, namely, the operating system can be suitable for the same batch of computers, the problem that each computer needs to be bound one by one is effectively solved, the executing operation is simpler, and the labor cost is reduced.
In a possible implementation manner of the embodiment of the present application, when the motherboard ID detection module 210 executes and determines whether the motherboard ID is consistent with the preset motherboard ID, the motherboard ID detection module is configured to:
judging whether the mainboard ID is consistent with a preset mainboard ID or not, if not, updating the mainboard ID matching times to obtain the updating times, wherein the initial mainboard ID matching times are zero;
after a preset time period, judging whether the updating times are not more than preset times;
if yes, judging whether the mainboard ID is consistent with the preset mainboard ID again;
if not, finally determining that the mainboard ID is inconsistent with the preset mainboard ID.
In a possible implementation manner of the embodiment of the present application, the apparatus 200 for preventing from being stolen in a Linux operating system further includes:
the abnormal interception module is used for monitoring whether abnormal operation exists in real time, wherein the abnormal operation is operation of illegally copying or modifying the operating system;
if abnormal operation exists, the abnormal operation is intercepted, alarm information is generated, and therefore the warning function is achieved.
In a possible implementation manner of the embodiment of the application, the abnormal operation includes operations of copying files of the operating system and destroying the anti-theft function of the operating system, and the abnormal interception module intercepts the abnormal operation if the abnormal operation is executed, and is used for, when alarm information is generated:
if the file operation of the copy operation system is detected to exist, the copy operation is terminated, and first alarm information corresponding to the copy operation is generated, wherein the first alarm information is used for enabling a user to know that the illegal copy operation exists;
if the operation of destroying the anti-theft function of the operating system is detected, stopping the destroying operation and generating second alarm information corresponding to the destroying operation, wherein the second alarm information is used for enabling a user to know that the destroying operation exists;
the alarm information comprises first alarm information and second alarm information.
A possible implementation manner of the embodiment of the present application, the apparatus 200 for preventing theft of a Linux operating system, further includes:
the key program file transplanting module is used for detecting the partition condition of the hard disk, and if the hard disk is divided into at least two partitions, the partition stored by the operating system is determined and marked as a first partition;
and transplanting part of key program files in the operating system files to any partition in a second partition, wherein the second partition is all the other partitions except the first partition in the hard disk.
In a possible implementation manner of the embodiment of the present application, when the motherboard ID detection module 210 acquires a motherboard ID of a computer after the startup instruction is detected, the motherboard ID detection module is configured to:
acquiring past time judged by a previous mainboard ID and a preset mainboard ID, and calculating a time interval between the current time and the past time;
judging whether the time interval is smaller than a regular detection interval or not;
and if the detection interval is not less than the regular detection interval, acquiring the mainboard ID of the computer.
In a possible implementation manner of the embodiment of the present application, the apparatus 200 for preventing from being stolen in a Linux operating system further includes:
the system comprises an operating system coding module, a mainboard Identification (ID) module and a control module, wherein the operating system coding module is used for acquiring an operating system code and a mainboard ID, and the operating system code is generated based on a preset mainboard ID and an operating system coding rule;
decoding the operating system code to obtain a preset mainboard ID;
matching the mainboard ID with a preset mainboard ID, and if the matching is successful, normally using an operating system;
and if the matching fails, quitting the operating system and performing shutdown processing.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the apparatus 200 for preventing the Linux operating system from being stolen may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
In an embodiment of the present application, an electronic device is provided, as shown in fig. 4, where the electronic device 300 shown in fig. 4 includes: a processor 301 and a memory 303. Wherein processor 301 is coupled to memory 303, such as via bus 302. Optionally, the electronic device 300 may also include a transceiver 304. It should be noted that the transceiver 304 is not limited to one in practical applications, and the structure of the electronic device 300 is not limited to the embodiment of the present application.
The Processor 301 may be a CPU (Central Processing Unit), a general-purpose Processor, a DSP (Digital Signal Processor), an ASIC (Application Specific Integrated Circuit), an FPGA (Field Programmable Gate Array) or other Programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 301 may also be a combination of computing functions, e.g., comprising one or more microprocessors, a combination of a DSP and a microprocessor, or the like.
Bus 302 may include a path that transfers information between the above components. The bus 302 may be a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus 302 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in fig. 4, but this does not represent only one bus or one type of bus.
The Memory 303 may be a ROM (Read Only Memory) or other type of static storage device that can store static information and instructions, a RAM (Random Access Memory) or other type of dynamic storage device that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory), a CD-ROM (Compact Disc Read Only Memory) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), a magnetic Disc storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to these.
The memory 303 is used for storing application program codes for executing the scheme of the application, and the processor 301 controls the execution. The processor 301 is configured to execute application program code stored in the memory 303 to implement the aspects illustrated in the foregoing method embodiments.
Among them, electronic devices include but are not limited to: mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., in-vehicle navigation terminals), and the like, and fixed terminals such as digital TVs, desktop computers, and the like. But also a server, etc. The electronic device shown in fig. 4 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
The present application provides a computer-readable storage medium, on which a computer program is stored, which, when running on a computer, enables the computer to execute the corresponding content in the foregoing method embodiments. Compared with the prior art, according to the embodiment of the application, after the starting-up instruction is detected, whether the mainboard ID is consistent with the preset mainboard ID is judged, wherein the preset mainboard ID is the preset mainboard ID of the computer capable of entering the operating system. If the key is consistent with the preset key, judging whether the operating system is entered for the first time, if so, matching the activation key with the preset activation key, and activating the operating system and normally using the operating system after the matching is successful. By the mode, the binding of the operating system and the computers is carried out by utilizing the same mainboard ID of the same batch of computers, namely, the operating system can be suitable for the same batch of computers, the problem that each computer needs to bind the operating system one by one is effectively solved, the execution operation is simpler, and the labor cost is reduced.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present application, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present application, and these modifications and decorations should also be regarded as the protection scope of the present application.

Claims (10)

1. A method for preventing theft of a Linux operating system is characterized in that mainboard IDs of all computers in the same batch are the same, and comprises the following steps:
when a starting-up instruction is detected, acquiring a mainboard ID of a computer, and judging whether the mainboard ID is consistent with a preset mainboard ID, wherein the preset mainboard ID is the preset mainboard ID of the computer capable of entering an operating system and is stored in a BIOS of a mainboard;
if not, quitting the operating system and carrying out shutdown processing; if yes, judging whether the operation system is entered for the first time;
if the operation system is not entered for the first time, the operation system is normally used; if the first time of entering the operating system, entering an activation interface of the operating system;
acquiring an activation key of an operating system, and matching the activation key with a preset activation key;
if the matching fails, the operating system is prevented from being activated; and if the matching is successful, the operating system is allowed to be activated so as to be normally used.
2. The method for preventing theft of a Linux operating system of claim 1, wherein the determining whether the motherboard ID is consistent with a preset motherboard ID comprises:
judging whether the mainboard ID is consistent with a preset mainboard ID or not, if not, updating the mainboard ID matching times to obtain the updating times, wherein the initial mainboard ID matching times is zero;
after a preset time period, judging whether the updating times are not more than preset times;
if so, judging whether the mainboard ID is consistent with a preset mainboard ID again;
and if not, finally determining that the mainboard ID is inconsistent with a preset mainboard ID.
3. The method for preventing theft of a Linux operating system as recited in claim 1, further comprising, during normal use of the operating system:
monitoring whether abnormal operation exists in real time, wherein the abnormal operation is operation of illegally copying or modifying an operating system;
if the abnormal operation exists, the abnormal operation is intercepted, and alarm information is generated to play a warning role.
4. The method of claim 3, wherein the exception operation comprises a copy operating system file operation and an operation that destroys an operating system anti-theft function,
if the abnormal operation exists, intercepting the abnormal operation and generating alarm information, wherein the steps comprise:
if the file operation of the copy operation system is detected to exist, the copy operation is terminated, and first alarm information corresponding to the copy operation is generated, wherein the first alarm information is used for enabling a user to know that the illegal copy operation exists;
if the operation of destroying the anti-theft function of the operating system is detected, stopping the destroying operation and generating second alarm information corresponding to the destroying operation, wherein the second alarm information is used for enabling a user to know that the destroying operation exists;
the alarm information comprises the first alarm information and the second alarm information.
5. The method for preventing theft of a Linux operating system as recited in claim 1, further comprising, after entering the operating system for the first time and activating the operating system:
detecting the partition condition of the hard disk, if the hard disk is divided into at least two partitions, determining the partition stored by an operating system, and marking as a first partition;
and migrating a part of key program files in the operating system files to any partition in a second partition, wherein the second partition is all the other partitions except the first partition in the hard disk.
6. The method for preventing theft of a Linux operating system according to claim 1, wherein obtaining a motherboard ID of a computer after detecting a boot instruction comprises:
acquiring past time judged by a previous mainboard ID and a preset mainboard ID, and calculating a time interval between the current time and the past time;
judging whether the time interval is smaller than a regular detection interval or not;
and if the detection interval is not less than the regular detection interval, acquiring the mainboard ID of the computer.
7. The method of any of claims 1 to 6, further comprising:
acquiring an operating system code and a mainboard ID, wherein the operating system code is generated based on a preset mainboard ID and an operating system code rule;
decoding the operating system code to obtain the preset mainboard ID;
matching the mainboard ID with the preset mainboard ID, and if the matching is successful, normally using an operating system;
and if the matching fails, quitting the operating system and performing shutdown processing.
8. An anti-theft device for a Linux operating system is characterized by comprising,
the mainboard ID detection module is used for acquiring a mainboard ID of the computer after a starting instruction is detected, and judging whether the mainboard ID is consistent with a preset mainboard ID or not, wherein the preset mainboard ID is the preset mainboard ID of the computer capable of entering an operating system and is stored in a BIOS of the mainboard;
the first processing module is used for quitting the operating system and carrying out shutdown processing if the operating system is inconsistent with the first processing module; if yes, judging whether the operation system is entered for the first time;
the second processing module is used for normally using the operating system if the operating system is not entered for the first time; if the first time of entering the operating system, entering an activation interface of the operating system;
the activation key matching module is used for acquiring an activation key of an operating system and matching the activation key with a preset activation key;
the third processing module is used for preventing the operating system from being activated if the matching fails; and if the matching is successful, the operating system is allowed to be activated so as to be normally used.
9. An electronic device, comprising:
at least one processor;
a memory;
at least one application, wherein the at least one application is stored in the memory and configured to be executed by the at least one processor, the at least one application configured to: performing the method of any one of claims 1 to 7.
10. A computer-readable storage medium, having stored thereon a computer program which, when executed in a computer, causes the computer to perform the method of any one of claims 1 to 7.
CN202211368327.5A 2022-11-03 2022-11-03 Method, device, equipment and medium for preventing Linux operating system from being stolen Pending CN115640552A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211368327.5A CN115640552A (en) 2022-11-03 2022-11-03 Method, device, equipment and medium for preventing Linux operating system from being stolen

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211368327.5A CN115640552A (en) 2022-11-03 2022-11-03 Method, device, equipment and medium for preventing Linux operating system from being stolen

Publications (1)

Publication Number Publication Date
CN115640552A true CN115640552A (en) 2023-01-24

Family

ID=84947691

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211368327.5A Pending CN115640552A (en) 2022-11-03 2022-11-03 Method, device, equipment and medium for preventing Linux operating system from being stolen

Country Status (1)

Country Link
CN (1) CN115640552A (en)

Similar Documents

Publication Publication Date Title
TWI539324B (en) Verifying controller code and system boot code
US20200320193A1 (en) Baseboard management controller to perform security action based on digital signature comparison in response to trigger
CN103718165B (en) BIOS flash memory attack protection and notice
CN105122258B (en) Method, computing system and the article that system is configured
US7631356B2 (en) System and method for foreign code detection
US20090288161A1 (en) Method for establishing a trusted running environment in the computer
US8898797B2 (en) Secure option ROM firmware updates
WO2017177801A1 (en) Method and apparatus for realising integrity protection for operating system
US20080278285A1 (en) Recording device
TW201447903A (en) Repairing compromised system data in a non-volatile memory
CN102880828A (en) Intrusion detection and recovery system aiming at virtualization support environment
CN112613011B (en) USB flash disk system authentication method and device, electronic equipment and storage medium
CN111931192B (en) rootkit detection method and device and electronic equipment
Molina et al. Using independent auditors as intrusion detection systems
Frazelle Securing the boot process
TW201333748A (en) Method of managing information processing space, external device, and information processing apparatus
CN102855421A (en) Method for protecting BIOS (basic input and output system) program from being embezzled, basic input and output system and computing device
KR101013419B1 (en) Guarding apparatus and method for system
CN115640552A (en) Method, device, equipment and medium for preventing Linux operating system from being stolen
US20200244461A1 (en) Data Processing Method and Apparatus
US20230359741A1 (en) Trusted boot method and apparatus, electronic device, and readable storage medium
CN109977665B (en) Cloud server starting process anti-theft and anti-tampering method based on TPCM
CN114153503A (en) BIOS control method, device and medium
CN112114908A (en) Hardware platform, starting method and device thereof, and electronic equipment
CN105653931B (en) Data processing method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination