CN102629309A - Method for protecting personal information through network card - Google Patents
Method for protecting personal information through network card Download PDFInfo
- Publication number
- CN102629309A CN102629309A CN201210069159XA CN201210069159A CN102629309A CN 102629309 A CN102629309 A CN 102629309A CN 201210069159X A CN201210069159X A CN 201210069159XA CN 201210069159 A CN201210069159 A CN 201210069159A CN 102629309 A CN102629309 A CN 102629309A
- Authority
- CN
- China
- Prior art keywords
- usb
- network interface
- host controller
- interface card
- bios
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides a method for protecting personal information through a network card. The method includes writing a control program of a universal serial bus (USB) host controller based on the basic input/output system (BIOS) and detection and authentication programs of USB Key in Boot read-only memory (Rom) of the network card; and loading and running the control program of the USB host controller and the detection and the authentication programs of the USB Key from the network card to a system when a personal computer starts up. According to the method for protecting personal information through the network card, the detection and the authentication are performed to the USB Key inserted in a USB interface; therefore a start-up lock function of the personal computer is achieved.
Description
Technical field
The present invention is about realizing using the method for computer lock; After using launch computer, from the Boot Rom of network interface card, load usb host controller control and USB Key detection and authentication program and operation specifically, thereby realize the method for the start lock in the start-up course.
Background technology
The raising of Along with computer technology, personal computer (application computer), particularly laptop computer applications is more prevalent.Many people can be some to the hard disk the inside of the very useful data storage of individual or company at computer.How to prevent that data important in the computer from illegally being stolen, prevent that the problem of the relevant application computer security of any computer of opening oneself of disabled user and so on from receiving people's attention, particularly business people day by day.People hope and can protect the computer of oneself not encroached on by the handlebar electron key, so the notion of USB Key has just produced, just become the problem that the booting computer lock needs solution of using and how USB Key is carried out identification very much.After present application booting computer lock still just is confined to the starting up and gets into Windows operating system, USB Key is carried out identification, if identification error then pin computer screen.A kind of like this method is also dangerous, and the disabled user can move below Windows through some little software, thereby cracks screen protection.On this meaning, it only is to have realized the screen protection lock, and is not real start lock.
Can realize effectively that in using the launch computer process stage of starting up lock function has 2:
1. in BIOS ROM, protect;
2. protect in the program in network interface card Boot Rom.Under the both of these case, use all not load operation systems also of computer, so can't move all kinds of cracking.First kind of scheme needs the mainboard business men in bios program, to add the code of USB Key authentication, and the specific group of the not conference of mainboard business men that program code is cherished word such as gold among the BIOS EPROM to be needs use computer security removes to revise BIOS.And in network interface card Boot Rom, write start lock code, can extraordinary realization use the booting computer lock function.
Summary of the invention
For above purpose, the invention provides a kind of method at network card bootstrap zone stage realization starting up lock function, this method comprises:
Based on usb host controller control under the BIOS environment and USB Key detects and authentication program writes among the Boot Rom of network interface card;
Use booting computer and start after the completion BIOS detection, the application computer is loaded into internal memory to the Automatic Program that deposits network interface card Boot Rom in and moves:
Program among the network interface card Boot Rom is taken over the usb host controller of BIOS control and is come, and USB Key is detected and authentication;
Description of drawings
With reference to following detailed description and accompanying drawing, can better understand of the present invention about structure and implementation method with and purpose, characteristic and advantage.
Fig. 1 realizes the method for protection personal information through network interface card
Embodiment
In following detailed description, described specific details and the present invention has comprehensively been understood so that provide.Yet the professional and technical personnel will appreciate that the present invention also can use other similar details to implement.
To have the Boot Rom that writes network interface card based on the program of the control of the usb host controller under the BIOS environment and USB Key detection and authentication;
After using launch computer completion BIOS trace routine, load the program and the operation of network interface card Boot Rom the inside automatically:
Take over usb host controller based on usb host controller control program under the BIOS environment;
Through the usb host controller control program, detect USB Key and USB Key is used special-purpose usb data transfer instruction, carry out authentication;
If detect with authentication through recover the control of bios program again to usb host controller, get into normal start-up course, if not through continue detection.
Though here declarative description certain this characteristic of the present invention and a kind of implementation method, many modifications, replacement, variation and equivalent substitution will appear in the antithetical phrase professional and technical personnel.Therefore, protection scope of the present invention is as the criterion by the scope of appended claim.
Claims (3)
1. realize the method for protection personal information through network interface card, this method may further comprise the steps:
One will have USB Key authentication function code deposit among the Boot Rom of network interface card:
After-PC starts, from the Boot Rom of network interface card, load the usb host controller of taking over BIOS control based on usb host controller control program under the BIOS environment;
One through the usb host controller control program, detects USB Key and USB Key is used special-purpose usb data transfer instruction, carries out authentication;
If one detect with authentication through recover the control of bios program again to usb host controller, get into normal start-up course, if not through continue detection.
2. realize the method for protection personal information according to claim 1 through network interface card, it is characterized in that; The code that will have USBKey authentication function deposits among the Boot Rom of network interface card;
3. realize the method for protection personal information according to claim 1 through network interface card, it is characterized in that: after PC starts, from the Boot Rom of network interface card, load the usb host controller of taking over BIOS control based on usb host controller control program under the BIOS environment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210069159XA CN102629309A (en) | 2012-03-16 | 2012-03-16 | Method for protecting personal information through network card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210069159XA CN102629309A (en) | 2012-03-16 | 2012-03-16 | Method for protecting personal information through network card |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102629309A true CN102629309A (en) | 2012-08-08 |
Family
ID=46587567
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210069159XA Pending CN102629309A (en) | 2012-03-16 | 2012-03-16 | Method for protecting personal information through network card |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102629309A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107194264A (en) * | 2017-05-24 | 2017-09-22 | 济南浪潮高新科技投资发展有限公司 | A kind of network interface card with safety certification function based on UEFI |
-
2012
- 2012-03-16 CN CN201210069159XA patent/CN102629309A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107194264A (en) * | 2017-05-24 | 2017-09-22 | 济南浪潮高新科技投资发展有限公司 | A kind of network interface card with safety certification function based on UEFI |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3374922B1 (en) | Systems and methods for protecting backed-up data from ransomware attacks | |
US8898797B2 (en) | Secure option ROM firmware updates | |
CN104484625B (en) | A kind of computer and its implementation with dual operating systems | |
CN106716333B (en) | Method for completing secure erase operation | |
US20150227743A1 (en) | Portable media system with virus blocker and method of operation thereof | |
US20080263542A1 (en) | Software-Firmware Transfer System | |
US20100250934A1 (en) | Content protection device and content protection method | |
JP4869183B2 (en) | Portable recording medium management system, portable recording medium management method, and program | |
CN102385671A (en) | Method and system for encrypting software | |
US20170235682A1 (en) | Volatile/non-volatile memory device access provisioning system | |
JP4707748B2 (en) | External storage device, method for processing data stored in external storage device, program, and information processing apparatus | |
CN101271507B (en) | File hiding method, system and device based on USB equipment | |
CN102629309A (en) | Method for protecting personal information through network card | |
CN1297861C (en) | Method for realizing starting up lock function in network card bootstrap zone | |
Wu et al. | A general forensics acquisition for Android smartphones with qualcomm processor | |
CN201233601Y (en) | File concealment system and apparatus based on USB equipment | |
CN102663279A (en) | Starting up lock method for protecting personal information | |
US20100250494A1 (en) | Peripheral device and portable electronic device | |
CN103473496A (en) | USB (universal serial bus) key integrating program, certificate and data | |
CN1291294C (en) | Method for realizing starting up lock function in main guide zone | |
Tsai et al. | Physical forensic acquisition and pattern unlock on Android smart phones | |
Zhao et al. | Physical Mirror Extraction on Qualcomm-based Android Mobile Devices | |
Corbin | The Google Chrome operating system forensic artifacts | |
AG | System Description | |
US9135448B2 (en) | System and method for writing to removable media |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120808 |