CN110909344B - Control method and device - Google Patents

Control method and device Download PDF

Info

Publication number
CN110909344B
CN110909344B CN201911213059.8A CN201911213059A CN110909344B CN 110909344 B CN110909344 B CN 110909344B CN 201911213059 A CN201911213059 A CN 201911213059A CN 110909344 B CN110909344 B CN 110909344B
Authority
CN
China
Prior art keywords
password
interface
input data
user
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911213059.8A
Other languages
Chinese (zh)
Other versions
CN110909344A (en
Inventor
吕洪昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201911213059.8A priority Critical patent/CN110909344B/en
Publication of CN110909344A publication Critical patent/CN110909344A/en
Application granted granted Critical
Publication of CN110909344B publication Critical patent/CN110909344B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a control method and a control device, wherein the method comprises the following steps: responding to a first starting instruction of the electronic equipment, and outputting a first interface under the condition that a first system of the electronic equipment has a first password, wherein the first interface corresponds to the first system; obtaining first input data, wherein the first input data are input data generated by input operation of a user on the first interface; comparing the first input data with the first password to obtain a first comparison result; controlling the first system to enter a starting state under the condition that the first comparison result represents that the first password is verified to pass; the first system is a basic system which can be started by a second system of the electronic equipment; and controlling a second system of the electronic equipment to enter an activated state under the condition that the first system is in the activated state and the first comparison result represents that the first password is verified to pass.

Description

Control method and device
Technical Field
The present application relates to the field of system control technologies, and in particular, to a control method and apparatus.
Background
In order to ensure the data security of the computer, a basic Input Output system (bios) boot password and an operating system (os) login password are usually set for the computer.
Therefore, the user is usually required to enter the password twice each time the computer is turned on, thereby making the turn-on rate low.
Disclosure of Invention
In view of the above, the present application provides a control method and apparatus, including:
a control method, comprising:
responding to a first starting instruction of the electronic equipment, and outputting a first interface under the condition that a first system of the electronic equipment has a first password, wherein the first interface corresponds to the first system;
obtaining first input data, wherein the first input data are input data generated by input operation of a user on the first interface;
comparing the first input data with the first password to obtain a first comparison result;
controlling the first system to enter a starting state under the condition that the first comparison result represents that the first password is verified to pass; the first system is a basic system which can be started by a second system of the electronic equipment;
and controlling a second system of the electronic equipment to enter an activated state under the condition that the first system is in the activated state and the first comparison result represents that the first password is verified to pass.
The above method, preferably, in a case that the first system does not have the first password, the method further includes:
controlling the first system to enter a starting state;
outputting a second interface under the condition that the first system is in a starting state, wherein the second interface corresponds to the second system;
obtaining second input data, wherein the second input data is input data generated by input operation of a user on the second interface;
comparing the second input data with a second password of the second system to obtain a second comparison result;
and controlling a second system of the electronic equipment to enter a starting state under the condition that the second comparison result represents that the second password passes the verification.
A control device, comprising:
the electronic equipment comprises an output unit, a first password generation unit and a second password generation unit, wherein the output unit is used for responding to a first starting instruction of the electronic equipment and outputting a first interface under the condition that a first system of the electronic equipment has a first password, and the first interface corresponds to the first system;
the input obtaining unit is used for obtaining first input data, and the first input data is input data generated by input operation of a user on the first interface;
the password comparison unit is used for comparing the first input data with the first password to obtain a first comparison result;
the first control unit is used for controlling the first system to enter a starting state under the condition that the first comparison result represents that the first password passes verification; the first system is a basic system which can be started by a second system of the electronic equipment;
and the second control unit is used for controlling the second system of the electronic equipment to enter the starting state when the first system is in the starting state and the first comparison result represents that the first password is verified to pass.
From the above technical solutions, it can be seen that, in response to a first start instruction of an electronic device, the electronic device may output a first interface corresponding to a first system under the condition that the first system serving as a basic system capable of starting a second system has a first password, so that a user may perform an input operation on the first interface to generate first input data, and then may compare the first input data with the first password, and may control the first system to enter a start state first when an obtained first comparison result indicates that the first password passes verification, and may control the second system to enter the start state only when the obtained first comparison result indicates that the first password passes verification, without outputting an interface for inputting a second password of the second system, the user is not required to input the second password of the second system again, password comparison is carried out without using the second password input by the user, meanwhile, after password comparison is carried out once, the password comparison result is verified again before the second system is entered, the starting safety of the system is guaranteed through twice verification, therefore, on the premise of guaranteeing the starting safety of the system, the user operation complexity of the second system entering the starting state can be saved, the consumed time is further reduced, the efficiency of the second system entering the starting state is improved, namely, on the premise of guaranteeing the safety of the electronic equipment, the purpose of improving the starting efficiency of the electronic equipment is achieved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a flowchart of a control method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a BIOS password entry interface in an embodiment of the present application;
FIG. 3 is another flow chart of the first embodiment of the present application;
FIG. 4 is a schematic diagram of an OS password entry interface in an embodiment of the present application;
FIG. 5 is a partial flow chart of a first embodiment of the present application;
FIG. 6 is a schematic diagram of a synchronous password entry interface in an embodiment of the present application;
FIGS. 7-10 are another partial flow charts of the first embodiment of the present application, respectively;
FIG. 11 is a diagram of a password setup input interface in an embodiment of the present application;
FIGS. 12-13 are other partial flow charts of a first embodiment of the present application, respectively;
FIG. 14 is a schematic diagram of an options menu interface in an embodiment of the present application;
fig. 15 is a schematic structural diagram of a control device according to a second embodiment of the present application;
fig. 16 is a schematic structural diagram of an electronic device according to a third embodiment of the present application;
fig. 17-18 are exemplary diagrams of embodiments of the present application in a particular application, respectively.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a flowchart illustrating an implementation of a control method provided in an embodiment of the present application, where the method is applied to an electronic device, such as a computer, a server, and other devices, having a first system and a second system that uses the first system as a basic system capable of being started. The method in the embodiment is mainly used for reducing the process complexity in the process that the second system in the electronic equipment enters the starting state, and further can achieve the purpose of improving the starting efficiency of the electronic equipment.
Specifically, the method in this embodiment may include the following steps:
step 101: and responding to a first starting instruction of the electronic equipment, and outputting a first interface under the condition that the first system has a first password.
The first system may be a system of the electronic device that is used as a basic system that the second system can start, for example, the first system may be a main board Basic Input Output System (BIOS), and the second system may be an operating system that can enter a start state after the BIOS system is in the start state, such as a computer management control program os (operating system); alternatively, the first system may be a platform architecture system built in a cloud service, the second system may be a platform node system that can only be started after the platform architecture system is in a starting state, and so on.
The first system may preset a first password or lack the first password according to the user's setting of the electronic device in advance, the first password is a verification password that enables the first system to enter the start state, the first password may be a verification password that enables the first system to enter the start state in an unrestricted permission state, and at this time, all basic functions and all other extended functions of the first system that enters the start state may be started, such as an administrator password or a parent password; alternatively, the first password may be a password that enables the first system to enter an activated state in a restricted permission state, where only the basic function of the first system that enters the activated state can be activated, and all or part of the extended functions of the first system cannot be activated, and the attribute of the extended function that a specific first system cannot be activated is associated with the first password, such as a visitor password or a student password.
Similarly, the second system may preset a second password or lack the second password to the electronic device according to the user, where the second password is a verification password that enables the second system to enter the start state, and the second password may be a verification password that enables the second system to enter the start state in an unrestricted permission state, and at this time, all basic functions and all other extended functions of the second system that enters the start state may be started, such as an administrator password or a parent password; alternatively, the second password may be a password that enables the second system to enter an activated state in a restricted permission state, where only the basic function of the second system that enters the activated state can be activated, and all or part of the extended functions of the second system cannot be activated, and the attribute of the extended function that a specific second system cannot be activated is associated with the second password, such as a visitor password or a student password.
It should be noted that the first start instruction refers to a trigger instruction for the electronic device to enter a power-on start state from a power-off or power-on state, and the first start instruction may be generated by a user pressing a power-on button of the electronic device.
The first interface corresponds to the first system, the first interface is used for providing an interface capable of inputting a password aiming at the first system for a user, and the user can perform input operation on the first interface to correspondingly generate first input data. At this time, the first input data includes a first user password input by the user. As shown in fig. 2, the first interface is a password input interface of the BIOS, and the user inputs a first user password that the user considers correct in the password input interface of the BIOS.
Step 102: first input data is obtained.
The first input data at least comprises password content input by a user on the first interface, namely a first user password.
Step 103: and comparing the first input data with the first password to obtain a first comparison result.
In this embodiment, the first user password in the first input data may be compared with the first password of the first system, for example, the characters or character strings in the first user password are compared with the characters or character strings in the first password to obtain a first comparison result, and the first comparison result may represent whether the first password passes the verification.
Specifically, if the first user password in the first input data is completely consistent with the first password, the first comparison result represents that the first password is verified; if the first user password in the first input data does not completely match the first password, the first comparison result indicates that the first password is not verified.
Step 104: and controlling the first system to enter a starting state under the condition that the first comparison result represents that the first password is verified to be passed.
For example, in this embodiment, it is found that the first comparison result indicates that the user password input by the user on the first interface is completely consistent with the first password of the BIOS, then the first password of the BIOS is verified, and at this time, the BIOS of the control computer enters the boot state until the BIOS is in the complete boot state.
Step 105: and under the condition that the first system is in a starting state and the first comparison result is determined to represent that the first password is verified to pass, controlling the second system of the electronic equipment to enter the starting state.
In this embodiment, after the first password passes the verification, until the first system is completely in the startup state, the user may not be required to input the second password of the second system first, but first confirm whether the first password passes the verification, if the first password passes the verification, then the user in this embodiment may be considered to be safe and legal by confirming twice, at this time, the user may not be required to input the second password of the second system, and at this time, the second system of the electronic device may be directly controlled to enter the startup state.
In an implementation manner, in this embodiment, it may be directly determined whether the first password passes the verification again by using a first comparison result obtained by comparing the first input data with the first password in step 103, and then the second system of the electronic device may be directly controlled to enter the start state under the condition that the first password passes the verification again, without performing a process of inputting the second password of the second system by the user;
or, in this embodiment, the first input data and the first password may be compared again to obtain an updated first comparison result, and then whether the first password passes the verification is determined according to the updated first comparison result, for example, whether the updated first comparison result represents that the first password passes the verification is judged, so that the second system of the electronic device may be directly controlled to enter the start state under the condition that the updated first comparison result still represents that the first password passes the verification, without performing a process of inputting the second password of the second system by the user.
It can be known from the foregoing solutions that, in the control method provided in the first embodiment of the present application, in response to a first start instruction of an electronic device, when a first system serving as a basic system capable of starting a second system has a first password, the electronic device may output a first interface corresponding to the first system, so that a user performs an input operation on the first interface to generate first input data, and then may compare the first input data with the first password, and when an obtained first comparison result indicates that the first password passes verification, the electronic device may first control the first system to enter a start state, and when the first system is in a start state, the electronic device may only determine that the first comparison result indicates that the first password passes verification, and may control the second system to enter the start state without outputting an interface for inputting a second password of the second system, the user is not required to input the second password of the second system again, password comparison is carried out without using the second password input by the user, meanwhile, after password comparison is carried out once, the password comparison result is verified again before the second system is entered, the starting safety of the system is guaranteed through twice verification, therefore, on the premise of guaranteeing the starting safety of the system, the user operation complexity of the second system entering the starting state can be saved, the consumed time is further reduced, the efficiency of the second system entering the starting state is improved, namely, on the premise of guaranteeing the safety of the electronic equipment, the purpose of improving the starting efficiency of the electronic equipment is achieved.
In one implementation, in a case that the first system does not have the first password, the method in this embodiment may further include the following steps, as shown in fig. 3:
step 106: and controlling the first system to enter a starting state.
In step 101, when the first system does not have the first password, the first interface does not need to be output, and the first system does not have the first password, which means that any user can start the first system, for example, the BIOS does not have the password.
Step 107: and outputting the second interface under the condition that the first system is in the starting state.
The second interface corresponds to the second system, the second interface is used for providing an interface capable of inputting a password aiming at the second system for a user, and the user can perform input operation on the second interface to correspondingly generate second input data. At this time, the second input data includes a second user password input by the user. As shown in fig. 4, the second interface is a password input interface of the OS in which the user inputs a second user password that the user considers correct.
Step 108: second input data is obtained.
The second input data at least comprises password content input by the user on the second interface, namely a second user password.
Step 109: and comparing the second input data with a second password of a second system to obtain a second comparison result.
In this embodiment, the second user password in the second input data may be compared with the second password in the second system,
step 110: and controlling a second system of the electronic equipment to enter a starting state under the condition that the second comparison result represents that the second password passes the verification.
For example, in this embodiment, it is found that the second comparison result indicates that the user password input by the user on the second interface is completely consistent with the second password of the OS, then the second password of the OS is verified, and at this time, the OS of the computer is controlled to enter the start state until the OS is in the complete start state, and the user may use various functions in the started OS.
Based on the above implementation, in this embodiment, under the condition that the first system and the second system are respectively provided with respective passwords, the result of password comparison is verified again before entering the second system after the password comparison is performed once, so that the security of system startup is ensured through twice verification, and meanwhile, the user does not need to perform twice password input operations, thereby achieving the purpose of simplifying the user operation process and further improving the startup efficiency.
Based on this principle, in order to improve the booting efficiency while guaranteeing the security of system startup in this embodiment, the passwords of the first system and the second system in the electronic device may be synchronized, and then the passwords of the two systems are set to be the same password, so that the user does not need to perform password input operation twice in the booting process after password synchronization, and the security of system startup in the electronic device may also be guaranteed by comparing the password identifiers corresponding to the synchronized passwords, thereby achieving the purpose of simplifying the user operation flow and improving the booting efficiency while guaranteeing the security of system startup.
Specifically, the method in this embodiment may include the following steps, as shown in fig. 5:
step 501: and under the condition that the second system is in a starting state, responding to the generated password synchronization instruction, and outputting a third interface.
The third interface is used for providing an interface capable of inputting passwords for a user when the passwords are synchronized for the first system and the second system, the user can perform input operation on the third interface, and synchronous setting operation data is correspondingly generated and contains the synchronous passwords input by the user. As shown in fig. 6, the third interface is an interface capable of inputting a synchronous password presented in the OS boot state, and the user inputs a synchronous password capable of legally verifying the boot of the first system and the second system as a legal password in the third interface.
Step 502: synchronization setting operation data is obtained.
The synchronous setting operation data at least comprises password content input by a user on the third interface, namely a synchronous password. And the synchronous password may be implemented for a single character or a string of characters formed by a plurality of characters.
Step 503: and setting the first password of the first system and the second password of the second system as synchronous passwords in the synchronous setting operation data, and setting the same password identification for the first system and the second system.
At this time, the first system and the second system in the electronic device have the same password, that is, the first password and the second password are the same and are both synchronous passwords in the synchronous setting operation data, and meanwhile, in this embodiment, the same password identifier is set for the first system and the second system to represent that the first system and the second system are matched, that is, the password is synchronous, and here, the matching can be understood that the first system and the second system of the password identifier are originally configured systems of the electronic device.
Specifically, in this embodiment, the same cryptographic random number may be generated as the cryptographic identifier for the first system and the second system through a random number generation algorithm, and the cryptographic random number generated each time is different and does not change after the cryptographic random number is generated.
It should be noted that the password identification of the first system and the first password are associated with each other, and if an illegal action such as modifying or deleting the first password of the first system occurs, the password identification of the first system changes; the password identification of the second system and the second password are correlated, and if illegal behaviors such as modification or deletion of the second password of the second system occur, the password identification of the second system is changed correspondingly. Based on the above implementation, in this embodiment, after the setting operation of password synchronization is completed, that is, after the first password of the first system and the second password of the second system are both set as the synchronous passwords in the synchronization setting operation data, when the electronic device is rebooted, the method in this embodiment may further include the following steps, as shown in fig. 7:
step 701: and responding to a second starting instruction of the electronic equipment, and outputting the first interface.
The second start instruction is an instruction generated by the electronic device under the trigger of the start operation of the user when the electronic device is restarted after the password synchronization setting operation, in the instruction information, the first start instruction and the second start instruction belong to the same type of instruction, and are both used for triggering the first system of the electronic device to start, and the specific difference may be parameter information such as the generation time of the instruction, the triggered time and the like.
Specifically, the user may perform an input operation on the first interface to generate the third input data correspondingly. At this time, the third input data includes a third user password input by the user. For example, the first interface is a password input interface of the BIOS, when the user restarts the electronic device after password synchronization operation, the password input interface of the BIOS is output on the electronic device, and the user can input a third user password that the user thinks is correct in the password input interface of the BIOS.
Step 702: third input data is obtained.
The third input data at least comprises password content input by the user on the first interface, namely a third user password.
Step 703: and comparing the third input data with the first password to obtain a third comparison result.
In this embodiment, the third user password in the third input data may be compared with the first password of the first system.
Step 704: and controlling the first system to enter a starting state under the condition that the third comparison result represents that the first password passes the verification.
For example, in this embodiment, it is found that the third comparison result indicates that the user password input by the user on the first interface is completely consistent with the first password of the BIOS, and then the first password of the BIOS is verified, and at this time, the BIOS of the computer is controlled to enter the startup state until the BIOS is in the complete startup state.
Step 705: and under the condition that the first system is in a starting state, obtaining the password identification of the first system and the password identification of the second system.
The password identifier of the first system may be read from a hardware storage area corresponding to the first system, for example, the BIOS password identifier for the motherboard may be read from a storage area of the motherboard; the cryptographic identifier of the second password may be read from a corresponding hardware storage area of the second system, for example, the cryptographic identifier for the OS may be read on a computer disk.
It should be noted that the password identification of the first system and the password identification of the second system are the same when the first system and the second system are originally configured systems of the electronic device and are initially generated, and if the first system and the second system on the electronic device are not originally configured systems, the password identifications between the two systems on the same electronic device are different.
In addition, if the first system and the second system are originally configured systems of the electronic device but the second password of the second system is modified or deleted, the second password of the second system is different from the second password of the first system.
Step 706: and if the password identification of the first system is the same as that of the second system and the first password of the first system is the same as that of the second system, controlling the second system of the electronic equipment to enter a starting state.
In this embodiment, by determining whether the password identifier of the first system and the password identifier of the second system are the same or not, it is determined whether the second password of the second system is an illegal operation such as being modified or deleted or whether the second system is the originally configured system of the first system already in the activated state, if the password identifier of the first system is the same as the password identifier of the second system, it may be further determined whether the second password is modified or deleted or whether the first password and the second password are successfully synchronized or not by further determining whether the first password and the second password are the same or not, therefore, when the password identification of the first system is the same as that of the second system and the first password of the first system is the same as that of the second system, the system which is originally configured between the first system and the second system can be determined, the first password and the second password are successfully synchronized and are not damaged, the second system of the electronic equipment can be controlled to enter a starting state at the moment until the second system is in the starting state, and the rebooting starting process of the electronic equipment after the password synchronization of the two systems is completed. In the process, the illegal conditions that the password is modified and deleted or the system is abnormal and the like can be effectively identified through the verification of the synchronous password and the verification between the password identifications corresponding to the synchronous password, so that the security of system starting in the electronic equipment can be guaranteed through the comparison of the password identifications corresponding to the synchronous password only by inputting the password once by a user, and the purposes of simplifying the operation process of the user and improving the starting efficiency are achieved while the security of system starting is guaranteed.
Based on the above implementation, in the case that the password identification of the first system and the password identification of the second system obtained in step 705 are different, that is, in the case that the second system and the first system are not originally configured systems, at this time, the method in this embodiment may further include the following steps, as shown in fig. 8:
step 707: and outputting the second interface.
In this embodiment, in the case that the password identifier of the first system obtained in step 705 is different from the password identifier of the second system, the second interface is output, and the user can perform an input operation on the second interface to generate fourth input data correspondingly. At this time, the fourth input data includes a fourth user password input by the user. As shown in fig. 4, the second interface is a password input interface of the OS in which the user inputs a second user password that the user considers correct.
Step 708: fourth input data is obtained.
The fourth input data at least comprises password content input by the user on the second interface, namely a fourth user password.
Step 709: and comparing the fourth input data with the second password of the second system to obtain a fourth comparison result.
In this embodiment, the fourth user password in the fourth input data may be compared with the second password of the second system.
Step 710: and controlling a second system of the electronic equipment to enter a starting state under the condition that the fourth comparison result represents that the second password passes the verification.
For example, in this embodiment, it is found that the fourth comparison result indicates that the user password input by the user on the second interface is completely consistent with the second password of the OS, then the second password of the OS is verified, and at this time, the OS of the computer is controlled to enter the start state until the OS is in the complete start state, and the user may use various functions in the started OS.
Based on the above implementation, in this embodiment, after the second system is started by inputting the fourth input data, the matching setting may be performed again on the first system and the second system, that is, the first system and the second system are set as the originally configured system by setting the same password and the same password identifier, specifically, after step 710, the following steps may also be included, as shown in fig. 9:
step 711: and outputting the third interface.
The third interface is used for providing an interface capable of inputting passwords when the passwords are synchronized for the first system and the second system for a user, the user can perform input operation on the third interface, updated synchronous setting operation data is correspondingly generated, and the updated synchronous setting operation data comprises updated synchronous passwords input by the user.
Step 712: updated synchronization setting operation data is obtained.
The updated synchronous setting operation data at least comprises password content input by a user on the third interface, namely the updated synchronous password. And the updated synchronous password may be implemented for a single character or a character string formed by a plurality of characters.
Step 713: and setting the first password of the first system and the second password of the second system as updated synchronous passwords, and setting the same updated password identification for the first system and the second system.
At this time, the first system and the second system in the electronic device have the same password, that is, the first password and the second password are the same and are both updated synchronous passwords in the updated synchronous setting operation data, and meanwhile, in this embodiment, the updated same password identifier is set for the first system and the second system to represent that the first system and the second system are matched, that is, the passwords are synchronous.
Based on the above implementation, in this embodiment, the password identification of the first system and the password identification of the second system obtained in step 705 are the same, but if the first password of the first system and the second password of the second system are different, it indicates that the second password may be modified or deleted by an illegal tampering operation or the first password and the second password are not successfully synchronized, and at this time, in this embodiment, password updating and synchronization may be implemented through the following steps, as shown in fig. 10:
step 714: and outputting the fourth interface.
The fourth interface is used for providing an interface capable of inputting a password when the password is reset for the second system for a user, and the user can perform input operation on the fourth interface to correspondingly generate password setting operation data under the condition that the second system does not enter the starting state but only the first system is in the starting state, wherein the password setting operation data comprises a system password input by the user. As shown in fig. 11, the fourth interface is an interface capable of inputting a password setting of the second system in the BIOS startup state, and the user inputs a system password capable of legally verifying the startup of the second system as a legal password of the second system in the fourth interface.
Step 715: the second password of the second system is set as the system password in the password setting operation data.
Specifically, the second password of the second system, which resets the password, may be the same as or different from the first password of the first system.
Accordingly, after the operation of resetting the second password of the second system is completed in step 715, in this embodiment, steps 711 to 713 may be executed again, as shown in fig. 12, and the password synchronization and the password identification are synchronized again, so that the first system and the second system are reset to the password-synchronized and originally-configured system.
Based on the above implementation, in this embodiment, the user can select whether to perform password synchronization, so as to achieve the purposes of simplifying the boot start process of the electronic device according to the user requirement and improving the boot efficiency. Specifically, in this embodiment, a setting interface capable of performing password synchronization or not may be provided for the user when the second system is in the activated state, specifically, as shown in fig. 13:
step 1301: and outputting the fifth interface.
The fifth interface includes an option menu, the option menu includes a password authentication option and/or a password synchronization option, as shown in fig. 14, the option menu includes an option of "unified password authentication" and an option of "synchronized password", and in addition, the option menu may further include prompt information for changing the password, for example, "if the password is to be changed, please press a shortcut key and select" change the password ", and the like. The user may perform single selection or multiple selection in the option menu, for example, the user selects the password authentication option to indicate that the user needs to simplify the password verification process on the premise of ensuring the system security, so as to improve the booting efficiency, or the user selects the password authentication option and the password synchronization option to indicate that the user needs to perform the password synchronization of the first system and the second system while passing through the simplified password verification process, so as to further improve the booting efficiency.
Step 1302: and receiving menu operation data.
The menu operation data is input data generated by the user performing password authentication option and/or password synchronization option selection operation in the option menu on the fifth interface.
Specifically, the menu operation data may include input data corresponding to the password authentication option, or the menu operation data may include input data corresponding to the password synchronization option, or the menu operation data simultaneously includes input data corresponding to the password authentication option and input data corresponding to the password synchronization option.
Step 1303: under the condition that the menu operation data contain input data corresponding to the password authentication option and a first starting instruction is generated, the step 101 is executed, under the condition that a first system of the electronic equipment has a first password, a first interface is output, and the subsequent steps of the step 101 are further executed;
step 1304: if the menu operation data includes input data corresponding to the password synchronization option, a password synchronization command is generated, and the step 501 is executed: responding to the generated password synchronization instruction, outputting a third interface, further executing the subsequent steps of the step 502, and after the password synchronization is completed, executing the step 701 and the subsequent steps after the electronic device is rebooted, so as to realize the boot password verification under the password synchronization.
Referring to fig. 15, a schematic structural diagram of a control device according to a second embodiment of the present disclosure is provided, where the control device may be applied to an electronic device, such as a computer, a server, and the like, having a first system and a second system that uses the first system as a basic system capable of being started. The device in the embodiment is mainly used for reducing the process complexity of the second system in the electronic equipment in the process of entering the starting state, and further can achieve the purpose of improving the starting efficiency of the electronic equipment.
Specifically, the apparatus in this embodiment may include the following units:
the electronic device comprises an output unit 1501, configured to output a first interface in response to a first start instruction of the electronic device, where a first system of the electronic device has a first password, and the first interface corresponds to the first system;
an input obtaining unit 1502, configured to obtain first input data, where the first input data is input data generated by a user performing an input operation on the first interface;
the password comparison unit 1503 is configured to compare the first input data with the first password to obtain a first comparison result;
a first control unit 1504, configured to control the first system to enter a startup state if the first comparison result indicates that the first password is verified; the first system is a basic system which can be started by a second system of the electronic equipment;
a second control unit 1505, for controlling a second system of the electronic device to enter a startup state if the first system is in a startup state and if it is determined that the first comparison result represents that the first password is verified.
It can be known from the foregoing solution that, in response to a first start instruction of an electronic device, in a case that a first system serving as a basic system capable of starting a second system has a first password, the electronic device may output a first interface corresponding to the first system, so that a user performs an input operation on the first interface to generate first input data, and then may compare the first input data with the first password, and in a case that an obtained first comparison result indicates that the first password passes verification, the electronic device may first control the first system to enter a start state, and in a case that the first system is in the start state, may only determine that the first comparison result indicates that the first password passes verification, and may control the second system to enter the start state without outputting an interface for inputting a second password of the second system, the user is not required to input the second password of the second system again, password comparison is carried out without using the second password input by the user, meanwhile, after password comparison is carried out once, the password comparison result is verified again before the second system is entered, the starting safety of the system is guaranteed through twice verification, therefore, on the premise of guaranteeing the starting safety of the system, the user operation complexity of the second system entering the starting state can be saved, the consumed time is further reduced, the efficiency of the second system entering the starting state is improved, namely, on the premise of guaranteeing the safety of the electronic equipment, the purpose of improving the starting efficiency of the electronic equipment is achieved.
In one implementation manner, in a case that the first system does not have the first password, the apparatus in this embodiment is further configured to:
controlling the first system to enter a starting state;
outputting a second interface under the condition that the first system is in a starting state, wherein the second interface corresponds to the second system;
obtaining second input data, wherein the second input data is input data generated by input operation of a user on the second interface;
comparing the second input data with a second password of the second system to obtain a second comparison result;
and controlling a second system of the electronic equipment to enter a starting state under the condition that the second comparison result represents that the second password passes the verification.
In one implementation, the apparatus in this embodiment is further configured to:
under the condition that the second system is in a starting state, responding to the generated password synchronization instruction, and outputting a third interface;
obtaining synchronous setting operation data, wherein the synchronous setting operation data is input data generated by input operation of a user on the third interface, and the synchronous setting operation data at least comprises: synchronizing the password;
setting a first password of the first system and a second password of the second system as the synchronous passwords; and setting the same password identification for the first system and the second system.
Optionally, the apparatus in this embodiment is further configured to:
responding to a second starting instruction of the electronic equipment, and outputting the first interface;
obtaining third input data, wherein the third input data are input data generated by input operation of a user on the first interface;
comparing the third input data with the first password to obtain a third comparison result;
controlling the first system to enter a starting state under the condition that the third comparison result represents that the first password passes verification;
under the condition that the first system is in a starting state, acquiring a password identification of the first system and a password identification of the second system;
and if the password identification of the first system is the same as the password identification of the second system and the first password of the first system is the same as the second password of the second system, controlling the second system of the electronic equipment to enter a starting state.
Optionally, if the password identifier of the first system is different from the password identifier of the second password, the apparatus in this embodiment is further configured to:
outputting the second interface;
obtaining fourth input data, wherein the fourth input data are input data generated by input operation of a user on the second interface;
comparing the fourth input data with a second password of the second system to obtain a fourth comparison result;
and controlling a second system of the electronic equipment to enter a starting state under the condition that the fourth comparison result represents that the second password passes verification.
Optionally, when the fourth comparison result indicates that the second password is verified, after the second system of the electronic device is controlled to enter the start state, the apparatus in this embodiment is further configured to:
outputting the third interface;
obtaining updated synchronous setting operation data, wherein the updated synchronous setting operation data is input data generated by the user performing input operation again on the third interface, and the updated synchronous setting operation data at least comprises: an updated synchronized password;
setting both a first password of the first system and a second password of the second system as the updated synchronized password; and setting the same updated password identification for the first system and the second system.
Optionally, if the password identifier of the first system is the same as the password identifier of the second password and the first password of the first system is different from the second password of the second system, the apparatus in this embodiment is further configured to:
outputting a fourth interface;
obtaining password setting operation data, wherein the password setting operation data are input data generated by input operation of a user on the fourth interface; the password setting operation data at least comprises: a system password;
and setting the second password of the second system as the system password.
Optionally, after setting the second password of the second system as the system password, the apparatus in this embodiment is further configured to:
outputting the third interface;
obtaining updated synchronous setting operation data, wherein the updated synchronous setting operation data is input data generated by the user performing input operation again on the third interface, and the updated synchronous setting operation data at least comprises: an updated synchronized password;
setting both a first password of the first system and a second password of the second system as the updated synchronized password; and setting the same updated password identification for the first system and the second system.
In one implementation, the apparatus in this embodiment is further configured to:
under the condition that the second system is in a starting state, outputting a fifth interface, wherein the fifth interface comprises an option menu, and the option menu comprises a password authentication option and/or a password synchronization option;
receiving menu operation data, wherein the menu operation data are input data generated by the operation of selecting a password authentication option and/or a password synchronization option in an option menu on the fifth interface by a user;
and when the menu operation data contains input data corresponding to the password authentication option and the first starting instruction is generated, executing the following steps: outputting a first interface under the condition that a first system of the electronic equipment has a first password;
generating a password synchronization instruction under the condition that the menu operation data comprises input data corresponding to the password authentication option and input data corresponding to the password synchronization option, and executing the following steps: and responding to the generated password synchronization instruction, and outputting a third interface.
It should be noted that, for the specific implementation of each unit in the apparatus of the present embodiment, reference may be made to the corresponding content in the foregoing, and the description is not made here.
Referring to fig. 16, a schematic structural diagram of an electronic device according to a third embodiment of the present disclosure is provided, where the electronic device may be an electronic device having a first system and a second system that uses the first system as a basic system capable of being started, such as a computer, a server, and so on. The technical scheme in the embodiment is mainly used for reducing the process complexity of the second system in the electronic equipment in the process of entering the starting state, and further can achieve the purpose of improving the starting efficiency of the electronic equipment.
Specifically, the electronic device in this embodiment may include the following structure:
an output device 1601, such as a display screen, configured to output a first interface in response to a first start instruction of the electronic device, where a first system of the electronic device has a first password, where the first interface corresponds to the first system;
an input device 1602, such as a keyboard or a mouse, configured to obtain first input data, where the first input data is input data generated by a user performing an input operation on the first interface;
a processor 1603, configured to compare the first input data with the first password to obtain a first comparison result; controlling the first system to enter a starting state under the condition that the first comparison result represents that the first password is verified to pass; the first system is a basic system which can be started by a second system of the electronic equipment; and controlling a second system of the electronic equipment to enter an activated state under the condition that the first system is in the activated state and the first comparison result represents that the first password is verified to pass.
It should be noted that, for the specific implementation of each structure in the present embodiment, reference may be made to the corresponding content in the foregoing, and the description is not made here.
Taking an electronic device as an example of a computer with a BIOS and an OS, a technical scheme in the present application is illustrated as follows:
first, a BIOS & OS password verification module is integrated in the computer through the BIOS, and an OS & BIOS password verification module is integrated in the login logon module of the OS, based on which a unified flow of authentication of the BIOS and the OS can be realized in the computer, as shown in fig. 17, and further, a password synchronization flow of the BIOS and the OS can be realized in the computer, as shown in fig. 18. The method comprises the following specific steps:
1. authentication unified flow
With reference to fig. 17, after the computer is powered on, the BIOS & OS password verification module is loaded to verify whether the BIOS power-on password exists, and when the BIOS power-on password exists, the BIOS password is verified, if the BIOS password verification is unsuccessful (failure exceeds three times or more), the computer is locked, and if the BIOS password verification is successful, the BIOS & OS password verification module records a verification identifier: the BIOS password is successfully verified;
then, after the BIOS is started, the OS enters a logon module of the OS, and at this time, the OS & BIOS password verification module obtains a verification identifier recorded by the BIOS & OS password verification module, and uses the verification identifier as a condition for requesting the user to input the OS login password, for example, if the verification identifier indicates that the BIOS password verification is successful, the user directly starts the computer and enters an OS desktop, and if the verification identifier indicates that the BIOS password verification is successful or the boot password does not exist and the BIOS password verification is not performed, a user login window (a second interface) may be popped up, the user is required to input the OS password, and an OS password verification process is performed.
As can be seen, although the user only needs to perform the BIOS password input operation once in the unified authentication flow in the technical solution of the present application, the computer still needs to perform two verification flows during the boot process: therefore, the technical scheme of the application can simplify the password authentication process entering the system while ensuring the verification process in the starting process to ensure the starting safety of the computer, thereby improving the starting efficiency.
2. Cryptographic synchronization
When the password of the BIOS and/or the OS is set or changed while the OS is in the boot state, the user may select to synchronize to the BIOS boot password, and the user may select the password synchronization or select the option of unified authentication in the setting interface, where:
(1) in the password synchronization, when the OS is in a start state, the user inputs a synchronous password and sets the passwords of the BIOS and the OS, specifically, the OS & BIOS password verification module generates a password random number (password identifier) and a password and synchronizes the password to the BIOS & OS password verification module, and the BIOS & OS password verification module sets the password random number and the password to be the same as the OS, thereby implementing that the synchronous OS password is a BIOS power-on password and recording the password random number.
(2) After password synchronization is completed and the computer is rebooted, entering a boot password authentication process: after the computer is started, loading a BIOS & OS password verification module, further verifying whether a BIOS starting password exists, verifying the BIOS password when the BIOS starting password exists, locking the computer if the BIOS password is not successfully verified, and recording a verification identifier by the BIOS & OS password verification module if the BIOS password is successfully verified: the BIOS password is successfully verified;
then, after the BIOS is started, entering a logon module of the OS, at the moment, verifying whether the password random numbers of the OS and the BIOS are the same and whether the passwords of the OS and the BIOS are the same by the OS & BIOS password verification module, if the password random numbers are different, indicating that the OS and the BIOS are possibly not originally matched systems or the passwords of the OS are modified or deleted, popping up an OS password input interface, after the passwords are input by a user, verifying the passwords by the OS & BIOS password verification module, if the verification is successful, re-performing the password synchronization in the step (1), and entering an OS desktop after the verification is successful;
if the password random numbers are the same, but the passwords of the OS and the BIOS are different, the password synchronization is not successful or the passwords of the OS are modified or deleted, at the moment, an OS password modification input interface can be popped up, the passwords of the OS are reset by a user, and at the moment, the passwords of the OS are possibly different from the passwords of the BIOS, so that after the password modification is completed, the password synchronization in the step (1) can be carried out again, and the user enters an OS desktop after the password modification is successful;
if the password random numbers are the same and the passwords are the same, the user can directly enter the OS desktop to realize quick startup.
Therefore, the technical scheme of the application can ensure the verification process in the starting process, and simultaneously simplifies the password authentication process entering the system, thereby improving the starting efficiency.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (9)

1. A control method, comprising:
responding to a first starting instruction of the electronic equipment, and outputting a first interface under the condition that a first system of the electronic equipment has a first password, wherein the first interface corresponds to the first system;
obtaining first input data, wherein the first input data are input data generated by input operation of a user on the first interface;
comparing the first input data with the first password to obtain a first comparison result;
controlling the first system to enter a starting state under the condition that the first comparison result represents that the first password is verified to pass; the first system is a basic system which can be started by a second system of the electronic equipment;
controlling a second system of the electronic equipment to enter a starting state under the condition that the first system is in the starting state and the first comparison result represents that the first password is verified to pass;
the method further comprises the following steps:
under the condition that the second system is in a starting state, responding to the generated password synchronization instruction, and outputting a third interface;
obtaining synchronous setting operation data, wherein the synchronous setting operation data is input data generated by input operation of a user on the third interface, and the synchronous setting operation data at least comprises: synchronizing the password;
setting a first password of the first system and a second password of the second system as the synchronous passwords; and setting the same password identification for the first system and the second system.
2. The method of claim 1, in the case that the first system does not have a first password, the method further comprising:
controlling the first system to enter a starting state;
outputting a second interface under the condition that the first system is in a starting state, wherein the second interface corresponds to the second system;
obtaining second input data, wherein the second input data is input data generated by input operation of a user on the second interface;
comparing the second input data with a second password of the second system to obtain a second comparison result;
and controlling a second system of the electronic equipment to enter a starting state under the condition that the second comparison result represents that the second password passes the verification.
3. The method of claim 1, further comprising:
responding to a second starting instruction of the electronic equipment, and outputting the first interface;
obtaining third input data, wherein the third input data are input data generated by input operation of a user on the first interface;
comparing the third input data with the first password to obtain a third comparison result;
controlling the first system to enter a starting state under the condition that the third comparison result represents that the first password passes verification;
under the condition that the first system is in a starting state, acquiring a password identification of the first system and a password identification of the second system;
and if the password identification of the first system is the same as the password identification of the second system and the first password of the first system is the same as the second password of the second system, controlling the second system of the electronic equipment to enter a starting state.
4. The method of claim 3, further comprising, if the password identification of the first system and the password identification of the second password are different:
outputting a second interface;
obtaining fourth input data, wherein the fourth input data are input data generated by input operation of a user on the second interface;
comparing the fourth input data with a second password of the second system to obtain a fourth comparison result;
and controlling a second system of the electronic equipment to enter a starting state under the condition that the fourth comparison result represents that the second password passes verification.
5. The method according to claim 4, wherein after the second system of the electronic device is controlled to enter the boot state if the fourth comparison result indicates that the second password is verified, the method further comprises:
outputting the third interface;
obtaining updated synchronous setting operation data, wherein the updated synchronous setting operation data is input data generated by the user performing input operation again on the third interface, and the updated synchronous setting operation data at least comprises: an updated synchronized password;
setting both a first password of the first system and a second password of the second system as the updated synchronized password; and setting the same updated password identification for the first system and the second system.
6. The method of claim 4, if the password identification of the first system and the password identification of the second password are the same and the first password of the first system and the second password of the second system are different, the method further comprising:
outputting a fourth interface;
obtaining password setting operation data, wherein the password setting operation data are input data generated by input operation of a user on the fourth interface; the password setting operation data at least comprises: a system password;
and setting the second password of the second system as the system password.
7. The method of claim 6, after setting a second password for the second system to the system password, the method further comprising:
outputting the third interface;
obtaining updated synchronous setting operation data, wherein the updated synchronous setting operation data is input data generated by the user performing input operation again on the third interface, and the updated synchronous setting operation data at least comprises: an updated synchronized password;
setting both a first password of the first system and a second password of the second system as the updated synchronized password; and setting the same updated password identification for the first system and the second system.
8. The method of claim 1, further comprising:
under the condition that the second system is in a starting state, outputting a fifth interface, wherein the fifth interface comprises an option menu, and the option menu comprises a password authentication option and/or a password synchronization option;
receiving menu operation data, wherein the menu operation data are input data generated by the operation of selecting a password authentication option and/or a password synchronization option in an option menu on the fifth interface by a user;
and when the menu operation data contains input data corresponding to the password authentication option and the first starting instruction is generated, executing the following steps: outputting a first interface under the condition that a first system of the electronic equipment has a first password;
generating a password synchronization instruction under the condition that the menu operation data comprises input data corresponding to the password authentication option and input data corresponding to the password synchronization option, and executing the following steps: and responding to the generated password synchronization instruction, and outputting a third interface.
9. A control device, comprising:
the electronic equipment comprises an output unit, a first password generation unit and a second password generation unit, wherein the output unit is used for responding to a first starting instruction of the electronic equipment and outputting a first interface under the condition that a first system of the electronic equipment has a first password, and the first interface corresponds to the first system;
the input obtaining unit is used for obtaining first input data, and the first input data is input data generated by input operation of a user on the first interface;
the password comparison unit is used for comparing the first input data with the first password to obtain a first comparison result;
the first control unit is used for controlling the first system to enter a starting state under the condition that the first comparison result represents that the first password passes verification; the first system is a basic system which can be started by a second system of the electronic equipment;
the second control unit is used for controlling the second system of the electronic equipment to enter the starting state when the first system is in the starting state and the first comparison result represents that the first password is verified to pass;
the apparatus is further configured to:
under the condition that the second system is in a starting state, responding to the generated password synchronization instruction, and outputting a third interface;
obtaining synchronous setting operation data, wherein the synchronous setting operation data is input data generated by input operation of a user on the third interface, and the synchronous setting operation data at least comprises: synchronizing the password;
setting a first password of the first system and a second password of the second system as the synchronous passwords; and setting the same password identification for the first system and the second system.
CN201911213059.8A 2019-12-02 2019-12-02 Control method and device Active CN110909344B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911213059.8A CN110909344B (en) 2019-12-02 2019-12-02 Control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911213059.8A CN110909344B (en) 2019-12-02 2019-12-02 Control method and device

Publications (2)

Publication Number Publication Date
CN110909344A CN110909344A (en) 2020-03-24
CN110909344B true CN110909344B (en) 2022-03-25

Family

ID=69821522

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911213059.8A Active CN110909344B (en) 2019-12-02 2019-12-02 Control method and device

Country Status (1)

Country Link
CN (1) CN110909344B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113741938A (en) * 2021-09-06 2021-12-03 联想(北京)有限公司 Updating method and electronic equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016018390A1 (en) * 2014-07-31 2016-02-04 Hewlett-Packard Development Company, L.P. Secure bios password method in server computer
CN109635561A (en) * 2019-01-31 2019-04-16 郑州云海信息技术有限公司 A kind of method, apparatus that BIOS with BMC password setting is synchronous, terminal and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103186748A (en) * 2011-12-29 2013-07-03 鸿富锦精密工业(深圳)有限公司 Electronic device and password protection method thereof
CN109002718A (en) * 2018-06-29 2018-12-14 郑州云海信息技术有限公司 A kind of method, device and equipment of BIOS and operating system multiplexing password

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016018390A1 (en) * 2014-07-31 2016-02-04 Hewlett-Packard Development Company, L.P. Secure bios password method in server computer
CN109635561A (en) * 2019-01-31 2019-04-16 郑州云海信息技术有限公司 A kind of method, apparatus that BIOS with BMC password setting is synchronous, terminal and storage medium

Also Published As

Publication number Publication date
CN110909344A (en) 2020-03-24

Similar Documents

Publication Publication Date Title
TWI559167B (en) A unified extensible firmware interface(uefi)-compliant computing device and a method for administering a secure boot in the uefi-compliant computing device
US7849301B2 (en) Providing a user input interface prior to initiation of an operating system
TWI576764B (en) A computer system
US9710652B1 (en) Verifying boot process of electronic device
US20210034750A1 (en) Method for a secured start-up of a computer system, and configuration comprising a computer system and an external storage medium connected to the computer system
US11681809B2 (en) Information processing apparatus, control method, and storage medium
KR20190062797A (en) User terminal for using cloud service, integrated security management server of user terminal and method thereof
CN110909344B (en) Control method and device
JP2011150499A (en) Thin client system, thin client terminal, and thin client program
CN107862192B (en) Login interface unlocking method and device, computer equipment and storage medium
JP6631303B2 (en) Authentication method, authentication program, and information processing device
CN110196741B (en) Method for setting basic input/output system, terminal and computer storage medium
CN112966276B (en) Method, device and medium for safely starting computer
CN108170482B (en) Information processing method and computer equipment
WO2016000355A1 (en) Terminal upgrade method and device
US11836231B2 (en) Android system-based smart terminal unlocking method and device, and smart terminal
JP5150546B2 (en) Information processing apparatus, operation history acquisition method, computer program
CN113032031A (en) Safe starting method of advanced security chip and smart television
JP5037309B2 (en) Information processing apparatus and logon method
JP2003271482A (en) Information communication terminal setting method
CN111159765B (en) Information processing method and system
JP6860800B1 (en) Information processing equipment, information processing systems, and programs
US11132206B2 (en) Systems and methods for modifying boot operation of an information handling system
CN108229134B (en) Password prompting method and electronic equipment
CN114764345B (en) Method for generating setting menu of basic input/output system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant