CN111859343A - Clear CMOS (complementary Metal oxide semiconductor) management method, device, equipment and medium - Google Patents

Clear CMOS (complementary Metal oxide semiconductor) management method, device, equipment and medium Download PDF

Info

Publication number
CN111859343A
CN111859343A CN202010724651.0A CN202010724651A CN111859343A CN 111859343 A CN111859343 A CN 111859343A CN 202010724651 A CN202010724651 A CN 202010724651A CN 111859343 A CN111859343 A CN 111859343A
Authority
CN
China
Prior art keywords
cmos
password
administrator
clear
fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010724651.0A
Other languages
Chinese (zh)
Inventor
杨川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Electronic Information Industry Co Ltd
Original Assignee
Inspur Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Electronic Information Industry Co Ltd filed Critical Inspur Electronic Information Industry Co Ltd
Priority to CN202010724651.0A priority Critical patent/CN111859343A/en
Publication of CN111859343A publication Critical patent/CN111859343A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Image Input (AREA)

Abstract

The application discloses a method, a device, equipment and a medium for managing clear CMOS, wherein the method comprises the following steps: collecting a fingerprint password of an administrator by using a fingerprint sensor, and judging whether an operating instruction of a clear CMOS is received or not; if yes, judging whether the clear CMOS is legal or not through a fingerprint password of an administrator; if the verification is legal, clear CMOS is executed; if not, the clear CMOS is prohibited from being executed. Obviously, because the clear CMOS can be executed only when the clear CMOS passes the fingerprint password verification of the administrator, compared with the prior art, the phenomenon that the clear CMOS can be directly executed only by turning off the battery for supplying power to the CMOS or finding the jumper on the main board is avoided, and thus the safety and reliability in executing the clear CMOS can be improved.

Description

Clear CMOS (complementary Metal oxide semiconductor) management method, device, equipment and medium
Technical Field
The invention relates to the technical field of computers, in particular to a method, a device, equipment and a medium for managing clear CMOS.
Background
A CMOS (Complementary Metal Oxide semiconductor) is a chip manufactured by using a large-scale integrated circuit, and is a readable and writable RAM (random access Memory) chip on a computer motherboard. Because of its readable and writable properties, a CMOS is often used on a computer motherboard to store computer hardware data in a BIOS (Basic Input Output System). In the prior art, the clear CMOS can be directly executed only by taking off the battery for supplying power to the CMOS or finding the jumper on the motherboard, and the data in the BIOS is deleted. Obviously, the management mode of the clear CMOS has great potential safety hazard. At present, no effective solution exists for the technical problem.
Therefore, it is an urgent technical problem to be solved by those skilled in the art how to improve the safety and reliability when performing clear CMOS.
Disclosure of Invention
Accordingly, the present invention is directed to a method, an apparatus, a device and a medium for managing a clear CMOS, so as to improve the security and reliability when the clear CMOS is executed. The specific scheme is as follows:
a method for managing clear CMOS comprises the following steps:
collecting a fingerprint password of an administrator by using a fingerprint sensor, and judging whether an operating instruction of a clear CMOS is received or not;
if the operating instruction of the clear CMOS is received, judging whether the clear CMOS is legal or not through the fingerprint password of the administrator;
if the clear CMOS is legal, executing the clear CMOS;
and if the clear CMOS is illegal, forbidding the clear CMOS to be executed.
Preferably, after the process of collecting the administrator's fingerprint password by using the fingerprint sensor, the method further includes:
and encrypting the fingerprint password of the administrator.
Preferably, the process of encrypting the administrator's fingerprint password includes:
the administrator's fingerprint password is encrypted using the SHA1 algorithm.
Preferably, before the process of collecting the administrator's fingerprint password by using the fingerprint sensor, the method further includes:
starting a BIOS, and judging whether a variable CMOS _ FLAG exists in the CMOS or not;
if the variable CMOS _ FLAG does not exist, defining the variable CMOS _ FLAG, and setting the value of the variable CMOS _ FLAG to be zero;
if the variable CMOS _ FLAG exists, judging whether a request for setting an administrator password by a user can be received;
if the request is not received, setting the value of the variable CMOS _ FLAG to be 1;
and if the request is received, acquiring a target administrator password set by the user, and setting the value of the variable CMOS _ FLAG to be 2.
Preferably, the step of determining whether an operation instruction of the clear CMOS is received includes:
judging whether the value of the variable CMOS _ FLAG is 0 or not;
if the value of the variable CMOS _ FLAG is 0, judging that an operation instruction of the clear CMOS is received;
and if the value of the variable CMOS _ FLAG is not 0, judging that the operating instruction of the clear CMOS is not received.
Preferably, the target administrator password is a password composed of upper case letters, lower case letters, numbers and characters.
Preferably, after the process of obtaining the target administrator password set by the user, the method further includes:
judging whether the target administrator password meets a preset condition or not;
if not, prompting the user to reset the administrator password.
Correspondingly, the embodiment of the invention also discloses a management device of the clear CMOS, which comprises the following steps:
the CMOS judgment module is used for collecting a fingerprint password of an administrator by using a fingerprint sensor and judging whether an operating instruction of a clear CMOS is received or not;
the password judgment module is used for judging whether the clear CMOS is legal or not through the fingerprint password of the administrator when the judgment result of the CMOS judgment module is yes;
the first execution module is used for executing the clearCMOS when the judgment result of the password judgment module is yes;
and the second execution module is used for forbidding to execute the clear CMOS when the judgment result of the password judgment module is negative.
Correspondingly, the embodiment of the invention also discloses a management device of the clear CMOS, which comprises the following steps:
a memory for storing a computer program;
a processor for implementing the steps of a clear CMOS management method as disclosed in the foregoing when executing the computer program.
Correspondingly, the embodiment of the invention also discloses a computer readable storage medium, wherein a computer program is stored on the computer readable storage medium, and when the computer program is executed by a processor, the steps of the method for managing the clear CMOS are realized.
It can be seen that, in the present invention, firstly, the fingerprint sensor is used to collect the fingerprint password of the administrator, and determine whether the operating instruction of the clear CMOS is received, if the operating instruction of the clear CMOS is received, the fingerprint password of the administrator is used to determine whether the clear CMOS is legal, if the clear CMOS is legal, the clear CMOS is executed, and if the clear CMOS is illegal, the clear CMOS is prohibited from being executed. Obviously, in the management method provided by the invention, the clear CMOS can be executed only when the clear CMOS passes the verification of the fingerprint password of the administrator, so that compared with the prior art, the phenomenon that the clear CMOS can be directly executed only by taking down a battery for supplying power to the CMOS or finding a jumper on a mainboard is avoided, and the safety and the reliability in executing the clear CMOS can be obviously improved. Correspondingly, the invention also provides a clear CMOS management device, equipment and medium, which have the beneficial effects.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a method for managing clear CMOS according to an embodiment of the present invention;
FIG. 2 is a block diagram of a clear CMOS management device according to an embodiment of the present invention;
fig. 3 is a structural diagram of a management device of clear CMOS according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart of a method for managing clear CMOS according to an embodiment of the present invention, where the method includes:
step S11: collecting a fingerprint password of an administrator by using a fingerprint sensor, and judging whether an operating instruction of a clear CMOS is received or not; if yes, go to step S12;
step S12: judging whether the clear CMOS is legal or not through the fingerprint password of the administrator; if yes, go to step S13; if not, go to step S14;
step S13: executing clear CMOS;
step S14: the clear CMOS is disabled.
In the present embodiment, a clear CMOS management method is provided, by which safety and reliability in executing clear CMOS can be significantly improved.
In this embodiment, firstly, the fingerprint password of the administrator is collected by using the fingerprint sensor, specifically, in the actual operation process, when entering the BIOS setup interface, the relevant driver of the fingerprint sensor may be loaded by the BIOS, the fingerprint sensor is turned on, and after the fingerprint sensor is turned on, the administrator is requested to place a finger on the fingerprint sensor, and the fingerprint password of the administrator is collected. In the process, in order to ensure the accuracy and reliability of the acquisition result of the administrator fingerprint password, the acquisition process of the administrator fingerprint password can be completed in a multi-acquisition mode. When the fingerprint password of the administrator is acquired by the fingerprint sensor, the acquired fingerprint password of the administrator may be saved by pressing the hot key F10, and specifically, the acquired fingerprint password of the administrator may be stored in the bios nvram.
When the fingerprint password of the administrator is obtained, whether the mainboard receives the operating instruction of the clear CMOS is judged, and whether the clear CMOS is legal is verified through the fingerprint password of the administrator. That is, when the motherboard receives an operation instruction of the clear CMOS, the motherboard triggers a BIOS fingerprint verification program, initializes the fingerprint sensor, and asks the user to input a fingerprint password of the administrator on the fingerprint sensor, and if the fingerprint password input by the user on the fingerprint sensor is consistent with the fingerprint password of the administrator stored in the BIOS nvram, it indicates that the clear CMOS is a legal operation, and at this time, the clear CMOS can be executed; if the fingerprint password input by the user on the fingerprint sensor is not consistent with the fingerprint password of the administrator stored in the BIOSNVRAM, the clear CMOS is indicated to be illegal, and at the moment, the clear CMOS needs to be prohibited from being executed.
In addition, in order to ensure the accuracy and reliability of the verification result, whether the clear CMOS is legal or not can be determined by multiple times of verification, such as: the user can have the opportunity of inputting the fingerprint password on the fingerprint sensor for three times, if the verification for three times fails, the clear CMOS is indicated to be illegal, at the moment, the clear CMOS needs to be prohibited from being executed, and meanwhile, the buzzer can prompt the user that a lawless person executes the clear CMOS at present. Of course, in practical applications, the number of times of verification may also be adaptively adjusted, and details are not described herein.
Obviously, in the clear CMOS management method provided in this embodiment, because the clear CMOS can be executed only when the clear CMOS passes the fingerprint password verification of the administrator, compared with the prior art, the phenomenon that the clear CMOS can be directly executed only by turning off the battery for supplying power to the CMOS or finding the jumper on the motherboard is avoided, and thus the safety and reliability in executing the clear CMOS can be significantly improved. Moreover, the fingerprint sensor is already used as a standard accessory of the intelligent computer, so that the management method provided by the embodiment does not bring extra operation cost to the computer, thereby further improving the convenience of a user in managing the clear CMOS.
It can be seen that, in this embodiment, firstly, the fingerprint sensor is used to collect the fingerprint password of the administrator, and determine whether the operating instruction of the clear CMOS is received, if the operating instruction of the clear CMOS is received, the fingerprint password of the administrator is used to determine whether the clear CMOS is legal, if the clear CMOS is legal, the clear CMOS is executed, and if the clear CMOS is illegal, the clear CMOS is prohibited from being executed. Obviously, in the management method provided in this embodiment, the clear CMOS can be executed only when the clear CMOS passes the verification of the administrator fingerprint code, which avoids the phenomenon that the clear CMOS can be directly executed only by turning off the battery for supplying power to the CMOS or finding the jumper on the motherboard, compared with the prior art, thereby significantly improving the safety and reliability when the clear CMOS is executed.
Based on the above embodiments, this embodiment further describes and optimizes the technical solution, and as a preferred implementation, the above steps: after the process of collecting the fingerprint password of the administrator by using the fingerprint sensor, the method further comprises the following steps:
and encrypting the fingerprint password of the administrator.
In this embodiment, after the fingerprint password of the administrator is acquired by the fingerprint sensor, the fingerprint password of the administrator is encrypted. Obviously, after the fingerprint password of the administrator is encrypted, the method can relatively reduce the probability that a lawbreaker steals the fingerprint password of the administrator to complete the verification of the clear COMS and execute the clear COMS, thereby further improving the safety and reliability of the password of the administrator in the using process.
In the actual operation process, the fingerprint password of the administrator may be encrypted by using a des (data Encryption standard) Encryption algorithm, an aes (advanced Encryption standard) Encryption algorithm, an RSA Encryption algorithm, or an MD5 algorithm, which is not described in detail herein.
As a preferred embodiment, the above steps: the process of encrypting the administrator's fingerprint password comprises the following steps:
the administrator's fingerprint password is encrypted using the SHA1 algorithm.
Specifically, in the present embodiment, the SHA1(Secure Hash Algorithm 1) Algorithm is used to encrypt the administrator's fingerprint password, because the SHA1 Algorithm can map data of any size to a smaller, fixed-length unique value, and therefore, after the administrator's fingerprint password is encrypted by using the SHA1 Algorithm, one cannot deduce any original information about the administrator's fingerprint password. Obviously, through the technical scheme provided by the embodiment, the overall reliability of people in the process of encrypting the fingerprint password of the administrator can be further ensured.
Based on the above embodiments, this embodiment further describes and optimizes the technical solution, and as a preferred implementation, the above steps: before the process of collecting the fingerprint password of the administrator by using the fingerprint sensor, the method further comprises the following steps:
starting a BIOS, and judging whether a variable CMOS _ FLAG exists in the CMOS or not;
if the variable CMOS _ FLAG does not exist, defining the variable CMOS _ FLAG, and setting the value of the variable CMOS _ FLAG to be zero;
if the variable CMOS _ FLAG exists, judging whether a request for setting an administrator password by a user can be received;
if the request cannot be received, setting the value of a variable CMOS _ FLAG to be 1;
if the request is received, the target administrator password set by the user is obtained, and the value of the variable CMOS _ FLAG is set to be 2.
In this embodiment, in order to further ensure the security and reliability in the process of managing the clear CMOS, the administrator password may be set according to the user's requirement before the fingerprint sensor is used to collect the administrator fingerprint password.
Specifically, when the BIOS is started, it is first determined whether a variable CMOS _ FLAG exists in the CMOS, and if the variable CMOS _ FLAG does not exist in the CMOS, the value of the variable CMOS _ FLAG is set to zero, that is, the variable CMOS _ FLAG is used to identify an administrator password set by a user; if the CMOS has the variable CMOS _ FLAG, judging whether the mainboard can receive a request of setting an administrator password by a user, if the mainboard cannot receive the request of setting the administrator password by the user, indicating that the user does not need to set the administrator password, and in this case, setting the value of the variable CMOS _ FLAG to be 1, namely, marking that the user does not need to set the administrator password by using the value of the variable CMOS _ FLAG as 1; if the mainboard receives a request of setting the administrator password by the user, the target administrator password set by the user is obtained, and the value of the variable CMOS _ FLAG is set to be 2, namely, the administrator password set by the user is identified by using the value of the variable CMOS _ FLAG to be 2.
As a preferred embodiment, the above steps: the process of judging whether the operating instruction of the clear CMOS is received comprises the following steps:
judging whether the value of the variable CMOS _ FLAG is 0 or not;
if the value of the variable CMOS _ FLAG is 0, judging that an operating instruction of a clear CMOS is received;
if the value of the variable CMOS _ FLAG is not 0, it is determined that the operation command of clear CMOS has not been received.
It can be understood that when the value of the variable CMOS _ FLAG is 1 or 2, it indicates that the CMOS is in a normal operating state, and there is no operation behavior of clear CMOS; if the value of the variable CMOS _ FLAG is 0, it indicates that the CMOS _ FLAG has recovered to the default value, and there is an operation behavior of clear CMOS, so in this embodiment, it can be determined whether the motherboard receives an operation instruction of clear CMOS by the value of the variable CMOS _ FLAG.
As a preferred embodiment, the target administrator password is specifically a password consisting of upper case letters, lower case letters, numbers and characters.
Specifically, in the present embodiment, the target administrator password is set to a password composed of upper case letters, lower case letters, numbers, and characters. It can be thought that when the target administrator password is set to be in such a form, the cracking difficulty of the target administrator password can be relatively improved, so that the safety of the target administrator password in the use process can be improved.
As a preferred embodiment, the above steps: after the process of obtaining the target administrator password set by the user, the method further comprises the following steps:
judging whether the target administrator password meets a preset condition or not;
if not, prompting the user to reset the administrator password.
It can be understood that, in practical applications, in the process of setting the target administrator password by the user, a situation that the target administrator password does not meet the preset condition necessarily occurs, and in this situation, in order to ensure the reliability of the target administrator password in the subsequent use process, the user may be further caused to reset the administrator password meeting the preset condition by prompting the user to reset the administrator password. Obviously, the overall reliability of the target administrator password in the use process can be further improved by the arrangement mode.
Referring to fig. 2, fig. 2 is a structural diagram of a management device of a clear CMOS according to an embodiment of the present invention, the management device includes:
the CMOS judging module 21 is used for collecting a fingerprint password of an administrator by using a fingerprint sensor and judging whether an operating instruction of a clear CMOS is received or not;
the password judgment module 22 is used for judging whether the clear CMOS is legal or not through the fingerprint password of the administrator when the judgment result of the CMOS judgment module 21 is yes;
a first executing module 23, configured to execute clear CMOS if the determination result of the password determining module 22 is yes;
and a second executing module 24, configured to prohibit the clearCMOS from being executed if the determination result of the password determining module 22 is negative.
Preferably, the method further comprises the following steps:
and the fingerprint encryption module is used for encrypting the fingerprint password of the administrator after the process of acquiring the fingerprint password of the administrator by using the fingerprint sensor.
Preferably, the fingerprint encryption module includes:
and the fingerprint encryption unit is used for encrypting the fingerprint password of the administrator by using the SHA1 algorithm.
Preferably, the method further comprises the following steps:
the BIOS starting module is used for starting the BIOS before the process of acquiring the fingerprint password of the administrator by using the fingerprint sensor and judging whether a variable CMOS _ FLAG exists in the CMOS;
the variable definition module is used for defining the variable CMOS _ FLAG if the variable CMOS _ FLAG does not exist, and setting the value of the variable CMOS _ FLAG to be zero;
the request judging module is used for judging whether a request for setting the password of the administrator by a user can be received or not if a variable CMOS _ FLAG exists;
the first setting module is used for setting the value of a variable CMOS _ FLAG to 1 if the request cannot be received;
and the second setting module is used for acquiring the target administrator password set by the user and setting the value of the variable CMOS _ FLAG to be 2 when the request is received.
Preferably, the request judging module includes:
the variable judging unit is used for judging whether the value of the variable CMOS _ FLAG is 0 or not;
the first judging unit is used for judging that the operating instruction of the clearCMOS is received when the judgment result of the variable judging unit is yes;
and a second judging unit for judging that the operating instruction of the clearCMOS is not received when the judgment result of the variable judging unit is negative.
Preferably, the method further comprises the following steps:
the condition judgment module is used for judging whether the target administrator password meets the preset condition or not after the process of acquiring the target administrator password set by the user;
and the password prompting module is used for prompting the user to reset the administrator password when the judgment result of the condition judgment module is negative.
The clear CMOS management device provided by the embodiment of the invention has the beneficial effects of the clear CMOS management method disclosed in the foregoing.
Referring to fig. 3, fig. 3 is a structural diagram of a management device of a clear CMOS according to an embodiment of the present invention, where the management device includes:
a memory 31 for storing a computer program;
a processor 32 for implementing the steps of a method for managing clear CMOS as disclosed in the foregoing when executing the computer program.
The management device of the clear CMOS provided by the embodiment of the invention has the beneficial effects of the disclosed management method of the clear CMOS.
Correspondingly, the embodiment of the invention also discloses a computer readable storage medium, wherein a computer program is stored on the computer readable storage medium, and when the computer program is executed by a processor, the steps of the clear CMOS management method are realized.
The computer-readable storage medium provided by the embodiment of the invention has the beneficial effects of the above-disclosed clearCMOS management method.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The foregoing describes in detail a method, an apparatus, a device, and a medium for managing clear CMOS, and a specific example is applied in the present disclosure to explain the principle and the implementation of the present invention, and the description of the foregoing embodiment is only used to help understand the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A method for managing clear CMOS, comprising:
collecting a fingerprint password of an administrator by using a fingerprint sensor, and judging whether an operating instruction of a clear CMOS is received or not;
if the operating instruction of the clear CMOS is received, judging whether the clear CMOS is legal or not through the fingerprint password of the administrator;
if the clear CMOS is legal, executing the clear CMOS;
and if the clear CMOS is illegal, forbidding the clear CMOS to be executed.
2. The method for managing according to claim 1, wherein the process of collecting the administrator's fingerprint password using the fingerprint sensor is followed by further comprising:
and encrypting the fingerprint password of the administrator.
3. The method for managing according to claim 2, wherein the process of encrypting the administrator's fingerprint password comprises:
the administrator's fingerprint password is encrypted using the SHA1 algorithm.
4. The management method according to any one of claims 1 to 3, wherein the process of collecting the administrator's fingerprint password by using the fingerprint sensor is preceded by:
starting a BIOS, and judging whether a variable CMOS _ FLAG exists in the CMOS or not;
if the variable CMOS _ FLAG does not exist, defining the variable CMOS _ FLAG, and setting the value of the variable CMOS _ FLAG to be zero;
if the variable CMOS _ FLAG exists, judging whether a request for setting an administrator password by a user can be received;
if the request is not received, setting the value of the variable CMOS _ FLAG to be 1;
and if the request is received, acquiring a target administrator password set by the user, and setting the value of the variable CMOS _ FLAG to be 2.
5. The method for managing according to claim 4, wherein the determining whether the operation instruction of clear CMOS is received comprises:
judging whether the value of the variable CMOS _ FLAG is 0 or not;
if the value of the variable CMOS _ FLAG is 0, judging that an operation instruction of the clear CMOS is received;
and if the value of the variable CMOS _ FLAG is not 0, judging that the operating instruction of the clear CMOS is not received.
6. The method of claim 4, wherein the target administrator password is a password consisting of upper case letters, lower case letters, numbers and characters.
7. The method for managing according to claim 4, wherein the step of obtaining the target administrator password set by the user is followed by the step of:
judging whether the target administrator password meets a preset condition or not;
if not, prompting the user to reset the administrator password.
8. A clear CMOS management device, comprising:
the CMOS judging module is used for collecting a fingerprint password of an administrator by using a fingerprint sensor and judging whether an operating instruction of the clearCMOS is received or not;
the password judgment module is used for judging whether the clear CMOS is legal or not through the fingerprint password of the administrator when the judgment result of the CMOS judgment module is yes;
the first execution module is used for executing the clear CMOS when the judgment result of the password judgment module is yes;
and the second execution module is used for forbidding to execute the clearCMOS when the judgment result of the password judgment module is negative.
9. A clear CMOS management device, comprising:
a memory for storing a computer program;
a processor for implementing the steps of a clearCMOS management method as claimed in any one of claims 1 to 7 when executing said computer program.
10. A computer-readable storage medium, having stored thereon a computer program which, when executed by a processor, implements the steps of a method of managing clear CMOS as claimed in any one of claims 1 to 7.
CN202010724651.0A 2020-07-24 2020-07-24 Clear CMOS (complementary Metal oxide semiconductor) management method, device, equipment and medium Pending CN111859343A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010724651.0A CN111859343A (en) 2020-07-24 2020-07-24 Clear CMOS (complementary Metal oxide semiconductor) management method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010724651.0A CN111859343A (en) 2020-07-24 2020-07-24 Clear CMOS (complementary Metal oxide semiconductor) management method, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN111859343A true CN111859343A (en) 2020-10-30

Family

ID=72949546

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010724651.0A Pending CN111859343A (en) 2020-07-24 2020-07-24 Clear CMOS (complementary Metal oxide semiconductor) management method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN111859343A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010087637A (en) * 2000-03-08 2001-09-21 구자홍 Apparatus and method for protecting the recorded information of a computer
CN1595423A (en) * 2003-09-29 2005-03-16 深圳市研祥智能科技股份有限公司 Safety industrial control system with fingerprint encryption

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010087637A (en) * 2000-03-08 2001-09-21 구자홍 Apparatus and method for protecting the recorded information of a computer
CN1595423A (en) * 2003-09-29 2005-03-16 深圳市研祥智能科技股份有限公司 Safety industrial control system with fingerprint encryption

Similar Documents

Publication Publication Date Title
US20210357488A1 (en) Fingerprint Recognition Method and Apparatus, and Touchscreen Terminal
CN109743315B (en) Behavior identification method, behavior identification device, behavior identification equipment and readable storage medium for website
EP3905078A1 (en) Identity verification method and system therefor
CN109561085B (en) Identity verification method based on equipment identification code, server and medium
CN108810831B (en) Short message verification code pushing method, electronic device and readable storage medium
WO2017020427A1 (en) Application program access method and terminal
CN107729836B (en) Face recognition method and related product
WO2020181809A1 (en) Data processing method and system based on interface checking, and computer device
JP2017510909A (en) Fingerprint authentication method, apparatus, intelligent terminal, and computer storage medium
CN107908940B (en) Fingerprint identification method and terminal equipment
TW200949542A (en) Computer system, method for data protection in a computer system and machine readable medium
JP2015531134A (en) Hardware access protection
US20150047019A1 (en) Information processing method and electronic device
CN105009553A (en) Information terminal device, information terminal control method, and program
CN114238874A (en) Digital signature verification method and device, computer equipment and storage medium
CN107085694B (en) Information display processing method and device
CN111447070A (en) Block chain signature verification method and device and storage medium
US20130102285A1 (en) Mobile communication terminal, startup method thereof, and network communication system
CN104937602B (en) Privacy protection method and electronic equipment
CN110851795B (en) File management method, device, equipment and readable storage medium
US20220092189A1 (en) Implementation of Trusted Computing System Based on Master Controller of Solid-State Drive
CN113221095A (en) Application program protection method and device, electronic equipment and storage medium
JP4711824B2 (en) Business administrator terminal, environmental management station terminal, network operator terminal, business operator terminal, business administrator terminal control method, environmental management station terminal control method, network operator terminal control method, and business operator program
CN111859343A (en) Clear CMOS (complementary Metal oxide semiconductor) management method, device, equipment and medium
WO2016180234A1 (en) Method and apparatus for building secure environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201030

RJ01 Rejection of invention patent application after publication