CN112130903A - CMOS (complementary Metal oxide semiconductor) information clearing method and device and computer readable storage medium - Google Patents

CMOS (complementary Metal oxide semiconductor) information clearing method and device and computer readable storage medium Download PDF

Info

Publication number
CN112130903A
CN112130903A CN202010986926.8A CN202010986926A CN112130903A CN 112130903 A CN112130903 A CN 112130903A CN 202010986926 A CN202010986926 A CN 202010986926A CN 112130903 A CN112130903 A CN 112130903A
Authority
CN
China
Prior art keywords
clear
cmos
image
user
flag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010986926.8A
Other languages
Chinese (zh)
Other versions
CN112130903B (en
Inventor
杨川
赵海丽
鞠荣荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Yunhai Guochuang Cloud Computing Equipment Industry Innovation Center Co Ltd
Original Assignee
Shandong Yunhai Guochuang Cloud Computing Equipment Industry Innovation Center Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Yunhai Guochuang Cloud Computing Equipment Industry Innovation Center Co Ltd filed Critical Shandong Yunhai Guochuang Cloud Computing Equipment Industry Innovation Center Co Ltd
Priority to CN202010986926.8A priority Critical patent/CN112130903B/en
Publication of CN112130903A publication Critical patent/CN112130903A/en
Application granted granted Critical
Publication of CN112130903B publication Critical patent/CN112130903B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/30Arrangements for executing machine instructions, e.g. instruction decode
    • G06F9/30003Arrangements for executing specific machine instructions
    • G06F9/3004Arrangements for executing specific machine instructions to perform operations on memory
    • G06F9/30043LOAD or STORE instructions; Clear instruction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/2284Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing by power-on test, e.g. power-on self test [POST]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Collating Specific Patterns (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a CMOS information clearing method, a CMOS information clearing device and a computer readable storage medium. The method comprises the steps of pre-storing face images of authorized users and storing BIOS administrator passwords in a BIOS NVRAM password space. When the Clear CMOS operation behavior is detected, the current face image of the user issuing the Clear CMOS operation instruction is collected by loading an image sensor drive. And checking whether the face image is an authorized user face image, if the current face image is the authorized user face image, executing Clear CMOS operation to Clear BIOS data stored in the CMOS chip, and clearing a BIOS administrator password and Clear behavior identification information of the Clear CMOS operation stored in a BIOS NVRAM password space. The method and the device can safely and reliably execute Clear CMOS operation, and effectively improve the safety of user data storage.

Description

CMOS (complementary Metal oxide semiconductor) information clearing method and device and computer readable storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for removing CMOS information, and a computer-readable storage medium.
Background
An image sensor is an optical device with a photoelectric conversion function, which is used for dividing a light image on a light sensing surface into a plurality of small units and converting the small units into electric signals in a corresponding proportional relationship with the light image, and gradually becomes a peripheral device of a plurality of computers. Currently, existing image sensors are classified into a photoconductive camera tube and a solid-state image sensor. Compared with a photoconductive camera tube, the solid-state image sensor has the characteristics of small volume, light weight, high integration level, high resolution, low power consumption, long service life, low price and the like. A CMOS (Complementary Metal Oxide semiconductor Memory) is a RAM (Random Access Memory) chip that can be read and written on a motherboard. Whether a PC (personal computer) or a server, a CMOS chip is used to store important data in a BIOS (Basic Input Output System), and it can be guaranteed that power is not lost. In addition, in real life, the BIOS manager password is very likely to be unable to be retrieved due to various reasons such as personnel movement and machine handover. At this time, the machine can be started only by performing Clear CMOS (Clear CMOS information) operation on the machine. Therefore, Clear CMOS operation is an indispensable function.
In the prior art, Clear CMOS operation can be directly executed only by removing a battery for supplying power to a CMOS or finding a jumper on a motherboard, and all BIOS data stored in a CMOS chip is deleted. Unauthorized users or intruders can easily execute Clear CMOS operation in the mode, BIOS administrator passwords can be cleared, the security performance of user data is not high, and the Clear CMOS management mode has great security risks.
In view of this, how to safely and reliably perform Clear CMOS operation is a technical problem to be solved by those skilled in the art.
Disclosure of Invention
The application provides a CMOS information clearing method, a CMOS information clearing device and a computer readable storage medium, Clear CMOS operation can be safely and reliably executed, and safety of user data storage is effectively improved.
In order to solve the above technical problems, embodiments of the present invention provide the following technical solutions:
an embodiment of the present invention provides a CMOS information removal method in one aspect, including:
pre-storing face images of authorized users;
when the Clear CMOS operation issuing instruction is detected, the current face image of the user issuing the instruction is collected by loading an image sensor drive;
and if the current face image is the face image of the authorized user, executing the Clear CMOS operation, clearing the BIOS administrator password stored in the BIOS NVRAM password space, and clearing the Clear behavior identification information of the Clear CMOS operation.
Optionally, the storing the facial image of the authorized user includes:
when an image acquisition instruction issued by a user image acquisition mode in a BIOS setting interface is received, loading the image sensor drive and prompting a user to acquire an image;
storing the collected face image of the user as an authorized user image in an authorized user image set in an image module flash memory;
and according to the received exit instruction of the user image acquisition mode, exiting the BIOS setting interface and automatically executing the restart operation.
Optionally, after the collected face image of the user is stored in the flash memory of the image module as an authorized user image in the authorized user image set, the method further includes:
converting the collected user face images at different angles into feature vectors by adopting a feature face technology to generate a face feature vector set;
extracting corresponding characteristic values from the face characteristic vector set, encrypting each characteristic value by adopting an encryption algorithm, and storing the encrypted face characteristic vector set in a BIOS NVRAM.
Optionally, after the executing the Clear CMOS operation and clearing Clear CMOS operation identification information if the current face image is a face image of an authorized user, the method further includes:
checking whether the frequency of whether the current face image is the face image of the authorized user in the face image set of the authorized user exceeds a preset frequency threshold value;
if yes, the Clear CMOS operation is stopped, alarm prompt is carried out, and shutdown operation is automatically carried out.
Optionally, the detecting that the Clear CMOS operation issues the instruction includes:
judging whether a CLEAR _ FLAG exists in the CMOS chip at the initial stage of the power-on self-test process;
if yes, reading the value of the CLEAR _ FLAG, and if the value of the CLEAR _ FLAG is the existing identification value, judging that the CLEAR CMOS operation behavior exists in the user; if the value of the CLEAR _ FLAG is the absence identification value, judging that the CLEAR CMOS operation behavior does not exist in the user;
if not, defining the CLEAR _ FLAG as the clearing behavior identification information, and initializing the CLEAR _ FLAG as the non-existing identification value to identify that the CLEAR CMOS operation behavior does not exist in the user.
Another aspect of an embodiment of the present invention provides a CMOS information erasing apparatus, including:
the authorized image pre-storing module is used for pre-storing facial images of authorized users;
the image acquisition module is used for acquiring a current face image of a user issuing an instruction by loading an image sensor drive when the instruction issuing operation of the Clear CMOS is detected;
the authorization behavior checking module is used for checking whether the current face image is the face image of the authorized user;
and the Clear operation execution module is used for executing the Clear CMOS operation if the current face image is the face image of the authorized user, clearing the BIOS administrator password stored in the BIOS NVRAM password space and clearing the Clear behavior identification information of the Clear CMOS operation.
Optionally, the authorization image pre-storing module includes:
the authorized image acquisition sub-module is used for loading the image sensor drive and prompting a user to acquire an image when receiving an image acquisition instruction issued by a user image acquisition mode in a BIOS setting interface;
the authorized image storage sub-module is used for storing the acquired face image of the user as an authorized user image in an authorized user image set into the image module flash memory;
and the image acquisition exit submodule is used for exiting the BIOS setting interface and automatically executing restart operation according to the received exit instruction of the user image acquisition mode.
Optionally, the image capturing module includes a clear behavior detection sub-module, and the clear behavior detection sub-module includes:
the identification judgment unit is used for judging whether the CLEAR _ FLAG exists in the CMOS chip at the initial stage of the power-on self-test process;
a behavior judging unit, reading the value of CLEAR _ FLAG if CLEAR _ FLAG exists in the CMOS chip, and judging that CLEAR CMOS operation behavior exists in the user if the value of CLEAR _ FLAG is the existence identification value; if the value of the CLEAR _ FLAG is the absence identification value, judging that the CLEAR CMOS operation behavior does not exist in the user; if CLEAR _ FLAG does not exist in the CMOS chip, the CLEAR _ FLAG is defined as clearing behavior identification information, and the CLEAR _ FLAG is initialized to an absence identification value so as to identify that CLEAR CMOS operation behavior does not exist for a user.
An embodiment of the present invention further provides a CMOS information removal apparatus, which includes a processor, and the processor is configured to implement the steps of the CMOS information removal method according to any one of the preceding items when executing a computer program stored in a memory.
Finally, an embodiment of the present invention provides a computer-readable storage medium, where a CMOS information removal program is stored on the computer-readable storage medium, and when the CMOS information removal program is executed by a processor, the steps of the CMOS information removal method are implemented as in any one of the foregoing.
The technical scheme provided by the application has the advantages that when the user executes Clear CMOS operation, the safety protection measure of face recognition is added, and the Clear CMOS operation is determined to be executed only when the user issuing the clearing command is an authorized user, so that the Clear CMOS operation can be executed by a legal user, and the problem of security holes existing in the Clear CMOS operation function realized by an unauthorized user or an invader in a mode of removing a power supply battery or a jumper of a main board CMOS chip is effectively solved. The safety and reliability of Clear CMOS operation are improved, and the safety of user data storage is effectively improved. In addition, the image sensor becomes a standard configuration of an all-in-one machine or a notebook computer, so that extra operation burden can not be brought to a user, the method is practical, simple, convenient, safe and efficient, Clear CMOS operation can be safely executed based on the image sensor, and the requirements of the current market can be met from multiple angles of technology, cost, user experience and the like.
In addition, the embodiment of the invention also provides a corresponding implementation device and a computer readable storage medium for the CMOS information clearing method, so that the method has higher practicability, and the device and the computer readable storage medium have corresponding advantages.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions of the related art, the drawings required to be used in the description of the embodiments or the related art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flow chart of a CMOS information removal method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of S101 according to an embodiment of the present invention;
fig. 3 is a schematic flow chart of S102 according to an embodiment of the present invention;
fig. 4 is a schematic flow chart of S103 according to an embodiment of the present invention;
fig. 5 is a structural diagram of a specific embodiment of a CMOS information erasing apparatus according to an embodiment of the present invention;
fig. 6 is a structural diagram of another specific implementation of the CMOS information erasing apparatus according to the embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the disclosure, the invention will be described in further detail with reference to the accompanying drawings and specific embodiments. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and claims of this application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "comprising" and "having," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements but may include other steps or elements not expressly listed.
Having described the technical solutions of the embodiments of the present invention, various non-limiting embodiments of the present application are described in detail below.
Referring to fig. 1, fig. 1 is a schematic flow chart of a CMOS information removal method according to an embodiment of the present invention, where the embodiment of the present invention may include the following:
s101: face images of authorized users are stored in advance.
In this embodiment, the authorized user face images may include face images of a plurality of users, and in order to improve subsequent verification efficiency and verification accuracy, there may be a plurality of face images of each authorized user, each face image being a face image taken at a different angle.
S102: when the Clear CMOS operation issuing instruction is detected, the current face image of the user issuing the instruction is collected by loading the image sensor drive.
It can be understood that Clear CMOS operation is a user behavior, the system can monitor whether the user has the Clear CMOS behavior in real time by recognizing and clearing behavior identification information, when the user has the Clear CMOS operation behavior, the identity of the user issuing the Clear CMOS operation is checked first, and the identity of the user can be checked by collecting a face image of the current user and a face image of an authorized user stored in advance in S101.
S103: and if the current face image is the face image of the authorized user, executing Clear CMOS operation, clearing the BIOS administrator password stored in the BIOS NVRAM password space, and clearing the clearing behavior identification information of the Clear CMOS operation.
In this application, the BIOS administrator password is pre-stored in the BIOS NVRAM password space, rather than being present in the CMOS chip. When the Clear CMOS operation is judged as an authorized user in S103, the Clear CMOS operation can be executed by the user, and then the BIOS administrator password is cleared, so that the BIOS administrator password is further protected from being deleted accidentally. After determining that Clear CMOS operation can be performed, Clear behavior identification information identifying whether Clear CMOS operation exists can be cleared, so that whether Clear CMOS operation behavior exists can be accurately determined in the following.
In the technical scheme provided by the embodiment of the invention, when the user executes Clear CMOS operation, a safety protection measure of face recognition is added, and the Clear CMOS operation is determined to be executed only when the user issuing a clearing command is an authorized user, so that a legal user can be allowed to execute the Clear CMOS operation, and the problem of security vulnerability existing when an unauthorized user or an intruder realizes the Clear CMOS operation function by removing a power supply battery or a jumper of a main board CMOS chip is effectively solved. The safety and reliability of Clear CMOS operation are improved, and the safety of user data storage is effectively improved. In addition, the image sensor becomes a standard configuration of an all-in-one machine or a notebook computer, so that extra operation burden can not be brought to a user, the method is practical, simple, convenient, safe and efficient, Clear CMOS operation can be safely executed based on the image sensor, and the requirements of the current market can be met from multiple angles of technology, cost, user experience and the like.
In the foregoing embodiment, how to execute step S101 is not limited, and the method for storing the face image of the authorized user in this embodiment may include the following steps:
and when an image acquisition instruction issued by a user image acquisition mode in a BIOS setting interface is received, loading an image sensor drive and prompting a user to acquire an image. And storing the collected face image of the user as an authorized user image in the authorized user image set in the image module flash memory. And according to the received exit instruction of the user image acquisition mode, exiting the BIOS setting interface and automatically executing the restart operation.
In this step, an option of the user image capture mode needs to be preset in a BIOS setting interface, i.e., BIOS Setup, and two sub-options of entering and exiting are set under the option. When a user authorized to execute Clear CMOS operation stores a face image of the user in the system, the user can firstly enter a setting interface of a BIOS (basic input/output system), a user image acquisition mode is clicked in the setting interface and an entry option is selected, after the system receives the entry of the user image acquisition mode, the image sensor can be automatically loaded to drive the image sensor to be in a working state, an image acquisition prompt is sent to the user, then the image acquisition operation is started to be executed, the face image of the current user is acquired, various face images can be acquired from multiple angles, and the acquired face image is stored in a flash memory of an image module. After the image acquisition is finished, the user clicks the exit option in the user image acquisition mode, and the system automatically exits the BIOS setting interface and restarts to ensure that the operation is effective.
In some embodiments of this embodiment, in order to further improve the security and reliability of the CMOS clear operation, after storing the acquired face image of the user as the authorized user image in the authorized user image set in the flash memory of the image module, the method may further include:
converting the collected user face images at different angles into feature vectors by adopting a feature face technology to generate a face feature vector set; extracting corresponding characteristic values from the face characteristic vector set, encrypting each characteristic value by adopting an encryption algorithm, and storing the encrypted face characteristic vector set in a BIOS NVRAM. The authorized face image and the feature vector after the encryption of the authorized face image are stored in a partitioned mode, so that a backup data is added, the safety of the stored data is improved, and the stored data is not easy to steal.
In this embodiment, in order to make the technical solution of this implementation more clear to those skilled in the art, as shown in fig. 2, this application further provides an illustrative example, which may include:
s11: and entering a BIOS Setup interface, selecting a user image acquisition mode, pressing a hot key F10, and selecting to save and restart.
S12: and loading the image sensor drive by the BIOS, lighting the image sensor, popping up a prompt on a BIOS Setup interface, and asking a user to collect the face. In the face acquisition process, the user can be subjected to image acquisition at different angles such as the front side and the side, and each user acquires 4 images which can be called as a registration photo.
S13: after the face collection is finished, the BIOS stores the registration photo in a FLASH of the image sensor module;
s14: the BIOS converts 4 human face images at different angles into a feature vector set by adopting a feature face technology according to the registration photo, extracts corresponding feature values, encrypts the feature values by adopting an SHA1 algorithm, stores the feature values in a BIOS NVRAM, stores the feature values in different areas with the registration photo, and performs data backup.
S15: selecting to quit the user image acquisition mode on a BIOS Setup interface, pressing a hot key F10, storing and restarting;
therefore, the embodiment of the invention further ensures the safety and reliability of Clear CMOS operation by encrypting and storing the face image of the authorized user in the partitioned mode.
In the above embodiment, how to execute step S102 is not limited, but in this embodiment, an implementation manner of detecting that Clear CMOS operation issues an instruction is provided, and in a system boot stage, the BIOS may determine whether a user has a behavior of Clear CMOS by detecting whether a CMOS chip has a Clear _ FLAG and a value of the FLAG, and may include the following steps:
in the initial stage of the power-on self-test process, whether CLEAR _ FLAG exists in the CMOS chip is judged, and the CLEAR _ FLAG is used as CLEAR behavior identification information of CLEAR CMOS operation. If CLEAR _ FLAG exists in the CMOS chip, reading the value of the CLEAR _ FLAG, and if the value of the CLEAR _ FLAG is the existence identification value such as 0, judging that CLEAR CMOS operation behavior exists in the user; if the value of CLEAR _ FLAG is the absence identification value such as 1, judging that CLEAR CMOS operation behaviors do not exist in the user; if CLEAR _ FLAG does not exist in the CMOS chip, the CLEAR _ FLAG is defined as CLEAR behavior identification information, and the CLEAR _ FLAG is initialized to an absence identification value such as 1 to identify that the CLEAR CMOS operation behavior does not exist for the user.
In order to make the technical solution of the present embodiment more clear to those skilled in the art, as shown in fig. 3, the present application also provides an illustrative example, which may include:
s21: the system is normally powered On, a Power-On key is pressed, the BIOS enters a POST (Power On Self Test) process, and Power-On Self Test is carried out.
S22: and reading the value of CLEAR _ FLAG in the CMOS chip by the BIOS at the initial stage of the POST process.
S23: if CLEAR _ FLAG is not present, a variable CLEAR _ FLAG is defined and initialized to 1, and the user is assumed to have no CLEAR CMOS behavior.
S24: if CLEAR _ FLAG is present, the value of FLAG is read. If the value is 0, the user is determined to have the action of Clear CMOS, otherwise, the user is determined not to have the action of Clear CMOS.
In the embodiment, the CLEAR _ FLAG is set to monitor the behavior of the CLEAR CMOS, so that the operation is more convenient and easier to realize.
It can be understood that if abnormal conditions such as blurring and incomplete face acquisition occur in the image acquisition process, which may cause that one-time verification cannot be truly successful, a phenomenon of misjudgment occurs, that is, an authorized user is originally verified as an unauthorized user once, in order to avoid that an authorized user cannot perform operations, multiple times of verification may be performed, in order to avoid time waste and better protect data, verification times are limited, that is, whether the number of times of verifying whether a current face image is an authorized user face image in a face image set of the authorized user exceeds a preset time threshold value or not is verified; if yes, the Clear CMOS operation execution is stopped, alarm prompt is carried out, and meanwhile shutdown operation is automatically executed. Based on the above, this embodiment further provides an implementation manner of the step S103, please refer to fig. 4, which includes the following steps:
s31: when the value of CLEAR _ FLAG is read to be 0, the BIOS determines that the CLEAR CMOS operation exists in the user, and triggers the BIOS face recognition program. At this time, the BIOS loads the image sensor driver, initializing the image sensor device.
S32: and popping up a prompt on the BIOS Setup interface, asking the user to recognize the face of the user, and simultaneously lighting the image sensor to enable the image sensor to be in a working state.
S33: after the user performs face recognition, the BIOS checks whether the user authorization is legitimate. If the authorization is illegal, the BIOS Setup interface pops up a prompt of 'identify error, please identify again'. And (4) checking for three times, after the checking fails, alternately alarming for 10S by the buzzer for one long and one short, and then executing shutdown operation by the BIOS, and skipping the following steps.
S34: if the authorization is legal, the BIOS Setup interface pops up a prompt to ask the user to confirm whether to execute Clear CMOS, and asks the user whether to execute the operation of Clear CMOS again, so as to avoid illegal operation caused by battery removal. If the user confirms that the selection is 'no', the Clear CMOS is not executed, Clear _ FLAG is reset to 1, and step S36 is executed to start the computer normally;
s35, if the user confirms that the selection is "YES," Clear CMOS is executed, the administrator password stored in BIOS NVRAM is cleared.
And S36, normally starting.
In the embodiment, by limiting the checking times, the authorized user can be ensured to execute the Clear CMOS efficiently, the occurrence probability of the misjudgment phenomenon is reduced, and the safety of the user stored data can be further ensured.
It should be noted that, in the present application, there is no strict sequential execution order among the steps, and as long as a logical order is met, the steps may be executed simultaneously or according to a certain preset order, and fig. 1 to fig. 4 are only schematic manners, and do not represent only such an execution order.
The embodiment of the invention also provides a corresponding device for the CMOS information clearing method, so that the method has higher practicability. Wherein the means can be described separately from the functional module point of view and the hardware point of view. In the following, the CMOS information removing apparatus provided by the embodiment of the present invention is introduced, and the CMOS information removing apparatus described below and the CMOS information removing method described above may be referred to correspondingly.
Based on the angle of the functional module, referring to fig. 5, fig. 5 is a structural diagram of a CMOS information removal apparatus according to an embodiment of the present invention, in a specific implementation, the apparatus may include:
and the authorized image pre-storing module 501 is used for pre-storing facial images of authorized users.
And the image acquisition module 502 is used for acquiring and issuing a current face image of a user of an instruction by loading an image sensor drive when the instruction is issued by Clear CMOS operation.
And an authorized behavior checking module 503, configured to check whether the current face image is a face image of an authorized user.
And the Clear operation execution module 504 is configured to execute Clear CMOS operation, Clear the BIOS administrator password stored in the BIOS NVRAM password space, and Clear the Clear behavior identification information of Clear CMOS operation, if the current face image is the face image of the authorized user.
Optionally, in some embodiments of this embodiment, the authorization image pre-storing module 501 may include:
the authorized image acquisition sub-module is used for loading the image sensor drive and prompting the user to acquire the image when receiving an image acquisition instruction issued by a user image acquisition mode in a BIOS setting interface;
the authorized image storage sub-module is used for storing the acquired face image of the user as an authorized user image in an authorized user image set into the image module flash memory;
and the image acquisition exit submodule is used for exiting the BIOS setting interface and automatically executing the restarting operation according to the received exit instruction of the user image acquisition mode.
In some other embodiments of this embodiment, the authorization image pre-storing module 501 may further include:
the characteristic processing submodule is used for converting the collected user face images at different angles into characteristic vectors by adopting a characteristic face technology and generating a face characteristic vector set;
the encryption submodule is used for extracting corresponding characteristic values from the face characteristic vector set and encrypting each characteristic value by adopting an encryption algorithm;
and the storage submodule is used for storing the face feature vector set after the encryption processing into the BIOS NVRAM.
Optionally, in other embodiments of this embodiment, the apparatus may further include:
the image acquisition module includes the action detection submodule that clears away, and the action detection submodule that clears away includes:
the identification judgment unit is used for judging whether the CLEAR _ FLAG exists in the CMOS chip at the initial stage of the power-on self-test process;
a behavior judging unit, reading the value of CLEAR _ FLAG if CLEAR _ FLAG exists in the CMOS chip, and judging that CLEAR CMOS operation behavior exists in the user if the value of CLEAR _ FLAG is the existence identification value; if the value of CLEAR _ FLAG is the absence identification value, judging that CLEAR CMOS operation behaviors do not exist in the user; if CLEAR _ FLAG does not exist in the CMOS chip, the CLEAR _ FLAG is defined as clearing behavior identification information, and CLEAR _ FLAG is initialized to an absence identification value so as to identify that CLEAR CMOS operation behavior does not exist in a user.
As an alternative embodiment, the apparatus may further comprise:
the multiple checking module is used for checking whether the frequency of the face image of the authorized user in the face image set of the authorized user is greater than a preset frequency threshold value or not;
and the verification failure processing module is used for terminating Clear CMOS operation execution and carrying out alarm prompt and automatically executing shutdown operation at the same time if the frequency of verifying whether the current face image is the face image of the authorized user in the face image set of the authorized user exceeds a preset frequency threshold.
The functions of the functional modules of the CMOS information removal apparatus according to the embodiments of the present invention may be specifically implemented according to the method in the above method embodiments, and the specific implementation process may refer to the related description of the above method embodiments, which is not described herein again.
Therefore, the embodiment of the invention can safely and reliably execute Clear CMOS operation and effectively improve the safety of user data storage.
The CMOS information erasing apparatus mentioned above is described from the perspective of a functional block, and further, the present application also provides a CMOS information erasing apparatus described from the perspective of hardware. Fig. 6 is a structural diagram of another CMOS information erasing apparatus according to an embodiment of the present application. As shown in fig. 6, the apparatus comprises a memory 60 for storing a computer program;
a processor 61, configured to execute the computer program to implement the steps of the CMOS information removal method according to any of the above embodiments.
The processor 61 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and the like. The processor 61 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (Field-Programmable Gate Array), and a PLA (Programmable Logic Array). The processor 61 may also include a main processor and a coprocessor, where the main processor is a processor for Processing data in an awake state, and is also called a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 61 may be integrated with a GPU (Graphics Processing Unit), which is responsible for rendering and drawing the content required to be displayed on the display screen. In some embodiments, the processor 61 may further include an AI (Artificial Intelligence) processor for processing computing operations related to machine learning.
Memory 60 may include one or more computer-readable storage media, which may be non-transitory. Memory 60 may also include high speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In this embodiment, the memory 60 is at least used for storing a computer program 601, wherein the computer program is loaded and executed by the processor 61, and then the relevant steps of the CMOS information clearing method disclosed in any of the foregoing embodiments can be implemented. In addition, the resources stored by the memory 60 may also include an operating system 602, data 603, and the like, and the storage may be transient storage or permanent storage. Operating system 602 may include Windows, Unix, Linux, etc., among others. Data 603 may include, but is not limited to, data corresponding to test results, and the like.
In some embodiments, the CMOS information removal device may further include a display 62, an input/output interface 63, a communication interface 64, a power supply 65, and a communication bus 66.
Those skilled in the art will appreciate that the structure shown in fig. 6 does not constitute a limitation of the CMOS information removal device and may include more or fewer components than those shown, such as sensor 67.
The functions of the functional modules of the CMOS information removal apparatus according to the embodiments of the present invention may be specifically implemented according to the method in the above method embodiments, and the specific implementation process may refer to the related description of the above method embodiments, which is not described herein again.
Therefore, the embodiment of the invention can safely and reliably execute Clear CMOS operation and effectively improve the safety of user data storage.
It is to be understood that, if the CMOS information clearing method in the above-described embodiment is implemented in the form of a software functional unit and sold or used as a separate product, it may be stored in a computer-readable storage medium. Based on such understanding, the technical solutions of the present application may be substantially or partially implemented in the form of a software product, which is stored in a storage medium and executes all or part of the steps of the methods of the embodiments of the present application, or all or part of the technical solutions. And the aforementioned storage medium includes: a U disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), an electrically erasable programmable ROM, a register, a hard disk, a removable magnetic disk, a CD-ROM, a magnetic or optical disk, and other various media capable of storing program codes.
Based on this, the embodiment of the present invention further provides a computer-readable storage medium, which stores a CMOS information removal program, where the CMOS information removal program is executed by a processor, and the steps of the CMOS information removal method according to any one of the above embodiments are provided.
The functions of the functional modules of the computer-readable storage medium according to the embodiment of the present invention may be specifically implemented according to the method in the foregoing method embodiment, and the specific implementation process may refer to the related description of the foregoing method embodiment, which is not described herein again.
Therefore, the embodiment of the invention can safely and reliably execute Clear CMOS operation and effectively improve the safety of user data storage.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The detailed description of the method, the apparatus and the computer readable storage medium for removing CMOS information provided in the present application is provided above. The principles and embodiments of the present invention are explained herein using specific examples, which are presented only to assist in understanding the method and its core concepts. It should be noted that, for those skilled in the art, it is possible to make various improvements and modifications to the present invention without departing from the principle of the present invention, and those improvements and modifications also fall within the scope of the claims of the present application.

Claims (10)

1. A CMOS information removal method, comprising:
pre-storing face images of authorized users;
when the Clear CMOS operation issuing instruction is detected, the current face image of the user issuing the instruction is collected by loading an image sensor drive;
and if the current face image is the face image of the authorized user, executing the Clear CMOS operation, clearing the BIOS administrator password stored in the BIOS NVRAM password space, and clearing the Clear behavior identification information of the Clear CMOS operation.
2. The CMOS information removal method of claim 1, wherein the storing of the image of the face of the authorized user comprises:
when an image acquisition instruction issued by a user image acquisition mode in a BIOS setting interface is received, loading the image sensor drive and prompting a user to acquire an image;
storing the collected face image of the user as an authorized user image in an authorized user image set in an image module flash memory;
and according to the received exit instruction of the user image acquisition mode, exiting the BIOS setting interface and automatically executing the restart operation.
3. The CMOS information removal method of claim 2, wherein after storing the collected face image of the user as an authorized user image in an authorized user image set in an image module flash memory, the method further comprises:
converting the collected user face images at different angles into feature vectors by adopting a feature face technology to generate a face feature vector set;
extracting corresponding characteristic values from the face characteristic vector set, encrypting each characteristic value by adopting an encryption algorithm, and storing the encrypted face characteristic vector set in a BIOS NVRAM.
4. The CMOS information removal method according to claim 1, wherein, after the performing the Clear CMOS operation and removing Clear CMOS operation identification information if the current face image is a face image of an authorized user, further comprises:
checking whether the frequency of whether the current face image is the face image of the authorized user in the face image set of the authorized user exceeds a preset frequency threshold value;
if yes, the Clear CMOS operation is stopped, alarm prompt is carried out, and shutdown operation is automatically carried out.
5. The CMOS information removal method of any one of claims 1 to 4, wherein the detecting that a Clear CMOS operation issues an instruction comprises:
judging whether a CLEAR _ FLAG exists in the CMOS chip at the initial stage of the power-on self-test process;
if yes, reading the value of the CLEAR _ FLAG, and if the value of the CLEAR _ FLAG is the existing identification value, judging that the CLEAR CMOS operation behavior exists in the user; if the value of the CLEAR _ FLAG is the absence identification value, judging that the CLEAR CMOS operation behavior does not exist in the user;
if not, defining the CLEAR _ FLAG as the clearing behavior identification information, and initializing the CLEAR _ FLAG as the non-existing identification value to identify that the CLEAR CMOS operation behavior does not exist in the user.
6. A CMOS information removal apparatus, comprising:
the authorized image pre-storing module is used for pre-storing facial images of authorized users;
the image acquisition module is used for acquiring a current face image of a user issuing an instruction by loading an image sensor drive when the instruction issuing operation of the Clear CMOS is detected;
the authorization behavior checking module is used for checking whether the current face image is the face image of the authorized user;
and the Clear operation execution module is used for executing the Clear CMOS operation if the current face image is the face image of the authorized user, clearing the BIOS administrator password stored in the BIOS NVRAM password space and clearing the Clear behavior identification information of the Clear CMOS operation.
7. The CMOS information removal device of claim 6, wherein said authorized image pre-storage module comprises:
the authorized image acquisition sub-module is used for loading the image sensor drive and prompting a user to acquire an image when receiving an image acquisition instruction issued by a user image acquisition mode in a BIOS setting interface;
the authorized image storage sub-module is used for storing the acquired face image of the user as an authorized user image in an authorized user image set into the image module flash memory;
and the image acquisition exit submodule is used for exiting the BIOS setting interface and automatically executing restart operation according to the received exit instruction of the user image acquisition mode.
8. The CMOS information removal device of claim 6 or 7, wherein the image capture module comprises a removal behavior detection sub-module, the removal behavior detection sub-module comprising:
the identification judgment unit is used for judging whether the CLEAR _ FLAG exists in the CMOS chip at the initial stage of the power-on self-test process;
a behavior judging unit, reading the value of CLEAR _ FLAG if CLEAR _ FLAG exists in the CMOS chip, and judging that CLEAR CMOS operation behavior exists in the user if the value of CLEAR _ FLAG is the existence identification value; if the value of the CLEAR _ FLAG is the absence identification value, judging that the CLEAR CMOS operation behavior does not exist in the user; if CLEAR _ FLAG does not exist in the CMOS chip, the CLEAR _ FLAG is defined as clearing behavior identification information, and the CLEAR _ FLAG is initialized to an absence identification value so as to identify that CLEAR CMOS operation behavior does not exist for a user.
9. A CMOS information removal device comprising a processor for implementing the steps of the CMOS information removal method according to any one of claims 1 to 5 when executing a computer program stored in a memory.
10. A computer-readable storage medium, having a CMOS information removal program stored thereon, which when executed by a processor implements the steps of the CMOS information removal method of any one of claims 1 to 5.
CN202010986926.8A 2020-09-18 2020-09-18 CMOS information clearing method, device and computer readable storage medium Active CN112130903B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010986926.8A CN112130903B (en) 2020-09-18 2020-09-18 CMOS information clearing method, device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010986926.8A CN112130903B (en) 2020-09-18 2020-09-18 CMOS information clearing method, device and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN112130903A true CN112130903A (en) 2020-12-25
CN112130903B CN112130903B (en) 2023-07-14

Family

ID=73841359

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010986926.8A Active CN112130903B (en) 2020-09-18 2020-09-18 CMOS information clearing method, device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN112130903B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113918929A (en) * 2021-09-29 2022-01-11 浪潮(山东)计算机科技有限公司 Method and device for clearing password and computer

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5542077A (en) * 1993-09-10 1996-07-30 Compaq Computer Corporation Personal computer with CMOS memory not having a separate battery
CN1595423A (en) * 2003-09-29 2005-03-16 深圳市研祥智能科技股份有限公司 Safety industrial control system with fingerprint encryption
TW200816048A (en) * 2006-09-20 2008-04-01 Inventec Corp Method for clearing password of basic input/output system
CN101770552A (en) * 2008-12-31 2010-07-07 北京联想软件有限公司 Method for clearing computer password, computer and system for clearing computer password
CN108229179A (en) * 2018-01-31 2018-06-29 郑州云海信息技术有限公司 A kind of method, apparatus, equipment and storage medium for improving security of system
CN109598125A (en) * 2018-11-28 2019-04-09 北京可信华泰信息技术有限公司 A kind of safe starting method
CN109886003A (en) * 2019-02-28 2019-06-14 苏州浪潮智能科技有限公司 A kind of method for managing user right, system and associated component

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5542077A (en) * 1993-09-10 1996-07-30 Compaq Computer Corporation Personal computer with CMOS memory not having a separate battery
CN1595423A (en) * 2003-09-29 2005-03-16 深圳市研祥智能科技股份有限公司 Safety industrial control system with fingerprint encryption
TW200816048A (en) * 2006-09-20 2008-04-01 Inventec Corp Method for clearing password of basic input/output system
CN101770552A (en) * 2008-12-31 2010-07-07 北京联想软件有限公司 Method for clearing computer password, computer and system for clearing computer password
CN108229179A (en) * 2018-01-31 2018-06-29 郑州云海信息技术有限公司 A kind of method, apparatus, equipment and storage medium for improving security of system
CN109598125A (en) * 2018-11-28 2019-04-09 北京可信华泰信息技术有限公司 A kind of safe starting method
CN109886003A (en) * 2019-02-28 2019-06-14 苏州浪潮智能科技有限公司 A kind of method for managing user right, system and associated component

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113918929A (en) * 2021-09-29 2022-01-11 浪潮(山东)计算机科技有限公司 Method and device for clearing password and computer

Also Published As

Publication number Publication date
CN112130903B (en) 2023-07-14

Similar Documents

Publication Publication Date Title
US10032170B2 (en) Multi factor authentication rule-based intelligent bank cards
CN107230066B (en) Payment method and device, computer device and readable storage medium
TW201640393A (en) Method, device, and system for displaying user interface
CN104579670A (en) Mobile terminal authentication method and mobile terminal
CN107944247B (en) Unlocking control method and device and electronic equipment
CN105320867B (en) Electronic device and fingerprinting method
US20130305324A1 (en) Incremental Password Barriers to Prevent Malevolent Intrusions
CN107832616B (en) Computer pre-boot security verification, enforcement and repair
CN103902934A (en) Computer case disassembling prevention detecting method and device
CN111259461A (en) Anti-stealing-lighting method, terminal equipment and system
CN112130903B (en) CMOS information clearing method, device and computer readable storage medium
CN113239362A (en) Data access method, device and computer readable storage medium
US10657290B2 (en) Authentication using optically sensed relative position
CN109754345B (en) System and method for conducting secure computer-based test taker assessment
CN104937602B (en) Privacy protection method and electronic equipment
CN113111342A (en) Control method, electronic equipment and control device
CN109873747A (en) Electronic device and its unlocking method
JP5353147B2 (en) Face matching system
CN114341843A (en) Safety protection method and device, mobile terminal and storage medium
CN114647653A (en) Face library updating method and related product
CN108804892A (en) Electronic device
CN113868080A (en) Expiration alarm method, device and medium for security certificate
US11100215B2 (en) Management of a display of a view of an application on a screen of an electronic data entry device, corresponding method, device and computer program product
CN111240539A (en) Interface management method and terminal equipment
CN110633585A (en) Hard disk locking and unlocking method, device, equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant