CN1357840A - Computer security system - Google Patents

Computer security system Download PDF

Info

Publication number
CN1357840A
CN1357840A CN 00134046 CN00134046A CN1357840A CN 1357840 A CN1357840 A CN 1357840A CN 00134046 CN00134046 CN 00134046 CN 00134046 A CN00134046 A CN 00134046A CN 1357840 A CN1357840 A CN 1357840A
Authority
CN
China
Prior art keywords
usb
key
computer
security system
smi
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 00134046
Other languages
Chinese (zh)
Inventor
李永富
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inventec Corp
Original Assignee
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Corp filed Critical Inventec Corp
Priority to CN 00134046 priority Critical patent/CN1357840A/en
Publication of CN1357840A publication Critical patent/CN1357840A/en
Pending legal-status Critical Current

Links

Images

Abstract

The computer security system utilizes a USB device to produce interrupt while the computer is connected or disconnected and the control of BIOS program code, and the computer may be turned on only in the case that there is a cipher key inserted in the USB. The cipher key has a memory unit to store specific cipher of the main board serial number as comparison standard. After the computer is turned on, the computer is set in working state or sleep state automatically during inserting or withdrawing the cipher key and this is more convenient than available cipher input as identifying standard.

Description

Computer security system
The present invention relates to the field of computer information security, particularly a kind of system of computer information security, key and secret method thereof.
Computer information security can avoid unwarranted user to enter other people computer system, with existing computer security system, generally all be by means of preventing to utilize any input media, as the input operation of operation keyboard or mouse, make unwarranted user can't change the data of inside computer system.It is in sight that another requirement of in addition, maintaining secrecy also must prevent to be presented at fluoroscopic data simultaneously.
Security work at first is the control to when start, and traditional mode all is that the requirement user import password password after start, yet password may be forgotten and import also and bothers.Then during computer operation, if think (as having a dinner) away from keyboard as the user, be afraid of that again others sees even destroys significant data (as wage), be generally and reach this purpose three kinds of selections can be arranged: (1) is with computer shutdown; (2) enter the video screen defence program; And (3) enter the sleep battery saving mode of operating system.Usually, first method too bothers, and must leave shutdown at any time at any time if will really accomplish to maintain secrecy, and is unrealistic, also non-still more positive secret mode, the just practice of passivity.Though second method can reach secret purpose, when removing the video screen protection, also be that the requirement user inputs password, the video screen defence program there is no the function of power saving simultaneously.Though the third last method has the function of power saving, the function that the sleep pattern of some operating system is not maintained secrecy is to come de-preservation by password if secret function is arranged.
In sum, traditional secret deciphering all is to utilize password to realize, but memory and input password and inconvenient, and for the user of general enterprise computer, the design that meet hommization must be comparatively convenient as the mode of key with hardware unit.
With regard to convenience, can allow the user freely select whether to carry out maintaining secrecy of computer system during start with key, in case after selecting, key must be inserted in always that system could move on the specific connectivity port of computing machine, any time will enter secret pattern, as long as simply key is extracted, system enters sleep state immediately, closes video screen, pins keyboard and mouse, have function of keeping secret and electricity-saving function simultaneously, insert cipher key system again and just enter duty again immediately.Reach above-mentioned functions, the secrecy system of whole computing machine, method, device all will have new design.
Thus, purpose of the present invention is that a kind of computer security system is provided, and it comprises: a computing machine, and it is a unique special parameter to have the conduct identification, and comprises a central processing unit; A BIOS storer, in have the bios program sign indicating number; A chipset can receive the steering order that is transmitted by CPU and BIOS respectively; A USB port is controlled by the USB controller in the chipset; And a privacy key, it comprises a microcontroller and a storer, and the ID of a recognition of microcontroller is provided by storer; It is characterized in that must have key to be inserted on the USB port during computer booting could start shooting; During the computer operation, USB port is extracted and inserted to key all can produce an interruption to system, makes the calculating function learn that key is not inserted in USB port and enters sleep state, and enters duty learning key to be inserted in USB port; And whether key inserts the censorship of USB port need identical with special parameter by identification ID when computer booting/operation.
State with other purposes, feature and advantage and can become apparent on the present invention for allowing, a preferred embodiment cited below particularly, and be described in detail below in conjunction with appended accompanying drawing:
Fig. 1 represents the hardware structure diagram of computer security system of the present invention;
Fig. 2 represents that computer security system of the present invention is at start control time slot scrambling process flow diagram partly;
Fig. 3 represents to protect when computer security system of the present invention is started shooting control inspection and the setting process figure that sweet key inserts;
Fig. 4 represent computer security system of the present invention under the non-ACPI operating system when operation privacy key extract out and enter dormant process flow diagram;
Fig. 5 represent computer security system of the present invention under the non-ACPI operating system when operation privacy key extract out and enter dormant process flow diagram;
Fig. 6 represent computer security system of the present invention under the non-ACPI operating system when operation the privacy key spoon insert the process flow diagram of getting back to duty again;
Fig. 7 represent computer security system of the present invention under the ACPI operating system when operation privacy key insert the process flow diagram of getting back to duty again; And
Fig. 8 represents the microcontroller firmware process flow diagram partly of privacy key in the computer security system of the present invention.
Please refer to Fig. 1, Fig. 1 is the hardware configuration calcspar of computer security system of the present invention, comprise the computing machine 10 of the big square representative in left side, have 12, chipsets 14 of a CPU (central processing unit) (CPU) and a BIOS storer in it and (be generally flash memory 16.The interface that computing machine 10 externally connects can be realized by a USB (USB (universal serial bus)) port one 8, control USB port 18 with USB controller 142 in the chipset 14 of correspondence, and CPU12 and BIOS16 can send steering order to chipset 14 respectively.The device of a key shape is represented on the right side of synoptic diagram, be privacy key 20 of the present invention, privacy key 20 is connected with computer system 10 by the interface 18 of USB, provide computer system power-on required secret control whereby, and computer system is in operating process, just can be in the state of work in the time of must having privacy key 20 to be inserted in USB port 18, otherwise, privacy key 20 is extracted, computer system just enters sleep state and closes video screen, pin keyboard and mouse etc., having concurrently maintains secrecy reaches the function of power saving.
At first, secrecy system of the present invention can be realized start control part by the flow process of Fig. 2.When power supply opening, the CPU 12 of computing machine 10 is stored in the order code of BIOS16 to start computing machine by means of extraction, the POST of execution in step 31 (start back selftest) at first in starting the process of BIOS 16, it is characterized in that comprising and carry out various tests to determine whether computer function is correct, and the working storage in the certain hardware unit of initialization, and most POST also comprise when carrying out be written into the bios program sign indicating number) in the storer (not shown).In the POST process, the selection function as step 32 is provided in the present embodiment, allow the user decide in its sole discretion and whether adopt USB privacy key time slot scrambling of the present invention, therefore select the back to judge whether USB privacy key function starts the user.If do not start, flow process is just gone to the general boot program of step 38, then starts shooting to the path of operating system (step 39), and be with traditional password recognition to finish if will take into account secret demand this moment; USB privacy key function on just formally enters secrecy system provided by the present invention.
As step 33, bios program sign indicating number load memory inserts USB port 18 with the privacy key in the storer 20, and differentiates the privacy key 20 that whether inserts simultaneously and be complementary with computing machine 10.The inspection of this step and the identification of privacy key just with the difference of known password identification maximum.For method of the present invention, the inspection of inserting or extracting for privacy key 20, utilize be in the usb protocol USB device when connecting computing machine in real time or when removing can produce interrupt characteristics to system, therefore can be so as to function as key, this partly will do more detailed explanation in the back; As for known password identification, the mainboard sequence number of the ID that is deposited by privacy key 20 internal storage 24 and computing machine 10 identical finishing whether then, the mode that other also can be arranged certainly, but allow the user once more under the consideration of setting code based on not adopting, because other computing machine is given in the normally unique configuration of motherboard sequence number, and obtain difficult, preferred selection at last on therefore maintaining secrecy.
If the user just is inserted in correct privacy key 20 on the USB port 18 when start, in step 34, just can be checked through the existence of privacy key 20, and confirm that by identification its ID is identical with the motherboard sequence number, at this moment, proceed to next step 35, in storer, set the sign that privacy key inserts this moment; And if check in the step 34 less than the USB privacy key is arranged, or being checked through privacy key 20 but ID is not inconsistent, this moment, just skips steps 35 carry out step 36.Check in the step 36 that privacy key inserts sign and whether sets, if, starting shooting in the step 39 to operating system just can enter, the user just can operate this computing machine; And if not, system will demonstrate an information, require the user to insert privacy key 20 (step 37), and learn whether have privacy key to insert according to the flow process of following Fig. 3 at any time, and get back to the sign that step 36 continues to check privacy key.
As previously discussed, when the user time forgets in start privacy key is plugged, learnt by the demonstration of video screen (not shown) to require to insert privacy key 20, this moment, the user inserted the inspection of privacy key 20 and establishing method shown in Fig. 3 process flow diagram.
As step 361, because the USB device inserts the look-at-me that will produce as SMI (system management interrupt), present embodiment is to utilize the SMI handling procedure with BIOS that secret function is provided.System is after receiving a SMI, and as step 362, BIOS will specify a USB unit address to give the device of this insertion USB; Then system will check whether this device that inserts USB is privacy key 20, and check similarly whether ID is identical with the motherboard sequence number of computing machine 10? inspection herein and Fig. 2 and privacy key inspection described later, all be to utilize 22 of microcontroller in BIOS and the privacy key 20 to cooperate to realize that details will be mentioned in the back.Similarly, when inspection is inserted for correct privacy key, just carry out the setting of the privacy key sign of step 364, behind general SMI handling procedure, withdraw from SMI (step 366) in step 365 then; If check result is other USB devices such as USB mouse, keyboard etc., or be that USB privacy key but non-correct key then can skip to step 365 and then withdraw from SMI.
Secret control when above-mentioned Fig. 2 and 3 flow process have been finished start, as can be seen, as long as just the user has correct privacy key 20 can enter in the computer system.Next, be to illustrate how to provide the user in the process of computer operation, will pass in and out secret pattern at any time, only by simply plugging the method flow that privacy key 20 can be realized.
Please refer to Figure 4 and 5, Figure 4 and 5 are extracted USB port 18 out for the USB device, whether be ACPI (Advance Configuration Power Interface) operating system at operating system respectively, extract for privacy key 20 through the inventive method differentiation and enter dormant process flow diagram.
Be illustrated in figure 4 as USB device extraction generation SMI under the non-ACPI operating system, CPU enters the flow process of BIOS SMI handling procedure.As step 41, via reading after the reason that chipset 14 working storage (not shown) learn that SMI produces, enter step 42, judge whether the SMI that produces into the plug of USB device? the reason that produces owing to SMI is a lot, therefore must do a judgement at this.If it is that the plug of USB device causes that SMI produces, just carry out step 43, check whether USB privacy key 20 also is inserted on the USB port 18, if not, represent the user that privacy key 20 is extracted out, therefore will make system enter the state of sleep subsequently.At first call VGA DPMS function by step 44 and make video screen enter battery saving mode, this moment, video screen just can't show; Then as step 45, order (program) other hardware units also enter battery saving mode; Step 47 for another example at last, command chipset 14 makes CPU enter time-out (suspend) state, and system just enters so-called sleep state.Among this embodiment, step 45 and 47 can add a step 46, command chipset 14 makes the interruption of USB become unique wake events (wake up event), so judgement of inserting once more for later privacy key 20 just can be limited to: have only the USB device to insert and just might make computing machine return back to duty.Certainly, handle the above-mentioned mode that is not limited to,, and realize also simultaneously that as present embodiment electricity-saving function is better certainly as long as privacy key 20 can reach secret purpose after extracting from step 44 to 46 sleep states of being done.
Return in the decision block of step 42, if the non-USB device plug of SMI causes, or, then enter the general SMI handling procedure of step 48, just withdraw from SMI (step 49) at last as checking out still in the step 43 that USB privacy key 20 is to be inserted on the USB port 18.
Another situation is at ACPI operating system, flow process as shown in Figure 5, because the USB device was extracted out to produce and was interrupted this moment, CPU12 will enter the USB driver and interrupt (USB) handling procedure, therefore for realize can with the non-ACPI operating system of Fig. 4 method compatibility, first command chipset 14 changes the SCI (system control interrupt) that the USB plug produces into SMI in step 51, a kind of mode is shown in step 52, one particular value (as B9h) is write APM (advanced powermanagement) control port to produce SMI, just be judged as the SMI (step 42) that the plug of USB device produces as left side among Fig. 4 afterwards, and check that there be not (step 43) in USB privacy key 20 yet, so computer system just enters sleep state (step 44~47).After judging that in step 42 non-USB device plug produces SMI, still need as step 53, judge that further whether the APM control port is the SMI of the B9h generation that is written into, if get back to step 43 again; And be checked through 20 existence of USB privacy key in step 43 after, must chipset 14 plug USB be produced SMI change original SCI into as step 54, the operation of the so ACPI of getting back to operating system just can't go wrong.At last, judge in step 53: the generation of SMI is not because writing of APM control port produces SMI through step 54 with the USB plug and also change original SCI into, just can carry out the general SMI handling procedure of step 47 and 48 and withdraw from SMI.
Below, insert USB port 18 once more at the USB device, equally at whether operating system is ACPI operating system, differentiates privacy key 20 through the flow process of Fig. 6 and Fig. 7 respectively and whether insert once more and enter duty.
As the flow process of Fig. 6 at non-ACPI operating system, detection via hardware, in step 61, make CPU leave park mode and continue to carry out BIOS SMI handling procedure, just can advance to step 62, read the reason of working storage to learn that CPU wakes up of chipset 14, via the decision block of step 63, judge whether again to the plug of USB device causes waking up of CPU, if, then carry out step 64, whether check that privacy key 20 has inserted and its ID is identical with the motherboard sequence number, if then call VGA DPMS function, make video screen revert to mode of operation, make video screen can show (step 65); Then just order other hardware units to revert to mode of operation (step 66); Again via carrying out other SMI handling procedure (step 67) afterwards; Just withdraw from SMI and get back to (step 68) in the operating system, this moment, computer system was got back under user's the operation again.Get back in the step 63 and to judge that non-USB device plug causes waking up of CPU, or in step 64, check or ID identification inequality, all can proceed to step 69, command chipset 14 makes CPU enter halted state once more.
Another is at ACPI operating system, flow process situation as shown in Figure 7, because when CPU enters halted state among Fig. 5, USB device plug having become generation SMI, so the flow process inserted again of its privacy key 20 is the same with Fig. 6 basically, only next, the setting that produces SCI is changeed back in the setting of the SMI that system must be produced in step 68 program of Fig. 6, as among Fig. 7 in step 70 as described in 72, get back to USB driver interrupt handling routine earlier, change back generation SCI by command chipset 14 with the setting that the USB plug produces SMI, carry out the handling procedure of other USB drivers at last, just get back to operating system (step 73).
More than the complete guarantor honey method of privacy key 20 of the present invention of using of having described as computer system, certainly for the microcontroller 22 of privacy key 20 itself, also need there be corresponding firmware partly need be cooperated, in principle, privacy key 20 also belongs to one of USB device, so basic requirement is all done according to the USB communications protocol, the cooperation flow process of its program as shown in Figure 8.
As step 81, after privacy key 20 was plugged USB port 18, just microcontroller 22 has connected power supply, computing machine 10 resetted the USB bus-bar; Then, set up the data of stack pointer and RAM, thereby make interruption can be used (step 83) just as step 82.Afterwards, as step 84, microcontroller 22 is just waited for the USB address of the appointment that computing machine 10 transmits, microcontroller 22 the wait of this step just computer system confirming whether the USB device that inserts is privacy key 20, so in case receive the USB address of appointment, just representing computer system audit to go out USB privacy key 20 has inserted, and if do not receive the USB address of appointment in the step 84 always, microcontroller 22 will continue to wait for, till system queries is when USB privacy key 20 has inserted.After microcontroller is received the USB address of main frame appointment, it is the instruction of waiting for that privacy key 20 ID are read in the main frame requirement, usually computing machine 10 can require microcontroller 22 to send the information of ID by producing an interrupt instruction, so as in the step 85, when receiving the instruction of reading ID via interrupt request, microcontroller 22 just can carry out next procedure 86, enter the step 87 of sending ID to USB again by reading ID in the storer 24, finish the process of computer system identification privacy key 20.Certainly, program afterwards is to get back to the required firmware of USB device flow process (step 88) partly, and similarly, does not receive the instruction that ID is read in requirement in the step 85, also carries out the flow process of step 88.
Though below disclose the preferred embodiments of the present invention; but this is not in order to limit the present invention; the common technique personnel of this area can make many changes and improvement under the condition of the spirit and scope that do not break away from the present invention, so the present invention's protection domain is determined by the accompanying Claim book.

Claims (18)

1. computer security system comprises:
A computing machine has as recognizing that it is a unique special parameter, comprising:
A central processing unit (CPU);
A BIOS storer, in have the bios program sign indicating number;
A chipset can receive the control command that is transmitted by this CPU and BIOS respectively;
A USB port is by a USB controller control in this chipset; And
A privacy key, it comprises a microcontroller and a storer, provides an identification id by storer to microcontroller;
It is characterized in that must have key to be inserted on this USB port during computer booting could start shooting;
During computer operation, this USB port of extracting and insert of key all produces once interruption makes this calculating function learn that this key is not inserted in USB port and enters sleep state system, learns that this key is inserted in this USB port and enters duty; And
Key inserts USB port when this computer booting/operation censorship is by recognizing the whether identical realization of this ID and this special parameter.
2. computer security system as claimed in claim 1 is characterized in that the motherboard sequence number of this special parameter for this computing machine.
3. computer security system as claimed in claim 1 is characterized in that this breaks is a SMI.
4. computer security system as claimed in claim 3 is characterized in that the secret control procedure of this computer booting comprises;
Obtain a privacy key and insert mark;
The BIOS selftest of starting shooting;
The setting that indicates in the dump storer;
When checking that key has inserted USB port and ID when identical with special parameter, in computer memory, set to indicate;
When checking that this sign is set, start shooting to operating system; And
When checking that this sign is not set, then display requirement inserts the information of this key.
5. computer security system as claimed in claim 4, the secret control procedure that it is characterized in that this computer booting can be started shooting at BIOS and be closed when selftest begins.
6. computer security system as claimed in claim 4 is characterized in that key insertion and inspection and setting program comprise:
Produce this SMI;
BIOS specifies a USB unit address;
Check whether key inserts USB port and whether ID is identical with special parameter; And
In computer memory, set sign.
7. computer security system as claimed in claim 3 is characterized in that during the computer operation, produces the secret recognizer of a SMI under a non-ACPI operating system, and secret recognizer comprises;
CPU enters the SMI handling procedure of BIOS;
Read the reason that the chipset working storage learns that this SMI produces;
Judge whether to be caused by a USB device plug;
When checking that this key still inserts in this USB port, handle preface and withdraw from by general SMI; And
When checking that this key does not insert in this USB port, make computing machine enter sleep state.
8. computer security system as claimed in claim 7 is characterized in that entering sleep state and also comprises:
Make video screen enter battery saving mode and can't show; And
Command chipset makes CPU enter halted state.
9. computer security system as claimed in claim 8 is characterized in that entering sleep state and comprises:
Order other hardware units to enter battery saving mode; And
Command chipset makes USB interrupt becoming a unique wake events.
10. computer security system as claimed in claim 9 is characterized in that the secret identification program of USB device insertion USB port comprises:
CPU leaves park mode and continues to carry out BIOS SMI handling procedure;
Read the chipset working storage and learn that CPU wakes reason up;
The result who judges inserts this USB port for this key, otherwise orders this chipset to make CPU enter halted state once more;
Check whether key has inserted in this USB port and whether this ID is identical with special parameter; And
Order video screen and other hardware units revert to duty.
11. computer security system as claimed in claim 7 is characterized in that during the computer operation, the secret recognizer that produces an interruption for an ACPI operating system comprises:
CPU enters UBS driver interrupt handling routine:
Command chipset changes the setting that the plug of USB device produces SCI into generation SMI;
CPU enters the SMI handling procedure of BIOS;
Read the chipset working storage and learn the reason of this SMI generation;
Judged result is that USB device plug is caused;
When checking that key still inserts in USB port and changes the setting that the plug of USB device produces SMI into generation SCI; And
When checking that key does not insert in USB port, make computing machine enter sleep state.
12. computer security system as claimed in claim 11 is characterized in that a particular value is write the APM control port to produce SMI.
13. computer security system as claimed in claim 12 is characterized in that particular value is B9h.
14., it is characterized in that entering sleep state and also comprise as claim 11 a described computer security system:
Make video screen enter battery saving mode and can't show; And
Order this chipset to make CPU enter halted state.
15. computer security system as claimed in claim 14 is characterized in that entering sleep state and also comprises:
Order other hardware units to enter battery saving mode; And
Command chipset makes USB interrupt becoming a unique wake events.
16. computer security system as claimed in claim 15 is characterized in that the secret recognizer of USB device insertion USB port comprises:
CPU leaves park mode and continues to carry out BIOS SMI handling procedure;
Read the chipset working storage and learn that CPU wakes reason up;
The result who judges inserts this USB port for this key, otherwise command chipset makes CPU enter halted state once more;
Check whether key has inserted in USB port and whether ID is identical with special parameter;
Order video screen and other hardware units revert to duty;
Get back to the usb driver interrupt handling routine; And
The plug of USB device is produced SMI to command chipset and setting changes generation SCI into.
17. computer security system as claimed in claim 1, the microcontroller handling procedure comprises when it is characterized in that key insertion USB port:
Obtain the power supply supply, usb bus resets;
Set the data in stack pointer and the storer;
Interruption can be used;
The USB address that receiving computer is specified;
Via interrupting receiving an order of reading ID;
Read ID from storer; And
Send this ID to usb bus.
18. computer security system as claimed in claim 1 is characterized in that storer is an EEPROM.
CN 00134046 2000-12-08 2000-12-08 Computer security system Pending CN1357840A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 00134046 CN1357840A (en) 2000-12-08 2000-12-08 Computer security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 00134046 CN1357840A (en) 2000-12-08 2000-12-08 Computer security system

Publications (1)

Publication Number Publication Date
CN1357840A true CN1357840A (en) 2002-07-10

Family

ID=4595991

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 00134046 Pending CN1357840A (en) 2000-12-08 2000-12-08 Computer security system

Country Status (1)

Country Link
CN (1) CN1357840A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005101724A1 (en) * 2004-04-16 2005-10-27 Huawei Technologies Co., Ltd. Method for controlling a pluggab a port of a communication device interface board and the interface board
CN1300666C (en) * 2003-11-10 2007-02-14 财团法人资讯工业策进会 Multiple interface auxiliary digital copy right management method for USB storage device
CN100346281C (en) * 2003-11-10 2007-10-31 财团法人资讯工业策进会 Managing method for multiple pipeline anxiliary digital copyright in USB storage device
CN100449451C (en) * 2005-08-25 2009-01-07 深圳市研祥智能科技股份有限公司 Computer encryption device and its encryption method
CN100462918C (en) * 2005-09-01 2009-02-18 横河电机株式会社 Os starting method and apparatus using the same
CN101551784B (en) * 2008-04-02 2011-04-13 西北工业大学 Method and device for encrypting data in ATA memory device with USB interface
CN101495977B (en) * 2006-07-13 2012-05-23 特科2000国际有限公司 Portable storage equipment and method for using portable storage equipment
WO2012079484A1 (en) * 2010-12-15 2012-06-21 联想(北京)有限公司 System status control method and portable terminal
CN104484629A (en) * 2014-12-03 2015-04-01 合肥联宝信息技术有限公司 Computer starting method and device
CN110861947A (en) * 2019-11-21 2020-03-06 北京融诚信达科技发展有限公司 Secret-related paper recycling equipment

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1300666C (en) * 2003-11-10 2007-02-14 财团法人资讯工业策进会 Multiple interface auxiliary digital copy right management method for USB storage device
CN100346281C (en) * 2003-11-10 2007-10-31 财团法人资讯工业策进会 Managing method for multiple pipeline anxiliary digital copyright in USB storage device
WO2005101724A1 (en) * 2004-04-16 2005-10-27 Huawei Technologies Co., Ltd. Method for controlling a pluggab a port of a communication device interface board and the interface board
US7779266B2 (en) 2004-04-16 2010-08-17 Huawei Technologies Co., Ltd. Method for controlling pluggable port on interface board of communication device and interface board
CN100449451C (en) * 2005-08-25 2009-01-07 深圳市研祥智能科技股份有限公司 Computer encryption device and its encryption method
CN100462918C (en) * 2005-09-01 2009-02-18 横河电机株式会社 Os starting method and apparatus using the same
CN101495977B (en) * 2006-07-13 2012-05-23 特科2000国际有限公司 Portable storage equipment and method for using portable storage equipment
CN101551784B (en) * 2008-04-02 2011-04-13 西北工业大学 Method and device for encrypting data in ATA memory device with USB interface
WO2012079484A1 (en) * 2010-12-15 2012-06-21 联想(北京)有限公司 System status control method and portable terminal
US9652254B2 (en) 2010-12-15 2017-05-16 Lenovo (Beijing) Co., Ltd. System status control method and portable terminal
CN104484629A (en) * 2014-12-03 2015-04-01 合肥联宝信息技术有限公司 Computer starting method and device
CN110861947A (en) * 2019-11-21 2020-03-06 北京融诚信达科技发展有限公司 Secret-related paper recycling equipment

Similar Documents

Publication Publication Date Title
US5377269A (en) Security access and monitoring system for personal computer
US7797729B2 (en) Pre-boot authentication system
US7000249B2 (en) Pre-boot authentication system
CN100359434C (en) Information processor, starting method thereof
US8302209B2 (en) Data processing methods and devices for reading from and writing to external storage devices
CN1074767A (en) The method that computing machine, equipment and system thereof reconfigure
US6088620A (en) Computer system in which a high-order application program recognizes a power-on factor or a state of an expansion unit
CN101373433A (en) Method for updating BIOS and computer and system using the same
EP2189906A1 (en) Method and apparatus for abnormality recovering of data card, and data card
CN101634960A (en) Method for revising BIOS parameter and regenerating checksum
US6542995B2 (en) Apparatus and method for maintaining secured access to relocated plug and play peripheral devices
CN1357840A (en) Computer security system
CN103810440B (en) Access system and method
US20050010784A1 (en) Information processing apparatus and authentication program storage medium
CN108197455B (en) Electronic device and safe starting method thereof
TWI284831B (en) Computer system and security method therefor
US20030126483A1 (en) Computer starter and starting method for utilizing smart card interface
CN100371917C (en) Installation method of driving program built in hardware device
CN1225701C (en) Method of setting BIOS of CMOS for back-up computer system on DMI segment
WO2019080321A1 (en) Power-on method and apparatus for terminal device, device, and storage medium
CN100435062C (en) Computer system and its confidential method
US8423830B2 (en) Debug method for computer system
US20120023598A1 (en) Bios usb write prevent
CN115114212B (en) VPD (virtual private digital) refreshing method, device, equipment and medium
CN2585316Y (en) IC card computer protection device

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication