TW201020851A - Method for enhancing information security of a computer system and related computer system - Google Patents

Method for enhancing information security of a computer system and related computer system Download PDF

Info

Publication number
TW201020851A
TW201020851A TW97145651A TW97145651A TW201020851A TW 201020851 A TW201020851 A TW 201020851A TW 97145651 A TW97145651 A TW 97145651A TW 97145651 A TW97145651 A TW 97145651A TW 201020851 A TW201020851 A TW 201020851A
Authority
TW
Taiwan
Prior art keywords
magnetic
computer system
password
input signal
regions
Prior art date
Application number
TW97145651A
Other languages
Chinese (zh)
Other versions
TWI380192B (en
Inventor
Feng-Hsing Chiang
Yuan-Chan Lee
Original Assignee
Wistron Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wistron Corp filed Critical Wistron Corp
Priority to TW97145651A priority Critical patent/TWI380192B/en
Publication of TW201020851A publication Critical patent/TW201020851A/en
Application granted granted Critical
Publication of TWI380192B publication Critical patent/TWI380192B/en

Links

Landscapes

  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

A method for enhancing information security of a computer system is disclosed. A plurality of operating systems are installed in a plurality of sectors and corresponding to a plurality of passwords. The method includes showing a message to require an input signal when the computer system is tuned on, and starting an operating system corresponding to a password and hiding sectors other than a sector corresponding to the operating system when the input signal conforms to the password.

Description

201020851 六、發明說明: 【發明所屬之技術領域】 本發明係指一種提升一電腦系統之資訊安全的方法及其相關電 腦系統,尤指一種透過開機密碼決定應開啟及應關閉的磁區,進而提 升資訊安全的方法及其相關電腦系統。 Ο 【先前技術】 電腦系統的普及實現了快速、便利的資訊化社會,使得人們可以 更有效率地處理大量的資料,牦企業也紛紛改採電腦系統以實現電子 化。因此,資訊安全越來越被重視。 在電腦系統中,使用者可在不同磁區安裝不同作業系統,但這樣 ❹的操作,可能造成資訊安全的問題。一般而言,當使用者欲使用安裝 有多個作業系統的電腦系統時,電腦系統於開啟電源後會顯示一選單 介面,由使用者決定要進入哪個磁區的作業系統。為了維護資訊安全, 使用者可透過設定開機密碼或設定作業系統之登入密碼等方式,防止 電腦系統的資料被竊取。以設定開機密碼為例,當電腦系統開機時, 基本輸入輸出系統(BasicInput/OutputSystem,BIOS)會要求使用者 輸入開機密碼;若使用者輸入的開機密碼正確,始可顯示選單介面, '以由使用者選擇進入特定作業系統,而作業系統亦可設定登入密碼; 相反地,若使用者輸入的開機密碼不正確,則基本輸入輸出系統會要 3 201020851 腦,=Γ機。這種方式可防止未被授權的使用者使用電 統的資料被竊取。細,由上述可知,只要正確輸 =機==仙者即可選騎人狀作職統。在此情形下,使用 2月,透過某-作業系統讀取其它作業系統的資料,甚至破解其登入 ’若有心人士欲竊取電腦系_f料時,即使作業系統已設 ❹=人⑨碼’只要能進人選單介面,就可透過其它作業系統竊取資料, 甚至破解登入密碼’可能因此造成個人或企業的重大損失。 【發明内容】 6因此本發明之主要目的即在於提供_種提升—電腦系統之資訊 安全的方法及其相關電腦系統。 0 、本發露-種提升-制系統之#訊安全的方法,該電腦系統 之複數個魏絲有複數個健系統,並對應於複數健碼,該方法 包含有於該電齡統之電源被啟動時,顯示—訊息,以要求一輸入訊 號;以及於該輸入訊號符合該複數個密碼之一密碼時,啟動該密碼所 對應之磁區的作業系統,並隱藏該複數個磁區中該密碼所對應之磁區 以外的磁區。 本發明另揭露一種可提升資訊安全之電腦系統,其包含有一硬體 電路,用來實現該電腦系統之功能,該硬體電路之一硬碟的複數個磁 4 201020851 區安裝有複數個作業系統,並對應於複數個密碼;以及一執行單元, 用來執行一軟體,該軟體包含有於該硬體電路之電源被啟動時,顯示 一訊息,以要求一輸入訊號;以及於該輸入訊號符合該複數個密碼之 一密碼時,啟動該密碼所對應之磁區的作業系統,隱藏該複數個磁區 中該密碼所對應之磁區以外的磁區。 【實施方式】 請參考第1圖,第丨圖為本發明實施例一流程1〇之示意圖。流 程用來提升一電腦系統之資訊安全,該電腦系統之複數個磁區安裝 有複數個作業系統,並對應於複數個密碼。流程ίο包含以下步驟: 步驟100 :開始。 步驟102 :於該電腦系統之電源被啟動時,顯示一訊息,以要求一 輸入訊號。 步驟104 :於該輸入訊號符合該複數個密碼之一密碼時,啟動該密 碼所對應之磁區的作業系統,並隱藏該複數個磁區中該 密碼所對應之磁區以外的磁區。 步驟106 :結束。 根據流程10 ’當電腦系統被啟動後,電腦系統會顯示一訊息,以 要求使用者之輸人訊號;若輸人訊號符合對應於某—作業系統的密碼 時本發明會進人該作業纽’並關對應於其它作業系統的磁區。 2單來說’對朗者而言,t腦系關機後只會要求使时輸入開機 始I若正確,則會進入作業系統。換言之,使用者不會知道電腦系 5 201020851 統中女裝有多個作業系統’同時,由於本發明會隱藏其它作業系統的 磁區,®此朗者也無緋取其它健祕的資料,#然也不可能修 改其它作業系統的登入密碼。 因此,透過本發明,電腦系統係根據使用者輸入的密碼,決定要 啟動的磁區及對應的作業系統。如此—來,可避免多作業系統之電腦 系統之資料觀取,以轉資訊安全。需注意的是,第丨圖所示之流 ❹程1G係為本發明之倾麻意目,本領域具通常知識者當可據以做不 同之修飾,而不限於此。舉例來說,關於隱藏磁區的作法,本發明可 透過修改電齡狀主職記錄(Master· B〇Gt Reeorxi),使得相關磁區 隱藏’避免資料被竊。另外,若於使用者之輸人訊號不符合任一密碼 時’本發明可顯示-警示訊息,並要求使用者重新輸人或關機。 關於流程1G的實現’可透過軟體方式,並由—執行單元(如基 本輸入輸出系統)執行,以控制硬體電路中需啟動的磁區,相關運作 ❹方式應係本領域具通常知識者所熟知,故不贅述。 在1知多作業系統之電腦系統中,只要正確輸入開機密碼,使用 者即可選擇進人特定作業系統,使得使用者可能透過某—作業系統讀 取其它作靠_資料,甚至破解其登人密碼。她之下,在本發明 :’對使用者而言,使用者所感受的開機情形即如第2圖所示,亦'即, 當電源啟動後,電腦系統會詢問使用者開機料,接著進人對應的作 業系統’並隱藏其它作業系統的祕H使用者不會知道電腦系 統有安裝其它作料統,當然也不可能存取其它作㈣統的資料或修 6 201020851 =:::::單來:,本發明的開機密碼除了用來驗證是否能進入 ,、還可決定應開啟哪個磁區並關閉哪些磁區。 綜上所述,本發明係透過開機密碼決定應開啟及應關閉的磁區, 且使用者不會知道電«統有絲其它健祕,也不可能存取其它 作業系統的資料或修改登人密碼,進而提升資訊安全。 以上所述僅為本發明之較佳實施例,凡依本發明申請專利範圍所 做之均等變化與修飾,皆應屬本發明之涵蓋範圍。 【圖式簡單說明】 第1圖為本發明實施例一流程之示意圖。 第2圖為本發明實施例中使用者所感受的開機情形示意圖。 【主要元件符號說明】 10 流程 100、102、104、106 步驟201020851 VI. Description of the Invention: [Technical Field] The present invention relates to a method for improving information security of a computer system and related computer system, and more particularly to a magnetic area that should be turned on and should be turned off by a power-on password. Ways to improve information security and related computer systems. Ο [Prior Art] The popularity of computer systems has enabled a fast and convenient information society, enabling people to process large amounts of data more efficiently, and companies have also switched to computer systems to achieve electronic. Therefore, information security is getting more and more attention. In a computer system, users can install different operating systems in different magnetic zones, but such awkward operation may cause information security problems. In general, when a user wants to use a computer system with multiple operating systems, the computer system displays a menu interface when the power is turned on, and the user decides which operating system to enter. In order to maintain information security, the user can prevent the computer system from being stolen by setting a power-on password or setting the login password of the operating system. Taking the power-on password as an example, when the computer system is turned on, the basic input/output system (Basic Input/Output System, BIOS) will ask the user to input the power-on password; if the power-on password entered by the user is correct, the menu interface can be displayed. The user chooses to enter the specific operating system, and the operating system can also set the login password. Conversely, if the power-on password entered by the user is incorrect, the basic input/output system will have 3 201020851 brain, = down. This method prevents unauthorized users from using the data of the system to be stolen. Fine, as can be seen from the above, as long as the correct input = machine = = fairy, you can choose the role of the rider. In this case, use February to read the data of other operating systems through a certain operating system, and even crack the login. If the person who wants to steal the computer system, even if the operating system has been set to = 9 people' As long as you can enter the menu interface, you can steal data through other operating systems, and even crack the login password 'may cause significant losses to individuals or businesses. SUMMARY OF THE INVENTION [6] Therefore, the main object of the present invention is to provide a method for improving the information security of a computer system and related computer systems. 0, the present disclosure - a method of lifting - system security, the computer system of a plurality of Weisi has a plurality of health systems, and corresponds to the complex code, the method includes the power supply of the battery system When activated, the message is displayed to request an input signal; and when the input signal matches one of the plurality of passwords, the operating system of the magnetic zone corresponding to the password is activated, and the plurality of magnetic regions are hidden. The magnetic area other than the magnetic area corresponding to the password. The invention further discloses a computer system capable of improving information security, which comprises a hardware circuit for realizing the function of the computer system, wherein a plurality of magnetic circuits of the hard disk are installed in a plurality of operating systems. And corresponding to a plurality of passwords; and an execution unit for executing a software, the software includes a message displayed when the power of the hardware circuit is activated, to request an input signal; and the input signal is matched When the password is one of the plurality of passwords, the operating system of the magnetic region corresponding to the password is activated, and the magnetic regions other than the magnetic region corresponding to the password in the plurality of magnetic regions are hidden. [Embodiment] Please refer to FIG. 1 , which is a schematic diagram of a process 1 of the embodiment of the present invention. The process is used to enhance the information security of a computer system in which a plurality of magnetic fields are installed with a plurality of operating systems and corresponding to a plurality of passwords. The process ίο contains the following steps: Step 100: Start. Step 102: When the power of the computer system is started, a message is displayed to request an input signal. Step 104: When the input signal meets the password of the plurality of passwords, start the operating system of the magnetic zone corresponding to the password, and hide the magnetic regions other than the magnetic region corresponding to the password in the plurality of magnetic regions. Step 106: End. According to the process 10 'When the computer system is started, the computer system will display a message to request the user's input signal; if the input signal meets the password corresponding to a certain operating system, the invention will enter the operation button' And close the magnetic zone corresponding to other operating systems. 2 For the sake of the Lang, the t-brain system will only require the input of the time to be turned on. If it is correct, it will enter the operating system. In other words, the user does not know that the computer system 5 201020851 has a plurality of operating systems for women's wear. Meanwhile, since the present invention hides the magnetic area of other operating systems, the langer has no other secret information. It is also impossible to modify the login password of other operating systems. Therefore, with the present invention, the computer system determines the magnetic zone to be activated and the corresponding operating system based on the password entered by the user. In this way, the data access of the computer system of the multi-operation system can be avoided to turn information security. It should be noted that the flow process 1G shown in the figure is the object of the present invention, and those skilled in the art can make different modifications according to the present invention, and are not limited thereto. For example, with respect to the practice of concealing the magnetic zone, the present invention can modify the electrical age master record (Master·B〇Gt Reeorxi) so that the relevant magnetic zone is hidden' to avoid data theft. In addition, if the user's input signal does not match any of the passwords, the present invention can display a warning message and ask the user to re-enter or shut down. The implementation of the process 1G can be performed in a software mode and executed by an execution unit (such as a basic input/output system) to control the magnetic area to be activated in the hardware circuit, and the relevant operation mode should be a common knowledge in the field. Well known, so I won't go into details. In the computer system of the multi-operation system, as long as the power-on password is correctly input, the user can select to enter a specific operating system, so that the user may read other information through the operating system, or even crack the password. . Under her, in the present invention: 'For the user, the user feels the booting situation as shown in Fig. 2, that is, when the power is turned on, the computer system will ask the user to start the material, and then enter The user's corresponding operating system' and the hidden H users of other operating systems will not know that the computer system has other equipment installed, and of course it is impossible to access other data (4) or repair 6 201020851 =::::: In addition, the power-on password of the present invention is used to verify whether it can be accessed, and which magnetic zone should be turned on and which magnetic zones are turned off. In summary, the present invention determines the magnetic area that should be turned on and should be turned off through the power-on password, and the user does not know that the electric system has other secrets, and it is impossible to access the data of other operating systems or modify the person. Passwords to improve information security. The above are only the preferred embodiments of the present invention, and all changes and modifications made to the scope of the present invention should fall within the scope of the present invention. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a schematic view showing a flow of a first embodiment of the present invention. FIG. 2 is a schematic diagram of a booting situation felt by a user in an embodiment of the present invention. [Main component symbol description] 10 Processes 100, 102, 104, 106 Steps

Claims (1)

201020851 七、申請專利範圍: 1. 一種提升一電腦系統之資訊安全的方法,該電腦系統之複數個磁 區安裝有複數個作業系統,並對應於複數個密碼,該方法包含有: 於該電腦系統之電源被啟動時,顯示一訊息,以要求一輸入訊號; 以及 於該輸入訊號符合該複數個密碼之一密碼時,啟動該密碼所對應 之磁區的作業系統,並隱藏該複數個磁區中該密碼所對應之 ❺ 磁區以外的磁區。 2. 如請求項1所述之方法,其中隱藏該複數個磁區中該密碼所對應 之磁區以外的磁區’係透過修改該電腦系統之一主開機記錄 (Master Boot Record) ’以隱藏該複數個磁區中該密碼所對應之 磁區以外的磁區。 ^ 3·如請求項1所述之方法,其另包含於該輸入訊號不符合該複數個 密碼時,顯示一警示訊息。 4. 一種可提升資訊安全之電腦系統,其包含有: 一硬體電路,用來實現該電腦系統之功能,該硬體電路之一硬碟 的複數個磁區安裝有複數個作業系統,並對應於複數個密 瑪,以及 一執行單元,用來執行一軟體,該軟體包含有: 於該硬體電路之電源被啟動時,顯示一訊息,以要求一輸入訊 8 201020851 號;以及 . 麟輸入訊號符合該複數個密碼之一密石馬時,啟動該密碼所對 應之磁區的作業系統’隱藏該複數個磁區中該密竭所對 應之磁區以外的磁區。 5.如=求項4所述之電腦系統,其中該軟體中隱藏該複數個磁區中 該雄碼所對應之磁區以外的磁區,係透過修改該電齡統之一主 〇 開機記錄(MasterBootRecord),以隱藏該複數個磁區中該密碼 所對應之磁區以外的磁區。 ^青求項4所述之魏祕,其巾該軟體另包含於該輸入訊號不 符σ該複數個密碼時,顯示—警示訊息。 7. ^請求項4所述之電腦祕,其中該執行單元係—基本輸入輸出 系統。 〇 八、圖式: 9201020851 VII. Patent application scope: 1. A method for improving the information security of a computer system. The plurality of magnetic regions of the computer system are installed with a plurality of operating systems and corresponding to a plurality of passwords. The method comprises: When the power of the system is activated, a message is displayed to request an input signal; and when the input signal matches one of the plurality of passwords, the operating system of the magnetic zone corresponding to the password is activated, and the plurality of magnetic fields are hidden. The magnetic zone outside the magnetic zone corresponding to the password in the zone. 2. The method of claim 1, wherein the magnetic region other than the magnetic region corresponding to the password in the plurality of magnetic regions is hidden by modifying a master boot record of the computer system to hide a magnetic region other than the magnetic region corresponding to the password in the plurality of magnetic regions. The method of claim 1, further comprising displaying a warning message when the input signal does not match the plurality of passwords. 4. A computer system for improving information security, comprising: a hardware circuit for realizing the function of the computer system, wherein one of the plurality of magnetic regions of the hard disk is mounted with a plurality of operating systems, and Corresponding to a plurality of MMEs and an execution unit for executing a software, the software includes: displaying a message when the power of the hardware circuit is activated, to request an input signal 8 201020851; and When the input signal conforms to one of the plurality of passwords, the operating system of the magnetic zone corresponding to the password is enabled to hide the magnetic regions other than the magnetic region corresponding to the exhaustion in the plurality of magnetic regions. 5. The computer system of claim 4, wherein the software hides a magnetic region other than the magnetic region corresponding to the male code in the plurality of magnetic regions, by modifying a primary boot record of the electrical age system (MasterBootRecord) to hide the magnetic regions outside the magnetic region corresponding to the password in the plurality of magnetic regions. ^ The secret of the item 4, the software of the towel is additionally included in the input signal, the display of the password, the warning message. 7. ^ The computer secret described in claim 4, wherein the execution unit is a basic input/output system.八 Eight, schema: 9
TW97145651A 2008-11-26 2008-11-26 Method for enhancing information security of a computer system and related computer system TWI380192B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW97145651A TWI380192B (en) 2008-11-26 2008-11-26 Method for enhancing information security of a computer system and related computer system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW97145651A TWI380192B (en) 2008-11-26 2008-11-26 Method for enhancing information security of a computer system and related computer system

Publications (2)

Publication Number Publication Date
TW201020851A true TW201020851A (en) 2010-06-01
TWI380192B TWI380192B (en) 2012-12-21

Family

ID=44832406

Family Applications (1)

Application Number Title Priority Date Filing Date
TW97145651A TWI380192B (en) 2008-11-26 2008-11-26 Method for enhancing information security of a computer system and related computer system

Country Status (1)

Country Link
TW (1) TWI380192B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170140137A1 (en) * 2014-07-30 2017-05-18 Yulong Computer Telecommunication Scientific (Shenzhen), Co., Ltd. Multi-System Entering Method, Apparatus and Terminal

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103729583B (en) 2012-10-16 2016-12-21 纬创资通股份有限公司 Data guard method and electronic installation

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170140137A1 (en) * 2014-07-30 2017-05-18 Yulong Computer Telecommunication Scientific (Shenzhen), Co., Ltd. Multi-System Entering Method, Apparatus and Terminal

Also Published As

Publication number Publication date
TWI380192B (en) 2012-12-21

Similar Documents

Publication Publication Date Title
CN108647508B (en) Method and system for automatic association of authentication credentials with biometric information
US8561174B2 (en) Authorization method with hints to the authorization code
US7849301B2 (en) Providing a user input interface prior to initiation of an operating system
JP4459282B2 (en) Information processing apparatus and security protection method
US6647498B1 (en) Method and apparatus for preventing personal computer from being illegally used
US20150199687A1 (en) Continual authorization for secured functions
TW200935308A (en) Progressive boot for a wireless device
US9135427B2 (en) Authentication using a subset of a user-known code sequence
CN107450839B (en) Control method and device based on black screen gesture, storage medium and mobile terminal
CN110569633A (en) Theft protection in firmware
WO2017167094A1 (en) Data processing method, device and smart terminal
US8719922B2 (en) Sensory association passcode
TW200937197A (en) Information storage device and method capable of hiding confidential files
WO2011071493A1 (en) Configuration of a basic input/output system (bios) of a computing device
KR101473640B1 (en) Touch device and method for password generating on touch device
JP4189397B2 (en) Information processing apparatus and authentication control method
TW200915183A (en) Portable USB device that boots a computer as a server with security measure
TW201020851A (en) Method for enhancing information security of a computer system and related computer system
CN101751519A (en) Method for improving information security of computer system and relative computer system thereof
KR20070024616A (en) System for controlling a multipurpose media access data processing system
CN104571847B (en) operation method of electronic device
KR20070032698A (en) A system for managing multiple general purpose media access data processing systems
CN103020509B (en) A kind of terminal device encryption and decryption method, device and terminal device
JP4951106B2 (en) Information processing device
JP2010055393A (en) Authentication system, authentication control method, and authentication control program