TWI380192B - Method for enhancing information security of a computer system and related computer system - Google Patents

Method for enhancing information security of a computer system and related computer system Download PDF

Info

Publication number
TWI380192B
TWI380192B TW97145651A TW97145651A TWI380192B TW I380192 B TWI380192 B TW I380192B TW 97145651 A TW97145651 A TW 97145651A TW 97145651 A TW97145651 A TW 97145651A TW I380192 B TWI380192 B TW I380192B
Authority
TW
Taiwan
Prior art keywords
magnetic
computer system
password
passwords
zone
Prior art date
Application number
TW97145651A
Other languages
Chinese (zh)
Other versions
TW201020851A (en
Inventor
Feng Hsing Chiang
Yuan Chan Lee
Original Assignee
Wistron Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wistron Corp filed Critical Wistron Corp
Priority to TW97145651A priority Critical patent/TWI380192B/en
Publication of TW201020851A publication Critical patent/TW201020851A/en
Application granted granted Critical
Publication of TWI380192B publication Critical patent/TWI380192B/en

Links

Description

1380192 六、發明說明: 【發明所屬之技術領域】 本發明係指一種提升一電腦系統之資訊安全的方法及其相關電 腦系統,尤指一種透過開機密碼決定應開啟及應關閉的磁區,進而提 升資訊安全的方法及其相關電腦系統。 β【S前技術】 電腦系統的普及實現了快速、便利的資訊化社會,使得人們可以 更有效率地處理大量的資料,而企業也紛紛改採電腦系統以實現電子 化。因此’資訊安全越來越被重視。 在電腦系統中’使用者可在不同磁區安裝不同作業系統,但這樣 •的操作,可能造成資訊安全的問題。一般而言,當使用者欲使用安裝 有夕個作業系統的電腦系統時,電腦系統於開啟電源後會顯示一選單 .”面’由使用者決定要進入哪個磁區的作業系統。為了維護資訊安全, 使用者可透過設定開機密碼或設定作業系統之登入密碼等方式,防止 電腦系統的資料被竊取。以設定開機密碼為例,當電腦系統開機時, 基本輸入輸出系統(BasicI叩ut/〇utputs_^,會要求使用者 輸入開機密碼;若㈣者輸人關機密碼正確,始可顯示選單介面, 、由使用者選擇進人特定作業系統,而作業系統亦可設定登入密碼丨 目反地’若使用者輸人的開機密碼不正確,則基本輸入輸出系統會要 3 1380192 求重新輸入密碼或關機。這種方式可防止未被授權的使用者使用電 腦,以避免電腦系統的資料被竊取。然而,由上述可知,只要正確輸 入開機密碼,使用者即可選擇進入特定作業系統。在此情形下,使用 者可能透過某-作㈣統讀取其它作鮮統的㈣,甚至破解其登入 密碼。 因此’若有心人士欲竊取電腦系統的資料時,即使作業系統已設 鲁足登入密碼’只要能進入選單介面,就可透過其它作業系統竊取資料, 甚至破解登入密碼,可能因此造成個人或企業的重大損失。 【發明内容】 因此,本發明之主要目的即在於提供一種提升一電腦系統之資訊 安全的方法及其相關電腦系統。 • 本發明揭露一種提升一電腦系統之資訊安全的方法,該電腦系統 之複數個磁區安裝有複數個作業系統,並對應於複數個密碼,該方法 、包含有於該電腦系統之電源被啟動時,顯示一訊息,以要求一輸入訊 號;以及於該輸入訊號符合該複數個密碼之一密碼時,啟動該密碼所 對應之磁區的作業系統,並隱藏該複數柄磁區中該密碼所對應之磁區 以外的磁區。 本發明另揭露一種可提升資訊安全之電腦系統,其包含有一硬體 電路,用來貫現該電腦系統之功能,該硬體電路之一硬碟的複數個磁 4 1380192 區安裝有複數個作業系統,並對應於複數個密碼;以及一執行單元, 用來執行一軟體,該軟體包含有於該硬體電路之電源被啟動時,顯示 一訊息,以要求一輸入訊號;以及於該輸入訊號符合該複數個密碼之 一密碼時,啟動該密碼所對應之磁區的作業系統,隱藏該複數個磁區 中該密碼所對應之磁區以外的磁區。 【實施方式】 請參考第1圖,第1圖為本發明實施例一流程10之示意圖。流 程10用來提升一電腦系統之資訊安全,該電腦系統之複數個磁區安裝 有複數個作業系統,並對應於複數個密碼。流程10包含以下步驟: 步驟100 .開始。 , 步驟102 :於該電腦系統之電源被啟動時,顯示一訊息,以要求一 輸入訊號。 步驟104 :於該輸入訊號符合該複數個密碼之一密碼時,啟動該密 碼所對應之磁區的作業系統’並隱藏該複數個磁區中該 密碼所對應之磁區以外的磁區。 步驟106 :結束。 根據流程10 ’當電腦系統被啟動後,電腦系統會顯示一訊息,以 要求使用者之輸入訊號;若輸入訊號符合對應於某一作業系統的密碼 時,本發明會進入該作業系統,並關閉對應於其它作業系統的磁區。 簡單來說’對使用者而言,電麻賴機m級用者輸入開機 饮碼,若正確,則會進入作業系統。換言之,使用者不會知道電腦系 5 1380192 統巾安裝有乡個作職統,同時,由於本發明會隱藏其它作業系統的 磁區’因此使用者也無法存取其它作業线的㈣,當然也不可能修 改其它作業系統的登入密石馬。 因此’透過本發明’電腦系統係根據使用者輸入的密碼,決定要 啟動的磁區及對應的作業系統。如此—來,可避免多作業系統之電腦 系統之資料被竊取,以維持資訊安全。需注意的是,第丨圖所示之流 鲁程10係為本發明之實施例示意圖,本領域具通常知識者當可據以做不 同之修飾,而不限於此。舉例來說,關於隱藏磁區的作法本發明可 透私改電腦系統之主開機記錄(Master B〇〇t Re_ ),使得相關磁區 隱藏’避免資料被竊。另外,若於使用者之輸入訊號不符合任一密碼 時’本發明可顯不一警示訊息,並要求使用者重新輸入或關機。 關於流程10的實現’可透過軟體方式,並由—執行單元(如基 本輸入輸出系統)執行,以控制硬體電路中需啟動的磁區,相關運作 _方式應係、本領域具通常知識者所熟知,故不贅述。 在習知多作業系統之電腦系統中,只要正確輸入開機密碼,使用 者即可選擇進人特㈣㈣統,使得使用者可能透過某—作業系統讀 取其它作㈣統的資料,甚至破解其登人密碼。她之下,在本發明 I ’對使用者而言,使用者所感受的開機情形即如第2圖所示,亦即, 當電源啟動後,電腦系統會詢問使用者開機密碼,接著進入對應的作 ^系統’並隱齡它作㈣統的顧。因此,使財不會知道電腦系 ,,先有文財它作㈣統’ 也不可能存取其它作料統的資料或修 改登入密碼。簡蓮^ , 平來說,本發明的開機密碼除了用來驗證是否能進入 作業外還可決定應開啟哪個磁區並關閉哪些磁區。 ‘上所述,本發明係透過開機密碼決定應開啟及應關閉的磁區, 且使用者不會_電«财安裝其它作業系統 ,也不可能存取其它 作業系統的賴雜改登人密碼,進啸升資訊安全。 以上所述僅為本發明之較佳實施例,凡依本發明申請專利範圍所 做之均等變化與修飾,皆應屬本發明之涵蓋範圍。 【圖式簡單說明】 第1圖為本發明實施例一流程之示意圖。 第2圖為本發明實施例中使用者所感受的開機情形示意圖。 【主要元件符號說明】 10 流程 100、102、104、106 步驟1380192 VI. Description of the Invention: [Technical Field] The present invention relates to a method for improving information security of a computer system and related computer system, and more particularly to a magnetic area that should be turned on and should be turned off by a power-on password. Ways to improve information security and related computer systems. β[S前技术] The popularity of computer systems has enabled a fast and convenient information society, enabling people to process large amounts of data more efficiently, and companies have switched to computer systems to achieve electronic. Therefore, information security is getting more and more attention. In computer systems, users can install different operating systems in different magnetic zones, but such operations may cause information security problems. In general, when a user wants to use a computer system with an operating system installed, the computer system displays a menu after turning on the power. The "face" is determined by the user which operating system to enter. Security, users can prevent the computer system data from being stolen by setting the power-on password or setting the login password of the operating system. Take the power-on password as an example. When the computer system is turned on, the basic input/output system (BasicI叩ut/〇 Utputs_^, will ask the user to enter the power-on password; if (4) the person who enters the shutdown password is correct, the menu interface can be displayed, the user can choose to enter the specific operating system, and the operating system can also set the login password to the wrong place. If the user's input power-on password is incorrect, the basic input/output system will ask for 3 1380192 to re-enter the password or shut down. This method can prevent unauthorized users from using the computer to prevent the computer system data from being stolen. However, as can be seen from the above, as long as the power-on password is correctly input, the user can select to enter a specific operating system. Under this circumstance, the user may read other (4) and even crack the login password through a certain (four) system. Therefore, if the person who wants to steal the data of the computer system, even if the operating system has been set up The login password 'as long as the user can enter the menu interface, the data can be stolen through other operating systems, and even the login password can be cracked, which may cause significant loss to the individual or the enterprise. [Invention] Therefore, the main purpose of the present invention is to provide a promotion one. The method of information security of a computer system and related computer system. The present invention discloses a method for improving information security of a computer system. The plurality of magnetic regions of the computer system are installed with a plurality of operating systems and correspond to a plurality of passwords. The method includes: displaying a message to request an input signal when the power of the computer system is activated; and starting the operation of the magnetic area corresponding to the password when the input signal meets the password of the plurality of passwords System, and hiding the magnetic region outside the magnetic region corresponding to the password in the complex handle magnetic region The invention further discloses a computer system capable of improving information security, comprising a hardware circuit for performing the function of the computer system, wherein a plurality of magnetic 4 1380192 areas of the hard disk of the hard circuit are installed with a plurality of operations a system, and corresponding to a plurality of passwords; and an execution unit for executing a software, the software includes a message displayed when the power of the hardware circuit is activated, to request an input signal; and the input signal When the password of one of the plurality of passwords is met, the operating system of the magnetic zone corresponding to the password is activated, and the magnetic region other than the magnetic region corresponding to the password in the plurality of magnetic regions is hidden. [Embodiment] Please refer to FIG. 1 is a schematic diagram of a process 10 of an embodiment of the present invention. The process 10 is used to improve information security of a computer system. The plurality of magnetic regions of the computer system are installed with a plurality of operating systems and correspond to a plurality of passwords. The process 10 includes the following steps: Step 100. Start. Step 102: When the power of the computer system is started, a message is displayed to request an input signal. Step 104: When the input signal matches one of the plurality of passwords, activate the operating system of the magnetic zone corresponding to the password and hide the magnetic regions other than the magnetic region corresponding to the password in the plurality of magnetic regions. Step 106: End. According to the process 10 'When the computer system is started, the computer system displays a message to request the user to input the signal; if the input signal matches the password corresponding to a certain operating system, the present invention enters the operating system and closes Corresponds to the magnetic zone of other operating systems. Simply put, for the user, the m-level user inputs the boot code, and if it is correct, it will enter the operating system. In other words, the user does not know that the computer system 5 1380192 is equipped with a home job system. At the same time, since the present invention hides the magnetic area of other operating systems, the user cannot access other lines (4), of course. It is not possible to modify the login of other operating systems. Therefore, the computer system according to the present invention determines the magnetic region to be activated and the corresponding operating system based on the password input by the user. In this way, the data of the computer system of the multi-operation system can be prevented from being stolen to maintain information security. It should be noted that the flow diagram 10 shown in the figure is a schematic diagram of an embodiment of the present invention, and those skilled in the art can make different modifications according to the present invention, and are not limited thereto. For example, with respect to the method of concealing the magnetic zone, the present invention can transparently change the master boot record (Master B〇〇t Re_) of the computer system so that the relevant magnetic zone is hidden to avoid data theft. In addition, if the input signal of the user does not match any of the passwords, the present invention can display a warning message and ask the user to re-enter or shut down. The implementation of the process 10 can be performed in a software mode and executed by an execution unit (such as a basic input/output system) to control the magnetic area to be activated in the hardware circuit, and the related operation method should be a general knowledge in the field. It is well known, so it will not be described. In the computer system of the conventional multi-operation system, as long as the power-on password is correctly input, the user can select the special (4) (four) system, so that the user may read other data of the system through the operating system, or even crack the person. password. Under her, in the invention I's the user's feeling of booting as shown in Figure 2, that is, when the power is turned on, the computer system will ask the user for the power-on password, and then enter the corresponding The work of the system ^ and the age of it (4) unified care. Therefore, if the money is not known to the computer system, it is impossible to access the information of other materials or modify the login password. Jane Lotus ^ In other words, the power-on password of the present invention can be used in addition to verifying whether it can enter the job, which magnetic zone should be turned on and which magnetic zones are turned off. As described above, the present invention determines the magnetic area that should be turned on and should be turned off through the power-on password, and the user does not install other operating systems, and may not access the operating system of other operating systems. Into the whistle of information security. The above are only the preferred embodiments of the present invention, and all changes and modifications made to the scope of the present invention should fall within the scope of the present invention. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a schematic view showing a flow of a first embodiment of the present invention. FIG. 2 is a schematic diagram of a booting situation felt by a user in an embodiment of the present invention. [Main component symbol description] 10 Processes 100, 102, 104, 106 Steps

Claims (1)

1380192 七、申請專利範圍: 1. 一種提升一電腦系統之資訊安全的方法,該電腦系統之複數個磁 區安裝有複數個作業系統,並對應於複數個密碼,該方法包含有: 於該電腦系統之電源被啟動時,顯示_訊息,以要求一輪入訊號; 以及 於該輸入訊號符合該複數個密碼之一密碼時,啟動該密碼所對應 之磁區的作業系統,並隱藏該複數個磁區中該密碼所對應之 磁區以外的磁區。 2. 如凊求項1所述之方法’其中隱藏該複數個磁區中該密碼所對應 之磁區以外的磁區,係透過修改該電腦系統之一主開機記錄 (MasterBomRecord) ’以隱藏該複數個磁區中該密碼所對應之 磁區以外的磁區。 3. 如請求項1驗之綠,其聽含_輸號不符合該複數個 密碼時,顯示一警示訊息。 4. 一種可提升資訊安全之電腦系統,其包含有: -硬體電路’絲實現該電腦系統之功能,該硬體電路之一硬碟 的複數個磁區安裝有複數個作業系統,並對應於複數個密 碼;以及 一執行單元,用來執行一軟體,該軟體包含有: 於該硬體電路之電源被啟動時,顯示一訊息,以要求一輸入訊 8 號;以及 ·· 於該輸入訊號符合該複數個密碼之一密碼時,啟動該密瑪所對 應之磁區的作業系統,隱藏該複數個磁區中該密石馬所重子 應之磁區以外的磁區。 5·如請求項4所述之電腦系統,其中該軟體令隱藏該複數個磁區中 該畨碼所對應之磁區以外的磁區,係透過修改該電腦系統之—主 開機記錄(Master Boot Record),以隱藏該複數個磁區中該密石馬 所對應之磁區以外的磁區。 6·如請求項4所述之電腦緖,其中錄體另包含於該輸入訊號不 符合該複數個密碼時,顯示一警示訊息。 7. 2求項4所述之電腦系統,其中該執行單元係—基本輸入輸出 系統。 ®八、圖式:1380192 VII. Patent application scope: 1. A method for improving the information security of a computer system. The plurality of magnetic regions of the computer system are installed with a plurality of operating systems and corresponding to a plurality of passwords. The method comprises: When the power of the system is activated, a message is displayed to request a round-robin signal; and when the input signal meets one of the plurality of passwords, the operating system of the magnetic zone corresponding to the password is activated, and the plurality of magnetic fields are hidden. The magnetic zone outside the magnetic zone corresponding to the password in the zone. 2. The method of claim 1, wherein the magnetic region other than the magnetic region corresponding to the password in the plurality of magnetic regions is hidden, by modifying a master boot record (MasterBomRecord) of the computer system to hide the A magnetic region other than the magnetic region corresponding to the password in the plurality of magnetic regions. 3. If the request item 1 is green, it will display a warning message if the _ input number does not match the multiple passwords. 4. A computer system capable of improving information security, comprising: - a hardware circuit to realize the function of the computer system, wherein one of the plurality of magnetic regions of the hard disk is mounted with a plurality of operating systems, and corresponding And a plurality of passwords; and an execution unit for executing a software, the software comprising: displaying a message to request an input signal 8 when the power of the hardware circuit is activated; and When the signal conforms to one of the plurality of passwords, the operating system of the magnetic zone corresponding to the mega-major is activated, and the magnetic zone other than the magnetic zone of the boulder horse in the plurality of magnetic regions is hidden. 5. The computer system of claim 4, wherein the software causes the magnetic region outside the magnetic region corresponding to the weight in the plurality of magnetic regions to be hidden, and the master boot record is modified by modifying the computer system (Master Boot) Record) to hide the magnetic regions other than the magnetic region corresponding to the dense stone in the plurality of magnetic regions. 6. The computer as claimed in claim 4, wherein the recording body further comprises displaying a warning message when the input signal does not meet the plurality of passwords. 7. The computer system of claim 4, wherein the execution unit is a basic input/output system. ® VIII, schema:
TW97145651A 2008-11-26 2008-11-26 Method for enhancing information security of a computer system and related computer system TWI380192B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW97145651A TWI380192B (en) 2008-11-26 2008-11-26 Method for enhancing information security of a computer system and related computer system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW97145651A TWI380192B (en) 2008-11-26 2008-11-26 Method for enhancing information security of a computer system and related computer system

Publications (2)

Publication Number Publication Date
TW201020851A TW201020851A (en) 2010-06-01
TWI380192B true TWI380192B (en) 2012-12-21

Family

ID=44832406

Family Applications (1)

Application Number Title Priority Date Filing Date
TW97145651A TWI380192B (en) 2008-11-26 2008-11-26 Method for enhancing information security of a computer system and related computer system

Country Status (1)

Country Link
TW (1) TWI380192B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9256754B2 (en) 2012-10-16 2016-02-09 Wistron Corporation Data protection method and electronic device capable of creating a private folder having a same name as a public folder to hide private data

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156644B (en) * 2014-07-30 2017-04-19 宇龙计算机通信科技(深圳)有限公司 Multisystem entering method and device and terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9256754B2 (en) 2012-10-16 2016-02-09 Wistron Corporation Data protection method and electronic device capable of creating a private folder having a same name as a public folder to hide private data

Also Published As

Publication number Publication date
TW201020851A (en) 2010-06-01

Similar Documents

Publication Publication Date Title
US10181042B2 (en) Methods, systems, and apparatuses for managing a hard drive security system
JP6564414B2 (en) Indirect authentication
US9098695B2 (en) Secure note system for computing device lock screen
JP6052912B2 (en) Authentication by secondary approver
US7900252B2 (en) Method and apparatus for managing shared passwords on a multi-user computer
CN108647508B (en) Method and system for automatic association of authentication credentials with biometric information
US8245026B1 (en) Securing the contents of data storage devices within a computer
JP4459282B2 (en) Information processing apparatus and security protection method
US20150199687A1 (en) Continual authorization for secured functions
CN107450839B (en) Control method and device based on black screen gesture, storage medium and mobile terminal
CN110569633A (en) Theft protection in firmware
TWI288553B (en) Portable storage device having main identification information and method of setting main identification information thereof
US20080246584A1 (en) Locking digital pen
JP2004234331A (en) Information processor and user operation limiting method used by same device
US20120212497A1 (en) Verification method and computer system using the same
JP4189397B2 (en) Information processing apparatus and authentication control method
WO2005098569A1 (en) Information processor and method for ensuring security thereof
EP1889400A2 (en) Secure rapid navigation and power control for a computer
TW200915183A (en) Portable USB device that boots a computer as a server with security measure
CN101751519A (en) Method for improving information security of computer system and relative computer system thereof
TWI380192B (en) Method for enhancing information security of a computer system and related computer system
TWI539276B (en) Operating time supervisory system
JP5040860B2 (en) Authentication system, authentication control method, and authentication control program
JP2011107956A (en) Computer system
CN202486787U (en) Personal computer main board for setting rigid disk read-write authority limits through switched circuit