This application claims the benefit of Taiwan application Serial No. 94135947, filed Oct. 14, 2005, the subject matter of which is incorporated herein by reference.
1. Field of the Invention
The invention relates in general to a computer system and a security method therefor, and more particularly to a computer system using a removable memory having a basic input/output system (BIOS) and a security method therefor.
2. Description of the Related Art
Examples of conventional computer security method include smart card, fingerprint reader and booting passwords of a basic input/output system (BIOS).
Typically, the current computer security method achieved by using a smart card only restricts the connection to the Internet, that is, only after a corresponding smart card is inserted can the computer be connected to relevant networks. However, the above method does not check the security of the computer when the computer is booted up or woke up from a power-saving mode. In this case, any other person is able to activate the computer in the absence of a smart card except that the other person can not enter relevant networks. Therefore, the data stored in the computer is not well protected.
The computer security method achieved by using a fingerprint reader identifies the fingerprint of the user when the computer system is booted up. Only after the identification is authenticated can the computer be booted up. However, the computer security method achieved by using a fingerprint reader has a number of disadvantages. For example, the hardware of the fingerprint reader is costive, a corresponding device and software for fingerprint identification are required, and when the fingerprint reader applied in a notebook computer, part of the space is occupied, incapacitating further reduction in the volume of the notebook computer.
Another example of computer security method which has been used for a long time is the setting of booting passwords in the BIOS. When the computer system is booted up, the user is requested to input the passwords, and only after the passwords are authenticated will the computer be booted up. However, when the operating system of the computer which had been switched to a power-saving mode, such as a standby mode or a hibernation mode, is now woke up, the BIOS of the computer system does not request the booting passwords to be inputted and authenticated again. Consequently, after the computer enters the power-saving mode, everyone can wake the computer up.
None of the security methods disclosed above including the use of the smart card, the fingerprint reader and the booting passwords of BIOS can provide a thorough computer security function. Therefore, how to provide a thorough computer security function capable of thoroughly protecting computer data has become an urgent issue to be resolved.
It is therefore an object of the invention to provide a computer system and a security method therefor to achieve a thorough computer security.
The invention achieves the above-identified object by providing a computer system including a host and a removable memory. The host includes a slot corresponding to the removable memory. The removable memory is used for storing a basic input/output system (BIOS) of the host. The slot is used for selectively receiving the removable memory, so that the host can read/write data with respect to the removable memory via the slot. When the host is booted up, the removable memory is received in the slot already.
The invention further achieves the above-identified object by providing a security method for a computer system. The computer system has a host. The method for achieving computer system security includes the following steps. At first, a removable memory is plugged into a corresponding slot disposed on the host. The removable memory is used for storing a basic input/output system (BIOS) of the host. Next, the host is booted up to enter an active mode.
Other objects, features, and advantages of the invention will become apparent from the following detailed description of the preferred but non-limiting embodiments. The following description is made with reference to the accompanying drawings.
The invention provides a thorough computer security method. By the design of storing a basic input/output system (BIOS) in a removable memory or by designing the removable memory in the form of a memory card and disposing corresponding slots on the host, the removable memory or the memory card is able to be selectively disconnected from or connected to the host via the corresponding slot. Thus, when the removable memory or the memory card is unplugged from the host, the host will not be booted up or woke up from a power-saving mode due to the lack of the BIOS, hence providing a thorough computer security method.
Referring to
Furthermore, the removable memory 104 is exemplified by a memory card. The slot 106 has a number of pins corresponding to the memory card 104. The host 102 electrically connected to the memory card 104 via the pins can read/write data with respect to the memory card 104. Examples of the communication interface between the BIOS of the memory card 104 and the computer system 100 include X-BUS/LPC/SPI. The present embodiment of the invention does not limit the types of the communication interface and the pins of the slot 106. That is, any pin which corresponds to the type of the memory card 104 and enables the memory card 104 to transmit signals with the host 102 can be used in this embodiment. One of the pins is defined as a system security detecting pin PIN (X) (not shown in
Referring to
The system security program is used for determining whether the memory card 104 is plugged into the slot 106. For example, when the user activates the power source of the computer system 100, the power control unit 108 determines whether the memory card 104 is received in the slot 106 according to the detected electrical potential at the system security detecting pin PIN (X). For example, when the memory card 104 is not received in the slot 106, the electrical potential at the pin PIN (X) is at a low level (logic 0), so the power control unit 108, according to the low electrical potential at the pin PIN (X), determines that the memory card 104 has been unplugged. Therefore, when the memory card 104 is not received in the slot 106, the power control unit 108 will not activate the host 102. For example, when the host 102 is originally at a power-off mode and does not receive the memory card 104, the relevant electric components does not receive the power source and can not be booted up despite the power source is activated. Therefore, in the absence of the BIOS, the host will not be booted up when the power source is activated by mistake, lest the power might be wasted or the electric components of the host 102 might be damaged.
The memory card 104 can be defined as a system security lock of the computer system 100. Only when the memory card 104 is plugged into the slot 106 and is connected to the host 102 can the host 102 be activated to enter an active mode. Currently, after an operating system, such as the Windows OS, is executed by the computer system 100, there are several relevant modes such as, power-saving mode (standby mode or hibernation mode) available other than the active mode and the power-off mode. Under the standby mode, part of the power management program is executed by the power control unit 108 to maintain the power source for the main memory 112 of the host 102 or the computer system 100, the system security program is also be executed to determine whether the memory card 104 is connected to the host 102. Under the hibernation mode or the power-off mode, the power control unit 108 executes the system security program to determine whether the memory card 104 is connected to the host 102. Therefore, only when the host 102 is at the power-saving mode or the power-off mode and the memory card 104 is plugged into the slot 106 to connect to the host 102 can the host 102 be woke up or booted up to an active mode.
Under the circumstances that the power management program and the system security program are stored in the memory card 104, when the host 102 enters a power-saving mode or a power-off mode, the power control unit 108 will move the power management program and the system security program to the memory 114 of the power control unit 108 and turn the power source of the memory card 104 off, so the memory card 104 can be unplugged from the slot 106. When the host 102 is to be booted up or woke up, the memory card 104 has to be plugged into the slot for enabling the host 102 to enter an active mode, hence assuring system security. It is noted that the power management program and the system security program are stored in the memory card 104. If the host 102 is powered by an external power source or a battery 110, the system security program has to be copied to the memory 114 of the power control unit 108 when the host 102 enters a power-off mode or a power-saving mode. If the external power source and the battery 110 are both available at the same time, the power management program has to be copied to the memory 114 of the power control unit 108 for enabling the battery 110 to be charged or discharged.
Likewise, when the power management program and the system security program are stored in memory card 104, another possibility arises. If the host 102 is powered by an external power source or a battery, when the host 102 enters a standby mode, apart form the system security program, the power management program also has to be copied to the memory 114 of the power control unit 108 for enabling the power control unit 108 to maintain the power source of the main memory 112. Similarly, if the external power source and the battery 110 are both available at the same time, the power management program also has to be copied to the, memory 114 of the power control unit 108 for enabling the battery 110 to be charged or discharged.
To the contrary, if both the power management program and the system security program are stored in the memory 114 of the power control unit 108 instead of the memory card 104, when the host 102 is shut down or enters a power-saving mode including the standby mode and the hibernation mode, the power control unit 108 will turn off the power source of the memory card 104. Meanwhile, no matter whether the computer system 100 is a notebook computer or not, the memory card 104 can be removed from the slot 106 directly.
The slot 106 includes relevant protection designs such as a mistake-proofing design which prevents the user from plugging the memory card 104 in the wrong direction, a structural design which prevents the memory card 104 when received in the slot 106 from coming off the slot, and a structural design which prevents the memory card 104 from coming off the slot 106 when the host 102 continues providing power to the memory card 104 (for example, when the power supply is still received through the LPC interface of the BIOS). The above designs ascertain that data loss will not occur to the computer system 100 in the case when the memory card 104 is unplugged inappropriately or comes off the slot unexpectedly.
According to the computer system and the security method therefor disclosed in the above embodiments of the invention, a BIOS is stored in a memory card. That is, the BIOS ROM is separated from the system and designed to be a memory card, and the memory card is further defined as a system security lock. Only when the memory card is received in the host can the host have the BIOS to operate the system. For example, the host can be booted up or activated from a power-saving mode as the memory card is received in the slot. That is, the memory card can be unplugged after the host is shut down or enters a power-saving mode. In the absence of the memory card (also referred as system security lock), the host lacking the BIOS can not be booted up or activated from the power-saving mode, hence assuring computer security.
While the invention has been described by way of example and in terms of a preferred embodiment, it is to be understood that the invention is not limited thereto. On the contrary, it is intended to cover various modifications and similar arrangements and procedures, and the scope of the appended claims therefore should be accorded the broadest interpretation so as to encompass all such modifications and similar arrangements and procedures.
| Number | Date | Country | Kind |
|---|---|---|---|
| 94135947 | Oct 2005 | TW | national |