CN112130903B - CMOS information clearing method, device and computer readable storage medium - Google Patents

CMOS information clearing method, device and computer readable storage medium Download PDF

Info

Publication number
CN112130903B
CN112130903B CN202010986926.8A CN202010986926A CN112130903B CN 112130903 B CN112130903 B CN 112130903B CN 202010986926 A CN202010986926 A CN 202010986926A CN 112130903 B CN112130903 B CN 112130903B
Authority
CN
China
Prior art keywords
clear
user
cmos
image
bios
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010986926.8A
Other languages
Chinese (zh)
Other versions
CN112130903A (en
Inventor
杨川
赵海丽
鞠荣荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Computer Technology Co Ltd
Original Assignee
Shandong Yunhai Guochuang Cloud Computing Equipment Industry Innovation Center Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Yunhai Guochuang Cloud Computing Equipment Industry Innovation Center Co Ltd filed Critical Shandong Yunhai Guochuang Cloud Computing Equipment Industry Innovation Center Co Ltd
Priority to CN202010986926.8A priority Critical patent/CN112130903B/en
Publication of CN112130903A publication Critical patent/CN112130903A/en
Application granted granted Critical
Publication of CN112130903B publication Critical patent/CN112130903B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/30Arrangements for executing machine instructions, e.g. instruction decode
    • G06F9/30003Arrangements for executing specific machine instructions
    • G06F9/3004Arrangements for executing specific machine instructions to perform operations on memory
    • G06F9/30043LOAD or STORE instructions; Clear instruction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/2284Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing by power-on test, e.g. power-on self test [POST]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Collating Specific Patterns (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a CMOS information clearing method, a CMOS information clearing device and a computer readable storage medium. The method comprises the steps of pre-storing face images of authorized users, and storing passwords of a BIOS administrator in a BIOS NVRAM password space. When the Clear CMOS operation behavior is detected, the current face image of the user issuing the Clear CMOS operation instruction is acquired by loading the image sensor driver. Checking whether the face image is an authorized user face image, if the current face image is the authorized user face image, executing Clear CMOS operation to Clear BIOS data stored in the CMOS chip, and simultaneously clearing BIOS administrator passwords stored in the BIOS NVRAM password space and clearing behavior identification information of the Clear CMOS operation. The method and the device can safely and reliably execute Clear CMOS operation, and effectively improve the safety of user data storage.

Description

CMOS information clearing method, device and computer readable storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method and apparatus for removing CMOS information, and a computer readable storage medium.
Background
An image sensor is an optical device with a photoelectric conversion function, and is used for dividing an optical image on a photosensitive surface into a plurality of small units, converting the small units into electric signals in a corresponding proportional relation with the optical image, and gradually becoming a peripheral device of a plurality of computers. Currently, existing image sensors are classified into photoconductive cameras and solid-state image sensors. Compared with a photoconductive camera tube, the solid-state image sensor has the characteristics of small volume, light weight, high integration level, high resolution, low power consumption, long service life, low price and the like. CMOS (Complementary Metal Oxide Semi Conductor, complementary metal oxide semiconductor memory) is a read-write RAM (Random Access Memory ) chip on a motherboard. Whether a PC (personal computer) or a server, a CMOS chip is used to store important data in the BIOS (Basic Input Output System ) and can ensure that power failure is not lost. In addition, in real life, the BIOS administrator password is very likely to be unable to be retrieved due to various reasons such as personnel flow and machine handover. This time, only the Clear CMOS (Clear CMOS information) operation is performed on the machine. Thus, clear CMOS operation is an indispensable function.
In the prior art, the Clear CMOS operation can be directly performed by only removing the battery for powering the CMOS or finding the jump on the motherboard, and all BIOS data stored in the CMOS chip is deleted. Unauthorized users or intruders can easily perform Clear CMOS operation in the method, the password of the BIOS manager is cleared, the safety performance of user data is not high, and great potential safety hazards exist in the Clear CMOS management method.
In view of this, how to safely and reliably perform Clear CMOS operations is a technical problem that needs to be solved by those skilled in the art.
Disclosure of Invention
The application provides a CMOS information clearing method, a CMOS information clearing device and a computer readable storage medium, which can safely and reliably execute Clear CMOS operation and effectively improve the safety of user data storage.
In order to solve the technical problems, the embodiment of the invention provides the following technical scheme:
in one aspect, an embodiment of the present invention provides a CMOS information clearing method, including:
pre-storing face images of authorized users;
when a Clear CMOS operation issuing instruction is detected, acquiring a current face image of the issuing instruction user through loading an image sensor drive;
if the current face image is the face image of the authorized user, executing the Clear CMOS operation, clearing the BIOS administrator password stored in the BIOS NVRAM password space, and clearing the clearing behavior identification information of the Clear CMOS operation.
Optionally, the storing the face image of the authorized user includes:
when an image acquisition instruction sent by a user image acquisition mode in a BIOS setting interface is received, loading an image sensor drive and prompting a user to acquire an image;
the collected face images of the user are used as authorized user images in an authorized user image set to be stored in an image module flash memory;
and according to the received user image acquisition mode exit instruction, exiting the BIOS setting interface and automatically executing restarting operation.
Optionally, after the collected face image of the user is stored as an authorized user image in the authorized user image set in the image module flash memory, the method further includes:
converting the collected face images of the user at different angles into feature vectors by adopting a feature face technology, and generating a face feature vector set;
and extracting corresponding characteristic values from the face characteristic vector set, carrying out encryption processing on each characteristic value by adopting an encryption algorithm, and storing the face characteristic vector set after the encryption processing in a BIOS NVRAM.
Optionally, after executing the Clear CMOS operation and clearing the Clear CMOS operation identification information if the current face image is the face image of the authorized user, the method further includes:
checking whether the current face image is the face image of the authorized user in the face image set of the authorized user or not and whether the number of times of the face image of the authorized user exceeds a preset number threshold;
if yes, stopping executing the Clear CMOS operation, and carrying out alarm prompt, and simultaneously automatically executing shutdown operation.
Optionally, the detecting Clear CMOS operation issue command includes:
judging whether the CLEAR_FLAG exists in the CMOS chip or not in the initial stage of the power-on self-checking process;
if yes, reading the clear_flag value, and if the clear_flag value is a presence identification value, judging that CLEAR CMOS operation behaviors exist for a user; if the value of the clear_flag is the non-existence identification value, judging that the CLEAR CMOS operation behavior does not exist in the user;
if not, defining the clear_flag as CLEAR behavior identification information, and initializing the clear_flag as an absence identification value to identify that the CLEAR CMOS operation behavior does not exist for the user.
Another aspect of the embodiment of the present invention provides a CMOS information clearing device, including:
the authorization image pre-storage module is used for pre-storing the face image of the authorized user;
the image acquisition module is used for acquiring a current face image of a user issuing the instruction through loading an image sensor drive when the Clear CMOS operation issuing instruction is detected;
the authorization behavior verification module is used for verifying whether the current face image is the face image of the authorized user;
and the clearing operation execution module is used for executing the Clear CMOS operation if the current face image is the face image of the authorized user, clearing the BIOS administrator password stored in the BIOS NVRAM password space, and clearing the clearing behavior identification information of the Clear CMOS operation.
Optionally, the authorization image pre-storage module includes:
the authorization image acquisition sub-module is used for loading the image sensor drive and prompting a user to acquire an image when receiving an image acquisition instruction sent by a user image acquisition mode in the BIOS setting interface;
the authorization image storage sub-module is used for storing the acquired user face image as an authorization user image in the authorization user image set into the image module flash memory;
and the image acquisition exit sub-module is used for exiting the BIOS setting interface and automatically executing restarting operation according to the received user image acquisition mode exit instruction.
Optionally, the image acquisition module includes a cleaning behavior detection submodule, and the cleaning behavior detection submodule includes:
the identification judging unit is used for judging whether the clear_FLAG exists in the CMOS chip in the initial stage of the power-on self-checking process;
the behavior judging unit is used for reading the value of the clear_FLAG if the clear_FLAG exists in the CMOS chip, and judging that the CLEAR CMOS operation behavior exists for the user if the value of the clear_FLAG is the existence identification value; if the value of the clear_flag is the non-existence identification value, judging that the CLEAR CMOS operation behavior does not exist in the user; if the clear_flag does not exist in the CMOS chip, defining the clear_flag as CLEAR behavior identification information, and initializing the clear_flag as an absence identification value to identify that CLEAR CMOS operation behavior does not exist for a user.
The embodiment of the invention also provides a CMOS information clearing device, which comprises a processor, wherein the processor is used for realizing the steps of the CMOS information clearing method when executing a computer program stored in a memory.
The embodiment of the invention finally provides a computer readable storage medium, wherein the computer readable storage medium stores a CMOS information clearing program, and the CMOS information clearing program realizes the steps of the CMOS information clearing method when being executed by a processor.
The technical scheme provided by the application has the advantages that when the user executes the Clear CMOS operation, the safety protection measures for face recognition are added, and the Clear CMOS operation is confirmed to be executed only when the user who checks and issues the clearing command is an authorized user, so that the Clear CMOS operation can be executed by a legal user, and the safety vulnerability problem existing in the Clear CMOS operation function of an unauthorized user or an invader through removing the power supply battery or the jump of the mainboard CMOS chip is effectively solved. The safety and reliability of the Clear CMOS operation are improved, so that the safety of user data storage is effectively improved. In addition, the image sensor has become the standard of all-in-one or notebook, so can not bring extra operation burden to the user, and is practical, available, simple and convenient, safe and efficient, realize the safe execution Clear CMOS operation based on the image sensor can satisfy the demand in current market from a plurality of angles such as technique, cost, user experience.
In addition, the embodiment of the invention also provides a corresponding implementation device and a computer readable storage medium for the CMOS information clearing method, so that the method has more practicability, and the device and the computer readable storage medium have corresponding advantages.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions of the related art, the drawings that are required to be used in the embodiments or the description of the related art will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort to those of ordinary skill in the art.
Fig. 1 is a schematic flow chart of a CMOS information clearing method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of S101 in an implementation manner according to an embodiment of the present invention;
fig. 3 is a schematic flow chart of S102 in an implementation manner according to an embodiment of the present invention;
fig. 4 is a schematic flow chart of S103 in an implementation manner according to an embodiment of the present invention;
FIG. 5 is a block diagram of a specific implementation of a CMOS information clearing device according to an embodiment of the present invention;
fig. 6 is a block diagram of another embodiment of a CMOS information clearing device according to an embodiment of the present invention.
Detailed Description
In order to better understand the aspects of the present invention, the present invention will be described in further detail with reference to the accompanying drawings and detailed description. It will be apparent that the described embodiments are only some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims of this application and in the above-described figures, are used for distinguishing between different objects and not necessarily for describing a sequential or chronological order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements but may include other steps or elements not expressly listed.
Having described the technical solutions of embodiments of the present invention, various non-limiting implementations of the present application are described in detail below.
Referring first to fig. 1, fig. 1 is a flow chart of a CMOS information clearing method according to an embodiment of the present invention, where the embodiment of the present invention may include the following:
s101: the face image of the authorized user is stored in advance.
In this embodiment, the face images of the authorized user may include face images of a plurality of users, and in order to improve the subsequent verification efficiency and the verification accuracy, there may be a plurality of face images of each authorized user, each face image being a face image photographed at a different angle.
S102: when a Clear CMOS operation issuing instruction is detected, the current face image of the issuing instruction user is acquired through the loading image sensor driver.
It can be understood that Clear CMOS operation is user behavior, the system can monitor whether the user has Clear CMOS behavior in real time by identifying Clear behavior identification information, when the user has Clear CMOS operation behavior, the user identity issuing Clear CMOS operation is checked first, and user identity check can be realized by acquiring face images of the current user and face images of authorized users stored in advance in S101.
S103: if the current face image is the face image of the authorized user, executing Clear CMOS operation, clearing the BIOS administrator password stored in the BIOS NVRAM password space, and clearing the clearing behavior identification information of the Clear CMOS operation.
In this application, the BIOS administrator password is pre-stored in the BIOS NVRAM password space, rather than being present in the CMOS chip. When it is determined in S103 that the Clear CMOS operation is an authorized user, it is determined that the user can perform the Clear CMOS operation, and then the BIOS administrator password is cleared, further protecting the BIOS administrator password from accidental deletion. After determining that Clear CMOS operations can be performed, clear behavior identification information identifying whether Clear CMOS operations are available may be cleared to later accurately determine whether Clear CMOS operations are available.
In the technical scheme provided by the embodiment of the invention, when a user executes Clear CMOS operation, a safety protection measure for face recognition is added, and only the user who checks and issues a clearing command is an authorized user, the Clear CMOS operation is determined to be executed, so that not only can the legal user be allowed to execute the Clear CMOS operation, but also the problem of safety vulnerability of an unauthorized user or an invader in the mode of removing a power supply battery or a jump of a mainboard CMOS chip is effectively solved. The safety and reliability of the Clear CMOS operation are improved, so that the safety of user data storage is effectively improved. In addition, the image sensor has become the standard of all-in-one or notebook, so can not bring extra operation burden to the user, and is practical, available, simple and convenient, safe and efficient, realize the safe execution Clear CMOS operation based on the image sensor can satisfy the demand in current market from a plurality of angles such as technique, cost, user experience.
In the above embodiment, how to execute step S101 is not limited, and the method for storing the face image of the authorized user provided in the present embodiment may include the following steps:
and when an image acquisition instruction sent by a user image acquisition mode in the BIOS setting interface is received, loading an image sensor drive and prompting the user to acquire the image. And storing the acquired user face image as an authorized user image in the authorized user image set into an image module flash memory. And according to the received user image acquisition mode exit instruction, exiting the BIOS setting interface and automatically executing restarting operation.
In this step, it is necessary to preset an option of the user image acquisition mode in the BIOS Setup interface, i.e., BIOS Setup, and set in and out two sub options under the option. When a user authorized to execute Clear CMOS operation stores face images of the user in the system, the user can firstly enter a setting interface of the BIOS, click a user image acquisition mode in the setting interface and select an entry option, after the system receives the entry user image acquisition mode, the image sensor is automatically loaded to enable the image sensor to be in a working state, an image acquisition prompt is sent to the user, then the image acquisition operation is started to acquire face images of the current user, various face images can be acquired from multiple angles, and then the acquired face images are stored in a flash memory of an image module. After the image acquisition is completed, the user clicks an exit option in the user image acquisition mode, and the system automatically exits the BIOS setting interface and is restarted so as to ensure that the operation is effective.
In some implementations of the present embodiment, in order to further improve the safety and reliability of the CMOS clearing operation, after storing the collected face image of the user as the authorized user image in the authorized user image set in the image module flash memory, the method may further include:
converting the collected face images of the user at different angles into feature vectors by adopting a feature face technology, and generating a face feature vector set; and extracting corresponding characteristic values from the human face characteristic vector set, carrying out encryption processing on each characteristic value by adopting an encryption algorithm, and storing the human face characteristic vector set after the encryption processing in a BIOS NVRAM. Namely, the authorized face image and the feature vector encrypted by the authorized face image are stored in a partitioned mode, one backup data is added, the safety of the stored data is improved, and the stored data is not easy to steal.
In this embodiment, in order to make the technical solution of the present implementation more clear to those skilled in the art, as shown in fig. 2, this application further provides an illustrative example, which may include:
s11: entering a BIOS Setup interface, selecting a user image acquisition mode, pressing a hot key F10, selecting storage and restarting.
S12: the BIOS loads the image sensor drive, lights the image sensor, and pops up a prompt from the BIOS Setup interface to ask the user to acquire the face. In the face acquisition process, images of the front face, the side face and other angles can be acquired for the user, and each user acquires 4 images, which can be called registration.
S13: after face collection is finished, BIOS stores the registration photo in FLASH of the image sensor module;
s14: the BIOS converts 4 face images with different angles into feature vector sets by adopting a feature face technology according to the registration photo, then extracts corresponding feature values, encrypts the feature values by adopting an SHA1 algorithm, stores the feature values in a BIOS NVRAM, stores the feature values in different areas with the registration photo, and performs data backup.
S15: selecting to exit from a user image acquisition mode on a BIOS Setup interface, pressing a hot key F10, storing and restarting;
from the above, the embodiment of the invention further ensures the safety and reliability of Clear CMOS operation by encrypting and storing the face image of the authorized user in a region-by-region manner.
In the above embodiment, the implementation of the step S102 is not limited, in this embodiment, an implementation of detecting the Clear CMOS operation issue instruction is provided, and in the system power-on stage, the BIOS may determine whether the user has Clear CMOS by detecting whether the CMOS chip has clear_flag and the value of FLAG, and may include the following steps:
in the initial stage of the power-on self-test process, it is determined whether or not clear_flag is present in the CMOS chip for use as CLEAR behavior identification information for CLEAR CMOS operation. If the clear_flag exists in the CMOS chip, reading the value of the clear_flag, and if the value of the clear_flag is an existing identification value such as 0, judging that the CLEAR CMOS operation behavior exists in the user; if the value of clear_flag is the absence of the identification value such as 1, determining that the CLEAR CMOS operation behavior does not exist for the user; if the clear_flag does not exist in the CMOS chip, defining the clear_flag as CLEAR behavior identification information, and initializing the clear_flag as an absence identification value such as 1 to identify that the CLEAR CMOS operation behavior does not exist in the user.
In order to make the technical solution of the present implementation more clear to those skilled in the art, as shown in fig. 3, the present application further provides an illustrative example, which may include:
s21: the system is powered on normally, the start button is pressed, and the BIOS enters the POST (Power On Self Test, power on self-checking) process to perform power on self-checking.
S22: the BIOS reads the value of CLEAR_FLAG in the CMOS chip at the initial stage of the POST process.
S23: if no clear_flag exists, a variable clear_flag is defined and initialized to 1, and the user is assumed to have no CLEAR CMOS behavior.
S24: if there is a CLEAR_FLAG, the value of FLAG is read. If the value is 0, the user is deemed to have the Clear CMOS behavior, otherwise the user is deemed to have no Clear CMOS behavior.
According to the embodiment, the clear_FLAG is set to monitor the behaviors of the CLEAR CMOS, so that the operation is more convenient and easier to realize.
It can be understood that if abnormal conditions such as blurring, incomplete face collection and the like occur in the image collection process, one-time verification cannot be truly verified, and misjudgment phenomenon occurs, namely, the authorized user is originally verified to be an unauthorized user once, multiple times of verification can be performed in order to avoid that the authorized user cannot execute operation, time waste is avoided, data are better protected, verification times are limited, namely, whether the current face image is an authorized user face image in the face image set of the authorized user or not is verified, and whether the times of the face image of the authorized user exceeds a preset time threshold value or not; if yes, the Clear CMOS operation is terminated, the alarm prompt is carried out, and meanwhile, the shutdown operation is automatically carried out. Based on the times, this embodiment also provides an implementation of step S103, please refer to fig. 4, which may include the following steps:
s31: when the CLEAR FLAG is read to be 0, the BIOS recognizes that the CLEAR CMOS operation exists for the user, and triggers the BIOS face recognition procedure. At this point, the BIOS loads the image sensor driver, initializing the image sensor device.
S32: the BIOS Setup interface pops up a prompt to ask the user to conduct face recognition, and meanwhile, the image sensor is lightened to enable the image sensor to be in a working state.
S33: after the user performs face recognition, the BIOS checks whether the user authorization is legal. If the authorization is illegal, the BIOS Setup interface pops up a prompt of "recognition error, please recognize again". After three check opportunities and check failure, the buzzer can alternately alarm for 10S, and the BIOS executes shutdown operation and skips the following steps.
S34: if the authorization is legal, the BIOS Setup interface pops up a prompt 'please confirm whether to execute the Clear CMOS', and inquires the user whether to execute the Clear CMOS again, so as to avoid illegal operation caused by removing the battery. If the user confirms that the selection is no, the Clear CMOS is not executed, the clear_FLAG is reset to 1, and the normal start-up is executed in step S36;
s35, if the user confirms that the selection is yes, the Clear CMOS is executed, and the administrator password stored in the BIOS NVRAM is cleared.
S36, normally starting up.
In this embodiment, by limiting the number of verification, not only can the authorized user be guaranteed to efficiently execute Clear CMOS, but also the occurrence probability of erroneous judgment can be reduced, and the safety of the user for storing data can be further guaranteed.
It should be noted that, in the present application, the steps may be executed simultaneously or in a certain preset order as long as the steps conform to the logic order, and fig. 1-4 are only schematic, and do not represent only such an execution order.
The embodiment of the invention also provides a corresponding device for the CMOS information clearing method, so that the method has more practicability. Wherein the device may be described separately from the functional module and the hardware. The CMOS information removing device according to the embodiment of the present invention will be described below, and the CMOS information removing device described below and the CMOS information removing method described above may be referred to correspondingly.
Based on the angle of the functional modules, referring to fig. 5, fig. 5 is a block diagram of a CMOS information clearing device according to an embodiment of the present invention, where the CMOS information clearing device may include:
the authorized image pre-storage module 501 is configured to pre-store an authorized user face image.
The image acquisition module 502 is configured to, when detecting a Clear CMOS operation issue instruction, acquire a current face image of the issue instruction user by loading an image sensor drive.
The authorization behavior verification module 503 is configured to verify whether the current face image is a face image of an authorized user.
The Clear operation execution module 504 is configured to execute Clear CMOS operations if the current face image is a face image of an authorized user, clear BIOS administrator passwords stored in the BIOS NVRAM password space, and Clear behavior identification information of the Clear CMOS operations.
Optionally, in some implementations of this embodiment, the authorized image pre-storage module 501 may include:
the authorization image acquisition sub-module is used for loading an image sensor drive and prompting a user to acquire an image when receiving an image acquisition instruction sent by a user image acquisition mode in the BIOS setting interface;
the authorization image storage sub-module is used for storing the acquired user face image as an authorization user image in the authorization user image set into the image module flash memory;
and the image acquisition exit sub-module is used for exiting the BIOS setting interface and automatically executing restarting operation according to the received user image acquisition mode exit instruction.
In some other implementations of this embodiment, the authorized image pre-storage module 501 may further include:
the feature processing sub-module is used for converting the collected face images of the user at different angles into feature vectors by adopting a feature face technology to generate a face feature vector set;
the encryption sub-module is used for extracting corresponding characteristic values from the face characteristic vector set and carrying out encryption processing on each characteristic value by adopting an encryption algorithm;
and the storage sub-module is used for storing the encrypted face feature vector set in the BIOS NVRAM.
Optionally, in other implementations of the present embodiment, the apparatus may further include:
the image acquisition module includes clear action detection submodule, and clear action detection submodule includes:
the identification judging unit is used for judging whether the clear_FLAG exists in the CMOS chip in the initial stage of the power-on self-checking process;
the behavior judging unit is used for reading the value of the clear_FLAG if the clear_FLAG exists in the CMOS chip, and judging that the CLEAR CMOS operation behavior exists for the user if the value of the clear_FLAG is the existence identification value; if the value of clear_flag is the non-existence identification value, judging that the user does not exist CLEAR CMOS operation behavior; if the clear_flag does not exist in the CMOS chip, defining the clear_flag as CLEAR behavior identification information, and initializing the clear_flag as an absence identification value to identify that the CLEAR CMOS operation behavior does not exist in the user.
As an alternative embodiment, the device may further comprise, for example:
the multiple verification module is used for verifying whether the current face image is the authorized user face image in the authorized user face image set or not and whether the number of times of the authorized user face images exceeds a preset number threshold;
and the verification failure processing module is used for stopping Clear CMOS operation execution if the number of times of verifying whether the current face image is the face image of the authorized user in the face image set of the authorized user exceeds a preset number threshold, and carrying out alarm prompt and simultaneously automatically executing shutdown operation.
The functions of each functional module of the CMOS information clearing device according to the embodiment of the present invention may be specifically implemented according to the method in the embodiment of the method, and the specific implementation process may refer to the related description of the embodiment of the method, which is not repeated herein.
Therefore, the embodiment of the invention can safely and reliably execute Clear CMOS operation, and effectively improves the safety of user data storage.
The above-mentioned CMOS information clearing device is described from the viewpoint of functional modules, and further, the present application also provides a CMOS information clearing device, which is described from the viewpoint of hardware. Fig. 6 is a block diagram of another CMOS information clearing device according to an embodiment of the present application. As shown in fig. 6, the apparatus comprises a memory 60 for storing a computer program;
a processor 61 for implementing the steps of the CMOS information cleaning method as mentioned in any of the above embodiments when executing a computer program.
Processor 61 may include one or more processing cores, such as a 4-core processor, an 8-core processor, etc. The processor 61 may be implemented in at least one hardware form of DSP (Digital Signal Processing ), FPGA (Field-Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array ). The processor 61 may also include a main processor, which is a processor for processing data in an awake state, also called a CPU (Central Processing Unit ), and a coprocessor; a coprocessor is a low-power processor for processing data in a standby state. In some embodiments, the processor 61 may integrate a GPU (Graphics Processing Unit, image processor) for rendering and drawing of content required to be displayed by the display screen. In some embodiments, the processor 61 may also include an AI (Artificial Intelligence ) processor for processing computing operations related to machine learning.
Memory 60 may include one or more computer-readable storage media, which may be non-transitory. Memory 60 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In this embodiment, the memory 60 is at least used for storing a computer program 601, which, when loaded and executed by the processor 61, is capable of implementing the relevant steps of the CMOS information cleaning method disclosed in any of the foregoing embodiments. In addition, the resources stored in the memory 60 may further include an operating system 602, data 603, and the like, where the storage manner may be transient storage or permanent storage. The operating system 602 may include Windows, unix, linux, among other things. The data 603 may include, but is not limited to, data corresponding to test results, and the like.
In some embodiments, the CMOS information clearing device may further include a display 62, an input/output interface 63, a communication interface 64, a power supply 65, and a communication bus 66.
Those skilled in the art will appreciate that the configuration shown in fig. 6 is not limiting of the CMOS information cleaning device and may include more or fewer components than shown, such as the sensor 67.
The functions of each functional module of the CMOS information clearing device according to the embodiment of the present invention may be specifically implemented according to the method in the embodiment of the method, and the specific implementation process may refer to the related description of the embodiment of the method, which is not repeated herein.
Therefore, the embodiment of the invention can safely and reliably execute Clear CMOS operation, and effectively improves the safety of user data storage.
It will be appreciated that the CMOS information clearing method of the above embodiments may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a stand alone product. Based on such understanding, the technical solution of the present application may be embodied essentially or in part or all of the technical solution contributing to the prior art, or in a software product stored in a storage medium, performing all or part of the steps of the methods of the various embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random-access Memory (Random Access Memory, RAM), an electrically erasable programmable ROM, registers, a hard disk, a removable disk, a CD-ROM, a magnetic disk, or an optical disk, etc. various media capable of storing program codes.
Based on this, an embodiment of the present invention further provides a computer readable storage medium storing a CMOS information cleaning program, where the CMOS information cleaning program is executed by a processor, and the steps of the CMOS information cleaning method according to any one of the above embodiments are described.
The functions of each functional module of the computer readable storage medium according to the embodiments of the present invention may be specifically implemented according to the method in the embodiments of the method, and the specific implementation process may refer to the relevant description of the embodiments of the method, which is not repeated herein.
Therefore, the embodiment of the invention can safely and reliably execute Clear CMOS operation, and effectively improves the safety of user data storage.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different point from other embodiments, so that the same or similar parts between the embodiments are referred to each other. For the device disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the relevant points refer to the description of the method section.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative elements and steps are described above generally in terms of functionality in order to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The above describes in detail a method, apparatus and computer readable storage medium for CMOS information removal provided in the present application. The principles and embodiments of the present invention have been described herein with reference to specific examples, the description of which is intended only to facilitate an understanding of the method of the present invention and its core ideas. It should be noted that it would be obvious to those skilled in the art that various improvements and modifications can be made to the present application without departing from the principles of the present invention, and such improvements and modifications fall within the scope of the claims of the present application.

Claims (10)

1. A CMOS information clearing method, comprising:
pre-storing face images of authorized users; the face image of the authorized user is stored in a FLASH of the image sensor;
in the initial stage of the POST process, when a Clear CMOS operation issuing instruction is detected, the BIOS acquires the current face image of the user by loading an image sensor driver; the loading the image sensor drive to collect the current face image of the user comprises the following steps: the BIOS loads the image sensor drive, the BIOS sets an interface to pop up a prompt, asks the user to carry out face recognition, and simultaneously lightens the image sensor to enable the image sensor to be in a working state;
if the current face image is the face image of the authorized user, executing the Clear CMOS operation, clearing the BIOS administrator password stored in the BIOS NVRAM password space, clearing the clearing behavior identification information of the Clear CMOS operation, and normally starting; wherein, the BIOS administrator password is pre-stored in the BIOS NVRAM password space.
2. The CMOS information clearing method according to claim 1, wherein said storing the authorized user face image comprises:
when an image acquisition instruction sent by a user image acquisition mode in a BIOS setting interface is received, loading an image sensor drive and prompting a user to acquire an image;
the collected face images of the user are used as authorized user images in an authorized user image set to be stored in an image module flash memory;
and according to the received user image acquisition mode exit instruction, exiting the BIOS setting interface and automatically executing restarting operation.
3. The CMOS information clearing method according to claim 2, wherein after storing the collected face image of the user as an authorized user image in the authorized user image set in the image module flash memory, further comprising:
converting the collected face images of the user at different angles into feature vectors by adopting a feature face technology, and generating a face feature vector set;
and extracting corresponding characteristic values from the face characteristic vector set, carrying out encryption processing on each characteristic value by adopting an encryption algorithm, and storing the face characteristic vector set after the encryption processing in a BIOS NVRAM.
4. The CMOS information clearing method according to claim 1, wherein after said performing the Clear CMOS operation and clearing the Clear CMOS operation identification information if the current face image is a face image of an authorized user, further comprising:
checking whether the current face image is the face image of the authorized user in the face image set of the authorized user or not and whether the number of times of the face image of the authorized user exceeds a preset number threshold;
if yes, stopping executing the Clear CMOS operation, and carrying out alarm prompt, and simultaneously automatically executing shutdown operation.
5. The CMOS information clearing method according to any one of claims 1 to 4, wherein said detecting Clear CMOS operation issue instruction includes:
judging whether the CLEAR_FLAG exists in the CMOS chip or not in the initial stage of the power-on self-checking process;
if yes, reading the clear_flag value, and if the clear_flag value is a presence identification value, judging that CLEAR CMOS operation behaviors exist for a user; if the value of the clear_flag is the non-existence identification value, judging that the CLEAR CMOS operation behavior does not exist in the user;
if not, defining the clear_flag as CLEAR behavior identification information, and initializing the clear_flag as an absence identification value to identify that CLEAR CMOS operation behavior exists for the user.
6. A CMOS information clearing device, comprising:
the authorization image pre-storage module is used for pre-storing the face image of the authorized user; the face image of the authorized user is stored in a FLASH of the image sensor;
the image acquisition module is used for acquiring the current face image of the user by loading the image sensor driver when the BIOS detects that Clear CMOS operation issues an instruction in the initial stage of the POST process; the loading the image sensor drive to collect the current face image of the user comprises the following steps: the BIOS loads the image sensor drive, the BIOS sets an interface to pop up a prompt, asks the user to carry out face recognition, and simultaneously lightens the image sensor to enable the image sensor to be in a working state;
the authorization behavior verification module is used for verifying whether the current face image is the face image of the authorized user;
the Clear operation execution module is used for executing the Clear CMOS operation if the current face image is the face image of the authorized user, clearing the BIOS administrator password stored in the BIOS NVRAM password space, clearing the Clear behavior identification information of the Clear CMOS operation and normally starting; wherein, the BIOS administrator password is pre-stored in the BIOS NVRAM password space.
7. The CMOS information clearing device according to claim 6, wherein the authorized image pre-storage module comprises:
the authorization image acquisition sub-module is used for loading the image sensor drive and prompting a user to acquire an image when receiving an image acquisition instruction sent by a user image acquisition mode in the BIOS setting interface;
the authorization image storage sub-module is used for storing the acquired user face image as an authorization user image in the authorization user image set into the image module flash memory;
and the image acquisition exit sub-module is used for exiting the BIOS setting interface and automatically executing restarting operation according to the received user image acquisition mode exit instruction.
8. The CMOS information clearing device according to claim 6 or 7, wherein the image acquisition module comprises a clearing behavior detection sub-module comprising:
the identification judging unit is used for judging whether the clear_FLAG exists in the CMOS chip in the initial stage of the power-on self-checking process;
the behavior judging unit is used for reading the value of the clear_FLAG if the clear_FLAG exists in the CMOS chip, and judging that the CLEAR CMOS operation behavior exists for the user if the value of the clear_FLAG is the existence identification value; if the value of the clear_flag is the non-existence identification value, judging that the CLEAR CMOS operation behavior does not exist in the user; if the clear_flag does not exist in the CMOS chip, defining the clear_flag as CLEAR behavior identification information, and initializing the clear_flag as an absence identification value so as to identify that CLEAR CMOS operation behaviors exist for a user.
9. A CMOS information cleaning device comprising a processor for implementing the steps of the CMOS information cleaning method according to any one of claims 1 to 5 when executing a computer program stored in a memory.
10. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a CMOS information removal program which, when executed by a processor, implements the steps of the CMOS information removal method according to any one of claims 1 to 5.
CN202010986926.8A 2020-09-18 2020-09-18 CMOS information clearing method, device and computer readable storage medium Active CN112130903B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010986926.8A CN112130903B (en) 2020-09-18 2020-09-18 CMOS information clearing method, device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010986926.8A CN112130903B (en) 2020-09-18 2020-09-18 CMOS information clearing method, device and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN112130903A CN112130903A (en) 2020-12-25
CN112130903B true CN112130903B (en) 2023-07-14

Family

ID=73841359

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010986926.8A Active CN112130903B (en) 2020-09-18 2020-09-18 CMOS information clearing method, device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN112130903B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113918929A (en) * 2021-09-29 2022-01-11 浪潮(山东)计算机科技有限公司 Method and device for clearing password and computer

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108229179A (en) * 2018-01-31 2018-06-29 郑州云海信息技术有限公司 A kind of method, apparatus, equipment and storage medium for improving security of system
CN109598125A (en) * 2018-11-28 2019-04-09 北京可信华泰信息技术有限公司 A kind of safe starting method
CN109886003A (en) * 2019-02-28 2019-06-14 苏州浪潮智能科技有限公司 A kind of method for managing user right, system and associated component

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5542077A (en) * 1993-09-10 1996-07-30 Compaq Computer Corporation Personal computer with CMOS memory not having a separate battery
CN1282051C (en) * 2003-09-29 2006-10-25 深圳市研祥智能科技股份有限公司 Safety industrial control system with fingerprint encryption
TW200816048A (en) * 2006-09-20 2008-04-01 Inventec Corp Method for clearing password of basic input/output system
CN101770552B (en) * 2008-12-31 2012-07-04 北京联想软件有限公司 Method for clearing computer password, computer and system for clearing computer password

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108229179A (en) * 2018-01-31 2018-06-29 郑州云海信息技术有限公司 A kind of method, apparatus, equipment and storage medium for improving security of system
CN109598125A (en) * 2018-11-28 2019-04-09 北京可信华泰信息技术有限公司 A kind of safe starting method
CN109886003A (en) * 2019-02-28 2019-06-14 苏州浪潮智能科技有限公司 A kind of method for managing user right, system and associated component

Also Published As

Publication number Publication date
CN112130903A (en) 2020-12-25

Similar Documents

Publication Publication Date Title
US8914767B2 (en) Systems and methods for using quick response codes to activate software applications
CN102509046B (en) The operating system effectively measured with the overall situation of dormancy support is started
CN109409050B (en) Protection system including machine learning snapshot evaluation
CN104579670A (en) Mobile terminal authentication method and mobile terminal
CN105453103A (en) Secure OS boot as per reference platform manifest and data sealing
US11080970B2 (en) End user protection against ATM keypad overlay
CN110598384B (en) Information protection method, information protection device and mobile terminal
CN112130903B (en) CMOS information clearing method, device and computer readable storage medium
US11874925B2 (en) Data processing method for coping with ransomware, program for executing the method, and computer-readable recording medium storing the program
CN112835628A (en) Server operating system booting method, device, equipment and medium
CN113806811A (en) Method and device for automatically recovering tampered firmware and storage medium
CN111831976A (en) Linux operating system-based copyright protection method and equipment
WO2019239121A1 (en) Key protection device
CN112287713A (en) Two-dimensional code identification method and device
CN108668310B (en) Control method of detection device, detection device and storage medium
CN108597154B (en) Safe starting system and starting method for communication module of Internet of things and POS machine
CN110248181A (en) External equipment self-resetting method, device, system and computer-readable medium
EP3244375B1 (en) Microcontroller for secure starting with firewall
CN105474228A (en) Automatic pairing of IO devices with hardware secure elements
KR20230100368A (en) Service providing system and method for proividing parking warning, service providing apparatus therefor and non-transitory computer readable medium having computer program recorded thereon
JP2010073112A (en) Face collating system
CN108804892A (en) Electronic device
CN112464203A (en) Data format detection method based on intelligent password key application interface and electronic equipment
CN107846391B (en) Login authentication method, device and system for application
CN116796382A (en) Screen display control method, storage medium and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240702

Address after: 2324, Building 1, Aosheng Building, No. 1166 Xinluo Street, High tech Zone, Jinan City, Shandong Province, 250000

Patentee after: Inspur Computer Technology Co.,Ltd.

Country or region after: China

Address before: 35th floor, S01 building, Inspur science and Technology Park, 1036 Inspur Road, Jinan area, Jinan pilot Free Trade Zone, Jinan City, Shandong Province

Patentee before: Shandong Yunhai guochuang cloud computing equipment industry innovation center Co.,Ltd.

Country or region before: China