FIELD: information technology.
SUBSTANCE: before booting a resident operating system (ROS), execution of a series of instructions is set, which, according to the address in random access memory (RAM) of the personal computer of the boot code of the primary operating system, through which it is booted from a real boot device (FDD, HDD, CDROM, USB, Network), establishes the break point such that its triggering will be handled by the corresponding code in the BIOS extension, wherein the minimum boot code of the primary operating system and information on the real boot device are stored in the RAM of the personal computer. Returning management of the computer BIOS is carried out only after performing this preparatory operation. Further, upon triggering of the break point, the first instruction of the boot code to switch to the ROS boot device is changed, the ROS is booted from memory of the information security equipment, and the security task is launched (checking integrity, identification/authentication etc), at the end of which a program to enter into normal mode of operation of the personal computer is executed.
EFFECT: broader functional capabilities of a personal computer through information security equipment having non-volatile memory circuits and its own BIOS extension circuit.
4 cl
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR SECURE EXTENSION OF FUNCTIONS OF INFORMATION SECURITY HARDWARE | 2014 |
|
RU2574347C2 |
METHOD FOR PROTECTING COMPUTER | 2016 |
|
RU2628142C1 |
TRUSTED COMPUTING SYSTEM WITH MULTILEVEL SECURITY SYSTEM | 2023 |
|
RU2816097C1 |
APPARATUS FOR CREATING TRUSTED ENVIRONMENT FOR COMPUTERS OF INFORMATION COMPUTER SYSTEMS | 2013 |
|
RU2538329C1 |
DEVICE FOR PROTECTING INFORMATION FROM UNSANCTIONED ACCESS FOR COMPUTERS OF INFORMATIONAL AND COMPUTING SYSTEMS | 2006 |
|
RU2321055C2 |
DEVICE TO CREATE TRUSTED EXECUTION ENVIRONMENT FOR SPECIAL PURPOSE COMPUTERS | 2014 |
|
RU2569577C1 |
DEVICE FOR PROTECTION AGAINST UNAUTHORIZED ACCESS TO INFORMATION THAT IS STORED IN PERSONAL COMPUTER | 1995 |
|
RU2067313C1 |
METHOD FOR PROTECTION OF PERSONAL COMPUTER AGAINST UNAUTHORIZED ACCESS AND DEVICE WHICH IMPLEMENTS SAID METHOD | 1997 |
|
RU2126168C1 |
METHOD OF ACCESSING PROCEDURES OF LOADING DRIVER | 2014 |
|
RU2586576C1 |
DEVICE FOR PROTECTING INFORMATION STORED IN PERSONAL COMPUTERS | 1995 |
|
RU2099779C1 |
Authors
Dates
2013-02-20—Published
2011-09-07—Filed