CN105005721B - Computer mandate opening control system and method based on computer booting key - Google Patents

Computer mandate opening control system and method based on computer booting key Download PDF

Info

Publication number
CN105005721B
CN105005721B CN201510358601.4A CN201510358601A CN105005721B CN 105005721 B CN105005721 B CN 105005721B CN 201510358601 A CN201510358601 A CN 201510358601A CN 105005721 B CN105005721 B CN 105005721B
Authority
CN
China
Prior art keywords
computer
control device
authorization control
encryption information
booting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510358601.4A
Other languages
Chinese (zh)
Other versions
CN105005721A (en
Inventor
董科
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201510358601.4A priority Critical patent/CN105005721B/en
Publication of CN105005721A publication Critical patent/CN105005721A/en
Application granted granted Critical
Publication of CN105005721B publication Critical patent/CN105005721B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses computer mandate opening control systems and method based on computer booting key;Including:Computer motherboard, computer booting key is connect with computer authorization control device, the computer operation condition detection unit interface of the computer authorization control device and the power supply interface of computer motherboard and standby power interface connect, and the coding output interface of the computer authorization control device and the decoding interface of computer motherboard connect;Computer booting key is identified in the computer authorization control device, read out the encryption information of computer booting key, and encryption information is matched with the encryption information to prestore in computer authorization control device, if successful match, just power-on instruction is sent out to computer motherboard, if it fails to match, unauthorized is shown by computer authorization control device, so as to reach by that just can determine whether computer is switched on only by computer authorization control device.

Description

Computer mandate opening control system and method based on computer booting key
Technical field
The present invention relates to a kind of computer mandate opening control systems and method based on computer booting key.
Background technology
With the progress and development in epoch, computer becomes the work that people become more and more important in daily working and learning Tool, extensive use and all trades and professions have also shown its shortcoming or even its negative work while it brings convenience for us With, such as the safety of its information, data, the operating time can not be controlled etc..Although there are many safety measures at present, such as Startup password, nearly 300 sections of encryption softwares are set.But these methods all seem very powerless, even draw a snake and add feet to it.It is one slight U disks can crack, and those security softwares are just even more meaningless, the software based on operating system, as long as system is changed Just without any effect.
For this problem of computer security, have become an old problem and can not thoroughly solve the problems, such as always. Various security softwares, various startup passwords.Finally being cracked slowly during practical application, is eliminated.To find out its cause, Or because it be based on computer in itself or based on system, be based on bios.When system and bios have no longer been problems It waits, these so-called so-called safety measures of encryption are equal to " zero ".
The prior art is primarily present following technological deficiency:
First, it is authenticated after computer energization work, if authentification failure, computer rests on working condition or anti- Multiple restarting carries out repeating certification, is easy to cause computer service life reduction or hardware damage;
Second, it is easily cracked, some lawless peoples brush the bios information after malicious modification again into computer, encryption Method fails, and computer loses safeguard protection, be easy to cause loss of data or deleted by lawless people, monitors;Such as:Bios is set Startup password is put.System is provided with user password.System is mounted with a variety of encryption softwares.One password cracking u disk plugs weight It opens, bios passwords will be cleared.Encryption software.Startup password.Can usb-hdd be selected by boot disk.Get out one A mobile hard disk that system is pre-installed.Into the system of u disks.Data can be deleted by copy.
Third, the encryption method based on mainboard bios program are easily distorted by hacker or virus.Virus CIH prevailing for a time It exactly specially rewrites bios and burns the virus of hardware.
Invention content
The purpose of the present invention is exactly to solve the above-mentioned problems, to provide a kind of computer based on computer booting key and award Opening control system and method are weighed, it has the advantages that with no authorized cannot be switched on.
To achieve these goals, the present invention adopts the following technical scheme that:
Computer mandate opening control system based on computer booting key, including:Computer motherboard, computer mandate Control device and computer booting key, computer authorization control device are the peripheral equipments of computer, are that can work independently 's;
Wherein computer booting key is connect with computer authorization control device, the meter of the computer authorization control device The power supply interface and standby power interface of calculation machine condition monitoring unit interface and computer motherboard connect, and the computer is awarded The decoding interface of coding output interface and computer motherboard for weighing control device connects;
Computer booting key is identified in the computer authorization control device, reads out computer booting key Encryption information, and encryption information is matched with the encryption information to prestore in computer authorization control device, if matching into Work(just sends out power-on instruction to computer motherboard, if it fails to match, is shown by computer authorization control device and not awarded Power, so as to before reaching electricity on computers, just determine whether computer is switched on only by computer authorization control device.
Prevent unauthorized user from contacting any information of computer, including bios information.
The power supply interface of the computer motherboard refers to+12V and GND interfaces.
The standby power interface of the computer motherboard refers to+5VSB.
The computer authorization control device includes:
Main control unit, the main control unit respectively with computer starting unit, supply unit, electron key interface, access Database of record, liquid crystal display, coding module, data selector, clock module, input keyboard, sim module, alarm unit, Computer operation condition detection unit connects, the computer operation condition detection unit and computer operation condition detection unit Interface connects, and the coding module is connect with coding output interface.
The main control unit, microcontroller or ARM or SOC, the autonomous system write, for inside computer booting key Encryption information be identified, then judge encryption information whether with access database of record in encryption information match, output Matching result.
The computer starting unit, for sending out enabled instruction to computer.It is sent out after being encoded by coding module, then It is obtained after being decoded by decoder module, makes computer booting or soft-off.
The supply unit, for providing stand-by power supply to main control unit and clock module, the supply unit is stores Battery.
The electron key interface, for being connect with computer booting key.
The access database of record, for the available machine time of record manager and user, unused time, modification time; It is additionally operable to storage encryption information and Administrator mode initialisation state.
The liquid crystal display, is prompted for operating right, and Administrator is shown.In start process, to open state Carry out real-time display.
The coding module, for carrying out self-defined form coding to power-on instruction.
The data selector accesses the selection of data channel and function selection for the authorized person of different rights.With Control model, such as intranet and extranet is selected to set, whether using fingerprint recognition and different rights owner access data in manager Channel selecting.
The clock module, for proofreading the time of main control unit.
The input keyboard inputs information for manager.
The sim module, for sending random verification code to user in the form of short message.
The alarm unit is audio loudspeaker or buzzer;
The computer operation condition detection unit is connect with computer operation condition detection unit interface.
The computer operation condition detection unit interface, for connecting computer operation condition detection unit and calculating Machine.
The coding output interface, for being connect with coding module.
Computer mandate start-up control method based on computer booting key, includes the following steps:
Step (1):Computer booting key is inserted into computer authorization control device;
Step (2):Computer authorization control device receives extraneous power-on instruction;
Step (3):The main control unit of computer authorization control device reads computer authorization control device and pre-sets letter Breath;
Step (4):Computer authorization control device starts that computer booting key is identified, and identifies that computer is opened The encryption information and identity information to prestore inside machine key;
Step (5):The encryption information of judgment step (4) is with accessing whether the encryption information in database of record matches, such as Fruit is to enter step (6), if otherwise computer authorization control device refusal booting, prompts unauthorized;
Step (6):According to the identity information of step (4), the authority levels of user are judged, if administrator is put into pipe The data channel of reason person is included in step (7) if administrator needs to be configured computer authorization control device, if pipe Reason person needs unlatching computer then to enter step (9);If user is put into subscriber channel, i.e. step (8);
Step (7):Administrator is configured computer authorization control device, return to step (3);
Step (8):Random verification code is sent to the mobile phone of user in the form of short message by sim module, user is to calculating Machine authorization control device input validation code;It enters step (9);
Step (9):Power-on instruction is encrypted in computer authorization control device, after being encrypted to computer or after coding Power-on instruction;Computer is decrypted or decodes to power-on instruction, obtains power-on instruction;Computer booting.
The step of step (5), includes:
Step (5-1):The head eight-digit number word of encryption information is first read, head eight-digit number word and self-defined eight-digit number word are carried out Or operation;
Step (5-2):By or operation after obtained data with accessing the first group encryption information to prestore in database of record It is compared;The computer authorization control device refusal booting if failure is compared;(5- is entered step if comparing successfully 3);
Step (5-3):After comparing successfully, remaining 248 bit digital is read out, after reading, by 248 bit digitals with visiting Ask that the second group encryption information to prestore in database of record is compared.
The step (7) be configured including:Carry out time setting, operating right is set, control model is set and inside and outside Net setting.
The control model setting includes fingerprint recognition setting, sim module opens setting.
Beneficial effects of the present invention:
The computer authorization control device of 1 present invention is the independent device being totally independent of except computer body, and The work for judging whether booting of computer authorization control device is that electricity is completed before on computers, that is to say, that computer Booting, which is not still switched on, to be determined by the peripheral equipment computer authorization control device of computer, will not involve computer In bios programs.
2 give computer user one mandate.Grantee can operate with computer according to authority levels, and nothing is awarded Power person cannot then open computer.
3 operating systems be it is independent detect other system, be not controlled by computer in itself, it is complete with computer operating system It is detached from.
4 can individually authorize, it is multiple mandate and it is grading authorized.
5 have many units to have different operators for a computer.Each operator can set different grades Not.Hardware is completely independent, and is not interfere with each other.
6 intranet and extranet switch, it is only necessary to which different mandates is resetted automatically, and cuts different systems.Shielding is not authorized to Data.These operations completely disengage computer operating system.
7 equipment have black box function.Each licensee in 1 year can be recorded and use the opening computer time, Unused time, the setting carried out including highest administrator.Data are stored in for a reading mode in storage unit.
Description of the drawings
Fig. 1 is the device of the invention structure diagram;
Fig. 2 is the computer authorization control apparatus structure schematic diagram of the present invention;
Fig. 3 is the main flow schematic diagram of the present invention;
Fig. 4 judges encryption information and the whether matched sub-process figure of encryption information in database for the present invention's.
Specific embodiment
The invention will be further described with embodiment below in conjunction with the accompanying drawings.
As shown in Figure 1, the computer mandate opening control system based on computer booting key, including:Computer motherboard, Computer authorization control device and computer booting key, wherein computer booting key connect with computer authorization control device It connects, the computer operation condition detection unit interface of the computer authorization control device and+the 12V ,+5VS of computer motherboard It is connected with GND interfaces, the coding output interface of the computer authorization control device and the decoding interface of computer motherboard connect;
Computer booting key is identified in the computer authorization control device, reads out computer booting key Encryption information, and encryption information is matched with the encryption information to prestore in computer authorization control device, if matching into Work(just sends out power-on instruction to computer motherboard, if it fails to match, is shown by computer authorization control device and not awarded Power, so as to reach by determining whether computer is switched on only by computer authorization control device, prevents unwarranted User contacts any information of computer, including bios information.
Institute includes as shown in Fig. 2, stating computer authorization control device:Main control unit, the main control unit respectively with calculating Machine start unit, electron key interface, accesses database of record, liquid crystal display, coding module, data selection at supply unit Device, clock module, input keyboard, sim module, alarm unit, the connection of computer operation condition detection unit, the computer fortune Row state detection unit is connect with computer operation condition detection unit interface, and the coding module connects with coding output interface It connects.
The main control unit, microcontroller or ARM or SOC, for being carried out to the encryption information inside computer booting key Identification, then judges whether encryption information matches with accessing the encryption information in database of record, exports matching result.The meter Calculation machine start unit, for sending out enabled instruction to computer.The supply unit, for powering to main control unit, the electricity Source device is accumulator.The electron key interface, for being connect with computer booting key.The access database of record, For the available machine time of record manager and user, unused time, modification time;It is additionally operable to storage encryption information.The liquid crystal Display screen, in start process, real-time display to be carried out to open state.The coding module, for being carried out to power-on instruction Coding.The data selector selects control model for manager, for example, intranet and extranet setting, whether using fingerprint recognition and Operator's permission.The clock module, for proofreading the time of main control unit.The input keyboard is inputted for manager and is believed Breath.The sim module, for sending random verification code to user in the form of short message.The alarm unit is loud speaker or bee Ring device;The computer operation condition detection unit is connect with computer operation condition detection unit interface.The computer fortune Row state detection unit interface, for connecting computer operation condition detection unit and computer.The coding output interface is used It is connect in coding module.
As shown in figure 3, the computer mandate start-up control method based on computer booting key, includes the following steps:
Step (1):Computer booting key is inserted into computer authorization control device;
Step (2):Computer authorization control device receives extraneous power-on instruction;
Step (3):The main control unit of computer authorization control device reads computer authorization control device and pre-sets letter Breath;
Step (4):Computer authorization control device starts that computer booting key is identified, and identifies that computer is opened The encryption information and identity information to prestore inside machine key;
Step (5):The encryption information of judgment step (4) is with accessing whether the encryption information in database of record matches, such as Fruit is to enter step (6), if otherwise computer authorization control device refusal booting, prompts unauthorized;
Step (6):According to the identity information of step (4), the authority levels of user are judged, if administrator is put into pipe The data channel of reason person is included in step (7) if administrator needs to be configured computer authorization control device, if pipe Reason person needs unlatching computer then to enter step (9);If user is put into subscriber channel, i.e. step (8);
Step (7):Administrator is configured computer authorization control device, return to step (3);Be configured including: Carry out time setting, operating right setting, control model setting and intranet and extranet setting.
Step (8):Random verification code is sent to the mobile phone of user in the form of short message by sim module, user is to calculating Machine authorization control device input validation code;It enters step (9);
Step (9):Power-on instruction is encrypted in computer authorization control device, after being encrypted to computer or after coding Power-on instruction;Computer is decrypted or decodes to power-on instruction, obtains power-on instruction;Computer booting.
As shown in figure 4, the step of step (5), includes:
Step (5-1):The head eight-digit number word of encryption information is first read, head eight-digit number word and self-defined eight-digit number word are carried out Or operation;
Step (5-2):By or operation after obtained data with accessing the first group encryption information to prestore in database of record It is compared;The computer authorization control device refusal booting if failure is compared;(5- is entered step if comparing successfully 3);
Step (5-3):After comparing successfully, remaining 248 bit digital is read out, after reading, by 248 bit digitals with visiting Ask that the second group encryption information to prestore in database of record is compared.
Above-mentioned, although the foregoing specific embodiments of the present invention is described with reference to the accompanying drawings, not protects model to the present invention The limitation enclosed, those skilled in the art should understand that, based on the technical solutions of the present invention, those skilled in the art are not Need to make the creative labor the various modifications or changes that can be made still within protection scope of the present invention.

Claims (6)

1. the computer mandate start-up control method based on computer booting key, it is characterized in that, include the following steps:
Step (1):Computer booting key is inserted into computer authorization control device;Computer authorization control device is computer Peripheral equipment, can work independently;
Step (2):Computer authorization control device receives extraneous power-on instruction;
Step (3):The main control unit of computer authorization control device reads computer authorization control device and pre-sets information;
Step (4):Computer authorization control device starts that computer booting key is identified, and identifies computer booting key The encryption information and identity information that spoon the inside prestores;
Step (5):Whether the encryption information of judgment step (4) matches with the encryption information in access database of record, if (6) are then entered step, otherwise the booting of computer authorization control device refusal, prompts unauthorized;On computers before electricity, only Just it can determine whether computer is switched on by computer authorization control device;
The step of step (5), includes:
Step (5-1):The head eight-digit number word of encryption information is first read, head eight-digit number word and self-defined eight-digit number word are carried out or grasped Make;
Step (5-2):By or operation after obtained data carried out with accessing the first group encryption information to prestore in database of record It compares;The computer authorization control device refusal booting if failure is compared;It is entered step if comparing successfully (5-3);
Step (5-3):After comparing successfully, remaining 248 bit digital is read out, after reading, 248 bit digitals are remembered with accessing The the second group encryption information to prestore in record database is compared;
Step (6):According to the identity information of step (4), the authority levels of user are judged, if administrator is put into administrator Data channel, step (7) is included in if administrator needs to be configured computer authorization control device, if administrator Unlatching computer is needed then to enter step (9);If user is put into subscriber channel, i.e. step (8);
Step (7):Administrator is configured computer authorization control device, return to step (3);The step (7) is set Put including:Carry out time setting, operating right setting, control model setting and intranet and extranet setting;The control model setting packet Include fingerprint recognition setting, sim module opens setting;
Step (8):Random verification code is sent to the mobile phone of user in the form of short message by sim module, user awards to computer Weigh control device input validation code;It enters step (9);
Step (9):Power-on instruction is encrypted in computer authorization control device, the booting after being encrypted to computer or after coding Instruction;Computer is decrypted or decodes to power-on instruction, obtains power-on instruction;Computer booting.
2. the method as described in claim 1, it is characterized in that, system includes used by this method:Computer motherboard, computer Authorization control device and computer booting key;
Wherein computer booting key is connect with computer authorization control device, the computer of the computer authorization control device The power supply interface and standby power interface of condition monitoring unit interface and computer motherboard connect, the computer mandate control The coding output interface of device processed and the decoding interface of computer motherboard connect;
Computer booting key is identified in the computer authorization control device, reads out the encryption of computer booting key Information, and encryption information is matched with the encryption information to prestore in computer authorization control device, if successful match, just Power-on instruction is sent out to computer motherboard, if it fails to match, unauthorized is shown by computer authorization control device.
3. method as claimed in claim 2, it is characterized in that, the computer authorization control device includes:
Main control unit, the main control unit record respectively with computer starting unit, supply unit, electron key interface, access Database, liquid crystal display, coding module, data selector, clock module, input keyboard, sim module, alarm unit, calculating Machine condition monitoring unit connects, the computer operation condition detection unit and computer operation condition detection unit interface Connection, the coding module are connect with coding output interface.
4. method as claimed in claim 3, it is characterized in that, the main control unit, including:Microcontroller, ARM or SOC, for pair Whether the encryption information inside computer booting key is identified, then judge encryption information with accessing in database of record Encryption information matches, and exports matching result;
The computer starting unit, for sending out enabled instruction to computer;
The supply unit, for powering to main control unit, the supply unit is accumulator;
The electron key interface, for being connect with computer booting key.
5. method as claimed in claim 3, it is characterized in that,
The access database of record, for the available machine time of record manager and user, unused time, modification time;Also use In storage encryption information;
The liquid crystal display, in start process, real-time display to be carried out to open state;
The coding module, for being encoded to power-on instruction;
The data selector selects control model for manager, including:Intranet and extranet setting, whether using fingerprint recognition and Operator's permission.
6. method as claimed in claim 3, it is characterized in that,
The clock module, for proofreading the time of main control unit;
The input keyboard inputs information for manager;
The sim module, for sending random verification code to user in the form of short message;
The alarm unit is loud speaker or buzzer.
CN201510358601.4A 2015-06-25 2015-06-25 Computer mandate opening control system and method based on computer booting key Expired - Fee Related CN105005721B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510358601.4A CN105005721B (en) 2015-06-25 2015-06-25 Computer mandate opening control system and method based on computer booting key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510358601.4A CN105005721B (en) 2015-06-25 2015-06-25 Computer mandate opening control system and method based on computer booting key

Publications (2)

Publication Number Publication Date
CN105005721A CN105005721A (en) 2015-10-28
CN105005721B true CN105005721B (en) 2018-07-06

Family

ID=54378390

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510358601.4A Expired - Fee Related CN105005721B (en) 2015-06-25 2015-06-25 Computer mandate opening control system and method based on computer booting key

Country Status (1)

Country Link
CN (1) CN105005721B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108397046B (en) * 2018-04-23 2023-08-29 深圳市易联网络技术有限公司 Intelligent key ring joint management system and method
CN109145565A (en) * 2018-09-06 2019-01-04 河北地质大学 Computer authorization start-up control method based on Internet of Things
TWI728377B (en) * 2019-06-06 2021-05-21 旺宏電子股份有限公司 Secure boot system, method and apparatus
US11657157B2 (en) 2019-06-06 2023-05-23 Macronix International Co., Ltd. Secure boot system, method and apparatus
CN110309640B (en) * 2019-07-01 2022-05-31 联想(北京)有限公司 Electronic equipment starting method and electronic equipment
CN110457927A (en) * 2019-08-13 2019-11-15 平顶山学院 A kind of computer hard disk data encrypting method and its device
CN113792281A (en) * 2021-09-29 2021-12-14 龙芯中科(南京)技术有限公司 Electronic device, authentication method, storage medium, and program product

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1368682A (en) * 2001-02-05 2002-09-11 东维成科技股份有限公司 Method and architecture for security mechanism of computer host
CN102298679A (en) * 2011-08-12 2011-12-28 无锡城市云计算中心有限公司 BIOS (Basic Input/ Output System) authentication method based on USB (Universal Serial Bus) key
CN202150119U (en) * 2010-11-12 2012-02-22 北京环宇蓝博科技有限公司 Encryption device for controlling startup of big screen
CN202502505U (en) * 2012-03-21 2012-10-24 董科 Intelligent time-keeping and timing-service device for computer
CN104484629A (en) * 2014-12-03 2015-04-01 合肥联宝信息技术有限公司 Computer starting method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1368682A (en) * 2001-02-05 2002-09-11 东维成科技股份有限公司 Method and architecture for security mechanism of computer host
CN202150119U (en) * 2010-11-12 2012-02-22 北京环宇蓝博科技有限公司 Encryption device for controlling startup of big screen
CN102298679A (en) * 2011-08-12 2011-12-28 无锡城市云计算中心有限公司 BIOS (Basic Input/ Output System) authentication method based on USB (Universal Serial Bus) key
CN202502505U (en) * 2012-03-21 2012-10-24 董科 Intelligent time-keeping and timing-service device for computer
CN104484629A (en) * 2014-12-03 2015-04-01 合肥联宝信息技术有限公司 Computer starting method and device

Also Published As

Publication number Publication date
CN105005721A (en) 2015-10-28

Similar Documents

Publication Publication Date Title
CN105005721B (en) Computer mandate opening control system and method based on computer booting key
US10565383B2 (en) Method and apparatus for secure credential entry without physical entry
US7900252B2 (en) Method and apparatus for managing shared passwords on a multi-user computer
US9047486B2 (en) Method for virtualizing a personal working environment and device for the same
US8549317B2 (en) Authentication method, authentication apparatus and authentication program storage medium
KR20110087178A (en) Usb security device with way for secure user-authentication and method of authentication
CN101620657A (en) Information processing apparatus and security protection method
US20050081071A1 (en) Pre-boot security controller
JP2009524880A (en) Data security system
US8850220B2 (en) Method and apparatus with chipset-based protection for local and remote authentication of booting from peripheral devices
CN105243314A (en) USB-key based security system and usage method therefor
CN109190389A (en) A kind of solid state hard disk data guard method based on USB flash disk authentication
EP1542135B1 (en) A method which is able to centralize the administration of the user registered information across networks
CN109190365A (en) A kind of solid state hard disk data protection system based on USB flash disk authentication
JP2007148762A (en) External storage device
JP4833294B2 (en) Information processing apparatus and activation method
JP4698502B2 (en) Terminal device authentication system, authentication method and program using mobile phone
US20020169989A1 (en) Method and apparatus for access security in computers
CN115390765A (en) Storage device capable of being internally provided with independent data
KR102248132B1 (en) Method, apparatus and program of log-in using biometric information
KR101745390B1 (en) Data leakage prevention apparatus and method thereof
CN107423627A (en) The time slot scrambling and electronic equipment of a kind of electronic equipment
US8702812B2 (en) Remote disablement of a computer system
CN109190364A (en) A kind of safe U disc for solid state hard disk authentication
JPH11272563A (en) Security system for information processor and security method in information processor

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180706

Termination date: 20200625

CF01 Termination of patent right due to non-payment of annual fee