CN107330348A - A kind of method of controlling security and system - Google Patents

A kind of method of controlling security and system Download PDF

Info

Publication number
CN107330348A
CN107330348A CN201710508978.2A CN201710508978A CN107330348A CN 107330348 A CN107330348 A CN 107330348A CN 201710508978 A CN201710508978 A CN 201710508978A CN 107330348 A CN107330348 A CN 107330348A
Authority
CN
China
Prior art keywords
lock
hardware
key
hardware lock
unlocking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710508978.2A
Other languages
Chinese (zh)
Inventor
范姜世明
陈光亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201710508978.2A priority Critical patent/CN107330348A/en
Publication of CN107330348A publication Critical patent/CN107330348A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • G06F21/87Secure or tamper-resistant housings by means of encapsulation, e.g. for integrated circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Abstract

A kind of method of controlling security of disclosure and system, methods described is pre-set in controlled device for entering line-locked hardware lock at least one hardware component in controlled device, and when being locked to hardware lock, dynamic generation hardware lock key information, so that as hardware lock, this locks required unlocking foundation, on this basis, when obtaining long-range unlocking instruction, the key on the basis of the hardware lock key information, the control whether unlocked based on checking is carried out to hardware lock.As can be seen here, the application realizes one kind and utilizes dynamic key, the scheme of the remote unlocking control based on checking is carried out to the hardware lock in controlled device, it may be such that each hardware component locked in controlled device by hardware lock arbitrarily will not be taken out or changed, so as to improve the physical security of controlled device.

Description

A kind of method of controlling security and system
Technical field
The invention belongs to the physical security technical field of server, more particularly to a kind of method of controlling security and system.
Background technology
In order to lift the physical security of server, it is ensured that server critical component, such as server memory, HDD (Hard Disk Drive, hard disk drive), PCI-E (PCI Express, EBI of new generation) card etc. hardware component safety, Very must so that these hardware componenies arbitrarily will not be taken out or be changed in server there is provided a kind of implementation of hardware security Will.
The content of the invention
In view of this, it is an object of the invention to provide a kind of method of controlling security and system, to cause server corresponding Hardware arbitrarily will not be taken out or be changed, it is ensured that the hardware security of server, lift the physical security of server.
Therefore, the present invention is disclosed directly below technical scheme:
A kind of method of controlling security, including:
When hardware lock is locked, generate hardware lock key information and store, it is required using this locking correspondence as hardware lock Unlocking foundation;Wherein, the hardware lock is arranged in controlled device, at least one hardware component in controlled device Locked;
When obtaining long-range unlocking instruction, the current unlocking key that the unlocking instruction includes is obtained, and obtain this The key information stored during secondary hardware lock locking is as benchmark key;
Using the benchmark key, the current unlocking key is verified, result is verified;
Based on the result, the control whether unlocked to the hardware lock;
When hardware lock is in unlocking condition, lock instruction is obtained, locks and generates according to lock instruction control hardware lock New hardware lock key information, using the required unlocking foundation of this new locking correspondence as hardware lock.
The above method, it is preferred that described when hardware lock is locked, generates hardware lock key information and stores, including:
When activation hardware lock make it that hardware lock is locked, hardware lock key information is generated in controlled device, and will be described secret Key information is respectively sent to predetermined security centre and administrative center is stored;
Or, when controlled device is based on detecting at least one described hardware component the taking-up of corresponding hardware component or more When changing event and completing and control the hardware lock to lock, hardware lock key information is generated, and the key information is respectively sent to pre- Fixed security centre and administrative center is stored.
The above method, it is preferred that described when obtaining long-range unlocking instruction, what the acquisition unlocking instruction included works as Preceding unlocking key, and the key information stored during the locking of this hardware lock is obtained as benchmark key, including:
When the security centre receives the remote unlocking instruction from control device, obtain in the unlocking instruction and wrap The current unlocking key included, and it is secret as benchmark to obtain the key information that the security centre stores when this hardware lock is locked Key.
The above method, it is preferred that described to utilize the benchmark key, is verified to the current unlocking key, including:
The current unlocking key and the benchmark key are compared for the security centre, judge both whether one Cause;
Accordingly, it is described based on the result, the control whether unlocked to the hardware lock, including:
If the result represents that both are consistent, the hardware lock is controlled to unlock;
If the result represents that both are inconsistent, the lock-out state of the hardware lock is maintained, and to the management Center sends warning information.
The above method, it is preferred that described when hardware lock is in unlocking condition, obtains lock instruction, according to lock instruction Control hardware lock locks and generates new hardware lock key information, including:
When hardware lock is in unlocking condition, corresponding hardware component at least one described hardware component of controlled device detection Taking-up or replacing event whether complete, obtain testing result;
If the testing result represents to complete, lock instruction is generated;
Based on the lock instruction, control hardware lock locks and generates new hardware lock key information.
A kind of safety control system, including controlled device, security centre and control device, the controlled device include to A few hardware component, and for entering line-locked hardware lock at least one described hardware component, wherein:
The controlled device, for when hardware lock is locked, generating hardware lock key information and storing, to be used as hardware lock The required unlocking foundation of this locking correspondence;
The security centre, refers to for when obtaining the long-range unlocking instruction of the control device, obtaining the unlocking The current unlocking key that order includes, and the key information stored during the locking of this hardware lock is obtained as benchmark key; Using the benchmark key, the current unlocking key is verified, result is verified;It is right based on the result The control whether hardware lock is unlocked;
The controlled device, is additionally operable to, when hardware lock is in unlocking condition, obtain the lock instruction of the security centre, Lock according to lock instruction control hardware lock and generate new hardware lock key information, using this new locking correspondence as hardware lock Required unlocking foundation.
Said system, it is preferred that the system also includes administrative center, then the controlled device, when hardware lock is locked, Generation hardware lock key information is simultaneously stored, and is further comprised:
When activation hardware lock make it that hardware lock is locked, the controlled device generates hardware lock key information, and will be described Key information is respectively sent to the security centre and administrative center is stored;
Or, the controlled device is based on the taking-up for detecting corresponding hardware component at least one described hardware component Or replacing event is when completing and controlling the hardware lock to lock, hardware lock key information is generated, and the key information is sent respectively Stored to the security centre and the administrative center.
Said system, it is preferred that the security centre, when obtaining long-range unlocking instruction, obtains the unlocking instruction The current unlocking key included, and the key information stored during the locking of this hardware lock is obtained as benchmark key, enter One step includes:
When the security centre receives the remote unlocking instruction from the control device, the unlocking instruction is obtained The current unlocking key included, and key information that the security centre stores when this hardware lock is locked is obtained as base Quasi- key.
Said system, it is preferred that the security centre, using the benchmark key, is carried out to the current unlocking key Checking, further comprises:
The current unlocking key and the benchmark key are compared for the security centre, judge both whether one Cause;
Accordingly, the security centre, based on the result, the control whether unlocked to the hardware lock System, further comprises:
If the result represents that both are consistent, the security centre controls the hardware lock to unlock;If described test Card result represents that both are inconsistent, then maintains the lock-out state of the hardware lock, and send warning information to the administrative center.
Said system, it is preferred that the controlled device, when hardware lock is in unlocking condition, obtains lock instruction, foundation Lock instruction control hardware lock locks and generates new hardware lock key information, further comprises:
When hardware lock is in unlocking condition, corresponding hardware component at least one described hardware component of controlled device detection Taking-up or replacing event whether complete, obtain testing result;If the testing result represents to complete, lock instruction is generated; Based on the lock instruction, control hardware lock locks and generates new hardware lock key information.
The method of controlling security and system provided from above scheme, the application, pre-sets use in controlled device At least one hardware component in controlled device enters line-locked hardware lock, and when being locked to hardware lock, dynamic Hardware lock key information is generated, it is on this basis, long-range when obtaining using as the unlocking foundation needed for hardware lock this locking During unlocking instruction, the key on the basis of the hardware lock key information carries out the control whether unlocked based on checking to hardware lock System.As can be seen here, the application realizes one kind and utilizes dynamic key, and the hardware lock in controlled device is carried out based on the remote of checking Journey opens the scheme of lock control, may be such that each hardware component locked in controlled device by hardware lock will not arbitrarily be taken out or more Change, so as to improve the physical security of controlled device.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 is a kind of schematic flow sheet for method of controlling security embodiment one that the application is provided;
Fig. 2 is a kind of schematic flow sheet for method of controlling security embodiment two that the application is provided;
Fig. 3 is one kind application exemplary plot for the hardware lock controls that the embodiment of the present application two is provided;
Fig. 4 is a kind of structural representation for safety control system embodiment three that the application is provided;
Fig. 5 is a kind of structural representation for safety control system example IV that the application is provided.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
The embodiment of the present application one provides a kind of method of controlling security, it is intended to so that the hardware component in server will not be random It is removed or changes, and then lifts the physical security of server, one kind safety of the embodiment of the present application one with reference to shown in Fig. 1 Control method schematic flow sheet, the method for the present embodiment may comprise steps of:
Step 101, when hardware lock is locked, generation hardware lock key information simultaneously store, using be used as hardware lock this locking The required unlocking foundation of correspondence;Wherein, the hardware lock is arranged in controlled device, at least one in controlled device Hardware component is locked.
Wherein, the controlled device can specifically be, but not limited to, server apparatus, correspondingly, in the controlled device At least one hardware component, then can be the hardware that some in server have demand for security, such as server memory, HDD, PCI-E etc..
In order to lift the physical security of the controlled devices such as server, it is ensured that each hardware component of controlled device will not Arbitrarily taken out or changed, the application proposes to set hardware lock in controlled device, at least one in controlled device Individual hardware component is locked, such as sets hardware lock to come to the hardware such as the internal memory in server, HDD, PCI-E in the server Lock etc..And one kind is provided utilizes dynamic key, the hardware lock in controlled device is carried out based on the long-range of authority checking Unlock the scheme of control, make it that the unlocking control to hardware lock is all the physics that lifts controlled device with this by mandate Security.
In this step, when hardware lock is locked, dynamic generation hardware lock key information is simultaneously stored, using as hardware lock this The required unlocking foundation of locking correspondence.The dynamic, refers to that hardware lock is often performed expendable locked, just generates a new key, So that each unlocking of hardware lock, is all based on a new key and carries out authority checking, hardware can be ensured to a high degree The unlocking safety of lock each time.
Step 102, when obtaining long-range unlocking instruction, obtain the current unlocking key that the unlocking instruction includes, And the key information stored during the locking of this hardware lock is obtained as benchmark key.
Wherein, the unlocking instruction includes the unlocking key that is provided when related personnel performs this unlocking.
Lock, make after hardware lock is in the lock state to hardware lock, when there is the unlocking demand to hardware lock, The application unlocking instruction long-range by obtaining, and the dynamic key generated when being locked based on this is in remote unlocking instruction Unlocking key verified, to determine whether to authorize this unlocking event.
In consideration of it, in order to be verified to the unlocking key, when obtaining long-range unlocking instruction, needing analysis instruction to obtain Unlocking key, and dynamic generation and the key information stored when reading the locking of this hardware lock, refer to as dual lock The benchmark key that unlocking key in order is verified.
Step 103, using the benchmark key, the current unlocking key is verified, result is verified.
, can the base on the basis of the unlocking key and the benchmark key in obtaining the remote unlocking instruction Quasi- key be foundation, to the unlocking key carry out authority checking, be verified result, with verify the unlocking key whether be Permit can on the basis of inputted be used for unlock correct solution confidential information.It is easily understood that the result includes two altogether Kind:Result of the unlocking key in unlocking instruction by checking is represented, or, represent that the unlocking key in unlocking instruction does not pass through The result of checking.
Step 104, based on the result, the control whether unlocked to the hardware lock.
Specifically, when the unlocking key that the result is represented in unlocking instruction passes through checking, then it represents that this unlocking Be by permit can, in such cases, this unlocking event can be authorized, so as to be locked into the hardware in the controlled device Row, which is unlocked, to be controlled, and the unlocking control carried out to hardware lock based on checking, based on mandate is realized with this.
When the unlocking key that the result is represented in unlocking instruction is not verified, then it represents that this unlocks not permitted Can premised on, in such cases, this unlocking event can not be authorized, so as to can not be locked into the hardware in controlled device Row, which is unlocked, to be controlled.Such as, when the wrong key that related personnel is fabricated by input one instructs to trigger remote unlocking, then the instruction In unlocking key can not pass through checking, it is impossible to authorized, correspondingly the unlocking of uncontrollable hardware lock, so as to be prevented effectively from Hardware component in controlled device is arbitrarily taken out or changed.
Step 105, when hardware lock be in unlocking condition when, obtain lock instruction, according to lock instruction control hardware lock lock Determine and generate new hardware lock key information, using the required unlocking foundation of this new locking correspondence as hardware lock.
And when hardware lock is in unlocking condition, for each hardware component for ensuring to be connected with hardware phase lock high precision in controlled device Physical security, need to obtain lock instruction and based on instruction control hardware lock locking.Meanwhile, to further ensure that follow-up open Security is locked, when controlling hardware lock locking, the key information for needing dynamic generation one new is used as needed for this new locking correspondence Unlocking foundation.
The method of controlling security of the present embodiment, pre-sets at least one in controlled device in controlled device Hardware component enters line-locked hardware lock, and when being locked to hardware lock, dynamic generation hardware lock key information, using as Unlocking foundation needed for this locking of hardware lock, it is on this basis, secret with the hardware lock when obtaining long-range unlocking instruction Key on the basis of key information, the control whether unlocked based on checking is carried out to hardware lock.As can be seen here, the application realizes one Kind utilize dynamic key, the scheme of the remote unlocking control based on checking carried out to the hardware lock in controlled device, may be such that by Each hardware component locked in control equipment by hardware lock arbitrarily will not be taken out or changed, so as to improve the physics of controlled device Security.
The embodiment of the present application two provides another method of controlling security, it is intended to so that hardware component in server will not be with Meaning is removed or changed, and then lifts the physical security of server, in the present embodiment, specifically using security centre, management Center and control device, and based on the interaction between the security centre, administrative center and control device, realize to controlled device In hardware lock carry out based on authority checking remote unlocking control.The security centre, administrative center can be terminal devices Or server, when the administrative center is server, the administrative center can provide corresponding management terminal simultaneously, so that The management between keeper must be supported to interact.
A kind of method of controlling security schematic flow sheet of the embodiment of the present application two with reference to shown in Fig. 2, the side of the present embodiment Method includes:
Step 201, when activate hardware lock make it that hardware lock is locked when, controlled device generate hardware lock key information, and The key information is respectively sent to predetermined security centre and administrative center is stored;Or, when controlled device is based on The taking-up of corresponding hardware component or replacing event at least one described hardware component is detected to complete and control hardware lock to lock When, generate hardware lock key information, and the key information is respectively sent to predetermined security centre and administrative center is carried out Storage.
Wherein, the locking of hardware lock, can be realized in different phase by different modes.
Such as, in the case of hardware lock also un-activation use, can by activate hardware lock make its directly perform lock into Enter lock-out state.
Specifically, it is one kind application exemplary plot of the hardware lock controls of the present embodiment with reference to Fig. 3, wherein, administrative center exists It can be connected in network by interchanger with controlled device such as server, security centre is connected to controlled set again by interchanger It is standby, it is provided with controlled device for server memory, the hardware component such as HDD, PCI-E to enter line-locked hardware lock, hard In the case of part lock is also unactivated, when needing to use hardware lock, can by system manager in administrative center's Remote triggering to hard The activation instruction of part lock, and the activation instruction sent by interchanger to the baseboard management controller of controlled device (BMC, Baseboard management controller), and then, the baseboard management controller of controlled device is based on the activation instruction Enter line activating to hardware lock, hardware lock automatic perform when being activated locks into lock-out state.
And when hardware lock be activated and use in the case of, when hardware lock be in unlocking condition when, can detect with Whether the taking-up of corresponding hardware component or replacing event complete in the connected each hardware component of hardware lock, and corresponding hard detecting When the taking-up of part part or replacing event are completed, lock instruction, control hardware lock locking are sent.The place of the detection and locking control Reason process can equally be performed by the baseboard management controller of controlled device.
When controlling hardware lock locking, controlled device generates the corresponding hardware lock key information of this locking and stored, To be used as the required unlocking foundation of this locking correspondence.Wherein, hardware lock often performs expendable locked, and controlled device just generates one New key, so that each unlocking of hardware lock, is all based on a new key and carries out authority checking, can to a high degree Ensure the unlocking safety of hardware lock each time.In practical application, when hardware lock is locked, the generation of performed key information Journey can be equally responsible for by the baseboard management controller of controlled device.
Wherein, the hardware lock key information generated for controlled device, such as the substrate for controlled device, which is managed, controls Device is when activating hardware lock and it is locked or is sent control instruction and lock it, and the key information of generation can be by the key information It is respectively sent to the security centre and the administrative center is stored, wherein, the key letter of security centre's storage Breath, for as this locking unlocked when benchmark key, and the administrative center store key information then make The foundation of authorization is carried out to the related personnel with unlocking demand for keeper.
Step 202, when the security centre receive from control device remote unlocking instruction when, obtain it is described unlock The current unlocking key that instruction includes, and obtain the key information work that the security centre stores when this hardware lock is locked On the basis of key.
The long-range unlocking instruction, is triggered for related personnel or keeper with unlocking demand in control device Instruction.The control device can be the terminal device of the related personnel with unlocking demand, or can also be the management The terminal that center is provided.
Accordingly, the unlocking instruction can be that the related personnel with unlocking demand is opened in its terminal device by providing The instruction triggered after lock key, such as, the related personnel can obtain this key letter needed for unlocking at keeper first Breath, inputs key by terminal devices such as its mobile phones on this basis and triggers unlocking instruction;In addition, the remote unlocking refers to Order, can also be the related personnel with unlocking demand obtain keeper license after, by keeper administrative center terminal Unlocking key and the unlocking instruction submitted are inputted, the present embodiment is refused this to limit.
Include the unlocking instruction of unlocking key for what control device was sent, be not sent directly to controlled device, But submit it to security centre and carry out authority checking, based on this, when security centre is received from the long-range of control device During unlocking instruction, the unlocking instruction is parsed, unlocking key therein is obtained, and read security centre in this locking hardware lock The key information stored is used as benchmark key.
The current unlocking key and the benchmark key are compared for step 203, the security centre, judge both It is whether consistent.
Unlocking key in unlocking instruction is parsed, and read after the benchmark key of itself storage, security centre is to institute State unlocking key to be compared with the benchmark key, whether both checkings are consistent.
If step 204, the result represent that both are consistent, the hardware lock is controlled to unlock.
If the unlocking key is consistent with the benchmark key, it is verified, represents that this unlocking event is allowed to , so as to be authorized, then correspondingly, security centre can control the hardware lock in controlled device to unlock.
In practical application, with reference to Fig. 3, when being verified, it can be managed and controlled to the substrate of controlled device from security centre Device sends a unlocking instruction, and the baseboard management controller of controlled device receives the instruction, and controls hardware lock to unlock, so as to realize Hardware lock based on mandate, with safety guarantee is unlocked.
If step 205, the result represent that both are inconsistent, the lock-out state of the hardware lock is maintained, and to The administrative center sends warning information.
If the unlocking key and the benchmark key are inconsistent, verify and do not pass through, represent this unlocking event not with Keeper permit can premised on, so as to can not be authorized, then correspondingly, security centre will not be to the hardware in controlled device Lock carries out unlocking control.Such as, when remote unlocking instruction is triggered when the wrong key that related personnel is fabricated by input one, then Unlocking key in the instruction can not pass through checking, it is impossible to be authorized, correspondingly uncontrollable hardware lock is unlocked, so as to have Effect avoids the hardware component in controlled device from arbitrarily being taken out or changed.
In such cases, security centre can feed back corresponding warning information to administrative center, unauthorized to remind keeper to have Unlocking event occur.
Step 206, when hardware lock is in unlocking condition, it is corresponding at least one described hardware component of controlled device detection Whether the taking-up of hardware component or replacing event complete, and obtain testing result.
In the application, when hardware lock is in unlocking condition, expression there is currently to corresponding hardware component in controlled device Taking-up or change demand, or occurring the taking-up to corresponding hardware component or replacing event, such as in the presence of to server Demand is changed in one or more of any taking-up of part in internal memory, HDD and PCI-E, or to above-mentioned one of any Or a variety of parts perform taking-up or replacing action etc..
, can in real time or timing detection is removed in consideration of it, in order to ensure the safety of each hardware component in follow-up controlled device Or whether the taking-up for the part changed or replacing event complete.
If step 207, the testing result represent to complete, lock instruction is generated.
If testing result is represented to be removed or the taking-up of part changed or replacing event have been completed, in order to continue to ensure The physical security of each hardware component in controlled device, need to generate lock instruction and carry out locking control to hardware lock.
If on the contrary, testing result represents to be removed or the taking-up of part changed or replacing event are not completed also, continuing Wait, lock instruction is generated when the taking-up or replacing event completion, then based on the testing result for representing event completion.
Step 208, based on the lock instruction, control hardware lock locks and generates new hardware lock key information.
After lock instruction is generated, based on instruction control hardware lock locking, and new hardware lock key information is generated, according to According to described above, the key information can be respectively sent to security centre and administrative center is stored, to be used as this new lock Surely required unlocking foundation is corresponded to.Wherein, detection, the locking control of hardware lock and the key letter of taking-up or the replacing event The processing procedures such as the generation of breath can be responsible for execution by the baseboard management controller in controlled device.
The method of controlling security of the present embodiment, pre-sets at least one in controlled device in controlled device Hardware component enters line-locked hardware lock, and when being locked to hardware lock, dynamic generation hardware lock key information, using as Unlocking foundation needed for this locking of hardware lock, it is on this basis, secret with the hardware lock when obtaining long-range unlocking instruction Key on the basis of key information, the control whether unlocked based on checking is carried out to hardware lock.As can be seen here, the application realizes one Kind utilize dynamic key, the scheme of the remote unlocking control based on checking carried out to the hardware lock in controlled device, may be such that by Each hardware component locked in control equipment by hardware lock arbitrarily will not be taken out or changed, so as to improve the physics of controlled device Security.
The embodiment of the present application three provides a kind of safety control system, it is intended to so that the Hardware Subdivision in the controlled device such as server Part arbitrarily will not be removed or change, and then lift the physical security of controlled device, the embodiment of the present application with reference to shown in Fig. 4 A kind of structural representation of three safety control system, the system of the present embodiment includes:Controlled device 1, security centre 2 and control Equipment 3, the controlled device includes at least one hardware component 101, and for entering at least one described hardware component 101 Line-locked hardware lock 102, wherein:
The controlled device 1, for when hardware lock 102 is locked, generation hardware lock key information is simultaneously stored, using as hard Part locks the required unlocking foundation of this locking correspondence.
Wherein, the controlled device can specifically be, but not limited to, server apparatus, correspondingly, in the controlled device At least one hardware component, then can be the hardware that some in server have demand for security, such as server memory, HDD, PCI-E etc..
In order to lift the physical security of the controlled devices such as server, it is ensured that each hardware component of controlled device will not Arbitrarily taken out or changed, the application proposes to set hardware lock in controlled device, at least one in controlled device Individual hardware component is locked, such as sets hardware lock to come to the hardware such as the internal memory in server, HDD, PCI-E in the server Lock etc..And one kind is provided utilizes dynamic key, the hardware lock in controlled device is carried out based on the long-range of authority checking Unlock the scheme of control, make it that the unlocking control to hardware lock is all the physics that lifts controlled device with this by mandate Security.
When hardware lock is locked, the dynamic generation hardware lock key information of controlled device 1 is simultaneously stored, using as hardware lock this The required unlocking foundation of locking correspondence.The dynamic, refers to that hardware lock is often performed expendable locked, just generates a new key, So that each unlocking of hardware lock, is all based on a new key and carries out authority checking, hardware can be ensured to a high degree The unlocking safety of lock each time.
The security centre 2, for when obtaining the long-range unlocking instruction of the control device 3, obtaining described unlock The current unlocking key that instruction includes, and it is secret as benchmark to obtain the key information stored during the locking of this hardware lock Key;Using the benchmark key, the current unlocking key is verified, result is verified;Based on the result, The control whether unlocked to the hardware lock 102.
Wherein, the unlocking instruction includes the unlocking key that is provided when related personnel performs this unlocking.
Lock, make after hardware lock is in the lock state to hardware lock, when there is the unlocking demand to hardware lock, The application unlocking instruction long-range by obtaining, and the dynamic key generated when being locked based on this is in remote unlocking instruction Unlocking key verified, to determine whether to authorize this unlocking event.
In consideration of it, in order to be verified to the unlocking key, when obtaining long-range unlocking instruction, needing analysis instruction to obtain Unlocking key, and dynamic generation and the key information stored when reading the locking of this hardware lock, refer to as dual lock The benchmark key that unlocking key in order is verified.
On the basis of the unlocking key and the benchmark key in obtaining the remote unlocking instruction, security centre 2 Can the benchmark key be foundation, to the unlocking key carry out authority checking, result is verified, to verify the unlocking Key whether be permit can on the basis of inputted be used for unlock correct solution confidential information.It is easily understood that the checking knot Fruit includes two kinds altogether:Result of the unlocking key in unlocking instruction by checking is represented, or, represent the unlocking in unlocking instruction The not verified result of key.
When the result represents that unlocking key in unlocking instruction passes through checking, then it represents that this unlocking is that permitted can , in such cases, this unlocking event can be authorized, so as to carry out unlocking control to the hardware lock in the controlled device System, the unlocking control carried out to hardware lock based on checking, based on mandate is realized with this.
When the unlocking key that the result is represented in unlocking instruction is not verified, then it represents that this unlocks not permitted Can premised on, in such cases, this unlocking event can not be authorized, so as to can not be locked into the hardware in controlled device Row, which is unlocked, to be controlled.Such as, when the wrong key that related personnel is fabricated by input one instructs to trigger remote unlocking, then the instruction In unlocking key can not pass through checking, it is impossible to authorized, correspondingly the unlocking of uncontrollable hardware lock, so as to be prevented effectively from Hardware component in controlled device is arbitrarily taken out or changed.
The controlled device 1, is additionally operable to, when hardware lock 102 is in unlocking condition, obtain the locking of the security centre 2 Instruction, locks according to lock instruction control hardware lock and generates new hardware lock key information, using this new lock as hardware lock Surely required unlocking foundation is corresponded to.
And when hardware lock is in unlocking condition, for each hardware component for ensuring to be connected with hardware phase lock high precision in controlled device Physical security, controlled device 1 need to obtain lock instruction and based on instruction control hardware lock locking.Meanwhile, it is further true Follow-up unlocking security is protected, when controlling hardware lock locking, the key information for needing dynamic generation one new is used as this new lock Surely required unlocking foundation is corresponded to.
The safety control system of the present embodiment, pre-sets at least one in controlled device in controlled device Hardware component enters line-locked hardware lock, and when being locked to hardware lock, dynamic generation hardware lock key information, using as Unlocking foundation needed for this locking of hardware lock, it is on this basis, secret with the hardware lock when obtaining long-range unlocking instruction Key on the basis of key information, the control whether unlocked based on checking is carried out to hardware lock.As can be seen here, the application realizes one Kind utilize dynamic key, the scheme of the remote unlocking control based on checking carried out to the hardware lock in controlled device, may be such that by Each hardware component locked in control equipment by hardware lock arbitrarily will not be taken out or changed, so as to improve the physics of controlled device Security.
The embodiment of the present application four provides another safety control system, it is intended to so that the hardware in the controlled device such as server Part arbitrarily will not be removed or change, and then lift the physical security of controlled device, and the application with reference to shown in Fig. 5 is implemented A kind of structural representation of safety control system of example four, compared to a upper embodiment, in the present embodiment, the system also includes Administrative center 4.
Then in the present embodiment, the controlled device 1 in the system, when hardware lock is locked, generates hardware lock key information And store, further comprise:
When activation hardware lock make it that hardware lock is locked, the controlled device generates hardware lock key information, and will be described Key information is respectively sent to the security centre and administrative center is stored;Or, the controlled device is based on detection It is raw when at least one described hardware component, the taking-up of corresponding hardware component or replacing event complete and control the hardware lock to lock Into hardware lock key information, and the key information is respectively sent to the security centre and the administrative center is deposited Storage.
Wherein, the locking of hardware lock, can be realized in different phase by different modes.
Such as, in the case of hardware lock also un-activation use, can by activate hardware lock make its directly perform lock into Enter lock-out state.
Specifically, it is one kind application exemplary plot of the hardware lock controls of the present embodiment with reference to Fig. 3, wherein, administrative center exists It can be connected in network by interchanger with controlled device such as server, security centre is connected to controlled set again by interchanger It is standby, it is provided with controlled device for server memory, the hardware component such as HDD, PCI-E to enter line-locked hardware lock, hard In the case of part lock is also unactivated, when needing to use hardware lock, can by system manager in administrative center's Remote triggering to hard The activation instruction of part lock, and the activation instruction sent by interchanger to the baseboard management controller of controlled device (BMC, Baseboard management controller), and then, the baseboard management controller of controlled device is based on the activation instruction Enter line activating to hardware lock, hardware lock automatic perform when being activated locks into lock-out state.
And when hardware lock be activated and use in the case of, when hardware lock be in unlocking condition when, can detect with Whether the taking-up of corresponding hardware component or replacing event complete in the connected each hardware component of hardware lock, and corresponding hard detecting When the taking-up of part part or replacing event are completed, lock instruction, control hardware lock locking are sent.The place of the detection and locking control Reason process can equally be performed by the baseboard management controller of controlled device.
When controlling hardware lock locking, controlled device generates the corresponding hardware lock key information of this locking and stored, To be used as the required unlocking foundation of this locking correspondence.Wherein, hardware lock often performs expendable locked, and controlled device just generates one New key, so that each unlocking of hardware lock, is all based on a new key and carries out authority checking, can to a high degree Ensure the unlocking safety of hardware lock each time.In practical application, when hardware lock is locked, the generation of performed key information Journey can be equally responsible for by the baseboard management controller of controlled device.
Wherein, the hardware lock key information generated for controlled device, such as the substrate for controlled device, which is managed, controls Device is when activating hardware lock and it is locked or is sent control instruction and lock it, and the key information of generation can be by the key information It is respectively sent to the security centre and the administrative center is stored, wherein, the key letter of security centre's storage Breath, for as this locking unlocked when benchmark key, and the administrative center store key information then make The foundation of authorization is carried out to the related personnel with unlocking demand for keeper.
In the above-described embodiments, the security centre 2 in safety control system, when obtaining long-range unlocking instruction, obtains The current unlocking key that the unlocking instruction includes, and obtain the key information conduct stored during the locking of this hardware lock Benchmark key, further comprises:
When the security centre receives the remote unlocking instruction from the control device, the unlocking instruction is obtained The current unlocking key included, and key information that the security centre stores when this hardware lock is locked is obtained as base Quasi- key.
The long-range unlocking instruction, is triggered for related personnel or keeper with unlocking demand in control device Instruction.The control device can be the terminal device of the related personnel with unlocking demand, or can also be the management The terminal that center is provided.
Accordingly, the unlocking instruction can be that the related personnel with unlocking demand is opened in its terminal device by providing The instruction triggered after lock key, such as, the related personnel can obtain this key letter needed for unlocking at keeper first Breath, inputs key by terminal devices such as its mobile phones on this basis and triggers unlocking instruction;In addition, the remote unlocking refers to Order, can also be the related personnel with unlocking demand obtain keeper license after, by keeper administrative center terminal Unlocking key and the unlocking instruction submitted are inputted, the present embodiment is refused this to limit.
Include the unlocking instruction of unlocking key for what control device was sent, be not sent directly to controlled device, But submit it to security centre and carry out authority checking, based on this, when security centre is received from the long-range of control device During unlocking instruction, the unlocking instruction is parsed, unlocking key therein is obtained, and read security centre in this locking hardware lock The key information stored is used as benchmark key.
In the above-described embodiments, the security centre 2 in safety control system, using the benchmark key, to described current Unlocking key is verified, is further comprised:The security centre is carried out to the current unlocking key and the benchmark key Compare, judge whether both are consistent.
Wherein, the unlocking key in unlocking instruction is parsed, and read after the benchmark key of itself storage, security centre The unlocking key is compared with the benchmark key, whether both checkings are consistent.
Accordingly, the security centre 2, based on the result, the control whether unlocked to the hardware lock System, further comprises:If the result represents that both are consistent, the hardware lock is controlled to unlock;If the result Represent that both are inconsistent, then maintain the lock-out state of the hardware lock, and warning information is sent to the administrative center.
Specifically, if the unlocking key is consistent with the benchmark key, it is verified, represents that this unlocking event is It is allowed to, so as to be authorized, then correspondingly, security centre can control the hardware lock in controlled device to unlock.
In practical application, with reference to Fig. 3, when being verified, it can be managed and controlled to the substrate of controlled device from security centre Device sends a unlocking instruction, and the baseboard management controller of controlled device receives the instruction, and controls hardware lock to unlock, so as to realize Hardware lock based on mandate, with safety guarantee is unlocked.
If the unlocking key and the benchmark key are inconsistent, verify and do not pass through, represent this unlocking event not with Keeper permit can premised on, so as to can not be authorized, then correspondingly, security centre will not be to the hardware in controlled device Lock carries out unlocking control.Such as, when remote unlocking instruction is triggered when the wrong key that related personnel is fabricated by input one, then Unlocking key in the instruction can not pass through checking, it is impossible to be authorized, correspondingly uncontrollable hardware lock is unlocked, so as to have Effect avoids the hardware component in controlled device from arbitrarily being taken out or changed.
In such cases, security centre can feed back corresponding warning information to administrative center, unauthorized to remind keeper to have Unlocking event occur.
In the above-described embodiments, controlled device 1 in safety control system, when hardware lock is in unlocking condition, is locked Fixed instruction, locks according to lock instruction control hardware lock and generates new hardware lock key information, further comprise:
When hardware lock is in unlocking condition, corresponding hardware component at least one described hardware component of controlled device detection Taking-up or replacing event whether complete, obtain testing result;If the testing result represents to complete, lock instruction is generated; Based on the lock instruction, control hardware lock locks and generates new hardware lock key information.
In the application, when hardware lock is in unlocking condition, expression there is currently to corresponding hardware component in controlled device Taking-up or change demand, or occurring the taking-up to corresponding hardware component or replacing event, such as in the presence of to server Demand is changed in one or more of any taking-up of part in internal memory, HDD and PCI-E, or to above-mentioned one of any Or a variety of parts perform taking-up or replacing action etc..
, can in real time or timing detection is removed in consideration of it, in order to ensure the safety of each hardware component in follow-up controlled device Or whether the taking-up for the part changed or replacing event complete.
If testing result is represented to be removed or the taking-up of part changed or replacing event have been completed, in order to continue to ensure The physical security of each hardware component in controlled device, need to generate lock instruction and carry out locking control to hardware lock.
If on the contrary, testing result represents to be removed or the taking-up of part changed or replacing event are not completed also, continuing Wait, lock instruction is generated when the taking-up or replacing event completion, then based on the testing result for representing event completion.
After lock instruction is generated, based on instruction control hardware lock locking, and new hardware lock key information is generated, according to According to described above, the key information can be respectively sent to security centre and administrative center is stored, to be used as this new lock Surely required unlocking foundation is corresponded to.Wherein, detection, the locking control of hardware lock and the key letter of taking-up or the replacing event The processing procedures such as the generation of breath can be responsible for execution by the baseboard management controller in controlled device.
The safety control system of the present embodiment, pre-sets at least one in controlled device in controlled device Hardware component enters line-locked hardware lock, and when being locked to hardware lock, dynamic generation hardware lock key information, using as Unlocking foundation needed for this locking of hardware lock, it is on this basis, secret with the hardware lock when obtaining long-range unlocking instruction Key on the basis of key information, the control whether unlocked based on checking is carried out to hardware lock.As can be seen here, the application realizes one Kind utilize dynamic key, the scheme of the remote unlocking control based on checking carried out to the hardware lock in controlled device, may be such that by Each hardware component locked in control equipment by hardware lock arbitrarily will not be taken out or changed, so as to improve the physics of controlled device Security.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation be all between difference with other embodiment, each embodiment identical similar part mutually referring to.
For convenience of description, describe to be divided into various modules when system above or device with function or unit is described respectively. Certainly, the function of each unit can be realized in same or multiple softwares and/or hardware when implementing the application.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can Realized by the mode of software plus required general hardware platform.Understood based on such, the technical scheme essence of the application On the part that is contributed in other words to prior art can be embodied in the form of software product, the computer software product It can be stored in storage medium, such as ROM/RAM, magnetic disc, CD, including some instructions are to cause a computer equipment (can be personal computer, server, or network equipment etc.) performs some of each embodiment of the application or embodiment Method described in part.
Finally, in addition it is also necessary to explanation, herein, the relational terms of such as first, second, third and fourth or the like It is used merely to make a distinction an entity or operation with another entity or operation, and not necessarily requires or imply these There is any this actual relation or order between entity or operation.Moreover, term " comprising ", "comprising" or its is any Other variants are intended to including for nonexcludability, so that process, method, article or equipment including a series of key elements Not only include those key elements, but also other key elements including being not expressly set out, or also include being this process, side Method, article or the intrinsic key element of equipment.In the absence of more restrictions, limited by sentence "including a ..." Key element, it is not excluded that also there is other identical element in the process including the key element, method, article or equipment.
Described above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (10)

1. a kind of method of controlling security, it is characterised in that including:
When hardware lock is locked, generate hardware lock key information and simultaneously store, required open is corresponded to using this locking as hardware lock Lock foundation;Wherein, the hardware lock is arranged in controlled device, for being carried out at least one hardware component in controlled device Locking;
When obtaining long-range unlocking instruction, the current unlocking key that the unlocking instruction includes is obtained, and it is hard to obtain this The key information stored during part lock locking is as benchmark key;
Using the benchmark key, the current unlocking key is verified, result is verified;
Based on the result, the control whether unlocked to the hardware lock;
When hardware lock is in unlocking condition, lock instruction is obtained, locks and generates new according to lock instruction control hardware lock Hardware lock key information, using the required unlocking foundation of this new locking correspondence as hardware lock.
2. according to the method described in claim 1, it is characterised in that described when hardware lock is locked, generation hardware lock key letter Cease and store, including:
When activation hardware lock make it that hardware lock is locked, hardware lock key information is generated in controlled device, and the key is believed Breath is respectively sent to predetermined security centre and administrative center is stored;
Or, when controlled device is based on the taking-up or replacing thing for detecting corresponding hardware component at least one described hardware component When part completes and controls the hardware lock to lock, hardware lock key information is generated, and the key information is respectively sent to predetermined Security centre and administrative center are stored.
3. method according to claim 2, it is characterised in that described when obtaining long-range unlocking instruction, obtains described The current unlocking key that unlocking instruction includes, and the key information stored during the locking of this hardware lock is obtained as benchmark Key, including:
When the security centre receives the remote unlocking instruction from control device, obtain what the unlocking instruction included Current unlocking key, and key information that the security centre stores when this hardware lock is locked is obtained as benchmark key.
4. method according to claim 3, it is characterised in that described to utilize the benchmark key, to the current unlocking Key verified, including:
The current unlocking key and the benchmark key are compared for the security centre, judge whether both are consistent;
Accordingly, it is described based on the result, the control whether unlocked to the hardware lock, including:
If the result represents that both are consistent, the hardware lock is controlled to unlock;
If the result represents that both are inconsistent, the lock-out state of the hardware lock is maintained, and to the administrative center Send warning information.
5. according to the method described in claim 1, it is characterised in that described when hardware lock is in unlocking condition, locked Instruction, locks according to lock instruction control hardware lock and generates new hardware lock key information, including:
When hardware lock is in unlocking condition, corresponding hardware component takes at least one described hardware component of controlled device detection Go out or whether replacing event completes, obtain testing result;
If the testing result represents to complete, lock instruction is generated;
Based on the lock instruction, control hardware lock locks and generates new hardware lock key information.
6. a kind of safety control system, it is characterised in that including controlled device, security centre and control device, described be controlled sets It is standby to include at least one hardware component, and for entering line-locked hardware lock at least one described hardware component, wherein:
The controlled device, for when hardware lock is locked, generation hardware lock key information is simultaneously stored, using as hardware lock this The required unlocking foundation of locking correspondence;
The security centre, for when obtaining the long-range unlocking instruction of the control device, obtaining in the unlocking instruction Including current unlocking key, and when obtaining the locking of this hardware lock the key information that stores as benchmark key;Utilize The benchmark key, verifies to the current unlocking key, is verified result;Based on the result, to described The control whether hardware lock is unlocked;
The controlled device, is additionally operable to, when hardware lock is in unlocking condition, obtain the lock instruction of the security centre, foundation Lock instruction control hardware lock locks and generates new hardware lock key information, using needed for this new locking correspondence as hardware lock Unlocking foundation.
It is 7. system according to claim 6, it is characterised in that the system also includes administrative center, then described controlled to set It is standby, when hardware lock is locked, generate hardware lock key information and store, further comprise:
When activating hardware lock and make it that hardware lock is locked, the controlled device generates hardware lock key information, and by the key Information is respectively sent to the security centre and administrative center is stored;
Or, the controlled device is based on the taking-up for detecting corresponding hardware component at least one described hardware component or more When changing event and completing and control the hardware lock to lock, hardware lock key information is generated, and the key information is respectively sent to institute State security centre and the administrative center is stored.
8. system according to claim 7, it is characterised in that the security centre, when obtaining long-range unlocking instruction, The current unlocking key that the unlocking instruction includes is obtained, and obtains the key information stored during the locking of this hardware lock As benchmark key, further comprise:
When the security centre receives the remote unlocking instruction from the control device, obtain in the unlocking instruction and wrap The current unlocking key included, and it is secret as benchmark to obtain the key information that the security centre stores when this hardware lock is locked Key.
9. system according to claim 8, it is characterised in that the security centre, using the benchmark key, to described Current unlocking key is verified, is further comprised:
The current unlocking key and the benchmark key are compared for the security centre, judge whether both are consistent;
Accordingly, the security centre, based on the result, the control whether unlocked to the hardware lock is entered One step includes:
If the result represents that both are consistent, the security centre controls the hardware lock to unlock;If the checking knot Fruit represents that both are inconsistent, then maintains the lock-out state of the hardware lock, and send warning information to the administrative center.
10. system according to claim 6, it is characterised in that the controlled device, unlocking condition is in hardware lock When, lock instruction is obtained, locks according to lock instruction control hardware lock and generates new hardware lock key information, further bag Include:
When hardware lock is in unlocking condition, corresponding hardware component takes at least one described hardware component of controlled device detection Go out or whether replacing event completes, obtain testing result;If the testing result represents to complete, lock instruction is generated;It is based on The lock instruction, control hardware lock locks and generates new hardware lock key information.
CN201710508978.2A 2017-06-28 2017-06-28 A kind of method of controlling security and system Pending CN107330348A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710508978.2A CN107330348A (en) 2017-06-28 2017-06-28 A kind of method of controlling security and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710508978.2A CN107330348A (en) 2017-06-28 2017-06-28 A kind of method of controlling security and system

Publications (1)

Publication Number Publication Date
CN107330348A true CN107330348A (en) 2017-11-07

Family

ID=60198894

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710508978.2A Pending CN107330348A (en) 2017-06-28 2017-06-28 A kind of method of controlling security and system

Country Status (1)

Country Link
CN (1) CN107330348A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060282633A1 (en) * 2005-05-24 2006-12-14 Kabushiki Kaisha Toshiba Information processing apparatus and control method of the same
CN103366139A (en) * 2012-03-27 2013-10-23 鸿富锦精密工业(深圳)有限公司 Electronic device, hardware maintenance system and hardware maintenance method
CN104318650A (en) * 2014-10-21 2015-01-28 深圳市俊武科技有限公司 Dynamic coded lock management and control system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060282633A1 (en) * 2005-05-24 2006-12-14 Kabushiki Kaisha Toshiba Information processing apparatus and control method of the same
CN103366139A (en) * 2012-03-27 2013-10-23 鸿富锦精密工业(深圳)有限公司 Electronic device, hardware maintenance system and hardware maintenance method
CN104318650A (en) * 2014-10-21 2015-01-28 深圳市俊武科技有限公司 Dynamic coded lock management and control system

Similar Documents

Publication Publication Date Title
US11244524B2 (en) System and method for managing electronic locks
US7719420B2 (en) Lock status notification and next case medication method, apparatus and corresponding medication storage device
CN108492412A (en) A kind of management method of intelligent building, apparatus and system
CN104318650A (en) Dynamic coded lock management and control system
CN102737427A (en) ATM dynamic privilege management system
CN108257290A (en) Cash box security control method, dynamic puzzle-lock and backstage cash box monitoring system
CN109750937A (en) A kind of bank tail-box is safe to store handover equipment and handover method
CN105844737A (en) Camera based electronic lock system and use method
CN109882025A (en) A kind of Bank Insurance cabinet device and bank custody control system
CN105184132A (en) Electronic device privacy right management method and system
KR101661313B1 (en) Method for controlling danger facility and computer program for executing the method
WO2021238380A1 (en) A multi-lock unlocking authorization control method, system and lock based on dynamic password
CN109034294A (en) A kind of air defence instrument box supervisory systems and monitoring and managing method
WO2017196319A1 (en) Electronic device access control
KR101599055B1 (en) a locking control apparatus using a password
CN104598785B (en) A kind of method and device for entering different mode based on unlocking pin
US8513544B2 (en) Authorization system and method using a weighing scale to control access based on a registered weight of a key and key ring combination
CN107330348A (en) A kind of method of controlling security and system
CN108921251A (en) A kind of equipment management system and method
CN111236105B (en) Parking space lock management method, device and system and parking space lock
CN110599636A (en) Customs lock, customs lock key, and customs lock opening and closing method and system
CN106778173A (en) The method and device that a kind of application lock based on intelligent operating system is set
CN110390746A (en) A kind of implementation method of fingerprint anti-theft gate inhibition
JP7400126B2 (en) Security monitoring method and system
CN114333115A (en) Unlocking method and device based on dynamic password, electronic lock device and control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171107

RJ01 Rejection of invention patent application after publication