CN108197458A - terminal device safe starting method and device - Google Patents
terminal device safe starting method and device Download PDFInfo
- Publication number
- CN108197458A CN108197458A CN201810021406.6A CN201810021406A CN108197458A CN 108197458 A CN108197458 A CN 108197458A CN 201810021406 A CN201810021406 A CN 201810021406A CN 108197458 A CN108197458 A CN 108197458A
- Authority
- CN
- China
- Prior art keywords
- information
- terminal device
- identification information
- matched
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000012795 verification Methods 0.000 claims description 10
- 230000006870 function Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 6
- 238000004422 calculation algorithm Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
The terminal device safe starting method and device provided through this embodiment, movable storage device obtains the first terminal equipment identities identification information of terminal device, and first terminal equipment identities identification information is matched with the first movement storage device identification information of itself;If successful match, control terminal equipment pops up the first dialog box to receive the first subscriber authentication information input by user, and the first subscriber authentication information is matched with the first pre-set user authentication information;If successful match again, movable storage device sends enabling signal to the terminal device, so that the terminal device clean boot.
Description
Technical field
This application involves equipment safety field, in particular to a kind of terminal device safe starting method and device.
Background technology
With the continuous development of technology, the requirement for information security in equipment is higher and higher.In the prior art, usually lead to
Mode that terminal device is encrypted in itself is crossed to protect the safety of information in terminal device.
However in extreme circumstances, such as after terminal device holder's lost terminal equipment, the people of the terminal device is obtained
Member carries out special decryption to the terminal device and cracks, and still or can crack terminal device successfully and obtain terminal device
Interior information.
Apply for content
In view of this, the embodiment of the present application provides a kind of terminal device safe starting method and device, existing to improve
To the incomplete problem of the encryption method of the data of terminal device in technology.
On the one hand, the embodiment of the present application provides a kind of terminal device safe starting method, by movable storage device with
The terminal device connects the clean boot to realize the terminal device, the method includes:The movable storage device obtains
Take the first terminal equipment identities identification information of the terminal device;By the first terminal equipment identities identification information and itself
First movement storage device identification information matched;If the first terminal equipment identities identification information and described the
One movable storage device identification information successful match controls the terminal device to pop up the first dialog box defeated to receive user
The the first subscriber authentication information entered;The first subscriber authentication information is obtained, and first user identity is tested
Card information is matched with the first pre-set user authentication information;If the first subscriber authentication information and described first
Pre-set user authentication information successful match sends enabling signal to the terminal device so that the terminal device opens safely
It is dynamic.
On the other hand, the embodiment of the present application additionally provides a kind of terminal device safety starting device, runs on mobile storage
Equipment, described device include:Terminal device identity acquisition module, for obtaining the first terminal equipment identities of the terminal device
Identification information;First information matching module, for by the first terminal equipment identities identification information and the first movement of itself
Storage device identification information is matched;Authentication receiving module, if being identified for the first terminal equipment identities
Information and the first movement storage device identification information successful match, control the terminal device to pop up the first dialog box
To receive the first subscriber authentication information input by user;Second information matches module, for obtaining the first user body
Part verification information, and the first subscriber authentication information is matched with the first pre-set user authentication information;Peace
Full starting module, if being matched into for the first subscriber authentication information with the first pre-set user authentication information
Work(sends enabling signal to the terminal device so that the terminal device clean boot.
Terminal device safe starting method and device provided by the embodiments of the present application have the beneficial effect that:
The terminal device safe starting method and device provided through this embodiment, movable storage device obtain terminal device
First terminal equipment identities identification information, by first terminal equipment identities identification information and the first movement storage device of itself
Identification information is matched;If successful match, control terminal equipment pops up the first dialog box to receive input by user the
One subscriber authentication information matches the first subscriber authentication information with the first pre-set user authentication information;
If successful match again, movable storage device sends enabling signal to the terminal device, so that the terminal device clean boot.
First whether verification movable storage device is corresponding with terminal device, if so, authentication information input by user is received, it will
Authentication information is matched again compared with the pre-stored identity information in movable storage device with realizing.When matching into
The clean boot of the terminal device is realized after work(.In terminal device safe starting method provided by the embodiments of the present application, even if eventually
The holder of end equipment has lost corresponding terminal device, if not losing corresponding movable storage device, other use
Family can not open the terminal device, so as to protect the safety of the terminal device.
Description of the drawings
Illustrate the technical solutions in the embodiments of the present application or in the prior art in order to clearer, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application, for those of ordinary skill in the art, without creative efforts, can be with
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow chart for the terminal device safe starting method that the application first embodiment provides;
Fig. 2 is a kind of stream of the specific embodiment for the terminal device safe starting method that the application first embodiment provides
Journey schematic diagram;
Fig. 3 is the structure diagram for the terminal device safety starting device that the application second embodiment provides;
Fig. 4 is a kind of knot of the specific embodiment for the terminal device safety starting device that the application second embodiment provides
Structure block diagram.
Specific embodiment
First embodiment
Fig. 1 is referred to, Fig. 1 shows that the flow for the terminal device safe starting method that the application first embodiment provides is shown
It is intended to, specifically comprises the following steps:
Step S110 obtains the first terminal equipment identities identification information of the terminal device.
Terminal device can be the terminal devices such as computer, mobile phone, and first terminal equipment identities identification information can be can
The identification information of the unique mark terminal device.Specifically, terminal device is computer, and the first terminal equipment of the terminal device
Identification information is the MAC codes of BIOS in computer main board.
Movable storage device is a portable mobile equipment with store function, and movable storage device can be with
Terminal device communicates, such as the first terminal equipment identities identification information of receiving terminal apparatus transmission or transmission control refer to
It enables to terminal device.It can carry out wireless communication, wire communication can also be carried out, the concrete mode of communication, which should not be construed, is
Limitation to the embodiment of the present invention.
Step S120, by the first terminal equipment identities identification information and the first movement storage device identity mark of itself
Know information to be matched.
Movable storage device can also be handled the information received, such as first terminal equipment identities are identified and are believed
Breath is matched with the first movement storage device identification information of itself.First terminal equipment identities identification information and first
There are corresponding mapping relations for movable storage device identification information.
The mapping relations can be stored in movable storage device, and whether movable storage device both judges to match,
If so, show that the movable storage device is corresponding with the terminal device.The first movement storage device identity of movable storage device
Identification information is specifically as follows UUID, corresponding with the MAC codes of BIOS in computer main board.
Step S130, if the first terminal equipment identities identification information and the first movement storage device identity
Information matches success controls the terminal device to pop up the first dialog box and is believed with receiving the first subscriber authentication input by user
Breath.
When first terminal equipment identities identification information and the first movement storage device identification information successful match
When, movable storage device can send control instruction to terminal device, and terminal device is made to pop up the first dialog box, the first dialog box
For receiving the first subscriber authentication information input by user.
First subscriber authentication information is can to characterize the verification information of the user identity, the specific can be that user name
Information and encrypted message, or the biometric information of the user, such as finger print information, face information etc..
In a kind of specific embodiment, if the first terminal equipment identities identification information is stored with the first movement
The success of equipment identities identification information match, movable storage device control the terminal device to pop up the first dialog box to receive user
First username information of input and first password information.
Step S140, obtains the first subscriber authentication information, and will the first subscriber authentication information and
First pre-set user authentication information is matched.
After the matching of movable storage device and terminal device is completed, it is also necessary to carry out subscriber authentication, Yong Hu
After first dialog box has input authentication information, terminal device can be sent to the first authentication information mobile storage and set
It is standby, so that the first pre-set user authentication information with movable storage device memory storage is compared.Specifically, mobile storage
Equipment matches first username information with the first pre-set user name information, and by the first password information and institute
The first preset password information is stated to be matched.
First pre-set user authentication information is stored in without being stored in terminal device in movable storage device, can
Preferably to realize the protection to terminal device.Such as if both movable storage device or terminal device are lost first, just can not
The authentication process itself of user is completed, so as to preferably realize the protection to terminal device.
Step S150, if the first subscriber authentication information is matched with the first pre-set user authentication information
Success sends enabling signal to the terminal device so that the terminal device clean boot.
Specifically, if the success of first username information and the first pre-set user name information matches, and described the
One encrypted message and the first preset password information successful match send enabling signal to the terminal device so that the end
End equipment clean boot.
When being respectively completed the matching of movable storage device and terminal device and the authentication of user matches twice,
Safety verification is just really completed, movable storage device can send enabling signal to terminal device, so that terminal device is safe
Start.
Fig. 2 is referred to, Fig. 2 shows a kind of tools for the terminal device safe starting method that the application first embodiment provides
Body embodiment, specifically comprises the following steps:
Step S110 obtains the first terminal equipment identities identification information of the terminal device.
Step S120, by the first terminal equipment identities identification information and the first movement storage device identity mark of itself
Know information to be matched.
Step S130, if the first terminal equipment identities identification information and the first movement storage device identity
Information matches success controls the terminal device to pop up the first dialog box and is believed with receiving the first subscriber authentication input by user
Breath.
Step S140, obtains the first subscriber authentication information, and will the first subscriber authentication information and
First pre-set user authentication information is matched.
Step S150, if the first subscriber authentication information is matched with the first pre-set user authentication information
Success sends enabling signal to the terminal device so that the terminal device clean boot.
Fig. 2 shows step S110 to step S150 it is identical to step S150 with the step S110 shown in Fig. 1, herein just not
It repeats again.
Step S160 receives encryption section access request input by user.
The memory of terminal device can include two kinds of normal areas and encryption section, specifically, can for computer
Any one fdisk in computer or laptop or entire hard disk to be encrypted, and by the one of need for confidentiality
A little application programs and sensitive document are put into the encrypted subregion.
When not receiving encryption section access request, the text of the normal areas of unencryption can be only presented in terminal device
Part.When receiving encryption section access request, which is transmitted to movable storage device by terminal device.
Specifically, encryption section using AES256 bit encryption algorithms can be encrypted, can also be encrypted with others
Encryption section is encrypted in algorithm, such as RSA1024 or 2048 bit encryption algorithms, the concrete type and key of Encryption Algorithm
It is limitation of the present invention that length, which should not be construed,.
Step S170 controls the terminal device to pop up the second dialog box and is tested with receiving second user identity input by user
Demonstrate,prove information.
Movable storage device can pop up the second dialog box to receive second user body input by user with control terminal equipment
Part verification information, specifically, can receive the second encrypted message input by user.Second user authentication information can be with
One subscriber authentication information is different, can also be identical.
Step S180, obtains the second user authentication information, and by the second user authentication information with
Second pre-set user authentication information is matched.
User after the second dialog box input second user authentication information of terminal device, by second use by terminal device
Family authentication information is sent to movable storage device, so that movable storage device utilizes the second pre-set user body of itself storage
Part verification information is matched with the second user authentication information received, specifically, by second encrypted message and
Second preset password information is matched.
Step S190, if the second user authentication information is matched with the second pre-set user authentication information
Success, is decrypted using encryption section described in pre-stored key pair.
If second encrypted message and the second preset password information successful match, movable storage device can utilize
It decrypts encryption section described in pre-stored key pair.Key storage is in movable storage device, when second user authentication
When information is with the second pre-set user authentication information successful match, encryption section can be just decrypted.
By the first terminal equipment identities identification information and the first movement storage device identification information of itself
After being matched, the method further includes:If the first terminal equipment identities identification information is stored with the first movement
Equipment identities identification information match fails, and obtains identities match number;Judge whether the identities match number is preset times,
When to be, the terminal device is controlled to shut down.
In the terminal device safe starting method that the application first embodiment provides, movable storage device and terminal are first verified
Whether equipment is corresponding, if so, receiving authentication information input by user, authentication information and mobile storage are set
Pre-stored identity information in standby compares, and is matched again with realizing.The safety of the terminal device is realized after successful match
Start.In terminal device safe starting method provided by the embodiments of the present application, even if the holder of terminal device has lost accordingly
Terminal device, if not losing corresponding movable storage device, other users can not open the terminal device, so as to
Protect the safety of the terminal device.
Second embodiment
Fig. 3 is referred to, Fig. 3 shows the terminal device safety starting device that the application second embodiment provides, the device
300 include:
Terminal device identity acquisition module 310, for obtaining the first terminal equipment identities of terminal device mark letter
Breath.
First information matching module 320, for the first terminal equipment identities identification information and itself first to be moved
Dynamic storage device identification information is matched.
Authentication receiving module 330, if for the first terminal equipment identities identification information and the first movement
Storage device identification information successful match controls the terminal device to pop up the first dialog box to receive input by user the
One subscriber authentication information.
The authentication receiving module 330 includes the first receiving submodule, and first receiving submodule is used in institute
When stating first terminal equipment identities identification information with the first movement storage device identification information successful match, institute is controlled
It states terminal device and pops up the first dialog box to receive the first username information input by user and first password information.
Second information matches module 340, for obtaining the first subscriber authentication information, and by first user
Authentication information is matched with the first pre-set user authentication information.
Second information matches module 340 includes the first matched sub-block, and first matched sub-block is used for described the
One username information is matched with the first pre-set user name information, and the first password information is default close with described first
Code information is matched.
Clean boot module 350, if for the first subscriber authentication information and the first pre-set user identity
Verification information successful match sends enabling signal to the terminal device so that the terminal device clean boot.
The clean boot module 350 include the first promoter module, for first username information with it is described
The success of first pre-set user name information matches, and the first password information and the first preset password information successful match
When, enabling signal is sent to the terminal device so that the terminal device clean boot.
Fig. 4 is referred to, Fig. 4 shows a kind of tool for the terminal device safety starting device that the application second embodiment provides
Body embodiment, other than above-mentioned module, which further includes:
Encryption section access modules 360, for receiving encryption section access request input by user.
Dialog box pop-up module 370, it is input by user to receive for the terminal device to be controlled to pop up the second dialog box
Second user authentication information.
The dialog box pop-up module 370 includes encrypted message submodule, and the encrypted message submodule is used to control institute
It states terminal device and pops up the second dialog box to receive the second encrypted message input by user.
Third information matches module 380, for obtaining the second user authentication information, and by the second user
Authentication information is matched with the second pre-set user authentication information.
The third information matches module includes matching receiving submodule, and the matching receiving submodule is used for described the
Two encrypted messages are matched with second preset password information.
Deciphering module 390, if for the second user authentication information and the second pre-set user authentication
Information matches success, is decrypted using encryption section described in pre-stored key pair.
The deciphering module 390 include decryption submodule, if it is described decryption submodule for second encrypted message with
During the second preset password information successful match, decrypted using encryption section described in pre-stored key pair.
It is apparent to those skilled in the art that for convenience and simplicity of description, the device of foregoing description
Specific work process, can refer to preceding method in corresponding process, no longer excessively repeat herein.
Described device further includes:Start authentification failure number acquisition module, if for the first terminal equipment identities mark
Knowing information, it fails to match with the first movement storage device identification information, obtains identities match number;Control shutdown mould
Block, for judging whether the startup authentification failure number is preset times, when to be, the terminal device is controlled to be closed
Machine.
The terminal device safe starting method and device provided through this embodiment, movable storage device obtain terminal device
First terminal equipment identities identification information, by first terminal equipment identities identification information and the first movement storage device of itself
Identification information is matched;If successful match, control terminal equipment pops up the first dialog box to receive input by user the
One subscriber authentication information matches the first subscriber authentication information with the first pre-set user authentication information;
If successful match again, movable storage device sends enabling signal to the terminal device, so that the terminal device clean boot.
First whether verification movable storage device is corresponding with terminal device, if so, authentication information input by user is received, it will
Authentication information is matched again compared with the pre-stored identity information in movable storage device with realizing.When matching into
The clean boot of the terminal device is realized after work(.In terminal device safe starting method provided by the embodiments of the present application, even if eventually
The holder of end equipment has lost corresponding terminal device, if not losing corresponding movable storage device, other use
Family can not open the terminal device, so as to protect the safety of the terminal device.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight
Point explanation is all difference from other examples, and just to refer each other for identical similar part between each embodiment.
For device class embodiment, since it is basicly similar to embodiment of the method, so description is fairly simple, related part is joined
See the part explanation of embodiment of the method.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through it
Its mode is realized.The apparatus embodiments described above are merely exemplary, for example, the flow chart and block diagram in attached drawing are shown
The device of multiple embodiments according to the application, architectural framework in the cards, the work(of method and computer program product are shown
It can and operate.In this regard, each box in flow chart or block diagram can represent one of a module, program segment or code
Point, a part for the module, program segment or code includes one or more and is used to implement the executable of defined logic function
Instruction.It should also be noted that at some as in the realization method replaced, the function of being marked in box can also be attached to be different from
The sequence marked in figure occurs.For example, two continuous boxes can essentially perform substantially in parallel, they also may be used sometimes
To perform in the opposite order, this is depended on the functions involved.It is it is also noted that each in block diagram and/or flow chart
The combination of box and the box in block diagram and/or flow chart function or the dedicated of action can be based on as defined in execution
The system of hardware is realized or can be realized with the combination of specialized hardware and computer instruction.
In addition, each function module in each embodiment of the application can integrate to form an independent portion
Point or modules individualism, can also two or more modules be integrated to form an independent part.
If the function is realized in the form of software function module and is independent product sale or in use, can be with
It is stored in a computer read/write memory medium.Based on such understanding, the technical solution of the application is substantially in other words
The part contribute to the prior art or the part of the technical solution can be embodied in the form of software product, the meter
Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be
People's computer, server or network equipment etc.) perform each embodiment the method for the application all or part of step.
And aforementioned storage medium includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic disc or CD.It needs
Illustrate, herein, relational terms such as first and second and the like be used merely to by an entity or operation with
Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities
The relationship or sequence on border.Moreover, term " comprising ", "comprising" or its any other variant are intended to the packet of nonexcludability
Contain so that process, method, article or equipment including a series of elements not only include those elements, but also including
It other elements that are not explicitly listed or further includes as elements inherent to such a process, method, article, or device.
In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element
Process, method, also there are other identical elements in article or equipment.
The foregoing is merely the preferred embodiments of the application, are not limited to the application, for the skill of this field
For art personnel, the application can have various modifications and variations.It is all within spirit herein and principle, made any repair
Change, equivalent replacement, improvement etc., should be included within the protection domain of the application.It should be noted that:Similar label and letter exists
Similar terms are represented in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing
It is further defined and is explained.
The specific embodiment of the above, only the application, but the protection domain of the application is not limited thereto, it is any
In the technical scope that those familiar with the art discloses in the application, change or replacement can be readily occurred in, should all be contained
It covers within the protection domain of the application.Therefore, the protection domain of the application described should be subject to the protection scope in claims.
Claims (10)
1. a kind of terminal device safe starting method, which is characterized in that connect by movable storage device with the terminal device
Realize the clean boot of the terminal device, the method includes:
The movable storage device obtains the first terminal equipment identities identification information of the terminal device;
By the first terminal equipment identities identification information and the first movement storage device identification information progress of itself
Match;
If the first terminal equipment identities identification information and the first movement storage device identification information successful match,
The terminal device is controlled to pop up the first dialog box to receive the first subscriber authentication information input by user;
Obtain the first subscriber authentication information, and by the first subscriber authentication information and the first pre-set user body
Part verification information is matched;
If the first subscriber authentication information and the first pre-set user authentication information successful match, send and start
Signal is to the terminal device so that the terminal device clean boot.
If 2. according to the method described in claim 1, it is characterized in that, the first terminal equipment identities identification information with
The first movement storage device identification information successful match controls the terminal device to pop up the first dialog box to receive
First subscriber authentication information input by user;Obtain the first subscriber authentication information, and by first user
Authentication information is matched with the first pre-set user authentication information;If the first subscriber authentication information and institute
The first pre-set user authentication information successful match is stated, sends enabling signal to the terminal device so that the terminal device
Clean boot, including:
If the first terminal equipment identities identification information and the first movement storage device identification information successful match,
The terminal device is controlled to pop up the first dialog box to receive the first username information input by user and first password information;
First username information is matched with the first pre-set user name information, and by the first password information and institute
The first preset password information is stated to be matched;
If the success of first username information and the first pre-set user name information matches, and the first password information with
The first preset password information successful match sends enabling signal to the terminal device so that the terminal device opens safely
It is dynamic.
3. according to the method described in claim 1, it is characterized in that, by the first terminal equipment identities identification information and certainly
After the first movement storage device identification information of body is matched, the method further includes:
If the first terminal equipment identities identification information is with the first movement storage device identification information, it fails to match,
Obtain identities match number;
Judge whether the identities match number is preset times, when to be, the terminal device is controlled to shut down.
4. according to the method described in claim 3, it is characterized in that, the method further includes:
The terminal device is controlled to pop up the second dialog box to receive the second encrypted message input by user;
Second encrypted message is matched with second preset password information;
If second encrypted message and the second preset password information successful match, using described in pre-stored key pair
It decrypts encryption section.
5. according to the method described in claim 1, it is characterized in that, the first terminal equipment identities identification information is in mainboard
The MAC codes of BIOS.
6. a kind of terminal device safety starting device, which is characterized in that run on movable storage device, described device includes:
Terminal device identity acquisition module, for obtaining the first terminal equipment identities identification information of the terminal device;
First information matching module, for the first terminal equipment identities identification information and the first movement storage of itself to be set
Standby identification information is matched;
Authentication receiving module, if for the first terminal equipment identities identification information and the first movement storage device
Identification information successful match controls the terminal device to pop up the first dialog box to receive the first user body input by user
Part verification information;
Second information matches module for obtaining the first subscriber authentication information, and first user identity is tested
Card information is matched with the first pre-set user authentication information;
Clean boot module, if for the first subscriber authentication information and the first pre-set user authentication information
Successful match sends enabling signal to the terminal device so that the terminal device clean boot.
7. device according to claim 6, which is characterized in that the authentication receiving module includes first and receives submodule
Block, the second information matches module include the first matched sub-block, and the clean boot module includes the first promoter module,
First receiving submodule is used to set in the first terminal equipment identities identification information and the first movement storage
During standby identification information successful match, the terminal device is controlled to pop up the first dialog box and is used with receiving input by user first
Name in an account book information and first password information;
First matched sub-block is used to match first username information with the first pre-set user name information, and
The first password information is matched with first preset password information;
First promoter module be used for first username information and the first pre-set user name information matches into
Work(, and when the first password information and the first preset password information successful match, enabling signal is sent to the terminal
Equipment is so that the terminal device clean boot.
8. device according to claim 6, which is characterized in that described device further includes:
Start authentification failure number acquisition module, if for the first terminal equipment identities identification information and the first movement
It fails to match for storage device identification information, obtains identities match number;
Control shutdown module, for judging whether the startup authentification failure number is preset times, when to be, described in control
Terminal device shuts down.
9. device according to claim 8, which is characterized in that dialog box pop-up module includes encrypted message submodule, the
Three information matches modules include matching receiving submodule, and the deciphering module includes decryption submodule;
The encrypted message submodule is used to that the terminal device to be controlled to pop up the second dialog box to receive input by user second
Encrypted message;
The matching receiving submodule is used to match second encrypted message with second preset password information;
If the decryption submodule is for second encrypted message and the second preset password information successful match, utilize
It decrypts encryption section described in pre-stored key pair.
10. device according to claim 6, which is characterized in that the first terminal equipment identities identification information is mainboard
The MAC codes of middle BIOS.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810021406.6A CN108197458A (en) | 2018-01-10 | 2018-01-10 | terminal device safe starting method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810021406.6A CN108197458A (en) | 2018-01-10 | 2018-01-10 | terminal device safe starting method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108197458A true CN108197458A (en) | 2018-06-22 |
Family
ID=62588549
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810021406.6A Pending CN108197458A (en) | 2018-01-10 | 2018-01-10 | terminal device safe starting method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108197458A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110287686A (en) * | 2019-06-24 | 2019-09-27 | 深圳市同泰怡信息技术有限公司 | A kind of the clean boot right management method and equipment of basic input output system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101788959A (en) * | 2010-02-03 | 2010-07-28 | 武汉固捷联讯科技有限公司 | Solid state hard disk secure encryption system |
CN103279714A (en) * | 2013-06-19 | 2013-09-04 | 深圳市中兴移动通信有限公司 | Mobile terminal as well as data encryption and decryption method |
CN103825738A (en) * | 2013-12-31 | 2014-05-28 | 北京华虹集成电路设计有限责任公司 | Registration information authentication method and device |
CN105790945A (en) * | 2014-12-22 | 2016-07-20 | 中国移动通信集团公司 | Authentication method, device and system for authenticating user unique identity |
CN106991308A (en) * | 2017-04-10 | 2017-07-28 | 四川阵风科技有限公司 | Safety certifying method, apparatus and system |
-
2018
- 2018-01-10 CN CN201810021406.6A patent/CN108197458A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101788959A (en) * | 2010-02-03 | 2010-07-28 | 武汉固捷联讯科技有限公司 | Solid state hard disk secure encryption system |
CN103279714A (en) * | 2013-06-19 | 2013-09-04 | 深圳市中兴移动通信有限公司 | Mobile terminal as well as data encryption and decryption method |
CN103825738A (en) * | 2013-12-31 | 2014-05-28 | 北京华虹集成电路设计有限责任公司 | Registration information authentication method and device |
CN105790945A (en) * | 2014-12-22 | 2016-07-20 | 中国移动通信集团公司 | Authentication method, device and system for authenticating user unique identity |
CN106991308A (en) * | 2017-04-10 | 2017-07-28 | 四川阵风科技有限公司 | Safety certifying method, apparatus and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110287686A (en) * | 2019-06-24 | 2019-09-27 | 深圳市同泰怡信息技术有限公司 | A kind of the clean boot right management method and equipment of basic input output system |
CN110287686B (en) * | 2019-06-24 | 2021-06-15 | 深圳市同泰怡信息技术有限公司 | Safe starting authority management method and equipment for basic input output system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11706033B2 (en) | Secure distributed information system | |
US6732278B2 (en) | Apparatus and method for authenticating access to a network resource | |
US20060075230A1 (en) | Apparatus and method for authenticating access to a network resource using multiple shared devices | |
US20070005974A1 (en) | Method for transferring encrypted data and information processing system | |
US20080010453A1 (en) | Method and apparatus for one time password access to portable credential entry and memory storage devices | |
CN108768963B (en) | Communication method and system of trusted application and secure element | |
KR20100016579A (en) | System and method for distribution of credentials | |
CN108763917B (en) | Data encryption and decryption method and device | |
CN108965222A (en) | Identity identifying method, system and computer readable storage medium | |
CN103929308B (en) | Information Authentication method applied to rfid card | |
US20180053018A1 (en) | Methods and systems for facilitating secured access to storage devices | |
US11809540B2 (en) | System and method for facilitating authentication via a short-range wireless token | |
CN108667784A (en) | The system and method for internet identity card checking information protection | |
CN112036881A (en) | Software and hardware implementation mode for getting through different system accounts by using block chain | |
US9210134B2 (en) | Cryptographic processing method and system using a sensitive data item | |
CN109075974B (en) | Binding authentication method of fingerprint algorithm library and fingerprint sensor and fingerprint identification system | |
CN108197458A (en) | terminal device safe starting method and device | |
US9292992B2 (en) | Simplified smartcard personalization method, and corresponding device | |
CN108121905A (en) | Encryption section access method and device | |
US11606196B1 (en) | Authentication system for a multiuser device | |
CN105227562A (en) | The key business data transmission mediation device of identity-based checking and using method thereof | |
US11831759B1 (en) | Optimized authentication system for a multiuser device | |
Lee et al. | The study on the security solutions of USB memory | |
JP3958017B2 (en) | Communication system and communication method | |
KR101684905B1 (en) | User authentication device for multi-authenticating by using fingerprint, security key and wireless tag |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180622 |
|
RJ01 | Rejection of invention patent application after publication |