CN108197458A - terminal device safe starting method and device - Google Patents

terminal device safe starting method and device Download PDF

Info

Publication number
CN108197458A
CN108197458A CN201810021406.6A CN201810021406A CN108197458A CN 108197458 A CN108197458 A CN 108197458A CN 201810021406 A CN201810021406 A CN 201810021406A CN 108197458 A CN108197458 A CN 108197458A
Authority
CN
China
Prior art keywords
information
terminal device
identification information
matched
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810021406.6A
Other languages
Chinese (zh)
Inventor
林峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Gust Technology Co Ltd
Original Assignee
Sichuan Gust Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Gust Technology Co Ltd filed Critical Sichuan Gust Technology Co Ltd
Priority to CN201810021406.6A priority Critical patent/CN108197458A/en
Publication of CN108197458A publication Critical patent/CN108197458A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The terminal device safe starting method and device provided through this embodiment, movable storage device obtains the first terminal equipment identities identification information of terminal device, and first terminal equipment identities identification information is matched with the first movement storage device identification information of itself;If successful match, control terminal equipment pops up the first dialog box to receive the first subscriber authentication information input by user, and the first subscriber authentication information is matched with the first pre-set user authentication information;If successful match again, movable storage device sends enabling signal to the terminal device, so that the terminal device clean boot.

Description

Terminal device safe starting method and device
Technical field
This application involves equipment safety field, in particular to a kind of terminal device safe starting method and device.
Background technology
With the continuous development of technology, the requirement for information security in equipment is higher and higher.In the prior art, usually lead to Mode that terminal device is encrypted in itself is crossed to protect the safety of information in terminal device.
However in extreme circumstances, such as after terminal device holder's lost terminal equipment, the people of the terminal device is obtained Member carries out special decryption to the terminal device and cracks, and still or can crack terminal device successfully and obtain terminal device Interior information.
Apply for content
In view of this, the embodiment of the present application provides a kind of terminal device safe starting method and device, existing to improve To the incomplete problem of the encryption method of the data of terminal device in technology.
On the one hand, the embodiment of the present application provides a kind of terminal device safe starting method, by movable storage device with The terminal device connects the clean boot to realize the terminal device, the method includes:The movable storage device obtains Take the first terminal equipment identities identification information of the terminal device;By the first terminal equipment identities identification information and itself First movement storage device identification information matched;If the first terminal equipment identities identification information and described the One movable storage device identification information successful match controls the terminal device to pop up the first dialog box defeated to receive user The the first subscriber authentication information entered;The first subscriber authentication information is obtained, and first user identity is tested Card information is matched with the first pre-set user authentication information;If the first subscriber authentication information and described first Pre-set user authentication information successful match sends enabling signal to the terminal device so that the terminal device opens safely It is dynamic.
On the other hand, the embodiment of the present application additionally provides a kind of terminal device safety starting device, runs on mobile storage Equipment, described device include:Terminal device identity acquisition module, for obtaining the first terminal equipment identities of the terminal device Identification information;First information matching module, for by the first terminal equipment identities identification information and the first movement of itself Storage device identification information is matched;Authentication receiving module, if being identified for the first terminal equipment identities Information and the first movement storage device identification information successful match, control the terminal device to pop up the first dialog box To receive the first subscriber authentication information input by user;Second information matches module, for obtaining the first user body Part verification information, and the first subscriber authentication information is matched with the first pre-set user authentication information;Peace Full starting module, if being matched into for the first subscriber authentication information with the first pre-set user authentication information Work(sends enabling signal to the terminal device so that the terminal device clean boot.
Terminal device safe starting method and device provided by the embodiments of the present application have the beneficial effect that:
The terminal device safe starting method and device provided through this embodiment, movable storage device obtain terminal device First terminal equipment identities identification information, by first terminal equipment identities identification information and the first movement storage device of itself Identification information is matched;If successful match, control terminal equipment pops up the first dialog box to receive input by user the One subscriber authentication information matches the first subscriber authentication information with the first pre-set user authentication information; If successful match again, movable storage device sends enabling signal to the terminal device, so that the terminal device clean boot. First whether verification movable storage device is corresponding with terminal device, if so, authentication information input by user is received, it will Authentication information is matched again compared with the pre-stored identity information in movable storage device with realizing.When matching into The clean boot of the terminal device is realized after work(.In terminal device safe starting method provided by the embodiments of the present application, even if eventually The holder of end equipment has lost corresponding terminal device, if not losing corresponding movable storage device, other use Family can not open the terminal device, so as to protect the safety of the terminal device.
Description of the drawings
Illustrate the technical solutions in the embodiments of the present application or in the prior art in order to clearer, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application, for those of ordinary skill in the art, without creative efforts, can be with Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow chart for the terminal device safe starting method that the application first embodiment provides;
Fig. 2 is a kind of stream of the specific embodiment for the terminal device safe starting method that the application first embodiment provides Journey schematic diagram;
Fig. 3 is the structure diagram for the terminal device safety starting device that the application second embodiment provides;
Fig. 4 is a kind of knot of the specific embodiment for the terminal device safety starting device that the application second embodiment provides Structure block diagram.
Specific embodiment
First embodiment
Fig. 1 is referred to, Fig. 1 shows that the flow for the terminal device safe starting method that the application first embodiment provides is shown It is intended to, specifically comprises the following steps:
Step S110 obtains the first terminal equipment identities identification information of the terminal device.
Terminal device can be the terminal devices such as computer, mobile phone, and first terminal equipment identities identification information can be can The identification information of the unique mark terminal device.Specifically, terminal device is computer, and the first terminal equipment of the terminal device Identification information is the MAC codes of BIOS in computer main board.
Movable storage device is a portable mobile equipment with store function, and movable storage device can be with Terminal device communicates, such as the first terminal equipment identities identification information of receiving terminal apparatus transmission or transmission control refer to It enables to terminal device.It can carry out wireless communication, wire communication can also be carried out, the concrete mode of communication, which should not be construed, is Limitation to the embodiment of the present invention.
Step S120, by the first terminal equipment identities identification information and the first movement storage device identity mark of itself Know information to be matched.
Movable storage device can also be handled the information received, such as first terminal equipment identities are identified and are believed Breath is matched with the first movement storage device identification information of itself.First terminal equipment identities identification information and first There are corresponding mapping relations for movable storage device identification information.
The mapping relations can be stored in movable storage device, and whether movable storage device both judges to match, If so, show that the movable storage device is corresponding with the terminal device.The first movement storage device identity of movable storage device Identification information is specifically as follows UUID, corresponding with the MAC codes of BIOS in computer main board.
Step S130, if the first terminal equipment identities identification information and the first movement storage device identity Information matches success controls the terminal device to pop up the first dialog box and is believed with receiving the first subscriber authentication input by user Breath.
When first terminal equipment identities identification information and the first movement storage device identification information successful match When, movable storage device can send control instruction to terminal device, and terminal device is made to pop up the first dialog box, the first dialog box For receiving the first subscriber authentication information input by user.
First subscriber authentication information is can to characterize the verification information of the user identity, the specific can be that user name Information and encrypted message, or the biometric information of the user, such as finger print information, face information etc..
In a kind of specific embodiment, if the first terminal equipment identities identification information is stored with the first movement The success of equipment identities identification information match, movable storage device control the terminal device to pop up the first dialog box to receive user First username information of input and first password information.
Step S140, obtains the first subscriber authentication information, and will the first subscriber authentication information and First pre-set user authentication information is matched.
After the matching of movable storage device and terminal device is completed, it is also necessary to carry out subscriber authentication, Yong Hu After first dialog box has input authentication information, terminal device can be sent to the first authentication information mobile storage and set It is standby, so that the first pre-set user authentication information with movable storage device memory storage is compared.Specifically, mobile storage Equipment matches first username information with the first pre-set user name information, and by the first password information and institute The first preset password information is stated to be matched.
First pre-set user authentication information is stored in without being stored in terminal device in movable storage device, can Preferably to realize the protection to terminal device.Such as if both movable storage device or terminal device are lost first, just can not The authentication process itself of user is completed, so as to preferably realize the protection to terminal device.
Step S150, if the first subscriber authentication information is matched with the first pre-set user authentication information Success sends enabling signal to the terminal device so that the terminal device clean boot.
Specifically, if the success of first username information and the first pre-set user name information matches, and described the One encrypted message and the first preset password information successful match send enabling signal to the terminal device so that the end End equipment clean boot.
When being respectively completed the matching of movable storage device and terminal device and the authentication of user matches twice, Safety verification is just really completed, movable storage device can send enabling signal to terminal device, so that terminal device is safe Start.
Fig. 2 is referred to, Fig. 2 shows a kind of tools for the terminal device safe starting method that the application first embodiment provides Body embodiment, specifically comprises the following steps:
Step S110 obtains the first terminal equipment identities identification information of the terminal device.
Step S120, by the first terminal equipment identities identification information and the first movement storage device identity mark of itself Know information to be matched.
Step S130, if the first terminal equipment identities identification information and the first movement storage device identity Information matches success controls the terminal device to pop up the first dialog box and is believed with receiving the first subscriber authentication input by user Breath.
Step S140, obtains the first subscriber authentication information, and will the first subscriber authentication information and First pre-set user authentication information is matched.
Step S150, if the first subscriber authentication information is matched with the first pre-set user authentication information Success sends enabling signal to the terminal device so that the terminal device clean boot.
Fig. 2 shows step S110 to step S150 it is identical to step S150 with the step S110 shown in Fig. 1, herein just not It repeats again.
Step S160 receives encryption section access request input by user.
The memory of terminal device can include two kinds of normal areas and encryption section, specifically, can for computer Any one fdisk in computer or laptop or entire hard disk to be encrypted, and by the one of need for confidentiality A little application programs and sensitive document are put into the encrypted subregion.
When not receiving encryption section access request, the text of the normal areas of unencryption can be only presented in terminal device Part.When receiving encryption section access request, which is transmitted to movable storage device by terminal device.
Specifically, encryption section using AES256 bit encryption algorithms can be encrypted, can also be encrypted with others Encryption section is encrypted in algorithm, such as RSA1024 or 2048 bit encryption algorithms, the concrete type and key of Encryption Algorithm It is limitation of the present invention that length, which should not be construed,.
Step S170 controls the terminal device to pop up the second dialog box and is tested with receiving second user identity input by user Demonstrate,prove information.
Movable storage device can pop up the second dialog box to receive second user body input by user with control terminal equipment Part verification information, specifically, can receive the second encrypted message input by user.Second user authentication information can be with One subscriber authentication information is different, can also be identical.
Step S180, obtains the second user authentication information, and by the second user authentication information with Second pre-set user authentication information is matched.
User after the second dialog box input second user authentication information of terminal device, by second use by terminal device Family authentication information is sent to movable storage device, so that movable storage device utilizes the second pre-set user body of itself storage Part verification information is matched with the second user authentication information received, specifically, by second encrypted message and Second preset password information is matched.
Step S190, if the second user authentication information is matched with the second pre-set user authentication information Success, is decrypted using encryption section described in pre-stored key pair.
If second encrypted message and the second preset password information successful match, movable storage device can utilize It decrypts encryption section described in pre-stored key pair.Key storage is in movable storage device, when second user authentication When information is with the second pre-set user authentication information successful match, encryption section can be just decrypted.
By the first terminal equipment identities identification information and the first movement storage device identification information of itself After being matched, the method further includes:If the first terminal equipment identities identification information is stored with the first movement Equipment identities identification information match fails, and obtains identities match number;Judge whether the identities match number is preset times, When to be, the terminal device is controlled to shut down.
In the terminal device safe starting method that the application first embodiment provides, movable storage device and terminal are first verified Whether equipment is corresponding, if so, receiving authentication information input by user, authentication information and mobile storage are set Pre-stored identity information in standby compares, and is matched again with realizing.The safety of the terminal device is realized after successful match Start.In terminal device safe starting method provided by the embodiments of the present application, even if the holder of terminal device has lost accordingly Terminal device, if not losing corresponding movable storage device, other users can not open the terminal device, so as to Protect the safety of the terminal device.
Second embodiment
Fig. 3 is referred to, Fig. 3 shows the terminal device safety starting device that the application second embodiment provides, the device 300 include:
Terminal device identity acquisition module 310, for obtaining the first terminal equipment identities of terminal device mark letter Breath.
First information matching module 320, for the first terminal equipment identities identification information and itself first to be moved Dynamic storage device identification information is matched.
Authentication receiving module 330, if for the first terminal equipment identities identification information and the first movement Storage device identification information successful match controls the terminal device to pop up the first dialog box to receive input by user the One subscriber authentication information.
The authentication receiving module 330 includes the first receiving submodule, and first receiving submodule is used in institute When stating first terminal equipment identities identification information with the first movement storage device identification information successful match, institute is controlled It states terminal device and pops up the first dialog box to receive the first username information input by user and first password information.
Second information matches module 340, for obtaining the first subscriber authentication information, and by first user Authentication information is matched with the first pre-set user authentication information.
Second information matches module 340 includes the first matched sub-block, and first matched sub-block is used for described the One username information is matched with the first pre-set user name information, and the first password information is default close with described first Code information is matched.
Clean boot module 350, if for the first subscriber authentication information and the first pre-set user identity Verification information successful match sends enabling signal to the terminal device so that the terminal device clean boot.
The clean boot module 350 include the first promoter module, for first username information with it is described The success of first pre-set user name information matches, and the first password information and the first preset password information successful match When, enabling signal is sent to the terminal device so that the terminal device clean boot.
Fig. 4 is referred to, Fig. 4 shows a kind of tool for the terminal device safety starting device that the application second embodiment provides Body embodiment, other than above-mentioned module, which further includes:
Encryption section access modules 360, for receiving encryption section access request input by user.
Dialog box pop-up module 370, it is input by user to receive for the terminal device to be controlled to pop up the second dialog box Second user authentication information.
The dialog box pop-up module 370 includes encrypted message submodule, and the encrypted message submodule is used to control institute It states terminal device and pops up the second dialog box to receive the second encrypted message input by user.
Third information matches module 380, for obtaining the second user authentication information, and by the second user Authentication information is matched with the second pre-set user authentication information.
The third information matches module includes matching receiving submodule, and the matching receiving submodule is used for described the Two encrypted messages are matched with second preset password information.
Deciphering module 390, if for the second user authentication information and the second pre-set user authentication Information matches success, is decrypted using encryption section described in pre-stored key pair.
The deciphering module 390 include decryption submodule, if it is described decryption submodule for second encrypted message with During the second preset password information successful match, decrypted using encryption section described in pre-stored key pair.
It is apparent to those skilled in the art that for convenience and simplicity of description, the device of foregoing description Specific work process, can refer to preceding method in corresponding process, no longer excessively repeat herein.
Described device further includes:Start authentification failure number acquisition module, if for the first terminal equipment identities mark Knowing information, it fails to match with the first movement storage device identification information, obtains identities match number;Control shutdown mould Block, for judging whether the startup authentification failure number is preset times, when to be, the terminal device is controlled to be closed Machine.
The terminal device safe starting method and device provided through this embodiment, movable storage device obtain terminal device First terminal equipment identities identification information, by first terminal equipment identities identification information and the first movement storage device of itself Identification information is matched;If successful match, control terminal equipment pops up the first dialog box to receive input by user the One subscriber authentication information matches the first subscriber authentication information with the first pre-set user authentication information; If successful match again, movable storage device sends enabling signal to the terminal device, so that the terminal device clean boot. First whether verification movable storage device is corresponding with terminal device, if so, authentication information input by user is received, it will Authentication information is matched again compared with the pre-stored identity information in movable storage device with realizing.When matching into The clean boot of the terminal device is realized after work(.In terminal device safe starting method provided by the embodiments of the present application, even if eventually The holder of end equipment has lost corresponding terminal device, if not losing corresponding movable storage device, other use Family can not open the terminal device, so as to protect the safety of the terminal device.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation is all difference from other examples, and just to refer each other for identical similar part between each embodiment. For device class embodiment, since it is basicly similar to embodiment of the method, so description is fairly simple, related part is joined See the part explanation of embodiment of the method.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through it Its mode is realized.The apparatus embodiments described above are merely exemplary, for example, the flow chart and block diagram in attached drawing are shown The device of multiple embodiments according to the application, architectural framework in the cards, the work(of method and computer program product are shown It can and operate.In this regard, each box in flow chart or block diagram can represent one of a module, program segment or code Point, a part for the module, program segment or code includes one or more and is used to implement the executable of defined logic function Instruction.It should also be noted that at some as in the realization method replaced, the function of being marked in box can also be attached to be different from The sequence marked in figure occurs.For example, two continuous boxes can essentially perform substantially in parallel, they also may be used sometimes To perform in the opposite order, this is depended on the functions involved.It is it is also noted that each in block diagram and/or flow chart The combination of box and the box in block diagram and/or flow chart function or the dedicated of action can be based on as defined in execution The system of hardware is realized or can be realized with the combination of specialized hardware and computer instruction.
In addition, each function module in each embodiment of the application can integrate to form an independent portion Point or modules individualism, can also two or more modules be integrated to form an independent part.
If the function is realized in the form of software function module and is independent product sale or in use, can be with It is stored in a computer read/write memory medium.Based on such understanding, the technical solution of the application is substantially in other words The part contribute to the prior art or the part of the technical solution can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be People's computer, server or network equipment etc.) perform each embodiment the method for the application all or part of step. And aforementioned storage medium includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic disc or CD.It needs Illustrate, herein, relational terms such as first and second and the like be used merely to by an entity or operation with Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities The relationship or sequence on border.Moreover, term " comprising ", "comprising" or its any other variant are intended to the packet of nonexcludability Contain so that process, method, article or equipment including a series of elements not only include those elements, but also including It other elements that are not explicitly listed or further includes as elements inherent to such a process, method, article, or device. In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element Process, method, also there are other identical elements in article or equipment.
The foregoing is merely the preferred embodiments of the application, are not limited to the application, for the skill of this field For art personnel, the application can have various modifications and variations.It is all within spirit herein and principle, made any repair Change, equivalent replacement, improvement etc., should be included within the protection domain of the application.It should be noted that:Similar label and letter exists Similar terms are represented in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing It is further defined and is explained.
The specific embodiment of the above, only the application, but the protection domain of the application is not limited thereto, it is any In the technical scope that those familiar with the art discloses in the application, change or replacement can be readily occurred in, should all be contained It covers within the protection domain of the application.Therefore, the protection domain of the application described should be subject to the protection scope in claims.

Claims (10)

1. a kind of terminal device safe starting method, which is characterized in that connect by movable storage device with the terminal device Realize the clean boot of the terminal device, the method includes:
The movable storage device obtains the first terminal equipment identities identification information of the terminal device;
By the first terminal equipment identities identification information and the first movement storage device identification information progress of itself Match;
If the first terminal equipment identities identification information and the first movement storage device identification information successful match, The terminal device is controlled to pop up the first dialog box to receive the first subscriber authentication information input by user;
Obtain the first subscriber authentication information, and by the first subscriber authentication information and the first pre-set user body Part verification information is matched;
If the first subscriber authentication information and the first pre-set user authentication information successful match, send and start Signal is to the terminal device so that the terminal device clean boot.
If 2. according to the method described in claim 1, it is characterized in that, the first terminal equipment identities identification information with The first movement storage device identification information successful match controls the terminal device to pop up the first dialog box to receive First subscriber authentication information input by user;Obtain the first subscriber authentication information, and by first user Authentication information is matched with the first pre-set user authentication information;If the first subscriber authentication information and institute The first pre-set user authentication information successful match is stated, sends enabling signal to the terminal device so that the terminal device Clean boot, including:
If the first terminal equipment identities identification information and the first movement storage device identification information successful match, The terminal device is controlled to pop up the first dialog box to receive the first username information input by user and first password information;
First username information is matched with the first pre-set user name information, and by the first password information and institute The first preset password information is stated to be matched;
If the success of first username information and the first pre-set user name information matches, and the first password information with The first preset password information successful match sends enabling signal to the terminal device so that the terminal device opens safely It is dynamic.
3. according to the method described in claim 1, it is characterized in that, by the first terminal equipment identities identification information and certainly After the first movement storage device identification information of body is matched, the method further includes:
If the first terminal equipment identities identification information is with the first movement storage device identification information, it fails to match, Obtain identities match number;
Judge whether the identities match number is preset times, when to be, the terminal device is controlled to shut down.
4. according to the method described in claim 3, it is characterized in that, the method further includes:
The terminal device is controlled to pop up the second dialog box to receive the second encrypted message input by user;
Second encrypted message is matched with second preset password information;
If second encrypted message and the second preset password information successful match, using described in pre-stored key pair It decrypts encryption section.
5. according to the method described in claim 1, it is characterized in that, the first terminal equipment identities identification information is in mainboard The MAC codes of BIOS.
6. a kind of terminal device safety starting device, which is characterized in that run on movable storage device, described device includes:
Terminal device identity acquisition module, for obtaining the first terminal equipment identities identification information of the terminal device;
First information matching module, for the first terminal equipment identities identification information and the first movement storage of itself to be set Standby identification information is matched;
Authentication receiving module, if for the first terminal equipment identities identification information and the first movement storage device Identification information successful match controls the terminal device to pop up the first dialog box to receive the first user body input by user Part verification information;
Second information matches module for obtaining the first subscriber authentication information, and first user identity is tested Card information is matched with the first pre-set user authentication information;
Clean boot module, if for the first subscriber authentication information and the first pre-set user authentication information Successful match sends enabling signal to the terminal device so that the terminal device clean boot.
7. device according to claim 6, which is characterized in that the authentication receiving module includes first and receives submodule Block, the second information matches module include the first matched sub-block, and the clean boot module includes the first promoter module,
First receiving submodule is used to set in the first terminal equipment identities identification information and the first movement storage During standby identification information successful match, the terminal device is controlled to pop up the first dialog box and is used with receiving input by user first Name in an account book information and first password information;
First matched sub-block is used to match first username information with the first pre-set user name information, and The first password information is matched with first preset password information;
First promoter module be used for first username information and the first pre-set user name information matches into Work(, and when the first password information and the first preset password information successful match, enabling signal is sent to the terminal Equipment is so that the terminal device clean boot.
8. device according to claim 6, which is characterized in that described device further includes:
Start authentification failure number acquisition module, if for the first terminal equipment identities identification information and the first movement It fails to match for storage device identification information, obtains identities match number;
Control shutdown module, for judging whether the startup authentification failure number is preset times, when to be, described in control Terminal device shuts down.
9. device according to claim 8, which is characterized in that dialog box pop-up module includes encrypted message submodule, the Three information matches modules include matching receiving submodule, and the deciphering module includes decryption submodule;
The encrypted message submodule is used to that the terminal device to be controlled to pop up the second dialog box to receive input by user second Encrypted message;
The matching receiving submodule is used to match second encrypted message with second preset password information;
If the decryption submodule is for second encrypted message and the second preset password information successful match, utilize It decrypts encryption section described in pre-stored key pair.
10. device according to claim 6, which is characterized in that the first terminal equipment identities identification information is mainboard The MAC codes of middle BIOS.
CN201810021406.6A 2018-01-10 2018-01-10 terminal device safe starting method and device Pending CN108197458A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810021406.6A CN108197458A (en) 2018-01-10 2018-01-10 terminal device safe starting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810021406.6A CN108197458A (en) 2018-01-10 2018-01-10 terminal device safe starting method and device

Publications (1)

Publication Number Publication Date
CN108197458A true CN108197458A (en) 2018-06-22

Family

ID=62588549

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810021406.6A Pending CN108197458A (en) 2018-01-10 2018-01-10 terminal device safe starting method and device

Country Status (1)

Country Link
CN (1) CN108197458A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110287686A (en) * 2019-06-24 2019-09-27 深圳市同泰怡信息技术有限公司 A kind of the clean boot right management method and equipment of basic input output system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101788959A (en) * 2010-02-03 2010-07-28 武汉固捷联讯科技有限公司 Solid state hard disk secure encryption system
CN103279714A (en) * 2013-06-19 2013-09-04 深圳市中兴移动通信有限公司 Mobile terminal as well as data encryption and decryption method
CN103825738A (en) * 2013-12-31 2014-05-28 北京华虹集成电路设计有限责任公司 Registration information authentication method and device
CN105790945A (en) * 2014-12-22 2016-07-20 中国移动通信集团公司 Authentication method, device and system for authenticating user unique identity
CN106991308A (en) * 2017-04-10 2017-07-28 四川阵风科技有限公司 Safety certifying method, apparatus and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101788959A (en) * 2010-02-03 2010-07-28 武汉固捷联讯科技有限公司 Solid state hard disk secure encryption system
CN103279714A (en) * 2013-06-19 2013-09-04 深圳市中兴移动通信有限公司 Mobile terminal as well as data encryption and decryption method
CN103825738A (en) * 2013-12-31 2014-05-28 北京华虹集成电路设计有限责任公司 Registration information authentication method and device
CN105790945A (en) * 2014-12-22 2016-07-20 中国移动通信集团公司 Authentication method, device and system for authenticating user unique identity
CN106991308A (en) * 2017-04-10 2017-07-28 四川阵风科技有限公司 Safety certifying method, apparatus and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110287686A (en) * 2019-06-24 2019-09-27 深圳市同泰怡信息技术有限公司 A kind of the clean boot right management method and equipment of basic input output system
CN110287686B (en) * 2019-06-24 2021-06-15 深圳市同泰怡信息技术有限公司 Safe starting authority management method and equipment for basic input output system

Similar Documents

Publication Publication Date Title
US11706033B2 (en) Secure distributed information system
US6732278B2 (en) Apparatus and method for authenticating access to a network resource
US20060075230A1 (en) Apparatus and method for authenticating access to a network resource using multiple shared devices
US20070005974A1 (en) Method for transferring encrypted data and information processing system
US20080010453A1 (en) Method and apparatus for one time password access to portable credential entry and memory storage devices
CN108768963B (en) Communication method and system of trusted application and secure element
KR20100016579A (en) System and method for distribution of credentials
CN108763917B (en) Data encryption and decryption method and device
CN108965222A (en) Identity identifying method, system and computer readable storage medium
CN103929308B (en) Information Authentication method applied to rfid card
US20180053018A1 (en) Methods and systems for facilitating secured access to storage devices
US11809540B2 (en) System and method for facilitating authentication via a short-range wireless token
CN108667784A (en) The system and method for internet identity card checking information protection
CN112036881A (en) Software and hardware implementation mode for getting through different system accounts by using block chain
US9210134B2 (en) Cryptographic processing method and system using a sensitive data item
CN109075974B (en) Binding authentication method of fingerprint algorithm library and fingerprint sensor and fingerprint identification system
CN108197458A (en) terminal device safe starting method and device
US9292992B2 (en) Simplified smartcard personalization method, and corresponding device
CN108121905A (en) Encryption section access method and device
US11606196B1 (en) Authentication system for a multiuser device
CN105227562A (en) The key business data transmission mediation device of identity-based checking and using method thereof
US11831759B1 (en) Optimized authentication system for a multiuser device
Lee et al. The study on the security solutions of USB memory
JP3958017B2 (en) Communication system and communication method
KR101684905B1 (en) User authentication device for multi-authenticating by using fingerprint, security key and wireless tag

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180622

RJ01 Rejection of invention patent application after publication