CN108959868B - Computer starting method and device and computer - Google Patents

Computer starting method and device and computer Download PDF

Info

Publication number
CN108959868B
CN108959868B CN201810690862.XA CN201810690862A CN108959868B CN 108959868 B CN108959868 B CN 108959868B CN 201810690862 A CN201810690862 A CN 201810690862A CN 108959868 B CN108959868 B CN 108959868B
Authority
CN
China
Prior art keywords
computer
user
alarm prompt
information
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810690862.XA
Other languages
Chinese (zh)
Other versions
CN108959868A (en
Inventor
李孙维
翁桂林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanchang Huaqin Electronic Technology Co ltd
Original Assignee
Nanchang Huaqin Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanchang Huaqin Electronic Technology Co ltd filed Critical Nanchang Huaqin Electronic Technology Co ltd
Priority to CN201810690862.XA priority Critical patent/CN108959868B/en
Publication of CN108959868A publication Critical patent/CN108959868A/en
Application granted granted Critical
Publication of CN108959868B publication Critical patent/CN108959868B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the invention discloses a computer startup method, a device and a computer, wherein the method comprises the following steps: after the computer is started, entering a safety protection mode and displaying a pseudo computer desktop outwards; acquiring user operation generated by a user; judging whether the user operation is consistent with the decryption triggering operation; if not, generating alarm prompt information and sending the alarm prompt information to the bound mobile terminal; if yes, a verification area for verifying the identity of the user appears on the pseudo computer desktop; judging whether the filling content in the verification area is consistent with the filling content set before the last shutdown; if yes, exiting the safety protection mode and entering a normal use mode. According to the technical scheme provided by the embodiment of the invention, a more flexible and hidden unlocking mode is adopted, the protection degree of the personal privacy of the user is enhanced, the information security of the computer is greatly improved, the condition that the computer is illegally used can be timely notified to the user, and the larger loss is avoided.

Description

Computer starting method and device and computer
Technical Field
The embodiment of the invention relates to the technical field of terminal security, in particular to a computer startup method, a computer startup device and a computer.
Background
With the development of science and technology and the improvement of living standard of people, computers are more and more common, the life of people is greatly facilitated, a lot of data and files can be stored, but privacy leakage of people is easily caused, for example, names, telephones and photos can be easily caused, and as long as the computers are stolen, some files in the computers can be stolen by lawbreakers at any time.
At present, people generally choose to set a character password type password lock when a computer is started so as to protect personal privacy. However, when the password input box appears, the user is equivalently told that the password is set in the computer currently, so that the user who has illegal attempts can be directly guided to try to unlock and steal the information by using a cracking means, and the safety is poor. In addition, the person who is stolen cannot know or cannot know in time that the computer is stolen, and cannot take remedial measures or alarm at the first time.
Disclosure of Invention
The invention provides a computer booting method, a device and a computer, which aim to solve the defects of the prior art.
In order to achieve the above purpose, the present invention provides the following technical solutions:
in a first aspect, an embodiment of the present invention provides a computer booting method, where the method includes:
after the computer is started, entering a safety protection mode and displaying a pseudo computer desktop outwards;
acquiring user operation generated by a user;
judging whether the user operation is consistent with the decryption triggering operation;
if not, generating alarm prompt information and sending the alarm prompt information to the bound mobile terminal;
if so, a verification area for verifying the identity of the user appears on the pseudo computer desktop, so that the user can fill the verification area with the content;
judging whether the filling content in the verification area is consistent with the filling content set before the last shutdown;
if yes, exiting the safety protection mode and entering a normal use mode;
and if not, executing the operation of generating alarm prompt information and sending the alarm prompt information to the bound mobile terminal.
Further, the computer booting method, after the computer booting is completed, before entering a security protection mode and displaying a pseudo computer desktop to the outside, further includes:
presetting a user operation as a decryption triggering operation, wherein the decryption triggering operation triggers the computer to appear an authentication area for authenticating the identity of the user.
Further, the computer booting method, after the generating of the alarm prompt message and the sending of the alarm prompt message to the operation on the bound mobile terminal, further includes:
activating a program which needs to be verified by the short message of the mobile phone when the mobile phone is started up again;
and forcibly shutting down the computer.
Further, in the computer booting method, the step of generating the alarm prompt message and sending the alarm prompt message to the bound mobile terminal includes:
acquiring an image of the user;
positioning the current position information of the computer;
and generating alarm prompt information according to the image and the position information of the user, and sending the alarm prompt information to the bound mobile terminal.
Further, the computer booting method, before the step of generating the alarm prompt message and sending the alarm prompt message to the bound mobile terminal, further includes:
and binding the computer with the mobile terminal.
Further, in the computer booting method, the verification area for verifying the user identity is a grid layout area, and the user selects one or more designated area blocks composed of any icon on the pseudo computer desktop to fill in one or more designated grid positions of the grid layout area.
In a second aspect, an embodiment of the present invention provides a computer booting device, including:
the protection starting module is used for entering a safety protection mode after the computer is started and displaying a pseudo computer desktop outwards;
the information acquisition module is used for acquiring user operation generated by a user;
the information judgment module is used for judging whether the user operation is consistent with the decryption triggering operation;
the alarm prompting module is used for generating alarm prompting information and sending the alarm prompting information to the bound mobile terminal if the user operation is inconsistent with the decryption triggering operation;
the area presentation module is used for presenting an authentication area for authenticating the identity of the user on the pseudo computer desktop if the user operation is consistent with the decryption triggering operation so that the user can fill the content in the authentication area;
the information verification module is used for judging whether the filling content in the verification area is consistent with the filling content set before the last shutdown;
the protection ending module is used for exiting the safety protection mode and entering a normal use mode if the filling content in the verification area is consistent with the filling content set before the last shutdown;
and if the filling content in the verification area is inconsistent with the filling content set before the last shutdown, the alarm prompt module generates alarm prompt information and sends the alarm prompt information to the bound mobile terminal.
Further, the computer booting device further includes:
the operation setting module is used for presetting a user operation as a decryption triggering operation before the steps of entering a security protection mode and displaying a pseudo computer desktop outwards after the computer is started, wherein the decryption triggering operation triggers the computer to generate a verification area for verifying the identity of the user.
Further, the computer booting device further includes:
the program activating module is used for activating a program which needs to be verified by the short message of the mobile phone when the mobile phone is started up again after the steps of generating the alarm prompt message and sending the alarm prompt message to the bound mobile terminal;
and the forced shutdown module is used for forcibly shutting down the computer.
Further, in the computer startup device, the alarm prompt module includes:
the image acquisition unit is used for acquiring the image of the user;
the position positioning unit is used for positioning the current position information of the computer;
and the alarm prompting unit is used for generating alarm prompting information according to the image and the position information of the user and sending the alarm prompting information to the bound mobile terminal.
In a third aspect, an embodiment of the present invention provides a computer including the computer booting device of the second aspect, so as to implement the computer booting method of the first aspect.
According to the computer startup method, the computer startup device and the computer, a more flexible and hidden unlocking mode is adopted, the protection degree of personal privacy of a user is enhanced, the information security of the computer is greatly improved, the situation that the computer is illegally used can be timely notified to the user, and larger loss is avoided.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
FIG. 1 is a flowchart illustrating a computer booting method according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a computer booting method according to a second embodiment of the present invention;
FIG. 3 is a flowchart illustrating a computer booting method according to a third embodiment of the present invention;
FIG. 4 is a flowchart illustrating a computer booting method according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of a computer booting device according to a fifth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a flowchart illustrating a computer booting method according to an embodiment of the present invention, the method is suitable for setting a password lock for a computer to protect personal privacy, and the method is executed by a computer booting device, which may be implemented by software and/or hardware and integrated inside the computer. The method specifically comprises the following steps:
s101, after the computer is started, entering a safety protection mode and displaying a pseudo computer desktop outwards.
It should be noted that, if the computer has the startup unlocking setting before the last shutdown, the computer does not directly enter the normal use mode after the next startup is completed, but enters the security protection mode first, and after the user identity authentication is passed, the startup unlocking of the computer is completed, and at this time, the computer can enter the normal use mode. In the security protection mode, a pseudo computer desktop appears on the computer, and the pseudo computer desktop is consistent with the computer desktop before the computer is powered off last time and has all computer icons owned by the computer. The arrangement is to ensure that a thief takes the computer as a normal work and makes the computer relax and alert.
Specifically, the step of starting the startup unlocking setting for the computer before shutdown comprises the following steps: when a user presses a power-off key, a verification area for verifying the identity of the user appears on the computer desktop, and the user is prompted to fill the verification area with content; the user can select any content to fill the verification area and confirm the verification area; the computer stores the information set by the user for verification when the computer is started next time.
And S102, acquiring user operation generated by a user.
The user operation refers to user operation data generated when a user operates a computer, such as keyboard key input and mouse click input.
S103, judging whether the user operation is consistent with the decryption trigger operation, if not, executing S104, and if so, executing S105.
In one embodiment, it is preferable that the decryption triggering operation is set to a state where the ESC key in the keyboard area of the computer is pressed, and the execution of S105 is continued if and only if the user presses the ESC key and determines that the decryption triggering operation is identical. And when the user presses other keys in the keyboard area of the computer or clicks the pseudo icon on the desktop of the pseudo computer by using the mouse or does not execute any operation for 30 seconds, the computer determines that the operation is inconsistent with the decryption triggering operation, and therefore S104 is executed.
And S104, generating alarm prompt information and sending the alarm prompt information to the bound mobile terminal.
In special cases, if the current user is a person known by the computer holder and uses the computer only after the permission of the computer holder, the computer holder can ignore the received alarm prompt message.
Preferably, before the step of generating the alarm prompt message and sending the alarm prompt message to the bound mobile terminal, the method further comprises the step of binding the computer and the mobile terminal.
And S105, a verification area for verifying the identity of the user appears on the pseudo computer desktop, so that the user can fill the verification area with the content.
In one embodiment, the verification area for verifying the identity of the user is preferably an 8 × 8 grid layout area. At this time, the user can select one or more designated area blocks (such as 2 × 3) composed of any icons on the pseudo computer desktop to fill one or more designated grid positions in the grid layout area.
S106, judging whether the filling content in the verification area is consistent with the filling content set before the last shutdown, if so, executing S107, and if not, returning to S104.
And executing S107 if and only if the specified area block selected by the user and the specified grid position filled by the specified area block are consistent with the information set before the shutdown, otherwise executing S104.
And S107, exiting the safety protection mode and entering a normal use mode.
Specifically, the computer exits the security protection mode, the false computer desktop disappears, the real computer desktop is loaded, and normal use is resumed.
According to the computer starting method, a more flexible and hidden unlocking mode is adopted, the protection degree of personal privacy of a user is enhanced, the information safety of the computer is greatly improved, the condition that the computer is illegally used can be timely notified to the user, and the larger loss is avoided.
Example two
Fig. 2 is a schematic flow chart of a computer booting method according to a second embodiment of the present invention, which is optimized in this embodiment before entering a security protection mode and displaying a pseudo computer desktop to the outside after the computer booting is completed. The same or corresponding terms as those in the above embodiments are not repeated herein, and specifically, referring to fig. 2, the method includes:
s201, presetting a user operation as a decryption triggering operation, wherein the decryption triggering operation triggers the computer to generate a verification area for verifying the identity of the user.
Illustratively, the ESC key in the computer keyboard region is pre-set to decrypt trigger operations. After the computer is started, only when a user presses an ESC key, a verification area for verifying the identity of the user can be called out on the computer desktop.
Preferably, the step further includes binding the computer with a mobile terminal capable of achieving communication, so as to help a user to achieve real-time monitoring of the safety condition of the computer through the bound mobile terminal.
S202, after the computer is started, entering a safety protection mode and displaying a pseudo computer desktop outwards.
S203, user operation generated by the user is obtained.
And S204, judging whether the user operation is consistent with the decryption triggering operation, if not, executing S205, and if so, executing S206.
And S205, generating alarm prompt information and sending the alarm prompt information to the bound mobile terminal.
S206, a verification area for verifying the identity of the user appears on the pseudo computer desktop, so that the user can fill the verification area with the content.
And S207, judging whether the filling content in the verification area is consistent with the filling content set before the last shutdown, if so, executing S208, and if not, returning to S205.
And S208, exiting the safety protection mode and entering a normal use mode.
According to the computer starting method, a more flexible and hidden unlocking mode is adopted, the protection degree of personal privacy of a user is enhanced, the information safety of the computer is greatly improved, the condition that the computer is illegally used can be timely notified to the user, and the larger loss is avoided.
EXAMPLE III
Fig. 3 is a flowchart illustrating a computer booting method according to a third embodiment of the present invention, where the method is optimized after generating an alarm prompt and sending the alarm prompt to a bound mobile terminal based on the first embodiment. The same or corresponding terms as those in the above embodiments are not repeated herein, and specifically, referring to fig. 3, the method includes:
s301, after the computer is started, entering a safety protection mode and displaying a pseudo computer desktop outwards.
S302, user operation generated by a user is obtained.
And S303, judging whether the user operation is consistent with the decryption triggering operation, if not, executing S304, and if so, executing S307.
And S304, generating alarm prompt information and sending the alarm prompt information to the bound mobile terminal.
S305, activating a program which needs to be verified by the short message of the mobile phone when the mobile phone is started again.
It should be noted that the program is activated to achieve that the computer needs to be normally powered on by the short message verification party after being powered on again, so as to further enhance the security of the computer.
S306, forcibly shutting down the computer.
It should be noted that, the computer is forced to be shut down, so that the probability of the pirate to crack the computer can be effectively reduced.
And S307, a verification area for verifying the identity of the user appears on the pseudo computer desktop, so that the user can fill the verification area with the content.
And S308, judging whether the filling content in the verification area is consistent with the filling content set before the last shutdown, if so, executing S309, and if not, returning to S304.
S309, exiting the safety protection mode and entering a normal use mode.
According to the computer starting method, a more flexible and hidden unlocking mode is adopted, the protection degree of personal privacy of a user is enhanced, the information safety of the computer is greatly improved, the condition that the computer is illegally used can be timely notified to the user, and the larger loss is avoided.
Example four
As shown in fig. 4, the computer booting method provided in the fourth embodiment of the present invention is further optimized by, based on the technical solution provided in the first embodiment, generating an alarm prompt message and sending the alarm prompt message to the bound mobile terminal in step S104. Explanations of the same or corresponding terms as those of the above embodiments are omitted. Namely:
acquiring an image of the user;
positioning the current position information of the computer;
and generating alarm prompt information according to the image and the position information of the user, and sending the alarm prompt information to the bound mobile terminal.
Based on the above optimization, as shown in fig. 4, the computer booting method provided in this embodiment may include the following steps:
s401, after the computer is started, entering a safety protection mode, and displaying a pseudo computer desktop outwards.
S402, obtaining user operation generated by a user.
And S403, judging whether the user operation is consistent with the decryption triggering operation, if not, executing S404, and if so, executing S407.
S404, collecting the image of the user.
The camera of the computer can acquire the image of the current user.
S405, positioning the current position information of the computer.
The computer can also position the current position information of the computer, so that a computer thief is prevented from taking the computer to other places and being unable to find the computer.
S406, alarm prompt information is generated according to the image and the position information of the user and is sent to the bound mobile terminal.
When the method is specifically implemented, the image of the current user and the current position information of the computer are sent to the bound mobile terminal, meanwhile, a display message such as 'your computer is illegally used' is sent to the mobile terminal, and an alarm voice message and the like can be sent to achieve the prompting effect.
It is to be understood that there may be more than one bound mobile terminal.
S407, a verification area for verifying the identity of the user appears on the pseudo computer desktop, so that the user can fill the verification area with the content.
And S408, judging whether the filling content in the verification area is consistent with the filling content set before the last shutdown, if so, executing S409, and if not, returning to S404.
And S409, exiting the safety protection mode and entering a normal use mode.
According to the computer starting method, a more flexible and hidden unlocking mode is adopted, the protection degree of personal privacy of a user is enhanced, the information safety of the computer is greatly improved, the condition that the computer is illegally used can be timely notified to the user, and the larger loss is avoided.
EXAMPLE five
Fig. 5 is a schematic structural diagram of a computer booting device according to a fifth embodiment of the present invention, which is suitable for executing the computer booting method according to the fifth embodiment of the present invention. The device specifically comprises the following modules:
the protection starting module 51 is used for entering a safety protection mode after the computer is started and displaying a pseudo computer desktop outwards;
an information acquisition module 52, configured to acquire a user operation generated by a user;
an information judgment module 53, configured to judge whether the user operation is consistent with the decryption trigger operation;
an alarm prompt module 54, configured to generate an alarm prompt message and send the alarm prompt message to the bound mobile terminal if the user operation is inconsistent with the decryption trigger operation;
the area presenting module 55 is configured to, if the user operation is consistent with the decryption triggering operation, present an authentication area for authenticating the user identity on the pseudo computer desktop, so that the user can fill the authentication area with content;
an information verification module 56, configured to determine whether the filling content in the verification area is consistent with the filling content set before the last shutdown;
a protection ending module 57, configured to exit the security protection mode and enter a normal use mode if the filling content in the verification area is consistent with the filling content set before the last shutdown;
if the filling content in the verification area is inconsistent with the filling content set before the last shutdown, the alarm prompt module 54 generates alarm prompt information and sends the alarm prompt information to the bound mobile terminal.
According to the computer starting device, a more flexible and hidden unlocking mode is adopted, the protection degree of personal privacy of a user is enhanced, the information safety of the computer is greatly improved, the condition that the computer is illegally used can be timely notified to the user, and the larger loss is avoided.
Preferably, the computer booting device further includes:
the operation setting module is used for presetting a user operation as a decryption triggering operation before the steps of entering a safety protection mode and displaying a pseudo computer desktop outwards after the computer is started, wherein the decryption triggering operation triggers the computer to appear in a verification area for verifying the identity of the user.
Preferably, the computer booting device further includes:
the program activating module is used for activating a program which needs to be verified by the short message of the mobile phone when the mobile phone is started up again after the steps of generating the alarm prompt message and sending the alarm prompt message to the bound mobile terminal;
and the forced shutdown module is used for forcibly shutting down the computer.
Preferably, in the computer startup device, the alarm prompt module includes:
the image acquisition unit is used for acquiring the image of the user;
the position positioning unit is used for positioning the current position information of the computer;
and the alarm prompting unit is used for generating alarm prompting information according to the image and the position information of the user and sending the alarm prompting information to the bound mobile terminal.
The device can execute the method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method.
EXAMPLE six
The sixth embodiment of the invention provides a computer, which comprises all the computer startup devices provided by the fifth embodiment and is used for realizing all the computer startup methods provided by the first to fourth embodiments.
The embodiment of the invention provides a computer, which adopts a more flexible and hidden unlocking mode, enhances the protection of personal privacy of a user, greatly improves the information security of the computer, and can timely inform the user of the condition of illegal use of the computer, thereby avoiding larger loss.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A computer booting method, comprising:
after the computer is started, entering a safety protection mode and displaying a pseudo computer desktop outwards;
acquiring user operation generated by a user;
judging whether the user operation is consistent with the decryption triggering operation;
if not, generating alarm prompt information and sending the alarm prompt information to the bound mobile terminal;
if so, a verification area for verifying the identity of the user appears on the pseudo computer desktop, so that the user can fill the verification area with the content;
judging whether the filling content in the verification area is consistent with the filling content set before the last shutdown;
if so, exiting the safety protection mode, entering a normal use mode, enabling the false computer desktop to disappear, loading the real computer desktop, and recovering normal use;
if not, executing to generate alarm prompt information and sending the alarm prompt information to the bound mobile terminal;
further comprising: in a normal use mode, when a user presses a power-off key, a verification area for verifying the identity of the user appears on a computer desktop, and the user is prompted to fill the verification area with content; and storing the information set by the user for verification when the computer is started next time.
2. The computer booting method of claim 1, wherein before the steps of entering a security protection mode and displaying a pseudo computer desktop outwards after the computer booting is completed, further comprising:
presetting a user operation as a decryption triggering operation, wherein the decryption triggering operation triggers the computer to appear an authentication area for authenticating the identity of the user.
3. The computer booting method according to claim 1, further comprising, after the step of generating an alarm prompt message and sending the alarm prompt message to the bound mobile terminal:
activating a program which needs to be verified by the short message of the mobile phone when the mobile phone is started up again;
and forcibly shutting down the computer.
4. The computer booting method according to claim 1, wherein the step of generating an alarm prompt message and sending the alarm prompt message to the bound mobile terminal includes:
acquiring an image of the user;
positioning the current position information of the computer;
and generating alarm prompt information according to the image and the position information of the user, and sending the alarm prompt information to the bound mobile terminal.
5. The computer booting method according to claim 1, further comprising, before the step of generating an alarm prompt message and sending the alarm prompt message to the bound mobile terminal:
and binding the computer with the mobile terminal.
6. The computer booting method as claimed in claim 1, wherein the verification area for verifying the user identity is a grid layout area, and the user selects one or more designated area blocks composed of any icon on the pseudo computer desktop to fill in one or more designated grid positions of the grid layout area.
7. A computer booting device, comprising:
the protection starting module is used for entering a safety protection mode after the computer is started and displaying a pseudo computer desktop outwards;
the information acquisition module is used for acquiring user operation generated by a user;
the information judgment module is used for judging whether the user operation is consistent with the decryption triggering operation;
the alarm prompting module is used for generating alarm prompting information and sending the alarm prompting information to the bound mobile terminal if the user operation is inconsistent with the decryption triggering operation;
the area presentation module is used for presenting an authentication area for authenticating the identity of the user on the pseudo computer desktop if the user operation is consistent with the decryption triggering operation so that the user can fill the content in the authentication area;
the information verification module is used for judging whether the filling content in the verification area is consistent with the filling content set before the shutdown of the last time;
the protection ending module is used for exiting the safety protection mode, entering a normal use mode, enabling the false computer desktop to disappear, loading the real computer desktop and recovering normal use if the filling content in the verification area is consistent with the filling content set before the last shutdown;
if the filling content in the verification area is inconsistent with the filling content set before the last shutdown, the alarm prompt module generates alarm prompt information and sends the alarm prompt information to the bound mobile terminal;
the operation setting module is used for presetting a user operation as a decryption triggering operation before the steps of entering a safety protection mode and displaying a pseudo computer desktop outwards after the computer is started, wherein the decryption triggering operation triggers the computer to generate a verification area for verifying the identity of the user;
the computer desktop verification system comprises a computer desktop verification module, a verification setting module and a verification module, wherein the computer desktop verification module is used for generating a verification area for verifying the identity of a user and prompting the user to fill the verification area with contents when the user presses a power-off key in a normal use mode; and storing the information set by the user for verification when the computer is started next time.
8. The computer boot device of claim 7, further comprising:
the program activating module is used for activating a program which needs to be verified by the short message of the mobile phone when the mobile phone is started up again after the steps of generating the alarm prompt message and sending the alarm prompt message to the bound mobile terminal;
and the forced shutdown module is used for forcibly shutting down the computer.
9. The computer boot device according to claim 7, wherein the alarm prompting module comprises:
the image acquisition unit is used for acquiring the image of the user;
the position positioning unit is used for positioning the current position information of the computer;
and the alarm prompting unit is used for generating alarm prompting information according to the image and the position information of the user and sending the alarm prompting information to the bound mobile terminal.
10. A computer comprising the computer booting device according to any one of claims 7 to 9 to implement the computer booting method according to any one of claims 1 to 6.
CN201810690862.XA 2018-06-28 2018-06-28 Computer starting method and device and computer Active CN108959868B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810690862.XA CN108959868B (en) 2018-06-28 2018-06-28 Computer starting method and device and computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810690862.XA CN108959868B (en) 2018-06-28 2018-06-28 Computer starting method and device and computer

Publications (2)

Publication Number Publication Date
CN108959868A CN108959868A (en) 2018-12-07
CN108959868B true CN108959868B (en) 2022-05-10

Family

ID=64487896

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810690862.XA Active CN108959868B (en) 2018-06-28 2018-06-28 Computer starting method and device and computer

Country Status (1)

Country Link
CN (1) CN108959868B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109960536B (en) * 2019-03-27 2021-09-14 联想(北京)有限公司 Electronic equipment safety starting method and device and electronic equipment
CN111737768A (en) * 2019-09-02 2020-10-02 集美大学 Computer encryption and decryption method
CN113542498B (en) * 2021-06-07 2023-02-24 中国联合网络通信集团有限公司 Terminal unlocking method and device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309478B (en) * 2008-06-25 2014-11-19 宇龙计算机通信科技(深圳)有限公司 Method for mobile terminal data access
CN104182668B (en) * 2014-09-02 2018-04-13 北京元心科技有限公司 Personal identification method based on unlocking screen
CN105792183A (en) * 2014-12-25 2016-07-20 宇龙计算机通信科技(深圳)有限公司 Security protection method and device and terminal
CN106470269A (en) * 2015-08-20 2017-03-01 腾讯科技(深圳)有限公司 A kind of method and apparatus of antitheft mobile phone
US9832802B2 (en) * 2015-12-15 2017-11-28 At&T Intellectual Property I, L.P. Facilitating communications via a mobile internet-enabled connection interface

Also Published As

Publication number Publication date
CN108959868A (en) 2018-12-07

Similar Documents

Publication Publication Date Title
US10447839B2 (en) Device locator disable authentication
CN110651270B (en) Data access method and device
KR101700731B1 (en) Method and apparatus for accessing application
CN108959868B (en) Computer starting method and device and computer
US10306052B1 (en) Methods and devices for secure authentication to a compute device
CN104978109B (en) A kind of Application Program Interface display methods and terminal
CN104008346B (en) The method and apparatus of the privacy mode of log-on data processing equipment
WO2015117332A1 (en) Method and device for enabling interface in usb debugging mode, and terminal
JP5981035B2 (en) Hardware access protection
WO2014121612A1 (en) Method and device for unlocking screen, and terminal
WO2014079139A1 (en) Method and system for protecting data of mobile terminal
CN103576787A (en) Panel computer with high safety performance
CN103581378A (en) Smart phone high in safety performance
CN105069333A (en) User domain access method, access system and terminal
CN103763091A (en) Encrypting method, decrypting method, encrypting device and decrypting device of application program
WO2017166689A1 (en) Privacy protection method and device
CN109977039B (en) Hard disk encryption key storage method, device, equipment and readable storage medium
US20150047019A1 (en) Information processing method and electronic device
WO2018000509A1 (en) Safe operation method, operation device, and terminal
WO2016115760A1 (en) Terminal system control method, device, and terminal
CN104751028B (en) The method and device of application program encryption, decryption
CN103582184A (en) Double-card smart phone high in safety performance
CN104134024A (en) Mobile terminal privacy protection method and system
CN105516500A (en) Method and system for selecting device mode
CN104715172B (en) A kind of application program launching method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant