CN111259372B - Security verification method and electronic device - Google Patents

Security verification method and electronic device Download PDF

Info

Publication number
CN111259372B
CN111259372B CN202010081577.5A CN202010081577A CN111259372B CN 111259372 B CN111259372 B CN 111259372B CN 202010081577 A CN202010081577 A CN 202010081577A CN 111259372 B CN111259372 B CN 111259372B
Authority
CN
China
Prior art keywords
electronic device
verification
information
response information
interface system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010081577.5A
Other languages
Chinese (zh)
Other versions
CN111259372A (en
Inventor
吴会军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN202010081577.5A priority Critical patent/CN111259372B/en
Publication of CN111259372A publication Critical patent/CN111259372A/en
Application granted granted Critical
Publication of CN111259372B publication Critical patent/CN111259372B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the disclosure provides a security verification method, which comprises the following steps: the first electronic device starts an initialization interface system of the first electronic device; in the process of starting the initialization interface system, at least two verification requests are sent to at least one preset second electronic device, wherein the verification requests are used for requesting the at least one second electronic device to verify whether the first electronic device is started or not; receiving response information for the verification request from the second electronic device; and determining whether to start the first electronic equipment according to the response information. The embodiment of the disclosure also provides electronic equipment.

Description

Security verification method and electronic device
Technical Field
The present disclosure relates to a security verification method and an electronic device.
Background
At present, with the development of electronic technology, more and more electronic devices enter the life and work of people, and great convenience is brought to the life and work of people. Meanwhile, as electronic devices are increasingly used, safety requirements of people on the electronic devices are continuously improved. A security verification method is to set Basic Input/Output System (BIOS) passwords for electronic equipment, after the electronic equipment is started, a user inputs the BIOS passwords to verify the identity of the user, and the user enters the System after the verification is passed.
In implementing the concepts of the present disclosure, the inventor found that there are at least the following problems in the related art in using BIOS password to verify user identity: when the BIOS password is utilized for safety protection, a hacker can enter the operating system of the electronic equipment only by cracking the BIOS password, and the requirement of people on higher safety cannot be met.
Disclosure of Invention
An aspect of an embodiment of the present disclosure provides a security verification method, including: the method comprises the steps that a first electronic device starts an initialization interface system of the first electronic device, at least two verification requests are sent to at least one preset second electronic device in the process of starting the initialization interface system, the verification requests are used for requesting the at least one second electronic device to verify whether the first electronic device is started or not, response information aiming at the verification requests from the second electronic device is received, and whether the first electronic device is started or not is determined according to the response information.
Optionally, before sending the first verification request to the preset at least one second electronic device, the method further includes: and obtaining current hardware configuration information and/or current software configuration information of the first electronic device by using the initialization interface system, and generating the verification request based on the obtained current hardware configuration information and/or current software configuration information.
Optionally, the authentication request includes a first authentication request and a second authentication request. The method further comprises the following steps: the initialization interface system is used for obtaining current hardware configuration information and/or current software configuration information of the first electronic device, generating the first verification request based on the obtained current hardware configuration information and/or current software configuration information, sending the first verification request to a first device in the at least one second electronic device, obtaining password information input by a user to the first electronic device by using the initialization interface system, generating the second verification request based on the obtained password information, and sending the second verification request to a second device in the at least one second electronic device. The first device and the second device are the same electronic device, or the first device and the second device are different electronic devices.
Optionally, the receiving, by the second electronic device, response information for the authentication request includes: receiving the first response information for the first authentication request from the first device, and receiving the second response information for the second authentication request from the second device. The determining whether to start the first electronic device according to the response information includes: and determining whether to start the first electronic equipment according to the first response information and the second response information.
Optionally, the determining whether to start the first electronic device according to the first response information and the second response information includes: and determining whether second response information indicates that the verification is passed or not when the first response information indicates that the verification is passed, determining not to start the first electronic device in response to the second response information indicating that the verification is not passed, and determining not to start the first electronic device when the first response information indicates that the verification is not passed.
Optionally, the response information is generated by: and calculating a first hash value of the verification request, comparing the first hash value with a second hash value aiming at the first electronic equipment, and generating the response information according to a comparison result.
Optionally, the sending the verification request to the preset at least one second electronic device includes: and sending a verification request to the at least one second electronic device in an encryption mode.
Another aspect of an embodiment of the present disclosure provides a first electronic device, including: the system comprises a starting module, a sending module, a determining module and a receiving module, wherein the starting module is used for starting an initializing interface system of a first electronic device, the sending module is used for sending a verification request to at least one preset second electronic device in the process of starting the initializing interface system, the verification request is used for requesting the at least one second electronic device to verify whether the first electronic device is started or not, the receiving module is used for receiving response information aiming at the verification request from the second electronic device, and the determining module is used for determining whether the first electronic device is started or not according to the response information.
Optionally, the first electronic device further includes: the system comprises an obtaining module, a generating module and a verification module, wherein the obtaining module is used for obtaining current hardware configuration information and/or current software configuration information of the first electronic device by using the initializing interface system, and the generating module is used for generating the verification request based on the obtained current hardware configuration information and/or current software configuration information.
Another aspect of an embodiment of the present disclosure provides a first electronic device, including: one or more processors, a storage device, for storing executable instructions that, when executed by the processors, implement the methods of embodiments of the present disclosure.
Another aspect of the disclosed embodiments provides a computer-readable storage medium storing computer-executable instructions that, when executed, are configured to implement the methods of the disclosed embodiments.
Another aspect of the disclosed embodiments provides a computer program comprising computer executable instructions which, when executed, are for implementing the method of the disclosed embodiments.
Drawings
For a more complete understanding of the present disclosure and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
FIG. 1 schematically illustrates a system architecture to which the security verification method of the present disclosure may be applied;
FIG. 2 schematically illustrates a flow chart of a security verification method according to an embodiment of the disclosure;
FIG. 3 schematically illustrates a flow chart of a security verification method according to another embodiment of the disclosure;
FIG. 4 schematically illustrates a flow chart of a security verification method according to another embodiment of the disclosure;
fig. 5 schematically illustrates a flow chart of receiving reply information according to another embodiment of the disclosure;
FIG. 6 schematically illustrates a flowchart of determining whether to activate a first electronic device, according to another embodiment of the present disclosure;
FIG. 7 schematically illustrates a flow chart of generating reply information according to another embodiment of the disclosure;
fig. 8 schematically illustrates a block diagram of a first electronic device according to an embodiment of the disclosure;
fig. 9 schematically illustrates a block diagram of a first electronic device according to another embodiment of the disclosure; and
fig. 10 schematically illustrates a block diagram of a first electronic device adapted to implement the above-described method according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is only exemplary and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be construed to have meanings consistent with the context of the present specification and should not be construed in an idealized or overly formal manner.
Where expressions like at least one of "A, B and C, etc. are used, the expressions should generally be interpreted in accordance with the meaning as commonly understood by those skilled in the art (e.g.," a system having at least one of A, B and C "shall include, but not be limited to, a system having a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a formulation similar to at least one of "A, B or C, etc." is used, in general such a formulation should be interpreted in accordance with the ordinary understanding of one skilled in the art (e.g. "a system with at least one of A, B or C" would include but not be limited to systems with a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
Some of the block diagrams and/or flowchart illustrations are shown in the figures. It will be understood that some blocks of the block diagrams and/or flowchart illustrations, or combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the instructions, when executed by the processor, create means for implementing the functions/acts specified in the block diagrams and/or flowchart. The techniques of this disclosure may be implemented in hardware and/or software (including firmware, microcode, etc.). Additionally, the techniques of this disclosure may take the form of a computer program product on a computer-readable storage medium having instructions stored thereon, the computer program product being for use by or in connection with an instruction execution system.
Embodiments of the present disclosure provide a security verification method and a first electronic device capable of applying the method, which may include, for example, the following operations. The first electronic device starts an initialization interface system of the first electronic device. And in the process of starting the initialization interface system, at least two verification requests are sent to at least one preset second electronic device, wherein the verification requests are used for requesting the at least one second electronic device to verify whether the first electronic device is started or not. Response information to the authentication request is received from the second electronic device. And determining whether to start the first electronic equipment according to the response information.
Fig. 1 schematically illustrates a system architecture to which the security verification method of the present disclosure may be applied. It should be noted that the system architecture shown in fig. 1 is merely an example in which embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, but does not mean that embodiments of the present disclosure may not be used in other devices, systems, environments, or scenarios.
As shown in fig. 1, the scene includes a first electronic device 101 and a plurality of second electronic devices 102, 103, 104, where the first electronic device 101 is connected to the second electronic devices 102, 103, 104 through a network 105. Wherein the network 105 is used as a medium to provide a communication link between the first electronic device 101 and the second electronic devices 102, 103, 104. The network 105 may include various connection types, such as wired, wireless communication links, or fiber optic cables.
The first electronic device 101 may be various electronic devices having an initializing interface system and an operating system. The initialization interface system may include, for example, a basic input and output system, a unified extensible firmware interface (Unified Extensible Firmware Interface, abbreviated as UEFI), and the like, and the operating system may include, for example, a Windows operating system, a Linux operating system, an apple operating system, and the like. In addition, the first electronic device 101 may include, but is not limited to, a tablet computer, a portable computer, a desktop computer, a server, a special purpose computer, and the like.
The second electronic device 102, 103, 104 may be various electronic devices having an output interface and an input interface, including but not limited to a cell phone, a personal digital assistant (Personal Digtial Assistant, PDA for short), a tablet computer, a laptop portable computer, a desktop computer, a server, and the like.
After the first electronic device 101 is powered on, the first electronic device 101 starts an initialization interface system of the first electronic device 101, the initialization interface system manages and drives a network interface of the first electronic device 101, and the first electronic device 101 establishes a connection with at least one second electronic device 102, 103, 104 through the network interface. Then, the initializing interface system sends at least two verification requests to at least one second electronic device 102, 103, 104 according to a preset start-up item. For example, at least two authentication requests may be sent to one second electronic device 102, 103, 104, one authentication request may be sent to each of the plurality of second electronic devices 102, 103, 104, one authentication request may be sent to one of the plurality of second electronic devices 102, 103, 104, and at least two authentication requests may be sent to another of the plurality of second electronic devices 102, 103, 104.
The second electronic device 102, 103, 104 that receives the verification request generates corresponding response information according to the verification request, and feeds back the response information to the first electronic device 101, and the first electronic device 101 attempts to start the operating system of the first electronic device 101 based on the response information.
It should be understood that the number of first electronic devices 101, second electronic devices 102, 103, 104, and network 105 in fig. 1 is merely illustrative. There may be any number of first electronic devices 101, second electronic devices 102, 103, 104, and networks 105, as desired for implementation.
The disclosure will be described in detail below with reference to the attached drawings in conjunction with specific embodiments.
Fig. 2 schematically illustrates a flow chart of a security verification method according to an embodiment of the disclosure.
In an alternative embodiment of the present disclosure, as shown in fig. 2, the security verification method applied to the first electronic device may include, for example, the following operations S201 to S204.
In operation S201, the first electronic device starts an initialization interface system of the first electronic device.
In embodiments of the present disclosure, the initialization interface system may include a BIOS, UEFI, or the like. If the initialization interface system is UEFI, the first electronic device may initiate UEFI including the following stages: a SECurity phase (SEC phase), an initialization phase (Pre-Efi Initialization, PEI phase) before the extensible firmware interface (Extensible Firmware Interface, EFI phase), a driver execution environment phase (Driver eXEcution environment, DXE phase), a boot device select (Boot Device Selection, BDS) phase, a temporary system load phase (Transient System Load, TSL phase), and a Run Time phase (Run Time, RT phase). The above-mentioned UEFI initiation stage occurs before the first electronic device boots the operating system, and in the UEFI initiation stage, the UEFI initializes the hardware (e.g., processor, memory, network adapter, etc.) of the first electronic device, and manages and drives the hardware after the initialization, that is, in the UEFI initiation stage, the UEFI is similar to the operating system of the first electronic device, and manages and drives the hardware of the first electronic device.
Next, in operation S202, at least two verification requests are sent to at least one second electronic device set in advance in the process of starting the initialization interface system, wherein the verification requests are used for requesting the at least one second electronic device to verify whether the first electronic device is started.
In embodiments of the present disclosure, during the DXE phase, a first electronic device may establish a connection with at least one second electronic device. In the BDS phase, the first electronic device may send two or more authentication requests to at least one second electronic device connected to the first electronic device. The first electronic device may send two or more authentication requests to one second electronic device connected to the first electronic device. In addition, the first electronic device may also send at least one authentication request to each of at least two second electronic devices connected to the first electronic device. In addition, the verification request may include a request for the second electronic device to feedback the password, a request for the second electronic device to feedback the verification code, a request for the second electronic device to feedback the authentication file, a request for the second electronic device to feedback the operation result information (e.g., a request for the second electronic device to feedback the operation result obtained by adding the two numbers), a request for the second electronic device to feedback the authentication information (e.g., a request for the second electronic device to feedback the biometric authentication information), a request for the second electronic device to feedback the logical operation information (e.g., a request for the second electronic device to feedback the ordering information of the text), and so on.
In embodiments of the present disclosure, the authentication request may be sent to the at least one second electronic device in an encrypted manner.
In particular, a secure socket layer based hypertext transfer protocol (Hyper Text Transfer Protocol over Secure socket layer, HTTPS) may be employed to send the authentication request to the at least one second electronic device. Since HTTPS ensures the security of the transmission process by transmission encryption and authentication based on the hypertext transfer protocol (Hyper Text Transfer Protocol, HTTP for short). Therefore, the security of authentication request transmission can be improved by adopting an encryption mode to transmit the authentication request.
Still further, in operation S203, response information for the authentication request from the second electronic device is received.
In an embodiment of the present disclosure, after a first electronic device transmits a verification request to a second electronic device, answer information for the verification request that has been transmitted is intercepted for a predetermined time. For example, the initializing interface system of the first electronic device continuously listens for response information from the second electronic device for the transmitted authentication request through the network interface within 5 seconds after the initializing interface system of the first electronic device transmits the authentication request to the second electronic device through the network interface of the first electronic device. Wherein the reply information may include at least one of: passwords, verification codes, authentication result information, authentication files, mathematical operation results, logical operation results and the like.
Then, in operation S204, it is determined whether to activate the first electronic device according to the response information.
In an embodiment of the present disclosure, if the first electronic device receives response information to an authentication request that has been transmitted within a predetermined time, the first electronic device attempts to boot and start an operating system of the first electronic device through the received response information. I.e. the initializing interface system of the first electronic device determines whether reply information for an already transmitted authentication request is received. If the corresponding response information is determined to be received, the initialization interface system of the first electronic device guides the operating system of the first electronic device through the received response information, and the operating system of the first electronic device is started. For example, if the first electronic device receives reply information for an authentication request that has been sent, the initialization interface system of the first electronic device determines whether the received reply information is correct. If the received response information is correct, the initialization interface system of the first electronic device guides the operating system of the first electronic device.
According to the embodiment of the disclosure, after the first electronic device is powered on, the initialization interface system is started, and in the process of starting the initialization interface system, the first electronic device sends two or more verification requests to at least one second electronic device which is connected with the first electronic device. The at least one second electronic device that receives the authentication request may feed back response information for the authentication request to the first electronic device. The initialization interface system of the first electronic device may determine whether to direct the operating system of the first electronic device to start based on response information fed back by all the second electronic devices. Thus, after the first electronic device receives the response information for two or more verification requests, the initialization interface system of the first electronic device may determine whether to boot and start the operating system.
If the hacker breaks the BIOS password or the UEFI password, the BIOS password or the UEFI password is input through the first electronic device. In which case the first electronic device will only send an authentication request to the second electronic device. Therefore, the first electronic device cannot receive the response information fed back by the second electronic device for two or more verification requests, and then according to the embodiment of the disclosure, the initialization interface system of the first electronic device determines not to boot the operating system of the first electronic device, thereby achieving the high security requirement. In addition, according to the embodiment of the present disclosure, the method for performing security verification on the first electronic device is performed before the operating system of the first electronic device is started, and reliability is higher than the method for performing security verification after the operating system is started.
The method shown in fig. 2 is further described below with reference to fig. 3-7 in conjunction with the exemplary embodiment.
Fig. 3 schematically illustrates a flow chart of a security verification method according to another embodiment of the present disclosure.
Specifically, as an alternative embodiment, as shown in fig. 3, the security verification method may further include the following operations S301 to S302 before operation S202.
In operation S301, current hardware configuration information and/or current software configuration information of the first electronic device is obtained using the initialization interface system.
In the embodiment of the disclosure, in the process of starting the initializing interface system of the first electronic device, since the initializing interface system of the first electronic device manages and drives the software and hardware of the first electronic device, the initializing interface system of the first electronic device may obtain the current hardware configuration information and/or the current software configuration information of the first electronic device. For example, the current hardware configuration information of the first electronic device may include hardware model information of the first electronic device and hardware parameter information of the first electronic device. For example, the hardware model information of the first electronic device may include a model of a processor, a model of a hard disk, a model of a memory, a model of a network adapter, and the like. The hardware parameter information of the first electronic device may include a processing frequency of the processor, a size of the hard disk, a size of the memory, a maximum data transmission rate of the network adapter, and the like. In addition, the current software configuration information of the first electronic device may include a name of the software installed on the first electronic device, a version number of the software installed on the first electronic device, a serial number of the software installed on the first electronic device, and the like.
Next, in operation S302, a verification request is generated based on the obtained current hardware configuration information and/or current software configuration information.
In embodiments of the present disclosure, the current hardware configuration information and/or the current software configuration information may be processed using Message-Digest algorithm 5 (MD 5 for short) to generate an MD5 code, and the MD5 code may be used as the authentication request.
Note that, operations S201 to S204 in fig. 3 are the same as operations S201 to S204 in fig. 2, and are not described here.
By the embodiment of the disclosure, the first electronic device can acquire the current hardware configuration information and/or the current software configuration information of the first electronic device by using the initialization interface system, and can generate the verification request by using the acquired current hardware configuration information and/or the current software configuration information. Therefore, if the hardware configuration or the software configuration of the first electronic device changes, the verification request of the first electronic device cannot pass the verification of the second electronic device, and the second electronic device cannot feed back response information to the first electronic device. Therefore, if the initialization interface system is UEFI, the first electronic device will stay in the BDS stage during the process of starting the UEFI, and cannot enter the next stage, so that the UEFI cannot boot the operating system of the first electronic device, and accordingly, the operating system will not be started. Therefore, the safety of the first electronic equipment can be ensured, and the user is prevented from modifying the software and hardware configuration of the first electronic equipment.
Fig. 4 schematically illustrates a flow chart of a security verification method according to another embodiment of the present disclosure.
Specifically, as an alternative embodiment, as shown in fig. 4, in operation S202 in fig. 2, at least two verification requests are sent to at least one second electronic device set in advance during the process of starting the initialization interface system, which may include the following operations S2021 to S2024.
In operation S2021, current hardware configuration information and/or current software configuration information of the first electronic device is obtained using the initialization interface system.
In the embodiment of the disclosure, during the process of starting the initializing interface system by the first electronic device, the initializing interface system can manage and drive the software and hardware of the first electronic device. Thus, the initializing interface system of the first electronic device may obtain current hardware configuration information and/or current software configuration information of the first electronic device.
Next, in operation S2022, a first authentication request is generated based on the obtained current hardware configuration information and/or current software configuration information, and the first authentication request is transmitted to a first device of the at least one second electronic device.
In embodiments of the present disclosure, the current hardware configuration information and/or the current software configuration information may be processed using a hash algorithm to generate a first hash value, which is the first verification request. In addition, the initialization interface system of the first electronic device may send the first hash value to a second device connected to the first electronic device through a network interface of the first electronic device. In addition, after the second device receives the first hash value, whether the received first hash value is consistent with a second hash value locally stored by the second device is compared, and response information for the first hash value is generated according to a comparison result.
Still further, in operation S2023, the password information input by the user to the first electronic device is obtained using the initialization interface system.
In embodiments of the present disclosure, during a process in which the first electronic device starts up the initialization interface system, the initialization interface system may manage and drive an input device of the first electronic device. Thus, the user may input password information through the input device.
Then, in operation S2024, a second authentication request is generated based on the obtained password information and transmitted to a second device of the at least one second electronic device.
In the embodiment of the disclosure, the first electronic device may directly send the password information as the second authentication request to the second device, or may process the password information by using an MD5 algorithm, a hash algorithm, or the like, and send the processing result information as the second authentication request to the second device. If the first electronic device directly sends the password information to the second device as a second verification request, the second device can compare the received password information with information stored locally by the second device and generate response information for the password information according to a comparison result. If the first electronic device processes the password information and sends the processing result information to the second device as a second verification request, the second device may compare the received processing result information with information stored locally by the second device and generate response information for the processing result information according to the comparison result.
In the embodiment of the disclosure, the first device and the second device may be the same electronic device or different electronic devices. If the first device and the second device are the same electronic device, the same second electronic device verifies different types of verification requests sent by the first electronic device. If the first device and the second devices are different electronic devices, each second electronic device that receives the authentication request authenticates the corresponding kind of authentication request sent by the first electronic device.
Note that, operation S201 in fig. 4 corresponds to operation S201 in fig. 2, operation S203 in fig. 4 corresponds to operation S203 in fig. 2, and operation S204 in fig. 4 corresponds to operation S204 in fig. 2, which is not described herein.
By the embodiment of the disclosure, the initialization interface system of the first electronic device generates a first verification request based on the current hardware configuration information and/or the current software configuration information of the first electronic device, and generates a second verification request based on password information input by a user. The first authentication request and the second authentication request are then sent to the same second electronic device, or the first authentication request is sent to one second electronic device and the second authentication request is sent to the other second electronic device. Therefore, one second electronic device can be utilized to verify different types of verification requests sent by the first electronic device, and a plurality of second electronic devices can also be utilized to verify different types of verification requests sent by the first electronic device, so that the high-security authentication requirement can be met.
Fig. 5 schematically illustrates a flowchart of receiving acknowledgement information according to another embodiment of the present disclosure.
Specifically, as an alternative embodiment, as shown in fig. 5, operation S203 in fig. 4, which receives response information for the authentication request from the second electronic device, may include the following operations S2031 to S2032.
In operation S2031, first response information for a first authentication request from a first device is received.
In an embodiment of the disclosure, a first device receives a first verification request sent by a first electronic device, and generates first response information according to the first verification request. Then, the first device transmits the generated first response information to the first electronic device. The first response information may include a password, a verification code, authentication result information, an authentication file, a mathematical operation result, a logical operation result, and the like. For example, when the first authentication request requires the first device to feed back the password, the first reply information may be the password, when the first authentication request requires the first device to feed back the authentication code, the first reply information may be the authentication code, and when the first authentication request requires the first device to feed back the authentication file, the first reply information may be the authentication file.
Next, in operation S2032, second response information for the second authentication request from the second device is received.
In an embodiment of the disclosure, the second device receives a second verification request sent by the first electronic device, and generates second response information according to the second verification request. Then, the second device transmits the generated first response information to the first electronic device. The second response information may include a password, a verification code, authentication result information, an authentication file, a mathematical operation result, a logical operation result, and the like. In addition, if the first authentication request and the second authentication request belong to different kinds of requests, the first response information and the second response information belong to different kinds of response information.
Operation S204 in fig. 4, which determines whether to activate the first electronic device according to the response information, may include the following operation S2041.
In operation S2041, it is determined whether to activate the first electronic device according to the first response information and the second response information.
In an embodiment of the disclosure, if the first response information and the second response information received by the first electronic device are both consistent with information stored in a persistent memory (e.g., a read-only memory) of the first electronic device, the initialization interface system of the first electronic device boots and starts the operating system of the first electronic device, otherwise, the initialization interface system of the first electronic device does not boot the operating system of the first electronic device.
Note that, the operation S201 in fig. 5 corresponds to the operation S201 in fig. 4, and the operations S2021 to S2024 in fig. 5 correspond to the operations S2021 to S2024 in fig. 4, and are not described herein.
Through embodiments of the present disclosure, a network interface of a first electronic device may receive first reply information from a first device and second reply information from a second device. The initialization interface system of the first electronic device may then determine whether to boot the operating system of the first electronic device based on the first response information and the second response information. After the plurality of second electronic devices feed back corresponding response information to the first electronic device, the initialization interface system of the first electronic device can guide and start the operating system, so that the safety of starting the first electronic device is improved.
Fig. 6 schematically illustrates a flowchart of determining whether to activate a first electronic device according to another embodiment of the present disclosure.
Specifically, as an alternative embodiment, as shown in fig. 6, operation S2041 in fig. 5 to determine whether to start the first electronic device according to the first response information and the second response information may include the following operations S20411 to S20413.
In operation S20411, in the case where it is determined that the first response information indicates that verification is passed, it is determined whether the second response information indicates that verification is passed.
In the embodiment of the disclosure, the initialization interface system of the first electronic device verifies the second response information only when the initialization interface system of the first electronic device determines that the first response information passes the verification, so that the data processing amount of the first electronic device can be reduced. If the first response information is a first password, the initializing interface system of the first electronic device compares the first password received from the first device with a second password stored locally by the first electronic device. If the first password and the second password are consistent, the initializing interface system of the first electronic device determines that the first response information indicates authentication pass, and then determines whether the second response information received from the second device indicates authentication pass.
Next, in operation S20412, it is determined that the first electronic device is not started in response to the second response information indicating that the verification is not passed.
In an embodiment of the present disclosure, if the initializing interface system of the first electronic device determines that the first response information indicates that verification is passed and the second response information is an authentication file, the initializing interface system of the first electronic device performs a correlation operation (e.g., a hash operation) on the received authentication file to obtain a corresponding operation result. If the initialization interface system of the first electronic device determines that the operation result obtained according to the authentication file is inconsistent with the information stored locally in the first electronic device, the second response information indicates that the verification is not passed, and the initialization interface system of the first electronic device does not guide the operating system of the first electronic device.
Then, in operation S20413, in the case where it is determined that the first answer information verification is not passed, it is determined that the first electronic apparatus is not started.
In an embodiment of the disclosure, if the first reply information is a first password, the initializing interface system of the first electronic device compares the first password received from the first device with a second password stored locally by the first electronic device, and if the first password and the second password are inconsistent, then it is determined that the first reply information indicates that the verification is not passed, then the initializing interface system of the first electronic device does not boot the operating system of the first electronic device.
By the embodiment of the disclosure, the initialization interface system of the first electronic device sequentially determines the response information received from the second electronic device, the latter response information is verified only if the former response information indicates that verification is passed, and the initialization interface system of the first electronic device guides and starts the operating system of the first electronic device only if all the received response information indicates that verification is passed. It can be seen that, when the plurality of pieces of response information received by the first electronic device include response information indicating that the verification is not passed, if the initializing interface system of the first electronic device determines that there is response information indicating that the verification is not passed, the initializing interface system of the first electronic device does not need to determine whether the remaining pieces of response information indicate that the verification is passed, so that the data processing amount of the first electronic device can be reduced, and further the time for the user to wait for the first electronic device to execute the security authentication is reduced. And the initialization interface system of the first electronic equipment can guide and start the operating system of the first electronic equipment only if all response information received by the first electronic equipment indicates that verification is passed, and the safety coefficient of the first electronic equipment is high.
Fig. 7 schematically illustrates a flow chart of generating reply information according to another embodiment of the disclosure.
Specifically, as an alternative embodiment, as shown in fig. 7, generating the response information may include the following operations S701 to S703.
In operation S701, a first hash value of a verification request is calculated.
In an embodiment of the disclosure, the first electronic device may generate the verification request based on current hardware configuration information and/or current software configuration information of the first electronic device, may generate the verification request based on information input by a user through an input interface of the first electronic device, and may generate the verification request based on information stored locally by the first electronic device. Wherein the authentication request may be text information and the text information may be processed using a hash algorithm to obtain a first hash value associated with the authentication request.
Next, in operation S702, the first hash value and the second hash value for the first electronic device are compared.
In an embodiment of the present disclosure, the second hash value may be stored locally at the second electronic device, and the second electronic device may compare the first hash value to the second hash value stored locally at the second electronic device.
Then, in operation S703, response information is generated according to the comparison result.
In an embodiment of the present disclosure, the second electronic device may compare the first hash value with a second hash value stored locally by the second electronic device, and if the first hash value is consistent with the second hash value, the second electronic device may generate response information indicating that the verification is passed, and if the first hash value is inconsistent with the second hash value, the second electronic device may generate response information indicating that the verification is not passed. In addition, if the first hash value does not coincide with the second hash value, the second electronic device may not generate the response information, that is, the second electronic device does not send the response information for the authentication request to the first electronic device.
According to the embodiment of the disclosure, after receiving the verification request sent by the first electronic device, the second electronic device calculates a first hash value corresponding to the verification request. And then comparing the calculated first hash value with a second hash value locally stored by the second electronic device, if the first hash value is consistent with the second hash value, generating response information indicating that the verification is passed, and if the first hash value is inconsistent with the second hash value, generating response information indicating that the verification is not passed. It can be seen that if the verification request is associated with the software and hardware information of the first electronic device, the information stored in the first electronic device, and the information input to the first electronic device, the configuration of the software and hardware of the first electronic device changes, or the information stored in the first electronic device changes, or when the information input by the user through the input interface of the first electronic device changes, the first hash value calculated by the second electronic device and the second hash value locally stored in the second electronic device will not be consistent. Therefore, the second electronic device can generate response information indicating that verification is not passed, and at the moment, the first electronic device cannot guide and start the operating system of the first electronic device based on the response information sent by the second electronic device, so that the safety factor is high.
Fig. 8 schematically illustrates a block diagram of a first electronic device according to an embodiment of the disclosure.
In an alternative embodiment of the present disclosure, a first electronic device as shown in fig. 8 may be used to implement the method described in the above embodiment. The first electronic device 800 may include a start module 810, a transmit module 820, a receive module 830, and a determine module 840.
Specifically, the starting module 810 is configured to start an initializing interface system of the first electronic device 800.
The sending module 820 is configured to send a verification request to at least one preset second electronic device during the process of starting the initializing interface system, where the verification request is used to request the at least one second electronic device to verify whether to start the first electronic device 800.
The receiving module 830 is configured to receive response information for the authentication request from the second electronic device.
The determining module 840 is configured to determine whether to activate the first electronic device 800 according to the response information.
Fig. 9 schematically illustrates a block diagram of a first electronic device according to another embodiment of the disclosure.
In an alternative embodiment of the present disclosure, a first electronic device, as shown in fig. 9, may be used to implement the method described in the above embodiment. The first electronic device 800 may also include an acquisition module 850 and a generation module 860.
The obtaining module 850 is configured to obtain current hardware configuration information and/or current software configuration information of the first electronic device 800 using the initializing interface system.
The generating module 860 is configured to generate a verification request based on the obtained current hardware configuration information and/or the current software configuration information.
It should be noted that, in the embodiments of the present disclosure, the embodiments of the first electronic device portion are the same as or similar to the embodiments of the method portion, which are not described herein.
Any number of the modules, or at least some of the functionality of any number, according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules according to embodiments of the present disclosure may be implemented as split into multiple modules. Any one or more of the modules according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system-on-chip, a system-on-a-substrate, a system-on-a-package, an Application Specific Integrated Circuit (ASIC), or in hardware or firmware in any other reasonable manner of integrating or packaging the circuits, or in any one of or in any suitable combination of three of software, hardware, and firmware. Alternatively, one or more of the modules according to embodiments of the present disclosure may be at least partially implemented as computer program modules, which when executed, may perform the corresponding functions.
For example, any of the start module 810, the transmit module 820, the receive module 830, and the determine module 840 may be combined in one module to be implemented, or any of the modules may be split into a plurality of modules. Alternatively, at least some of the functionality of one or more of the modules may be combined with at least some of the functionality of other modules and implemented in one module. At least one of the start-up module 810, the transmit module 820, the receive module 830, and the determination module 840 may be implemented, at least in part, as hardware circuitry, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system-on-chip, a system-on-substrate, a system-on-package, an Application Specific Integrated Circuit (ASIC), or in hardware or firmware, such as any other reasonable manner of integrating or packaging the circuitry, or in any one of or a suitable combination of any of the three. Alternatively, at least one of the start module 810, the transmit module 820, the receive module 830, and the determine module 840 may be at least partially implemented as computer program modules that, when executed, perform the corresponding functions.
Fig. 10 schematically illustrates a block diagram of a first electronic device adapted to implement the above-described method according to an embodiment of the present disclosure. The first electronic device illustrated in fig. 10 is merely an example and should not be construed to limit the functionality and scope of use of the disclosed embodiments.
As shown in fig. 10, the first electronic device 1000 includes a processor 1010, a computer-readable storage medium 1020, a signal transmitter 1030, and a signal receiver 1040. The first electronic device 1000 may perform methods according to embodiments of the present disclosure.
In particular, the processor 1010 may include, for example, a general purpose microprocessor, an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. The processor 1010 may also include on-board memory for caching purposes. The processor 1010 may be a single processing unit or multiple processing units for performing the different actions of the method flows according to embodiments of the disclosure.
Computer-readable storage medium 1020, which may be, for example, a non-volatile computer-readable storage medium, specific examples include, but are not limited to: magnetic storage devices such as magnetic tape or hard disk (HDD); optical storage devices such as compact discs (CD-ROMs); memory such as Random Access Memory (RAM) or flash memory, etc.
The computer-readable storage medium 1020 may include a computer program 1021, which computer program 1021 may include code/computer-executable instructions that, when executed by the processor 1010, cause the processor 1010 to perform a method according to an embodiment of the present disclosure or any variation thereof.
The computer program 1021 may be configured with computer program code comprising, for example, computer program modules. For example, in an example embodiment, code in the computer program 1021 may include one or more program modules, including 1021A, modules 1021B, … …, for example. It should be noted that the division and number of modules is not fixed, and that a person skilled in the art may use suitable program modules or combinations of program modules depending on the actual situation, which when executed by the processor 1010, enable the processor 1010 to perform the methods according to embodiments of the present disclosure or any variations thereof.
According to an embodiment of the present disclosure, the processor 1010 may interact with the signal transmitter 1030 and the signal receiver 1040 to perform a method according to an embodiment of the present disclosure, or any variation thereof.
At least one of the start module 810, the transmit module 820, the receive module 830, and the determine module 840 may be implemented as computer program modules described with reference to fig. 10, which when executed by the processor 1010, may implement the respective operations described above, according to embodiments of the disclosure.
Here, the first electronic device 1000 may be the first electronic device 101 or the first electronic device 800. Accordingly, the first electronic device 1000 may implement some or all of the functions of the first electronic device 101, and the first electronic device 1000 may implement some or all of the functions of the first electronic device 800.
The present disclosure also provides a computer-readable storage medium that may be embodied in the apparatus/device/system described in the above embodiments; or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example, but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that the features recited in the various embodiments of the disclosure and/or in the claims may be combined in various combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the disclosure. In particular, the features recited in the various embodiments of the present disclosure and/or the claims may be variously combined and/or combined without departing from the spirit and teachings of the present disclosure. All such combinations and/or combinations fall within the scope of the present disclosure.
While the present disclosure has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present disclosure as defined by the appended claims and their equivalents. The scope of the disclosure should, therefore, not be limited to the above-described embodiments, but should be determined not only by the following claims, but also by the equivalents of the following claims.

Claims (8)

1. A security verification method, comprising:
the method comprises the steps that a first electronic device starts an initialization interface system of the first electronic device;
in the process of starting the initialization interface system, the initialization interface system is utilized to obtain current hardware configuration information and/or current software configuration information of the first electronic equipment, and at least two verification requests are sent to at least one preset second electronic equipment; wherein the sending at least two verification requests to at least one preset second electronic device includes:
generating a first verification request based on the obtained current hardware configuration information and/or the current software configuration information, and sending the first verification request to a first device in the at least one second electronic device; obtaining password information input by a user to the first electronic device by using the initialization interface system; and generating a second authentication request based on the obtained cryptographic information and sending the second authentication request to a second device of the at least one second electronic device; the verification request is used for requesting the at least one second electronic device to verify whether the first electronic device is started; the at least two authentication requests include a first authentication request and a second authentication request; the first device and the second device are the same electronic device, or the first device and the second device are different electronic devices;
Receiving, via the initialization interface system, reply information to the authentication request from the second electronic device; and
determining whether to start the first electronic device via the initialization interface system according to the response information;
wherein the receiving response information for the verification request from the second electronic device includes:
receiving first response information for the first verification request from the first device; and
receiving second reply information from the second device for the second authentication request,
the determining whether to start the first electronic device according to the response information includes:
and determining whether to start the first electronic equipment according to the first response information and the second response information.
2. The method of claim 1, further comprising: before sending at least two authentication requests to at least one second electronic device set in advance,
acquiring current hardware configuration information and/or current software configuration information of the first electronic device by using the initialization interface system; and
the verification request is generated based on the obtained current hardware configuration information and/or current software configuration information.
3. The method of claim 1, wherein the determining whether to activate the first electronic device based on the first response information and the second response information comprises:
determining whether second response information indicates verification passing or not in the case that the first response information indicates verification passing;
determining not to start the first electronic device in response to the second response information indicating that the verification is not passed; and
and under the condition that the first response information is determined not to pass verification, determining not to start the first electronic equipment.
4. The method of claim 1, wherein the reply information is generated by:
calculating a first hash value of the verification request;
comparing the first hash value with a second hash value for the first electronic device; and
and generating the response information according to the comparison result.
5. The method of claim 1, wherein the sending the authentication request to the at least one second electronic device that is preset comprises:
and sending an authentication request to the at least one second electronic device in an encryption mode.
6. An electronic device, comprising:
one or more of the processors of the present invention,
Storage means for storing executable instructions which when executed by the processor implement a method according to any one of claims 1 to 5.
7. An electronic device, comprising:
the starting module is used for starting an initializing interface system of the first electronic device;
the sending module is used for obtaining current hardware configuration information and/or current software configuration information of the first electronic equipment by utilizing the initialization interface system in the process of starting the initialization interface system; sending a verification request to at least one preset second electronic device; wherein the sending at least two verification requests to at least one preset second electronic device includes:
generating a first verification request based on the obtained current hardware configuration information and/or the current software configuration information, and sending the first verification request to a first device in the at least one second electronic device; obtaining password information input by a user to the first electronic device by using the initialization interface system; and generating a second authentication request based on the obtained cryptographic information and sending the second authentication request to a second device of the at least one second electronic device; the verification request is used for requesting the at least one second electronic device to verify whether the first electronic device is started; the at least two authentication requests include a first authentication request and a second authentication request; the first device and the second device are the same electronic device, or the first device and the second device are different electronic devices;
A receiving module, configured to receive response information for the verification request from the second electronic device via the initializing interface system; and
a determining module, configured to determine whether to start the first electronic device via the initializing interface system according to the response information;
wherein the receiving response information for the verification request from the second electronic device includes:
receiving first response information for the first verification request from the first device; and
receiving second reply information from the second device for the second authentication request,
the determining whether to start the first electronic device according to the response information includes:
and determining whether to start the first electronic equipment according to the first response information and the second response information.
8. The electronic device of claim 7, further comprising:
the obtaining module is used for obtaining current hardware configuration information and/or current software configuration information of the first electronic device by utilizing the initializing interface system; and
and the generation module is used for generating the verification request based on the obtained current hardware configuration information and/or the current software configuration information.
CN202010081577.5A 2020-02-06 2020-02-06 Security verification method and electronic device Active CN111259372B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010081577.5A CN111259372B (en) 2020-02-06 2020-02-06 Security verification method and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010081577.5A CN111259372B (en) 2020-02-06 2020-02-06 Security verification method and electronic device

Publications (2)

Publication Number Publication Date
CN111259372A CN111259372A (en) 2020-06-09
CN111259372B true CN111259372B (en) 2023-06-23

Family

ID=70949232

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010081577.5A Active CN111259372B (en) 2020-02-06 2020-02-06 Security verification method and electronic device

Country Status (1)

Country Link
CN (1) CN111259372B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102831357A (en) * 2012-08-24 2012-12-19 深圳市民德电子科技有限公司 Encryption and authentication protection method and system of secondary development embedded type application program
US9280645B1 (en) * 2012-11-15 2016-03-08 Emc Corporation Local and remote verification
CN108551451A (en) * 2018-04-18 2018-09-18 何小林 A kind of multiple-authentication method and system of protection application system permission
CN109614789A (en) * 2018-11-07 2019-04-12 平安科技(深圳)有限公司 A kind of verification method and equipment of terminal device
CN109740340A (en) * 2018-12-28 2019-05-10 联想(北京)有限公司 Information processing method and electronic equipment
CN110620764A (en) * 2019-08-28 2019-12-27 如般量子科技有限公司 Anti-quantum computation RFID authentication method and system based on asymmetric key pool and secondary surplus

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9689680B2 (en) * 2013-06-04 2017-06-27 Here Global B.V. Method and apparatus for approaches to provide for combining contexts related to items of interest and navigation
CN106295318A (en) * 2015-06-05 2017-01-04 北京壹人壹本信息科技有限公司 A kind of system start-up bootstrap technique and device
CN108182089B (en) * 2018-01-02 2024-02-27 联想(北京)有限公司 Computer starting method and electronic equipment
CN109697343B (en) * 2018-12-28 2021-08-17 联想(北京)有限公司 Verification method and system and computer system
CN109960536B (en) * 2019-03-27 2021-09-14 联想(北京)有限公司 Electronic equipment safety starting method and device and electronic equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102831357A (en) * 2012-08-24 2012-12-19 深圳市民德电子科技有限公司 Encryption and authentication protection method and system of secondary development embedded type application program
US9280645B1 (en) * 2012-11-15 2016-03-08 Emc Corporation Local and remote verification
CN108551451A (en) * 2018-04-18 2018-09-18 何小林 A kind of multiple-authentication method and system of protection application system permission
CN109614789A (en) * 2018-11-07 2019-04-12 平安科技(深圳)有限公司 A kind of verification method and equipment of terminal device
CN109740340A (en) * 2018-12-28 2019-05-10 联想(北京)有限公司 Information processing method and electronic equipment
CN110620764A (en) * 2019-08-28 2019-12-27 如般量子科技有限公司 Anti-quantum computation RFID authentication method and system based on asymmetric key pool and secondary surplus

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
佚名.维肯电子推出多总线接口的安全认证微处理器.《产业信息》.2012,第88页. *

Also Published As

Publication number Publication date
CN111259372A (en) 2020-06-09

Similar Documents

Publication Publication Date Title
US8874922B2 (en) Systems and methods for multi-layered authentication/verification of trusted platform updates
US11611443B2 (en) Network node encryption method and apparatus
US8584225B1 (en) Push channel authentication for mobile computing devices
US10255425B2 (en) Secure authentication protocol systems and methods
US9600671B2 (en) Systems and methods for account recovery using a platform attestation credential
CN101964789B (en) Method and system for safely accessing protected resources
US20160328180A1 (en) Data erasure of a target device
US20170222813A1 (en) Method, device, terminal, and server for a security check
CN111565179B (en) Identity verification method and device, electronic equipment and storage medium
CN113422679B (en) Key generation method, device and system, encryption method, electronic device and computer readable storage medium
CN111045743B (en) Operating system safe starting method, management method, device and equipment
CN106980800B (en) Measurement method and system for authentication partition of encrypted solid state disk
CN105204962A (en) Data backup method and device and server
CN111259372B (en) Security verification method and electronic device
CN115629824B (en) GPU starting method, device, equipment, storage medium and program product
CN109960536B (en) Electronic equipment safety starting method and device and electronic equipment
CN116401655A (en) Data processing method, system, device, equipment and medium
EP3664362A1 (en) Key generation method, acquisition method, private key update method, chip and server
CN112767142B (en) Processing method, device, computing equipment and medium for transaction file
CN113472737B (en) Data processing method and device of edge equipment and electronic equipment
KR102310811B1 (en) Method and System for electronic authentication and encryption of data Based On Cloud System
CN112866195A (en) Agile data transmission method and device, computer equipment and storage medium
CN111478770A (en) Security verification method and device, computer equipment and storage medium
CN111625836B (en) Trusted guiding method for entrance guard type electronic equipment
CN113726742B (en) Test authentication method, device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant