CN202093521U - Computer identity authentication system - Google Patents

Computer identity authentication system Download PDF

Info

Publication number
CN202093521U
CN202093521U CN2011200807027U CN201120080702U CN202093521U CN 202093521 U CN202093521 U CN 202093521U CN 2011200807027 U CN2011200807027 U CN 2011200807027U CN 201120080702 U CN201120080702 U CN 201120080702U CN 202093521 U CN202093521 U CN 202093521U
Authority
CN
China
Prior art keywords
module
bios
computing equipment
embedded computing
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2011200807027U
Other languages
Chinese (zh)
Inventor
文俊浩
邱小平
周魏
李朋
刘军委
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University
Original Assignee
Chongqing University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University filed Critical Chongqing University
Priority to CN2011200807027U priority Critical patent/CN202093521U/en
Application granted granted Critical
Publication of CN202093521U publication Critical patent/CN202093521U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model discloses a computer identity authentication system, which comprises embedded computing equipment and a BIOS (Basic Input/Output System) module equipped on a computer mainboard; the BIOS module comprises a sequence number generating module, an encryption module, and a security authentication module sequentially connected; the embedded computing equipment comprises a decryption module, an identification module and a USB (Universal Serial Buss) interface sequentially connected; the BIOS module is connected with the USB interface of the embedded computing equipment through the USB interface of the computer mainboard. The system comprises the following operating steps of: generating a ciphertext in the BIOS module, sending the ciphertext to the embedded computing equipment, finishing the decryption of the ciphertext by the embedded computing equipment, transferring the result to the BIOS module and finally judging the result by the BIOS module; only when the result is correct, starting the operating system to finish the identity authentication of the system. Therefore, the computer identity authentication system provided by the utility model has the advantage of higher safety.

Description

A kind of computer identity Verification System
Technical field
The utility model relates to computer safety field, in particular, relates to a kind of computer identity Verification System.
Background technology
Along with constantly popularizing of computing machine, computing machine has been used on socially the various industries widely.In some industry, can there be a large amount of important informations in the computing machine, for example, national government office, scientific research institution, secret department and units such as finance and enterprises and institutions, because a large amount of business and technical data all is stored in the computing machine, in case, will cause tremendous loss to enterprises and institutions, government department because the incident that data are revealed, destroyed appears in computer security issue, therefore, the safety problem of computing machine is significant to development from now on.
Existing encryption technology is mainly the BIOS encryption technology, and the BIOS encryption technology is to add password in mainboard, in the time of computer booting, needs the user to input password, protects the safety of computing machine with this.Current is not the thing of what difficulty for cracking of BIOS encryption technology, for example, can adopt CMOS discharge, wire jumper short circuit, software cracks and eliminate modes such as BIOS password and crack the BIOS encryption technology, thereby can crack the BIOS password in the system, so existing BIOS encryption technology brings safety can't for the computer of each enterprises and institutions.
Therefore, how to provide a kind of safe computer identity Verification System, become the problem that needs most solution at present.
The utility model content
In view of this, purpose of design of the present utility model is, a kind of computer identity Verification System is provided, to guarantee the safety of computing machine.
The utility model embodiment is achieved in that
A kind of computer identity Verification System comprises embedded computing equipment and the BIOS module that is arranged on the computer motherboard;
Described BIOS module comprises sequence number generation module, encrypting module and the security authentication module that connects successively;
Described embedded computing equipment comprises deciphering module, identification module and the USB interface that connects successively;
Described BIOS module can be connected with the USB interface of described embedded computing equipment by the USB interface of computer motherboard.
Preferably, in above-mentioned computer identity Verification System, described encrypting module is specially data encryption algorithm DES module.
Preferably, in above-mentioned computer identity Verification System, described deciphering module is specially data decryption algorithm DES module.
Preferably, in above-mentioned computer identity Verification System, described encrypting module is specially public key encryption algorithm RSA module.
Preferably, in above-mentioned computer identity Verification System, described deciphering module is specially PKI decipherment algorithm RSA module.
Compared with prior art, the technical scheme that provides of the utility model embodiment has the following advantages and characteristics:
In the scheme that the utility model provides, the sequence number generation module produces a sequence number, and encrypting module is encrypted this sequence number, and deposits the ciphertext after this sequence number and the encryption in security authentication module.Embedded computing equipment obtains ciphertext by USB interface; identification module is discerned this ciphertext; and the ciphertext after will discerning is sent to deciphering module; deciphering module becomes original sequence number with this decrypt ciphertext; and this sequence number is sent in the security authentication module by USB interface; security authentication module will receive the sequence number of embedded computing equipment transmission and the sequence number of sequence number production module generation mates; have only embedded computing equipment that correct sequence number is provided; the BIOS module can start the operating system, and protects the safety of computing machine with this.Therefore, the computer identity Verification System that provides of the utility model has the higher advantage of security.
Description of drawings
In order to be illustrated more clearly in the utility model or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is embodiment more of the present utility model, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the module map of computer identity Verification System provided by the utility model.
Embodiment
Below in conjunction with the accompanying drawing among the utility model embodiment, the technical scheme among the utility model embodiment is clearly and completely described, obviously, described embodiment only is the utility model part embodiment, rather than whole embodiment.Based on the embodiment in the utility model, those of ordinary skills are not making the every other embodiment that is obtained under the creative work prerequisite, all belong to the scope of the utility model protection.
The utility model embodiment provides a kind of computer identity Verification System, comprises embedded computing equipment and the BIOS module that is arranged on the computer motherboard; Described BIOS module comprises sequence number generation module, encrypting module and the security authentication module that connects successively; Described embedded computing equipment comprises deciphering module, identification module and the USB interface that connects successively; Described BIOS module can be connected with the USB interface of described embedded computing equipment by the USB interface of computer motherboard.Because there is multiple mode in the specific implementation of aforementioned calculation identity Verification System, is elaborated below by specific embodiment:
See also shown in Figure 1ly, shown in Figure 1 is a kind of computer identity Verification System, comprises embedded computing equipment 2 and is arranged on BIOS module 1 on the computer motherboard 3; Described BIOS module 1 comprises sequence number generation module 11, encrypting module 12 and the security authentication module 13 that connects successively; Described embedded computing equipment 2 comprises deciphering module 21, identification module 22 and the USB interface 23 that connects successively; Described BIOS module 1 can be connected with the USB interface 23 of described embedded computing equipment 2 by the USB interface 31 of computer motherboard 3.Native system is mainly by generating a ciphertext in BIOS module 1 inside, ciphertext is sent in the embedded computing equipment 2, embedded computing equipment 2 is finished the deciphering to this ciphertext, the result is sent in the BIOS module 1 then, the BIOS module is 1 couple of this result judge, only under the correct situation of this result, just can start the operating system, thereby finish the authentication of system.
In conjunction with Fig. 1, following mask body is introduced the process of computer identity authentication.When the user when starting computer power supply, the BIOS module 1 of computer motherboard 3 needs the basic hardware of detection computations machine, after having detected basic hardware, initiating sequence generation module 11, sequence number generation module 11 can produce a sequence number, 12 pairs of these sequence numbers of encrypting module are encrypted, and deposit the ciphertext after this sequence number and the encryption in security authentication module 13.Embedded computing equipment 2 obtains ciphertext by USB interface 23,22 pairs of these ciphertexts of identification module are discerned, and the ciphertext after will discerning is sent to deciphering module 21, deciphering module 21 becomes original sequence number with this decrypt ciphertext, and this sequence number is sent in the security authentication module 13 by USB interface 23, security authentication module 13 will receive the sequence number of embedded computing equipment 2 transmissions and the sequence number of sequence number production module 11 generations mates, have only embedded computing equipment that correct sequence number is provided, the BIOS module can start the operating system, therefore, the computer identity Verification System that the utility model provides has realized the authentication at the BIOS layer, solve the potential safety hazard of existing identification authentication mode, had the higher advantage of security.
In the embodiment shown in fig. 1, described encrypting module 12 both can be data encryption algorithm DES module, also can be public key encryption algorithm RSA module, but, deciphering module 21 is identical with the algorithm of encrypting module 12, if encrypting module 12 adopts data encryption algorithm DES module, deciphering module 21 needs to adopt data decryption algorithm DES module so; If encrypting module 12 adopts public key encryption algorithm RSA module, deciphering module 21 needs to adopt PKI decipherment algorithm RSA module so, so encrypting module 12 will be complementary with deciphering module 21.
Need to prove that embodiment shown in Figure 1 is the preferred embodiment that the utility model is introduced, those skilled in the art can design more embodiment on this basis fully, therefore do not give unnecessary details herein.
To the above-mentioned explanation of the disclosed embodiments, make this area professional and technical personnel can realize or use the utility model.Multiple modification to these embodiment will be conspicuous concerning those skilled in the art, and defined herein General Principle can realize under the situation that does not break away from spirit or scope of the present utility model in other embodiments.Therefore, the utility model will can not be restricted to these embodiment shown in this article, but will meet and principle disclosed herein and features of novelty the wideest corresponding to scope.

Claims (1)

1. a computer identity Verification System is characterized in that, comprises embedded computing equipment and the BIOS module that is arranged on the computer motherboard;
Described BIOS module comprises sequence number generation module, encrypting module and the security authentication module that connects successively;
Described embedded computing equipment comprises deciphering module, identification module and the USB interface that connects successively;
Described BIOS module can be connected with the USB interface of described embedded computing equipment by the USB interface of computer motherboard.
CN2011200807027U 2011-03-24 2011-03-24 Computer identity authentication system Expired - Fee Related CN202093521U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011200807027U CN202093521U (en) 2011-03-24 2011-03-24 Computer identity authentication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011200807027U CN202093521U (en) 2011-03-24 2011-03-24 Computer identity authentication system

Publications (1)

Publication Number Publication Date
CN202093521U true CN202093521U (en) 2011-12-28

Family

ID=45368575

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011200807027U Expired - Fee Related CN202093521U (en) 2011-03-24 2011-03-24 Computer identity authentication system

Country Status (1)

Country Link
CN (1) CN202093521U (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI633438B (en) * 2016-08-09 2018-08-21 華為技術有限公司 System-on-chip and processing device
CN109492409A (en) * 2018-09-28 2019-03-19 内蒙古师范大学 A kind of security of computer software encryption handling system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI633438B (en) * 2016-08-09 2018-08-21 華為技術有限公司 System-on-chip and processing device
CN109492409A (en) * 2018-09-28 2019-03-19 内蒙古师范大学 A kind of security of computer software encryption handling system

Similar Documents

Publication Publication Date Title
CN106779636B (en) Block chain digital currency wallet based on mobile phone earphone interface
CN101241572B (en) A kind of method of operating of electric signing tools and electric signing tools
CN106603496B (en) A kind of guard method, smart card, server and the communication system of data transmission
CN106611310B (en) Data processing method, wearable electronic device and system
CN104618116A (en) Collaborative digital signature system and method
CN104052606A (en) Digital signature, signature authentication device and digital signature method
CN104851206A (en) USBKEY (universal serial bus key)-based online electric charge payment system
CN102801730A (en) Information protection method and device for communication and portable devices
CN106411520B (en) Method, device and system for processing virtual resource data
CN204069000U (en) Mobile encrypted authenticate device
CN103455914A (en) Safety authentication method and remote controller and television payment system using same
CN104915583A (en) Interface decryption processing method and mobile terminal
CN202093521U (en) Computer identity authentication system
CN109831312A (en) It can connection ring endorsement method, device, equipment and storage medium
CN101996285A (en) Electronic equipment
CN105554693A (en) Bluetooth device pairing method and device
EP4125236A1 (en) Secret code verification protocol
CN103136489B (en) Portable and secure automatic password input unit
CN105357005A (en) Electric power trusted computing cryptographic module for PCI/PCI-E interface
CN204028917U (en) A kind of Bluetooth encryption device and application for network payment
CN105426705A (en) Encryption control system for accounting software
CN201838004U (en) Hardware encryption card for computer interface
CN202978979U (en) Password security keypad device and password security pad system
CN115694922A (en) File transmission encryption method and equipment under domestic CPU and OS
CN105471580A (en) Signature checking method and equipment

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20111228

Termination date: 20120324