CN202093521U - Computer identity authentication system - Google Patents
Computer identity authentication system Download PDFInfo
- Publication number
- CN202093521U CN202093521U CN2011200807027U CN201120080702U CN202093521U CN 202093521 U CN202093521 U CN 202093521U CN 2011200807027 U CN2011200807027 U CN 2011200807027U CN 201120080702 U CN201120080702 U CN 201120080702U CN 202093521 U CN202093521 U CN 202093521U
- Authority
- CN
- China
- Prior art keywords
- module
- bios
- computing equipment
- embedded computing
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The utility model discloses a computer identity authentication system, which comprises embedded computing equipment and a BIOS (Basic Input/Output System) module equipped on a computer mainboard; the BIOS module comprises a sequence number generating module, an encryption module, and a security authentication module sequentially connected; the embedded computing equipment comprises a decryption module, an identification module and a USB (Universal Serial Buss) interface sequentially connected; the BIOS module is connected with the USB interface of the embedded computing equipment through the USB interface of the computer mainboard. The system comprises the following operating steps of: generating a ciphertext in the BIOS module, sending the ciphertext to the embedded computing equipment, finishing the decryption of the ciphertext by the embedded computing equipment, transferring the result to the BIOS module and finally judging the result by the BIOS module; only when the result is correct, starting the operating system to finish the identity authentication of the system. Therefore, the computer identity authentication system provided by the utility model has the advantage of higher safety.
Description
Technical field
The utility model relates to computer safety field, in particular, relates to a kind of computer identity Verification System.
Background technology
Along with constantly popularizing of computing machine, computing machine has been used on socially the various industries widely.In some industry, can there be a large amount of important informations in the computing machine, for example, national government office, scientific research institution, secret department and units such as finance and enterprises and institutions, because a large amount of business and technical data all is stored in the computing machine, in case, will cause tremendous loss to enterprises and institutions, government department because the incident that data are revealed, destroyed appears in computer security issue, therefore, the safety problem of computing machine is significant to development from now on.
Existing encryption technology is mainly the BIOS encryption technology, and the BIOS encryption technology is to add password in mainboard, in the time of computer booting, needs the user to input password, protects the safety of computing machine with this.Current is not the thing of what difficulty for cracking of BIOS encryption technology, for example, can adopt CMOS discharge, wire jumper short circuit, software cracks and eliminate modes such as BIOS password and crack the BIOS encryption technology, thereby can crack the BIOS password in the system, so existing BIOS encryption technology brings safety can't for the computer of each enterprises and institutions.
Therefore, how to provide a kind of safe computer identity Verification System, become the problem that needs most solution at present.
The utility model content
In view of this, purpose of design of the present utility model is, a kind of computer identity Verification System is provided, to guarantee the safety of computing machine.
The utility model embodiment is achieved in that
A kind of computer identity Verification System comprises embedded computing equipment and the BIOS module that is arranged on the computer motherboard;
Described BIOS module comprises sequence number generation module, encrypting module and the security authentication module that connects successively;
Described embedded computing equipment comprises deciphering module, identification module and the USB interface that connects successively;
Described BIOS module can be connected with the USB interface of described embedded computing equipment by the USB interface of computer motherboard.
Preferably, in above-mentioned computer identity Verification System, described encrypting module is specially data encryption algorithm DES module.
Preferably, in above-mentioned computer identity Verification System, described deciphering module is specially data decryption algorithm DES module.
Preferably, in above-mentioned computer identity Verification System, described encrypting module is specially public key encryption algorithm RSA module.
Preferably, in above-mentioned computer identity Verification System, described deciphering module is specially PKI decipherment algorithm RSA module.
Compared with prior art, the technical scheme that provides of the utility model embodiment has the following advantages and characteristics:
In the scheme that the utility model provides, the sequence number generation module produces a sequence number, and encrypting module is encrypted this sequence number, and deposits the ciphertext after this sequence number and the encryption in security authentication module.Embedded computing equipment obtains ciphertext by USB interface; identification module is discerned this ciphertext; and the ciphertext after will discerning is sent to deciphering module; deciphering module becomes original sequence number with this decrypt ciphertext; and this sequence number is sent in the security authentication module by USB interface; security authentication module will receive the sequence number of embedded computing equipment transmission and the sequence number of sequence number production module generation mates; have only embedded computing equipment that correct sequence number is provided; the BIOS module can start the operating system, and protects the safety of computing machine with this.Therefore, the computer identity Verification System that provides of the utility model has the higher advantage of security.
Description of drawings
In order to be illustrated more clearly in the utility model or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is embodiment more of the present utility model, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the module map of computer identity Verification System provided by the utility model.
Embodiment
Below in conjunction with the accompanying drawing among the utility model embodiment, the technical scheme among the utility model embodiment is clearly and completely described, obviously, described embodiment only is the utility model part embodiment, rather than whole embodiment.Based on the embodiment in the utility model, those of ordinary skills are not making the every other embodiment that is obtained under the creative work prerequisite, all belong to the scope of the utility model protection.
The utility model embodiment provides a kind of computer identity Verification System, comprises embedded computing equipment and the BIOS module that is arranged on the computer motherboard; Described BIOS module comprises sequence number generation module, encrypting module and the security authentication module that connects successively; Described embedded computing equipment comprises deciphering module, identification module and the USB interface that connects successively; Described BIOS module can be connected with the USB interface of described embedded computing equipment by the USB interface of computer motherboard.Because there is multiple mode in the specific implementation of aforementioned calculation identity Verification System, is elaborated below by specific embodiment:
See also shown in Figure 1ly, shown in Figure 1 is a kind of computer identity Verification System, comprises embedded computing equipment 2 and is arranged on BIOS module 1 on the computer motherboard 3; Described BIOS module 1 comprises sequence number generation module 11, encrypting module 12 and the security authentication module 13 that connects successively; Described embedded computing equipment 2 comprises deciphering module 21, identification module 22 and the USB interface 23 that connects successively; Described BIOS module 1 can be connected with the USB interface 23 of described embedded computing equipment 2 by the USB interface 31 of computer motherboard 3.Native system is mainly by generating a ciphertext in BIOS module 1 inside, ciphertext is sent in the embedded computing equipment 2, embedded computing equipment 2 is finished the deciphering to this ciphertext, the result is sent in the BIOS module 1 then, the BIOS module is 1 couple of this result judge, only under the correct situation of this result, just can start the operating system, thereby finish the authentication of system.
In conjunction with Fig. 1, following mask body is introduced the process of computer identity authentication.When the user when starting computer power supply, the BIOS module 1 of computer motherboard 3 needs the basic hardware of detection computations machine, after having detected basic hardware, initiating sequence generation module 11, sequence number generation module 11 can produce a sequence number, 12 pairs of these sequence numbers of encrypting module are encrypted, and deposit the ciphertext after this sequence number and the encryption in security authentication module 13.Embedded computing equipment 2 obtains ciphertext by USB interface 23,22 pairs of these ciphertexts of identification module are discerned, and the ciphertext after will discerning is sent to deciphering module 21, deciphering module 21 becomes original sequence number with this decrypt ciphertext, and this sequence number is sent in the security authentication module 13 by USB interface 23, security authentication module 13 will receive the sequence number of embedded computing equipment 2 transmissions and the sequence number of sequence number production module 11 generations mates, have only embedded computing equipment that correct sequence number is provided, the BIOS module can start the operating system, therefore, the computer identity Verification System that the utility model provides has realized the authentication at the BIOS layer, solve the potential safety hazard of existing identification authentication mode, had the higher advantage of security.
In the embodiment shown in fig. 1, described encrypting module 12 both can be data encryption algorithm DES module, also can be public key encryption algorithm RSA module, but, deciphering module 21 is identical with the algorithm of encrypting module 12, if encrypting module 12 adopts data encryption algorithm DES module, deciphering module 21 needs to adopt data decryption algorithm DES module so; If encrypting module 12 adopts public key encryption algorithm RSA module, deciphering module 21 needs to adopt PKI decipherment algorithm RSA module so, so encrypting module 12 will be complementary with deciphering module 21.
Need to prove that embodiment shown in Figure 1 is the preferred embodiment that the utility model is introduced, those skilled in the art can design more embodiment on this basis fully, therefore do not give unnecessary details herein.
To the above-mentioned explanation of the disclosed embodiments, make this area professional and technical personnel can realize or use the utility model.Multiple modification to these embodiment will be conspicuous concerning those skilled in the art, and defined herein General Principle can realize under the situation that does not break away from spirit or scope of the present utility model in other embodiments.Therefore, the utility model will can not be restricted to these embodiment shown in this article, but will meet and principle disclosed herein and features of novelty the wideest corresponding to scope.
Claims (1)
1. a computer identity Verification System is characterized in that, comprises embedded computing equipment and the BIOS module that is arranged on the computer motherboard;
Described BIOS module comprises sequence number generation module, encrypting module and the security authentication module that connects successively;
Described embedded computing equipment comprises deciphering module, identification module and the USB interface that connects successively;
Described BIOS module can be connected with the USB interface of described embedded computing equipment by the USB interface of computer motherboard.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011200807027U CN202093521U (en) | 2011-03-24 | 2011-03-24 | Computer identity authentication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011200807027U CN202093521U (en) | 2011-03-24 | 2011-03-24 | Computer identity authentication system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN202093521U true CN202093521U (en) | 2011-12-28 |
Family
ID=45368575
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011200807027U Expired - Fee Related CN202093521U (en) | 2011-03-24 | 2011-03-24 | Computer identity authentication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN202093521U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI633438B (en) * | 2016-08-09 | 2018-08-21 | 華為技術有限公司 | System-on-chip and processing device |
CN109492409A (en) * | 2018-09-28 | 2019-03-19 | 内蒙古师范大学 | A kind of security of computer software encryption handling system |
-
2011
- 2011-03-24 CN CN2011200807027U patent/CN202093521U/en not_active Expired - Fee Related
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI633438B (en) * | 2016-08-09 | 2018-08-21 | 華為技術有限公司 | System-on-chip and processing device |
CN109492409A (en) * | 2018-09-28 | 2019-03-19 | 内蒙古师范大学 | A kind of security of computer software encryption handling system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106779636B (en) | Block chain digital currency wallet based on mobile phone earphone interface | |
CN101241572B (en) | A kind of method of operating of electric signing tools and electric signing tools | |
CN106603496B (en) | A kind of guard method, smart card, server and the communication system of data transmission | |
CN106611310B (en) | Data processing method, wearable electronic device and system | |
CN104618116A (en) | Collaborative digital signature system and method | |
CN104052606A (en) | Digital signature, signature authentication device and digital signature method | |
CN104851206A (en) | USBKEY (universal serial bus key)-based online electric charge payment system | |
CN102801730A (en) | Information protection method and device for communication and portable devices | |
CN106411520B (en) | Method, device and system for processing virtual resource data | |
CN204069000U (en) | Mobile encrypted authenticate device | |
CN103455914A (en) | Safety authentication method and remote controller and television payment system using same | |
CN104915583A (en) | Interface decryption processing method and mobile terminal | |
CN202093521U (en) | Computer identity authentication system | |
CN109831312A (en) | It can connection ring endorsement method, device, equipment and storage medium | |
CN101996285A (en) | Electronic equipment | |
CN105554693A (en) | Bluetooth device pairing method and device | |
EP4125236A1 (en) | Secret code verification protocol | |
CN103136489B (en) | Portable and secure automatic password input unit | |
CN105357005A (en) | Electric power trusted computing cryptographic module for PCI/PCI-E interface | |
CN204028917U (en) | A kind of Bluetooth encryption device and application for network payment | |
CN105426705A (en) | Encryption control system for accounting software | |
CN201838004U (en) | Hardware encryption card for computer interface | |
CN202978979U (en) | Password security keypad device and password security pad system | |
CN115694922A (en) | File transmission encryption method and equipment under domestic CPU and OS | |
CN105471580A (en) | Signature checking method and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20111228 Termination date: 20120324 |