CN101727558B - Method for clearing password of computer, computer and server - Google Patents

Method for clearing password of computer, computer and server Download PDF

Info

Publication number
CN101727558B
CN101727558B CN200810224967A CN200810224967A CN101727558B CN 101727558 B CN101727558 B CN 101727558B CN 200810224967 A CN200810224967 A CN 200810224967A CN 200810224967 A CN200810224967 A CN 200810224967A CN 101727558 B CN101727558 B CN 101727558B
Authority
CN
China
Prior art keywords
password
identifying code
clearing
computer
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN200810224967A
Other languages
Chinese (zh)
Other versions
CN101727558A (en
Inventor
徐琳
杨良印
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN200810224967A priority Critical patent/CN101727558B/en
Publication of CN101727558A publication Critical patent/CN101727558A/en
Application granted granted Critical
Publication of CN101727558B publication Critical patent/CN101727558B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a method for clearing passwords of a computer, a computer and a server. The computer comprises a computer recognizing unit, an information clearing unit, a BIOS managing unit and a matching unit, wherein the computer recognizing unit is used for recognizing a primary serial number of a computer per se; the information clearing unit is used for clearing information of record password; the BIOS managing unit is used for clearing information and the primary serial number of the computer according to the passwords, and executing identifying code generating logic to generate a first identifying code, the identifying code generating logic is a corresponding key determined in a preset set of keys according to the password clearing information, the primary serial number of the computer is encrypted by utilizing the corresponding key to generate the first identifying code; and the matching unit is used for comparing the first identifying code and a second identifying code from the server to generate a comparison result, when the comparison result is shown that the first identifying code and the second identifying code are the same, the corresponding passwords of the computer are cleared. The embodiment of the invention simplifies the operation of a user, avoids the defects of omnipotent passwords in the prior art, and improves the safety of a computer system.

Description

A kind of computer cryptography sweep-out method, computing machine and server
Technical field
The present invention relates to computer technology, be meant a kind of computer cryptography sweep-out method, computing machine and server especially.
Background technology
Startup password or harddisk password when computer system generally can require the user that start is set for the safety of user data, this password is generally preserved by user oneself.But the user forgets about the password that oneself is provided with through regular meeting that in use this moment, the user often need ask for help to the Customer Service Department of computer provider.
The customer service department of contact computer provider when the user forgets set startup password or harddisk password is adopted real-time clock (RTC) discharge or is removed password with special BIOS refresh tool by customer service department.Perhaps the user provides Copy of ID Card, registration telephone number or the like information to prove this user's identity; After subscriber authentication is passed through; Provide the chief series that is attached to computing machine number to customer service again; Customer service number generates a string identifying code through this string chief series and gives the user, and the user starts computing machine and input this string identifying code after taking and using this identifying code, and checking is through back removing set password before.
The inventor finds to exist at least in the prior art following problem in realizing process of the present invention: no matter the RTC discharge still is the method that special BIOS removes password, all needs contact staff's execute-in-place computing machine, and this can cause the increase of after cost; And if the identifying code that uses customer service to provide; Remove password owing to can get into computing machine in the same way at every turn; Then this identifying code becomes this computing machine " universal password "; If this computing machine has been changed the user, then preceding user also can get into this computing machine with universal password, causes potential safety hazard.
Summary of the invention
The purpose of this invention is to provide a kind of computer cryptography sweep-out method, computing machine and server, be used for solving prior art, the identifying code that once obtains can nonexpondable defective.
A kind of computing machine comprises: the computer Recognition unit is used to discern the machine chief series number of said computing machine self; Remove message unit, be used to write down clearing password information; The BIOS administrative unit is used for carrying out the identifying code formation logic and generating first identifying code according to said clearing password information and said machine chief series number; Said identifying code formation logic is in a predetermined group key, to confirm corresponding secret key according to said clearing password information, utilizes said corresponding secret key that said machine chief series number is encrypted, and produces said first identifying code; Matching unit; Be used for comparing the generation comparison result with said first identifying code with from second identifying code of server; When said comparison result representes that said first identifying code is consistent with said second identifying code, said system for computer password and/or harddisk password are removed.
A kind of server comprises: the server acquiring unit is used to obtain from the machine chief series of computing machine number and clearing password information; Server B IOS administrative unit is used for carrying out the identifying code formation logic and generating second identifying code according to said clearing password information and said machine chief series number; Said identifying code formation logic is in a predetermined group key, to confirm corresponding secret key according to said clearing password information, utilizes said corresponding secret key that said machine chief series number is encrypted, and produces said second identifying code.
A kind of computer cryptography sweep-out method comprises: in a predetermined group key, confirm corresponding secret key according to clearing password information, utilize said corresponding secret key that said machine chief series number is encrypted, produce said first identifying code; Compare the generation comparison result with said first identifying code with from second identifying code of server; When said comparison result representes that said first identifying code is consistent with said second identifying code, said system for computer password and/or harddisk password are removed.
Embodiments of the invention have following beneficial effect, have simplified user's operation; And the checking that offers the user number can only be used once, and the defective of the universal password of having avoided occurring in the prior art has improved the system for computer security.
Description of drawings
Fig. 1 is an embodiment of the invention computer-internal structural representation;
Fig. 2 enables unit inner structure synoptic diagram for embodiment of the invention password;
Fig. 3 is embodiment of the invention server and computing machine cooperating synoptic diagram;
Fig. 4 is an embodiment of the invention method flow synoptic diagram;
Fig. 5 is an embodiment of the invention identifying code algorithm flow synoptic diagram.
Embodiment
For making the object of the invention, technical characterictic and implementation result clearer, will combine accompanying drawing and specific embodiment that technical scheme of the present invention is described in detail below.Among the embodiment provided by the invention, mainly form, remove the function of password through the mutual completion between computing machine and the authentication server by computing machine and the authentication server that is positioned at customer service department.
After user cipher is lost; Get in touch customer service department through certain mode; Unique identification marking of computing machine is provided, the removing information that shows on machine chief series of normally putting down in writing on the fuselage number and Basic Input or Output System (BIOS) (BIOS, the Basic Input Output System) interface; Customer service generates an identifying code and offers the user with the identifying code formation logic in the server after obtaining these information, the different passwords that this identifying code of input is forgotten before can removing after the entering system in a predefined manner.
As shown in Figure 1, comprise computing machine, be positioned at the authentication server of customer service department; Wherein computing machine comprises: computer safety information storage unit 100, BIOS administrative unit 105 and matching unit 106.
Computer safety information storage unit 100 is used to deposit the machine chief series number of computing machine self, a clearing password information and a group key, an identifying code formation logic.
Computer Recognition unit 102 is used to deposit the machine chief series number of computing machine self; Usually adopt nonvolatile random access memory (NVRAM, Non-Volatile Random Access Memory) to deposit.
Remove message unit 103, be used to deposit clearing password information, adopt identifying code to remove the number of purge of the reality of different passwords before having put down in writing in the removing information; Then, the number of purge of said reality is revised computing, for example, if actual number of purge has surpassed the length of key formation Key Queue, then the number of purge to reality carries out delivery; If the key formation exists 10 keys, then mould Mod=10; Obtain an effective number of purge (Effective Erase).
Adopt identifying code to remove the time of origin of different passwords before can also putting down in writing, this time is called the clearing password time.In the embodiment of the invention, can get a time, for example on October 24th, 2008; Writing: 20081024, then can regard a numeric string as, seeking according to this numeric string in the process of corresponding password; Said numeric string is revised computing; For example, if said numeric string has surpassed the length of key formation KeyQueue, then said numeric string is carried out delivery; If the key formation exists 10 keys, then mould Mod=10; Obtain an effective number of purge (Effective Erase).
Above-mentioned processing procedure has been put down in writing and can have been revised through delivery, in the real work, can adopt other, and for example round numbers obtains final said effective number of purge through linear operation etc.
BIOS administrative unit 105 is used for carrying out the identifying code formation logic and generating first identifying code according to said clearing password information and said machine chief series number; Said identifying code formation logic is in a predetermined group key, to confirm corresponding secret key according to said clearing password information, utilizes said corresponding secret key that said machine chief series number is encrypted, and produces said first identifying code.Wherein, the ciphering process of identifying code formation logic can adopt the different encrypted algorithm, for example symmetric encipherment algorithm, rivest, shamir, adelman and hash algorithm etc.
Matching unit 106 is used for comparing the generation comparison result with said first identifying code with from second identifying code of server, with said comparison result said system password and/or harddisk password is removed.
Computing machine can also comprise:
Password record cell 101 is used to deposit system for computer password and/or harddisk password;
Hard drive (HDD, Hard Disk Drive) the said harddisk password of unit record normally, (NVRAM, Non-Volatile Random Access Memory) writes down said system password by nonvolatile random access memory.
Removing message unit 103 adopts nonvolatile random access memory (NVRAM, Non-Volatile Random Access Memory) to realize usually.
Key management unit 104 is used to deposit a group key; Can adopt said nonvolatile random access memory (NVRAM, Non-Volatile Random Access Memory).
For improving the function of computing machine, realize triggering to above-mentioned functions, said computing machine can also comprise:
Password enables unit 107, is used to deposit password enabler flags position PasswordEnable, the binding state of password enabler flags position PasswordEnable register system password and/or harddisk password; Can be one 8 byte:
As shown in Figure 2; Said password enabler flags position PasswordEnable comprises three fields at least: arbitrary password enabler flags position (Any Password Enable), system password enabler flags position (SystemPassword Enable) and harddisk password enabler flags position (HDD Password Enable), wherein:
Arbitrary password enabler flags position, whether write down currently has arbitrary password and said identifying code to be in binding state; Whether sign has between password and the identifying code is bound; For example set said zone bit set when binding, do not bind then reset; When one of them was bound when system password and harddisk password, AnyPassword Enable was with regard to set, otherwise reset, that is, Any Password Enable is the result of the logical OR relation of PasswordEnable and HDD Password Enable.Have only when arbitrary password and identifying code binding, just allow to adopt to remove said arbitrary password, otherwise arbitrary password of having set can't be removed with identifying code;
System password enabler flags position, whether register system password and said identifying code are in binding state;
Harddisk password enabler flags position, whether recording disk password and said identifying code are in binding state.
Anticipation cell 108 is used to obtain the numerical value of said arbitrary password enabler flags position, and when the arbitrary password in decision-making system password and the harddisk password all is not in binding state with identifying code, notifies said BIOS administrative unit 105 to stop to carry out.
Remove information updating unit 109, be used for after matching unit 106 is removed said system password and/or harddisk password with said comparison result, the number of purge of the reality in the clearing password information of depositing in the said removing message unit 103 is added up one;
Perhaps upgrade, write down up-to-date checkout time once for the clearing password time in the clearing password information.
Because the clearing password number of times of the reality in the clearing password information need be provided; And with the valid password number of purge of this actual clearing password number of times; And said valid password number of purge is dynamic change; Therefore with only provide computer serial number just can obtain an identifying code to compare, eliminated the potential safety hazard of universal password, become safer.
Accordingly, the embodiment of the invention provides a kind of server; As shown in Figure 3, realized mutual between server and the computing machine, wherein server comprises:
Server acquiring unit 201 is used to obtain from the machine chief series of computing machine number and clearing password information.
Server B IOS administrative unit 202 is used for carrying out the identifying code formation logic and generating second identifying code according to said clearing password information and said machine chief series number; Said identifying code formation logic is in a predetermined group key, to confirm corresponding secret key according to said clearing password information, utilizes said corresponding secret key that said machine chief series number is encrypted, and produces said second identifying code.A said group key can leave in the server in advance, also can leave in other peripheral hardwares.
The server of realizing above-mentioned technology is provided, and when computing machine need carry out clearing password, this server provided corresponding second identifying code for this computing machine.
Server can also comprise:
Identifying code transmitting element 203 is used for said second identifying code is sent to computing machine.
For saving labour turnover, server can also comprise:
Authentication unit 204 is used for after the user's ID authentication information that the reception user sends, differentiating said user's ID authentication information; When identification result is that fictitious time announcement server BIOS administrative unit 201 stops to carry out subsequent operation.User's ID authentication information is imported said authentication unit 204 by the user is long-range through modes such as network or phone inputs, and user's ID authentication information should be ID card No., passport etc. were provided and be retained in suppliers at first by the user a authentication information.
Adopt with computing machine in consistent said identifying code formation logic, and consistent corresponding secret key, machine chief series number generation second identifying code in input and the computing machine; This second identifying code cooperates with first identifying code to accomplish to be removed, and makes reset procedure safer; And, after authentication unit 204 is provided, greatly saved artificial participation, not only save cost of labor, and avoided artificial interference therefore safer.
The embodiment of the invention provides a kind of computer cryptography sweep-out method, comprising:
In a predetermined group key, confirm corresponding secret key according to clearing password information, utilize said corresponding secret key that said machine chief series number is encrypted, produce said first identifying code; Compare the generation comparison result with said first identifying code with from second identifying code of server;
When said comparison result representes that said first identifying code is consistent with said second identifying code, said system for computer password and/or harddisk password are removed.
Realize said method,, and only provide computer serial number just can obtain an identifying code in the prior art to compare, eliminated the potential safety hazard of universal password that it is safer that computer system becomes in computing machine one side.
For cooperating the realization of above method, can in computing machine, deposit the system password and/or the harddisk password of this computing machine self in advance, the machine chief series of computing machine self number, clearing password information and a group key;
Before carrying out the clearing password operating process; The user provides authentication to customer service, and said verification process can adopt prior art, promptly; To customer service user's ID authentication information is provided with modes such as phone or faxes, by manual work user's ID authentication information is imported in the server and examined.Perhaps user's ID authentication information is imported server by the user is long-range through modes such as network or phone inputs, and user's ID authentication information should be ID card No., passport etc. were provided and be retained in suppliers at first by the user a authentication information.
As shown in Figure 4, when the user obtains second identifying code that said server B IOS administrative unit 201 provides from the server of customer service department after, then begin to remove password.Idiographic flow is following:
Adopt predetermined way to land computing machine during step 301. start, press when for example starting shooting and remove password specific keys Fn+;
BIOS detects when start and starts the clearing password flow process when this button Fn+ presses.
Step 302. reads the PasswordEnable field information; Then report an error if read failure.
Step 303. reads Any Password Enable field from the PasswordEnable field, judged whether the binding of arbitrary password and identifying code; If then do not change step 313.
Step 304. is carried out the identifying code formation logic, generates first identifying code of computing machine one end according to machine chief series number and effective number of purge.
Step 305. prompting user imports second identifying code that server provided of customer service department.
Whether step 306. judges imports completion; If accomplish, change step 307;
For example predesignate maximum inputs three times, if step 305 is changeed in input error; If in three times, all can't be complementary then restart computing machine with second identifying code that BIOS generates.
Step 307. judges whether first identifying code and second identifying code mate, if change step 308, otherwise change step 313.
Step 308. judges according to system password enabler flags position content whether identifying code has bound system password, if then change step 309, if binding system password not, then the direct reset procedure of bypass system password is changeed step 310.
Step 309. scavenge system password.
Step 310. judges whether harddisk password is bound with identifying code, if change step 311; Do not change step 312 if bind.
Step 311. is removed harddisk password.
Step 312. clearing password number of times adds 1, with PasswordEnable clear 0.
Step 313. is restarted computing machine.
The method that the embodiment of the invention provides does not need customer service just can solve the problem that is used to forget password to the doorstep, has reduced the after cost of computer provider; And because said valid password number of purge is dynamic change, therefore with prior art in only provide computer serial number just can obtain an identifying code scheme compare, eliminated the potential safety hazard of universal password, become safer.
Wherein, to the generation method of identifying code specific embodiment is provided also, this method all is achieved in computing machine and server, and method itself is also consistent; In computing machine and the server an identical group key is arranged all, in computing machine,, can adopt formation to manage for the convenience of management; Be called key formation (KeyQueue); Key wherein is also identical separately, and promptly key itself is identical, and the unanimity that puts in order; The number of key can be perhaps more about 10, gets the current corresponding secret key of once removing according to the key formation that do not coexist of clearing password number of times at every turn and uses, and generate different identifying codes, and is as shown in Figure 5, comprising:
The machine chief series number number of purge actual with password perhaps obtained in step 401. input.
The number of purge of step 402. pair said reality is revised computing, and for example, if actual number of purge has surpassed the length of key formation Key Queue, then the number of purge to reality carries out delivery; If the key formation exists 10 keys, then mould Mod=10; Obtain an effective number of purge (EffectiveErase).
Adopt identifying code to remove the time of origin of different passwords before can also putting down in writing, this time is called the clearing password time.In the embodiment of the invention, can get a time, for example on October 24th, 2008; Writing: 20081024, then can regard a numeric string as, seeking according to this numeric string in the process of corresponding password; Further said numeric string is revised computing; For example, if said numeric string has surpassed the length of key formation Key Queue, then said numeric string is carried out delivery; If the key formation exists 10 keys, then mould Mod=10; Obtain an effective number of purge (Effective Erase).
Step 403. is sought the corresponding secret key of correspondence in the key formation according to machine chief series number and effective number of purge Effective Erase.
Step 404. number is encrypted the machine chief series with this corresponding secret key of finding, obtains ciphertext.
Step 405. is got in the said ciphertext several characters on the fixed position as identifying code;
If the server generation then is second identifying code, can initiatively send to computing machine; If the computing machine generation then is first identifying code.
The method that present embodiment provides can make the security of identifying code of generation higher.
One of ordinary skill in the art will appreciate that all or part of step that realizes in the foregoing description method is to instruct relevant hardware to accomplish through program; Described program can be stored in the computer read/write memory medium; This program is when carrying out; Comprise step like above-mentioned method embodiment, described storage medium, as: ROM/RAM, magnetic disc, CD etc.
Embodiments of the invention have following beneficial effect, and in use the contact staff need not computer field, for enterprise has saved cost of serving; In user's use, need not authorization information such as input prompt problem and answer in advance, only need start this function in advance and get final product, simplified user's operation; And (second) checking that offers the user number can only be used once, the defective of the universal password of having avoided occurring in the prior art, the security that has improved computer system.
Should be noted that above embodiment only in order to technical scheme of the present invention to be described and unrestricted, all parameter values can be adjusted according to actual conditions, and in this rights protection scope.Those of ordinary skill in the art should be appreciated that and can make amendment or be equal to replacement technical scheme of the present invention, and do not break away from the spirit of technical scheme of the present invention, and it all should be encompassed in the middle of the claim scope of the present invention.

Claims (12)

1. a computing machine is characterized in that, comprising:
The computer Recognition unit is used to discern the machine chief series number of said computing machine self;
Remove message unit, be used to write down clearing password information;
The BIOS administrative unit; Be used for according to said clearing password information and said machine chief series number; Carry out the identifying code formation logic and generate first identifying code; Comprise: said identifying code formation logic is confirmed corresponding secret key according to said clearing password information in a predetermined group key, utilizes said corresponding secret key that said machine chief series number is encrypted, and produces said first identifying code;
Matching unit; Be used for comparing the generation comparison result with said first identifying code with from second identifying code of server; When said comparison result representes that said first identifying code is consistent with said second identifying code, said system for computer password and/or harddisk password are removed.
2. computing machine according to claim 1 is characterized in that, also comprises:
The computer safety information storage unit is used to store the machine chief series number of said computing machine self, said clearing password information and said identifying code formation logic.
3. computing machine according to claim 1 is characterized in that, also comprises:
Password enables the unit, is used to deposit password enabler flags position, the binding state of said password enabler flags position register system password and/or harddisk password; And said password enabler flags position comprises at least:
Arbitrary password enabler flags position, whether write down currently has the arbitrary password and first identifying code to be in binding state;
System password enabler flags position, the binding state between register system password and said first identifying code;
Harddisk password enabler flags position, the binding state between recording disk password and said first identifying code.
4. computing machine according to claim 3 is characterized in that, also comprises:
The anticipation cell is used to obtain the value of said arbitrary password enabler flags position, and when judging that arbitrary password all is not in binding state with said first identifying code, notifies said BIOS administrative unit not start the removing function.
5. computing machine according to claim 1 is characterized in that, also comprises:
Remove information updating unit, be used for after said matching unit is removed said system password and/or harddisk password with said comparison result, the number of purge in the clearing password information of depositing in the said removing message unit being added up one;
Perhaps upgrade the clearing password time in the said clearing password information with up-to-date checkout time once.
6. a server is characterized in that, comprising:
The server acquiring unit is used to obtain from the machine chief series of computing machine number and clearing password information;
Server B IOS administrative unit; Be used for according to said clearing password information and said machine chief series number; Carry out the identifying code formation logic and generate second identifying code; Comprise: said identifying code formation logic is for confirming corresponding secret key according to said clearing password information in a predetermined group key, utilizes said corresponding secret key that said machine chief series number is encrypted, and produces said second identifying code.
7. server according to claim 6 is characterized in that, also comprises:
The identifying code transmitting element is used for said second identifying code is sent to said computing machine.
8. server according to claim 6 is characterized in that, also comprises:
The authentication unit is used to discern the user's ID authentication information that the user sends; When the said user's ID authentication information of identification is that fictitious time notifies said server B IOS administrative unit not start the removing function.
9. a computer cryptography sweep-out method is characterized in that, comprising:
In a predetermined group key, confirm corresponding secret key according to clearing password information, utilize said corresponding secret key that one machine chief series number is encrypted, produce first identifying code;
Compare the generation comparison result with said first identifying code with from second identifying code of server;
When said comparison result representes that said first identifying code is consistent with said second identifying code, said system for computer password and/or harddisk password are removed.
10. method according to claim 9 is characterized in that, and is said according to clearing password information definite corresponding secret key in a predetermined group key, also comprises before:
Obtain the value of arbitrary password enabler flags position of the binding state of register system password and/or harddisk password; And when judging that arbitrary password all is not in binding state with said first identifying code, do not start the removing function.
11. method according to claim 9 is characterized in that, said said system for computer password and/or harddisk password are removed after, also comprise:
Clearing password number of times in the said clearing password information is added up one; Perhaps upgrade the clearing password time in the said clearing password information with up-to-date checkout time once.
12. method according to claim 9 is characterized in that, saidly utilizes said corresponding secret key that said machine chief series number is encrypted, and produces first identifying code, further comprises:
Number encryption generates a ciphertext to said machine chief series to adopt said corresponding secret key, and the predetermined number character of getting fixed position in the said ciphertext is as said first identifying code.
CN200810224967A 2008-10-28 2008-10-28 Method for clearing password of computer, computer and server Active CN101727558B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810224967A CN101727558B (en) 2008-10-28 2008-10-28 Method for clearing password of computer, computer and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810224967A CN101727558B (en) 2008-10-28 2008-10-28 Method for clearing password of computer, computer and server

Publications (2)

Publication Number Publication Date
CN101727558A CN101727558A (en) 2010-06-09
CN101727558B true CN101727558B (en) 2012-10-10

Family

ID=42448436

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810224967A Active CN101727558B (en) 2008-10-28 2008-10-28 Method for clearing password of computer, computer and server

Country Status (1)

Country Link
CN (1) CN101727558B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105825096A (en) * 2016-03-11 2016-08-03 合肥联宝信息技术有限公司 Startup control method, computer equipment and server

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102479302A (en) * 2010-11-24 2012-05-30 鸿富锦精密工业(深圳)有限公司 Password protection system and method
CN103002022A (en) * 2012-11-20 2013-03-27 广东欧珀移动通信有限公司 Mobile terminal password clearing method and system and mobile terminal
CN104217143A (en) * 2013-05-30 2014-12-17 英业达科技有限公司 Unlocking method
TWI520068B (en) 2014-07-30 2016-02-01 緯創資通股份有限公司 Electronic system, electronic device and method capable of erasing password from basic input/output system automatically
CN109740321B (en) * 2018-12-25 2020-03-31 北京深思数盾科技股份有限公司 Method for revoking manager lock of encryption machine, encryption machine and manufacturer server
JP6860800B1 (en) * 2019-11-15 2021-04-21 富士通クライアントコンピューティング株式会社 Information processing equipment, information processing systems, and programs
CN110909343A (en) * 2019-11-25 2020-03-24 安徽兮克电子科技有限公司 NAS password recovery method based on MD5 encryption
CN113918929A (en) * 2021-09-29 2022-01-11 浪潮(山东)计算机科技有限公司 Method and device for clearing password and computer

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1731408A (en) * 2005-08-17 2006-02-08 杭州海康威视数字技术有限公司 A restoration method for loss of embedded security protection equipment manager password
CN1756149A (en) * 2004-09-30 2006-04-05 株式会社日立制作所 Cipher key updating method of dispersible environment and its system
CN1866154A (en) * 2005-05-20 2006-11-22 联想(北京)有限公司 Method of using super password to decipher

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1756149A (en) * 2004-09-30 2006-04-05 株式会社日立制作所 Cipher key updating method of dispersible environment and its system
CN1866154A (en) * 2005-05-20 2006-11-22 联想(北京)有限公司 Method of using super password to decipher
CN1731408A (en) * 2005-08-17 2006-02-08 杭州海康威视数字技术有限公司 A restoration method for loss of embedded security protection equipment manager password

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105825096A (en) * 2016-03-11 2016-08-03 合肥联宝信息技术有限公司 Startup control method, computer equipment and server

Also Published As

Publication number Publication date
CN101727558A (en) 2010-06-09

Similar Documents

Publication Publication Date Title
CN101727558B (en) Method for clearing password of computer, computer and server
CN100476762C (en) Safety memory device and data management method
CN101281468B (en) Method and apparatus for generating firmware update file and updating firmware by using the firmware update file
CN100495421C (en) Authentication protection method based on USB device
CN101770552B (en) Method for clearing computer password, computer and system for clearing computer password
CN109412812B (en) Data security processing system, method, device and storage medium
CN109347625B (en) Password operation method, work key creation method, password service platform and equipment
WO2005031580A1 (en) Information processing apparatus, information processing system and program
CN114218592A (en) Sensitive data encryption and decryption method and device, computer equipment and storage medium
CN105005731A (en) Data encryption and decryption methods and mobile terminal
CN101894235B (en) Smart card security session system
CN104573551A (en) File processing method and mobile terminal
CN105426775A (en) Method and system for protecting information security of smartphone
CN106682521B (en) File transparent encryption and decryption system and method based on driver layer
CN101237353A (en) A method and system for monitoring mobile storage device based on USBKEY
WO2022206453A1 (en) Method and apparatus for providing cross-chain private data
CN106100851B (en) Password management system, intelligent wristwatch and its cipher management method
CN103530581A (en) Hard disk encrypting method and operation system
CN108737079B (en) Distributed quantum key management system and method
JPH11272681A (en) Recording method for individual information and record medium thereof
CN108092937B (en) Method and system for preventing unauthorized access of Web system
CN112199730A (en) Method and device for processing application data on terminal and electronic equipment
CN101008927A (en) Information processing device, portable terminal device and information processing execution control method
CN100550735C (en) The method of multifunction intelligent key equipment and security control thereof
CN115834566A (en) File transmission system and file transmission method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant