CN101916348A - Method and system for safely guiding operating system of user - Google Patents

Method and system for safely guiding operating system of user Download PDF

Info

Publication number
CN101916348A
CN101916348A CN2010102535794A CN201010253579A CN101916348A CN 101916348 A CN101916348 A CN 101916348A CN 2010102535794 A CN2010102535794 A CN 2010102535794A CN 201010253579 A CN201010253579 A CN 201010253579A CN 101916348 A CN101916348 A CN 101916348A
Authority
CN
China
Prior art keywords
kernel
micro
user
authentication
operating system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010102535794A
Other languages
Chinese (zh)
Inventor
熊彩辉
唐相雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Tianyu Information Industry Co Ltd
Original Assignee
Wuhan Tianyu Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Tianyu Information Industry Co Ltd filed Critical Wuhan Tianyu Information Industry Co Ltd
Priority to CN2010102535794A priority Critical patent/CN101916348A/en
Publication of CN101916348A publication Critical patent/CN101916348A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention belongs to the field of information security, and in particular relates to a method for performing login authentication and safely guiding another operating system by using a microkernel. The method comprises the following steps of: running the microkernel after starting a computer; by using security environment provided by the microkernel, performing authentication on a microkernel local computer and performing authentication on a network server or a USB key; and performing secondary authentication on a user account and a password input by a user. After two-time authentication is successful, the microkernel guides the operating system of the user, so that the information security of the user is protected and the safety and confidentiality of computer user information are improved.

Description

A kind of safety guide method of operating system of user and guidance system
Technical field
The invention belongs to information security field, be specifically related to a kind of safety guide method and guidance system of operating system of user, carry out login authentication, and realize entering operating system of user by this micro-kernel safe guidance by micro-kernel.The present invention has ensured the operating system security start guiding of computer, improves the security and the confidentiality of computer user information.
Technical background
Along with popularizing of computing machine and notebook, computer has become the indispensable part of live and work, except the storage individual privacy information, the business information that has unit one belongs to and mechanism simultaneously, storing important country and department's confidential information in government bodies, military project computing machine and notebook, sensitive data is in case stolen by the lawless person or lose, will cause the consequence that can't estimate.The first step for the protection of user computer generally realizes with startup password.
Current method for user's startup password protection computer has 2 kinds at present, and a kind of is the start of cmod password, and also having a kind of is operating system of user account password login start.These two kinds of starts have been proved to be safety inadequately, be easy to be cracked, thereby for the user be inadequately safety.
Summary of the invention
The object of the present invention is to provide a kind of safety guide method of operating system of user, this method can guarantee that operating system starts shooting under the situation of being authorized to authenticate, start to user's operating system, prevent the potential safety hazard that disabled user's start brings effectively, and had safe characteristics.
The method of the pre-bootstrapping authentication of micro-kernel provided by the invention is characterized in that: a Mach goes to guide another operating system; Micro-kernel has at first passed through the bidirectional identity authentication with the webserver or usb key; again after the safety certification by user cipher and the webserver or user cipher and usb key; just can go to guide the operating system that starts on the computer; tackle all operations, the protection computerized information at disabled user's start.
Based on the method for pre-another operating system of bootstrapping authentication of above-mentioned micro-kernel, its step comprises:
1. booting computer moves micro-kernel;
2. micro-kernel starts network and is connected with server and carries out bidirectional identity authentication, and perhaps micro-kernel startup usb is connected with usb key and carries out bidirectional identity authentication, after bidirectional identity authentication passes through, changes step over to 3.; If above verification process does not all pass through, then still change step over to 2., repeatedly behind the authentification failure, change step over to 5.;
3. user account and password input frame appear in micro-kernel; Wait for user's input; After the user inputs user account and password, again these information are submitted to server or usb key carries out the user account password authentification of message, after authentication is passed through, change step over to 4.; If above verification process please weigh first input, and change step over to 3. not by then pointing out user account and password input error; Behind three authentification failures of user, change step over to 5.;
4. micro-kernel guides user's operating system (windows or linux or mac or other operating system).The computer security guiding, the user enters the operating system that oneself will be used.
5. micro-kernel prompting authentification failure shuts down after 3 seconds automatically.Shut down of computer after 3 seconds;
6. stop.
The invention allows for a kind of secure guiding system of realizing said method, comprise certificate server, and usb key flash memory device and micro-kernel; Certificate server and usb key user computer finger print information and user account password Hash information in internal storage respectively, are used to provide computer authentication and authenticating user identification respectively; Put the finger print information of certificate server and usb key in the micro-kernel, be used to provide the authentication of certificate server and the authentication of usb key respectively; Certificate server places in certain trust domain, micro-kernel is kept in communication with it by network, micro-kernel obtains the identity fingerprint information of certificate server earlier and compares, again oneself computer authentication information and user's ID authentication information are issued server after the unanimity, certificate server passes computer authentication information and the information of authenticating user identification and the comparing of preserving before of coming with micro-kernel by network, and comparative result is returned to micro-kernel; Usbkey is taken care of by the user, and guarantees its safety by the user; Micro-kernel is by usb and usb key communication, micro-kernel obtains usb key identity fingerprint information earlier and compares, again oneself computer authentication information and user's ID authentication information are issued usb key after the unanimity, usb key passes computer authentication information and the user's ID authentication information and comparing of preserving before come with micro-kernel, and returns comparative result to micro-kernel.
Described micro-kernel is made up of following module: the authentication interface module, the usb module, mixed-media network modules mixed-media, os-bootloader module schedules module, wherein, the authentication interface module provides the output of user account password input and current information, the usb module provides usb host function, and communicate with usb key, mixed-media network modules mixed-media provides a network environment, communicates with network authentication server, and the os-bootloader module provides the function of guiding operating system of user, scheduler module then is to handle the function of dispatching between the above-mentioned module, thereby realizes the function of micro-kernel safe guidance.
The present invention has guaranteed the safe guidance of operating system of user from three aspects, at first micro-kernel moves and mixed-media network modules mixed-media and usb module are provided, and the environment of a safety certification is provided for system; Next is the information of user computer fingerprint, the bidirectional identity authentication of the information of user account password and the webserver or the finger print information of usb key own and user account password authentification of message, computer that the assurance legal users is legal and the ability of legitimate network server or usb key authenticate effectively.Be at last behind the authentication success micro-kernel guiding user operating system, guaranteed the safe guidance of operating system of user.
Description of drawings
Fig. 1 is the synoptic diagram of normal computer guiding start-up course;
Fig. 2 is the employed micro-kernel bootstrapping authentication of a inventive method synoptic diagram;
Fig. 3 is the process flow diagram of the employed usb key authentication of the inventive method version;
Fig. 4 is the process flow diagram of the employed webserver authentication of the inventive method version;
Embodiment
Below in conjunction with accompanying drawing, describe the present invention in detail by concrete case study on implementation.
As Fig. 1, be normal launch computer process synoptic diagram.
As Fig. 2, be the used launch computer process synoptic diagram of the present invention, with normal different place, be before the guiding operating system of user, to have moved micro-kernel earlier, carried out authentication operation, after the authentication success, go to guide user's operating system again.
According to the difference of authenticating device, be divided into webserver authentication version and usb key authentication version, detailed workflow is seen Fig. 3 (usb key authenticates version) and Fig. 4 (webserver authentication version).Describe this course of work below in detail.
The installation process step is as follows:
1. the webserver is installed: move installation procedure on the webserver, the webserver is collected the hardware information of this machine, as hard disk serial number, CPU serial number, the information that network interface card mac etc. are relevant, generate the identity fingerprint information of the webserver according to these information and random number, and preserve.
2. micro-kernel is installed (webserver authentication version): move installation procedure on user computer, installation procedure is collected the hardware information of this machine, as hard disk serial number, CPU serial number, the information that network interface card mac etc. are relevant is according to the identity fingerprint information of these information and this machine of random number generation user.User account and password input frame occur, collect user account and encrypted message, add random number, generate user account and encrypted message.Micro-kernel connects the webserver then, and the identity fingerprint information of fetching the webserver is preserved, and oneself identity fingerprint information and user account and encrypted message are sent to webserver preservation.Installation procedure is write micro-kernel on the hard disk of user computer, and the new mbr that can guide micro-kernel is write on 0 sector of hard disk, replaces the mbr on the hard disk, can guide micro-kernel so that computer weighs when starting shooting earlier, starts the login authentication service.
3. micro-kernel is installed (usb key authenticates version): move installation procedure on user computer, installation procedure is collected the hardware information of this machine, as hard disk serial number, CPU serial number, the information that network interface card mac etc. are relevant is according to the identity fingerprint information of these information and this machine of random number generation user.Micro-kernel is searched usb key, find usb key after, the identity fingerprint information of the usb key that reads back is also preserved.User account and password input frame occur, collect user account and encrypted message, add random number, generate user account and encrypted message, the identity fingerprint information of oneself and user account and encrypted message are write back to usb key preserve.Installation procedure is write micro-kernel on the hard disk of user computer, and the new mbr that can guide micro-kernel is write on 0 sector of hard disk, replaces the mbr on the hard disk, can guide micro-kernel so that computer weighs when starting shooting earlier, starts the login authentication service.
System's operational process step is as follows, as Fig. 3 and Fig. 4:
1. user's start, the micro-kernel operation.User's start, computer begins self check, after self check finishes, and the mbr on the operation hard disk, this mbr can guide micro-kernel, after micro-kernel moved, the authentication of this machine was being carried out in prompting, and begins to enter the bidirectional identity authentication stage, the webserver authenticates version in this way, then arrive step 2, otherwise be usb key authentication version, to step 3.
2. bidirectional identity authentication process (webserver authentication version): micro-kernel starts the network service and connects with the webserver, and obtain the identity fingerprint information of the webserver, these information of preserving when installing with this machine relatively, think that the webserver is legal when consistent, and then the identity fingerprint information of oneself issued the webserver, the webserver thinks that the user computer identity is legal with information of receiving and the comparison of preserving before when consistent.All during success, the success of bidirectional identity authentication process just can enter user account and cipher authentication stage for two authentications, to step 4, otherwise to authentification failure the processing stage, arrives step 7.
3. bidirectional identity authentication process (usb key authenticates version): user computer start, the operation micro-kernel, micro-kernel starts usb, and scanning usb key equipment is after scanning usb key, obtain usb key fingerprint identity information, these information of preserving when installing with this machine are relatively thought that usb key is legal when consistent, and then the identity fingerprint information of oneself are issued usb key, usb key thinks that the user computer identity is legal with information of receiving and the comparison of preserving before when consistent.When two authentications were all successful, the success of bidirectional identity authentication process just can enter user account and cipher authentication stage, to step 5., otherwise to the authentification failure processing stage, to step 7.
4. user account and cipher authentication (webserver authentication version): micro-kernel sends to the webserver with the account and the encrypted message of user's input, the webserver is write the comparison of preserving before after receiving these information, the result is returned to micro-kernel, when consistent, think that user account and cipher authentication are successful, to the micro-kernel guiding operating system of user stage, to step 6.Otherwise the processing stage of to authentification failure, to step 7.
5. user account and cipher authentication (usb key authenticates version): micro-kernel sends to usb key with the account and the encrypted message of user's input, usb key writes the comparison of preserving before after receiving these information, the result is returned to micro-kernel, when consistent, think that user account and cipher authentication are successful, to the micro-kernel guiding operating system of user stage, to step 6.Otherwise the processing stage of to authentification failure, to step 7.
6. micro-kernel guides operating system of user: micro-kernel calls booting operating system program (bootloader) not respectively according to the difference of operating system of user type, guides user's operating system.The user enters the operating system of oneself.
7. authentification failure is handled: safe micro-kernel prompting authentification failure, shutdown after 3 seconds, shutdown after 3 seconds then.
The above is preferred embodiment of the present invention, but the present invention should not be confined to the disclosed content of this embodiment and accompanying drawing.So everyly do not break away from the equivalence of finishing under the spirit disclosed in this invention or revise, all fall into the scope of protection of the invention.

Claims (7)

1. the safety guide method of an operating system of user, utilize micro-kernel carry out safety certification and safety certification by after go to guide user's operating system, thereby realize safe guidance to operating system of user, these method concrete steps are as follows:
(1) booting computer, the operation micro-kernel;
(2) described micro-kernel and authenticating device carry out bidirectional identity authentication, after bidirectional identity authentication passes through, enter step (3); If repeatedly behind the authentification failure, micro-kernel is pointed out authentification failure, and shutdown automatically behind certain hour;
(3) user account password authentification of message
User account and password input frame appear in micro-kernel, after the user inputs user account and password, again these information are submitted to described authenticating device and carry out the user account password authentification of message, after authentication is passed through, enter step (4), if repeatedly behind the authentification failure, micro-kernel is pointed out authentification failure, and shutdown automatically behind certain hour;
(4) micro-kernel guiding user's operating system
Micro-kernel calls booting operating system program not respectively according to the difference of operating system of user type, guides user's operating system, and the user enters the operating system of oneself.
2. the safety guide method of a kind of operating system according to claim 1 is characterized in that, described authenticating device is the webserver, and described bidirectional identity authentication detailed process is:
(2.1) micro-kernel is initiated and the connecting of the webserver, and connecting fails directly returns failure;
(2.2) if connects successfully, then from the webserver obtain the server identity finger print information and with micro-kernel the check and correction of preserving, think the authenticating network server during unanimity successfully, otherwise authentification failure directly returns failure;
(2.3) after the authenticating network server success, the identity fingerprint information of micro-kernel is sent to webserver check and correction, think the success of this machine of authentication micro-kernel when consistent, and the return authentication result gives micro-kernel, otherwise authentification failure directly returns failure.
3. the safety guide method of a kind of operating system according to claim 1 is characterized in that, described authenticating device is usb key, and described bidirectional identity authentication detailed process is:
(3.1) described micro-kernel scanning usb key, scanning is returned failure less than to usb key the time;
(3.2) scan usb key after, send command information to usb key, fetch the identity fingerprint information of usb key, the inner finger print information of preserving in these information and the micro-kernel is compared, when consistent, think legal usb key, authentication usb key success, otherwise failure is returned in authentication usb key failure;
(3.3) after the authentication usb key success, micro-kernel sends to usbkey with the identity fingerprint information of this machine, usb key compares these information and inner this machine of micro-kernel finger print information of preserving, and the result who returns comparison gives micro-kernel, this machine of usb key authentication micro-kernel success when returning success, otherwise usbkey authenticates the failure of this machine, returns failure.
4. according to the safety guide method of one of claim 1-3 described a kind of operating system, it is characterized in that the detailed process of described user account password authentification of message is:
(4.1) micro-kernel is according to user's account and cryptographic calculations cryptographic hash, and this cryptographic hash is passed to authenticating device;
(4.2) described authenticating device compares the value of above-mentioned cryptographic hash with storage in advance, and is successful to micro-kernel return authentication user when consistent, return authentication user failure when inconsistent.
5. according to the safety guide method of one of claim 1-4 described a kind of operating system, it is characterized in that described micro-kernel comprises:
The authentication interface module is used to provide the output of user account password input and current information;
The usb module is used to provide usb host function, and communicates with usb key;
Mixed-media network modules mixed-media is used to provide network environment, to communicate with network authentication server;
The os-bootloader module provides the booting operating system program, is used to provide operating system of user;
Scheduler module is used for the scheduling between each module, realizes the safe guidance of micro-kernel.
6. realize the secure guiding system of one of claim 1-5 described safety guide method, comprise authenticating device and micro-kernel, described authenticating device has been deposited user computer finger print information and user account password Hash information, be used to provide computer authentication and authenticating user identification respectively, described safe micro-kernel internal memory is placed with the finger print information of authenticating device, be used to provide the authentication of authenticating device
Described micro-kernel obtains the identity fingerprint information of authenticating device earlier and compares, again oneself computer authentication information and user's ID authentication information are issued described authenticating device after the unanimity, described authenticating device is with the information of this computer authentication information and authenticating user identification and comparing of preserving before, if comparative result unanimity, show authentication success, micro-kernel enters the operating system of oneself according to operating system of user type guiding user.
7. secure guiding system according to claim 6 is characterized in that, described authenticating device is the webserver or usb key.
CN2010102535794A 2010-08-16 2010-08-16 Method and system for safely guiding operating system of user Pending CN101916348A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010102535794A CN101916348A (en) 2010-08-16 2010-08-16 Method and system for safely guiding operating system of user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102535794A CN101916348A (en) 2010-08-16 2010-08-16 Method and system for safely guiding operating system of user

Publications (1)

Publication Number Publication Date
CN101916348A true CN101916348A (en) 2010-12-15

Family

ID=43323858

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102535794A Pending CN101916348A (en) 2010-08-16 2010-08-16 Method and system for safely guiding operating system of user

Country Status (1)

Country Link
CN (1) CN101916348A (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685125A (en) * 2012-05-07 2012-09-19 上海市共进通信技术有限公司 System for realizing cloud-end encrypted control of wireless device and cloud-end encryption starting method
CN102904719A (en) * 2011-07-27 2013-01-30 国民技术股份有限公司 USB (universal serial bus)-key and application method thereof
CN104572093A (en) * 2014-12-30 2015-04-29 北京工业大学 Method for realizing bi-operation system starting of terminal equipment by using USB (universal serial bus) controller
CN104580136A (en) * 2014-09-10 2015-04-29 中电科技(北京)有限公司 UEFI-based long-distance identity authentication system and method
CN104615938A (en) * 2015-02-25 2015-05-13 山东超越数控电子有限公司 Power-on authentication method based on solid-state hard disk drive
CN104981778A (en) * 2013-02-22 2015-10-14 马维尔国际贸易有限公司 Patching boot code of read-only memory
CN105630519A (en) * 2014-10-29 2016-06-01 江苏威盾网络科技有限公司 Safety boot authentication method based on two-dimensional code
WO2016090836A1 (en) * 2014-12-12 2016-06-16 中兴通讯股份有限公司 Method and apparatus for starting embedded system
CN106295318A (en) * 2015-06-05 2017-01-04 北京壹人壹本信息科技有限公司 A kind of system start-up bootstrap technique and device
CN106897626A (en) * 2017-02-16 2017-06-27 合肥联宝信息技术有限公司 It is a kind of to realize the method and device that intelligent terminal is guided safely
CN106973054A (en) * 2017-03-29 2017-07-21 山东超越数控电子有限公司 A kind of operating system login authentication method and system based on credible platform
CN107292182A (en) * 2017-06-29 2017-10-24 江苏鲁汶仪器有限公司 A kind of semiconductor equipment control system hot plug is anti-to crack tailored version hardware encipherment protection device
CN107506289A (en) * 2017-07-06 2017-12-22 广东网金控股股份有限公司 The abnormality monitoring method and financial terminal of a kind of financial terminal
CN108388792A (en) * 2018-03-21 2018-08-10 北京力鼎创软科技有限公司 A kind of office operation system reinforcement method and system
CN109327597A (en) * 2018-08-03 2019-02-12 奇酷互联网络科技(深圳)有限公司 The method, apparatus of the entrance of mobile terminal and secret system
CN110502280A (en) * 2019-07-09 2019-11-26 宇龙计算机通信科技(深圳)有限公司 Starting method, apparatus, storage medium and the terminal of Android operation system
CN112818304A (en) * 2019-11-15 2021-05-18 鹤壁天海电子信息系统有限公司 Unlocking method and device
CN112966276A (en) * 2021-04-02 2021-06-15 杭州华澜微电子股份有限公司 Method, device and medium for safely starting computer
CN113254904A (en) * 2021-07-06 2021-08-13 浙江宇视科技有限公司 Intelligent processing method, device, equipment and medium for multi-dimensional information acquisition and identification
CN114139131A (en) * 2021-12-03 2022-03-04 深圳竹云科技有限公司 Operating system login method and device and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1869999A (en) * 2006-06-28 2006-11-29 北京飞天诚信科技有限公司 Protection method and device for opening computer
CN1936761A (en) * 2005-09-23 2007-03-28 联想(北京)有限公司 Computer system of bottom identity identification and method therefor
KR100910541B1 (en) * 2009-04-08 2009-07-31 장인천 Computer security system using a tag and the method thereof
CN101777105A (en) * 2010-01-25 2010-07-14 上海北大方正科技电脑系统有限公司 Computer booting anti-counterfeit authentication method based on BIOS

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1936761A (en) * 2005-09-23 2007-03-28 联想(北京)有限公司 Computer system of bottom identity identification and method therefor
CN1869999A (en) * 2006-06-28 2006-11-29 北京飞天诚信科技有限公司 Protection method and device for opening computer
KR100910541B1 (en) * 2009-04-08 2009-07-31 장인천 Computer security system using a tag and the method thereof
CN101777105A (en) * 2010-01-25 2010-07-14 上海北大方正科技电脑系统有限公司 Computer booting anti-counterfeit authentication method based on BIOS

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102904719A (en) * 2011-07-27 2013-01-30 国民技术股份有限公司 USB (universal serial bus)-key and application method thereof
CN102904719B (en) * 2011-07-27 2016-05-18 国民技术股份有限公司 The using method of a kind of USB-key and USB-key
CN102685125A (en) * 2012-05-07 2012-09-19 上海市共进通信技术有限公司 System for realizing cloud-end encrypted control of wireless device and cloud-end encryption starting method
CN104981778A (en) * 2013-02-22 2015-10-14 马维尔国际贸易有限公司 Patching boot code of read-only memory
CN104580136A (en) * 2014-09-10 2015-04-29 中电科技(北京)有限公司 UEFI-based long-distance identity authentication system and method
CN105630519A (en) * 2014-10-29 2016-06-01 江苏威盾网络科技有限公司 Safety boot authentication method based on two-dimensional code
WO2016090836A1 (en) * 2014-12-12 2016-06-16 中兴通讯股份有限公司 Method and apparatus for starting embedded system
CN104572093A (en) * 2014-12-30 2015-04-29 北京工业大学 Method for realizing bi-operation system starting of terminal equipment by using USB (universal serial bus) controller
CN104615938A (en) * 2015-02-25 2015-05-13 山东超越数控电子有限公司 Power-on authentication method based on solid-state hard disk drive
CN106295318A (en) * 2015-06-05 2017-01-04 北京壹人壹本信息科技有限公司 A kind of system start-up bootstrap technique and device
CN106897626B (en) * 2017-02-16 2020-04-14 合肥联宝信息技术有限公司 Method and device for realizing intelligent terminal safety guide
CN106897626A (en) * 2017-02-16 2017-06-27 合肥联宝信息技术有限公司 It is a kind of to realize the method and device that intelligent terminal is guided safely
CN106973054A (en) * 2017-03-29 2017-07-21 山东超越数控电子有限公司 A kind of operating system login authentication method and system based on credible platform
CN107292182A (en) * 2017-06-29 2017-10-24 江苏鲁汶仪器有限公司 A kind of semiconductor equipment control system hot plug is anti-to crack tailored version hardware encipherment protection device
CN107506289A (en) * 2017-07-06 2017-12-22 广东网金控股股份有限公司 The abnormality monitoring method and financial terminal of a kind of financial terminal
CN108388792A (en) * 2018-03-21 2018-08-10 北京力鼎创软科技有限公司 A kind of office operation system reinforcement method and system
CN109327597A (en) * 2018-08-03 2019-02-12 奇酷互联网络科技(深圳)有限公司 The method, apparatus of the entrance of mobile terminal and secret system
CN110502280A (en) * 2019-07-09 2019-11-26 宇龙计算机通信科技(深圳)有限公司 Starting method, apparatus, storage medium and the terminal of Android operation system
CN110502280B (en) * 2019-07-09 2024-01-05 宇龙计算机通信科技(深圳)有限公司 Android operating system starting method and device, storage medium and terminal
CN112818304A (en) * 2019-11-15 2021-05-18 鹤壁天海电子信息系统有限公司 Unlocking method and device
CN112966276A (en) * 2021-04-02 2021-06-15 杭州华澜微电子股份有限公司 Method, device and medium for safely starting computer
CN113254904A (en) * 2021-07-06 2021-08-13 浙江宇视科技有限公司 Intelligent processing method, device, equipment and medium for multi-dimensional information acquisition and identification
CN113254904B (en) * 2021-07-06 2021-10-22 浙江宇视科技有限公司 Intelligent processing method, device, equipment and medium for multi-dimensional information acquisition and identification
CN114139131A (en) * 2021-12-03 2022-03-04 深圳竹云科技有限公司 Operating system login method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN101916348A (en) Method and system for safely guiding operating system of user
CN101340281B (en) Method and system for safe login input on network
WO2017000829A1 (en) Method for checking security based on biological features, client and server
US10659237B2 (en) System and method for verifying integrity of an electronic device
CN112513857A (en) Personalized cryptographic security access control in a trusted execution environment
EP3706019B1 (en) Hardware-enforced access protection
CN108604275A (en) Hardware device and its authentication method
US20050228993A1 (en) Method and apparatus for authenticating a user of an electronic system
US20120030475A1 (en) Machine-machine authentication method and human-machine authentication method for cloud computing
WO2013107362A1 (en) Method and system for protecting data
CN104063788A (en) Mobile platform credibility payment system and method
CN101436233A (en) Hard disk multi-user partition switch control method, system and computer terminal
CN102184357B (en) Portable trustworthy private information processing system
US10037418B2 (en) Pre-boot authentication credential sharing system
WO2019205389A1 (en) Electronic device, authentication method based on block chain, and program and computer storage medium
US20150264047A1 (en) Method and system for providing secure communication between multiple operating systems in a communication device
CN102184358B (en) USB (Universal Serial Bus) embedded trustworthiness private information processing device and system
EP3767502B1 (en) Secure storing and processing of data
US20170201528A1 (en) Method for providing trusted service based on secure area and apparatus using the same
CN101377803A (en) Method and system for implementing start-up protection
CN101859373A (en) Method for safely accessing mobile credible terminal
CN106911744A (en) The management method and managing device of a kind of image file
US20230327876A1 (en) Authentication apparatus and authentication method
CN114070548A (en) Software copyright encryption protection method based on soft dongle device
Kamal et al. Secure Mobile ID Architecture on Android Devices based on Trust Zone

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20101215