CN103164655A - Trusted cryptographic module and trusted cryptographic system - Google Patents
Trusted cryptographic module and trusted cryptographic system Download PDFInfo
- Publication number
- CN103164655A CN103164655A CN201110408572XA CN201110408572A CN103164655A CN 103164655 A CN103164655 A CN 103164655A CN 201110408572X A CN201110408572X A CN 201110408572XA CN 201110408572 A CN201110408572 A CN 201110408572A CN 103164655 A CN103164655 A CN 103164655A
- Authority
- CN
- China
- Prior art keywords
- module
- control module
- distance
- apart
- credible password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to a trusted cryptographic module and a trusted cryptographic system. The trusted cryptographic module comprises a first distance control module. The first distance control module comprises a detection sub-module and a first control sub-module, wherein the detection sub-module is used for detecting the distance between a second distance control module and the first distance control module, and the first control sub-module is used for controlling the power-up and the power-down of the trusted cryptographic module according to distance detecting results of the detection sub-module. The trusted cryptographic system comprises the trusted cryptographic module and the second distance control module, wherein the second distance control module is used for controlling the distance between the first distance control module and the first distance control module. The trusted cryptographic module and the trusted cryptographic system effectively reduce the safety risk that malicious software can freely visit the trusted cryptographic module (TCM), and improves the safety of the TCM.
Description
Technical field
The present invention relates to the communications field, relate in particular to a kind of credible password module and a kind of credible cryptographic system.
Background technology
Credible calculating is with TCM(Trust Cryptography Module, credible password module) chip is core, and aspect PC (personal computer) security protection, the TCM chip is realized three major functions: the one,, the function that defend against computer virus is attacked is come defensive attack by a kind of chain-of-trust; The 2nd,, set up a believable identity, the platform of identification personation; The 3rd,, the data protection of high security can be sealed in a very safe zone data.
In current design architecture, after PC powered on, the TCM chip just was in the powered operation state always.This just makes the legal software of operating system and Malware can both access the TCM chip, causes potential safety hazard to system.
Summary of the invention
Technical matters to be solved by this invention is to provide a kind of credible password module and credible cryptographic system, improves the security of credible password module.
For solving the problems of the technologies described above, the present invention proposes a kind of credible password module, comprise first apart from control module, described first comprises apart from control module:
Detection sub-module is for detection of second distance control module and the described first distance apart from control module;
First controls submodule, is used for power supply and power down apart from testing result control credible password module according to described detection sub-module.
Further, above-mentioned credible password module also can have following characteristics, and described detection sub-module comprises:
Rf receiver unit is used for receiving the radiofrequency signal that described second distance control module is sent;
Comparing unit, the intensity and the predetermined threshold value that are used for radiofrequency signal that described rf receiver unit is received compare, with judge described second distance control module and described first apart from the distance of control module whether in the distance range of presetting.
Further, above-mentioned credible password module also can have following characteristics, and described first controls submodule comprises:
The first supply control unit, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in the time, make credible password module be in power supply state;
The first power down control module, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module outside the time, make credible password module be in power-down state.
For solving the problems of the technologies described above, the invention allows for a kind of credible password module, comprise first apart from control module, described first comprises apart from control module:
Detection sub-module is for detection of second distance control module and the described first distance apart from control module;
Authentication sub module, be used for described detection sub-module be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in the time, further verify the legitimacy of described second distance control module;
Second controls submodule, is used for power supply and power down apart from the legitimate verification output control credible password module of testing result and described authentication sub module according to described detection sub-module.
Further, above-mentioned credible password module also can have following characteristics, and described detection sub-module comprises:
Rf receiver unit is used for receiving the radiofrequency signal that described second distance control module is sent;
Comparing unit, the intensity and the predetermined threshold value that are used for radiofrequency signal that described rf receiver unit is received compare, with judge described second distance control module and described first apart from the distance of control module whether in the distance range of presetting.
Further, above-mentioned credible password module also can have following characteristics, and described second controls submodule comprises:
The second supply control unit, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in and described legitimate verification result when being legal, make credible password module be in power supply state;
The second power down control module, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module outside the time, perhaps described apart from testing result be second distance control module and described first apart from the distance of control module in default distance range but described legitimate verification result when being illegal makes credible password module be in power-down state.
For solving the problems of the technologies described above, the invention allows for a kind of credible cryptographic system, comprise credible password module and second distance control module, described credible password module comprises first apart from control module, wherein:
The second distance control module is used for controlling this second distance control module and the described first distance apart from control module;
Described first comprises apart from control module:
Detection sub-module is for detection of described second distance control module and the described first distance apart from control module;
First controls submodule, is used for power supply and power down apart from testing result control credible password module according to described detection sub-module.
Further, above-mentioned credible cryptographic system also can have following characteristics, and described first controls submodule comprises:
The first supply control unit, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in the time, make credible password module be in power supply state;
The first power down control module, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module outside the time, make credible password module be in power-down state.
For solving the problems of the technologies described above, the invention allows for a kind of credible cryptographic system, comprise credible password module and second distance control module, described credible password module comprises first apart from control module, wherein:
The second distance control module is used for controlling this second distance control module and the described first distance apart from control module;
Described first comprises apart from control module:
Detection sub-module is for detection of described second distance control module and the described first distance apart from control module;
Authentication sub module, be used for described detection sub-module be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in the time, further verify the legitimacy of described second distance control module;
Second controls submodule, is used for power supply and power down apart from the legitimate verification output control credible password module of testing result and described authentication sub module according to described detection sub-module.
Further, above-mentioned credible cryptographic system also can have following characteristics, and described second controls submodule comprises:
The second supply control unit, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in and described legitimate verification result when being legal, make credible password module be in power supply state;
The second power down control module, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module outside the time, perhaps described apart from testing result be second distance control module and described first apart from the distance of control module in default distance range but described legitimate verification result when being illegal makes credible password module be in power-down state.
Credible password module of the present invention and credible cryptographic system, when needs use credible password module TCM, within the second distance control module is placed on default distance range, this moment, credible password module TCM was in power supply state, can normally access credible password module TCM with the application program on main frame that credible password module TCM is connected; When not needing credible password module TCM, the second distance control module is placed on outside default distance range, this moment, credible password module TCM was in off-position, and the application program on main frame can't be accessed credible password module TCM.Therefore, the credible password module of the embodiment of the present invention and credible cryptographic system have reduced the potential safety hazard that Malware is arbitrarily accessed credible password module TCM, the security that has improved credible password module TCM effectively.
Description of drawings
Fig. 1 is a kind of structured flowchart of credible password module in the embodiment of the present invention;
Fig. 2 is a kind of structured flowchart of detection sub-module 110 in Fig. 1;
Fig. 3 is a kind of structured flowchart of the first control submodule 120 in Fig. 1;
Fig. 4 is the another kind of structured flowchart of credible password module in the embodiment of the present invention;
Fig. 5 is a kind of structured flowchart of the second control submodule 140 in Fig. 4;
Fig. 6 is a kind of structured flowchart of credible cryptographic system in the embodiment of the present invention;
Fig. 7 is the another kind of structured flowchart of credible cryptographic system in the embodiment of the present invention.
Embodiment
Below in conjunction with accompanying drawing, principle of the present invention and feature are described, example only is used for explaining the present invention, is not be used to limiting scope of the present invention.
Fig. 1 is a kind of structured flowchart of credible password module in the embodiment of the present invention.As shown in Figure 1, in the present embodiment, the first credible password module 10A comprises first apart from control module A.Wherein, first comprises detection sub-module 110 and the first control submodule 120 apart from control module A.Detection sub-module 110 is for detection of the second distance control module and the first distance apart from control module A that are placed in the first credible password module 10A outside.First controls submodule 120 for power supply and power down apart from testing result control the first credible password module 10A according to detection sub-module 110.The user can change second distance control module and first apart from the distance between control module A by mobile second distance control module, is also the distance between second distance control module and the first credible password module 10A.
Wherein, detection sub-module 110 can adopt and anyly detect second distance control module and the first distance apart from control module A apart from detection mode.For example, detection sub-module 110 can adopt and followingly detect distance apart from detection mode: the second distance control module to first apart from the constant radiofrequency signal of control module A transmitted power, detection sub-module 110 receives this radiofrequency signal, determines distance according to the field intensity value of the radiofrequency signal that receives and the comparative result of default field intensity threshold value.When the field intensity value of the radiofrequency signal that detection sub-module 110 receives equals predetermined threshold value, illustrate that second distance control module and first equals the predeterminable range threshold value apart from the distance between control module A; The field intensity value of the radiofrequency signal that detection sub-module 110 receives is during greater than default field intensity threshold value, illustrate second distance control module and first apart from the distance between control module A in the predeterminable range scope; The field intensity value of the radiofrequency signal that detection sub-module 110 receives is during less than default field intensity threshold value, illustrate second distance control module and first apart from the distance between control module A outside the predeterminable range scope.
When detection sub-module 110 adopt above-mentioned apart from detection mode detect apart from the time, the structure of detection sub-module 110 can be as shown in Figure 2.Fig. 2 is a kind of structured flowchart of detection sub-module 110 in Fig. 1.As shown in Figure 2, detection sub-module 110 can comprise rf receiver unit 111 and comparing unit 112.Rf receiver unit 111 is used for receiving the radiofrequency signal that the second distance control module is sent.Intensity and predetermined threshold value that comparing unit 112 is used for radiofrequency signal that rf receiver unit 111 is received compare, with judge second distance control module and first apart from the distance of control module A whether in the distance range of presetting.For example, if the intensity of this radiofrequency signal is greater than predetermined threshold value, apart from testing result be second distance control module and first apart from the distance of control module A in default distance range, otherwise, if the intensity of this radiofrequency signal is less than predetermined threshold value, so apart from testing result be second distance control module and first apart from the distance of control module A outside default distance range.
Fig. 3 is a kind of structured flowchart of the first control submodule 120 in Fig. 1.As shown in Figure 3, the first control submodule 120 can comprise the first supply control unit 121 and the first power down control module 122.The first supply control unit 121 be used for detection sub-module 110 be the second distance control module apart from testing result with the first distance range of presetting apart from the distance of control module A in the time, make the first credible password module 10A be in power supply state.The first power down control module 122, be used for detection sub-module 110 be the second distance control module apart from testing result with the first distance range of presetting apart from the distance of control module A outside the time, make the first credible password module 10A be in power-down state.
The credible password module of the embodiment of the present invention, when needs use credible password module TCM, within the second distance control module is placed on default distance range, this moment, credible password module TCM was in power supply state, can normally access credible password module TCM with the application program on main frame that credible password module TCM is connected; When not needing credible password module TCM, the second distance control module is placed on outside default distance range, this moment, credible password module TCM was in off-position, and the application program on main frame can't be accessed credible password module TCM.Therefore, the credible password module of the embodiment of the present invention has reduced the potential safety hazard that Malware is arbitrarily accessed credible password module TCM, the security that has improved credible password module TCM effectively.
Fig. 4 is the another kind of structured flowchart of credible password module in the embodiment of the present invention.As shown in Figure 4, in the present embodiment, the second credible password module 10B comprises first apart from control module B.Wherein, first comprises detection sub-module 110, authentication sub module 130 and the second control submodule 140 apart from control module B.Detection sub-module 110 is for detection of second distance control module and the first distance apart from control module B.Authentication sub module 130 be used for detection sub-module 110 be the second distance control module apart from testing result with the first distance range of presetting apart from the distance of control module B in the time, further verify the legitimacy of second distance control module.Second controls submodule 140 is used for power supply and power down apart from the legitimate verification output control second credible password module 10B of testing result and authentication sub module 130 according to detection sub-module 110.
Wherein, detection sub-module 110 can adopt and anyly detect second distance control module and the first distance apart from control module B apart from detection mode.The structure of detection sub-module 110 can be as shown in Figure 2.
Wherein, authentication sub module 130 can adopt the legitimacy of any authentication mode checking second distance control module.For example, authentication sub module 130 can be verified the legitimacy of second distance control module in the following way:
After the second distance control module is received authentication requesting information, send the identity key of second distance control module to authentication sub module 130;
Whether the identity key of authentication sub module 130 verification second distance control modules is correct, if correct, think that the second distance control module is legal, otherwise thinks that the second distance control module is illegal;
Fig. 5 is a kind of structured flowchart of the second control submodule 140 in Fig. 4.As shown in Figure 5, the second control submodule 140 can comprise the second supply control unit 141 and the second power down control module 142.The second supply control unit 141, be used for detection sub-module 110 be the second distance control module apart from testing result with the first distance range of presetting apart from the distance of control module B in and the legitimate verification result of authentication sub module 130 when being legal, make the second credible password module 10B be in power supply state; The second power down control module 142, be used for detection sub-module 110 be the second distance control module apart from testing result with the first distance range of presetting apart from the distance of control module B outside the time, perhaps detection sub-module 110 apart from testing result be second distance control module and first apart from the distance of control module B in default distance range but the legitimate verification result of authentication sub module 130 when being illegal makes the second credible password module 10B be in power-down state.
The credible password module of the embodiment of the present invention, when needs use credible password module TCM, within the second distance control module is placed on default distance range, this moment, credible password module TCM was in power supply state, can normally access credible password module TCM with the application program on main frame that credible password module TCM is connected; When not needing credible password module TCM, the second distance control module is placed on outside default distance range, this moment, credible password module TCM was in off-position, and the application program on main frame can't be accessed credible password module TCM.Therefore, the credible password module of the embodiment of the present invention has effectively reduced Malware and has arbitrarily accessed the potential safety hazard that credible password module TCM causes, and has improved the security of credible password module TCM.And, the credible password module of the embodiment of the present invention, can also carry out authentication to the second distance control module, prevent that illegal second distance control module is by controlling within distance with credible password module TCM enters default distance range, so that credible password module TCM is in power supply state and suffers the attack of Malware, further improved the security of credible password module TCM.
Fig. 6 is a kind of structured flowchart of credible cryptographic system in the embodiment of the present invention.As shown in Figure 6, in the present embodiment, the first credible cryptographic system comprises the first credible password module 10A and second distance control module 20, the first credible password module 10A comprises first apart from control module A, wherein, second distance control module 20 is used for controlling this second distance control module 20 and the first distance apart from control module A.First comprises detection sub-module 110 and the first control submodule 120 apart from control module A.Detection sub-module 110 is for detection of second distance control module 20 and the first distance apart from control module A.First controls submodule 120 for power supply and power down apart from testing result control the first credible password module 10A according to detection sub-module 110.
Wherein, the first structure of controlling submodule 120 can be as shown in Figure 3.First controls submodule 120 can comprise the first supply control unit 121 and the first power down control module 122.The first supply control unit 121 be used for detection sub-module 110 be the second distance control module apart from testing result with the first distance range of presetting apart from the distance of control module A in the time, make the first credible password module 10A be in power supply state.The first power down control module 122, be used for detection sub-module 110 be the second distance control module apart from testing result with the first distance range of presetting apart from the distance of control module A outside the time, make the first credible password module 10A be in power-down state.
The credible cryptographic system of the embodiment of the present invention, when needs use credible password module TCM, within the second distance control module is placed on default distance range, this moment, credible password module TCM was in power supply state, can normally access credible password module TCM with the application program on main frame that credible password module TCM is connected; When not needing credible password module TCM, the second distance control module is placed on outside default distance range, this moment, credible password module TCM was in off-position, and the application program on main frame can't be accessed credible password module TCM.Therefore, the credible cryptographic system of the embodiment of the present invention has reduced the potential safety hazard that Malware is arbitrarily accessed credible password module TCM, the security that has improved credible password module TCM effectively.
Fig. 7 is the another kind of structured flowchart of credible cryptographic system in the embodiment of the present invention.As shown in Figure 7, in the present embodiment, the second credible cryptographic system comprises that the second credible password module 10B and second distance control module 20, the second credible password module 10B comprise first apart from control module B.Wherein, second distance control module 20 is used for controlling this second distance control module 20 and the first distance apart from control module B.First comprises detection sub-module 110, authentication sub module 130 and the second control submodule 140 apart from control module B.Detection sub-module 110 is for detection of second distance control module 20 and the first distance apart from control module B.Authentication sub module 130 be used for detection sub-module 110 be second distance control module 20 apart from testing result with the first distance range of presetting apart from the distance of control module B in the time, further verify the legitimacy of second distance control module 20.Second controls submodule 140 is used for power supply and power down apart from the legitimate verification output control second credible password module 10B of testing result and authentication sub module 130 according to detection sub-module 110.
Wherein, the second structure of controlling submodule 140 can be as shown in Figure 5.Second controls submodule 140 can comprise the second supply control unit 141 and the second power down control module 142.The second supply control unit 141, be used for detection sub-module 110 be the second distance control module apart from testing result with the first distance range of presetting apart from the distance of control module B in and the legitimate verification result of authentication sub module 130 when being legal, make the second credible password module 10B be in power supply state; The second power down control module 142, be used for detection sub-module 110 be the second distance control module apart from testing result with the first distance range of presetting apart from the distance of control module B outside the time, perhaps detection sub-module 110 apart from testing result be second distance control module and first apart from the distance of control module B in default distance range but the legitimate verification result of authentication sub module 130 when being illegal makes the second credible password module 10B be in power-down state.
The credible cryptographic system of the embodiment of the present invention, when needs use credible password module TCM, within the second distance control module is placed on default distance range, this moment, credible password module TCM was in power supply state, can normally access credible password module TCM with the application program on main frame that credible password module TCM is connected; When not needing credible password module TCM, the second distance control module is placed on outside default distance range, this moment, credible password module TCM was in off-position, and the application program on main frame can't be accessed credible password module TCM.Therefore, the credible cryptographic system of the embodiment of the present invention has effectively reduced Malware and has arbitrarily accessed the potential safety hazard that credible password module TCM causes, and has improved the security of credible password module TCM.And, the credible cryptographic system of the embodiment of the present invention, can also carry out authentication to the second distance control module, prevent that illegal second distance control module is by controlling within distance with credible password module TCM enters default distance range, so that credible password module TCM is in power supply state and suffers the attack of Malware, further improved the security of credible password module TCM.
The above is only preferred embodiment of the present invention, and is in order to limit the present invention, within the spirit and principles in the present invention not all, any modification of doing, is equal to replacement, improvement etc., within all should being included in protection scope of the present invention.
Claims (10)
1. a credible password module, is characterized in that, comprises first apart from control module, and described first comprises apart from control module:
Detection sub-module is for detection of second distance control module and the described first distance apart from control module;
First controls submodule, is used for power supply and power down apart from testing result control credible password module according to described detection sub-module.
2. credible password module according to claim 1, is characterized in that, described detection sub-module comprises:
Rf receiver unit is used for receiving the radiofrequency signal that described second distance control module is sent;
Comparing unit, the intensity and the predetermined threshold value that are used for radiofrequency signal that described rf receiver unit is received compare, with judge described second distance control module and described first apart from the distance of control module whether in the distance range of presetting.
3. credible password module according to claim 1, is characterized in that, described first controls submodule comprises:
The first supply control unit, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in the time, make credible password module be in power supply state;
The first power down control module, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module outside the time, make credible password module be in power-down state.
4. a credible password module, is characterized in that, comprises first apart from control module, and described first comprises apart from control module:
Detection sub-module is for detection of second distance control module and the described first distance apart from control module;
Authentication sub module, be used for described detection sub-module be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in the time, further verify the legitimacy of described second distance control module;
Second controls submodule, is used for power supply and power down apart from the legitimate verification output control credible password module of testing result and described authentication sub module according to described detection sub-module.
5. credible password module according to claim 4, is characterized in that, described detection sub-module comprises:
Rf receiver unit is used for receiving the radiofrequency signal that described second distance control module is sent;
Comparing unit, the intensity and the predetermined threshold value that are used for radiofrequency signal that described rf receiver unit is received compare, with judge described second distance control module and described first apart from the distance of control module whether in the distance range of presetting.
6. credible password module according to claim 4, is characterized in that, described second controls submodule comprises:
The second supply control unit, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in and described legitimate verification result when being legal, make credible password module be in power supply state;
The second power down control module, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module outside the time, perhaps described apart from testing result be second distance control module and described first apart from the distance of control module in default distance range but described legitimate verification result when being illegal makes credible password module be in power-down state.
7. a credible cryptographic system, is characterized in that, comprises credible password module and second distance control module, and described credible password module comprises first apart from control module, wherein:
The second distance control module is used for controlling this second distance control module and the described first distance apart from control module;
Described first comprises apart from control module:
Detection sub-module is for detection of described second distance control module and the described first distance apart from control module;
First controls submodule, is used for power supply and power down apart from testing result control credible password module according to described detection sub-module.
8. credible cryptographic system according to claim 7, is characterized in that, described first controls submodule comprises:
The first supply control unit, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in the time, make credible password module be in power supply state;
The first power down control module, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module outside the time, make credible password module be in power-down state.
9. a credible cryptographic system, is characterized in that, comprises credible password module and second distance control module, and described credible password module comprises first apart from control module, wherein:
The second distance control module is used for controlling this second distance control module and the described first distance apart from control module;
Described first comprises apart from control module:
Detection sub-module is for detection of described second distance control module and the described first distance apart from control module;
Authentication sub module, be used for described detection sub-module be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in the time, further verify the legitimacy of described second distance control module;
Second controls submodule, is used for power supply and power down apart from the legitimate verification output control credible password module of testing result and described authentication sub module according to described detection sub-module.
10. credible cryptographic system according to claim 9, is characterized in that, described second controls submodule comprises:
The second supply control unit, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in and described legitimate verification result when being legal, make credible password module be in power supply state;
The second power down control module, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module outside the time, perhaps described apart from testing result be second distance control module and described first apart from the distance of control module in default distance range but described legitimate verification result when being illegal makes credible password module be in power-down state.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110408572XA CN103164655A (en) | 2011-12-09 | 2011-12-09 | Trusted cryptographic module and trusted cryptographic system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110408572XA CN103164655A (en) | 2011-12-09 | 2011-12-09 | Trusted cryptographic module and trusted cryptographic system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103164655A true CN103164655A (en) | 2013-06-19 |
Family
ID=48587733
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110408572XA Pending CN103164655A (en) | 2011-12-09 | 2011-12-09 | Trusted cryptographic module and trusted cryptographic system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103164655A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101227209A (en) * | 2008-01-25 | 2008-07-23 | 宇龙计算机通信科技(深圳)有限公司 | Method and theftproof system of mobile terminal based on blue tooth submachine |
CN101661541A (en) * | 2009-09-11 | 2010-03-03 | 深圳顶海电子有限公司 | Method and system for locking I/O interfaces of computer |
CN102184352A (en) * | 2011-03-16 | 2011-09-14 | 东南大学 | Automatic protecting method for computer system based on Bluetooth device authentication |
US8042027B1 (en) * | 2007-01-16 | 2011-10-18 | Marvell International Ltd. | BM/LLR computation for multi-dimensional TCM/BCM |
-
2011
- 2011-12-09 CN CN201110408572XA patent/CN103164655A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8042027B1 (en) * | 2007-01-16 | 2011-10-18 | Marvell International Ltd. | BM/LLR computation for multi-dimensional TCM/BCM |
CN101227209A (en) * | 2008-01-25 | 2008-07-23 | 宇龙计算机通信科技(深圳)有限公司 | Method and theftproof system of mobile terminal based on blue tooth submachine |
CN101661541A (en) * | 2009-09-11 | 2010-03-03 | 深圳顶海电子有限公司 | Method and system for locking I/O interfaces of computer |
CN102184352A (en) * | 2011-03-16 | 2011-09-14 | 东南大学 | Automatic protecting method for computer system based on Bluetooth device authentication |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10856148B2 (en) | Methods and apparatus for user authentication and human intent verification in mobile devices | |
CN103079200B (en) | The authentication method of a kind of wireless access, system and wireless router | |
US20160125180A1 (en) | Near Field Communication Authentication Mechanism | |
US8954747B2 (en) | Protecting keystrokes received from a keyboard in a platform containing embedded controllers | |
US11222116B2 (en) | Heartbeat signal verification | |
WO2019050741A9 (en) | Environmental condition verification and user authentication in a security coprocessor | |
US11520859B2 (en) | Display of protected content using trusted execution environment | |
CN105812338B (en) | Data access control method and network management equipment | |
CN107357407B (en) | Control method, electronic equipment and storage medium | |
US10572675B2 (en) | Protecting and monitoring internal bus transactions | |
US9536078B2 (en) | Integrated circuit for cyber security processing | |
KR101318668B1 (en) | Portable memory card having information security function | |
CN107317925B (en) | Mobile terminal | |
KR101308152B1 (en) | Registration method for mobile otp device by smart device | |
CN103164655A (en) | Trusted cryptographic module and trusted cryptographic system | |
CN104598838A (en) | File storage and editing method for random check and providing of trusted operating environments | |
KR102078920B1 (en) | Universal second factor authentication method and system based on sealing and remote attestation | |
KR20140112837A (en) | Embedded system, authentication system comprising the same, method of authenticating the system | |
CN102393886A (en) | Safety control method of mobile terminal, device and system | |
CN105550602A (en) | Secure computer motherboard encrypted based on State-Cryptography-Administration algorithm and encryption method | |
KR101775515B1 (en) | Apparatus and method for security check | |
CN114491481B (en) | Safety calculation method and device based on FPGA | |
KR101296402B1 (en) | Registration method for mobile otp device using encrypted seed | |
KR20190131498A (en) | Method and system for network security | |
US20230394897A1 (en) | Access control architecture for detecting secure data copied between devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130619 |
|
RJ01 | Rejection of invention patent application after publication |