CN104408365A - Progress authentication method based on password - Google Patents
Progress authentication method based on password Download PDFInfo
- Publication number
- CN104408365A CN104408365A CN201410780458.3A CN201410780458A CN104408365A CN 104408365 A CN104408365 A CN 104408365A CN 201410780458 A CN201410780458 A CN 201410780458A CN 104408365 A CN104408365 A CN 104408365A
- Authority
- CN
- China
- Prior art keywords
- password
- authentication
- gauge tap
- hmac value
- operation requests
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a progress authentication method based on a password. The method comprises the following steps: setting an authentication password for a progress, calculating the HMAC value of the progress according to the authentication password and storing the HMAC value in extended attributes; presetting a password acquisition control switch in an operating system and configuring password acquisition control switch states; after receiving an operation request of the progress, judging whether to check the password according to the password acquisition control switch, acquiring the authentication password if needing to check the password; calculating the HMAC value of the progress based on the authentication password, comparing the HMAC value obtained by calculation with the HMAC value in the extended attributes of the progress, judging that the password authentication of the progress is successful and continuing the operation request of the progress if the HMAC values are the same, otherwise rejecting the operation request of the progress. The method disclosed by the invention has the advantages of reducing the risk of falsification of the system progress and being high in safety, good in universality and high in extensibility.
Description
Technical field
The present invention relates to computer safety field, be specifically related to a kind of process authentication method based on password.
Background technology
Current, along with deepening continuously of the level of informatization, the computer virus such as virus, wooden horse, worm is day by day serious to the destruction of infosystem, and how guarantee information system is extremely urgent from destruction.Can find by analyzing, nearly all computer virus all causes because user has a mind to or be not intended to perform rogue program.Rogue program disguises oneself as normal procedure or be tied in normal program usually, brings out user and performs the rogue program that was tampered to reach demolition purpose.Therefore install and have the software of potential safety hazard very easily to damage the security of infosystem with running, gently then destroy the stability of system, the normal operation of influential system, heavy then cause the security incidents such as information leakage.Therefore, in control information system, the execution of process is with most important to the protection of process.
The authentication techniques mainly used at present have:
1) certificate verification: whether legally distinguish process by the presence or absence of certificate and correctness, this can control the execution of process to a certain extent, reaches the object of protection system safety, but effectively can not protect process.Such as, when certificate is correct, the executive routine malice of process is distorted, the safety of system can be threatened.
2) signature authentication: only can ensure whether process source is legal, but effectively can not protect process, there is the risk be tampered, and then the security of influential system.
When identical platform multi-user, certain user needs to protect for certain process, does not allow other users to perform this protected process simultaneously, gets up by process and user-association.Current authentication techniques can reach this requirement, but underaction, transplantability are bad.As certificate verification, during certificate associated user, this effect can be reached, but underaction, and when the multiple certificate of process context, the execution principle of single user to process will be run counter to.
Summary of the invention
The technical problem to be solved in the present invention be easily controlled by virus/wooden horse etc. for system process in the unshielded situation of existing operating system process and distort, system process performs and is tampered the shortcoming that risk is high, security of system is low, provide a kind of and can reduce the risk that system process is tampered, the process authentication method based on password that security is high, versatility good, extendability is strong.
In order to solve the problems of the technologies described above, the technical solution used in the present invention is:
Based on a process authentication method for password, implementation step is as follows:
1) for process arranges authentication password, be stored in the extended attribute of process according to the HMAC value of described authentication password calculation procedure; Password is set in advance in an operating system and obtains gauge tap, and configure password obtain gauge tap state according to arranging of the start-up parameter of operating system or superuser; After receiving the operation requests of process, redirect performs next step;
2) obtain gauge tap according to password to judge whether to need to carry out password authentification, authentication password is obtained when needs carry out password authentification, based on the HMAC value of authentication password calculation procedure, HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge the success of this process cipher authentication and continue the operation requests of process, otherwise the operation requests of refusal process.
Preferably, described step 2) detailed implementation step as follows:
2.1) arrange password in advance in an operating system obtain gauge tap and force gauge tap, and the state configuring password and obtain gauge tap and force gauge tap is set according to the start-up parameter of operating system or superuser, initialization is 0 for recording the counter of the number of times successfully passing certification; After receiving the operation requests of process, detect the state of forcing gauge tap, if force gauge tap to be opened, then redirect performs step 2.6); If force gauge tap to be closed, then redirect performs step 2.2);
2.2) detect the state that password obtains gauge tap, close if password obtains gauge tap, then redirect performs step 2.3), open if password obtains gauge tap, then redirect performs step 2.4);
2.3) obtain authentication password, based on the HMAC value of authentication password calculation procedure, the HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge this process cipher authentication success, continue the operation requests of process; Otherwise judge this process cipher authentication failure, the operation requests of refusal process; Certification terminates and exits;
2.4) read the number of times successfully passing certification in described counter, if the number of times successfully passing certification is 0, then redirect performs step 2.5), if the number of times successfully passing certification is more than or equal to 1, then redirect performs step 2.6);
2.5) authentication password is obtained, based on the HMAC value of authentication password calculation procedure, the HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge this process cipher authentication success, otherwise judge this process cipher authentication failure; The operation requests proceeding process is determined whether according to result of determination, if the success of process cipher authentication, create temporary file corresponding to process and by authentication password cryptographic storage in temporary file corresponding to process, the counter being used for recording the number of times successfully passing certification put 1 and continues the operation requests of process; If the failure of process cipher authentication, refuses the operation requests of process; Certification terminates and exits;
2.6) authentication password after reading encryption from temporary file corresponding to process is also decrypted, then based on the HMAC value of deciphering the authentication password calculation procedure obtained, HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge this process cipher authentication success, otherwise judge this process cipher authentication failure; Determine whether according to result of determination the operation requests proceeding process, if the success of process cipher authentication, the counter being used for recording the number of times successfully passing certification is added 1 and continues the operation requests of process; If the failure of process cipher authentication, refuses the operation requests of process; Certification terminates and exits;
2.7) determinating processes operation requests does not need to carry out cipher authentication, directly carries out process operation and exits.
Preferably, specifically refer to direct input authentication password for process arranges authentication password in described step 1), read authentication password from memory device, obtain the one authentication password from credible chip.
Preferably, described step 2.3) in obtain that authentication password specifically refers to direct input authentication password, reads authentication password from memory device, the one obtained from credible chip authentication password.
The process authentication method that the present invention is based on password has following advantage:
1, the present invention is by arranging authentication password for process, be stored in the extended attribute of process according to the HMAC value of authentication password calculation procedure, after receiving the operation requests of process, authentication password is obtained when needs carry out password authentification, based on the HMAC value of authentication password calculation procedure, by the HMAC value calculated, HMAC value in the extended attribute of process compares, if both are identical, then judge the success of this process cipher authentication and continue the operation requests of process, otherwise the operation requests of refusal process, process can be controlled not by illegal execution by authentication password and extended attribute, can prevent the process after being tampered from continuing to perform simultaneously, reach the object that process is protected.Reduce system process by this authentication method perform and be tampered equivalent risk, add the security of system.
2, the present invention is by arranging authentication password for process, be stored in the extended attribute of process according to the HMAC value of authentication password calculation procedure, adopt the HMAC value of extended attribute space storage process, as long as therefore process extended attribute supported by goal systems platform, just can use the process authentication method that the present invention is based on password, so kylin operating system and Linux system can be supported, equally also can support that other supports the operating system of process extended attribute, can the diversity of supporting platform, there is the advantage that versatility is good, extendability is strong.
3, the present invention arranges password in advance in an operating system and obtains gauge tap, and configure password obtain gauge tap state according to arranging of the start-up parameter of operating system or superuser, after receiving the operation requests of process, obtain gauge tap according to password to judge whether to need to carry out password authentification, thus can control the need of carrying out password authentification easily, during process operation request, need first to detect the state of gauge tap, determine whether carry out cipher authentication again, manually input password carry out certification the need of reading password or user from peripheral hardware, thus the carrying out that can effectively prevent some from frequently allowing needs frequently to obtain the problem of authentication password, thus make enforcement more convenient.
Accompanying drawing explanation
Fig. 1 is the implementing procedure schematic diagram of the embodiment of the present invention.
Fig. 2 is embodiment of the present invention step 2) detailed implementing procedure schematic diagram.
Embodiment
As shown in Figure 1, the present embodiment is as follows based on the implementation step of the process authentication method of password:
1) for process arranges authentication password, be stored in the extended attribute of process according to the HMAC value of authentication password calculation procedure; Password is set in advance in an operating system and obtains gauge tap, and configure password obtain gauge tap state according to arranging of the start-up parameter of operating system or superuser; After receiving the operation requests of process, redirect performs next step;
2) obtain gauge tap according to password to judge whether to need to carry out password authentification, authentication password is obtained when needs carry out password authentification, based on the HMAC value of authentication password calculation procedure, HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge the success of this process cipher authentication and continue the operation requests of process, otherwise the operation requests of refusal process.
By arranging authentication password for process in the present embodiment, be stored in the extended attribute of process according to the HMAC value of authentication password calculation procedure, after receiving the operation requests of process, authentication password is obtained when needs carry out password authentification, based on the HMAC value of authentication password calculation procedure, by the HMAC value calculated, HMAC value in the extended attribute of process compares, if both are identical, then judge the success of this process cipher authentication and continue the operation requests of process, otherwise the operation requests of refusal process, process can be controlled not by illegal execution by authentication password and extended attribute, when certain user in identical platform does not allow other users perform and revise certain process, the present embodiment can be utilized to be that this process arranges cipher authentication, reach the object of protection.
Specifically can select direct input authentication password as required for process arranges authentication password in step 1), read authentication password from memory device (USB flash disk, UKey, disk, CD etc.), obtain the one authentication password from credible chip (such as TPM chip etc.).In the present embodiment, specifically read authentication password from UKey for process arranges authentication password.The safety label of the file extent property store process that the present embodiment utilizes operating system to support, the operating system environment of the present embodiment is the kylin operating system that School of Computer Science of the National University of Defense technology develops, kylin operating system can support the mark that process extended attribute is classified, the HMAC value of calculation procedure specifically refers to and adopts SHA1 cryptographic algorithm to calculate SHA1 value, HMAC value is stored into and specifically refers in the extended attribute of process in the extended attribute space security.auth of the process of being stored into.In addition, the present embodiment equally also can support that other supports the operating system of process extended attribute, and the diversity of supporting platform, has the advantage that versatility is good, extendability is strong.
As shown in Figure 2, step 2) detailed implementation step as follows:
2.1) arrange password in advance in an operating system obtain gauge tap and force gauge tap, and the state configuring password and obtain gauge tap and force gauge tap is set according to the start-up parameter (grub parameter) of operating system or superuser, initialization is 0 for recording the counter of the number of times successfully passing certification; After receiving the operation requests of process, detect the state of forcing gauge tap, if force gauge tap to be opened, then redirect performs step 2.6); If force gauge tap to be closed, then redirect performs step 2.2);
2.2) detect the state that password obtains gauge tap, close if password obtains gauge tap, then redirect performs step 2.3), open if password obtains gauge tap, then redirect performs step 2.4);
2.3) obtain authentication password, based on the HMAC value of authentication password calculation procedure, the HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge this process cipher authentication success, continue the operation requests of process; Otherwise judge this process cipher authentication failure, the operation requests of refusal process; Certification terminates and exits;
2.4) read the number of times successfully passing certification in described counter, if the number of times successfully passing certification is 0, then redirect performs step 2.5), if the number of times successfully passing certification is more than or equal to 1, then redirect performs step 2.6);
2.5) authentication password is obtained, based on the HMAC value of authentication password calculation procedure, the HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge this process cipher authentication success, otherwise judge this process cipher authentication failure; The operation requests proceeding process is determined whether according to result of determination, if the success of process cipher authentication, create temporary file corresponding to process and by authentication password cryptographic storage in temporary file corresponding to process, the counter being used for recording the number of times successfully passing certification put 1 and continues the operation requests of process; If the failure of process cipher authentication, refuses the operation requests of process; Certification terminates and exits;
2.6) authentication password after reading encryption from temporary file corresponding to process is also decrypted, then based on the HMAC value of deciphering the authentication password calculation procedure obtained, HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge this process cipher authentication success, otherwise judge this process cipher authentication failure; Determine whether according to result of determination the operation requests proceeding process, if the success of process cipher authentication, the counter being used for recording the number of times successfully passing certification is added 1 and continues the operation requests of process; If the failure of process cipher authentication, refuses the operation requests of process; Certification terminates and exits;
2.7) determinating processes operation requests does not need to carry out cipher authentication, directly carries out process operation and exits.
What needs were said is, password obtains gauge tap and closes corresponding step 2.3), the number of times of process success identity be 0 step 2.5 corresponding to situation) be first all input password for user to carry out certification, therefore in order to be " input password carries out certification " same picture frame by its co expression in schematic drawing 2.But, both are different about the process after certification, if the success of process cipher authentication, the number of times of process success identity is the step 2.5 corresponding to situation of 0) also comprise temporary file corresponding to establishment process and by authentication password cryptographic storage in temporary file corresponding to process, the counter being used for recording the number of times successfully passing certification is put the step of 1, thus guarantees follow-up step 2.6) can carry out smoothly.
In the present embodiment, step 2.3) in obtain authentication password and specifically can select direct input authentication password as required, read authentication password from memory device (USB flash disk, UKey, disk, CD etc.), obtain the one authentication password from credible chip (such as TPM chip etc.).In the present embodiment, specifically read authentication password from UKey for process arranges authentication password.
Whether the control in order to realize password authentification in the present embodiment is provided with password and obtains gauge tap and force gauge tap: all need input password to carry out cipher authentication when (1) password obtains gauge tap for controlling each process operation request, when password obtains gauge tap unlatching, input password is needed to carry out cipher authentication after system starts during first time process operation request, password encryption is stored in temporary file corresponding to process simultaneously, below this process again operation requests time carry out cipher authentication with regard to not needing additionally to input password, but directly obtaining password from temporary file carries out cipher authentication, when password obtains gauge tap closedown, each operation requests of process all needs input password to carry out cipher authentication.This switch is defaulted as cut out after system starts at every turn.(2) gauge tap is forced whether to carry out cipher authentication for controlling process operation request.When forcing gauge tap to be opened, do not carry out cipher authentication during process operation request, directly carry out process operation; When forcing gauge tap to be closed, need during process operation request to carry out cipher authentication, could determine whether carry out process operation afterwards.This switch is defaulted as cut out after system starts at every turn.Password is obtained gauge tap and forces gauge tap directly can be arranged in kernel by grub parameter, also can be arranged by superuser after the system of entering, thus under the prerequisite ensureing system cloud gray model security, obtain gauge tap by password and force arranging of gauge tap can run process faster.In the present embodiment, step 2.4) in be the counter values being recorded this process number of times of success identity by the temporary file that process is corresponding.After system starts, during process certification, judge whether this process is first time carry out cipher authentication by judging whether corresponding temporary file exists, represent that when this temporary file does not exist process carries out cipher authentication at first time, and create temporary file, if authentication success, the number of times of success identity is added 1, password encryption is stored in temporary file simultaneously, if certification is unsuccessful, success identity number of times is set to 0; During system closing, temporary file is deleted.
The above is only the preferred embodiment of the present invention, protection scope of the present invention be not only confined to above-described embodiment, and all technical schemes belonged under thinking of the present invention all belong to protection scope of the present invention.It should be pointed out that for those skilled in the art, some improvements and modifications without departing from the principles of the present invention, these improvements and modifications also should be considered as protection scope of the present invention.
Claims (4)
1., based on a process authentication method for password, it is characterized in that implementation step is as follows:
1) for process arranges authentication password, be stored in the extended attribute of process according to the HMAC value of described authentication password calculation procedure; Password is set in advance in an operating system and obtains gauge tap, and configure password obtain gauge tap state according to arranging of the start-up parameter of operating system or superuser; After receiving the operation requests of process, redirect performs next step;
2) obtain gauge tap according to password to judge whether to need to carry out password authentification, authentication password is obtained when needs carry out password authentification, based on the HMAC value of authentication password calculation procedure, HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge the success of this process cipher authentication and continue the operation requests of process, otherwise the operation requests of refusal process.
2. the process authentication method based on password according to claim 1, is characterized in that, described step 2) detailed implementation step as follows:
2.1) arrange password in advance in an operating system obtain gauge tap and force gauge tap, and the state configuring password and obtain gauge tap and force gauge tap is set according to the start-up parameter of operating system or superuser, initialization is 0 for recording the counter of the number of times successfully passing certification; After receiving the operation requests of process, detect the state of forcing gauge tap, if force gauge tap to be opened, then redirect performs step 2.6); If force gauge tap to be closed, then redirect performs step 2.2);
2.2) detect the state that password obtains gauge tap, close if password obtains gauge tap, then redirect performs step 2.3), open if password obtains gauge tap, then redirect performs step 2.4);
2.3) obtain authentication password, based on the HMAC value of authentication password calculation procedure, the HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge this process cipher authentication success, continue the operation requests of process; Otherwise judge this process cipher authentication failure, the operation requests of refusal process; Certification terminates and exits;
2.4) read the number of times successfully passing certification in described counter, if the number of times successfully passing certification is 0, then redirect performs step 2.5), if the number of times successfully passing certification is more than or equal to 1, then redirect performs step 2.6);
2.5) authentication password is obtained, based on the HMAC value of authentication password calculation procedure, the HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge this process cipher authentication success, otherwise judge this process cipher authentication failure; The operation requests proceeding process is determined whether according to result of determination, if the success of process cipher authentication, create temporary file corresponding to process and by authentication password cryptographic storage in temporary file corresponding to process, the counter being used for recording the number of times successfully passing certification put 1 and continues the operation requests of process; If the failure of process cipher authentication, refuses the operation requests of process; Certification terminates and exits;
2.6) authentication password after reading encryption from temporary file corresponding to process is also decrypted, then based on the HMAC value of deciphering the authentication password calculation procedure obtained, HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge this process cipher authentication success, otherwise judge this process cipher authentication failure; Determine whether according to result of determination the operation requests proceeding process, if the success of process cipher authentication, the counter being used for recording the number of times successfully passing certification is added 1 and continues the operation requests of process; If the failure of process cipher authentication, refuses the operation requests of process; Certification terminates and exits;
2.7) determinating processes operation requests does not need to carry out cipher authentication, directly carries out process operation and exits.
3. the process authentication method based on password according to claim 2, is characterized in that: specifically refer to direct input authentication password for process arranges authentication password in described step 1), read authentication password from memory device, obtain the one authentication password from credible chip.
4. the process authentication method based on password according to claim 3, is characterized in that: described step 2.3) in obtain that authentication password specifically refers to direct input authentication password, reads authentication password from memory device, the one obtained from credible chip authentication password.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410780458.3A CN104408365B (en) | 2014-12-17 | 2014-12-17 | Progress authentication method based on password |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410780458.3A CN104408365B (en) | 2014-12-17 | 2014-12-17 | Progress authentication method based on password |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104408365A true CN104408365A (en) | 2015-03-11 |
CN104408365B CN104408365B (en) | 2017-05-24 |
Family
ID=52645996
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410780458.3A Active CN104408365B (en) | 2014-12-17 | 2014-12-17 | Progress authentication method based on password |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104408365B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106933556A (en) * | 2015-12-29 | 2017-07-07 | 珠海市君天电子科技有限公司 | Method and device for opening driver |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101599112A (en) * | 2009-04-09 | 2009-12-09 | 广州市芯德电子技术有限公司 | A kind of method of protecting encryption software |
CN103078878A (en) * | 2013-02-06 | 2013-05-01 | 浪潮电子信息产业股份有限公司 | Firewall-based protecting method for key progress of virtual machine |
CN103220289A (en) * | 2013-04-15 | 2013-07-24 | 北京京东尚科信息技术有限公司 | Resource verification system and resource verification method based on web application |
CN103617128A (en) * | 2013-12-11 | 2014-03-05 | 长城信息产业股份有限公司 | Embedded system and implementation method of secure operating system |
CN103617388A (en) * | 2013-12-11 | 2014-03-05 | 长城信息产业股份有限公司 | Implementation method for secure operating system with process credibility authentication |
-
2014
- 2014-12-17 CN CN201410780458.3A patent/CN104408365B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101599112A (en) * | 2009-04-09 | 2009-12-09 | 广州市芯德电子技术有限公司 | A kind of method of protecting encryption software |
CN103078878A (en) * | 2013-02-06 | 2013-05-01 | 浪潮电子信息产业股份有限公司 | Firewall-based protecting method for key progress of virtual machine |
CN103220289A (en) * | 2013-04-15 | 2013-07-24 | 北京京东尚科信息技术有限公司 | Resource verification system and resource verification method based on web application |
CN103617128A (en) * | 2013-12-11 | 2014-03-05 | 长城信息产业股份有限公司 | Embedded system and implementation method of secure operating system |
CN103617388A (en) * | 2013-12-11 | 2014-03-05 | 长城信息产业股份有限公司 | Implementation method for secure operating system with process credibility authentication |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106933556A (en) * | 2015-12-29 | 2017-07-07 | 珠海市君天电子科技有限公司 | Method and device for opening driver |
Also Published As
Publication number | Publication date |
---|---|
CN104408365B (en) | 2017-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3779745B1 (en) | Code pointer authentication for hardware flow control | |
CN111723383B (en) | Data storage and verification method and device | |
US20190363894A1 (en) | Method and system for protecting computing devices from malwares | |
US20180101678A1 (en) | Method and System for Countering Ransomware | |
US11601281B2 (en) | Managing user profiles securely in a user environment | |
CN103793334A (en) | Mobile storage device based data protecting method and mobile storage device | |
CN105683990A (en) | Method and apparatus for protecting dynamic libraries | |
Götzfried et al. | Analysing Android's Full Disk Encryption Feature. | |
CN107563192B (en) | Lesso software protection method and device, electronic equipment and storage medium | |
EP2835997B1 (en) | Cell phone data encryption method and decryption method | |
CA2842741C (en) | Password audit system | |
Müller et al. | A systematic assessment of the security of full disk encryption | |
WO2017107896A1 (en) | Document protection method and device | |
RU2015101734A (en) | PROTECTED ACCESS METHOD AND APPLIED PROTECTED ACCESS DEVICE | |
US20170201528A1 (en) | Method for providing trusted service based on secure area and apparatus using the same | |
CN105930728B (en) | A kind of application checking method and device | |
CN106603230B (en) | A kind of DRM key saves, read method and preservation, reads system | |
US20140289537A1 (en) | Encryption system and method of encrypting a device | |
US20170262640A1 (en) | Database operation method and device | |
CN104408365A (en) | Progress authentication method based on password | |
CN111259405A (en) | Computer safety coefficient based on artificial intelligence | |
CN111814137B (en) | Operation and maintenance method, operation and maintenance system and storage medium of terminal | |
CN110633585B (en) | Hard disk locking and unlocking method, device, equipment and readable storage medium | |
CN113127141B (en) | Container system management method and device, terminal equipment and storage medium | |
CN115048662A (en) | File protection method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |