CN105005721A - Computer authorization starting control system and method based on computer starting key - Google Patents
Computer authorization starting control system and method based on computer starting key Download PDFInfo
- Publication number
- CN105005721A CN105005721A CN201510358601.4A CN201510358601A CN105005721A CN 105005721 A CN105005721 A CN 105005721A CN 201510358601 A CN201510358601 A CN 201510358601A CN 105005721 A CN105005721 A CN 105005721A
- Authority
- CN
- China
- Prior art keywords
- computing machine
- computer
- control device
- authorization control
- enciphered message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/305—Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Stored Programmes (AREA)
Abstract
The invention discloses a computer authorization starting control system and method based on a computer starting key. The computer authorization starting control system comprises a computer main board; the computer starting key is connected with a computer authorization control apparatus; a computer running state detecting unit interface of the computer authorization control apparatus is connected with a power supply interface and a standby power supply interface of the computer main board; a coding output interface of the computer authorization control apparatus is connected with a decoding interface of the computer main board; the computer authorization control apparatus is used for identifying the computer starting key, reading an enciphered message of the computer starting key, and matching the enciphered message with a pre-stored enciphered message in the computer authorization control apparatus; if the enciphered message is matched with the pre-stored enciphered message in the computer authorization control apparatus successfully, a starting instruction is sent to the computer main board; if the enciphered message is matched with the pre-stored enciphered message in the computer authorization control apparatus unsuccessfully, an unauthorized state is displayed through the computer authorization control apparatus, so that whether a computer is started can be determined by only the computer authorization control apparatus.
Description
Technical field
The present invention relates to a kind of computing machine mandate opening control system based on computer booting key and method.
Background technology
Along with progress and the development in epoch, computing machine becomes the instrument that people become more and more important in daily working and learning, widespread use and all trades and professions, it for we bring convenience while also shown its weak point and even its negative effect, the such as security of its information, data, can not controlling etc. of running time.Although there is a lot of safety practice at present, such as startup password is set, nearly 300 sections of encryption softwares.But these methods all seem very unable, draw a snake and add feet to it even.A slight u dish just can crack, and those fail-safe softwares are just meaningless especially, based on the software of operating system, as long as system is modified just without any effect.
For this problem of computer security, having become an old problem, is also the problem that always cannot thoroughly solve.Various fail-safe software, various startup password.Final in the process of practical application being cracked slowly, be eliminated.Trace it to its cause, because it is based on computing machine itself, based on system or based on bios.Time system and bios have been no longer problems, the so-called safety practice of these so-called encryptions all equals " zero ".
Mainly there is following technological deficiency in prior art:
The first, after computing machine energising work, carry out certification, if authentification failure, computing machine rests on duty or repeatedly restarts and carries out repeating certification, easily causes computing machine service life reduction or hardware damage;
The second, be easily cracked, the bios information after malicious modification is brushed into computing machine by some lawless people again, and namely encryption method lost efficacy, and computing machine loses safeguard protection, easily causes loss of data or is deleted by lawless people, monitoring; As: bios is provided with startup password.Operation system setting user cipher.System has installed multiple encryption software.A password cracking u dish, plug and restart, bios password will be cleared.Encryption software.Startup password.Usb-hdd can be selected by boot disk.Prepare the portable hard drive what a is pre-installed system.Enter the system of u dish.Data just by copy, can be deleted.
3rd, the encryption method based on mainboard bios program is easily distorted by hacker or virus.Virus CIH prevailing for a time is exactly the virus of rewriting bios specially and burning hardware.
Summary of the invention
Object of the present invention is exactly that provide a kind of computing machine mandate opening control system based on computer booting key and method, it has the advantage that with no authorized can not be started shooting in order to solve the problem.
To achieve these goals, the present invention adopts following technical scheme:
Based on the computing machine mandate opening control system of computer booting key, comprising: computer motherboard, computing machine authorization control device and computer booting key, computing machine authorization control device is the peripherals of computing machine, can work alone;
Wherein computer booting key is connected with computing machine authorization control device, the computer operation condition detecting unit interface of described computing machine authorization control device is connected with the power supply interface of computer motherboard and standby power interface, and the coding output interface of described computing machine authorization control device is connected with the decoding interface of computer motherboard;
Described computing machine authorization control device identifies computer booting key, read out the enciphered message of computer booting key, and enciphered message is mated with the enciphered message prestored in computing machine authorization control device, if the match is successful, just send start-up command to computer motherboard, if it fails to match, then by computing machine authorization control device display unauthorized, thus reach on computers before electricity, just can determine whether computing machine starts shooting only by computing machine authorization control device.
Prevent unwarranted user from contacting any information of computing machine, comprise bios information.
The power supply interface of described computer motherboard refers to+12V and GND interface.
The standby power interface of described computer motherboard refers to+5VSB.
Described computing machine authorization control device comprises:
Main control unit, described main control unit is connected with computer starting unit, supply unit, electron key interface, Visitor Logs database, LCDs, coding module, data selector, clock module, input keyboard, sim module, alarm unit, computer operation condition detecting unit respectively, described computer operation condition detecting unit is connected with computer operation condition detecting unit interface, and described coding module is connected with coding output interface.
Described main control unit, single-chip microcomputer or ARM or SOC, the autonomous system of writing, for identifying the enciphered message inside computer booting key, then judges whether enciphered message mates with the enciphered message in Visitor Logs database, output matching result.
Described computer starting unit, for sending enabled instruction to computing machine.Send after being encoded by coding module, then obtain by after decoding module decodes, make computer booting or soft-off.
Described supply unit, for providing standby power supply to main control unit and clock module, described supply unit is accumulator.
Described electron key interface, for being connected with computer booting key.
Described Visitor Logs database, on time of record manager and user, unused time, modification time; Also for storage encryption information and Administrator mode initialisation state.
Described LCDs, for operating right prompting, Administrator shows.In start process, open state is shown in real time.
Described coding module, for carrying out self-defined form coding to start-up command.
Described data selector, for selection and the function selection of authorized person's visit data passage of different rights.Select control model for supvr, such as intranet and extranet set, whether use fingerprint recognition and different rights owner visit data channel selecting.
Described clock module, for proofreading the time of main control unit.
Described input keyboard, inputs information for supvr.
Described sim module, sends random verification code for the form with note to user.
Described alarm unit is audio loudspeaker or hummer;
Described computer operation condition detecting unit, is connected with computer operation condition detecting unit interface.
Described computer operation condition detecting unit interface, for connecting computer operation condition detecting unit and computing machine.
Described coding output interface, for being connected with coding module.
Based on the computing machine mandate start-up control method of computer booting key, comprise the steps:
Step (1): computer booting key is inserted computing machine authorization control device;
Step (2): computing machine authorization control device receives extraneous start-up command;
Step (3): the main control unit of computing machine authorization control device reads computing machine authorization control device and pre-sets information;
Step (4): computing machine authorization control device starts to identify computer booting key, identifies the enciphered message and identity information that prestore inside computer booting key;
Step (5): whether the enciphered message of determining step (4) mates with the enciphered message in Visitor Logs database, if yes then enter step (6), if otherwise the start of computing machine authorization control device refusal, prompting unauthorized;
Step (6): according to the identity information of step (4), judge the authority levels of user, if keeper just enters the data channel of keeper, if keeper needs to arrange computing machine authorization control device, count step (7), if keeper needs to open computing machine, enter step (9); If user just enters subscriber channel, i.e. step (8);
Step (7): keeper is arranged computing machine authorization control device, returns step (3);
Step (8): by sim module with the mobile phone transmission random verification code of the form of note to user, user is to computing machine authorization control device input validation code; Enter step (9);
Step (9): computing machine authorization control device is encrypted start-up command, to the start-up command after computer encipher or after coding; Computing machine is decrypted start-up command or decodes, and obtains start-up command; Computer booting.
The step of described step (5) comprising:
Step (5-1): the head eight digit number word first reading enciphered message, is undertaken head eight digit number word and self-defined eight digit number word or operates;
Step (5-2): by or operation after the first group encryption information of prestoring in the data that obtain and Visitor Logs database compare; If comparison failure, the start of computing machine authorization control device refusal; If comparison success, enters step (5-3);
Step (5-3): after comparison success, 248 remaining bit digital are read, after reading, the second group encryption information prestored in 248 bit digital and Visitor Logs database is compared.
Described step (7) is carried out setting and is comprised: carry out set of time, operating right is arranged, control model is arranged and intranet and extranet are arranged.
Described control model arranges and comprises fingerprint recognition setting, sim module unlatching setting.
Beneficial effect of the present invention:
1 computing machine authorization control device of the present invention is the independently device be totally independent of outside computer body, and computing machine authorization control device judge whether that the work of starting shooting completes before electricity on computers, that is, it is that peripherals computing machine authorization control device by computing machine decides that computer booting is not still started shooting, and can not involve the bios program in computing machine.
2 give computer user one mandate.Grantee can use computing machine according to authority levels operation, then can not open computing machine without authorized person.
3 these operating systems independently detect other system, is not controlled by computing machine itself, departs from completely with computer operating system.
4 can authorize separately, multiple mandate and grading authorized.
5 have a lot of unit to have different operators for a computing machine.Each operator can set different ranks.Hardware is completely independent, does not interfere with each other.
6 intranet and extranet switch, and only need different mandates, reset automatically, cut different systems.The data that shielding is not authorized.These operate complete divorced from computer operating system.
7 these equipment have black box function.Each licensee computed on time can be recorded in 1 year, the unused time, comprise the setting that highest administrator is carried out.Data are stored in storage unit for a reading mode.
Accompanying drawing explanation
Fig. 1 is apparatus structure schematic diagram of the present invention;
Fig. 2 is computing machine authorization control apparatus structure schematic diagram of the present invention;
Fig. 3 is main flow schematic diagram of the present invention;
Fig. 4 is the sub-process figure whether enciphered message mates with enciphered message in database that judges of the present invention.
Embodiment
Below in conjunction with accompanying drawing and embodiment, the invention will be further described.
As shown in Figure 1, based on the computing machine mandate opening control system of computer booting key, comprise: computer motherboard, computing machine authorization control device and computer booting key, wherein computer booting key is connected with computing machine authorization control device, the computer operation condition detecting unit interface of described computing machine authorization control device is connected with+the 12V ,+5VS of computer motherboard and GND interface, and the coding output interface of described computing machine authorization control device is connected with the decoding interface of computer motherboard;
Described computing machine authorization control device identifies computer booting key, read out the enciphered message of computer booting key, and enciphered message is mated with the enciphered message prestored in computing machine authorization control device, if the match is successful, just send start-up command to computer motherboard, if it fails to match, then by computing machine authorization control device display unauthorized, thus be reached through and decide computing machine only by computing machine authorization control device and whether start shooting, prevent unwarranted user from contacting any information of computing machine, comprise bios information.
Institute as shown in Figure 2, state computing machine authorization control device to comprise: main control unit, described main control unit is connected with computer starting unit, supply unit, electron key interface, Visitor Logs database, LCDs, coding module, data selector, clock module, input keyboard, sim module, alarm unit, computer operation condition detecting unit respectively, described computer operation condition detecting unit is connected with computer operation condition detecting unit interface, and described coding module is connected with coding output interface.
Described main control unit, single-chip microcomputer or ARM or SOC, for identifying the enciphered message inside computer booting key, then judge whether enciphered message mates with the enciphered message in Visitor Logs database, output matching result.Described computer starting unit, for sending enabled instruction to computing machine.Described supply unit, for powering to main control unit, described supply unit is accumulator.Described electron key interface, for being connected with computer booting key.Described Visitor Logs database, on time of record manager and user, unused time, modification time; Also for storage encryption information.Described LCDs, in start process, shows in real time to open state.Described coding module, for encoding to start-up command.Described data selector, selects control model for supvr, and such as intranet and extranet set, whether use fingerprint recognition and operator's authority.Described clock module, for proofreading the time of main control unit.Described input keyboard, inputs information for supvr.Described sim module, sends random verification code for the form with note to user.Described alarm unit is loudspeaker or hummer; Described computer operation condition detecting unit, is connected with computer operation condition detecting unit interface.Described computer operation condition detecting unit interface, for connecting computer operation condition detecting unit and computing machine.Described coding output interface, for being connected with coding module.
As shown in Figure 3, based on the computing machine mandate start-up control method of computer booting key, comprise the steps:
Step (1): computer booting key is inserted computing machine authorization control device;
Step (2): computing machine authorization control device receives extraneous start-up command;
Step (3): the main control unit of computing machine authorization control device reads computing machine authorization control device and pre-sets information;
Step (4): computing machine authorization control device starts to identify computer booting key, identifies the enciphered message and identity information that prestore inside computer booting key;
Step (5): whether the enciphered message of determining step (4) mates with the enciphered message in Visitor Logs database, if yes then enter step (6), if otherwise the start of computing machine authorization control device refusal, prompting unauthorized;
Step (6): according to the identity information of step (4), judge the authority levels of user, if keeper just enters the data channel of keeper, if keeper needs to arrange computing machine authorization control device, count step (7), if keeper needs to open computing machine, enter step (9); If user just enters subscriber channel, i.e. step (8);
Step (7): keeper is arranged computing machine authorization control device, returns step (3); Carry out setting to comprise: carry out set of time, operating right is arranged, control model is arranged and intranet and extranet are arranged.
Step (8): by sim module with the mobile phone transmission random verification code of the form of note to user, user is to computing machine authorization control device input validation code; Enter step (9);
Step (9): computing machine authorization control device is encrypted start-up command, to the start-up command after computer encipher or after coding; Computing machine is decrypted start-up command or decodes, and obtains start-up command; Computer booting.
As shown in Figure 4, the step of described step (5) comprising:
Step (5-1): the head eight digit number word first reading enciphered message, is undertaken head eight digit number word and self-defined eight digit number word or operates;
Step (5-2): by or operation after the first group encryption information of prestoring in the data that obtain and Visitor Logs database compare; If comparison failure, the start of computing machine authorization control device refusal; If comparison success, enters step (5-3);
Step (5-3): after comparison success, 248 remaining bit digital are read, after reading, the second group encryption information prestored in 248 bit digital and Visitor Logs database is compared.
By reference to the accompanying drawings the specific embodiment of the present invention is described although above-mentioned; but not limiting the scope of the invention; one of ordinary skill in the art should be understood that; on the basis of technical scheme of the present invention, those skilled in the art do not need to pay various amendment or distortion that creative work can make still within protection scope of the present invention.
Claims (10)
1. based on the computing machine mandate opening control system of computer booting key, comprising: computer motherboard, computing machine authorization control device and computer booting key, computing machine authorization control device is the peripherals of computing machine, can work alone;
Wherein computer booting key is connected with computing machine authorization control device, the computer operation condition detecting unit interface of described computing machine authorization control device is connected with the power supply interface of computer motherboard and standby power interface, and the coding output interface of described computing machine authorization control device is connected with the decoding interface of computer motherboard;
Described computing machine authorization control device identifies computer booting key, read out the enciphered message of computer booting key, and enciphered message is mated with the enciphered message prestored in computing machine authorization control device, if the match is successful, just send start-up command to computer motherboard, if it fails to match, then by computing machine authorization control device display unauthorized, thus reach on computers before electricity, just can determine whether computing machine starts shooting only by computing machine authorization control device.
2., as claimed in claim 1 based on the computing machine mandate opening control system of computer booting key, it is characterized in that, described computing machine authorization control device comprises:
Main control unit, described main control unit is connected with computer starting unit, supply unit, electron key interface, Visitor Logs database, LCDs, coding module, data selector, clock module, input keyboard, sim module, alarm unit, computer operation condition detecting unit respectively, described computer operation condition detecting unit is connected with computer operation condition detecting unit interface, and described coding module is connected with coding output interface.
3. as claimed in claim 2 based on the computing machine mandate opening control system of computer booting key, it is characterized in that, described main control unit, single-chip microcomputer or ARM or SOC, for identifying the enciphered message inside computer booting key, then judge whether enciphered message mates with the enciphered message in Visitor Logs database, output matching result;
Described computer starting unit, for sending enabled instruction to computing machine;
Described supply unit, for powering to main control unit, described supply unit is accumulator;
Described electron key interface, for being connected with computer booting key.
4., as claimed in claim 2 based on the computing machine mandate opening control system of computer booting key, it is characterized in that,
Described Visitor Logs database, on time of record manager and user, unused time, modification time; Also for storage encryption information;
Described LCDs, in start process, shows in real time to open state;
Described coding module, for encoding to start-up command;
Described data selector, selects control model for supvr, comprising: intranet and extranet set, whether use fingerprint recognition and operator's authority.
5., as claimed in claim 2 based on the computing machine mandate opening control system of computer booting key, it is characterized in that,
Described clock module, for proofreading the time of main control unit;
Described input keyboard, inputs information for supvr;
Described sim module, sends random verification code for the form with note to user;
Described alarm unit is loudspeaker or hummer.
6., as claimed in claim 2 based on the computing machine mandate opening control system of computer booting key, it is characterized in that,
Described computer operation condition detecting unit, is connected with computer operation condition detecting unit interface;
Described computer operation condition detecting unit interface, for connecting computer operation condition detecting unit and computing machine;
Described coding output interface, for being connected with coding module.
7., based on the computing machine mandate start-up control method of computer booting key, it is characterized in that, comprise the steps:
Step (1): computer booting key is inserted computing machine authorization control device;
Step (2): computing machine authorization control device receives extraneous start-up command;
Step (3): the main control unit of computing machine authorization control device reads computing machine authorization control device and pre-sets information;
Step (4): computing machine authorization control device starts to identify computer booting key, identifies the enciphered message and identity information that prestore inside computer booting key;
Step (5): whether the enciphered message of determining step (4) mates with the enciphered message in Visitor Logs database, if yes then enter step (6), if otherwise the start of computing machine authorization control device refusal, prompting unauthorized;
Step (6): according to the identity information of step (4), judge the authority levels of user, if keeper just enters the data channel of keeper, if keeper needs to arrange computing machine authorization control device, count step (7), if keeper needs to open computing machine, enter step (9); If user just enters subscriber channel, i.e. step (8);
Step (7): keeper is arranged computing machine authorization control device, returns step (3);
Step (8): by sim module with the mobile phone transmission random verification code of the form of note to user, user is to computing machine authorization control device input validation code; Enter step (9);
Step (9): computing machine authorization control device is encrypted start-up command, to the start-up command after computer encipher or after coding; Computing machine is decrypted start-up command or decodes, and obtains start-up command; Computer booting.
8. method as claimed in claim 7, it is characterized in that, the step of described step (5) comprising:
Step (5-1): the head eight digit number word first reading enciphered message, is undertaken head eight digit number word and self-defined eight digit number word or operates;
Step (5-2): by or operation after the first group encryption information of prestoring in the data that obtain and Visitor Logs database compare; If comparison failure, the start of computing machine authorization control device refusal; If comparison success, enters step (5-3);
Step (5-3): after comparison success, 248 remaining bit digital are read, after reading, the second group encryption information prestored in 248 bit digital and Visitor Logs database is compared.
9. method as claimed in claim 7, it is characterized in that, described step (7) is carried out setting and is comprised: carry out set of time, operating right is arranged, control model is arranged and intranet and extranet are arranged.
10. method as claimed in claim 9, is characterized in that, described control model arranges and comprises fingerprint recognition setting, sim module unlatching setting.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510358601.4A CN105005721B (en) | 2015-06-25 | 2015-06-25 | Computer mandate opening control system and method based on computer booting key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510358601.4A CN105005721B (en) | 2015-06-25 | 2015-06-25 | Computer mandate opening control system and method based on computer booting key |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105005721A true CN105005721A (en) | 2015-10-28 |
CN105005721B CN105005721B (en) | 2018-07-06 |
Family
ID=54378390
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510358601.4A Expired - Fee Related CN105005721B (en) | 2015-06-25 | 2015-06-25 | Computer mandate opening control system and method based on computer booting key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105005721B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108397046A (en) * | 2018-04-23 | 2018-08-14 | 深圳市易联网络技术有限公司 | Intelligent key chain corporate management System and method for |
CN109145565A (en) * | 2018-09-06 | 2019-01-04 | 河北地质大学 | Computer authorization start-up control method based on Internet of Things |
CN110309640A (en) * | 2019-07-01 | 2019-10-08 | 联想(北京)有限公司 | Electronic equipment starting-up method and electronic equipment |
CN110457927A (en) * | 2019-08-13 | 2019-11-15 | 平顶山学院 | A kind of computer hard disk data encrypting method and its device |
TWI728377B (en) * | 2019-06-06 | 2021-05-21 | 旺宏電子股份有限公司 | Secure boot system, method and apparatus |
CN113792281A (en) * | 2021-09-29 | 2021-12-14 | 龙芯中科(南京)技术有限公司 | Electronic device, authentication method, storage medium, and program product |
US11657157B2 (en) | 2019-06-06 | 2023-05-23 | Macronix International Co., Ltd. | Secure boot system, method and apparatus |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1368682A (en) * | 2001-02-05 | 2002-09-11 | 东维成科技股份有限公司 | Method and architecture for security mechanism of computer host |
CN102298679A (en) * | 2011-08-12 | 2011-12-28 | 无锡城市云计算中心有限公司 | BIOS (Basic Input/ Output System) authentication method based on USB (Universal Serial Bus) key |
CN202150119U (en) * | 2010-11-12 | 2012-02-22 | 北京环宇蓝博科技有限公司 | Encryption device for controlling startup of big screen |
CN202502505U (en) * | 2012-03-21 | 2012-10-24 | 董科 | Intelligent time-keeping and timing-service device for computer |
CN104484629A (en) * | 2014-12-03 | 2015-04-01 | 合肥联宝信息技术有限公司 | Computer starting method and device |
-
2015
- 2015-06-25 CN CN201510358601.4A patent/CN105005721B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1368682A (en) * | 2001-02-05 | 2002-09-11 | 东维成科技股份有限公司 | Method and architecture for security mechanism of computer host |
CN202150119U (en) * | 2010-11-12 | 2012-02-22 | 北京环宇蓝博科技有限公司 | Encryption device for controlling startup of big screen |
CN102298679A (en) * | 2011-08-12 | 2011-12-28 | 无锡城市云计算中心有限公司 | BIOS (Basic Input/ Output System) authentication method based on USB (Universal Serial Bus) key |
CN202502505U (en) * | 2012-03-21 | 2012-10-24 | 董科 | Intelligent time-keeping and timing-service device for computer |
CN104484629A (en) * | 2014-12-03 | 2015-04-01 | 合肥联宝信息技术有限公司 | Computer starting method and device |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108397046A (en) * | 2018-04-23 | 2018-08-14 | 深圳市易联网络技术有限公司 | Intelligent key chain corporate management System and method for |
CN108397046B (en) * | 2018-04-23 | 2023-08-29 | 深圳市易联网络技术有限公司 | Intelligent key ring joint management system and method |
CN109145565A (en) * | 2018-09-06 | 2019-01-04 | 河北地质大学 | Computer authorization start-up control method based on Internet of Things |
TWI728377B (en) * | 2019-06-06 | 2021-05-21 | 旺宏電子股份有限公司 | Secure boot system, method and apparatus |
US11657157B2 (en) | 2019-06-06 | 2023-05-23 | Macronix International Co., Ltd. | Secure boot system, method and apparatus |
CN110309640A (en) * | 2019-07-01 | 2019-10-08 | 联想(北京)有限公司 | Electronic equipment starting-up method and electronic equipment |
CN110457927A (en) * | 2019-08-13 | 2019-11-15 | 平顶山学院 | A kind of computer hard disk data encrypting method and its device |
CN113792281A (en) * | 2021-09-29 | 2021-12-14 | 龙芯中科(南京)技术有限公司 | Electronic device, authentication method, storage medium, and program product |
Also Published As
Publication number | Publication date |
---|---|
CN105005721B (en) | 2018-07-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105005721A (en) | Computer authorization starting control system and method based on computer starting key | |
US8510572B2 (en) | Remote access system, gateway, client device, program, and storage medium | |
CN101939754B (en) | Finger sensing apparatus using hybrid matching and associated methods | |
US8332915B2 (en) | Information processing system, information processing apparatus, mobile terminal and access control method | |
CN107563213B (en) | Safety secrecy control device for preventing data extraction of storage equipment | |
JP2008072613A (en) | Management system, management device, and management method | |
CN105184179A (en) | Embedded encrypted mobile storage device and operation method thereof | |
CN105354479A (en) | USB flash disk authentication based solid state disk and data hiding method | |
CN112528257A (en) | Security debugging method and device, electronic equipment and storage medium | |
CN109190389A (en) | A kind of solid state hard disk data guard method based on USB flash disk authentication | |
CN109582238B (en) | Hard disk binding and matching method and system, electronic equipment and storage medium | |
US20060129828A1 (en) | Method which is able to centralize the administration of the user registered information across networks | |
TW201738802A (en) | A removable security device and a method to prevent unauthorized exploitation and control access to files | |
CN109190365A (en) | A kind of solid state hard disk data protection system based on USB flash disk authentication | |
JP2007148762A (en) | External storage device | |
JP2006268513A (en) | Log-on management device for terminal device | |
JP2021150681A (en) | Information processing system, information processing program and information processing method | |
CN106557682A (en) | The authority checking method and device of softdog | |
CN110472423A (en) | A kind of nuclear power station file permission management method, device and equipment | |
JP4698502B2 (en) | Terminal device authentication system, authentication method and program using mobile phone | |
CN109190364A (en) | A kind of safe U disc for solid state hard disk authentication | |
KR101745390B1 (en) | Data leakage prevention apparatus and method thereof | |
KR102248132B1 (en) | Method, apparatus and program of log-in using biometric information | |
CN113360877B (en) | Design method of safe mobile storage medium based on RAM | |
JP2009260688A (en) | Security system and method thereof for remote terminal device in wireless wide-area communication network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180706 Termination date: 20200625 |