CN105005721A - Computer authorization starting control system and method based on computer starting key - Google Patents

Computer authorization starting control system and method based on computer starting key Download PDF

Info

Publication number
CN105005721A
CN105005721A CN201510358601.4A CN201510358601A CN105005721A CN 105005721 A CN105005721 A CN 105005721A CN 201510358601 A CN201510358601 A CN 201510358601A CN 105005721 A CN105005721 A CN 105005721A
Authority
CN
China
Prior art keywords
computing machine
computer
control device
authorization control
enciphered message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510358601.4A
Other languages
Chinese (zh)
Other versions
CN105005721B (en
Inventor
董科
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201510358601.4A priority Critical patent/CN105005721B/en
Publication of CN105005721A publication Critical patent/CN105005721A/en
Application granted granted Critical
Publication of CN105005721B publication Critical patent/CN105005721B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a computer authorization starting control system and method based on a computer starting key. The computer authorization starting control system comprises a computer main board; the computer starting key is connected with a computer authorization control apparatus; a computer running state detecting unit interface of the computer authorization control apparatus is connected with a power supply interface and a standby power supply interface of the computer main board; a coding output interface of the computer authorization control apparatus is connected with a decoding interface of the computer main board; the computer authorization control apparatus is used for identifying the computer starting key, reading an enciphered message of the computer starting key, and matching the enciphered message with a pre-stored enciphered message in the computer authorization control apparatus; if the enciphered message is matched with the pre-stored enciphered message in the computer authorization control apparatus successfully, a starting instruction is sent to the computer main board; if the enciphered message is matched with the pre-stored enciphered message in the computer authorization control apparatus unsuccessfully, an unauthorized state is displayed through the computer authorization control apparatus, so that whether a computer is started can be determined by only the computer authorization control apparatus.

Description

Based on computing machine mandate opening control system and the method for computer booting key
Technical field
The present invention relates to a kind of computing machine mandate opening control system based on computer booting key and method.
Background technology
Along with progress and the development in epoch, computing machine becomes the instrument that people become more and more important in daily working and learning, widespread use and all trades and professions, it for we bring convenience while also shown its weak point and even its negative effect, the such as security of its information, data, can not controlling etc. of running time.Although there is a lot of safety practice at present, such as startup password is set, nearly 300 sections of encryption softwares.But these methods all seem very unable, draw a snake and add feet to it even.A slight u dish just can crack, and those fail-safe softwares are just meaningless especially, based on the software of operating system, as long as system is modified just without any effect.
For this problem of computer security, having become an old problem, is also the problem that always cannot thoroughly solve.Various fail-safe software, various startup password.Final in the process of practical application being cracked slowly, be eliminated.Trace it to its cause, because it is based on computing machine itself, based on system or based on bios.Time system and bios have been no longer problems, the so-called safety practice of these so-called encryptions all equals " zero ".
Mainly there is following technological deficiency in prior art:
The first, after computing machine energising work, carry out certification, if authentification failure, computing machine rests on duty or repeatedly restarts and carries out repeating certification, easily causes computing machine service life reduction or hardware damage;
The second, be easily cracked, the bios information after malicious modification is brushed into computing machine by some lawless people again, and namely encryption method lost efficacy, and computing machine loses safeguard protection, easily causes loss of data or is deleted by lawless people, monitoring; As: bios is provided with startup password.Operation system setting user cipher.System has installed multiple encryption software.A password cracking u dish, plug and restart, bios password will be cleared.Encryption software.Startup password.Usb-hdd can be selected by boot disk.Prepare the portable hard drive what a is pre-installed system.Enter the system of u dish.Data just by copy, can be deleted.
3rd, the encryption method based on mainboard bios program is easily distorted by hacker or virus.Virus CIH prevailing for a time is exactly the virus of rewriting bios specially and burning hardware.
Summary of the invention
Object of the present invention is exactly that provide a kind of computing machine mandate opening control system based on computer booting key and method, it has the advantage that with no authorized can not be started shooting in order to solve the problem.
To achieve these goals, the present invention adopts following technical scheme:
Based on the computing machine mandate opening control system of computer booting key, comprising: computer motherboard, computing machine authorization control device and computer booting key, computing machine authorization control device is the peripherals of computing machine, can work alone;
Wherein computer booting key is connected with computing machine authorization control device, the computer operation condition detecting unit interface of described computing machine authorization control device is connected with the power supply interface of computer motherboard and standby power interface, and the coding output interface of described computing machine authorization control device is connected with the decoding interface of computer motherboard;
Described computing machine authorization control device identifies computer booting key, read out the enciphered message of computer booting key, and enciphered message is mated with the enciphered message prestored in computing machine authorization control device, if the match is successful, just send start-up command to computer motherboard, if it fails to match, then by computing machine authorization control device display unauthorized, thus reach on computers before electricity, just can determine whether computing machine starts shooting only by computing machine authorization control device.
Prevent unwarranted user from contacting any information of computing machine, comprise bios information.
The power supply interface of described computer motherboard refers to+12V and GND interface.
The standby power interface of described computer motherboard refers to+5VSB.
Described computing machine authorization control device comprises:
Main control unit, described main control unit is connected with computer starting unit, supply unit, electron key interface, Visitor Logs database, LCDs, coding module, data selector, clock module, input keyboard, sim module, alarm unit, computer operation condition detecting unit respectively, described computer operation condition detecting unit is connected with computer operation condition detecting unit interface, and described coding module is connected with coding output interface.
Described main control unit, single-chip microcomputer or ARM or SOC, the autonomous system of writing, for identifying the enciphered message inside computer booting key, then judges whether enciphered message mates with the enciphered message in Visitor Logs database, output matching result.
Described computer starting unit, for sending enabled instruction to computing machine.Send after being encoded by coding module, then obtain by after decoding module decodes, make computer booting or soft-off.
Described supply unit, for providing standby power supply to main control unit and clock module, described supply unit is accumulator.
Described electron key interface, for being connected with computer booting key.
Described Visitor Logs database, on time of record manager and user, unused time, modification time; Also for storage encryption information and Administrator mode initialisation state.
Described LCDs, for operating right prompting, Administrator shows.In start process, open state is shown in real time.
Described coding module, for carrying out self-defined form coding to start-up command.
Described data selector, for selection and the function selection of authorized person's visit data passage of different rights.Select control model for supvr, such as intranet and extranet set, whether use fingerprint recognition and different rights owner visit data channel selecting.
Described clock module, for proofreading the time of main control unit.
Described input keyboard, inputs information for supvr.
Described sim module, sends random verification code for the form with note to user.
Described alarm unit is audio loudspeaker or hummer;
Described computer operation condition detecting unit, is connected with computer operation condition detecting unit interface.
Described computer operation condition detecting unit interface, for connecting computer operation condition detecting unit and computing machine.
Described coding output interface, for being connected with coding module.
Based on the computing machine mandate start-up control method of computer booting key, comprise the steps:
Step (1): computer booting key is inserted computing machine authorization control device;
Step (2): computing machine authorization control device receives extraneous start-up command;
Step (3): the main control unit of computing machine authorization control device reads computing machine authorization control device and pre-sets information;
Step (4): computing machine authorization control device starts to identify computer booting key, identifies the enciphered message and identity information that prestore inside computer booting key;
Step (5): whether the enciphered message of determining step (4) mates with the enciphered message in Visitor Logs database, if yes then enter step (6), if otherwise the start of computing machine authorization control device refusal, prompting unauthorized;
Step (6): according to the identity information of step (4), judge the authority levels of user, if keeper just enters the data channel of keeper, if keeper needs to arrange computing machine authorization control device, count step (7), if keeper needs to open computing machine, enter step (9); If user just enters subscriber channel, i.e. step (8);
Step (7): keeper is arranged computing machine authorization control device, returns step (3);
Step (8): by sim module with the mobile phone transmission random verification code of the form of note to user, user is to computing machine authorization control device input validation code; Enter step (9);
Step (9): computing machine authorization control device is encrypted start-up command, to the start-up command after computer encipher or after coding; Computing machine is decrypted start-up command or decodes, and obtains start-up command; Computer booting.
The step of described step (5) comprising:
Step (5-1): the head eight digit number word first reading enciphered message, is undertaken head eight digit number word and self-defined eight digit number word or operates;
Step (5-2): by or operation after the first group encryption information of prestoring in the data that obtain and Visitor Logs database compare; If comparison failure, the start of computing machine authorization control device refusal; If comparison success, enters step (5-3);
Step (5-3): after comparison success, 248 remaining bit digital are read, after reading, the second group encryption information prestored in 248 bit digital and Visitor Logs database is compared.
Described step (7) is carried out setting and is comprised: carry out set of time, operating right is arranged, control model is arranged and intranet and extranet are arranged.
Described control model arranges and comprises fingerprint recognition setting, sim module unlatching setting.
Beneficial effect of the present invention:
1 computing machine authorization control device of the present invention is the independently device be totally independent of outside computer body, and computing machine authorization control device judge whether that the work of starting shooting completes before electricity on computers, that is, it is that peripherals computing machine authorization control device by computing machine decides that computer booting is not still started shooting, and can not involve the bios program in computing machine.
2 give computer user one mandate.Grantee can use computing machine according to authority levels operation, then can not open computing machine without authorized person.
3 these operating systems independently detect other system, is not controlled by computing machine itself, departs from completely with computer operating system.
4 can authorize separately, multiple mandate and grading authorized.
5 have a lot of unit to have different operators for a computing machine.Each operator can set different ranks.Hardware is completely independent, does not interfere with each other.
6 intranet and extranet switch, and only need different mandates, reset automatically, cut different systems.The data that shielding is not authorized.These operate complete divorced from computer operating system.
7 these equipment have black box function.Each licensee computed on time can be recorded in 1 year, the unused time, comprise the setting that highest administrator is carried out.Data are stored in storage unit for a reading mode.
Accompanying drawing explanation
Fig. 1 is apparatus structure schematic diagram of the present invention;
Fig. 2 is computing machine authorization control apparatus structure schematic diagram of the present invention;
Fig. 3 is main flow schematic diagram of the present invention;
Fig. 4 is the sub-process figure whether enciphered message mates with enciphered message in database that judges of the present invention.
Embodiment
Below in conjunction with accompanying drawing and embodiment, the invention will be further described.
As shown in Figure 1, based on the computing machine mandate opening control system of computer booting key, comprise: computer motherboard, computing machine authorization control device and computer booting key, wherein computer booting key is connected with computing machine authorization control device, the computer operation condition detecting unit interface of described computing machine authorization control device is connected with+the 12V ,+5VS of computer motherboard and GND interface, and the coding output interface of described computing machine authorization control device is connected with the decoding interface of computer motherboard;
Described computing machine authorization control device identifies computer booting key, read out the enciphered message of computer booting key, and enciphered message is mated with the enciphered message prestored in computing machine authorization control device, if the match is successful, just send start-up command to computer motherboard, if it fails to match, then by computing machine authorization control device display unauthorized, thus be reached through and decide computing machine only by computing machine authorization control device and whether start shooting, prevent unwarranted user from contacting any information of computing machine, comprise bios information.
Institute as shown in Figure 2, state computing machine authorization control device to comprise: main control unit, described main control unit is connected with computer starting unit, supply unit, electron key interface, Visitor Logs database, LCDs, coding module, data selector, clock module, input keyboard, sim module, alarm unit, computer operation condition detecting unit respectively, described computer operation condition detecting unit is connected with computer operation condition detecting unit interface, and described coding module is connected with coding output interface.
Described main control unit, single-chip microcomputer or ARM or SOC, for identifying the enciphered message inside computer booting key, then judge whether enciphered message mates with the enciphered message in Visitor Logs database, output matching result.Described computer starting unit, for sending enabled instruction to computing machine.Described supply unit, for powering to main control unit, described supply unit is accumulator.Described electron key interface, for being connected with computer booting key.Described Visitor Logs database, on time of record manager and user, unused time, modification time; Also for storage encryption information.Described LCDs, in start process, shows in real time to open state.Described coding module, for encoding to start-up command.Described data selector, selects control model for supvr, and such as intranet and extranet set, whether use fingerprint recognition and operator's authority.Described clock module, for proofreading the time of main control unit.Described input keyboard, inputs information for supvr.Described sim module, sends random verification code for the form with note to user.Described alarm unit is loudspeaker or hummer; Described computer operation condition detecting unit, is connected with computer operation condition detecting unit interface.Described computer operation condition detecting unit interface, for connecting computer operation condition detecting unit and computing machine.Described coding output interface, for being connected with coding module.
As shown in Figure 3, based on the computing machine mandate start-up control method of computer booting key, comprise the steps:
Step (1): computer booting key is inserted computing machine authorization control device;
Step (2): computing machine authorization control device receives extraneous start-up command;
Step (3): the main control unit of computing machine authorization control device reads computing machine authorization control device and pre-sets information;
Step (4): computing machine authorization control device starts to identify computer booting key, identifies the enciphered message and identity information that prestore inside computer booting key;
Step (5): whether the enciphered message of determining step (4) mates with the enciphered message in Visitor Logs database, if yes then enter step (6), if otherwise the start of computing machine authorization control device refusal, prompting unauthorized;
Step (6): according to the identity information of step (4), judge the authority levels of user, if keeper just enters the data channel of keeper, if keeper needs to arrange computing machine authorization control device, count step (7), if keeper needs to open computing machine, enter step (9); If user just enters subscriber channel, i.e. step (8);
Step (7): keeper is arranged computing machine authorization control device, returns step (3); Carry out setting to comprise: carry out set of time, operating right is arranged, control model is arranged and intranet and extranet are arranged.
Step (8): by sim module with the mobile phone transmission random verification code of the form of note to user, user is to computing machine authorization control device input validation code; Enter step (9);
Step (9): computing machine authorization control device is encrypted start-up command, to the start-up command after computer encipher or after coding; Computing machine is decrypted start-up command or decodes, and obtains start-up command; Computer booting.
As shown in Figure 4, the step of described step (5) comprising:
Step (5-1): the head eight digit number word first reading enciphered message, is undertaken head eight digit number word and self-defined eight digit number word or operates;
Step (5-2): by or operation after the first group encryption information of prestoring in the data that obtain and Visitor Logs database compare; If comparison failure, the start of computing machine authorization control device refusal; If comparison success, enters step (5-3);
Step (5-3): after comparison success, 248 remaining bit digital are read, after reading, the second group encryption information prestored in 248 bit digital and Visitor Logs database is compared.
By reference to the accompanying drawings the specific embodiment of the present invention is described although above-mentioned; but not limiting the scope of the invention; one of ordinary skill in the art should be understood that; on the basis of technical scheme of the present invention, those skilled in the art do not need to pay various amendment or distortion that creative work can make still within protection scope of the present invention.

Claims (10)

1. based on the computing machine mandate opening control system of computer booting key, comprising: computer motherboard, computing machine authorization control device and computer booting key, computing machine authorization control device is the peripherals of computing machine, can work alone;
Wherein computer booting key is connected with computing machine authorization control device, the computer operation condition detecting unit interface of described computing machine authorization control device is connected with the power supply interface of computer motherboard and standby power interface, and the coding output interface of described computing machine authorization control device is connected with the decoding interface of computer motherboard;
Described computing machine authorization control device identifies computer booting key, read out the enciphered message of computer booting key, and enciphered message is mated with the enciphered message prestored in computing machine authorization control device, if the match is successful, just send start-up command to computer motherboard, if it fails to match, then by computing machine authorization control device display unauthorized, thus reach on computers before electricity, just can determine whether computing machine starts shooting only by computing machine authorization control device.
2., as claimed in claim 1 based on the computing machine mandate opening control system of computer booting key, it is characterized in that, described computing machine authorization control device comprises:
Main control unit, described main control unit is connected with computer starting unit, supply unit, electron key interface, Visitor Logs database, LCDs, coding module, data selector, clock module, input keyboard, sim module, alarm unit, computer operation condition detecting unit respectively, described computer operation condition detecting unit is connected with computer operation condition detecting unit interface, and described coding module is connected with coding output interface.
3. as claimed in claim 2 based on the computing machine mandate opening control system of computer booting key, it is characterized in that, described main control unit, single-chip microcomputer or ARM or SOC, for identifying the enciphered message inside computer booting key, then judge whether enciphered message mates with the enciphered message in Visitor Logs database, output matching result;
Described computer starting unit, for sending enabled instruction to computing machine;
Described supply unit, for powering to main control unit, described supply unit is accumulator;
Described electron key interface, for being connected with computer booting key.
4., as claimed in claim 2 based on the computing machine mandate opening control system of computer booting key, it is characterized in that,
Described Visitor Logs database, on time of record manager and user, unused time, modification time; Also for storage encryption information;
Described LCDs, in start process, shows in real time to open state;
Described coding module, for encoding to start-up command;
Described data selector, selects control model for supvr, comprising: intranet and extranet set, whether use fingerprint recognition and operator's authority.
5., as claimed in claim 2 based on the computing machine mandate opening control system of computer booting key, it is characterized in that,
Described clock module, for proofreading the time of main control unit;
Described input keyboard, inputs information for supvr;
Described sim module, sends random verification code for the form with note to user;
Described alarm unit is loudspeaker or hummer.
6., as claimed in claim 2 based on the computing machine mandate opening control system of computer booting key, it is characterized in that,
Described computer operation condition detecting unit, is connected with computer operation condition detecting unit interface;
Described computer operation condition detecting unit interface, for connecting computer operation condition detecting unit and computing machine;
Described coding output interface, for being connected with coding module.
7., based on the computing machine mandate start-up control method of computer booting key, it is characterized in that, comprise the steps:
Step (1): computer booting key is inserted computing machine authorization control device;
Step (2): computing machine authorization control device receives extraneous start-up command;
Step (3): the main control unit of computing machine authorization control device reads computing machine authorization control device and pre-sets information;
Step (4): computing machine authorization control device starts to identify computer booting key, identifies the enciphered message and identity information that prestore inside computer booting key;
Step (5): whether the enciphered message of determining step (4) mates with the enciphered message in Visitor Logs database, if yes then enter step (6), if otherwise the start of computing machine authorization control device refusal, prompting unauthorized;
Step (6): according to the identity information of step (4), judge the authority levels of user, if keeper just enters the data channel of keeper, if keeper needs to arrange computing machine authorization control device, count step (7), if keeper needs to open computing machine, enter step (9); If user just enters subscriber channel, i.e. step (8);
Step (7): keeper is arranged computing machine authorization control device, returns step (3);
Step (8): by sim module with the mobile phone transmission random verification code of the form of note to user, user is to computing machine authorization control device input validation code; Enter step (9);
Step (9): computing machine authorization control device is encrypted start-up command, to the start-up command after computer encipher or after coding; Computing machine is decrypted start-up command or decodes, and obtains start-up command; Computer booting.
8. method as claimed in claim 7, it is characterized in that, the step of described step (5) comprising:
Step (5-1): the head eight digit number word first reading enciphered message, is undertaken head eight digit number word and self-defined eight digit number word or operates;
Step (5-2): by or operation after the first group encryption information of prestoring in the data that obtain and Visitor Logs database compare; If comparison failure, the start of computing machine authorization control device refusal; If comparison success, enters step (5-3);
Step (5-3): after comparison success, 248 remaining bit digital are read, after reading, the second group encryption information prestored in 248 bit digital and Visitor Logs database is compared.
9. method as claimed in claim 7, it is characterized in that, described step (7) is carried out setting and is comprised: carry out set of time, operating right is arranged, control model is arranged and intranet and extranet are arranged.
10. method as claimed in claim 9, is characterized in that, described control model arranges and comprises fingerprint recognition setting, sim module unlatching setting.
CN201510358601.4A 2015-06-25 2015-06-25 Computer mandate opening control system and method based on computer booting key Expired - Fee Related CN105005721B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510358601.4A CN105005721B (en) 2015-06-25 2015-06-25 Computer mandate opening control system and method based on computer booting key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510358601.4A CN105005721B (en) 2015-06-25 2015-06-25 Computer mandate opening control system and method based on computer booting key

Publications (2)

Publication Number Publication Date
CN105005721A true CN105005721A (en) 2015-10-28
CN105005721B CN105005721B (en) 2018-07-06

Family

ID=54378390

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510358601.4A Expired - Fee Related CN105005721B (en) 2015-06-25 2015-06-25 Computer mandate opening control system and method based on computer booting key

Country Status (1)

Country Link
CN (1) CN105005721B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108397046A (en) * 2018-04-23 2018-08-14 深圳市易联网络技术有限公司 Intelligent key chain corporate management System and method for
CN109145565A (en) * 2018-09-06 2019-01-04 河北地质大学 Computer authorization start-up control method based on Internet of Things
CN110309640A (en) * 2019-07-01 2019-10-08 联想(北京)有限公司 Electronic equipment starting-up method and electronic equipment
CN110457927A (en) * 2019-08-13 2019-11-15 平顶山学院 A kind of computer hard disk data encrypting method and its device
TWI728377B (en) * 2019-06-06 2021-05-21 旺宏電子股份有限公司 Secure boot system, method and apparatus
CN113792281A (en) * 2021-09-29 2021-12-14 龙芯中科(南京)技术有限公司 Electronic device, authentication method, storage medium, and program product
US11657157B2 (en) 2019-06-06 2023-05-23 Macronix International Co., Ltd. Secure boot system, method and apparatus

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1368682A (en) * 2001-02-05 2002-09-11 东维成科技股份有限公司 Method and architecture for security mechanism of computer host
CN102298679A (en) * 2011-08-12 2011-12-28 无锡城市云计算中心有限公司 BIOS (Basic Input/ Output System) authentication method based on USB (Universal Serial Bus) key
CN202150119U (en) * 2010-11-12 2012-02-22 北京环宇蓝博科技有限公司 Encryption device for controlling startup of big screen
CN202502505U (en) * 2012-03-21 2012-10-24 董科 Intelligent time-keeping and timing-service device for computer
CN104484629A (en) * 2014-12-03 2015-04-01 合肥联宝信息技术有限公司 Computer starting method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1368682A (en) * 2001-02-05 2002-09-11 东维成科技股份有限公司 Method and architecture for security mechanism of computer host
CN202150119U (en) * 2010-11-12 2012-02-22 北京环宇蓝博科技有限公司 Encryption device for controlling startup of big screen
CN102298679A (en) * 2011-08-12 2011-12-28 无锡城市云计算中心有限公司 BIOS (Basic Input/ Output System) authentication method based on USB (Universal Serial Bus) key
CN202502505U (en) * 2012-03-21 2012-10-24 董科 Intelligent time-keeping and timing-service device for computer
CN104484629A (en) * 2014-12-03 2015-04-01 合肥联宝信息技术有限公司 Computer starting method and device

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108397046A (en) * 2018-04-23 2018-08-14 深圳市易联网络技术有限公司 Intelligent key chain corporate management System and method for
CN108397046B (en) * 2018-04-23 2023-08-29 深圳市易联网络技术有限公司 Intelligent key ring joint management system and method
CN109145565A (en) * 2018-09-06 2019-01-04 河北地质大学 Computer authorization start-up control method based on Internet of Things
TWI728377B (en) * 2019-06-06 2021-05-21 旺宏電子股份有限公司 Secure boot system, method and apparatus
US11657157B2 (en) 2019-06-06 2023-05-23 Macronix International Co., Ltd. Secure boot system, method and apparatus
CN110309640A (en) * 2019-07-01 2019-10-08 联想(北京)有限公司 Electronic equipment starting-up method and electronic equipment
CN110457927A (en) * 2019-08-13 2019-11-15 平顶山学院 A kind of computer hard disk data encrypting method and its device
CN113792281A (en) * 2021-09-29 2021-12-14 龙芯中科(南京)技术有限公司 Electronic device, authentication method, storage medium, and program product

Also Published As

Publication number Publication date
CN105005721B (en) 2018-07-06

Similar Documents

Publication Publication Date Title
CN105005721A (en) Computer authorization starting control system and method based on computer starting key
US8510572B2 (en) Remote access system, gateway, client device, program, and storage medium
CN101939754B (en) Finger sensing apparatus using hybrid matching and associated methods
US8332915B2 (en) Information processing system, information processing apparatus, mobile terminal and access control method
CN107563213B (en) Safety secrecy control device for preventing data extraction of storage equipment
JP2008072613A (en) Management system, management device, and management method
CN105184179A (en) Embedded encrypted mobile storage device and operation method thereof
CN105354479A (en) USB flash disk authentication based solid state disk and data hiding method
CN112528257A (en) Security debugging method and device, electronic equipment and storage medium
CN109190389A (en) A kind of solid state hard disk data guard method based on USB flash disk authentication
CN109582238B (en) Hard disk binding and matching method and system, electronic equipment and storage medium
US20060129828A1 (en) Method which is able to centralize the administration of the user registered information across networks
TW201738802A (en) A removable security device and a method to prevent unauthorized exploitation and control access to files
CN109190365A (en) A kind of solid state hard disk data protection system based on USB flash disk authentication
JP2007148762A (en) External storage device
JP2006268513A (en) Log-on management device for terminal device
JP2021150681A (en) Information processing system, information processing program and information processing method
CN106557682A (en) The authority checking method and device of softdog
CN110472423A (en) A kind of nuclear power station file permission management method, device and equipment
JP4698502B2 (en) Terminal device authentication system, authentication method and program using mobile phone
CN109190364A (en) A kind of safe U disc for solid state hard disk authentication
KR101745390B1 (en) Data leakage prevention apparatus and method thereof
KR102248132B1 (en) Method, apparatus and program of log-in using biometric information
CN113360877B (en) Design method of safe mobile storage medium based on RAM
JP2009260688A (en) Security system and method thereof for remote terminal device in wireless wide-area communication network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180706

Termination date: 20200625