CN106100853A - Mobile terminal safety authentication method and device - Google Patents

Mobile terminal safety authentication method and device Download PDF

Info

Publication number
CN106100853A
CN106100853A CN201610613786.3A CN201610613786A CN106100853A CN 106100853 A CN106100853 A CN 106100853A CN 201610613786 A CN201610613786 A CN 201610613786A CN 106100853 A CN106100853 A CN 106100853A
Authority
CN
China
Prior art keywords
safety chip
signature value
certification
characteristic quantity
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610613786.3A
Other languages
Chinese (zh)
Other versions
CN106100853B (en
Inventor
陈泽含
任朝荣
白建雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN SINOSUN TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN SINOSUN TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN SINOSUN TECHNOLOGY Co Ltd filed Critical SHENZHEN SINOSUN TECHNOLOGY Co Ltd
Priority to CN201610613786.3A priority Critical patent/CN106100853B/en
Publication of CN106100853A publication Critical patent/CN106100853A/en
Application granted granted Critical
Publication of CN106100853B publication Critical patent/CN106100853B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Abstract

The present invention relates to a kind of mobile terminal safety authentication method and device, when detect mobile terminal power on instruction time, obtaining the safety chip signature value and characteristic quantity data prestored in safety chip, wherein, safety chip signature value is the certification private key signature value to characteristic quantity data;Obtain the certification PKI in read only memory ROM;Judge that certification PKI is the most corresponding with safety chip signature value with characteristic quantity data;The most then loading safety chip, due to the read-only attribute of read only memory ROM, in use the data in read only memory ROM can not be modified, and the certification public key verifications safety chip stored by read only memory ROM, safety certification intensity is higher.

Description

Mobile terminal safety authentication method and device
Technical field
The present invention relates to safety communication technology field, particularly relate to a kind of mobile terminal safety authentication method and device.
Background technology
Along with the development of science and technology, mountain vallage enterprise also gets more and more, and a lot of electronic products are all easy to be imitated, such as electricity Depending on, computer, the equipment such as pad or mobile phone, electronic product, by the imitated production of mountain vallage enterprise, can bring bigger loss to enterprise.
Safety certification as a example by mobile terminal, after mobile terminal device being powered in conventional art, it is common that use school Testing code, owing to check code is easily modified and forges, safety certification intensity is relatively low.
Summary of the invention
Based on this, it is necessary to for above-mentioned problem, it is provided that a kind of higher mobile terminal safety of safety certification intensity is recognized Card method and apparatus.
A kind of mobile terminal safety authentication method, described method includes:
When detect mobile terminal power on instruction time, obtain in safety chip the safety chip signature value and feature prestored Amount data, wherein, described safety chip signature value is the certification private key signature value to described characteristic quantity data;
Obtain the certification PKI in read only memory;
Judge that described certification PKI is the most corresponding with described safety chip signature value with described characteristic quantity data;
The most then load described safety chip.
In one embodiment, described judge described certification PKI and described characteristic quantity data whether with described safety chip Signature value is corresponding;The step the most then loading described safety chip includes:
Judge that described certification PKI is the most corresponding with described safety chip signature value with described characteristic quantity data;
If the determination result is YES, then be obtained from detect described in power on instruction to obtain that described judged result used time Long;
When the described duration obtained no more than sets duration, then load described safety chip.
In one embodiment, described method also includes:
If judged result is described duration that is no or that obtain is more than described setting duration, then restart described mobile whole End, re-executes the safety chip signature value and characteristic quantity data step prestored in described acquisition safety chip.
In one embodiment, described method also includes:
Obtain described mobile terminal restarts number of times;
When the described number of times that restarts exceedes set point number, then lock described mobile terminal.
In one embodiment, described judge described certification PKI and described characteristic quantity data whether with described safety chip Signature value is corresponding, the most then the step loading described safety chip includes:
Use safety chip signature value described in described certification public key decryptions, obtain certification corresponding to safety chip signature value special The amount of levying data;
The described characteristic quantity data of described authentication feature amount data with acquisition are contrasted;
If both are consistent, then load described safety chip.
A kind of mobile terminal safety certification device, described device includes:
Safety chip data acquisition module, for when detect mobile terminal power on instruction time, obtain in safety chip The safety chip signature value prestored and characteristic quantity data, wherein, described safety chip signature value is that certification private key is to described feature The signature value of amount data;
ROM data acquisition module, for obtaining the certification PKI in read only memory;
Security authentication module, be used for judging described certification PKI and described characteristic quantity data whether with described safety chip label Name-value pair should;
The most then load described safety chip.
In one embodiment, described security authentication module includes:
Key authentication module, be used for judging described certification PKI and described characteristic quantity data whether with described safety chip label Name-value pair should;
Duration acquisition module, for if the determination result is YES, is then obtained from described in detecting the instruction that powers on described to obtaining The duration that judged result is used;
Duration authentication module, for no more than setting duration when the described duration obtained, then loads described safety chip.
In one embodiment, described device also includes:
Restarting module, if being that described duration that is no or that obtain is more than described setting duration for judged result, the most again opening Dynamic described mobile terminal, re-executes the safety chip signature value prestored in described acquisition safety chip and characteristic quantity data step Suddenly.
In one embodiment, described device also includes:
Restart number of times acquisition module, restart number of times for obtain described mobile terminal;
Locking module, for when described in restart number of times and exceed set point number, then lock described mobile terminal.
In one embodiment, described security authentication module is also used for safety chip described in described certification public key decryptions Signature value, obtains the authentication feature amount data that safety chip signature value is corresponding;Institute by described authentication feature amount data Yu acquisition State characteristic quantity data to contrast;If both are consistent, then load described safety chip.
Above-mentioned mobile terminal safety authentication method and device, when detect mobile terminal power on instruction time, obtain safety The safety chip signature value prestored in chip and characteristic quantity data, wherein, safety chip signature value is that certification private key is to characteristic quantity The signature value of data;Obtain the certification PKI in read only memory;Judge certification PKI and characteristic quantity data whether with safe core Sheet signature value is corresponding;The most then load safety chip, due to the read-only attribute of read only memory, in use read only memory In data can not be modified, the certification public key verifications safety chip stored by read only memory, safety certification intensity is more High.
Further, since the checking information in safety chip is the checking private key signature value to characteristic quantity data, this signature Private key can not be obtained by other people, therefore, even if the certification PKI in read only memory is stolen, it is also not possible to safety chip In signature forge, use read only memory safety chip is carried out safety certification, it is ensured that safety chip start peace Quan Xing, mobile terminal safety authentication strength is higher.
Accompanying drawing explanation
Fig. 1 is the flow chart of mobile terminal safety authentication method in an embodiment;
Fig. 2 is to judge the step that certification PKI is the most corresponding with safety chip signature value with characteristic quantity data in an embodiment Rapid flow chart;
Fig. 3 be in an embodiment in mobile terminal safety authentication method to the flow chart restarting time number limiting;
Fig. 4 is the structured flowchart of mobile terminal safety certification device in an embodiment;
Fig. 5 is the structured flowchart of security authentication module in an embodiment;
Fig. 6 is the structured flowchart of security authentication module in another embodiment.
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, right The present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, and It is not used in the restriction present invention.
In one embodiment, as shown in Figure 1, it is provided that a kind of mobile terminal safety authentication method, the method includes:
Step S102: when terminal enabled instruction being detected, when detect mobile terminal power on instruction time, obtain safety The safety chip signature value prestored in chip and characteristic quantity data, wherein, safety chip signature value is that certification private key is to characteristic quantity The signature value of data.
When terminal is powered on, will start the Bootstrap Commissioning Program in terminal handler CPU, processor performs this guiding and opens Dynamic program carries out safety certification to control mobile terminal.
Safety chip is embedded on Mobile terminal main board, and safety chip can independently carry out the generation of key, encrypt and decipher, Inside has independent processor and memorizer, can store key and characteristic, provides encryption and safety certification to take for terminal Business.Safety chip can carry out the encryption of high reliability to the data of chip internal storage, it is possible to effectively prevents the number of storage According to stolen or crack.
Concrete, safety chip presets characteristic quantity data, uses certification private key to sign this feature amount data Name obtains safety chip signature value.
Step S104: obtain the certification PKI in read only memory.
Concrete, when the power on signal of mobile terminal being detected, load the read only memory (Read-in mobile terminal Only Memory, is called for short: ROM).Read only memory ROM stored data, finishes writing before being usually loading complete machine, this enforcement in advance In example, read only memory ROM is previously written certification PKI, wherein, certification PKI and corresponding the recognizing of signature value in safety chip Card private key constitutes double secret key.Whole working can only read.
Step S106: judge that certification PKI is the most corresponding with safety chip signature value with characteristic quantity data;The most then load Safety chip.
Concrete, it is whether that certification private key that this certification PKI is corresponding is to characteristic quantity number by certification public key verifications signature value According to signature value, if it is, the result is correct, be verified, data that safety chip stores and read-only storage be described Device ROM authentication data is corresponding, and this safety chip is the safety chip authorized, and can carry out the startup of the safety chip of this mandate, enter And, can carry out according to the key information of the mobile terminal system of storage in safety chip and the key information of mobile terminal application The startup of system and the startup of application, the safety certification intensity of mobile terminal is higher.
Further, since the checking information in safety chip is the checking private key signature value to characteristic quantity data, this signature Private key can not be obtained by other people, therefore, even if the certification PKI in read only memory ROM is stolen, it is also not possible to safety Signature in chip is forged, and uses read only memory ROM that safety chip is carried out safety certification, it is ensured that safety chip opens Dynamic safety, mobile terminal safety authentication strength is higher.
In one embodiment, step S106: judge certification PKI and characteristic quantity data whether with safety chip signature value Corresponding;The step the most then loading safety chip is: uses safety chip signature value described in described certification public key decryptions, obtains The authentication feature amount data that safety chip signature value is corresponding;Described characteristic quantity data by described authentication feature amount data Yu acquisition Contrast;If both are consistent, then load described safety chip.
Concrete, when safety chip is verified, obtain the safety chip signature of storage in safety chip to be verified Value and the characteristic quantity data of safety chip, use this safety chip signature value of certification public key decryptions in the ROM read, and obtains peace The authentication feature amount data that full chip signature value is corresponding, the characteristic quantity that these authentication feature amount data and safety chip are individually stored Data contrast, if both are corresponding consistent, then safety chip is trusted safety chip.
Wherein, authentication feature amount data are by generating the characteristic quantity data that safety chip signature value is used, this feature amount Data are set in advance, and authenticated private key carries out signature to it and obtains signature value.
Authentication feature amount data corresponding for safety chip signature value are carried out with the characteristic quantity data of storage in safety chip Comparison, if both are corresponding consistent, then explanation safety chip signature value is corresponding with the certification PKI in read only memory ROM, And the characteristic quantity data in safety chip are not written over, safety chip is trusted safety chip.
In one embodiment, step S106: judge certification PKI and characteristic quantity data whether with safety chip signature value Corresponding;The step the most then loading safety chip can also be: by certification PKI, characteristic quantity data and safety chip signature value In the first component participate in calculating as the parameter of computational algorithm, obtain result of calculation, by the in result of calculation and signature value Two components contrast, if both are consistent, the most then load safety chip.
In one embodiment, as in figure 2 it is shown, step S106: judge certification PKI and characteristic quantity data whether with safety Chip signature value is corresponding;The step the most then loading safety chip includes:
Step S202: judge that certification PKI is the most corresponding with safety chip signature value with characteristic quantity data.
Step S204: if the determination result is YES, then be obtained from and detect that the instruction that powers on is to obtaining what judged result was used Duration.
Step S206: when the duration obtained no more than sets duration, then load safety chip.
Concrete, from mobile terminal detects power on signal, the timer in mobile terminal starts timing, works as experience Card: the signature value of certification PKI and characteristic quantity data and safety chip is to the duration of acquisition timer current record time corresponding, if quilt The read only memory ROM of checking and safety chip are the hardware device of mandate, then, the result is by within the time set It is computed.
If it exceeds setting duration, though the signature value that the result is certification PKI and characteristic quantity data and safety chip Correspondence, also can not determine that ROM and safety chip are the hardware device authorized, it is possible to exactly because ROM or safety chip Data are maliciously tampered, or ROM, safety chip are that unauthorized hardware equipment just causes proving time time-out.
In the present embodiment, on the basis of ROM and security chip key verify, add the restriction of proving time, only In the time range set, it is verified result, and the result is correct the result (certification PKI and characteristic quantity number Corresponding according to the signature value with safety chip, then the result is correct the result) just think and be verified, perform to load peace The step of full chip.
In the present embodiment, the restriction of joining day, add proof strength.
In one embodiment, as in figure 2 it is shown, mobile terminal safety authentication method also includes:
Step S208: if judged result is duration that is no or that obtain is more than setting duration, then restart mobile terminal, weight New step S102 that performs: obtain the safety chip signature value and characteristic quantity data step prestored in safety chip.
Concrete, it is judged that result is no, refers to that certification PKI and characteristic quantity data are the most right with safety chip signature value Should.When judged result is no, or the duration obtaining result exceedes setting duration, then restart mobile terminal.Here restart shifting Dynamic terminal refers in the case of not power-off, re-executes following steps: obtain the safety chip signature prestored in safety chip Value and characteristic quantity data, wherein, safety chip signature value is the certification private key signature value to characteristic quantity data;Obtain read-only storage Certification PKI in device;Judge that certification PKI is the most corresponding with safety chip signature value with characteristic quantity data.
In one embodiment, as it is shown on figure 3, mobile terminal safety authentication method also includes:
Step S302: obtain mobile terminal restarts number of times.
Step S304: exceed set point number when restarting number of times, then lock mobile terminal.
When the result is no, or checking duration exceedes setting duration, and mobile terminal will be restarted, and re-execute checking Step, in the present embodiment, defines the checking number of times of mobile terminal, when checking number of times exceedes the number of times of setting, then locks movement Terminal, even if mobile terminal detects the instruction that powers on, does not the most perform verification step, prevents mobile terminal wireless circulating from verifying.
In one embodiment, as shown in Figure 4, it is provided that a kind of mobile terminal safety certification device, device includes:
Safety chip data acquisition module 410, for when detect mobile terminal power on instruction time, obtain safety chip In the safety chip signature value that prestores and characteristic quantity data, wherein, safety chip signature value is that certification private key is to characteristic quantity data Signature value.
ROM data acquisition module 420, for obtaining the certification PKI in read only memory.
Security authentication module 430, is used for judging that certification PKI is the most corresponding with safety chip signature value with characteristic quantity data; The most then load safety chip.
In one embodiment, as it is shown in figure 5, security authentication module 430 includes:
Key authentication module 510, is used for judging that certification PKI is the most corresponding with safety chip signature value with characteristic quantity data.
Duration acquisition module 520, for if the determination result is YES, is then obtained from and detects that the instruction that powers on is to obtaining judgement knot The duration that fruit is used.
Duration authentication module 530, for no more than setting duration when the duration obtained, then loads safety chip.
In one embodiment, as shown in Figure 6, device also includes:
Restarting module 610, if being that duration that is no or that obtain is more than setting duration for judged result, then restarting movement Terminal, re-executes and obtains the safety chip signature value and characteristic quantity data step prestored in safety chip.
In one embodiment, mobile terminal safety certification device also includes:
Restart number of times acquisition module, restart number of times for obtain mobile terminal.
Locking module, exceedes set point number for restarting number of times, then locks mobile terminal.
In one embodiment, security authentication module 430 is also used for certification public key decryptions safety chip signature value, To the authentication feature amount data that safety chip signature value is corresponding;It is right authentication feature amount data and the characteristic quantity data of acquisition to be carried out Ratio;If both are consistent, then load safety chip.
Each technical characteristic of above example can combine arbitrarily, for making description succinct, not to above-described embodiment In all possible combination of each technical characteristic be all described, but, as long as there is not lance in the combination of these technical characteristics Shield, is all considered to be the scope that this specification is recorded.
Above example only have expressed the several embodiments of the present invention, and it describes more concrete and detailed, but can not Therefore it is construed as limiting the scope of the patent.It should be pointed out that, for the person of ordinary skill of the art, On the premise of present inventive concept, it is also possible to make some deformation and improvement, these broadly fall into protection scope of the present invention. Therefore, the protection domain of patent of the present invention should be as the criterion with claims.

Claims (10)

1. a mobile terminal safety authentication method, described method includes:
When detect mobile terminal power on instruction time, obtain in safety chip the safety chip signature value and characteristic quantity number prestored According to, wherein, described safety chip signature value is the certification private key signature value to described characteristic quantity data;
Obtain the certification PKI in read only memory;
Judge that described certification PKI is the most corresponding with described safety chip signature value with described characteristic quantity data;
The most then load described safety chip.
Method the most according to claim 1, it is characterised in that described judgement described certification PKI and described characteristic quantity data The most corresponding with described safety chip signature value;The step the most then loading described safety chip includes:
Judge that described certification PKI is the most corresponding with described safety chip signature value with described characteristic quantity data;
If the determination result is YES, then be obtained from detect described in power on instruction to obtaining the duration that described judged result is used;
When the described duration obtained no more than sets duration, then load described safety chip.
Method the most according to claim 2, it is characterised in that described method also includes:
If judged result is described duration that is no or that obtain is more than described setting duration, then restart described mobile terminal, weight The new safety chip signature value performing to prestore in described acquisition safety chip and characteristic quantity data step.
Method the most according to claim 3, it is characterised in that described method also includes:
Obtain described mobile terminal restarts number of times;
When the described number of times that restarts exceedes set point number, then lock described mobile terminal.
Method the most according to claim 1, it is characterised in that described judgement described certification PKI and described characteristic quantity data The most corresponding with described safety chip signature value, the most then the step loading described safety chip includes:
Use safety chip signature value described in described certification public key decryptions, obtain the authentication feature amount that safety chip signature value is corresponding Data;
The described characteristic quantity data of described authentication feature amount data with acquisition are contrasted;
If both are consistent, then load described safety chip.
6. a mobile terminal safety certification device, it is characterised in that described device includes:
Safety chip data acquisition module, for when detect mobile terminal power on instruction time, obtain in safety chip and prestore Safety chip signature value and characteristic quantity data, wherein, described safety chip signature value is that certification private key is to described characteristic quantity number According to signature value;
ROM data acquisition module, for obtaining the certification PKI in read only memory;
Security authentication module, be used for judging described certification PKI and described characteristic quantity data whether with described safety chip signature value Corresponding;
The most then load described safety chip.
Device the most according to claim 6, it is characterised in that described security authentication module includes:
Key authentication module, be used for judging described certification PKI and described characteristic quantity data whether with described safety chip signature value Corresponding;
Duration acquisition module, for if the determination result is YES, is then obtained from described in detecting the instruction that powers on to obtaining described judgement The duration that result is used;
Duration authentication module, for no more than setting duration when the described duration obtained, then loads described safety chip.
Device the most according to claim 7, it is characterised in that described device also includes:
Restarting module, if being that described duration that is no or that obtain is more than described setting duration for judged result, then restarting institute State mobile terminal, re-execute the safety chip signature value and characteristic quantity data step prestored in described acquisition safety chip.
Device the most according to claim 8, it is characterised in that described device also includes:
Restart number of times acquisition module, restart number of times for obtain described mobile terminal;
Locking module, for when described in restart number of times and exceed set point number, then lock described mobile terminal.
Device the most according to claim 1, it is characterised in that described security authentication module is also used for described certification Safety chip signature value described in public key decryptions, obtains the authentication feature amount data that safety chip signature value is corresponding;By described certification Characteristic quantity data contrast with the described characteristic quantity data of acquisition;If both are consistent, then load described safety chip.
CN201610613786.3A 2016-07-29 2016-07-29 Mobile terminal safety authentication method and device Active CN106100853B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610613786.3A CN106100853B (en) 2016-07-29 2016-07-29 Mobile terminal safety authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610613786.3A CN106100853B (en) 2016-07-29 2016-07-29 Mobile terminal safety authentication method and device

Publications (2)

Publication Number Publication Date
CN106100853A true CN106100853A (en) 2016-11-09
CN106100853B CN106100853B (en) 2019-05-03

Family

ID=57479596

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610613786.3A Active CN106100853B (en) 2016-07-29 2016-07-29 Mobile terminal safety authentication method and device

Country Status (1)

Country Link
CN (1) CN106100853B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107979473A (en) * 2017-12-04 2018-05-01 山东渔翁信息技术股份有限公司 Identity authentication method, device, cipher card and medium based on USB Key
CN111177773A (en) * 2019-12-10 2020-05-19 中国电子科技网络信息安全有限公司 Full disk encryption and decryption method and system based on network card ROM

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145906A (en) * 2006-09-13 2008-03-19 北京邦天科技有限公司 Method and system for authenticating legality of receiving terminal in unidirectional network

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145906A (en) * 2006-09-13 2008-03-19 北京邦天科技有限公司 Method and system for authenticating legality of receiving terminal in unidirectional network

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107979473A (en) * 2017-12-04 2018-05-01 山东渔翁信息技术股份有限公司 Identity authentication method, device, cipher card and medium based on USB Key
CN111177773A (en) * 2019-12-10 2020-05-19 中国电子科技网络信息安全有限公司 Full disk encryption and decryption method and system based on network card ROM

Also Published As

Publication number Publication date
CN106100853B (en) 2019-05-03

Similar Documents

Publication Publication Date Title
KR102543623B1 (en) Mobile security countermeasures
CN106156635A (en) Method for starting terminal and device
CN106330850B (en) Security verification method based on biological characteristics, client and server
CN101106455B (en) Identity authentication method and intelligent secret key device
US20140282992A1 (en) Systems and methods for securing the boot process of a device using credentials stored on an authentication token
US20190165947A1 (en) Signatures for near field communications
CN103346885B (en) A kind of Activiation method of token device
US11675893B2 (en) Verification application, method, electronic device and computer program
CN104767713B (en) Account binding method, server and system
CN102184352A (en) Automatic protecting method for computer system based on Bluetooth device authentication
CN107438849A (en) For the system and method for the integrality for verifying electronic equipment
CN104579649A (en) Identity recognition method and system
CN105024986A (en) Account login method, device and system
CN101377803B (en) Method and system for implementing start-up protection
CN104537302B (en) A kind of safe starting method of terminal, device and terminal
CN108965222A (en) Identity identifying method, system and computer readable storage medium
CN107977568B (en) MCU safety protection identity authentication device and method
CN102609656A (en) USB (universal serial bus) key safety enhancing method and USB key safety enhancing system based on image identification
CN111340987A (en) Internet of things door lock communication method, device and system and computer storage medium
CN106100853B (en) Mobile terminal safety authentication method and device
CN104852888B (en) A kind of method and device that static authentication information is set
CN109586898A (en) Dual system communication key generation method and computer readable storage medium
CN101854357B (en) Method and system for monitoring network authentication
CN105005725A (en) Information security protection method and system for mobile terminal
CN110232270A (en) A kind of method of safety certification, unit and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant