CN106789085B - Computer booting based on mobile phone cipher manages system and method - Google Patents
Computer booting based on mobile phone cipher manages system and method Download PDFInfo
- Publication number
- CN106789085B CN106789085B CN201710022018.5A CN201710022018A CN106789085B CN 106789085 B CN106789085 B CN 106789085B CN 201710022018 A CN201710022018 A CN 201710022018A CN 106789085 B CN106789085 B CN 106789085B
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- tpm
- blue
- computer
- bluetooth
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention provides a kind of computer booting management system and method based on mobile phone cipher, and system includes the blue-tooth intelligence mobile phone for being equipped with the computer of TPM modules and bluetooth module and being verified for computer booting;TPM modules are used to control the scanning and matching of periphery bluetooth equipment when bluetooth module realizes computer booting, and are verified according to the MAC Address of blue-tooth intelligence mobile phone after matching, realize computer booting encryption handling;Blue-tooth intelligence mobile phone is matched for the bluetooth module with computer, and provides Bluetooth MAC address to the TPM modules.Its effect is:When booting, without manually individually entering password again, to simplify booting process, algorithm complexity is low, promotes certification speed, can note abnormalities situation in time, reduce the hardware cost of computer system.
Description
Technical field
The present invention relates to computer technologies, in particular, being a kind of computer booting management system based on mobile phone cipher
And method.
Background technology
With the development of information age, information security is paid attention to by more and more people, in people's calculating used in everyday
In machine or notebook, a large amount of individual privacy or business secret are often referred to, once by people's illegal invasion, consequence can't bear to set
Think.
Current Windows systems mostly use greatly simple account cipher mode, when booting, pass through authentic administrator account
Realization controls computer booting permission, and one side start process is cumbersome, needs to be actively entered account and password, prolong
The long available machine time;On the other hand, startup password is usually easy leakage or steals, and after other people take the startup password, still may be used
With the login to leave no trace, information security is difficult to be guaranteed.
In order to increase the security performance of computer, existing computer system also proposed based on safe hard disk and credibility
Organize (Trusted Computing Group, TCG) credible console module (Trusted Platform Module,
TPM) two key subsystems of chip build security system.
But it is to support that existing TPM chips, which are still with cryptographic technique, and hard disk point is realized by the form of HD encryption
On the one hand area's security isolation still needs when TPM chips carry out authenticating user identification and is actively entered password by input equipment
Or it is actively inserted into electron key, booting process is cumbersome;On the other hand, it is difficult to obtain booting record, it is illegal to equally exist other people
Obtain the risk that startup password enters system steal information.
Invention content
In view of drawbacks described above, the present invention manages system and side by a kind of computer booting based on mobile phone cipher of offer
Method does not realize computer from the living habit of body in conjunction with current people's mobile phone using mobile phone as the key of computer booting certification
The automatic search certification of booting, simplifies boot program, ensures information security simultaneously.
To achieve the above object, present invention firstly provides a kind of, and the computer booting based on mobile phone cipher manages system, packet
The blue-tooth intelligence mobile phone for including the computer equipped with TPM modules and bluetooth module and being verified for computer booting;
The TPM modules are used to control the scanning and matching of periphery bluetooth equipment when bluetooth module realizes computer booting,
And verified according to the MAC Address of blue-tooth intelligence mobile phone after matching, realize computer booting encryption handling;
The blue-tooth intelligence mobile phone, is matched for the bluetooth module with computer, and provides indigo plant to the TPM modules
Tooth MAC Address.
The system makes full use of TPM modules and bluetooth module in active computer hardware system, makes in conjunction with people are daily
Smart mobile phone is realized in the case where need not separately set electron key or startup password by short-range bluetooth connection
Booting verification when booting, need not individually enter password or be inserted into electron key, simplify starting procedure, when the mobile phone of administrator
When not within the scope of computer bluetooth connection, regard as illegally being switched on, to ensure information security.
Optionally, the TPM modules are provided with TPM controllers and TPM memories, the TPM controllers and the bluetooth
Module connects, and is powered on after BIOS initialization, and the TPM memories are used for the preset blue-tooth intelligence mobile phone of storage administrator
MAC Address.
Optionally, the bluetooth module uses 4.0 version of bluetooth 2.0, bluetooth 3.0 or bluetooth.
In conjunction with above system, the present invention also proposes a kind of controlling party of the computer booting management system based on mobile phone cipher
Method is carried out essentially according to following steps:
S1:System boot powers on;
S2:BIOS initialization;
S3:TPM modules are initialized with bluetooth module;
S4:TPM modules control bluetooth module and scan periphery bluetooth equipment;
S5:Judge whether to match with blue-tooth intelligence mobile phone, if it is, S6 is entered step,;Otherwise, bluetooth is opened in prompt
Smart mobile phone and return to step S4;
S6:The MAC Address that TPM modules obtain blue-tooth intelligence mobile phone is verified, and judges whether to belong to what administrator prestored
Blue-tooth intelligence mobile phone MAC Address, if so, entering step S7;Otherwise, matched blue-tooth intelligence mobile phone is pulled in into blacklist
In, return to step S4 cycles execute;
S7:Password authentification passes through, os starting.
Optionally, the TPM modules are provided with TPM controllers and TPM memories, the blue-tooth intelligence hand to prestore in step S6
Machine MAC Address is stored in the TPM memories.
Optionally, the blue-tooth intelligence mobile phone MAC Address to prestore in step S6 registers storage according to the following steps:
S61:In the case where operating system normally starts, administrator's registration procedure is entered by account management;
S62:It inputs administrator's password and whether authentic administrator password is correct, not verified then prompt cipher mistake,
S63 is then entered step by verification;
S63:TPM controllers control bluetooth module and scan periphery bluetooth equipment;
S64:Selection blue-tooth intelligence mobile phone is matched;
S65:Read blue-tooth intelligence mobile phone MAC Address after matching;
S66:It will be in the MAC Address storage to TPM memories acquired in step S65;
S67:Administrator, which registers, to complete.
Optionally, decryption mode switch key is set on computer keyboard, and after BIOS initialization, TPM modules detect
Decryption mode switch key continuously presses signal, then switches to keyboard decryption verification process, and it is real to input administrator's password by keyboard
Now it is switched on.
Optionally, if matched blue-tooth intelligence mobile phone, TPM modules are not detected in preset time T in step S5
Control system shifts to keyboard decryption verification process, and inputting administrator's password by keyboard realizes booting.
Optionally, the preset time T is 30~60 seconds.
Compared with prior art, technical solution provided by the present application, the technique effect or advantage having are:
(1) on the basis of existing keyboard decryption verification pattern, it is additionally arranged cellphone deciphering Validation Mode, is carried as user
When mobile phone is in computer bluetooth communications range, by actively shaking hands, the automatic Bluetooth MAC address that obtains is used as key authentication, opens
When machine, without manually individually entering password again, to simplify booting process.
(2) selection bluetooth cellular phone MAC Address is verified, and is on the one hand combined current people's mobile phone and is not practised from the use of body
It is used, it is ensured that people exists in key;On the other hand, the complexity that can reduce decipherment algorithm is straight by the MAC Address to prestore with system
Connect comparison, you can be verified as a result, algorithm complexity is low, promote certification speed.
(3) intelligent characteristic of current smart mobile phone is combined, bluetooth, which is shaken hands, each time can retain record of shaking hands, and be convenient for user
Real time inspection and management booting record, note abnormalities situation in time.
(4) the universal situation for combining smart mobile phone, makes full use of smart mobile phone existing capability, can not have to that it is separately configured
Its electron key reduces the hardware cost of computer system.
Description of the drawings
Fig. 1 is the control flow chart proposed by the present invention that computer booting management is carried out based on mobile phone cipher;
Fig. 2 is control flow chart when administrator registers in the present invention.
Specific implementation mode
In order to better understand the above technical scheme, in conjunction with appended figures and specific embodiments, it is right
Above-mentioned technical proposal is described in detail.
The present embodiment discloses a kind of computer booting management system based on mobile phone cipher first, including is equipped with TPM modules
With the computer of bluetooth module and for the blue-tooth intelligence mobile phone of computer booting verification;
The TPM modules are used to control the scanning and matching of periphery bluetooth equipment when bluetooth module realizes computer booting,
And verified according to the MAC Address of blue-tooth intelligence mobile phone after matching, realize computer booting encryption handling;
The blue-tooth intelligence mobile phone, is matched for the bluetooth module with computer, and provides indigo plant to the TPM modules
Tooth MAC Address.
In implementation process, the TPM modules are provided with TPM controllers and TPM memories, the TPM controllers with it is described
Bluetooth module connects, and is powered on after BIOS initialization, and the TPM memories are used for the preset blue-tooth intelligence hand of storage administrator
Machine MAC Address, the bluetooth module use bluetooth 2.0, bluetooth 3.0 or 4.0 version of bluetooth can be with.
As shown in Figure 1, in the present embodiment, the control method of above system follows the steps below:
S1:System boot powers on;
S2:BIOS initialization;
S3:TPM modules are initialized with bluetooth module;
S4:TPM modules control bluetooth module and scan periphery bluetooth equipment;
S5:Judge whether to match with blue-tooth intelligence mobile phone, if it is, S6 is entered step,;Otherwise, bluetooth is opened in prompt
Smart mobile phone and return to step S4;
S6:The MAC Address that TPM modules obtain blue-tooth intelligence mobile phone is verified, and judges whether that belonging to administrator is pre-stored in
Blue-tooth intelligence mobile phone MAC Address in TPM memories, if so, entering step S7;Otherwise, by matched blue-tooth intelligence hand
Machine pulls in blacklist, and return to step S4 cycles execute;
S7:Password authentification passes through, os starting.
As shown in Fig. 2, the blue-tooth intelligence mobile phone MAC Address to prestore in step S6 registers storage according to the following steps:
S61:In the case where operating system normally starts, administrator's registration procedure is entered by account management;
S62:It inputs administrator's password and whether authentic administrator password is correct, not verified then prompt cipher mistake,
S63 is then entered step by verification;
S63:TPM controllers control bluetooth module and scan periphery bluetooth equipment;
S64:Selection blue-tooth intelligence mobile phone is matched;
S65:Read blue-tooth intelligence mobile phone MAC Address after matching;
S66:It will be in the MAC Address storage to TPM memories acquired in step S65;
S67:Administrator, which registers, to complete.
In order to realize the switching of certification mode on the basis of original power on mode, the setting decryption mould on computer keyboard
Formula switch key, after BIOS initialization, TPM modules detect that decryption mode switch key continuously presses signal, then switch to keyboard
Decryption verification process inputs administrator's password by keyboard and realizes booting.
In order to keep original pattern, if be not detected in preset time T (T=30~60 second) matched in step S5
Blue-tooth intelligence mobile phone, then TPM module control systems shift to keyboard decryption verification process, pass through keyboard input administrator's password realize
Booting.
Description based on above-described embodiment, operation principle of the invention and remarkable result are:
By modifying to existing computer booting startup program, since system is provided with TPM modules and bluetooth mould
Block, it is preferential to start TPM modules and bluetooth module after the completion of BIOS initialization, certification is booted up using TPM modules, is utilized
Transmission channel of the bluetooth module as authentication information, certification object are the preconfigured blue-tooth intelligence mobile phone of administrator, pass through meter
Calculation machine bluetooth module, active scan periphery bluetooth equipment, and obtain can matching unit MAC Address, have uniquely represent meaning
MAC Address as verification target, the speed that TPM modules are verified is ensure that, when booting, as long as the mobile phone of administrator is in
Within the scope of bluetooth connection, then computer can Auto Power On, avoid being manually entered password or be manually inserted into other electronic keys
Cumbersome flow, starting up's speed is fast, and the security performance of equipment is also guaranteed.
At the same time, TPM moulds TPM memories in the block are additionally operable to authentication information when storage is switched on each time, and intelligence is eventually
End can also preserve Bluetooth matching information each time in its memory, and after being switched on certification each time, intelligent terminal can be with
Last time booting verification process is looked back and veritified, discovers whether that there are abnormal login situations in time, will illegally enter in time
The bluetooth equipment invaded pulls in blacklist, to promote security protection performance.
Finally it is pointed out that above description is not limitation of the present invention, and the present invention is also not limited to above-mentioned
Citing, what those skilled in the art were made in the essential scope of the present invention changes, is modified, adds or replaces
It changes, should also belong to the scope of protection of the present invention.
Claims (8)
1. a kind of computer booting based on mobile phone cipher manages system, which is characterized in that including being equipped with TPM modules and bluetooth mould
The computer of block and the blue-tooth intelligence mobile phone verified for computer booting;
The TPM modules are used to control the scanning and matching of periphery bluetooth equipment when bluetooth module realizes computer booting, and root
It is verified according to the MAC Address of blue-tooth intelligence mobile phone after matching, realizes computer booting encryption handling;
The blue-tooth intelligence mobile phone, is matched for the bluetooth module with computer, and provides bluetooth to the TPM modules
MAC Address;
The TPM modules are provided with TPM controllers and TPM memories, and the TPM controllers are connect with the bluetooth module, and
It is powered on after BIOS initialization, the TPM memories are used for the preset blue-tooth intelligence mobile phone MAC Address of storage administrator.
2. the computer booting according to claim 1 based on mobile phone cipher manages system, which is characterized in that the bluetooth
Module uses 4.0 version of bluetooth 2.0, bluetooth 3.0 or bluetooth.
3. the control method of the computer booting management system based on mobile phone cipher as described in claim 1, it is characterised in that
It follows the steps below:
S1:System boot powers on;
S2:BIOS initialization;
S3:TPM modules are initialized with bluetooth module;
S4:TPM modules control bluetooth module and scan periphery bluetooth equipment;
S5:Judge whether to match with blue-tooth intelligence mobile phone, if it is, S6 is entered step,;Otherwise, blue-tooth intelligence is opened in prompt
Mobile phone and return to step S4;
S6:The MAC Address that TPM modules obtain blue-tooth intelligence mobile phone is verified, and judges whether to belong to the bluetooth that administrator prestores
Smart mobile phone MAC Address, if so, entering step S7;Otherwise, matched blue-tooth intelligence mobile phone is pulled in blacklist, is returned
Step S4 cycles are returned to execute;
S7:Password authentification passes through, os starting.
4. the control method of the computer booting management system according to claim 3 based on mobile phone cipher, feature exist
In the TPM modules are provided with TPM controllers and TPM memories, and the blue-tooth intelligence mobile phone MAC Address to prestore in step S6 is deposited
Storage is in the TPM memories.
5. the control method of the computer booting management system according to claim 4 based on mobile phone cipher, feature exist
In the blue-tooth intelligence mobile phone MAC Address to prestore in step S6 registers storage according to the following steps:
S61:In the case where operating system normally starts, administrator's registration procedure is entered by account management;
S62:It inputs administrator's password and whether authentic administrator password is correct, not verified then prompt cipher mistake passes through
Verification then enters step S63;
S63:TPM controllers control bluetooth module and scan periphery bluetooth equipment;
S64:Selection blue-tooth intelligence mobile phone is matched;
S65:Read blue-tooth intelligence mobile phone MAC Address after matching;
S66:It will be in the MAC Address storage to TPM memories acquired in step S65;
S67:Administrator, which registers, to complete.
6. the control method of the computer booting management system according to claim 3 based on mobile phone cipher, feature exist
In the setting decryption mode switch key on computer keyboard, after BIOS initialization, TPM modules detect that decryption mode switches
Key continuously presses signal, then switches to keyboard decryption verification process, and inputting administrator's password by keyboard realizes booting.
7. the control method of the computer booting management system according to claim 3 based on mobile phone cipher, feature exist
In if matched blue-tooth intelligence mobile phone is not detected in preset time T in step S5, TPM module control systems shift to
Keyboard decryption verification process inputs administrator's password by keyboard and realizes booting.
8. the control method of the computer booting management system according to claim 7 based on mobile phone cipher, feature exist
In the preset time T is 30~60 seconds.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710022018.5A CN106789085B (en) | 2017-01-12 | 2017-01-12 | Computer booting based on mobile phone cipher manages system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710022018.5A CN106789085B (en) | 2017-01-12 | 2017-01-12 | Computer booting based on mobile phone cipher manages system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106789085A CN106789085A (en) | 2017-05-31 |
CN106789085B true CN106789085B (en) | 2018-07-17 |
Family
ID=58947324
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710022018.5A Expired - Fee Related CN106789085B (en) | 2017-01-12 | 2017-01-12 | Computer booting based on mobile phone cipher manages system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106789085B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107358087B (en) * | 2017-07-07 | 2018-09-14 | 北京海泰方圆科技股份有限公司 | The information storage means and device of Bluetooth chip for Bluetooth identities authentication device |
CN108062467A (en) * | 2017-12-16 | 2018-05-22 | 深圳市飞马国际供应链股份有限公司 | Quick verification method, equipment and system based on bluetooth |
CN109325324A (en) * | 2018-09-29 | 2019-02-12 | 韩浩杨 | Computer booting verifies system |
CN109800554A (en) * | 2019-01-16 | 2019-05-24 | 罗继先 | A kind of safety certifying method based on fail-safe computer |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1713101A (en) * | 2005-07-12 | 2005-12-28 | 中国长城计算机深圳股份有限公司 | Computer starting up identifying system and method |
CN1755572A (en) * | 2004-09-30 | 2006-04-05 | 联想(北京)有限公司 | Computer security startup method |
CN1940871A (en) * | 2005-09-30 | 2007-04-04 | 联想(北京)有限公司 | System and method for fast starting TCPA/TCG safety computer |
CN101165696A (en) * | 2006-10-16 | 2008-04-23 | 中国长城计算机深圳股份有限公司 | Safety identification method based on safe computer |
CN203224878U (en) * | 2013-01-31 | 2013-10-02 | 齐齐哈尔医学院 | External-TPM based computer safety system |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1808457B (en) * | 2006-02-24 | 2010-05-26 | 上海方正信息安全技术有限公司 | Portable trusted device for remote dynamic management |
US7822985B2 (en) * | 2006-08-21 | 2010-10-26 | The Boeing Company | Real-time electronic signature validation systems and methods |
CN102034053A (en) * | 2010-12-31 | 2011-04-27 | 中山大学 | Computer user terminal authentication method |
CN102184352A (en) * | 2011-03-16 | 2011-09-14 | 东南大学 | Automatic protecting method for computer system based on Bluetooth device authentication |
CN202050411U (en) * | 2011-05-03 | 2011-11-23 | 深圳市超级云计算机科技有限公司 | Computer unlocking device |
CN102685330A (en) * | 2012-05-15 | 2012-09-19 | 江苏中科梦兰电子科技有限公司 | Method for logging in operation system by taking cell phone as authentication tool |
CN104143062A (en) * | 2013-05-09 | 2014-11-12 | 北京信息科技大学 | Bluetooth technology based computer system security authentication and protection method |
CN104008763A (en) * | 2014-06-05 | 2014-08-27 | 北京旅之星业新技术有限公司 | Mobile hard disk with mobile phone authentication and recognition function and using method thereof |
CN105893802A (en) * | 2016-03-29 | 2016-08-24 | 四川效率源信息安全技术股份有限公司 | Method for locking/unlocking computer screen based on Bluetooth |
CN106100848B (en) * | 2016-06-14 | 2019-02-05 | 东北大学 | Double factor identity authorization system and method based on smart phone and user password |
-
2017
- 2017-01-12 CN CN201710022018.5A patent/CN106789085B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1755572A (en) * | 2004-09-30 | 2006-04-05 | 联想(北京)有限公司 | Computer security startup method |
CN1713101A (en) * | 2005-07-12 | 2005-12-28 | 中国长城计算机深圳股份有限公司 | Computer starting up identifying system and method |
CN1940871A (en) * | 2005-09-30 | 2007-04-04 | 联想(北京)有限公司 | System and method for fast starting TCPA/TCG safety computer |
CN101165696A (en) * | 2006-10-16 | 2008-04-23 | 中国长城计算机深圳股份有限公司 | Safety identification method based on safe computer |
CN203224878U (en) * | 2013-01-31 | 2013-10-02 | 齐齐哈尔医学院 | External-TPM based computer safety system |
Also Published As
Publication number | Publication date |
---|---|
CN106789085A (en) | 2017-05-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3590225B1 (en) | System access using a mobile device | |
KR101959492B1 (en) | Methods and apparatus for user authentication and human intent verification in mobile devices | |
TWI515601B (en) | Electronic device, method for establishing and enforcing a security policy associated with anaccess control element, and secure element | |
US8700908B2 (en) | System and method for managing secure information within a hybrid portable computing device | |
US11777936B2 (en) | Friend key sharing | |
US9288192B2 (en) | System and method for securing data from a remote input device | |
US20140365781A1 (en) | Receiving a Delegated Token, Issuing a Delegated Token, Authenticating a Delegated User, and Issuing a User-Specific Token for a Resource | |
CN106789085B (en) | Computer booting based on mobile phone cipher manages system and method | |
Busold et al. | Smart keys for cyber-cars: Secure smartphone-based NFC-enabled car immobilizer | |
CN101470783B (en) | Identity recognition method and device based on trusted platform module | |
CN101072100B (en) | Authenticating system and method utilizing reliable platform module | |
KR101385929B1 (en) | Certification and storage device with multi connector and finger print sensor | |
Dmitrienko et al. | SmartTokens: Delegable access control with NFC-enabled smartphones | |
US10972262B2 (en) | Persona and device based certificate management | |
CN102136048A (en) | Mobile phone Bluetooth-based ambient intelligent computer protection device and method | |
WO2015117523A1 (en) | Access control method and device | |
US11522695B2 (en) | Sharing system access using a mobile device | |
CN115001841A (en) | Identity authentication method, identity authentication device and storage medium | |
CN103514392A (en) | Login authentication device and method of computer operation system | |
CN109977039A (en) | HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing | |
Kostiainen et al. | Towards user-friendly credential transfer on open credential platforms | |
CN104063323A (en) | Mobile terminal and equipment controlling method and system thereof | |
Murtaza et al. | A portable hardware security module and cryptographic key generator | |
CN109076337B (en) | Method for secure interaction of a user with a mobile terminal and another entity | |
KR20110030515A (en) | Security token device and method of authentication usable in smartphone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180717 Termination date: 20210112 |
|
CF01 | Termination of patent right due to non-payment of annual fee |