CN106789085B - Computer booting based on mobile phone cipher manages system and method - Google Patents

Computer booting based on mobile phone cipher manages system and method Download PDF

Info

Publication number
CN106789085B
CN106789085B CN201710022018.5A CN201710022018A CN106789085B CN 106789085 B CN106789085 B CN 106789085B CN 201710022018 A CN201710022018 A CN 201710022018A CN 106789085 B CN106789085 B CN 106789085B
Authority
CN
China
Prior art keywords
mobile phone
tpm
blue
computer
bluetooth
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201710022018.5A
Other languages
Chinese (zh)
Other versions
CN106789085A (en
Inventor
彭丽蓉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Industry Polytechnic College
Original Assignee
Chongqing Industry Polytechnic College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Industry Polytechnic College filed Critical Chongqing Industry Polytechnic College
Priority to CN201710022018.5A priority Critical patent/CN106789085B/en
Publication of CN106789085A publication Critical patent/CN106789085A/en
Application granted granted Critical
Publication of CN106789085B publication Critical patent/CN106789085B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides a kind of computer booting management system and method based on mobile phone cipher, and system includes the blue-tooth intelligence mobile phone for being equipped with the computer of TPM modules and bluetooth module and being verified for computer booting;TPM modules are used to control the scanning and matching of periphery bluetooth equipment when bluetooth module realizes computer booting, and are verified according to the MAC Address of blue-tooth intelligence mobile phone after matching, realize computer booting encryption handling;Blue-tooth intelligence mobile phone is matched for the bluetooth module with computer, and provides Bluetooth MAC address to the TPM modules.Its effect is:When booting, without manually individually entering password again, to simplify booting process, algorithm complexity is low, promotes certification speed, can note abnormalities situation in time, reduce the hardware cost of computer system.

Description

Computer booting based on mobile phone cipher manages system and method
Technical field
The present invention relates to computer technologies, in particular, being a kind of computer booting management system based on mobile phone cipher And method.
Background technology
With the development of information age, information security is paid attention to by more and more people, in people's calculating used in everyday In machine or notebook, a large amount of individual privacy or business secret are often referred to, once by people's illegal invasion, consequence can't bear to set Think.
Current Windows systems mostly use greatly simple account cipher mode, when booting, pass through authentic administrator account Realization controls computer booting permission, and one side start process is cumbersome, needs to be actively entered account and password, prolong The long available machine time;On the other hand, startup password is usually easy leakage or steals, and after other people take the startup password, still may be used With the login to leave no trace, information security is difficult to be guaranteed.
In order to increase the security performance of computer, existing computer system also proposed based on safe hard disk and credibility Organize (Trusted Computing Group, TCG) credible console module (Trusted Platform Module, TPM) two key subsystems of chip build security system.
But it is to support that existing TPM chips, which are still with cryptographic technique, and hard disk point is realized by the form of HD encryption On the one hand area's security isolation still needs when TPM chips carry out authenticating user identification and is actively entered password by input equipment Or it is actively inserted into electron key, booting process is cumbersome;On the other hand, it is difficult to obtain booting record, it is illegal to equally exist other people Obtain the risk that startup password enters system steal information.
Invention content
In view of drawbacks described above, the present invention manages system and side by a kind of computer booting based on mobile phone cipher of offer Method does not realize computer from the living habit of body in conjunction with current people's mobile phone using mobile phone as the key of computer booting certification The automatic search certification of booting, simplifies boot program, ensures information security simultaneously.
To achieve the above object, present invention firstly provides a kind of, and the computer booting based on mobile phone cipher manages system, packet The blue-tooth intelligence mobile phone for including the computer equipped with TPM modules and bluetooth module and being verified for computer booting;
The TPM modules are used to control the scanning and matching of periphery bluetooth equipment when bluetooth module realizes computer booting, And verified according to the MAC Address of blue-tooth intelligence mobile phone after matching, realize computer booting encryption handling;
The blue-tooth intelligence mobile phone, is matched for the bluetooth module with computer, and provides indigo plant to the TPM modules Tooth MAC Address.
The system makes full use of TPM modules and bluetooth module in active computer hardware system, makes in conjunction with people are daily Smart mobile phone is realized in the case where need not separately set electron key or startup password by short-range bluetooth connection Booting verification when booting, need not individually enter password or be inserted into electron key, simplify starting procedure, when the mobile phone of administrator When not within the scope of computer bluetooth connection, regard as illegally being switched on, to ensure information security.
Optionally, the TPM modules are provided with TPM controllers and TPM memories, the TPM controllers and the bluetooth Module connects, and is powered on after BIOS initialization, and the TPM memories are used for the preset blue-tooth intelligence mobile phone of storage administrator MAC Address.
Optionally, the bluetooth module uses 4.0 version of bluetooth 2.0, bluetooth 3.0 or bluetooth.
In conjunction with above system, the present invention also proposes a kind of controlling party of the computer booting management system based on mobile phone cipher Method is carried out essentially according to following steps:
S1:System boot powers on;
S2:BIOS initialization;
S3:TPM modules are initialized with bluetooth module;
S4:TPM modules control bluetooth module and scan periphery bluetooth equipment;
S5:Judge whether to match with blue-tooth intelligence mobile phone, if it is, S6 is entered step,;Otherwise, bluetooth is opened in prompt Smart mobile phone and return to step S4;
S6:The MAC Address that TPM modules obtain blue-tooth intelligence mobile phone is verified, and judges whether to belong to what administrator prestored Blue-tooth intelligence mobile phone MAC Address, if so, entering step S7;Otherwise, matched blue-tooth intelligence mobile phone is pulled in into blacklist In, return to step S4 cycles execute;
S7:Password authentification passes through, os starting.
Optionally, the TPM modules are provided with TPM controllers and TPM memories, the blue-tooth intelligence hand to prestore in step S6 Machine MAC Address is stored in the TPM memories.
Optionally, the blue-tooth intelligence mobile phone MAC Address to prestore in step S6 registers storage according to the following steps:
S61:In the case where operating system normally starts, administrator's registration procedure is entered by account management;
S62:It inputs administrator's password and whether authentic administrator password is correct, not verified then prompt cipher mistake, S63 is then entered step by verification;
S63:TPM controllers control bluetooth module and scan periphery bluetooth equipment;
S64:Selection blue-tooth intelligence mobile phone is matched;
S65:Read blue-tooth intelligence mobile phone MAC Address after matching;
S66:It will be in the MAC Address storage to TPM memories acquired in step S65;
S67:Administrator, which registers, to complete.
Optionally, decryption mode switch key is set on computer keyboard, and after BIOS initialization, TPM modules detect Decryption mode switch key continuously presses signal, then switches to keyboard decryption verification process, and it is real to input administrator's password by keyboard Now it is switched on.
Optionally, if matched blue-tooth intelligence mobile phone, TPM modules are not detected in preset time T in step S5 Control system shifts to keyboard decryption verification process, and inputting administrator's password by keyboard realizes booting.
Optionally, the preset time T is 30~60 seconds.
Compared with prior art, technical solution provided by the present application, the technique effect or advantage having are:
(1) on the basis of existing keyboard decryption verification pattern, it is additionally arranged cellphone deciphering Validation Mode, is carried as user When mobile phone is in computer bluetooth communications range, by actively shaking hands, the automatic Bluetooth MAC address that obtains is used as key authentication, opens When machine, without manually individually entering password again, to simplify booting process.
(2) selection bluetooth cellular phone MAC Address is verified, and is on the one hand combined current people's mobile phone and is not practised from the use of body It is used, it is ensured that people exists in key;On the other hand, the complexity that can reduce decipherment algorithm is straight by the MAC Address to prestore with system Connect comparison, you can be verified as a result, algorithm complexity is low, promote certification speed.
(3) intelligent characteristic of current smart mobile phone is combined, bluetooth, which is shaken hands, each time can retain record of shaking hands, and be convenient for user Real time inspection and management booting record, note abnormalities situation in time.
(4) the universal situation for combining smart mobile phone, makes full use of smart mobile phone existing capability, can not have to that it is separately configured Its electron key reduces the hardware cost of computer system.
Description of the drawings
Fig. 1 is the control flow chart proposed by the present invention that computer booting management is carried out based on mobile phone cipher;
Fig. 2 is control flow chart when administrator registers in the present invention.
Specific implementation mode
In order to better understand the above technical scheme, in conjunction with appended figures and specific embodiments, it is right Above-mentioned technical proposal is described in detail.
The present embodiment discloses a kind of computer booting management system based on mobile phone cipher first, including is equipped with TPM modules With the computer of bluetooth module and for the blue-tooth intelligence mobile phone of computer booting verification;
The TPM modules are used to control the scanning and matching of periphery bluetooth equipment when bluetooth module realizes computer booting, And verified according to the MAC Address of blue-tooth intelligence mobile phone after matching, realize computer booting encryption handling;
The blue-tooth intelligence mobile phone, is matched for the bluetooth module with computer, and provides indigo plant to the TPM modules Tooth MAC Address.
In implementation process, the TPM modules are provided with TPM controllers and TPM memories, the TPM controllers with it is described Bluetooth module connects, and is powered on after BIOS initialization, and the TPM memories are used for the preset blue-tooth intelligence hand of storage administrator Machine MAC Address, the bluetooth module use bluetooth 2.0, bluetooth 3.0 or 4.0 version of bluetooth can be with.
As shown in Figure 1, in the present embodiment, the control method of above system follows the steps below:
S1:System boot powers on;
S2:BIOS initialization;
S3:TPM modules are initialized with bluetooth module;
S4:TPM modules control bluetooth module and scan periphery bluetooth equipment;
S5:Judge whether to match with blue-tooth intelligence mobile phone, if it is, S6 is entered step,;Otherwise, bluetooth is opened in prompt Smart mobile phone and return to step S4;
S6:The MAC Address that TPM modules obtain blue-tooth intelligence mobile phone is verified, and judges whether that belonging to administrator is pre-stored in Blue-tooth intelligence mobile phone MAC Address in TPM memories, if so, entering step S7;Otherwise, by matched blue-tooth intelligence hand Machine pulls in blacklist, and return to step S4 cycles execute;
S7:Password authentification passes through, os starting.
As shown in Fig. 2, the blue-tooth intelligence mobile phone MAC Address to prestore in step S6 registers storage according to the following steps:
S61:In the case where operating system normally starts, administrator's registration procedure is entered by account management;
S62:It inputs administrator's password and whether authentic administrator password is correct, not verified then prompt cipher mistake, S63 is then entered step by verification;
S63:TPM controllers control bluetooth module and scan periphery bluetooth equipment;
S64:Selection blue-tooth intelligence mobile phone is matched;
S65:Read blue-tooth intelligence mobile phone MAC Address after matching;
S66:It will be in the MAC Address storage to TPM memories acquired in step S65;
S67:Administrator, which registers, to complete.
In order to realize the switching of certification mode on the basis of original power on mode, the setting decryption mould on computer keyboard Formula switch key, after BIOS initialization, TPM modules detect that decryption mode switch key continuously presses signal, then switch to keyboard Decryption verification process inputs administrator's password by keyboard and realizes booting.
In order to keep original pattern, if be not detected in preset time T (T=30~60 second) matched in step S5 Blue-tooth intelligence mobile phone, then TPM module control systems shift to keyboard decryption verification process, pass through keyboard input administrator's password realize Booting.
Description based on above-described embodiment, operation principle of the invention and remarkable result are:
By modifying to existing computer booting startup program, since system is provided with TPM modules and bluetooth mould Block, it is preferential to start TPM modules and bluetooth module after the completion of BIOS initialization, certification is booted up using TPM modules, is utilized Transmission channel of the bluetooth module as authentication information, certification object are the preconfigured blue-tooth intelligence mobile phone of administrator, pass through meter Calculation machine bluetooth module, active scan periphery bluetooth equipment, and obtain can matching unit MAC Address, have uniquely represent meaning MAC Address as verification target, the speed that TPM modules are verified is ensure that, when booting, as long as the mobile phone of administrator is in Within the scope of bluetooth connection, then computer can Auto Power On, avoid being manually entered password or be manually inserted into other electronic keys Cumbersome flow, starting up's speed is fast, and the security performance of equipment is also guaranteed.
At the same time, TPM moulds TPM memories in the block are additionally operable to authentication information when storage is switched on each time, and intelligence is eventually End can also preserve Bluetooth matching information each time in its memory, and after being switched on certification each time, intelligent terminal can be with Last time booting verification process is looked back and veritified, discovers whether that there are abnormal login situations in time, will illegally enter in time The bluetooth equipment invaded pulls in blacklist, to promote security protection performance.
Finally it is pointed out that above description is not limitation of the present invention, and the present invention is also not limited to above-mentioned Citing, what those skilled in the art were made in the essential scope of the present invention changes, is modified, adds or replaces It changes, should also belong to the scope of protection of the present invention.

Claims (8)

1. a kind of computer booting based on mobile phone cipher manages system, which is characterized in that including being equipped with TPM modules and bluetooth mould The computer of block and the blue-tooth intelligence mobile phone verified for computer booting;
The TPM modules are used to control the scanning and matching of periphery bluetooth equipment when bluetooth module realizes computer booting, and root It is verified according to the MAC Address of blue-tooth intelligence mobile phone after matching, realizes computer booting encryption handling;
The blue-tooth intelligence mobile phone, is matched for the bluetooth module with computer, and provides bluetooth to the TPM modules MAC Address;
The TPM modules are provided with TPM controllers and TPM memories, and the TPM controllers are connect with the bluetooth module, and It is powered on after BIOS initialization, the TPM memories are used for the preset blue-tooth intelligence mobile phone MAC Address of storage administrator.
2. the computer booting according to claim 1 based on mobile phone cipher manages system, which is characterized in that the bluetooth Module uses 4.0 version of bluetooth 2.0, bluetooth 3.0 or bluetooth.
3. the control method of the computer booting management system based on mobile phone cipher as described in claim 1, it is characterised in that It follows the steps below:
S1:System boot powers on;
S2:BIOS initialization;
S3:TPM modules are initialized with bluetooth module;
S4:TPM modules control bluetooth module and scan periphery bluetooth equipment;
S5:Judge whether to match with blue-tooth intelligence mobile phone, if it is, S6 is entered step,;Otherwise, blue-tooth intelligence is opened in prompt Mobile phone and return to step S4;
S6:The MAC Address that TPM modules obtain blue-tooth intelligence mobile phone is verified, and judges whether to belong to the bluetooth that administrator prestores Smart mobile phone MAC Address, if so, entering step S7;Otherwise, matched blue-tooth intelligence mobile phone is pulled in blacklist, is returned Step S4 cycles are returned to execute;
S7:Password authentification passes through, os starting.
4. the control method of the computer booting management system according to claim 3 based on mobile phone cipher, feature exist In the TPM modules are provided with TPM controllers and TPM memories, and the blue-tooth intelligence mobile phone MAC Address to prestore in step S6 is deposited Storage is in the TPM memories.
5. the control method of the computer booting management system according to claim 4 based on mobile phone cipher, feature exist In the blue-tooth intelligence mobile phone MAC Address to prestore in step S6 registers storage according to the following steps:
S61:In the case where operating system normally starts, administrator's registration procedure is entered by account management;
S62:It inputs administrator's password and whether authentic administrator password is correct, not verified then prompt cipher mistake passes through Verification then enters step S63;
S63:TPM controllers control bluetooth module and scan periphery bluetooth equipment;
S64:Selection blue-tooth intelligence mobile phone is matched;
S65:Read blue-tooth intelligence mobile phone MAC Address after matching;
S66:It will be in the MAC Address storage to TPM memories acquired in step S65;
S67:Administrator, which registers, to complete.
6. the control method of the computer booting management system according to claim 3 based on mobile phone cipher, feature exist In the setting decryption mode switch key on computer keyboard, after BIOS initialization, TPM modules detect that decryption mode switches Key continuously presses signal, then switches to keyboard decryption verification process, and inputting administrator's password by keyboard realizes booting.
7. the control method of the computer booting management system according to claim 3 based on mobile phone cipher, feature exist In if matched blue-tooth intelligence mobile phone is not detected in preset time T in step S5, TPM module control systems shift to Keyboard decryption verification process inputs administrator's password by keyboard and realizes booting.
8. the control method of the computer booting management system according to claim 7 based on mobile phone cipher, feature exist In the preset time T is 30~60 seconds.
CN201710022018.5A 2017-01-12 2017-01-12 Computer booting based on mobile phone cipher manages system and method Expired - Fee Related CN106789085B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710022018.5A CN106789085B (en) 2017-01-12 2017-01-12 Computer booting based on mobile phone cipher manages system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710022018.5A CN106789085B (en) 2017-01-12 2017-01-12 Computer booting based on mobile phone cipher manages system and method

Publications (2)

Publication Number Publication Date
CN106789085A CN106789085A (en) 2017-05-31
CN106789085B true CN106789085B (en) 2018-07-17

Family

ID=58947324

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710022018.5A Expired - Fee Related CN106789085B (en) 2017-01-12 2017-01-12 Computer booting based on mobile phone cipher manages system and method

Country Status (1)

Country Link
CN (1) CN106789085B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107358087B (en) * 2017-07-07 2018-09-14 北京海泰方圆科技股份有限公司 The information storage means and device of Bluetooth chip for Bluetooth identities authentication device
CN108062467A (en) * 2017-12-16 2018-05-22 深圳市飞马国际供应链股份有限公司 Quick verification method, equipment and system based on bluetooth
CN109325324A (en) * 2018-09-29 2019-02-12 韩浩杨 Computer booting verifies system
CN109800554A (en) * 2019-01-16 2019-05-24 罗继先 A kind of safety certifying method based on fail-safe computer

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1713101A (en) * 2005-07-12 2005-12-28 中国长城计算机深圳股份有限公司 Computer starting up identifying system and method
CN1755572A (en) * 2004-09-30 2006-04-05 联想(北京)有限公司 Computer security startup method
CN1940871A (en) * 2005-09-30 2007-04-04 联想(北京)有限公司 System and method for fast starting TCPA/TCG safety computer
CN101165696A (en) * 2006-10-16 2008-04-23 中国长城计算机深圳股份有限公司 Safety identification method based on safe computer
CN203224878U (en) * 2013-01-31 2013-10-02 齐齐哈尔医学院 External-TPM based computer safety system

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1808457B (en) * 2006-02-24 2010-05-26 上海方正信息安全技术有限公司 Portable trusted device for remote dynamic management
US7822985B2 (en) * 2006-08-21 2010-10-26 The Boeing Company Real-time electronic signature validation systems and methods
CN102034053A (en) * 2010-12-31 2011-04-27 中山大学 Computer user terminal authentication method
CN102184352A (en) * 2011-03-16 2011-09-14 东南大学 Automatic protecting method for computer system based on Bluetooth device authentication
CN202050411U (en) * 2011-05-03 2011-11-23 深圳市超级云计算机科技有限公司 Computer unlocking device
CN102685330A (en) * 2012-05-15 2012-09-19 江苏中科梦兰电子科技有限公司 Method for logging in operation system by taking cell phone as authentication tool
CN104143062A (en) * 2013-05-09 2014-11-12 北京信息科技大学 Bluetooth technology based computer system security authentication and protection method
CN104008763A (en) * 2014-06-05 2014-08-27 北京旅之星业新技术有限公司 Mobile hard disk with mobile phone authentication and recognition function and using method thereof
CN105893802A (en) * 2016-03-29 2016-08-24 四川效率源信息安全技术股份有限公司 Method for locking/unlocking computer screen based on Bluetooth
CN106100848B (en) * 2016-06-14 2019-02-05 东北大学 Double factor identity authorization system and method based on smart phone and user password

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1755572A (en) * 2004-09-30 2006-04-05 联想(北京)有限公司 Computer security startup method
CN1713101A (en) * 2005-07-12 2005-12-28 中国长城计算机深圳股份有限公司 Computer starting up identifying system and method
CN1940871A (en) * 2005-09-30 2007-04-04 联想(北京)有限公司 System and method for fast starting TCPA/TCG safety computer
CN101165696A (en) * 2006-10-16 2008-04-23 中国长城计算机深圳股份有限公司 Safety identification method based on safe computer
CN203224878U (en) * 2013-01-31 2013-10-02 齐齐哈尔医学院 External-TPM based computer safety system

Also Published As

Publication number Publication date
CN106789085A (en) 2017-05-31

Similar Documents

Publication Publication Date Title
EP3590225B1 (en) System access using a mobile device
KR101959492B1 (en) Methods and apparatus for user authentication and human intent verification in mobile devices
TWI515601B (en) Electronic device, method for establishing and enforcing a security policy associated with anaccess control element, and secure element
US8700908B2 (en) System and method for managing secure information within a hybrid portable computing device
US11777936B2 (en) Friend key sharing
US9288192B2 (en) System and method for securing data from a remote input device
US20140365781A1 (en) Receiving a Delegated Token, Issuing a Delegated Token, Authenticating a Delegated User, and Issuing a User-Specific Token for a Resource
CN106789085B (en) Computer booting based on mobile phone cipher manages system and method
Busold et al. Smart keys for cyber-cars: Secure smartphone-based NFC-enabled car immobilizer
CN101470783B (en) Identity recognition method and device based on trusted platform module
CN101072100B (en) Authenticating system and method utilizing reliable platform module
KR101385929B1 (en) Certification and storage device with multi connector and finger print sensor
Dmitrienko et al. SmartTokens: Delegable access control with NFC-enabled smartphones
US10972262B2 (en) Persona and device based certificate management
CN102136048A (en) Mobile phone Bluetooth-based ambient intelligent computer protection device and method
WO2015117523A1 (en) Access control method and device
US11522695B2 (en) Sharing system access using a mobile device
CN115001841A (en) Identity authentication method, identity authentication device and storage medium
CN103514392A (en) Login authentication device and method of computer operation system
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
Kostiainen et al. Towards user-friendly credential transfer on open credential platforms
CN104063323A (en) Mobile terminal and equipment controlling method and system thereof
Murtaza et al. A portable hardware security module and cryptographic key generator
CN109076337B (en) Method for secure interaction of a user with a mobile terminal and another entity
KR20110030515A (en) Security token device and method of authentication usable in smartphone

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180717

Termination date: 20210112

CF01 Termination of patent right due to non-payment of annual fee