CN107403114A - A kind of structure and method for locking input - Google Patents
A kind of structure and method for locking input Download PDFInfo
- Publication number
- CN107403114A CN107403114A CN201710613078.4A CN201710613078A CN107403114A CN 107403114 A CN107403114 A CN 107403114A CN 201710613078 A CN201710613078 A CN 201710613078A CN 107403114 A CN107403114 A CN 107403114A
- Authority
- CN
- China
- Prior art keywords
- input
- locking
- equipment
- content
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 230000008569 process Effects 0.000 claims abstract description 29
- 238000009826 distribution Methods 0.000 claims description 23
- 230000007246 mechanism Effects 0.000 claims description 13
- 238000012545 processing Methods 0.000 claims description 7
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 claims description 5
- 230000000903 blocking effect Effects 0.000 claims description 3
- 238000002955 isolation Methods 0.000 claims description 2
- 230000001960 triggered effect Effects 0.000 claims 1
- 238000012795 verification Methods 0.000 abstract description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000009415 formwork Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 244000144985 peep Species 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- 208000008918 voyeurism Diseases 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of structure and method for locking input, applied to computer system or in the electronic system including mobile phone, including, locking module, inputted for locking system, be in the locked state disarmed state to the input of any equipment of system;Control module, locking and unblock for being inputted to system carry out logic control, by judging whether current system conditions are in a safe condition, system carries out normal device input when in a safe condition, and system is inputted by the locking module locking device during non-secure states.The structure and method of a kind of locking input of the present invention are compared with prior art, it effectively prevent and hit the attack meanses such as storehouse, avoid the loss of data caused by password is revealed, avoid the secondary verification process of complexity, effectively increase the security of system, it is practical, it is applied widely, it is easy to spread.
Description
Technical field
The present invention relates to field of information security technology, specifically one kind can be applied to computer system or mobile phone system
The structure and method of the locking input of system.
Background technology
Computer (computer) and mobile phone have turned into visual plant indispensable in routine work life, these electronic equipments
By interconnecting immediately, the approach such as information sharing improve our office efficiency, facilitate our production, life.At us
Work, production, generate substantial amounts of private data information in life and be stored in corresponding electronic equipment, how to prevent not
Method molecule peep surreptitiously, protect our information security to turn into the serious problems whole society, each field paid close attention to jointly.
Peeping surreptitiously in order to avoid other people at this stage, the most frequently used means of system are exactly to introduce user name, key authentication mechanism,
User, which wants access data, to be needed to be verified, is proved to be successful, can be accessed.
User name, key authentication mechanism are most commonly used security means at this stage, but unfortunately this authentication mechanism is simultaneously
It is dangerous, the leakage of the password of user, hitting storehouse and can easily cracking so as to log in acquisition data for malice, cause privacy information
Lose.
Current security means is as shown in Figure 1:Data information request is obtained first, then carries out cipher authentication, password again
Certification success after obtain data again, if but cipher authentication stage password leakage or malice hit storehouse, eventually maliciously attack
Enter system, so as to obtain privacy information.
To sum up describe, prior art can not meet the needs of people are for safety, and then reinforced guarantor occur
Shield strategy, wherein most commonly used is exactly re-authentication, strengthens safety to a certain extent, but is to rely on other intelligence
Electronic equipment, and whether the equipment as re-authentication can not also ensure safely in itself.For example pass through short message re-authentication, attack
Person can by pretend base station or invasion mobile phone etc. mode user unconsciously in the case of take re-authentication code and form
Work(intrusion system.
To sum up, security system is still easy to be broken, and does not prevent from effectively invading.
Based on this, a kind of scheme that can effectively improve security of system energy is needed badly.
The content of the invention
The present invention technical assignment be to be directed to above weak point, there is provided one kind can effectively improve security of system energy,
Lock the structure and method of input.
A kind of structure for locking input, applied to computer system or in the electronic system including mobile phone, its structure includes,
Locking module, inputted for locking system, any equipment input to system is in disarmed state in the locked state;
Control module, locking and unblock for being inputted to system carry out logic control, by whether judging current system conditions
In a safe condition, system carries out normal device input when in a safe condition, and system passes through the locking during non-secure states
Module locking device inputs.
Equipment for system input includes keyboard, mouse, Trackpad, network, when locking module locking system, equipment
In state is abandoned, i.e. system and equipment is mutually isolated for input.
The process of system input is:The content of equipment input first is driven by input equipment to be obtained, then passes through input
Input content is converted into the general key assignments of kernel by content processing module, and finally input content is distributed in application program;Work as lock
Cover half block lock the system equipment input when, then by by the locking module be inserted into input content distribution before, reach locking
The function of input.
The locking module is inserted into input content distribution phase by hook mechanism, is specially:Locking module is in content
A checkpoint hook point is inserted in handling process, before the handling process refers to input content distribution, according to control
The judgement of module decides whether to allow this content to continue to distribute, realizes and forbid inputting under system lock state.
The control module judges whether the process of safety is current system conditions:Whether control module will have safety means
Access system is as trigger condition, when there is safety means access system, and the safety means through safety certification after, current system
Unite in a safe condition, unlocker device, system can pass through equipment input content;When without safety means access system, or access system
The safety means of system not through safety certification after, current system is in non-secure states, locking device, and system can not pass through equipment
Input content.
The safety certification is finger print identifying, i.e., after safety means access system, checks the fingerprint of safety means itself
Whether information matches with the finger print information of typing in system, when complete matching, triggers the control module unlocker device, equipment
The content of input is normally distributed, the step of otherwise can not carrying out content distribution.
A kind of method for locking input, based on the structure of above-mentioned locking input, its implementation process is:First by controlling mould
Block judge system state whether safety, when system is in a safe condition system carry out normal device input, i.e., system with it is defeated
It is in connection status to enter equipment, equipment can normally input content to system;When system is in non-secure states, pass through locking module
Locking device inputs, by system and equipment blocking.
When system is in a safe condition, the process that system carries out normal device input is:In being inputted first by equipment
Hold;Then the content of the input is driven by input equipment and obtained, then changed input content by input content processing module
Into the general key assignments of kernel, finally input content is distributed in application program.
When system is in non-secure states, locking system makes it can not carry out the process of equipment input to be:Pass through hook
Before locking module is inserted into input content distribution by mechanism, the step of making system cannot be introduced into content distribution, so as to reach locking
The function of input.
The detailed process inserted by hook mechanism is:Locking module inserts a checkpoint before input content distribution
Hook point, to be decided whether to allow this content to continue to distribute according to the judgement of control module, realize in system lock state
Under forbid inputting.
Compared to the prior art the structure and method of a kind of locking input of the present invention, have the advantages that:
The structure and method of a kind of locking input of the present invention, the locking module in this method inserts hook in kernel module and flowed
Journey, the distribution of input is directly effectively locked, it is achieved thereby that the locking of input;Control module can be by device parameter certainly
Dynamic computing device finger print information, and independent of information such as the keys being stored in external device, it effectively prevent and hit storehouse etc. and attack
Hitter's section, the loss of data caused by password is revealed is avoided, the secondary verification process of complexity is avoided, effectively increases and be
The security of system, it is practical, it is applied widely, it is easy to spread.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
The accompanying drawing of offer obtains other accompanying drawings.
Accompanying drawing 1 is the implementation process figure of information security means in the prior art.
Accompanying drawing 2 is the specific implementation schematic diagram of structure of the present invention.
Accompanying drawing 3 is the implementing procedure figure of the inventive method.
Accompanying drawing 4 is the specific implementation flow chart of the inventive method.
Accompanying drawing 5 is the logic judgment process example figure of control module in the inventive method.
Embodiment
In order that those skilled in the art more fully understand the solution of the present invention, with reference to embodiment to this
Invention is described in further detail.Obviously, described embodiment is only part of the embodiment of the present invention, rather than all
Embodiment.Based on the embodiment in the present invention, those of ordinary skill in the art institute under the premise of creative work is not made
The every other embodiment obtained, belongs to the scope of protection of the invention.
As shown in Figure 2, a kind of structure for locking input, applied to computer system or the electronic system including mobile phone
In, its structure includes,
Locking module, inputting for locking system, any equipment input to system is in disarmed state in the locked state,
That is abandoning the input control such as input of keyboard and mouse to system in the locked state, being controlled from long-range input, do
The isolation characteristic of good system.
Control module, locking and unblock for being inputted to system carry out logic control, by judging current system conditions
Whether in a safe condition, system carries out normal device input when in a safe condition, and system passes through described during non-secure states
Locking module locking device inputs.
Equipment for system input includes keyboard, mouse, Trackpad, network, when locking module locking system, equipment
In state is abandoned, i.e. system and equipment is mutually isolated for input.
The process of system input is:The content of equipment input first is driven by input equipment to be obtained, then passes through input
Input content is converted into the general key assignments of kernel by content processing module, and finally input content is distributed in application program;Work as lock
Cover half block lock the system equipment input when, then by by the locking module be inserted into input content distribution before, reach locking
The function of input.
Below by taking input through keyboard as an example, system kernel is as follows to the general handling process of input equipment:Input through keyboardKey
Dish driving, which obtains, inputs and is converted into the general key assignments code of kernelThe processing of kernel incoming event (is such as packaged into specific lattice
Formula)Input time distributes(A file will such as be write input time)Application program obtains input information from file and (pressed
Key assignments).
The locking module is inserted into input content distribution phase by hook mechanism, is specially:Locking module is in content
A checkpoint hook point is inserted in handling process, before the handling process refers to input content distribution, according to control
The judgement of module decides whether to allow this content to continue to distribute, realizes and forbid inputting under system lock state.
The control module judges whether the process of safety is current system conditions:Whether control module will have safety means
Access system is as trigger condition, when there is safety means access system, and the safety means through safety certification after, current system
Unite in a safe condition, unlocker device, system can pass through equipment input content;When without safety means access system, or access system
The safety means of system not through safety certification after, current system is in non-secure states, locking device, and system can not pass through equipment
Input content.
The safety certification is finger print identifying, i.e., after safety means access system, checks the fingerprint of safety means itself
Whether information matches with the finger print information of typing in system, when complete matching, triggers the control module unlocker device, equipment
The content of input is normally distributed, the step of otherwise can not carrying out content distribution.
A kind of method for locking input, as shown in Figure 3, based on the structure of above-mentioned locking input, its implementation process is:
The structure of above-mentioned locking input is installed in computer system or cell phone system.
The peripheral hardware as triggering equipment is wanted in insertion, and setting for hot plug can be supported by generally comprising USB flash disk, wifi network card etc.
It is standby.
Open and interface is set, select specific triggering equipment, can the system of checking match triggers equipment.
Finally locked or unlocked.
Further, as shown in accompanying drawing 4, Fig. 5, in the method, the state for judging system by control module first is
No safety, when system is in a safe condition, system carries out normal device input, i.e., system and input equipment are in connection status, if
It is standby can normally input content to system;When system is in non-secure states, inputted by locking module locking device, by system
With equipment blocking.
When system is in a safe condition, the process that system carries out normal device input is:In being inputted first by equipment
Hold;Then the content of the input is driven by input equipment and obtained, then changed input content by input content processing module
Into the general key assignments of kernel, finally input content is distributed in application program.
When system is in non-secure states, locking system makes it can not carry out the process of equipment input to be:Pass through hook
Before locking module is inserted into input content distribution by mechanism, the step of making system cannot be introduced into content distribution, so as to reach locking
The function of input.
The detailed process inserted by hook mechanism is:Locking module inserts a checkpoint before input content distribution
Hook point, to be decided whether to allow this content to continue to distribute according to the judgement of control module, realize in system lock state
Under forbid inputting.
By inserting a specific security module into system kernel, locking system input when needed exists the present invention
Under lock-out state, any input information is all abandoned realization, main security mechanism works and kernel state, security system itself
Security is greatly improved.Even if being revealed relative to existing scheme user cipher, if system input is still locked out
State attacker still uncontrollable system, can not be by inputting password login.Cracked even if by maliciously hitting storehouse method
It can not be realized because can not be inputted to system, effectively raising security of system.Present invention, avoiding complexity again
Re-authentication mechanism(Such as short message, phone), it is therefore prevented that the possibility invaded again.
By embodiment above, the those skilled in the art can readily realize the present invention.Herein
Apply specific case to be set forth the principle and embodiment of the present invention, the explanation of above example is only intended to help
Understand the method and its core concept of the present invention.It should be pointed out that for those skilled in the art, do not taking off
On the premise of from the principle of the invention, some improvement and modification can also be carried out to the present invention, these are improved and modification also falls into this
In invention scope of the claims.
Claims (10)
- A kind of 1. structure for locking input, applied to computer system or in the electronic system including mobile phone, it is characterised in that its Structure includes,Locking module, inputted for locking system, any equipment input to system is in disarmed state in the locked state;Control module, locking and unblock for being inputted to system carry out logic control, by whether judging current system conditions In a safe condition, system carries out normal device input when in a safe condition, and system passes through the locking during non-secure states Module locking device inputs.
- 2. a kind of structure for locking input according to claim 1, it is characterised in that the equipment for system input includes Keyboard, mouse, Trackpad, network, when locking module locking system, equipment input is in abandon state, i.e. system and equipment phase Mutually isolation.
- 3. a kind of structure for locking input according to claim 1, it is characterised in that the process of system input is: The content of equipment input first is driven by input equipment to be obtained, then in by input content processing module, input content is converted into Input content, is finally distributed in application program by the general key assignments of core;When locking module locks the equipment input of the system, then Before the locking module is inserted into input content distribution, reach the function of locking input.
- 4. a kind of structure for locking input according to claim 3, it is characterised in that the locking module passes through hook machines System is inserted into input content distribution phase, is specially:Locking module inserts a checkpoint hook in content handling process Point, before the handling process refers to input content distribution, come according to the judgement of control module decide whether to allow this content after Continuous distribution, realizes and forbids inputting under system lock state.
- 5. a kind of structure for locking input according to claim 1, it is characterised in that the control module judges current system Whether the process of safety is system state:Whether control module will have safety means access system as trigger condition, when there is safety During equipment access system, and the safety means through safety certification after, current system is in a safe condition, unlocker device, system Equipment input content can be passed through;When without safety means access system, or access system safety means not through safety certification after, Current system is in non-secure states, locking device, and system can not pass through equipment input content.
- 6. a kind of structure for locking input according to claim 5, it is characterised in that the safety certification is recognized for fingerprint Card, i.e., after safety means access system, check that the finger print information of safety means itself and the finger print information of typing in system are No matching, when complete matching, the control module unlocker device is triggered, the content of equipment input is normally distributed, otherwise can not The step of carrying out content distribution.
- A kind of 7. method for locking input, it is characterised in that the structure based on above-mentioned locking input, its implementation process are:First Judge whether the state of system is safe, and system carries out normal device input when system is in a safe condition by control module, That is system and input equipment is in connection status, equipment can normally input content to system;When system is in non-secure states, lead to The input of locking module locking device is crossed, by system and equipment blocking.
- A kind of 8. method for locking input according to claim 7, it is characterised in that when system is in a safe condition, System carry out normal device input process be:Pass through equipment input content first;Then the content of the input is set by inputting Standby driving is obtained, then input content is converted into the general key assignments of kernel by input content processing module, finally by input content It is distributed in application program.
- 9. a kind of method for locking input according to claim 7, it is characterised in that when system is in non-secure states When, locking system makes it can not carry out the process of equipment input to be:Locking module is inserted into by input content by hook mechanism Before distribution, the step of making system cannot be introduced into content distribution, so as to reach the function of locking input.
- A kind of 10. method for locking input according to claim 9, it is characterised in that the tool inserted by hook mechanism Body process is:Locking module inserts a checkpoint hook point before input content distribution, according to control module Judgement decides whether to allow this content to continue to distribute, realizes and forbid inputting under system lock state.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710613078.4A CN107403114B (en) | 2017-07-25 | 2017-07-25 | Input locking structure and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710613078.4A CN107403114B (en) | 2017-07-25 | 2017-07-25 | Input locking structure and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107403114A true CN107403114A (en) | 2017-11-28 |
CN107403114B CN107403114B (en) | 2020-09-22 |
Family
ID=60401348
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710613078.4A Active CN107403114B (en) | 2017-07-25 | 2017-07-25 | Input locking structure and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107403114B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108596592A (en) * | 2018-04-19 | 2018-09-28 | 深圳鼎智通讯股份有限公司 | A kind of triggering lock machine method of intelligent terminal |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6098171A (en) * | 1998-03-31 | 2000-08-01 | International Business Machines Corporation | Personal computer ROM scan startup protection |
CN1308277A (en) * | 1999-11-01 | 2001-08-15 | 国际商业机器公司 | Method and system for improving computer safety during ROM scanning |
CN101167080A (en) * | 2005-03-23 | 2008-04-23 | 株式会社Ihc | Authentication system |
CN101379458A (en) * | 2006-01-30 | 2009-03-04 | 三洋电机株式会社 | Input device for inputting password or the like and portable telephone device having the input device |
CN101452345A (en) * | 2007-10-22 | 2009-06-10 | 得逻辑公司 | System lock |
CN101663882A (en) * | 2007-04-17 | 2010-03-03 | 诺基亚公司 | Apparatuses and methods for facilitating user designation of device functions |
CN102883037A (en) * | 2011-06-28 | 2013-01-16 | 株式会社电装 | Vehicular communication system, vehicular communication apparatus and portable terminal apparatus |
CN102971690A (en) * | 2010-07-02 | 2013-03-13 | 诺基亚公司 | An apparatus and method for detecting a rocking movement of an electronic device and execute a function in response to the detected movement |
CN103164350A (en) * | 2011-12-16 | 2013-06-19 | 国民技术股份有限公司 | Secure digital (SD) card device and method of regionally accessing SD card |
CN103186373A (en) * | 2011-12-29 | 2013-07-03 | 盛乐信息技术(上海)有限公司 | System and method for realizing hot plugging of input equipment |
-
2017
- 2017-07-25 CN CN201710613078.4A patent/CN107403114B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6098171A (en) * | 1998-03-31 | 2000-08-01 | International Business Machines Corporation | Personal computer ROM scan startup protection |
CN1308277A (en) * | 1999-11-01 | 2001-08-15 | 国际商业机器公司 | Method and system for improving computer safety during ROM scanning |
CN101167080A (en) * | 2005-03-23 | 2008-04-23 | 株式会社Ihc | Authentication system |
CN101379458A (en) * | 2006-01-30 | 2009-03-04 | 三洋电机株式会社 | Input device for inputting password or the like and portable telephone device having the input device |
CN101663882A (en) * | 2007-04-17 | 2010-03-03 | 诺基亚公司 | Apparatuses and methods for facilitating user designation of device functions |
CN101452345A (en) * | 2007-10-22 | 2009-06-10 | 得逻辑公司 | System lock |
CN102971690A (en) * | 2010-07-02 | 2013-03-13 | 诺基亚公司 | An apparatus and method for detecting a rocking movement of an electronic device and execute a function in response to the detected movement |
CN102883037A (en) * | 2011-06-28 | 2013-01-16 | 株式会社电装 | Vehicular communication system, vehicular communication apparatus and portable terminal apparatus |
CN103164350A (en) * | 2011-12-16 | 2013-06-19 | 国民技术股份有限公司 | Secure digital (SD) card device and method of regionally accessing SD card |
CN103186373A (en) * | 2011-12-29 | 2013-07-03 | 盛乐信息技术(上海)有限公司 | System and method for realizing hot plugging of input equipment |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108596592A (en) * | 2018-04-19 | 2018-09-28 | 深圳鼎智通讯股份有限公司 | A kind of triggering lock machine method of intelligent terminal |
Also Published As
Publication number | Publication date |
---|---|
CN107403114B (en) | 2020-09-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103065100B (en) | Container-based method of users to protect private data | |
US8402267B1 (en) | Security enhanced network device and method for secure operation of same | |
US20130151849A1 (en) | Device, method, and system for processing communications for secure operation of industrial control system field devices | |
CN102833066B (en) | Three-party authentication method and device as well as intelligent card supporting two-way authentication | |
Mohsin et al. | Two factor vs multi-factor, an authentication battle in mobile cloud computing environments | |
CN116362747A (en) | Block chain digital signature system | |
US8364978B2 (en) | System for and method of auto-registration with cryptographic modules | |
CN103514392A (en) | Login authentication device and method of computer operation system | |
EP3267352B1 (en) | Secure operation apparatuses and methods therefor | |
Ghorbanzadeh et al. | A survey of mobile database security threats and solutions for it | |
CN106936672A (en) | The control method and terminal of gas-fired equipment | |
CN107403114A (en) | A kind of structure and method for locking input | |
CN102098313A (en) | Waterproof wall system and authentication method thereof | |
US9262619B2 (en) | Computer system and method for protecting data from external threats | |
CN105635090B (en) | System access method, system access mechanism and terminal | |
CN107154854A (en) | A kind of unmanned plane instruction is reinforced and discrimination method and system | |
WO2009070752A1 (en) | System for and method of auto-registration with cryptographic modules | |
CN103745143B (en) | Computer protection method | |
CN114520735B (en) | User identity authentication method, system and medium based on trusted execution environment | |
CN105451225A (en) | An access authentication method and an access authentication device | |
CN103778388B (en) | A kind of safety strengthens computer system | |
CN107347077A (en) | A kind of Software security protection method and apparatus based on user right | |
CN212727070U (en) | Cross-network data safety exchange equipment | |
CN114329376A (en) | Computer starting-up identity authentication system | |
CN107563743A (en) | Lift the method and system of POS transaction securities |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200825 Address after: 215100 No. 1 Guanpu Road, Guoxiang Street, Wuzhong Economic Development Zone, Suzhou City, Jiangsu Province Applicant after: SUZHOU LANGCHAO INTELLIGENT TECHNOLOGY Co.,Ltd. Address before: 450000 Henan province Zheng Dong New District of Zhengzhou City Xinyi Road No. 278 16 floor room 1601 Applicant before: ZHENGZHOU YUNHAI INFORMATION TECHNOLOGY Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |