CN107423627A - The time slot scrambling and electronic equipment of a kind of electronic equipment - Google Patents

The time slot scrambling and electronic equipment of a kind of electronic equipment Download PDF

Info

Publication number
CN107423627A
CN107423627A CN201710666816.1A CN201710666816A CN107423627A CN 107423627 A CN107423627 A CN 107423627A CN 201710666816 A CN201710666816 A CN 201710666816A CN 107423627 A CN107423627 A CN 107423627A
Authority
CN
China
Prior art keywords
password
electronic equipment
module
bios
memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710666816.1A
Other languages
Chinese (zh)
Inventor
靳铁强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Lianbao Information Technology Co Ltd
Original Assignee
Hefei Lianbao Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Lianbao Information Technology Co Ltd filed Critical Hefei Lianbao Information Technology Co Ltd
Priority to CN201710666816.1A priority Critical patent/CN107423627A/en
Publication of CN107423627A publication Critical patent/CN107423627A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses the time slot scrambling of a kind of electronic equipment and electronic equipment, this method includes:The first operation to the electronic equipment is detected, and the legitimacy of the described first operation is judged;When the described first operation is illegal, the electronic equipment is subjected to power-off operation, and generates first password, so that the memory of the electronic equipment to be encrypted using the first password;The first password is stored in the BIOS of the electronic equipment.The time slot scrambling can ensure to shut down and lock the memory (such as hard disc of computer) of electronic equipment when carrying out illegal operation to electronic equipments such as computers in time, disabled user is avoided persistently to carry out unauthorized access to electronic equipments such as computers, and ensure that disabled user can not obtain the data in memory by technological means, improve the message protection ability of the electronic equipments such as computer, it is ensured that the safety of the electronic equipment such as computer.

Description

The time slot scrambling and electronic equipment of a kind of electronic equipment
Technical field
The present invention relates to the time slot scrambling and electronics of the safety protection field of electronic equipment, more particularly to a kind of electronic equipment Equipment.
Background technology
Password is set to protect the safety of the electronic equipments such as the computer, usual user's meeting to electronic equipments such as computers Password (such as window password) is set in the operating system of the electronic equipments such as computer, but the guard method can be by him People is by repeatedly attempting to crack, or by disassembling and utilizing the memory (such as hard disk) of the electronic equipments such as computer Miscellaneous equipment reads the method for data that is stored in memory to steal data, and security is low.
The content of the invention
The purpose of the embodiment of the present invention is the time slot scrambling and electronic equipment for providing a kind of electronic equipment, and this method can Ensure to shut down and lock the memory of electronic equipment when carrying out illegal operation to electronic equipments such as computers in time that (such as computer is hard Disk), it is ensured that the safety of the electronic equipment such as computer.
In order to solve the above-mentioned technical problem, the embodiment of the present invention employs following technical scheme:The guarantor of a kind of electronic equipment Decryption method, including:
The first operation to the electronic equipment is detected, and the legitimacy of the described first operation is judged;
When the described first operation is illegal, the electronic equipment is subjected to power-off operation, and generates first password, with profit The memory of the electronic equipment is encrypted with the first password;
The first password is stored in the BIOS of the electronic equipment.
Preferably, the operating system of the electronic equipment is provided with the second password, described detecting is set to the electronics Standby first operation, and judgement is carried out to the legitimacy of the described first operation included:
Detecting judges first behaviour when inputting number and reaching preset times for the input number of second password As illegal operation.
Preferably, described carry out power-off operation when the described first operation is illegal by the electronic equipment, and it is raw Into first password, with the memory of the electronic equipment is encrypted using the first password including:
System management interrupt is triggered when the described first operation is illegal, interrupt function closes to the electronic equipment Machine operates, and generates the first password at random;
The hard disk of the electronic equipment is locked using the first password.
Preferably, the BIOS that the first password is stored in the electronic equipment includes:
The first password is stored in the protection zone of the BIOS ROM, and behaviour is hidden to the first password Make, to avoid illegally obtaining the first password.
Preferably, methods described also includes:
The 3rd password is preset in the BIOS;
The first password is obtained from the BIOS using the 3rd password, so that behaviour is decrypted to the memory Make.
The embodiment of the present invention additionally provides a kind of electronic equipment, including detecting module, judge module, control module and storage Module;
The detecting module is connected with judge module, and the detecting module is configured to detecting to the first of the electronic equipment Operation, so that the judge module is judged the legitimacy of the described first operation;
The control module is connected with judge module, and the control module is configured to when the described first operation is illegal, The electronic equipment is subjected to power-off operation, and generates first password, to utilize the first password to the electronic equipment Memory is encrypted;
The memory module is connected with control module, and the memory module is configured to the first password being stored in described In the BIOS of electronic equipment.
Preferably, the operating system of the electronic equipment is provided with the second password, the detecting module further configures To detect the input number for second password, when input number reaches preset times, the judge module judges institute It is illegal operation to state the first operation.
Preferably, the control module includes HD encryption unit, the control module is further configured to when described First operation for it is illegal when trigger system management interrupt, carry out power-off operation of the interrupt function to the electronic equipment, and at random The first password is generated, so that the HD encryption unit is carried out using the first password to the hard disk of the electronic equipment Locking.
Preferably, the memory module is further configured to the first password being stored in the guarantor of the BIOS ROM Protect in area, and operation is hidden to the first password, to avoid illegally obtaining the first password.
Preferably, the password that the electronic equipment also includes to preset the 3rd password in the BIOS obtains mould Block, the password acquisition module are connected with the BIOS, and the password acquisition module is configured to utilize the 3rd password from institute State and the first password is obtained in BIOS, so that operation is decrypted to the memory.
The beneficial effect of the embodiment of the present invention is:The time slot scrambling can ensure non-to the progress of the electronic equipments such as computer Method is shut down when operating and locks the memory (such as hard disc of computer) of electronic equipment in time, avoids disabled user persistently to computer Unauthorized access is carried out Deng electronic equipment, and ensures that disabled user can not obtain the data in memory by technological means, is carried The message protection ability of the electronic equipments such as high computer, it is ensured that the safety of the electronic equipment such as computer.
Brief description of the drawings
Fig. 1 is the flow chart of the time slot scrambling of the electronic equipment of the embodiment of the present invention;
Fig. 2 be the embodiment of the present invention Fig. 1 in step S2 flow chart;
Fig. 3 is a kind of structured flowchart of electronic equipment of the embodiment of the present invention;
Fig. 4 is the electronic equipment another kind structured flowchart of the embodiment of the present invention.
Description of reference numerals
1- detecting module 2- judge module 3- control modules
4- memory module 5-BIOS 6- hard disks
7- input equipment 8- third party softwares
Embodiment
To make those skilled in the art more fully understand the present invention, embodiments of the invention are carried out with reference to the accompanying drawings detailed Describe in detail bright but not as a limitation of the invention.
The time slot scrambling of a kind of electronic equipment of the embodiment of the present invention, protecting information safety can be carried out to electronic equipment, As shown in figure 1, with reference to Fig. 4, the time slot scrambling includes:
S1, the first operation to electronic equipment is detected, and the legitimacy of the first operation is judged.First operation can Think the operation to the electronic equipments such as computer input password, the operation of password is such as inputted before operating system is entered;Can also Other operations carried out for the software to electronic equipments such as computers or hardware, such as attack or unauthorized access of the virus to computer Deng.Setting to first operation can be set according to the service condition of reality.Sentence in the legitimacy to the first operation It can be preset when disconnected according to the concrete condition of the first operation, such as judge the errors number of input password, or it is soft by third party Part 8 (such as antivirus software) judged, as the computer by the attack of virus if judge the first operation (virus attack) To be illegal.
S2, when the first operation for it is illegal when, electronic equipment is subjected to power-off operation, and generate first password, to utilize the The memory of electronic equipment is encrypted one password.By electronic equipment shutdown disabled user can be avoided for decryption and Carry out the trial of repeatedly input password, can also avoid it is lasting other rogue attacks are carried out to electronic equipment, increase cracks The time cost of password, increase crack difficulty.Now in order to increase the protection to memory, it is also necessary to first password is generated, with The memory (hard disk 6 of such as computer) of electronic equipment is encrypted, even if ensureing that disabled user disassembles memory, It can not be realized reading the operation of the data in the memory and (be also required to when reading the memory using other electronic equipments Memory can be read using first password).The operation for generating first password can be random generation, also may be used To be generated according to default rule, specific character string etc. can also be redefined for.
S3, first password is stored in the BIOS 5 of electronic equipment.First password can be stored in BIOS 5 ROM It is interior and do hiding processing, such as replace with * or origin the character string of first password so that other users can not access this The actual value of one password.If validated user is wanted to obtain first password from the BIOS 5 and can accessed with by other means BIOS 5 simultaneously obtains first password, and the mode of first password is obtained from BIOS 5 and will be then described in detail.
In one embodiment of the invention, the operating system of electronic equipment is provided with the second password, described detecting pair Electronic equipment first operation, and to first operation legitimacy judge the step of include:
Detecting is directed to input number during the second Password Input mistake, judges when inputting number and reaching preset times First operation is illegal operation.Second password can be its when operating system password can also be electronic equipment start His password, user enter operating system and the checking by the second password are had to during using electronic equipment, input the second password Number excessively to be likely to the user be disabled user to explanation, it does not know the second password so being tasted constantly input Examination, in the present embodiment, the number for inputting the second password is preset, when the number for inputting the second password reaches preset times When may determine that the user is disabled user, its trial of the password of input second carried out is illegal operation.
In one embodiment of the invention, it is as shown in Fig. 2 described when the first operation is illegal, by electronic equipment Power-off operation is carried out, and generates first password, to be wrapped the step of the memory of electronic equipment is encrypted using first password Include:
S21, system management interrupt (SMI, System Management is triggered when the first operation is illegal Interrupt), interrupt function (SMI call back function) carries out power-off operation to electronic equipment, and generates at random First password.BIOS 5 can avoid operating system to perform some important procedures using system management interrupt, such as renewal, cause Energy, forbidden energy advanced configuration and power supply interface or injection error-correcting code etc., therefore utilized when the first operation is illegal and trigger system System management interrupt (SMI, System Management Interrupt) can prevent disabled user from entering operating system, and right Electronic equipment carries out power-off operation, avoids disabled user from carrying out the first operation to electronic equipment again, while generate first at random Password, due to being randomly generated so that first password dynamically changes, add the difficulty being cracked.
S22, the hard disk 6 of electronic equipment is locked using first password.In one embodiment, electronic equipment is meter Calculation machine, memory are the hard disk 6 of computer, and hard disk 6 can be by using other calculating in the case where not setting harddisk password Machine reads the content in the hard disk 6, if locked using first password to hard disk 6, regardless of whether hard disk 6 is dismantled Get off or other are operated, be required for that the data in hard disk 6 could be read using first password.Effectively protect and deposited in hard disk 6 The safety of the data of storage.
In one embodiment of the invention, step first password being stored in the BIOS 5 of electronic equipment Including:
First password is stored in BIOS ROM protection zone, and operation is hidden to first password, it is non-to avoid Method obtains first password.BIOS ROM are the memory inside BIOS 5, and protection zone is located in the memory, due to protection zone Protection zone can not be accessed for special area general user, such as by sightless mode user can be prevented to access the protection Area, first password is stored in protection zone and does hiding operation, accordingly even when technical professional can not into protection zone First password is seen, so as to avoid illegally obtaining first password.
In one embodiment of the invention, the time slot scrambling also includes:S4, the 3rd password is preset in BIOS 5. S5, first password is obtained from BIOS 5 using the 3rd password, memory to be decrypted operation.
3rd password is for password set BIOS 5 itself, is all or part of data letter for accessing BIOS 5 The password of input required for breath.In one embodiment, an option is set in BIOS SETUP, for enabling or forbidding (ENABLE/DISABLE) secrecy sets this functionality, when user needs to enable secrecy setting this functionality, has clicked on and has enabled Afterwards, one the 3rd password (being properly termed as super code) of user preset can be guided, the effect of this 3rd password is for showing Show first password, first password is existed as a hide items in BIOS SETUP, to show it, it is necessary to Correct 3rd password must be inputted, so that user gets first password, so as to decrypting data (hard disk 6).In addition one In individual embodiment, to set operating system password can also be allowed defeated by the 3rd password in the option that BIOS SETUP are set Errors number entered etc..
The embodiment of the present invention additionally provides a kind of electronic equipment, can carry out security protection to the information of storage, such as Fig. 3 and Shown in Fig. 4, the electronic equipment includes detecting module 1, judge module 2, control module 3 and memory module 4.
Detecting module 1 is connected with judge module 2, and detecting module 1 is configured to first operation of the detecting to electronic equipment, so that Judge module 2 is judged the legitimacy of the first operation.First operation can be to use the defeated of the electronic equipments such as computer Enter the operation that equipment 7 input password, the operation of password is such as inputted before operating system is entered;Can also be to computer etc. Other operations that the software or hardware of electronic equipment are carried out, such as attack or unauthorized access of the virus to computer.To this first The setting of operation can be set according to the service condition of reality.Judge module 2 judges in the legitimacy to the first operation When can be preset according to the concrete condition of the first operation, such as judge the errors number of input password, or pass through third party software 8 (such as antivirus software) is judged, as the computer by virus attack if judge the first operation (virus attack) to be non- Method.
Control module 3 is connected with judge module 2, and control module 3 is configured to when the first operation is illegal, by electronic equipment Power-off operation is carried out, and generates first password, so that the memory of electronic equipment to be encrypted using first password.Control module Electronic equipment shutdown can be avoided disabled user from carrying out the multiple trial for inputting password for decryption by 3, can also be kept away What hand-free continued carries out other rogue attacks to electronic equipment, increases the time cost of decryption, and increase cracks difficulty.Now In order to increase the protection to memory, control module 3 also needs to generate first password, by the memory to electronic equipment (as in terms of The hard disk 6 of calculation machine) it is encrypted, even if ensureing that disabled user disassembles memory, read using other electronic equipments The operation of data in the memory can not realize that (being also required to when reading the memory can be to depositing using first password Reservoir is read).The operation that control module 3 generates first password can be random generation, can also be according to default Rule generation, can also be redefined for specific character string etc..
Memory module 4 is connected with control module 3, and memory module 4 is configured to first password being stored in electronic equipment In BIOS 5.First password can be stored in BIOS5 ROM and do hiding processing by memory module 4, such as with * or origin Instead of the character string of first password, so that other users can not access the actual value of the first password.If validated user BIOS 5 can be accessed and be obtained first password with by other means by wanting to obtain first password from BIOS 5, from BIOS 5 The middle mode for obtaining first password will be then described in detail.
In one embodiment of the invention, the operating system of electronic equipment is provided with the second password, and detecting module 1 enters one Step is configured to input number of the detecting for the second password, and when input number reaches preset times, judge module 2 judges first Operate as illegal operation.Second password can be other passwords when operating system password can also be electronic equipment start, User enters operating system and the checking by the second password is had to during using electronic equipment, inputs the number mistake of the second password It is disabled user that more explanations, which are likely to the user, and it does not know the second password so being attempted carrying out constantly input, in this reality Apply in example, the number for inputting the second password is preset, the number that the second password of input is detected when detecting module 1 reaches pre- If during number, judge module 2 may determine that the user is disabled user, the trial of its password of input second carried out is illegal behaviour Make.
In one embodiment of the invention, control module 3 includes HD encryption unit, and control module 3 further configures To trigger system management interrupt (SMI, System Management Interrupt) when the first operation is illegal, letter is interrupted Carry out power-off operation of the number (SMI call back function) to electronic equipment, and first password is generated at random, so that firmly Disk ciphering unit is locked using first password to the hard disk 6 of electronic equipment, and the first password of generation is stored in into BIOS ROM protection zone.BIOS 5 can avoid operating system to perform some important procedures using system management interrupt, such as more Newly, enable, forbidden energy advanced configuration and power supply interface or injection error-correcting code etc., therefore control module 3 is non-in the first operation Disabled user can be prevented to enter using triggering system management interrupt (SMI, System Management Interrupt) during method Operating system, and power-off operation is carried out to electronic equipment, avoid disabled user from carrying out the first operation to electronic equipment again, simultaneously Random generation first password, due to being randomly generated so that first password dynamically changes, add the difficulty being cracked.One In individual embodiment, electronic equipment is computer, and memory is the hard disk 6 of computer, and hard disk 6 is not setting the situation of harddisk password The content in the hard disk 6 can be read by using other computers down, if HD encryption unit utilizes first password pair Hard disk 6 is locked, then regardless of whether hard disk 6 is disassembled or other operations, is required for read using first password Take the data in hard disk 6.Effectively protect the safety of the data stored in hard disk 6.
In one embodiment of the invention, memory module 4 is further configured to first password being stored in BIOS ROM Protection zone in, and operation is hidden to first password, to avoid illegally obtaining first password.BIOS ROM are in BIOS 5 The memory in portion, and protection zone is located in the memory, because protection zone is that special area general user can not access protection Area, such as user can be prevented to access the protection zone by sightless mode, first password is stored in protection zone by memory module 4 In and do hiding operation, it is non-so as to avoid accordingly even when technical professional, which enters protection zone, can not see first password Method obtains first password.
In one embodiment of the invention, electronic equipment also includes the password that the 3rd password can be preset in BIOS 5 Acquisition module, password acquisition module are connected with BIOS 5, and password acquisition module is configured to obtain from BIOS 5 using the 3rd password First password is taken, memory to be decrypted operation.3rd password is for password set BIOS 5 itself, is to visit The password of input required for asking BIOS 5 all or part of data message.In one embodiment, set in BIOS SETUP An option is put, for enabling or forbidding (ENABLE/DISABLE) password acquisition module, when user needs to enable password acquisition During module, click on after enabling, one the 3rd password (being properly termed as super code) of user preset can be guided, password obtains mould Block can make BIOS 5 show first password by the 3rd password, and first password is hidden as one in BIOS SETUP Item is present, to show it, it is necessary to must be directed to password acquisition module and input correct 3rd password, so as to pass through password Acquisition module makes user get first password, so as to decrypting data (hard disk 6).In addition in one embodiment, in BIOS Errors number of permission operating system Password Input etc. can also be set by the 3rd password in the option that SETUP is set.
Above example is only the exemplary embodiment of the present invention, is not used in the limitation present invention, protection scope of the present invention It is defined by the claims.Those skilled in the art can make respectively in the essence and protection domain of the present invention to the present invention Kind modification or equivalent substitution, this modification or equivalent substitution also should be regarded as being within the scope of the present invention.

Claims (10)

1. the time slot scrambling of a kind of electronic equipment, it is characterised in that including:
The first operation to the electronic equipment is detected, and the legitimacy of the described first operation is judged;
When the described first operation is illegal, the electronic equipment is subjected to power-off operation, and generates first password, to utilize institute First password is stated the memory of the electronic equipment is encrypted;
The first password is stored in the BIOS of the electronic equipment.
2. according to the method for claim 1, it is characterised in that it is close that the operating system of the electronic equipment is provided with second Code, described detecting carry out judgement to the legitimacy of the described first operation and included to the first of the electronic equipment the operation:
Detecting is directed to the input number during input error of second password, judges institute when inputting number and reaching preset times It is illegal operation to state the first operation.
3. according to the method for claim 1, it is characterised in that it is described when the described first operation is illegal, by described in Electronic equipment carries out power-off operation, and generates first password, with the memory using the first password to the electronic equipment Be encrypted including:
System management interrupt is triggered when the described first operation is illegal, interrupt function carries out shutdown behaviour to the electronic equipment Make, and generate the first password at random;
The hard disk of the electronic equipment is locked using the first password.
4. according to the method for claim 1, it is characterised in that described the first password is stored in the electronics to set Standby BIOS includes:
The first password is stored in the protection zone of the BIOS ROM, and operation is hidden to the first password, To avoid illegally obtaining the first password.
5. according to the method for claim 1, it is characterised in that methods described also includes:
The 3rd password is preset in the BIOS;
The first password is obtained from the BIOS using the 3rd password, so that operation is decrypted to the memory.
6. a kind of electronic equipment, it is characterised in that including detecting module, judge module, control module and memory module;
The detecting module is connected with judge module, and the detecting module is configured to first behaviour of the detecting to the electronic equipment Make, so that the judge module is judged the legitimacy of the described first operation;
The control module is connected with judge module, and the control module is configured to when the described first operation is illegal, by institute State electronic equipment and carry out power-off operation, and generate first password, to utilize storage of the first password to the electronic equipment Device is encrypted;
The memory module is connected with control module, and the memory module is configured to the first password being stored in the electronics In the BIOS of equipment.
7. electronic equipment according to claim 6, it is characterised in that the operating system of the electronic equipment is provided with second Password, the detecting module are further configured to input number of the detecting for second password, when input number reaches pre- If during number, the judge module judges first operation for illegal operation.
8. electronic equipment according to claim 6, it is characterised in that the control module includes HD encryption unit, institute Control module is stated to be further configured to trigger system management interrupt, interrupt processing function pair institute when the described first operation is illegal The carry out power-off operation of electronic equipment is stated, and generates the first password at random, so that described in HD encryption unit utilization First password locks to the hard disk of the electronic equipment.
9. electronic equipment according to claim 6, it is characterised in that the memory module is further configured to described One password storage is hidden operation in the protection zone of the BIOS ROM, and to the first password, to avoid illegally obtaining Take the first password.
10. electronic equipment according to claim 6, it is characterised in that the electronic equipment also includes can be described The password acquisition module of the 3rd password is preset in BIOS, the password acquisition module is connected with the BIOS, and the password obtains Module is configured to obtain the first password from the BIOS using the 3rd password, so that the memory to be decrypted Operation.
CN201710666816.1A 2017-08-07 2017-08-07 The time slot scrambling and electronic equipment of a kind of electronic equipment Pending CN107423627A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710666816.1A CN107423627A (en) 2017-08-07 2017-08-07 The time slot scrambling and electronic equipment of a kind of electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710666816.1A CN107423627A (en) 2017-08-07 2017-08-07 The time slot scrambling and electronic equipment of a kind of electronic equipment

Publications (1)

Publication Number Publication Date
CN107423627A true CN107423627A (en) 2017-12-01

Family

ID=60437537

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710666816.1A Pending CN107423627A (en) 2017-08-07 2017-08-07 The time slot scrambling and electronic equipment of a kind of electronic equipment

Country Status (1)

Country Link
CN (1) CN107423627A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108171067A (en) * 2017-12-28 2018-06-15 山东超越数控电子股份有限公司 A kind of hard disk encryption method and device
CN109687955A (en) * 2019-01-14 2019-04-26 合肥联宝信息技术有限公司 A kind of method and device for protecting data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1725196A (en) * 2005-06-06 2006-01-25 付爱香 Enciphered protection and read write control method for computer data
CN102262719A (en) * 2011-08-30 2011-11-30 青岛海信智能商用设备有限公司 Method for protecting computer safety based on BIOS (Basic Input/Output System) password and computer
CN102790819A (en) * 2011-05-17 2012-11-21 芯讯通无线科技(上海)有限公司 Mobile terminal capable of protecting privacy and method
CN103729310A (en) * 2014-01-14 2014-04-16 北京深思数盾科技有限公司 Method for protecting hardware data
US20150339152A1 (en) * 2010-05-28 2015-11-26 Dell Products, Lp System and Method for Pre-Boot Authentication of a Secure Client Hosted Virtualization in an Information Handling System

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1725196A (en) * 2005-06-06 2006-01-25 付爱香 Enciphered protection and read write control method for computer data
US20150339152A1 (en) * 2010-05-28 2015-11-26 Dell Products, Lp System and Method for Pre-Boot Authentication of a Secure Client Hosted Virtualization in an Information Handling System
CN102790819A (en) * 2011-05-17 2012-11-21 芯讯通无线科技(上海)有限公司 Mobile terminal capable of protecting privacy and method
CN102262719A (en) * 2011-08-30 2011-11-30 青岛海信智能商用设备有限公司 Method for protecting computer safety based on BIOS (Basic Input/Output System) password and computer
CN103729310A (en) * 2014-01-14 2014-04-16 北京深思数盾科技有限公司 Method for protecting hardware data

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108171067A (en) * 2017-12-28 2018-06-15 山东超越数控电子股份有限公司 A kind of hard disk encryption method and device
CN109687955A (en) * 2019-01-14 2019-04-26 合肥联宝信息技术有限公司 A kind of method and device for protecting data

Similar Documents

Publication Publication Date Title
US5960084A (en) Secure method for enabling/disabling power to a computer system following two-piece user verification
US5887131A (en) Method for controlling access to a computer system by utilizing an external device containing a hash value representation of a user password
US6400823B1 (en) Securely generating a computer system password by utilizing an external encryption algorithm
US7900252B2 (en) Method and apparatus for managing shared passwords on a multi-user computer
US5949882A (en) Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryption algorithm
Schneier Cryptographic design vulnerabilities
CN101441601B (en) Ciphering transmission method of hard disk ATA instruction and system
CN101523399A (en) Methods and systems for modifying an integrity measurement based on user athentication
Götzfried et al. Analysing Android's Full Disk Encryption Feature.
WO2002001368A2 (en) Embedded security device within a nonvolatile memory device
US9292681B2 (en) Password audit system
CN110084026A (en) Pass through the PC protection of BIOS/ (U) EFI extension
JP7087172B2 (en) Unlock PQA
CN1331015C (en) Computer security startup method
CN107423627A (en) The time slot scrambling and electronic equipment of a kind of electronic equipment
CN105933117A (en) Data encryption and decryption device and method based on TPM (Trusted Platform Module) key security storage
US8413906B2 (en) Countermeasures to secure smart cards
US9684784B2 (en) Systems and methods for securely storing data
KR101318668B1 (en) Portable memory card having information security function
CN111523127B (en) Authority authentication method and system for password equipment
KR102591450B1 (en) Registry parser and encryption/decryption module to prevent stealing of important information in Windows operating system and its operating method
Juan-hua et al. PC lock software design based on removable storage device and dynamic password
JP5355351B2 (en) Computer
Xin et al. System design scheme of configurable secure memory chip
Zhao et al. Deceptive Deletion Triggers under Coercion

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination