CN107423627A - The time slot scrambling and electronic equipment of a kind of electronic equipment - Google Patents
The time slot scrambling and electronic equipment of a kind of electronic equipment Download PDFInfo
- Publication number
- CN107423627A CN107423627A CN201710666816.1A CN201710666816A CN107423627A CN 107423627 A CN107423627 A CN 107423627A CN 201710666816 A CN201710666816 A CN 201710666816A CN 107423627 A CN107423627 A CN 107423627A
- Authority
- CN
- China
- Prior art keywords
- password
- electronic equipment
- module
- bios
- memory
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/572—Secure firmware programming, e.g. of basic input output system [BIOS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses the time slot scrambling of a kind of electronic equipment and electronic equipment, this method includes:The first operation to the electronic equipment is detected, and the legitimacy of the described first operation is judged;When the described first operation is illegal, the electronic equipment is subjected to power-off operation, and generates first password, so that the memory of the electronic equipment to be encrypted using the first password;The first password is stored in the BIOS of the electronic equipment.The time slot scrambling can ensure to shut down and lock the memory (such as hard disc of computer) of electronic equipment when carrying out illegal operation to electronic equipments such as computers in time, disabled user is avoided persistently to carry out unauthorized access to electronic equipments such as computers, and ensure that disabled user can not obtain the data in memory by technological means, improve the message protection ability of the electronic equipments such as computer, it is ensured that the safety of the electronic equipment such as computer.
Description
Technical field
The present invention relates to the time slot scrambling and electronics of the safety protection field of electronic equipment, more particularly to a kind of electronic equipment
Equipment.
Background technology
Password is set to protect the safety of the electronic equipments such as the computer, usual user's meeting to electronic equipments such as computers
Password (such as window password) is set in the operating system of the electronic equipments such as computer, but the guard method can be by him
People is by repeatedly attempting to crack, or by disassembling and utilizing the memory (such as hard disk) of the electronic equipments such as computer
Miscellaneous equipment reads the method for data that is stored in memory to steal data, and security is low.
The content of the invention
The purpose of the embodiment of the present invention is the time slot scrambling and electronic equipment for providing a kind of electronic equipment, and this method can
Ensure to shut down and lock the memory of electronic equipment when carrying out illegal operation to electronic equipments such as computers in time that (such as computer is hard
Disk), it is ensured that the safety of the electronic equipment such as computer.
In order to solve the above-mentioned technical problem, the embodiment of the present invention employs following technical scheme:The guarantor of a kind of electronic equipment
Decryption method, including:
The first operation to the electronic equipment is detected, and the legitimacy of the described first operation is judged;
When the described first operation is illegal, the electronic equipment is subjected to power-off operation, and generates first password, with profit
The memory of the electronic equipment is encrypted with the first password;
The first password is stored in the BIOS of the electronic equipment.
Preferably, the operating system of the electronic equipment is provided with the second password, described detecting is set to the electronics
Standby first operation, and judgement is carried out to the legitimacy of the described first operation included:
Detecting judges first behaviour when inputting number and reaching preset times for the input number of second password
As illegal operation.
Preferably, described carry out power-off operation when the described first operation is illegal by the electronic equipment, and it is raw
Into first password, with the memory of the electronic equipment is encrypted using the first password including:
System management interrupt is triggered when the described first operation is illegal, interrupt function closes to the electronic equipment
Machine operates, and generates the first password at random;
The hard disk of the electronic equipment is locked using the first password.
Preferably, the BIOS that the first password is stored in the electronic equipment includes:
The first password is stored in the protection zone of the BIOS ROM, and behaviour is hidden to the first password
Make, to avoid illegally obtaining the first password.
Preferably, methods described also includes:
The 3rd password is preset in the BIOS;
The first password is obtained from the BIOS using the 3rd password, so that behaviour is decrypted to the memory
Make.
The embodiment of the present invention additionally provides a kind of electronic equipment, including detecting module, judge module, control module and storage
Module;
The detecting module is connected with judge module, and the detecting module is configured to detecting to the first of the electronic equipment
Operation, so that the judge module is judged the legitimacy of the described first operation;
The control module is connected with judge module, and the control module is configured to when the described first operation is illegal,
The electronic equipment is subjected to power-off operation, and generates first password, to utilize the first password to the electronic equipment
Memory is encrypted;
The memory module is connected with control module, and the memory module is configured to the first password being stored in described
In the BIOS of electronic equipment.
Preferably, the operating system of the electronic equipment is provided with the second password, the detecting module further configures
To detect the input number for second password, when input number reaches preset times, the judge module judges institute
It is illegal operation to state the first operation.
Preferably, the control module includes HD encryption unit, the control module is further configured to when described
First operation for it is illegal when trigger system management interrupt, carry out power-off operation of the interrupt function to the electronic equipment, and at random
The first password is generated, so that the HD encryption unit is carried out using the first password to the hard disk of the electronic equipment
Locking.
Preferably, the memory module is further configured to the first password being stored in the guarantor of the BIOS ROM
Protect in area, and operation is hidden to the first password, to avoid illegally obtaining the first password.
Preferably, the password that the electronic equipment also includes to preset the 3rd password in the BIOS obtains mould
Block, the password acquisition module are connected with the BIOS, and the password acquisition module is configured to utilize the 3rd password from institute
State and the first password is obtained in BIOS, so that operation is decrypted to the memory.
The beneficial effect of the embodiment of the present invention is:The time slot scrambling can ensure non-to the progress of the electronic equipments such as computer
Method is shut down when operating and locks the memory (such as hard disc of computer) of electronic equipment in time, avoids disabled user persistently to computer
Unauthorized access is carried out Deng electronic equipment, and ensures that disabled user can not obtain the data in memory by technological means, is carried
The message protection ability of the electronic equipments such as high computer, it is ensured that the safety of the electronic equipment such as computer.
Brief description of the drawings
Fig. 1 is the flow chart of the time slot scrambling of the electronic equipment of the embodiment of the present invention;
Fig. 2 be the embodiment of the present invention Fig. 1 in step S2 flow chart;
Fig. 3 is a kind of structured flowchart of electronic equipment of the embodiment of the present invention;
Fig. 4 is the electronic equipment another kind structured flowchart of the embodiment of the present invention.
Description of reference numerals
1- detecting module 2- judge module 3- control modules
4- memory module 5-BIOS 6- hard disks
7- input equipment 8- third party softwares
Embodiment
To make those skilled in the art more fully understand the present invention, embodiments of the invention are carried out with reference to the accompanying drawings detailed
Describe in detail bright but not as a limitation of the invention.
The time slot scrambling of a kind of electronic equipment of the embodiment of the present invention, protecting information safety can be carried out to electronic equipment,
As shown in figure 1, with reference to Fig. 4, the time slot scrambling includes:
S1, the first operation to electronic equipment is detected, and the legitimacy of the first operation is judged.First operation can
Think the operation to the electronic equipments such as computer input password, the operation of password is such as inputted before operating system is entered;Can also
Other operations carried out for the software to electronic equipments such as computers or hardware, such as attack or unauthorized access of the virus to computer
Deng.Setting to first operation can be set according to the service condition of reality.Sentence in the legitimacy to the first operation
It can be preset when disconnected according to the concrete condition of the first operation, such as judge the errors number of input password, or it is soft by third party
Part 8 (such as antivirus software) judged, as the computer by the attack of virus if judge the first operation (virus attack)
To be illegal.
S2, when the first operation for it is illegal when, electronic equipment is subjected to power-off operation, and generate first password, to utilize the
The memory of electronic equipment is encrypted one password.By electronic equipment shutdown disabled user can be avoided for decryption and
Carry out the trial of repeatedly input password, can also avoid it is lasting other rogue attacks are carried out to electronic equipment, increase cracks
The time cost of password, increase crack difficulty.Now in order to increase the protection to memory, it is also necessary to first password is generated, with
The memory (hard disk 6 of such as computer) of electronic equipment is encrypted, even if ensureing that disabled user disassembles memory,
It can not be realized reading the operation of the data in the memory and (be also required to when reading the memory using other electronic equipments
Memory can be read using first password).The operation for generating first password can be random generation, also may be used
To be generated according to default rule, specific character string etc. can also be redefined for.
S3, first password is stored in the BIOS 5 of electronic equipment.First password can be stored in BIOS 5 ROM
It is interior and do hiding processing, such as replace with * or origin the character string of first password so that other users can not access this
The actual value of one password.If validated user is wanted to obtain first password from the BIOS 5 and can accessed with by other means
BIOS 5 simultaneously obtains first password, and the mode of first password is obtained from BIOS 5 and will be then described in detail.
In one embodiment of the invention, the operating system of electronic equipment is provided with the second password, described detecting pair
Electronic equipment first operation, and to first operation legitimacy judge the step of include:
Detecting is directed to input number during the second Password Input mistake, judges when inputting number and reaching preset times
First operation is illegal operation.Second password can be its when operating system password can also be electronic equipment start
His password, user enter operating system and the checking by the second password are had to during using electronic equipment, input the second password
Number excessively to be likely to the user be disabled user to explanation, it does not know the second password so being tasted constantly input
Examination, in the present embodiment, the number for inputting the second password is preset, when the number for inputting the second password reaches preset times
When may determine that the user is disabled user, its trial of the password of input second carried out is illegal operation.
In one embodiment of the invention, it is as shown in Fig. 2 described when the first operation is illegal, by electronic equipment
Power-off operation is carried out, and generates first password, to be wrapped the step of the memory of electronic equipment is encrypted using first password
Include:
S21, system management interrupt (SMI, System Management is triggered when the first operation is illegal
Interrupt), interrupt function (SMI call back function) carries out power-off operation to electronic equipment, and generates at random
First password.BIOS 5 can avoid operating system to perform some important procedures using system management interrupt, such as renewal, cause
Energy, forbidden energy advanced configuration and power supply interface or injection error-correcting code etc., therefore utilized when the first operation is illegal and trigger system
System management interrupt (SMI, System Management Interrupt) can prevent disabled user from entering operating system, and right
Electronic equipment carries out power-off operation, avoids disabled user from carrying out the first operation to electronic equipment again, while generate first at random
Password, due to being randomly generated so that first password dynamically changes, add the difficulty being cracked.
S22, the hard disk 6 of electronic equipment is locked using first password.In one embodiment, electronic equipment is meter
Calculation machine, memory are the hard disk 6 of computer, and hard disk 6 can be by using other calculating in the case where not setting harddisk password
Machine reads the content in the hard disk 6, if locked using first password to hard disk 6, regardless of whether hard disk 6 is dismantled
Get off or other are operated, be required for that the data in hard disk 6 could be read using first password.Effectively protect and deposited in hard disk 6
The safety of the data of storage.
In one embodiment of the invention, step first password being stored in the BIOS 5 of electronic equipment
Including:
First password is stored in BIOS ROM protection zone, and operation is hidden to first password, it is non-to avoid
Method obtains first password.BIOS ROM are the memory inside BIOS 5, and protection zone is located in the memory, due to protection zone
Protection zone can not be accessed for special area general user, such as by sightless mode user can be prevented to access the protection
Area, first password is stored in protection zone and does hiding operation, accordingly even when technical professional can not into protection zone
First password is seen, so as to avoid illegally obtaining first password.
In one embodiment of the invention, the time slot scrambling also includes:S4, the 3rd password is preset in BIOS 5.
S5, first password is obtained from BIOS 5 using the 3rd password, memory to be decrypted operation.
3rd password is for password set BIOS 5 itself, is all or part of data letter for accessing BIOS 5
The password of input required for breath.In one embodiment, an option is set in BIOS SETUP, for enabling or forbidding
(ENABLE/DISABLE) secrecy sets this functionality, when user needs to enable secrecy setting this functionality, has clicked on and has enabled
Afterwards, one the 3rd password (being properly termed as super code) of user preset can be guided, the effect of this 3rd password is for showing
Show first password, first password is existed as a hide items in BIOS SETUP, to show it, it is necessary to
Correct 3rd password must be inputted, so that user gets first password, so as to decrypting data (hard disk 6).In addition one
In individual embodiment, to set operating system password can also be allowed defeated by the 3rd password in the option that BIOS SETUP are set
Errors number entered etc..
The embodiment of the present invention additionally provides a kind of electronic equipment, can carry out security protection to the information of storage, such as Fig. 3 and
Shown in Fig. 4, the electronic equipment includes detecting module 1, judge module 2, control module 3 and memory module 4.
Detecting module 1 is connected with judge module 2, and detecting module 1 is configured to first operation of the detecting to electronic equipment, so that
Judge module 2 is judged the legitimacy of the first operation.First operation can be to use the defeated of the electronic equipments such as computer
Enter the operation that equipment 7 input password, the operation of password is such as inputted before operating system is entered;Can also be to computer etc.
Other operations that the software or hardware of electronic equipment are carried out, such as attack or unauthorized access of the virus to computer.To this first
The setting of operation can be set according to the service condition of reality.Judge module 2 judges in the legitimacy to the first operation
When can be preset according to the concrete condition of the first operation, such as judge the errors number of input password, or pass through third party software 8
(such as antivirus software) is judged, as the computer by virus attack if judge the first operation (virus attack) to be non-
Method.
Control module 3 is connected with judge module 2, and control module 3 is configured to when the first operation is illegal, by electronic equipment
Power-off operation is carried out, and generates first password, so that the memory of electronic equipment to be encrypted using first password.Control module
Electronic equipment shutdown can be avoided disabled user from carrying out the multiple trial for inputting password for decryption by 3, can also be kept away
What hand-free continued carries out other rogue attacks to electronic equipment, increases the time cost of decryption, and increase cracks difficulty.Now
In order to increase the protection to memory, control module 3 also needs to generate first password, by the memory to electronic equipment (as in terms of
The hard disk 6 of calculation machine) it is encrypted, even if ensureing that disabled user disassembles memory, read using other electronic equipments
The operation of data in the memory can not realize that (being also required to when reading the memory can be to depositing using first password
Reservoir is read).The operation that control module 3 generates first password can be random generation, can also be according to default
Rule generation, can also be redefined for specific character string etc..
Memory module 4 is connected with control module 3, and memory module 4 is configured to first password being stored in electronic equipment
In BIOS 5.First password can be stored in BIOS5 ROM and do hiding processing by memory module 4, such as with * or origin
Instead of the character string of first password, so that other users can not access the actual value of the first password.If validated user
BIOS 5 can be accessed and be obtained first password with by other means by wanting to obtain first password from BIOS 5, from BIOS 5
The middle mode for obtaining first password will be then described in detail.
In one embodiment of the invention, the operating system of electronic equipment is provided with the second password, and detecting module 1 enters one
Step is configured to input number of the detecting for the second password, and when input number reaches preset times, judge module 2 judges first
Operate as illegal operation.Second password can be other passwords when operating system password can also be electronic equipment start,
User enters operating system and the checking by the second password is had to during using electronic equipment, inputs the number mistake of the second password
It is disabled user that more explanations, which are likely to the user, and it does not know the second password so being attempted carrying out constantly input, in this reality
Apply in example, the number for inputting the second password is preset, the number that the second password of input is detected when detecting module 1 reaches pre-
If during number, judge module 2 may determine that the user is disabled user, the trial of its password of input second carried out is illegal behaviour
Make.
In one embodiment of the invention, control module 3 includes HD encryption unit, and control module 3 further configures
To trigger system management interrupt (SMI, System Management Interrupt) when the first operation is illegal, letter is interrupted
Carry out power-off operation of the number (SMI call back function) to electronic equipment, and first password is generated at random, so that firmly
Disk ciphering unit is locked using first password to the hard disk 6 of electronic equipment, and the first password of generation is stored in into BIOS
ROM protection zone.BIOS 5 can avoid operating system to perform some important procedures using system management interrupt, such as more
Newly, enable, forbidden energy advanced configuration and power supply interface or injection error-correcting code etc., therefore control module 3 is non-in the first operation
Disabled user can be prevented to enter using triggering system management interrupt (SMI, System Management Interrupt) during method
Operating system, and power-off operation is carried out to electronic equipment, avoid disabled user from carrying out the first operation to electronic equipment again, simultaneously
Random generation first password, due to being randomly generated so that first password dynamically changes, add the difficulty being cracked.One
In individual embodiment, electronic equipment is computer, and memory is the hard disk 6 of computer, and hard disk 6 is not setting the situation of harddisk password
The content in the hard disk 6 can be read by using other computers down, if HD encryption unit utilizes first password pair
Hard disk 6 is locked, then regardless of whether hard disk 6 is disassembled or other operations, is required for read using first password
Take the data in hard disk 6.Effectively protect the safety of the data stored in hard disk 6.
In one embodiment of the invention, memory module 4 is further configured to first password being stored in BIOS ROM
Protection zone in, and operation is hidden to first password, to avoid illegally obtaining first password.BIOS ROM are in BIOS 5
The memory in portion, and protection zone is located in the memory, because protection zone is that special area general user can not access protection
Area, such as user can be prevented to access the protection zone by sightless mode, first password is stored in protection zone by memory module 4
In and do hiding operation, it is non-so as to avoid accordingly even when technical professional, which enters protection zone, can not see first password
Method obtains first password.
In one embodiment of the invention, electronic equipment also includes the password that the 3rd password can be preset in BIOS 5
Acquisition module, password acquisition module are connected with BIOS 5, and password acquisition module is configured to obtain from BIOS 5 using the 3rd password
First password is taken, memory to be decrypted operation.3rd password is for password set BIOS 5 itself, is to visit
The password of input required for asking BIOS 5 all or part of data message.In one embodiment, set in BIOS SETUP
An option is put, for enabling or forbidding (ENABLE/DISABLE) password acquisition module, when user needs to enable password acquisition
During module, click on after enabling, one the 3rd password (being properly termed as super code) of user preset can be guided, password obtains mould
Block can make BIOS 5 show first password by the 3rd password, and first password is hidden as one in BIOS SETUP
Item is present, to show it, it is necessary to must be directed to password acquisition module and input correct 3rd password, so as to pass through password
Acquisition module makes user get first password, so as to decrypting data (hard disk 6).In addition in one embodiment, in BIOS
Errors number of permission operating system Password Input etc. can also be set by the 3rd password in the option that SETUP is set.
Above example is only the exemplary embodiment of the present invention, is not used in the limitation present invention, protection scope of the present invention
It is defined by the claims.Those skilled in the art can make respectively in the essence and protection domain of the present invention to the present invention
Kind modification or equivalent substitution, this modification or equivalent substitution also should be regarded as being within the scope of the present invention.
Claims (10)
1. the time slot scrambling of a kind of electronic equipment, it is characterised in that including:
The first operation to the electronic equipment is detected, and the legitimacy of the described first operation is judged;
When the described first operation is illegal, the electronic equipment is subjected to power-off operation, and generates first password, to utilize institute
First password is stated the memory of the electronic equipment is encrypted;
The first password is stored in the BIOS of the electronic equipment.
2. according to the method for claim 1, it is characterised in that it is close that the operating system of the electronic equipment is provided with second
Code, described detecting carry out judgement to the legitimacy of the described first operation and included to the first of the electronic equipment the operation:
Detecting is directed to the input number during input error of second password, judges institute when inputting number and reaching preset times
It is illegal operation to state the first operation.
3. according to the method for claim 1, it is characterised in that it is described when the described first operation is illegal, by described in
Electronic equipment carries out power-off operation, and generates first password, with the memory using the first password to the electronic equipment
Be encrypted including:
System management interrupt is triggered when the described first operation is illegal, interrupt function carries out shutdown behaviour to the electronic equipment
Make, and generate the first password at random;
The hard disk of the electronic equipment is locked using the first password.
4. according to the method for claim 1, it is characterised in that described the first password is stored in the electronics to set
Standby BIOS includes:
The first password is stored in the protection zone of the BIOS ROM, and operation is hidden to the first password,
To avoid illegally obtaining the first password.
5. according to the method for claim 1, it is characterised in that methods described also includes:
The 3rd password is preset in the BIOS;
The first password is obtained from the BIOS using the 3rd password, so that operation is decrypted to the memory.
6. a kind of electronic equipment, it is characterised in that including detecting module, judge module, control module and memory module;
The detecting module is connected with judge module, and the detecting module is configured to first behaviour of the detecting to the electronic equipment
Make, so that the judge module is judged the legitimacy of the described first operation;
The control module is connected with judge module, and the control module is configured to when the described first operation is illegal, by institute
State electronic equipment and carry out power-off operation, and generate first password, to utilize storage of the first password to the electronic equipment
Device is encrypted;
The memory module is connected with control module, and the memory module is configured to the first password being stored in the electronics
In the BIOS of equipment.
7. electronic equipment according to claim 6, it is characterised in that the operating system of the electronic equipment is provided with second
Password, the detecting module are further configured to input number of the detecting for second password, when input number reaches pre-
If during number, the judge module judges first operation for illegal operation.
8. electronic equipment according to claim 6, it is characterised in that the control module includes HD encryption unit, institute
Control module is stated to be further configured to trigger system management interrupt, interrupt processing function pair institute when the described first operation is illegal
The carry out power-off operation of electronic equipment is stated, and generates the first password at random, so that described in HD encryption unit utilization
First password locks to the hard disk of the electronic equipment.
9. electronic equipment according to claim 6, it is characterised in that the memory module is further configured to described
One password storage is hidden operation in the protection zone of the BIOS ROM, and to the first password, to avoid illegally obtaining
Take the first password.
10. electronic equipment according to claim 6, it is characterised in that the electronic equipment also includes can be described
The password acquisition module of the 3rd password is preset in BIOS, the password acquisition module is connected with the BIOS, and the password obtains
Module is configured to obtain the first password from the BIOS using the 3rd password, so that the memory to be decrypted
Operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710666816.1A CN107423627A (en) | 2017-08-07 | 2017-08-07 | The time slot scrambling and electronic equipment of a kind of electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710666816.1A CN107423627A (en) | 2017-08-07 | 2017-08-07 | The time slot scrambling and electronic equipment of a kind of electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107423627A true CN107423627A (en) | 2017-12-01 |
Family
ID=60437537
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710666816.1A Pending CN107423627A (en) | 2017-08-07 | 2017-08-07 | The time slot scrambling and electronic equipment of a kind of electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107423627A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108171067A (en) * | 2017-12-28 | 2018-06-15 | 山东超越数控电子股份有限公司 | A kind of hard disk encryption method and device |
CN109687955A (en) * | 2019-01-14 | 2019-04-26 | 合肥联宝信息技术有限公司 | A kind of method and device for protecting data |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1725196A (en) * | 2005-06-06 | 2006-01-25 | 付爱香 | Enciphered protection and read write control method for computer data |
CN102262719A (en) * | 2011-08-30 | 2011-11-30 | 青岛海信智能商用设备有限公司 | Method for protecting computer safety based on BIOS (Basic Input/Output System) password and computer |
CN102790819A (en) * | 2011-05-17 | 2012-11-21 | 芯讯通无线科技(上海)有限公司 | Mobile terminal capable of protecting privacy and method |
CN103729310A (en) * | 2014-01-14 | 2014-04-16 | 北京深思数盾科技有限公司 | Method for protecting hardware data |
US20150339152A1 (en) * | 2010-05-28 | 2015-11-26 | Dell Products, Lp | System and Method for Pre-Boot Authentication of a Secure Client Hosted Virtualization in an Information Handling System |
-
2017
- 2017-08-07 CN CN201710666816.1A patent/CN107423627A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1725196A (en) * | 2005-06-06 | 2006-01-25 | 付爱香 | Enciphered protection and read write control method for computer data |
US20150339152A1 (en) * | 2010-05-28 | 2015-11-26 | Dell Products, Lp | System and Method for Pre-Boot Authentication of a Secure Client Hosted Virtualization in an Information Handling System |
CN102790819A (en) * | 2011-05-17 | 2012-11-21 | 芯讯通无线科技(上海)有限公司 | Mobile terminal capable of protecting privacy and method |
CN102262719A (en) * | 2011-08-30 | 2011-11-30 | 青岛海信智能商用设备有限公司 | Method for protecting computer safety based on BIOS (Basic Input/Output System) password and computer |
CN103729310A (en) * | 2014-01-14 | 2014-04-16 | 北京深思数盾科技有限公司 | Method for protecting hardware data |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108171067A (en) * | 2017-12-28 | 2018-06-15 | 山东超越数控电子股份有限公司 | A kind of hard disk encryption method and device |
CN109687955A (en) * | 2019-01-14 | 2019-04-26 | 合肥联宝信息技术有限公司 | A kind of method and device for protecting data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5960084A (en) | Secure method for enabling/disabling power to a computer system following two-piece user verification | |
US5887131A (en) | Method for controlling access to a computer system by utilizing an external device containing a hash value representation of a user password | |
US6400823B1 (en) | Securely generating a computer system password by utilizing an external encryption algorithm | |
US7900252B2 (en) | Method and apparatus for managing shared passwords on a multi-user computer | |
US5949882A (en) | Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryption algorithm | |
Schneier | Cryptographic design vulnerabilities | |
CN101441601B (en) | Ciphering transmission method of hard disk ATA instruction and system | |
CN101523399A (en) | Methods and systems for modifying an integrity measurement based on user athentication | |
Götzfried et al. | Analysing Android's Full Disk Encryption Feature. | |
WO2002001368A2 (en) | Embedded security device within a nonvolatile memory device | |
US9292681B2 (en) | Password audit system | |
CN110084026A (en) | Pass through the PC protection of BIOS/ (U) EFI extension | |
JP7087172B2 (en) | Unlock PQA | |
CN1331015C (en) | Computer security startup method | |
CN107423627A (en) | The time slot scrambling and electronic equipment of a kind of electronic equipment | |
CN105933117A (en) | Data encryption and decryption device and method based on TPM (Trusted Platform Module) key security storage | |
US8413906B2 (en) | Countermeasures to secure smart cards | |
US9684784B2 (en) | Systems and methods for securely storing data | |
KR101318668B1 (en) | Portable memory card having information security function | |
CN111523127B (en) | Authority authentication method and system for password equipment | |
KR102591450B1 (en) | Registry parser and encryption/decryption module to prevent stealing of important information in Windows operating system and its operating method | |
Juan-hua et al. | PC lock software design based on removable storage device and dynamic password | |
JP5355351B2 (en) | Computer | |
Xin et al. | System design scheme of configurable secure memory chip | |
Zhao et al. | Deceptive Deletion Triggers under Coercion |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination |