CN108121905A - Encryption section access method and device - Google Patents

Encryption section access method and device Download PDF

Info

Publication number
CN108121905A
CN108121905A CN201810029364.0A CN201810029364A CN108121905A CN 108121905 A CN108121905 A CN 108121905A CN 201810029364 A CN201810029364 A CN 201810029364A CN 108121905 A CN108121905 A CN 108121905A
Authority
CN
China
Prior art keywords
information
authentication information
user
terminal device
encryption section
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810029364.0A
Other languages
Chinese (zh)
Inventor
林峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Gust Technology Co Ltd
Original Assignee
Sichuan Gust Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Gust Technology Co Ltd filed Critical Sichuan Gust Technology Co Ltd
Priority to CN201810029364.0A priority Critical patent/CN108121905A/en
Publication of CN108121905A publication Critical patent/CN108121905A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect

Abstract

The encryption section access method and device provided through this embodiment receives encryption section access request input by user;The terminal device is controlled to pop up the second dialog box to receive second user authentication information input by user;The second user authentication information is obtained, and the second user authentication information is matched with the second pre-set user authentication information;If the second user authentication information and the second pre-set user authentication information successful match, decrypt the encryption section using pre-stored key.

Description

Encryption section access method and device
Technical field
This application involves equipment safety field, in particular to a kind of encryption section access method and device.
Background technology
With the continuous development of technology, the requirement for information security in equipment is higher and higher.In the prior art, usually lead to Mode that terminal device is encrypted in itself is crossed to protect the safety of information in terminal device.
However under normal conditions, such as after terminal device holder's lost terminal equipment, the people of the terminal device is obtained Member carries out special decryption to the terminal device and cracks, and still or can crack terminal device successfully and obtain terminal device Interior information.
Apply for content
In view of this, the embodiment of the present application provides a kind of encryption section access method and device, to improve the prior art In to the incomplete problem of the encryption method of the data of terminal device.
On the one hand, the embodiment of the present application provides a kind of encryption section access method, by movable storage device with it is described Terminal device connects to realize the clean boot of the terminal device, the described method includes:The movable storage device obtains institute State the first terminal equipment identities identification information of terminal device;By the first terminal equipment identities identification information and itself the One movable storage device identification information is matched;If the first terminal equipment identities identification information is moved with described first Dynamic storage device identification information successful match controls the terminal device to pop up the first dialog box input by user to receive First subscriber authentication information;The first subscriber authentication information is obtained, and first subscriber authentication is believed Breath is matched with the first pre-set user authentication information;If the first subscriber authentication information is default with described first The success of subscriber authentication information matches sends enabling signal to the terminal device so that the encryption section can access.
On the other hand, the embodiment of the present application additionally provides a kind of encryption section access mechanism, runs on movable storage device, Described device includes:Terminal device identity acquisition module, for obtaining the first terminal equipment identities of terminal device mark Information;First information matching module, for the first terminal equipment identities identification information and the first movement of itself to be stored Equipment identities identification information is matched;Authentication receiving module, if for the first terminal equipment identities identification information With the first movable storage device identification information successful match, the terminal device is controlled to pop up the first dialog box to connect Receive the first subscriber authentication information input by user;Second information matches module is tested for obtaining first user identity Information is demonstrate,proved, and the first subscriber authentication information is matched with the first pre-set user authentication information;Safety opens Dynamic model block, if for the first subscriber authentication information and the first pre-set user authentication information successful match, Enabling signal is sent to the terminal device so that the encryption section can access.
Encryption section access method provided by the embodiments of the present application and device have the beneficial effect that:
The encryption section access method and device provided through this embodiment, movable storage device obtain the of terminal device One terminal device identification information, by first terminal equipment identities identification information and the first movable storage device identity of itself Identification information is matched;If successful match, control terminal equipment pops up the first dialog box and is used with receiving input by user first Family authentication information matches the first subscriber authentication information with the first pre-set user authentication information;If again Secondary successful match, then movable storage device sends enabling signal to the terminal device, so that the encryption section accesses.First verification moves Whether dynamic storage device is corresponding with terminal device, if so, authentication information input by user is received, by authentication Information is matched again compared with the pre-stored identity information in movable storage device with realizing.It is realized after successful match The clean boot of the terminal device.In encryption section access method provided by the embodiments of the present application, even if terminal device is held Person has lost corresponding terminal device, if not losing corresponding movable storage device, other users can not open this Terminal device, it is even more impossible to its encryption section be accessed, decrypts or obtained the sensitive data of encryption section preservation, so as to protect The security of the terminal device.
Description of the drawings
Illustrate the technical solutions in the embodiments of the present application or in the prior art in order to clearer, it below will be to embodiment or existing There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application, for those of ordinary skill in the art, without creative efforts, can be with Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow chart for the encryption section access method that the application first embodiment provides;
Fig. 2 is that a kind of flow of the specific embodiment for the encryption section access method that the application first embodiment provides is shown It is intended to;
Fig. 3 is the structure diagram for the encryption section access mechanism that the application second embodiment provides;
Fig. 4 is a kind of structural frames of the specific embodiment for the encryption section access mechanism that the application second embodiment provides Figure.
Specific embodiment
First embodiment
Fig. 1 is referred to, Fig. 1 shows the flow signal for the encryption section access method that the application first embodiment provides Figure, specifically comprises the following steps:
Step S110 obtains the first terminal equipment identities identification information of the terminal device.
Terminal device can be the terminal devices such as computer, mobile phone, and first terminal equipment identities identification information can be can The identification information of the unique mark terminal device.Specifically, terminal device is computer, and the first terminal equipment of the terminal device Identification information is the MAC codes of BIOS in computer main board.
Movable storage device is a portable mobile equipment with store function, and movable storage device can be with Terminal device communicates, such as the first terminal equipment identities identification information of receiving terminal apparatus transmission or transmission control refer to It makes to terminal device.It can carry out wireless communication, wire communication can also be carried out, the concrete mode of communication, which should not be construed, is Limitation to the embodiment of the present invention.
Step S120, by the first terminal equipment identities identification information and the first movable storage device identity mark of itself Know information to be matched.
Movable storage device can also be handled the information received, such as first terminal equipment identities are identified and are believed Breath is matched with the first movable storage device identification information of itself.First terminal equipment identities identification information and first There are corresponding mapping relations for movable storage device identification information.
The mapping relations can be stored in movable storage device, and whether movable storage device both judges to match, If so, show that the movable storage device is corresponding with the terminal device.First movable storage device identity of movable storage device Identification information is specifically as follows UUID, corresponding with the MAC codes of BIOS in computer main board.
Step S130, if the first terminal equipment identities identification information and the first movable storage device identity Information matches success controls the terminal device to pop up the first dialog box and is believed with receiving the first subscriber authentication input by user Breath.
When first terminal equipment identities identification information and the first movable storage device identification information successful match When, movable storage device can send control instruction to terminal device, and terminal device is made to pop up the first dialog box, the first dialog box For receiving the first subscriber authentication information input by user.
First subscriber authentication information is can to characterize the verification information of the user's identity, and the specific can be user names Information and encrypted message, or the biometric information of the user, such as finger print information, face information etc..
In a kind of specific embodiment, if the first terminal equipment identities identification information is stored with the described first movement The success of equipment identities identification information match, movable storage device control the terminal device to pop up the first dialog box to receive user First username information of input and first password information.
Step S140, obtains the first subscriber authentication information, and will the first subscriber authentication information and First pre-set user authentication information is matched.
After the matching of movable storage device and terminal device is completed, it is also necessary to carry out subscriber authentication, Yong Hu After first dialog box has input authentication information, terminal device can be sent to the first authentication information mobile storage and set It is standby, so as to compared with the first pre-set user authentication information of movable storage device memory storage.Specifically, mobile storage Equipment matches first username information with the first pre-set user name information, and by the first password information and institute The first preset password information is stated to be matched.
First pre-set user authentication information is stored in without being stored in terminal device in movable storage device, can Preferably to realize the protection to terminal device.Such as if both movable storage device or terminal device are lost first, just can not The authentication process itself of user is completed, so as to preferably realize the protection to terminal device.
Step S150, if the first subscriber authentication information is matched with the first pre-set user authentication information Success sends enabling signal to the terminal device so that the encryption section accesses.
Specifically, if the success of first username information and the first pre-set user name information matches, and described the One encrypted message and the first preset password information successful match send enabling signal to the terminal device so that described add Close region accesses.
When being respectively completed the matching of movable storage device and terminal device and the authentication of user matches twice, Just really complete safety verification, movable storage device can send enabling signal to terminal device, so that encryption section can be with It accesses.
Fig. 2 is referred to, Fig. 2 shows a kind of specific reality for the encryption section access method that the application first embodiment provides Mode is applied, is specifically comprised the following steps:
Step S110 obtains the first terminal equipment identities identification information of the terminal device.
Step S120, by the first terminal equipment identities identification information and the first movable storage device identity mark of itself Know information to be matched.
Step S130, if the first terminal equipment identities identification information and the first movable storage device identity Information matches success controls the terminal device to pop up the first dialog box and is believed with receiving the first subscriber authentication input by user Breath.
Step S140, obtains the first subscriber authentication information, and will the first subscriber authentication information and First pre-set user authentication information is matched.
Step S150, if the first subscriber authentication information is matched with the first pre-set user authentication information Success sends enabling signal to the terminal device so that the encryption section can access.
Step S110 to step S150 shown in Fig. 2 is identical to step S150 with the step S110 shown in Fig. 1, herein just not It repeats again.
Step S160 receives encryption section access request input by user.
The memory of terminal device can include two kinds of normal areas and encryption section, specifically, can for computer Any one fdisk in computer or laptop or entire hard disk to be encrypted, and by the one of need for confidentiality A little application programs and sensitive document are put into the encrypted subregion.
When not receiving encryption section access request, the text of the normal areas of unencryption can be only presented in terminal device Part.When receiving encryption section access request, which is transmitted to movable storage device by terminal device.
Specifically, encryption section using AES256 bit encryption algorithms can be encrypted, can also be encrypted with others Encryption section is encrypted in algorithm, such as RSA1024 or 2048 bit encryption algorithms, the concrete type and key of Encryption Algorithm It is limitation of the present invention that length, which should not be construed,.
Step S170 controls the terminal device to pop up the second dialog box and is tested with receiving second user identity input by user Demonstrate,prove information.
Movable storage device can pop up the second dialog box to receive second user body input by user with control terminal equipment Part verification information, specifically, can receive the second encrypted message input by user.Second user authentication information can be with One subscriber authentication information is different, can also be identical.
Step S180, obtains the second user authentication information, and by the second user authentication information with Second pre-set user authentication information is matched.
User after the second dialog box input second user authentication information of terminal device, by second use by terminal device Family authentication information is sent to movable storage device, so that movable storage device utilizes the second pre-set user body of itself storage Part verification information is matched with the second user authentication information received, specifically, by second encrypted message and Second preset password information is matched.
Step S190, if the second user authentication information is matched with the second pre-set user authentication information Success, decrypts the encryption section using pre-stored key.
If second encrypted message and the second preset password information successful match, movable storage device can utilize Pre-stored key decrypts the encryption section.Key storage is in movable storage device, when second user authentication When information is with the second pre-set user authentication information successful match, encryption section can be just decrypted.
In the encryption section access method that the application first embodiment provides, movable storage device and terminal device are first verified Whether it is corresponding, if so, authentication information input by user is received, it will be in authentication information and movable storage device Pre-stored identity information compare, with realize match again.The clean boot of the terminal device is realized after successful match. In encryption section access method provided by the embodiments of the present application, even if the holder of terminal device has lost corresponding terminal and has set Standby, if not losing corresponding movable storage device, other users can not open the terminal device, and it is even more impossible to it is added Close region accesses, decrypts or obtains the sensitive data of encryption section preservation, so as to protect the security of the terminal device.
Second embodiment
Fig. 3 is referred to, Fig. 3 shows the encryption section access mechanism that the application second embodiment provides, which wraps It includes:
Terminal device identity acquisition module 310, for obtaining the first terminal equipment identities of terminal device mark letter Breath.
First information matching module 320, for the first terminal equipment identities identification information and itself first to be moved Dynamic storage device identification information is matched.
Authentication receiving module 330, if for the first terminal equipment identities identification information and the described first movement Storage device identification information successful match controls the terminal device to pop up the first dialog box to receive input by user the One subscriber authentication information.
The authentication receiving module 330 includes the first receiving submodule, and first receiving submodule is used in institute When stating first terminal equipment identities identification information with the first movable storage device identification information successful match, institute is controlled It states terminal device and pops up the first dialog box to receive the first username information input by user and first password information.
Second information matches module 340, for obtaining the first subscriber authentication information, and by first user Authentication information is matched with the first pre-set user authentication information.
Second information matches module 340 includes the first matched sub-block, and first matched sub-block is used for described the One username information is matched with the first pre-set user name information, and the first password information is default close with described first Code information is matched.
Clean boot module 350, if for the first subscriber authentication information and the first pre-set user identity Verification information successful match sends enabling signal to the terminal device so that the encryption section can access.
The clean boot module 350 include the first promoter module, for first username information with it is described The success of first pre-set user name information matches, and the first password information and the first preset password information successful match When, enabling signal is sent to the terminal device so that the encryption section can access.
Fig. 4 is referred to, Fig. 4 shows a kind of specific reality for the encryption section access mechanism that the application second embodiment provides Mode is applied, in addition to above-mentioned module, which further includes:
Encryption section access modules 360, for receiving encryption section access request input by user.
Dialog box pop-up module 370, it is input by user to receive for the terminal device to be controlled to pop up the second dialog box Second user authentication information.
The dialog box pop-up module 370 includes encrypted message submodule, and the encrypted message submodule is used to control institute It states terminal device and pops up the second dialog box to receive the second encrypted message input by user.
3rd information matches module 380, for obtaining the second user authentication information, and by the second user Authentication information is matched with the second pre-set user authentication information.
The 3rd information matches module includes matching receiving submodule, and the matching receiving submodule is used for described the Two encrypted messages are matched with second preset password information.
Deciphering module 390, if for the second user authentication information and the second pre-set user authentication Information matches success, decrypts the encryption section using pre-stored key.
The deciphering module 390 include decryption submodule, if it is described decryption submodule for second encrypted message with During the second preset password information successful match, the encryption section is decrypted using pre-stored key.
It is apparent to those skilled in the art that for convenience and simplicity of description, the device of foregoing description Specific work process, may be referred to the corresponding process in preceding method, no longer excessively repeat herein.
The encryption section access method and device provided through this embodiment, movable storage device obtain the of terminal device One terminal device identification information, by first terminal equipment identities identification information and the first movable storage device identity of itself Identification information is matched;If successful match, control terminal equipment pops up the first dialog box and is used with receiving input by user first Family authentication information matches the first subscriber authentication information with the first pre-set user authentication information;If again Secondary successful match, then movable storage device sends enabling signal to the terminal device, so that the encryption section accesses.First verification moves Whether dynamic storage device is corresponding with terminal device, if so, authentication information input by user is received, by authentication Information is matched again compared with the pre-stored identity information in movable storage device with realizing.It is realized after successful match The clean boot of the terminal device.In encryption section access method provided by the embodiments of the present application, even if terminal device is held Person has lost corresponding terminal device, if not losing corresponding movable storage device, other users can not open this Terminal device, it is even more impossible to its encryption section be accessed, decrypts or obtained the sensitive data of encryption section preservation, so as to protect The security of the terminal device.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation is all difference from other examples, and just to refer each other for identical similar part between each embodiment. For device class embodiment, since it is basicly similar to embodiment of the method, so description is fairly simple, related part ginseng See the part explanation of embodiment of the method.
In several embodiments provided herein, it should be understood that disclosed apparatus and method can also pass through it Its mode is realized.The apparatus embodiments described above are merely exemplary, for example, the flow chart and block diagram in attached drawing are shown Device, architectural framework in the cards, the work(of method and computer program product of multiple embodiments according to the application are shown It can and operate.In this regard, each box in flow chart or block diagram can represent one of a module, program segment or code Point, a part for the module, program segment or code includes one or more and is used to implement the executable of defined logic function Instruction.It should also be noted that at some as in the realization method replaced, the function of being marked in box can also be attached to be different from The order marked in figure occurs.For example, two continuous boxes can essentially perform substantially in parallel, they also may be used sometimes To perform in the opposite order, this is depending on involved function.It is it is also noted that each in block diagram and/or flow chart The combination of box and the box in block diagram and/or flow chart function or the dedicated of action can be based on as defined in execution The system of hardware is realized or can realized with the combination of specialized hardware and computer instruction.
In addition, each function module in each embodiment of the application can integrate to form an independent portion Point or modules individualism, can also two or more modules be integrated to form an independent part.
If the function is realized in the form of software function module and is independent production marketing or in use, can be with It is stored in a computer read/write memory medium.Based on such understanding, the technical solution of the application is substantially in other words The part contribute to the prior art or the part of the technical solution can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be People's computer, server or network equipment etc.) perform each embodiment the method for the application all or part of step. And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic disc or CD.It needs Illustrate, herein, relational terms such as first and second and the like be used merely to by an entity or operation with Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities The relation or order on border.Moreover, term " comprising ", "comprising" or its any other variant are intended to the bag of nonexcludability Contain so that process, method, article or equipment including a series of elements not only include those elements, but also including It other elements that are not explicitly listed or further includes as elements inherent to such a process, method, article, or device. In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element Process, method, also there are other identical elements in article or equipment.
The foregoing is merely the preferred embodiments of the application, are not limited to the application, for the skill of this field For art personnel, the application can have various modifications and variations.It is all within spirit herein and principle, made any repair Change, equivalent substitution, improvement etc., should be included within the protection domain of the application.It should be noted that:Similar label and letter exists Similar terms is represented in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, is then not required in subsequent attached drawing It is further defined and is explained.
The above is only the specific embodiment of the application, but the protection domain of the application is not limited thereto, any In the technical scope that those familiar with the art discloses in the application, change or replacement can be readily occurred in, should all be contained It covers within the protection domain of the application.Therefore, the protection domain of the application described should be subject to the protection scope in claims.

Claims (10)

1. a kind of encryption section access method, which is characterized in that the described method includes:
Receive encryption section access request input by user;
The terminal device is controlled to pop up the second dialog box to receive second user authentication information input by user;
Obtain the second user authentication information, and by the second user authentication information and the second pre-set user body Part verification information is matched;
If the second user authentication information and the second pre-set user authentication information successful match, using advance The key of storage decrypts the encryption section.
2. according to the method described in claim 1, it is characterized in that, the control terminal device pop up the second dialog box with Receive second user authentication information input by user;Obtain the second user authentication information, and by described second Subscriber authentication information is matched with the second pre-set user authentication information;If the second user authentication information With the second pre-set user authentication information successful match, the encryption section is decrypted using pre-stored key, Including:
The terminal device is controlled to pop up the second dialog box to receive the second encrypted message input by user;
Second encrypted message is matched with second preset password information;
If second encrypted message and the second preset password information successful match, using pre-stored key to described It decrypts encryption section.
3. according to the method described in claim 1, it is characterized in that, the method further includes:
The movable storage device obtains the first terminal equipment identities identification information of the terminal device;
By the first terminal equipment identities identification information and the first movable storage device identification information progress of itself Match somebody with somebody;
If the first terminal equipment identities identification information and the first movable storage device identification information successful match, The terminal device is controlled to pop up the first dialog box to receive the first subscriber authentication information input by user;
Obtain the first subscriber authentication information, and by the first subscriber authentication information and the first pre-set user body Part verification information is matched;
If the first subscriber authentication information and the first pre-set user authentication information successful match, send and start Signal is to the terminal device to access the encryption section.
If 4. according to the method described in claim 3, it is characterized in that, the first terminal equipment identities identification information with The first movable storage device identification information successful match controls the terminal device to pop up the first dialog box to receive First subscriber authentication information input by user;Obtain the first subscriber authentication information, and by first user Authentication information is matched with the first pre-set user authentication information;If the first subscriber authentication information and institute The first pre-set user authentication information successful match is stated, sends enabling signal to the terminal device to access the encrypted area Domain, including:
If the first terminal equipment identities identification information and the first movable storage device identification information successful match, The terminal device is controlled to pop up the first dialog box to receive the first username information input by user and first password information;
First username information is matched with the first pre-set user name information, and by the first password information and institute The first preset password information is stated to be matched;
If the success of first username information and the first pre-set user name information matches, and the first password information with The first preset password information successful match sends enabling signal to the terminal device so that the encryption section accesses.
5. according to the method described in claim 1, it is characterized in that, the first terminal equipment identities identification information is in mainboard The MAC codes of BIOS.
6. a kind of encryption section access mechanism, which is characterized in that run on movable storage device, described device includes:
Encryption section access modules, for receiving encryption section access request input by user;
Dialog box pop-up module, for terminal device second dialog box of pop-up to be controlled to receive second user input by user Authentication information;
3rd information matches module for obtaining the second user authentication information, and the second user identity is tested Card information is matched with the second pre-set user authentication information;
Deciphering module, if being matched for the second user authentication information with the second pre-set user authentication information Success, decrypts the encryption section using pre-stored key.
7. device according to claim 6, which is characterized in that the dialog box pop-up module includes encrypted message submodule Block, the 3rd information matches module include matching receiving submodule, and the deciphering module includes decryption submodule;
The encrypted message submodule is used to that the terminal device to be controlled to pop up the second dialog box to receive input by user second Encrypted message;
The matching receiving submodule is used to match second encrypted message with second preset password information;
If the decryption submodule is for second encrypted message and the second preset password information successful match, utilize Pre-stored key decrypts the encryption section.
8. device according to claim 6, which is characterized in that
Terminal device identity acquisition module, for obtaining the first terminal equipment identities identification information of the terminal device;
First information matching module, for the first terminal equipment identities identification information and the first movement storage of itself to be set Standby identification information is matched;
Authentication receiving module, if for the first terminal equipment identities identification information and first movable storage device Identification information successful match controls the terminal device to pop up the first dialog box to receive the first user body input by user Part verification information;
Second information matches module for obtaining the first subscriber authentication information, and first user identity is tested Card information is matched with the first pre-set user authentication information;
Clean boot module, if for the first subscriber authentication information and the first pre-set user authentication information Successful match sends enabling signal to the terminal device to access the encryption section.
9. device according to claim 8, which is characterized in that the authentication receiving module includes first and receives submodule Block, the second information matches module include the first matched sub-block, and the clean boot module includes the first promoter module,
First receiving submodule is used to set in the first terminal equipment identities identification information and the described first movement storage During standby identification information successful match, the terminal device is controlled to pop up the first dialog box and is used with receiving input by user first Name in an account book information and first password information;
First matched sub-block is used to match first username information with the first pre-set user name information, and The first password information is matched with first preset password information;
First promoter module be used for first username information and the first pre-set user name information matches into Work(, and when the first password information and the first preset password information successful match, enabling signal is sent to the terminal Equipment is to access the encryption section.
10. device according to claim 6, which is characterized in that the first terminal equipment identities identification information is mainboard The MAC codes of middle BIOS.
CN201810029364.0A 2018-01-10 2018-01-10 Encryption section access method and device Pending CN108121905A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810029364.0A CN108121905A (en) 2018-01-10 2018-01-10 Encryption section access method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810029364.0A CN108121905A (en) 2018-01-10 2018-01-10 Encryption section access method and device

Publications (1)

Publication Number Publication Date
CN108121905A true CN108121905A (en) 2018-06-05

Family

ID=62232986

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810029364.0A Pending CN108121905A (en) 2018-01-10 2018-01-10 Encryption section access method and device

Country Status (1)

Country Link
CN (1) CN108121905A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109063438A (en) * 2018-08-06 2018-12-21 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of data access method, device, local data secure access equipment and terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1373429A (en) * 2001-11-29 2002-10-09 上海复旦光华信息科技股份有限公司 Automatic logion method based on IC card for server with multiple main domains
CN101788959A (en) * 2010-02-03 2010-07-28 武汉固捷联讯科技有限公司 Solid state hard disk secure encryption system
CN103558994A (en) * 2013-09-29 2014-02-05 记忆科技(深圳)有限公司 Method for encrypting solid state disk partitions and solid state disk
CN103825738A (en) * 2013-12-31 2014-05-28 北京华虹集成电路设计有限责任公司 Registration information authentication method and device
CN104751043A (en) * 2013-12-31 2015-07-01 中国科学院信息工程研究所 Host login method and host login device on basis of IC (integrated circuit) card technologies
CN106991308A (en) * 2017-04-10 2017-07-28 四川阵风科技有限公司 Safety certifying method, apparatus and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1373429A (en) * 2001-11-29 2002-10-09 上海复旦光华信息科技股份有限公司 Automatic logion method based on IC card for server with multiple main domains
CN101788959A (en) * 2010-02-03 2010-07-28 武汉固捷联讯科技有限公司 Solid state hard disk secure encryption system
CN103558994A (en) * 2013-09-29 2014-02-05 记忆科技(深圳)有限公司 Method for encrypting solid state disk partitions and solid state disk
CN103825738A (en) * 2013-12-31 2014-05-28 北京华虹集成电路设计有限责任公司 Registration information authentication method and device
CN104751043A (en) * 2013-12-31 2015-07-01 中国科学院信息工程研究所 Host login method and host login device on basis of IC (integrated circuit) card technologies
CN106991308A (en) * 2017-04-10 2017-07-28 四川阵风科技有限公司 Safety certifying method, apparatus and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109063438A (en) * 2018-08-06 2018-12-21 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of data access method, device, local data secure access equipment and terminal

Similar Documents

Publication Publication Date Title
US11706033B2 (en) Secure distributed information system
US6732278B2 (en) Apparatus and method for authenticating access to a network resource
US9679286B2 (en) Methods and apparatus for enabling secure network-based transactions
JP6818679B2 (en) Secure host card embroidery credentials
KR100586654B1 (en) Wireless banking system and wireless banking method using mobile phone
US20060075230A1 (en) Apparatus and method for authenticating access to a network resource using multiple shared devices
KR20100016579A (en) System and method for distribution of credentials
US20080010453A1 (en) Method and apparatus for one time password access to portable credential entry and memory storage devices
US20170005995A1 (en) Confidential data management method and device, and security authentication method and system
CN110399717B (en) Key acquisition method and device, storage medium and electronic device
JP2006190175A (en) Rfid-use type authentication control system, authentication control method and authentication control program
US20050125698A1 (en) Methods and systems for enabling secure storage of sensitive data
CN108667784A (en) The system and method for internet identity card checking information protection
Mantoro et al. Smart card authentication for Internet applications using NFC enabled phone
CN109075974B (en) Binding authentication method of fingerprint algorithm library and fingerprint sensor and fingerprint identification system
CN104702407B (en) Digital signature device, system and digital signature method
CN110909336B (en) Password management method and device based on fingerprint USB flash disk
JP2006521762A (en) Information transmission system and transmission method using N-dimensional information
CN108121905A (en) Encryption section access method and device
CN108197458A (en) terminal device safe starting method and device
CN111815821B (en) IC card security algorithm applied to intelligent door lock
JP2024502434A (en) Secure generation of one-time passcodes using contactless cards
WO2008142687A2 (en) Biometrically controlled personal data management system and device
JP2003143130A (en) System and method for constant authentication, and system and method for constant authentication of ic card
JPH1188318A (en) Method for changing cipher key for authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination