CN109446818A - A kind of novel computer starting method - Google Patents

A kind of novel computer starting method Download PDF

Info

Publication number
CN109446818A
CN109446818A CN201811274137.0A CN201811274137A CN109446818A CN 109446818 A CN109446818 A CN 109446818A CN 201811274137 A CN201811274137 A CN 201811274137A CN 109446818 A CN109446818 A CN 109446818A
Authority
CN
China
Prior art keywords
computer
verifying
identification
verified
control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201811274137.0A
Other languages
Chinese (zh)
Inventor
刘相军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian Multidimensional Interactive Digital Technology Co Ltd
Original Assignee
Dalian Multidimensional Interactive Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian Multidimensional Interactive Digital Technology Co Ltd filed Critical Dalian Multidimensional Interactive Digital Technology Co Ltd
Priority to CN201811274137.0A priority Critical patent/CN109446818A/en
Publication of CN109446818A publication Critical patent/CN109446818A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/81Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)
  • Telephone Function (AREA)

Abstract

The present invention relates to field of computer technology, a kind of novel computer starting method is provided, after method includes: system electrification self-test, control main frame enters protection proofing state, and generates identification verifying instruction;It is verified and is instructed according to the identification, multi-level verification is carried out to computer booting authentication information, when being verified, control enters computer system, obstructed out-of-date when verifying, the power supply of the main frame is cut off in control, easy to operate to realize the safe opening of computer, intelligence degree is high, it effectively prevent computer data to leak, brings safety guarantee to user.

Description

A kind of novel computer starting method
Technical field
The invention belongs to field of computer technology more particularly to a kind of novel computer to start method
Background technique
Computer is can to run according to program, automatic, high speed processing mass data modernization intelligent electronic device.Computer It is made of hardware system and software systems, the computer for being fitted without any software is known as bare machine.Can be divided into supercomputer, Industrial control computer, five class of network computer, personal computer and embedded computer, more advanced computer have biometer Calculation machine, photonic computer and quantum computer etc..The development of the development especially advanced science technology of science and technology, needs height It is accurate to calculate.Why the guided missile of computer control can accurately hit predeterminated target, be accurately calculated point with computer It does not open.General computer can have more than ten even tens (binary system) effective digitals, and computational accuracy can be by some thousandths of To a few millionths, be any calculating instrument it is too far behind to catch up;With the continuous increase of computer storage capacity, note can be stored The information recalled is more and more.Computer not only can be carried out calculating, but also can be the data, program and intermediate result of participation operation It is saved with final result, so that user calls at any time;Can also to various information (such as language, text, figure, image, Music etc.) by coding techniques progress arithmetical operation and logical operation, or even make inferences and prove.Computer internal operation is It is carried out according to the procedure auto-control that people finish in advance.User designs operating procedure and journey according to needs of solving a problem in advance Sequence, computer are very strictly operated by the step of procedure stipulation, and whole process is not required to manual intervention, automatic to execute, and are had reached The expected results of user.
Currently, computer, in starting up, the general startup password that need to only input is switched on computer, and repeatedly defeated Mistake, computer power supply will not disconnect automatically, in addition, user can change startup password after entering computer BIOS system, Cause computer security performance extremely low, is easy leakage useful data.
Summary of the invention
The purpose of the present invention is to provide a kind of novel computers to start method, it is intended to solve computer in the prior art and open Startup password is crossed in unblank can enter computer system, and by that can change startup password after BIOS system, cause to calculate The problem of machine security performance is extremely low, is easy leakage useful data.
The invention is realized in this way a kind of novel computer starts method, the method includes the following steps:
After system electrification self-test, control main frame enters protection proofing state, and generates identification verifying instruction;According to Identification verifying instruction, carries out multi-level verification to computer booting authentication information, when being verified, control into Enter computer system, obstructed out-of-date when verifying, the power supply of the main frame is cut off in control;
Wherein, multi-level verification includes fingerprint recognition verifying, signature recognition verifying, recognition of face verifying, dynamic instruction and opens
At least two or two or more in secret code.
As an improvement scheme, it is described according to the identification verify instruct, to computer booting authentication Information carries out multi-level verification, and when being verified, control enters computer system, obstructed out-of-date when verifying, described in control cutting The step of power supply of main frame specifically include the following steps:
It is verified and is instructed according to the identification, call the fingerprint recognition chip of the computer-internal, receive user in institute State the finger print information inputted on fingerprint recognition chip, call pre-stored finger print information, to the finger print information newly received into The verifying of row finger print information controls disconnection power supply relay, main frame power-off if fingerprint authentication does not pass through three times;
If fingerprint authentication passes through, receive the signing messages that user inputs on a touchpad, and to the signing messages of input into Row identification verifying, if being verified, controls into computer system;If signature input verifying does not pass through three times, control is disconnected Switch power supply relay, main frame power-off.
As an improvement scheme, described pair input signing messages carry out identification verifying, if the step of being verified Later, further include following step before the step of control enters computer system:
After signature recognition is verified, front camera on computer display screens is opened in control, acquires the face figure of user Picture, and collected facial image and pre-stored facial image are subjected to identification verifying, if identification is verified, control Facial image is rescaned, if 5 scanning does not pass through, controls disconnection if identification verifying does not pass through into computer system Power supply relay, main frame power-off.
As an improvement scheme, it is described to identify collected facial image and pre-stored facial image Verifying, if after the step of identification is verified, described control into the step of computer system further includes before following step:
After recognition of face passes through, control main frame sends the mobile phone terminal that dynamic instruction is bound to user, and reception makes User inputs dynamic instruction on the screen page of computer display screen, carries out identification verifying to the dynamic instruction received, if Identification is verified, then controls into computer system, complete computer starting;
When user does not carry the mobile phone of binding, then control receives the startup password of user's input on screen page, and Identification verifying is carried out to startup password, if being verified, is controlled into computer system, if verifying number is more than default time Number then returns to execution according to the identification and verifies instruction, calls the fingerprint recognition chip of the computer-internal, reception makes The finger print information that user inputs on the fingerprint recognition chip, calls pre-stored finger print information, to the finger newly received Line information carries out the step of verifying of finger print information.
Detailed description of the invention
Fig. 1 is the implementation flow chart of the computer starting method provided by the invention based on information security.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
Fig. 1 shows the implementation flow chart of the computer starting method provided by the invention based on information security, specific Include the following steps:
In step s101, after system electrification self-test, control main frame enters protection proofing state, and generates identification Verifying instruction.
In step s 102, it is verified and is instructed according to the identification, computer booting authentication information carried out more Level verification, when being verified, control enters computer system, obstructed out-of-date when verifying, and the main frame is cut off in control Power supply;
Wherein, multi-level verification includes that fingerprint recognition verifying, signature recognition verifying, recognition of face verifying, dynamic instruction and booting are close At least two or two or more in code.
Wherein, it is verified and is instructed according to the identification, multi-level verification is carried out to computer booting authentication information, when When being verified, control enters computer system, obstructed out-of-date when verifying, and the power supply of the main frame is cut off in control The step of specifically include the following steps:
It is verified and is instructed according to the identification, call the fingerprint recognition chip of the computer-internal, receive user in institute State the finger print information inputted on fingerprint recognition chip, call pre-stored finger print information, to the finger print information newly received into The verifying of row finger print information controls disconnection power supply relay if fingerprint authentication does not pass through three times, and main frame powers off, In, the number of the fingerprint authentication can be configured according to the actual situation, such as may be set to be five times;
If fingerprint authentication passes through, receive the signing messages that user inputs on a touchpad, and to the signing messages of input into Row identification verifying, if being verified, controls into computer system;If signature input verifying does not pass through three times, control is disconnected Switch power supply relay, main frame power-off, wherein the number of the signature verification can be configured according to the actual situation, example It such as may be set to be five times.
In embodiments of the present invention, identification verifying is carried out to the signing messages of input, if after the step of being verified, institute Stating the step of control enters computer system further includes before following step:
After signature recognition is verified, front camera on computer display screens is opened in control, acquires the face figure of user Picture, and collected facial image and pre-stored facial image are subjected to identification verifying, if identification is verified, control Facial image is rescaned, if 5 scanning does not pass through, controls disconnection if identification verifying does not pass through into computer system Power supply relay, main frame power-off, wherein the number of the face verification can be configured according to the actual situation,
Such as it may be set to be three times.
In embodiments of the present invention, collected facial image and pre-stored facial image are subjected to identification verifying, If after the step of identification is verified, described control into the step of computer system further includes before following step:
After recognition of face passes through, control main frame sends the mobile phone terminal that dynamic instruction is bound to user, and reception makes User inputs dynamic instruction on the screen page of computer display screen, carries out identification verifying to the dynamic instruction received, if Identification is verified, then controls into computer system, complete computer starting;
When user does not carry the mobile phone of binding, then control receives the startup password of user's input on screen page, and Identification verifying is carried out to startup password, if being verified, is controlled into computer system, if verifying number is more than default time Number then returns to execution according to the identification and verifies instruction, calls the fingerprint recognition chip of the computer-internal, reception makes The finger print information that user inputs on the fingerprint recognition chip, calls pre-stored finger print information, to the finger newly received Line information carries out the step of verifying of finger print information.
Following step is also needed to be implemented before executing above-mentioned steps S101:
Finger print information, signing messages, facial image, dynamic password and the startup password of computer user is stored in advance.
In this embodiment, the process of above-mentioned multi-level verification can also include other verification modes, and details are not described herein, but Not to limit the present invention.

Claims (5)

1. a kind of novel computer starts method, which is characterized in that the method includes the following steps:
After system electrification self-test, control main frame enters protection proofing state, and generates identification verifying instruction;According to Identification verifying instruction, carries out multi-level verification to computer booting authentication information, when being verified, control into Enter computer system, obstructed out-of-date when verifying, the power supply of the main frame is cut off in control;Wherein, multi-level verification packet Include at least two in fingerprint recognition verifying, signature recognition verifying, recognition of face verifying, dynamic instruction and startup password or two kind More than.
2. the computer starting method according to claim 1 based on information security, which is characterized in that described according to Identification verifying instruction, carries out multi-level verification to computer booting authentication information, and when being verified, control enters meter Calculation machine system, when the step of verifying is obstructed out-of-date, and the power supply of the main frame is cut off in control specifically includes following steps It is rapid:
It is verified and is instructed according to the identification, call the fingerprint recognition chip of the computer-internal, receive user in institute State the finger print information inputted on fingerprint recognition chip, call pre-stored finger print information, to the finger print information newly received into The verifying of row finger print information controls disconnection power supply relay, main frame power-off if fingerprint authentication does not pass through three times;If Fingerprint authentication passes through, then receives the signing messages that user inputs on a touchpad, and identify to the signing messages of input Verifying, if being verified, controls into computer system;If signature input verifying does not pass through three times, disconnection power supply is controlled Relay, main frame power-off.
3. the computer starting method according to claim 2 based on information security, which is characterized in that described pair input Signing messages carries out identification verifying, if after the step of being verified, it is described to control the step of entering computer system before also Include the following steps:
After signature recognition is verified, front camera on computer display screens is opened in control, acquires the face figure of user Picture, and collected facial image and pre-stored facial image are subjected to identification verifying, if identification is verified, control Facial image is rescaned, if 5 scanning does not pass through, controls disconnection if identification verifying does not pass through into computer system Power supply relay, main frame power-off.
4. the computer starting method according to claim 3 based on information security, which is characterized in that described to acquire To facial image and pre-stored facial image carry out identification verifying, if after identification the step of being verified, the control System further includes following step before entering the step of computer system:
After recognition of face passes through, control main frame sends the mobile phone terminal that dynamic instruction is bound to user, and reception makes User inputs dynamic instruction on the screen page of computer display screen, carries out identification verifying to the dynamic instruction received, if
Identification is verified, then controls into computer system, complete computer starting;
When user does not carry the mobile phone of binding, then control receives the startup password of user's input on screen page, and Identification verifying is carried out to startup password, if being verified, is controlled into computer system, if the non-number of pass times of verifying is more than pre- If number, then execution is returned according to the identification and verifies instruction, the fingerprint recognition chip of the computer-internal is called, connects The finger print information that inputs on the fingerprint recognition chip of user is received, pre-stored finger print information is called, to newly receiving Finger print information carry out finger print information verifying the step of.
5. the computer starting method according to claim 4 based on information security, which is characterized in that the method is also wrapped Include following step:
Finger print information, signing messages, facial image, dynamic password and the startup password of computer user is stored in advance.
CN201811274137.0A 2018-10-30 2018-10-30 A kind of novel computer starting method Withdrawn CN109446818A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811274137.0A CN109446818A (en) 2018-10-30 2018-10-30 A kind of novel computer starting method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811274137.0A CN109446818A (en) 2018-10-30 2018-10-30 A kind of novel computer starting method

Publications (1)

Publication Number Publication Date
CN109446818A true CN109446818A (en) 2019-03-08

Family

ID=65548928

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811274137.0A Withdrawn CN109446818A (en) 2018-10-30 2018-10-30 A kind of novel computer starting method

Country Status (1)

Country Link
CN (1) CN109446818A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113111332A (en) * 2021-04-13 2021-07-13 武汉天梯科技股份有限公司 Artificial intelligence real-time detection security attack system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113111332A (en) * 2021-04-13 2021-07-13 武汉天梯科技股份有限公司 Artificial intelligence real-time detection security attack system

Similar Documents

Publication Publication Date Title
CN107832670B (en) Face recognition method and related product
US8618911B2 (en) Simplified biometric character sequence entry
CN104205721B (en) The adaptive authentication method of context aware and device
CN107729732A (en) A kind of computer starting method and system based on information security
EP2631843A2 (en) Method and system for authenticating user of a mobile device via hybrid biometics information
US20150067827A1 (en) Apparatus and method for setting a user-defined pattern for an application
CN107808127B (en) Face recognition method and related product
CN101673329B (en) Establishment method of biometric data, electronic device and computer program product thereof
US9207850B2 (en) Application executing method using fingerprint recognition, device therefor, and computer readable recording medium therefor
CN105929974B (en) A kind of Password Input management method and mobile terminal
EP1789873A2 (en) Non-intrusive trusted user interface
CN103686729A (en) Mobile banking authentication method and system for performing self-help registration through identity card
CN113111340A (en) Method, device, equipment and readable medium for displaying login mode options
CN109254661A (en) Image display method, device, storage medium and electronic equipment
CN107085694B (en) Information display processing method and device
CN109446818A (en) A kind of novel computer starting method
CN105871840B (en) A kind of certificate management method and system
WO2017052277A1 (en) Method and system for authenticating identity using variable keypad
CN111669744A (en) Information processing method and device and electronic equipment
CN111859322A (en) Identity verification method and device and electronic equipment
CN109165490A (en) A kind of data inputting method and device
CN105373743B (en) The calling control method of input method process, call control system and terminal
CN109104759B (en) Interaction method of electronic equipment, electronic equipment and computer readable medium
CN103902865A (en) Information processing method and electronic device
CN113420271A (en) Identity authentication method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20190308