CN109446818A - A kind of novel computer starting method - Google Patents
A kind of novel computer starting method Download PDFInfo
- Publication number
- CN109446818A CN109446818A CN201811274137.0A CN201811274137A CN109446818A CN 109446818 A CN109446818 A CN 109446818A CN 201811274137 A CN201811274137 A CN 201811274137A CN 109446818 A CN109446818 A CN 109446818A
- Authority
- CN
- China
- Prior art keywords
- computer
- verifying
- identification
- verified
- control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/81—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
- Telephone Function (AREA)
Abstract
The present invention relates to field of computer technology, a kind of novel computer starting method is provided, after method includes: system electrification self-test, control main frame enters protection proofing state, and generates identification verifying instruction;It is verified and is instructed according to the identification, multi-level verification is carried out to computer booting authentication information, when being verified, control enters computer system, obstructed out-of-date when verifying, the power supply of the main frame is cut off in control, easy to operate to realize the safe opening of computer, intelligence degree is high, it effectively prevent computer data to leak, brings safety guarantee to user.
Description
Technical field
The invention belongs to field of computer technology more particularly to a kind of novel computer to start method
Background technique
Computer is can to run according to program, automatic, high speed processing mass data modernization intelligent electronic device.Computer
It is made of hardware system and software systems, the computer for being fitted without any software is known as bare machine.Can be divided into supercomputer,
Industrial control computer, five class of network computer, personal computer and embedded computer, more advanced computer have biometer
Calculation machine, photonic computer and quantum computer etc..The development of the development especially advanced science technology of science and technology, needs height
It is accurate to calculate.Why the guided missile of computer control can accurately hit predeterminated target, be accurately calculated point with computer
It does not open.General computer can have more than ten even tens (binary system) effective digitals, and computational accuracy can be by some thousandths of
To a few millionths, be any calculating instrument it is too far behind to catch up;With the continuous increase of computer storage capacity, note can be stored
The information recalled is more and more.Computer not only can be carried out calculating, but also can be the data, program and intermediate result of participation operation
It is saved with final result, so that user calls at any time;Can also to various information (such as language, text, figure, image,
Music etc.) by coding techniques progress arithmetical operation and logical operation, or even make inferences and prove.Computer internal operation is
It is carried out according to the procedure auto-control that people finish in advance.User designs operating procedure and journey according to needs of solving a problem in advance
Sequence, computer are very strictly operated by the step of procedure stipulation, and whole process is not required to manual intervention, automatic to execute, and are had reached
The expected results of user.
Currently, computer, in starting up, the general startup password that need to only input is switched on computer, and repeatedly defeated
Mistake, computer power supply will not disconnect automatically, in addition, user can change startup password after entering computer BIOS system,
Cause computer security performance extremely low, is easy leakage useful data.
Summary of the invention
The purpose of the present invention is to provide a kind of novel computers to start method, it is intended to solve computer in the prior art and open
Startup password is crossed in unblank can enter computer system, and by that can change startup password after BIOS system, cause to calculate
The problem of machine security performance is extremely low, is easy leakage useful data.
The invention is realized in this way a kind of novel computer starts method, the method includes the following steps:
After system electrification self-test, control main frame enters protection proofing state, and generates identification verifying instruction;According to
Identification verifying instruction, carries out multi-level verification to computer booting authentication information, when being verified, control into
Enter computer system, obstructed out-of-date when verifying, the power supply of the main frame is cut off in control;
Wherein, multi-level verification includes fingerprint recognition verifying, signature recognition verifying, recognition of face verifying, dynamic instruction and opens
At least two or two or more in secret code.
As an improvement scheme, it is described according to the identification verify instruct, to computer booting authentication
Information carries out multi-level verification, and when being verified, control enters computer system, obstructed out-of-date when verifying, described in control cutting
The step of power supply of main frame specifically include the following steps:
It is verified and is instructed according to the identification, call the fingerprint recognition chip of the computer-internal, receive user in institute
State the finger print information inputted on fingerprint recognition chip, call pre-stored finger print information, to the finger print information newly received into
The verifying of row finger print information controls disconnection power supply relay, main frame power-off if fingerprint authentication does not pass through three times;
If fingerprint authentication passes through, receive the signing messages that user inputs on a touchpad, and to the signing messages of input into
Row identification verifying, if being verified, controls into computer system;If signature input verifying does not pass through three times, control is disconnected
Switch power supply relay, main frame power-off.
As an improvement scheme, described pair input signing messages carry out identification verifying, if the step of being verified
Later, further include following step before the step of control enters computer system:
After signature recognition is verified, front camera on computer display screens is opened in control, acquires the face figure of user
Picture, and collected facial image and pre-stored facial image are subjected to identification verifying, if identification is verified, control
Facial image is rescaned, if 5 scanning does not pass through, controls disconnection if identification verifying does not pass through into computer system
Power supply relay, main frame power-off.
As an improvement scheme, it is described to identify collected facial image and pre-stored facial image
Verifying, if after the step of identification is verified, described control into the step of computer system further includes before following step:
After recognition of face passes through, control main frame sends the mobile phone terminal that dynamic instruction is bound to user, and reception makes
User inputs dynamic instruction on the screen page of computer display screen, carries out identification verifying to the dynamic instruction received, if
Identification is verified, then controls into computer system, complete computer starting;
When user does not carry the mobile phone of binding, then control receives the startup password of user's input on screen page, and
Identification verifying is carried out to startup password, if being verified, is controlled into computer system, if verifying number is more than default time
Number then returns to execution according to the identification and verifies instruction, calls the fingerprint recognition chip of the computer-internal, reception makes
The finger print information that user inputs on the fingerprint recognition chip, calls pre-stored finger print information, to the finger newly received
Line information carries out the step of verifying of finger print information.
Detailed description of the invention
Fig. 1 is the implementation flow chart of the computer starting method provided by the invention based on information security.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
Fig. 1 shows the implementation flow chart of the computer starting method provided by the invention based on information security, specific
Include the following steps:
In step s101, after system electrification self-test, control main frame enters protection proofing state, and generates identification
Verifying instruction.
In step s 102, it is verified and is instructed according to the identification, computer booting authentication information carried out more
Level verification, when being verified, control enters computer system, obstructed out-of-date when verifying, and the main frame is cut off in control
Power supply;
Wherein, multi-level verification includes that fingerprint recognition verifying, signature recognition verifying, recognition of face verifying, dynamic instruction and booting are close
At least two or two or more in code.
Wherein, it is verified and is instructed according to the identification, multi-level verification is carried out to computer booting authentication information, when
When being verified, control enters computer system, obstructed out-of-date when verifying, and the power supply of the main frame is cut off in control
The step of specifically include the following steps:
It is verified and is instructed according to the identification, call the fingerprint recognition chip of the computer-internal, receive user in institute
State the finger print information inputted on fingerprint recognition chip, call pre-stored finger print information, to the finger print information newly received into
The verifying of row finger print information controls disconnection power supply relay if fingerprint authentication does not pass through three times, and main frame powers off,
In, the number of the fingerprint authentication can be configured according to the actual situation, such as may be set to be five times;
If fingerprint authentication passes through, receive the signing messages that user inputs on a touchpad, and to the signing messages of input into
Row identification verifying, if being verified, controls into computer system;If signature input verifying does not pass through three times, control is disconnected
Switch power supply relay, main frame power-off, wherein the number of the signature verification can be configured according to the actual situation, example
It such as may be set to be five times.
In embodiments of the present invention, identification verifying is carried out to the signing messages of input, if after the step of being verified, institute
Stating the step of control enters computer system further includes before following step:
After signature recognition is verified, front camera on computer display screens is opened in control, acquires the face figure of user
Picture, and collected facial image and pre-stored facial image are subjected to identification verifying, if identification is verified, control
Facial image is rescaned, if 5 scanning does not pass through, controls disconnection if identification verifying does not pass through into computer system
Power supply relay, main frame power-off, wherein the number of the face verification can be configured according to the actual situation,
Such as it may be set to be three times.
In embodiments of the present invention, collected facial image and pre-stored facial image are subjected to identification verifying,
If after the step of identification is verified, described control into the step of computer system further includes before following step:
After recognition of face passes through, control main frame sends the mobile phone terminal that dynamic instruction is bound to user, and reception makes
User inputs dynamic instruction on the screen page of computer display screen, carries out identification verifying to the dynamic instruction received, if
Identification is verified, then controls into computer system, complete computer starting;
When user does not carry the mobile phone of binding, then control receives the startup password of user's input on screen page, and
Identification verifying is carried out to startup password, if being verified, is controlled into computer system, if verifying number is more than default time
Number then returns to execution according to the identification and verifies instruction, calls the fingerprint recognition chip of the computer-internal, reception makes
The finger print information that user inputs on the fingerprint recognition chip, calls pre-stored finger print information, to the finger newly received
Line information carries out the step of verifying of finger print information.
Following step is also needed to be implemented before executing above-mentioned steps S101:
Finger print information, signing messages, facial image, dynamic password and the startup password of computer user is stored in advance.
In this embodiment, the process of above-mentioned multi-level verification can also include other verification modes, and details are not described herein, but
Not to limit the present invention.
Claims (5)
1. a kind of novel computer starts method, which is characterized in that the method includes the following steps:
After system electrification self-test, control main frame enters protection proofing state, and generates identification verifying instruction;According to
Identification verifying instruction, carries out multi-level verification to computer booting authentication information, when being verified, control into
Enter computer system, obstructed out-of-date when verifying, the power supply of the main frame is cut off in control;Wherein, multi-level verification packet
Include at least two in fingerprint recognition verifying, signature recognition verifying, recognition of face verifying, dynamic instruction and startup password or two kind
More than.
2. the computer starting method according to claim 1 based on information security, which is characterized in that described according to
Identification verifying instruction, carries out multi-level verification to computer booting authentication information, and when being verified, control enters meter
Calculation machine system, when the step of verifying is obstructed out-of-date, and the power supply of the main frame is cut off in control specifically includes following steps
It is rapid:
It is verified and is instructed according to the identification, call the fingerprint recognition chip of the computer-internal, receive user in institute
State the finger print information inputted on fingerprint recognition chip, call pre-stored finger print information, to the finger print information newly received into
The verifying of row finger print information controls disconnection power supply relay, main frame power-off if fingerprint authentication does not pass through three times;If
Fingerprint authentication passes through, then receives the signing messages that user inputs on a touchpad, and identify to the signing messages of input
Verifying, if being verified, controls into computer system;If signature input verifying does not pass through three times, disconnection power supply is controlled
Relay, main frame power-off.
3. the computer starting method according to claim 2 based on information security, which is characterized in that described pair input
Signing messages carries out identification verifying, if after the step of being verified, it is described to control the step of entering computer system before also
Include the following steps:
After signature recognition is verified, front camera on computer display screens is opened in control, acquires the face figure of user
Picture, and collected facial image and pre-stored facial image are subjected to identification verifying, if identification is verified, control
Facial image is rescaned, if 5 scanning does not pass through, controls disconnection if identification verifying does not pass through into computer system
Power supply relay, main frame power-off.
4. the computer starting method according to claim 3 based on information security, which is characterized in that described to acquire
To facial image and pre-stored facial image carry out identification verifying, if after identification the step of being verified, the control
System further includes following step before entering the step of computer system:
After recognition of face passes through, control main frame sends the mobile phone terminal that dynamic instruction is bound to user, and reception makes
User inputs dynamic instruction on the screen page of computer display screen, carries out identification verifying to the dynamic instruction received, if
Identification is verified, then controls into computer system, complete computer starting;
When user does not carry the mobile phone of binding, then control receives the startup password of user's input on screen page, and
Identification verifying is carried out to startup password, if being verified, is controlled into computer system, if the non-number of pass times of verifying is more than pre-
If number, then execution is returned according to the identification and verifies instruction, the fingerprint recognition chip of the computer-internal is called, connects
The finger print information that inputs on the fingerprint recognition chip of user is received, pre-stored finger print information is called, to newly receiving
Finger print information carry out finger print information verifying the step of.
5. the computer starting method according to claim 4 based on information security, which is characterized in that the method is also wrapped
Include following step:
Finger print information, signing messages, facial image, dynamic password and the startup password of computer user is stored in advance.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811274137.0A CN109446818A (en) | 2018-10-30 | 2018-10-30 | A kind of novel computer starting method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811274137.0A CN109446818A (en) | 2018-10-30 | 2018-10-30 | A kind of novel computer starting method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109446818A true CN109446818A (en) | 2019-03-08 |
Family
ID=65548928
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811274137.0A Withdrawn CN109446818A (en) | 2018-10-30 | 2018-10-30 | A kind of novel computer starting method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109446818A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113111332A (en) * | 2021-04-13 | 2021-07-13 | 武汉天梯科技股份有限公司 | Artificial intelligence real-time detection security attack system |
-
2018
- 2018-10-30 CN CN201811274137.0A patent/CN109446818A/en not_active Withdrawn
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113111332A (en) * | 2021-04-13 | 2021-07-13 | 武汉天梯科技股份有限公司 | Artificial intelligence real-time detection security attack system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107832670B (en) | Face recognition method and related product | |
US8618911B2 (en) | Simplified biometric character sequence entry | |
CN104205721B (en) | The adaptive authentication method of context aware and device | |
CN107729732A (en) | A kind of computer starting method and system based on information security | |
EP2631843A2 (en) | Method and system for authenticating user of a mobile device via hybrid biometics information | |
US20150067827A1 (en) | Apparatus and method for setting a user-defined pattern for an application | |
CN107808127B (en) | Face recognition method and related product | |
CN101673329B (en) | Establishment method of biometric data, electronic device and computer program product thereof | |
US9207850B2 (en) | Application executing method using fingerprint recognition, device therefor, and computer readable recording medium therefor | |
CN105929974B (en) | A kind of Password Input management method and mobile terminal | |
EP1789873A2 (en) | Non-intrusive trusted user interface | |
CN103686729A (en) | Mobile banking authentication method and system for performing self-help registration through identity card | |
CN113111340A (en) | Method, device, equipment and readable medium for displaying login mode options | |
CN109254661A (en) | Image display method, device, storage medium and electronic equipment | |
CN107085694B (en) | Information display processing method and device | |
CN109446818A (en) | A kind of novel computer starting method | |
CN105871840B (en) | A kind of certificate management method and system | |
WO2017052277A1 (en) | Method and system for authenticating identity using variable keypad | |
CN111669744A (en) | Information processing method and device and electronic equipment | |
CN111859322A (en) | Identity verification method and device and electronic equipment | |
CN109165490A (en) | A kind of data inputting method and device | |
CN105373743B (en) | The calling control method of input method process, call control system and terminal | |
CN109104759B (en) | Interaction method of electronic equipment, electronic equipment and computer readable medium | |
CN103902865A (en) | Information processing method and electronic device | |
CN113420271A (en) | Identity authentication method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190308 |