CN109583160A - Computer opening identity authentication system and its authentication method - Google Patents

Computer opening identity authentication system and its authentication method Download PDF

Info

Publication number
CN109583160A
CN109583160A CN201811391907.XA CN201811391907A CN109583160A CN 109583160 A CN109583160 A CN 109583160A CN 201811391907 A CN201811391907 A CN 201811391907A CN 109583160 A CN109583160 A CN 109583160A
Authority
CN
China
Prior art keywords
terminal
mobile phone
computer
personal computer
phone terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811391907.XA
Other languages
Chinese (zh)
Inventor
胡翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Cloud Finance Information Technology Co Ltd
Original Assignee
Anhui Cloud Finance Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Cloud Finance Information Technology Co Ltd filed Critical Anhui Cloud Finance Information Technology Co Ltd
Priority to CN201811391907.XA priority Critical patent/CN109583160A/en
Publication of CN109583160A publication Critical patent/CN109583160A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/313User authentication using a call-back technique via a telephone network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses computer opening identity authentication system and its authentication methods, are related to computer booting control technology field.The present invention includes personal computer terminal, personal terminal includes virtual machine and physics main system, personal computer terminal is at least connected with a mobile phone terminal by an information transmission unit, it wherein include identifying code module in virtual machine, the identifying code module is used to verify the digital information of real-time display in changing code module in mobile phone terminal, physical host system includes bluetooth authentication system, and the bluetooth authentication system is for verifying whether Bluetooth information in mobile phone terminal has obtained matching authorization.The present invention enhances the privacy of personal computer terminal, prevents PC from opening in my unwitting situation by needing to carry out mobile phone verifying when personal computer terminal is switched on.

Description

Computer opening identity authentication system and its authentication method
Technical field
The invention belongs to computer booting control technology field, more particularly to computer opening identity authentication system and its Authentication method.
Background technique
Today's society, computer are widely used and popularize, with the development of science and technology and financial system, individual privacy etc. The needs of aspect, especially as the development of network identification and payment system, the safety of computer is also increasingly carried on a shoulder pole for people The heart has already appeared finger print identifying, head portrait and through-hole certification booting in the market, and accuracy and convenience are all constantly being sent out Zhan Zhong, the progress of supporter's science and technology by installing virtual machine on PC, and pass through existing telecommunications, shifting in the market Dynamic or connection communication common carrier binding ID virtual-number, and then mobile phone and computer is enabled to carry out information exchange, to use mobile phone Convenience the booting of computer is controlled, will more practical convenient.
Summary of the invention
The purpose of the present invention is to provide computer opening identity authentication system and its authentication methods, by PC Terminal needs to carry out mobile phone verifying when being switched on, and enhances the privacy of personal computer terminal, prevents PC ignorant at me In the case where open.
In order to solve the above technical problems, the present invention is achieved by the following technical solutions:
The present invention is computer opening identity authentication system, including personal computer terminal, and the personal terminal includes virtual Machine and physics main system, the personal computer terminal are at least connected with a mobile phone terminal by an information transmission unit, wherein institute Stating includes identifying code module in virtual machine, which is used to verify in mobile phone terminal real-time display in changing code module Digital information, the physical host system include bluetooth authentication system, and the bluetooth authentication system is blue in mobile phone terminal for verifying Whether tooth information has obtained matching authorization.
Preferably, the personal computer terminal carries out information friendship by the Internet transmission or Bluetooth transmission and mobile phone terminal Mutually.
Preferably, the Internet transmission is prior to Bluetooth transmission.
Computer booting identity recognizes authentication method, includes the following steps: step 1, in booting, desktop is preferentially shown computer Show the desktop constituted in virtual machine, an identifying code authentication window is shown on the desktop;Step 2, the automatic identification PC are whole Whether akrencephalon connects internet, if computer is in connected state, carries out step 3, otherwise carries out step 5;Step 3, and it is a Mobile phone terminal associated by people computer terminal receives personal computer terminal booting prompt;Step 4 will be shown on the mobile phone terminal In the identifying code input identifying code authentication window shown, remaining functional module of computer is opened;Step 5, computer bluetooth authentication module is certainly Dynamic search nearby and the Bluetooth information of mobile phone associated by the personal computer terminal, if near the personal computer terminal can search The Bluetooth information of associated mobile phone then carries out in next step, no person's personal computer terminal then automatic shutdown after half a minute;Step Six, personal computer terminal carries out information exchange, and mobile phone terminal by Bluetooth transmission with mobile phone terminal associated by the personal terminal On will receive people computer terminal booting prompt, carry out step 4.
Preferably, the virtual machine is equipped with a virtual ID number, and personal terminal passes through operation using the virtual ID number Quotient and mobile phone terminal carry out information exchange.
Preferably, if being more than one with mobile phone terminal associated by the personal computer terminal, mobile phone terminal is carried out Order of priority, identifying code module tightly identify identifying code shown by first priority mobile phone terminal.
The invention has the following advantages:
The present invention needs to carry out mobile phone verifying when personal computer terminal is switched on, and enhances the privacy of personal computer terminal, Personal computer terminal and mobile phone terminal pass through interconnection when preventing PC from opening in my unwitting situation, and verifying Net or bluetooth two ways carry out the interaction of information, with prevent computer when connection is less than network can normal boot-strap, association The mobile phone terminal of people's computer can have multiple, applicable and family and company.
Certainly, it implements any of the products of the present invention and does not necessarily require achieving all the advantages described above at the same time.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, will be described below to embodiment required Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is computer opening identity authentication system of the invention;
Fig. 2 is computer booting identity identifying method of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts all other Embodiment shall fall within the protection scope of the present invention.
Refering to Figure 1, the present invention is computer opening identity authentication system, personal computer terminal, personal terminal packet Virtual machine and physics main system are included, personal computer terminal is at least connected with a mobile phone terminal by an information transmission unit, wherein It include identifying code module in virtual machine, which is used to verify the number of real-time display in changing code module in mobile phone terminal Word information, physical host system include bluetooth authentication system, and the bluetooth authentication system is for verifying Bluetooth information in mobile phone terminal Whether matching authorization has been obtained.
Personal computer terminal carries out information exchange by the Internet transmission or Bluetooth transmission and mobile phone terminal;
Wherein digital information shown in changing code module on mobile phone terminal, changing code module are that an identifying code changes mould Block changes safety that is primary, and then increasing identifying code at interval of 30s, and wherein identifying code includes Arabic numerals, English alphabet Or one or more combinations of the Latin alphabet and symbol.
The Internet transmission is prior to Bluetooth transmission, when personal computer terminal connects internet, preferential use information transmission The Internet transmission interactive information in unit.
As shown in Fig. 2, computer booting identity recognizes authentication method, include the following steps:
Step 1, for computer in booting, desktop preferentially shows the desktop constituted in virtual machine, and a verifying is shown on the desktop Code authentication window;
And in booting computer
Step 2, whether the automatic identification personal computer terminal brain connects internet, if computer is in connected state, into Otherwise row step 3 carries out step 5;
Step 3 receives personal computer terminal booting with mobile phone terminal associated by personal computer terminal and prompts;
Step 4, in identifying code input identifying code authentication window that will be shown on the mobile phone terminal, open computer remaining Functional module;
Step 5, computer bluetooth authentication module is searched for automatically nearby to be believed with the bluetooth of mobile phone associated by the personal computer terminal Breath carries out in next step if the personal computer terminal can search the Bluetooth information of associated mobile phone nearby, the personal electricity of no person The brain terminal then automatic shutdown after half a minute;
Mobile phone terminal associated by step 6, personal computer terminal and the personal terminal carries out information friendship by Bluetooth transmission Mutually, and on mobile phone terminal the booting prompt of people computer terminal will be received, step 4 is carried out.
Virtual machine is equipped with a virtual ID number, and personal terminal passes through operator and mobile phone terminal using the virtual ID number Carry out information exchange.
If being more than one with mobile phone terminal associated by personal computer terminal, order of priority is carried out to mobile phone terminal, Identifying code module tightly identifies identifying code shown by first priority mobile phone terminal, i.e. priority first is can be with PC end When end carries out information exchange, cannot then to fully open PC whole in second identifying code that show of mobile phone terminal for priority End.
It is worth noting that, included each unit is only drawn according to function logic in the above system embodiment Point, but be not limited to the above division, as long as corresponding functions can be realized;In addition, each functional unit is specific Title is also only for convenience of distinguishing each other, the protection scope being not intended to restrict the invention.
In addition, those of ordinary skill in the art will appreciate that realizing all or part of the steps in the various embodiments described above method It is that relevant hardware can be instructed to complete by program.
Present invention disclosed above preferred embodiment is only intended to help to illustrate the present invention.There is no detailed for preferred embodiment All details are described, are not limited the invention to the specific embodiments described.Obviously, according to the content of this specification, It can make many modifications and variations.These embodiments are chosen and specifically described to this specification, is in order to better explain the present invention Principle and practical application, so that skilled artisan be enable to better understand and utilize the present invention.The present invention is only It is limited by claims and its full scope and equivalent.

Claims (6)

1. computer opening identity authentication system, including personal computer terminal, the personal terminal includes virtual machine and physics master System, which is characterized in that the personal computer terminal is at least connected with a mobile phone terminal by an information transmission unit, wherein institute Stating includes identifying code module in virtual machine, which is used to verify in mobile phone terminal real-time display in changing code module Digital information, the physical host system include bluetooth authentication system, and the bluetooth authentication system is blue in mobile phone terminal for verifying Whether tooth information has obtained matching authorization.
2. computer opening identity authentication system according to claim 1, which is characterized in that the personal computer terminal is logical It crosses the Internet transmission or Bluetooth transmission and mobile phone terminal carries out information exchange.
3. computer opening identity authentication system according to claim 2, which is characterized in that the Internet transmission is preferential In Bluetooth transmission.
4. computer booting identity according to claim 1 or 2 recognizes authentication method, which comprises the steps of:
Step 1, for computer in booting, desktop preferentially shows the desktop constituted in virtual machine, shows that an identifying code is recognized on the desktop Demonstrate,prove window;
Whether step 2, the automatic identification personal computer terminal brain connect internet, if computer is in connected state, are walked Rapid three, otherwise carry out step 5;
Step 3 receives personal computer terminal booting with mobile phone terminal associated by personal computer terminal and prompts;
Step 4 opens remaining function of computer in identifying code input identifying code authentication window shown on the mobile phone terminal Module;
Step 5, computer bluetooth authentication module search for the Bluetooth information of mobile phone associated by the neighbouring and personal computer terminal automatically, If the personal computer terminal can search the Bluetooth information of associated mobile phone nearby, carry out in next step, no person's PC The terminal then automatic shutdown after half a minute;
Mobile phone terminal associated by step 6, personal computer terminal and the personal terminal carries out information exchange by Bluetooth transmission, and The booting prompt of people computer terminal will be received on mobile phone terminal, carry out step 4.
5. computer booting identity according to claim 4 recognizes authentication method, which is characterized in that the virtual machine is equipped with One virtual ID number, personal terminal carry out information exchange by operator and mobile phone terminal using the virtual ID number.
6. computer booting identity according to claim 4 recognizes authentication method, which is characterized in that if with the PC Mobile phone terminal associated by terminal is more than one, then carries out order of priority to mobile phone terminal, and identifying code module tightly identifies first Identifying code shown by priority mobile phone terminal.
CN201811391907.XA 2018-11-21 2018-11-21 Computer opening identity authentication system and its authentication method Pending CN109583160A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811391907.XA CN109583160A (en) 2018-11-21 2018-11-21 Computer opening identity authentication system and its authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811391907.XA CN109583160A (en) 2018-11-21 2018-11-21 Computer opening identity authentication system and its authentication method

Publications (1)

Publication Number Publication Date
CN109583160A true CN109583160A (en) 2019-04-05

Family

ID=65923641

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811391907.XA Pending CN109583160A (en) 2018-11-21 2018-11-21 Computer opening identity authentication system and its authentication method

Country Status (1)

Country Link
CN (1) CN109583160A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020259203A1 (en) * 2019-06-26 2020-12-30 天地融科技股份有限公司 Security control method, apparatus and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101359354A (en) * 2008-09-28 2009-02-04 北京飞天诚信科技有限公司 Method and system for implementing power-on protection
CN102034053A (en) * 2010-12-31 2011-04-27 中山大学 Computer user terminal authentication method
CN102325319A (en) * 2011-07-18 2012-01-18 迈奔灵动科技(北京)有限公司 Method and system for wireless connection between mobile phone and computer
CN103888265A (en) * 2014-04-11 2014-06-25 上海博路信息技术有限公司 Login system and method based on mobile terminal
CN104618389A (en) * 2015-02-16 2015-05-13 北京技德科技有限公司 Wireless login system and method based on mobile phone
CN107491670A (en) * 2017-08-22 2017-12-19 深圳竹云科技有限公司 A kind of Windows system safe login methods based on OTP algorithm
CN206962863U (en) * 2017-07-08 2018-02-02 湖北美轮易行科技有限公司 Car owner's authentication system based on OBD interfaces
CN107729732A (en) * 2017-09-18 2018-02-23 郑州云海信息技术有限公司 A kind of computer starting method and system based on information security

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101359354A (en) * 2008-09-28 2009-02-04 北京飞天诚信科技有限公司 Method and system for implementing power-on protection
CN102034053A (en) * 2010-12-31 2011-04-27 中山大学 Computer user terminal authentication method
CN102325319A (en) * 2011-07-18 2012-01-18 迈奔灵动科技(北京)有限公司 Method and system for wireless connection between mobile phone and computer
CN103888265A (en) * 2014-04-11 2014-06-25 上海博路信息技术有限公司 Login system and method based on mobile terminal
CN104618389A (en) * 2015-02-16 2015-05-13 北京技德科技有限公司 Wireless login system and method based on mobile phone
CN206962863U (en) * 2017-07-08 2018-02-02 湖北美轮易行科技有限公司 Car owner's authentication system based on OBD interfaces
CN107491670A (en) * 2017-08-22 2017-12-19 深圳竹云科技有限公司 A kind of Windows system safe login methods based on OTP algorithm
CN107729732A (en) * 2017-09-18 2018-02-23 郑州云海信息技术有限公司 A kind of computer starting method and system based on information security

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020259203A1 (en) * 2019-06-26 2020-12-30 天地融科技股份有限公司 Security control method, apparatus and system

Similar Documents

Publication Publication Date Title
CN105610938B (en) Logging state synchronous method and system
CN103118031B (en) Method for logging in application account and electronic equipment
CN102810234B (en) User interface system and method for a gaming machine
EP3065074A1 (en) Fingerprint authentication method and device, intelligent terminal, and computer storage medium
CN105827600B (en) Method and device for logging in client
CN104350723B (en) The method and device that account is logged in
CN103366107A (en) Method, device and mobile phone for protecting access permission of application program
CN106326396B (en) The method and system of page jump are realized in mobile client using customized URL
CN104660688B (en) A kind of method and apparatus obtaining log-on message
CN103488940A (en) Password protection system and method for application programs of intelligent equipment
CN102984044B (en) The method and apparatus realizing data transmission security based on VPN (virtual private network)
CN109408002A (en) A kind of Management System for Clients Information based on cloud storage
CN110311857A (en) A kind of college association online interaction platform
CN104915588B (en) The method for secret protection and device of electronic equipment
CN102833102B (en) Customer premise equipment system of set-card separated type gateway and data configuration management method
CN102521169A (en) Confidential USB (universal serial bus) memory disk with display screen and security control method of confidential USB memory disk
CN109583160A (en) Computer opening identity authentication system and its authentication method
CN101271507B (en) File hiding method, system and device based on USB equipment
CN108520186A (en) Record screen method, mobile terminal and computer readable storage medium
CN105871840B (en) A kind of certificate management method and system
CN110401563A (en) One kind automatically creating user method and terminal based on server B MC WEB
CN104918113B (en) A kind of the function card end compatibility method and system of module TV
CN106776063A (en) Mobile terminal, container telephonic communication function realizing method and across container communication means
CN106066960A (en) A kind of replacement cryptographic methods and replacement encryption apparatus
KR20140079694A (en) Automated human interface device operation procedure

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190405

RJ01 Rejection of invention patent application after publication