CN109697375B - Firmware, electronic device and information processing method - Google Patents

Firmware, electronic device and information processing method Download PDF

Info

Publication number
CN109697375B
CN109697375B CN201811408973.3A CN201811408973A CN109697375B CN 109697375 B CN109697375 B CN 109697375B CN 201811408973 A CN201811408973 A CN 201811408973A CN 109697375 B CN109697375 B CN 109697375B
Authority
CN
China
Prior art keywords
equipment
matching result
peripheral
information
firmware
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811408973.3A
Other languages
Chinese (zh)
Other versions
CN109697375A (en
Inventor
洪肇佑
张瑞麟
曾子轩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Lianbao Information Technology Co Ltd
Original Assignee
Hefei Lianbao Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Lianbao Information Technology Co Ltd filed Critical Hefei Lianbao Information Technology Co Ltd
Priority to CN201811408973.3A priority Critical patent/CN109697375B/en
Publication of CN109697375A publication Critical patent/CN109697375A/en
Application granted granted Critical
Publication of CN109697375B publication Critical patent/CN109697375B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/40Bus structure
    • G06F13/4063Device-to-bus coupling

Abstract

The embodiment of the invention provides a firmware, an electronic device and an information processing method, wherein the firmware comprises the following components: a determination module configured to: responding to the equipment information of the peripheral equipment, and judging the matching result of the equipment information; the judging module is not writable; the firmware at least: booting an operating system of the electronic device based on the matching result; the electronic device operates based on firmware as described above. In the firmware of the embodiment of the invention, the judgment module is set to be unwritable, peripheral equipment or technicians cannot modify the judgment module, and the judgment result of the judgment module cannot be influenced. Therefore, the electronic equipment is safer and can provide better safety experience for users.

Description

Firmware, electronic device and information processing method
Technical Field
The embodiment of the invention relates to the technical field of electronic equipment, in particular to firmware, electronic equipment applying the firmware and an information processing method.
Background
After the peripheral equipment is connected with the computer through the USB interface, the data in the computer can be modified through the USB interface, namely, the peripheral equipment has the reading authority and the writing authority simultaneously. To protect the computer security and prevent the data in the computer from being illegally modified. In the prior art, in a Linux system, Grub may be set to not enable a USB interface by modifying modprobe. In the Shell system or the Dos system, a user password can be set to prevent others from entering the Shell system or the Dos system.
However, according to the above solution, a professional technician can recover the read-write permission of the external device to the computer through the USB interface through the operating system. Conf, for example, in the Linux operating system, the USB interface may be modified to release the restriction on the USB interface, or the USB interface may be removed from the blacklist, so as to recover the read/write permission of the external device to the computer through the USB interface. In the Shell system or the Dos system, the default setting of the USB interface can be recovered through third-party software or the user password can be cracked to enter the Shell system or the Dos system.
Disclosure of Invention
In view of the foregoing problems in the prior art, embodiments of the present invention provide a security control method and an electronic device.
In order to solve the above problems, the embodiment of the present invention provides the following technical solutions:
firmware, comprising:
a determination module configured to: responding to the equipment information of the peripheral equipment, and judging the matching result of the equipment information; the judging module is not writable;
the firmware at least: and booting an operating system of the electronic equipment based on the matching result.
As an improvement of the embodiment of the invention, the firmware further: enabling at least one of the peripheral device or a peripheral device corresponding to the peripheral device based on the matching result.
An electronic device operating based on firmware as described above.
As an improvement of the embodiment of the present invention, the determining module of the firmware is further configured to:
and judging the matching result of the equipment information based on the pre-stored equipment information list.
In a further refinement, the matching result is used at least for:
and setting the read-write permission of the electronic equipment to the peripheral equipment.
In a further improvement, the determining module of the firmware is further configured to:
setting the read-write permission of the electronic equipment to the peripheral equipment to be readable and writable under the condition that the matching result is that the equipment information is matched with the equipment information list;
and setting the read-write permission of the electronic equipment to the peripheral equipment to be readable under the condition that the matching result is that the equipment information is not matched with the equipment information list.
In a further improvement, the device information is a product serial number of the peripheral device.
Further improvement, still include: and the data interface is used for being connected with the external equipment to acquire the equipment information of the external equipment.
The information processing method is applied to the electronic equipment and comprises the following steps:
responding to the equipment information of the peripheral equipment;
judging a matching result of the equipment information based on a pre-stored equipment information list which cannot be changed;
and setting the read-write permission of the electronic equipment to the peripheral equipment based on the matching result.
As an improvement of the embodiment of the present invention, the setting of the read-write permission of the electronic device to the peripheral device based on the matching result includes:
setting the read-write permission of the electronic equipment to the peripheral equipment to be readable and writable under the condition that the matching result is that the equipment information is matched with the equipment information list;
and setting the read-write permission of the electronic equipment to the peripheral equipment to be readable under the condition that the matching result is that the equipment information is not matched with the equipment information list.
Compared with the prior art, the embodiment of the invention has the beneficial effects that:
in the firmware of the embodiment of the present invention, the determination module is set to be unwritable, so the determination process of the determination module is not modifiable, and the information based on the determination result of the device information is also not modifiable, that is, the peripheral device or the technician cannot modify the determination module, nor affect the determination result of the determination module. If the equipment information of the peripheral equipment is judged to be matched, at least guiding an operating system of the electronic equipment; and if the device information of the peripheral equipment is judged not to be matched, the operating system of the electronic equipment cannot be guided. Therefore, the electronic equipment is safer and can provide better safety experience for users.
Drawings
FIG. 1 is a block diagram of firmware according to an embodiment of the present invention;
FIG. 2 is a block diagram of an electronic device according to an embodiment of the invention;
FIG. 3 is a flowchart of an embodiment of an information processing method according to the present invention;
fig. 4 is a flowchart of another embodiment of an information processing method according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the embodiments of the present invention better understood, the present invention will be described in detail with reference to the accompanying drawings and the detailed description.
Fig. 1 is a block diagram of a firmware according to an embodiment of the present invention, and referring to fig. 1, the firmware according to the embodiment of the present invention includes: a determination module configured to: responding to the equipment information of the peripheral equipment, and judging the matching result of the equipment information; the judging module is not writable; the firmware boots an operating system of the electronic device based at least on the matching result.
The peripheral device may be an input device, a display device, a printing device, an external memory, a network device, or other types of peripheral devices, such as a USB Key, a USB storage device, a USB switching device, etc. The device information of the peripheral device is device information capable of characterizing the peripheral device, such as SN code, IMEI code, MEID code, device electrical parameter information including but not limited to current, voltage, power consumption, and the like. The electronic device may be, for example, a tablet computer, a notebook computer, a smart phone, etc., and is not described herein again. The operating system of the electronic device may be, for example, Linux, Shell, Dos, Windows, or the like.
Because the judging module is set to be unwritable, the judging process of the judging module cannot be modified, and the information based on the matching result of the equipment information cannot be modified in the process of judging the matching result of the equipment information, namely, the peripheral equipment or a technician cannot modify the judging module and cannot influence the judging result of the judging module. If the equipment information of the peripheral equipment is judged to be matched, at least guiding an operating system of the electronic equipment; if the device information of the peripheral device is judged not to match, at least the booting of the operating system of the electronic device is affected, for example, the booting cannot be performed, the booting needs to be performed in other manners, and the selective booting under multiple operating systems is performed. Therefore, the electronic equipment is safer and can provide better safety experience for users.
For example, the peripheral device is a USB Key, and the electronic device is a notebook computer. When the notebook computer leaves a factory, one or more specific USB keys are matched, and the USB keys are used for identity recognition so as to start an operating system of the notebook computer. At the time of production, the firmware of the embodiment of the present invention may be formed, for example, by BIOS, UEFI, etc. according to different electronic device characteristics, and the firmware includes a judgment module that is set to be unwritable. When the USB Key is plugged in the notebook computer, the BIOS reads the SN code of the USB Key, judges whether the USB Key is matched or not based on the SN code, and guides the operating system of the notebook computer if the USB Key is matched. The boot operating system may be booted for the boot operating system, or may be booted for the boot operating system, for example, activated, unlocked, or operated.
In some embodiments, the determining module of the firmware may be further configured to: and judging the matching result of the equipment information based on the pre-stored equipment information list. The device information list may be a list generated based on the device information, and include a correspondence relationship between at least one peripheral device and the device information. When the device information of the peripheral device is acquired, whether the device information is matched or not can be judged based on the device information list. The device information list may be pre-stored in a non-volatile storage (NVS) of the electronic device at the time of manufacture, and the electronic device may be an electronic device having a data connection established with the firmware of the embodiment of the present invention. For example, the peripheral device is a USB Key, and the electronic device is a notebook computer. When the notebook computer is produced, the equipment information list formed based on the SN code can be pre-stored in the nonvolatile memory.
In some embodiments, the firmware is further configured to enable the peripheral device based on the matching result. Namely, the judging module judges the matching result of the equipment information corresponding to the equipment information of the peripheral equipment. And when the equipment information is judged to be matched, enabling the peripheral equipment to operate. For example, taking a USB storage device as an example, after the USB storage device is inserted into a notebook computer, the BIOS reads an SN code of the USB storage device, determines whether the USB storage device is matched based on a pre-stored device information list and the SN code, and enables the USB storage device if the USB storage device is matched.
In some embodiments, the firmware may also be further configured to enable at least one of the peripheral devices corresponding to the peripheral device based on the matching result. Namely, the judging module judges the matching result of the equipment information corresponding to the equipment information of the peripheral equipment. And enabling at least one of the peripheral devices corresponding to the peripheral device when the device information is judged to be matched. For example, still taking the USB Key as an example, after the USB Key is inserted into a notebook computer, it is determined whether the SN code obtained from the USB Key matches a pre-stored list item of device information, and if so, other external devices such as a USB storage device or a smart phone connected to the notebook computer are enabled.
Fig. 2 is a schematic structural diagram of an electronic device according to an embodiment of the present invention, where the electronic device may be, for example, a notebook computer, a tablet computer, a smart phone, or other electronic devices, and details thereof are not repeated here. Referring to fig. 2, the electronic device operates based on firmware as described above. The determination module of the firmware as described above is configured to: responding to the equipment information of the peripheral equipment, and judging the matching result of the equipment information; the judging module is not writable; the firmware boots an operating system of the electronic device based at least on the matching result.
Since the judgment module of the firmware is not writable, the judgment process of the judgment module is not modifiable, and the information based on the judgment result of the device information is also not modifiable, i.e., the peripheral device or the technician cannot modify the judgment module based on the system hierarchy, nor affect the judgment result of the judgment module. If the equipment information of the peripheral equipment is judged to be matched, an operating system of the electronic equipment is guided; and if the device information of the peripheral equipment is judged not to be matched, the operating system of the electronic equipment is influenced to be guided.
In some embodiments, the electronic device further comprises a data interface for connecting with an external device to obtain device information of the peripheral device. The data interface may be, for example, a USB interface or other data interface. The peripheral device may be an input device, a display device, a printing device, an external memory, a network device, or other types of peripheral devices, such as a USB Key, a USB storage device, a USB transfer device, etc.
In some embodiments, the determining module of the firmware may be further configured to: and judging the matching result of the equipment information based on the pre-stored equipment information list. The device information list may be a device information table generated based on device information of the customized peripheral device. The device information list may be pre-stored in a non-volatile storage (NVS) of the electronic device when the electronic device is produced, and when the device information of the peripheral device is acquired, whether the device information matches may be determined based on the device information list. For example, the peripheral device is a USB Key, and the electronic device is a notebook computer. When the notebook computer is produced, an equipment information list can be generated based on the equipment information capable of representing the identity of the USB Key, and the equipment information list is pre-stored in the nonvolatile memory. Therefore, only the customized USB Key can be successfully matched, and the operating system of the notebook computer is guided.
In some embodiments, the device information may be, for example, a product serial number (SN code), an IMEI code, or an MEID code, the device information being used to characterize a particular identity of the peripheral device.
For example, in the case of a notebook computer, during production, a firmware may be written in, for example, a BIOS of the notebook computer, where the firmware includes a determining module that is set as non-writable. The notebook computer can be subjected to customized design on the USB interface when leaving a factory, and is matched with one or more specific USB keys, USB storage equipment, USB switching equipment and the like. When a customized USB Key is plugged into a notebook computer, for example, the BIOS reads the SN code of the USB Key, judges whether the USB Key is matched based on the SN code, and boots the operating system of the notebook computer if the USB Key is matched. If the non-customized USB Key is plugged into the notebook computer, the operating system of the notebook computer cannot be guided.
In some embodiments, the matching result is used at least to: and setting the read-write permission of the electronic equipment to the peripheral equipment. Namely, the determining module of the firmware is further configured to:
setting the read-write permission of the electronic equipment to the external equipment to be readable and writable when the matching result is that the equipment information is matched with the equipment information list;
and under the condition that the matching result is that the equipment information is not matched with the equipment information list, setting the read-write permission of the electronic equipment to the external equipment to be readable.
For example, in the case of a notebook computer, during production, a firmware may be written in, for example, a BIOS of the notebook computer, where the firmware includes a determining module that is set as non-writable. The notebook computer can be subjected to customized design on the USB interface when leaving a factory, and is matched with one or more specific peripheral devices and the like. When a customized peripheral device is plugged into a notebook computer, for example, the BIOS reads the SN code of the peripheral device, and determines whether the SN code matches based on a device information list, and if the SN code matches, it indicates that the peripheral device is a specific and secure peripheral device, and then directs an operating system of the notebook computer to set the read-write permission of the peripheral device to be readable and writable. If the SN code is not matched with the equipment information list, the peripheral equipment is indicated to be not specific and safe peripheral equipment, then an operating system of the notebook computer is guided, and the read-write permission of the peripheral equipment is set to be only readable so as to ensure the information safety in the notebook computer.
In some embodiments, the device information may also be device operating parameters of the device, such as current information or voltage information, that can characterize the operating condition of the peripheral device.
For example, taking a notebook computer as an example, after a peripheral device is connected to the notebook computer through, for example, a USB interface, a BIOS may obtain, for example, current information of the peripheral device, compare the current information with a preset device information list, determine whether the current information of the peripheral device matches, if matching, indicate that the current of the peripheral device is safe for the notebook computer, and within a tolerable range, may control the notebook computer to enable the peripheral device; if the current of the peripheral equipment is not matched with the current of the notebook computer, the current of the peripheral equipment is beyond the bearing range of the notebook computer, and the peripheral equipment is unsafe compared with the notebook computer, so that the peripheral equipment can be forbidden, and the notebook computer is prevented from being damaged due to the fact that the current of the peripheral equipment exceeds the bearing range of the notebook computer.
Fig. 3 is a flowchart of an information processing method according to an embodiment of the present invention, and referring to fig. 3, the information processing method according to the embodiment of the present invention is applied to an electronic device, and the electronic device may be, for example, a tablet computer, a notebook computer, a smart phone, and the like, which is not described in detail herein. The information processing method specifically comprises the following steps:
s101: responding to the device information of the peripheral device.
The peripheral device may be an input device, a display device, a printing device, an external memory, a network device, or other types of peripheral devices, such as a USB Key, a USB storage device, a USB transfer device, etc.
The device information of the peripheral device may be a product serial number (SN code), an IMEI code, an MEID code, etc. capable of representing the identity of the peripheral device, or may also be current information or voltage information, etc. capable of representing the operating state of the peripheral device.
The electronic device may obtain device information of the peripheral device through a data interface, such as a USB interface. Of course, the data interface is not limited to the USB interface.
S102: and judging the matching result of the equipment information based on a pre-stored equipment information list which cannot be changed.
The device information list may be a list generated based on the device information, and include a correspondence relationship between at least one peripheral device and the device information. When the device information of the peripheral device is acquired, whether the device information is matched or not can be judged based on the device information list. The device information list may be pre-stored in a non-volatile storage (NVS) of the electronic device at the time of manufacture. For example, the peripheral device is a USB Key, and the electronic device is a notebook computer. When the notebook computer is produced, the equipment information list formed based on the SN code can be pre-stored in the nonvolatile memory. Since the device information list is set to be unwritable, and the matching result of the device information is generated based on the unalterable device information list, the peripheral device or the technician cannot influence the determination result.
S103: and setting the read-write permission of the electronic equipment to the external equipment based on the matching result.
As shown in fig. 4, specifically, when the matching result is that the device information matches the device information list, the read-write permission of the electronic device to the external device is set to be readable and writable.
And under the condition that the matching result is that the equipment information is not matched with the equipment information list, setting the read-write permission of the electronic equipment to the external equipment to be readable.
For example, in the case of a notebook computer, during production, firmware may be formed in, for example, a BIOS of the notebook computer, and the firmware includes a determining module, and the determining module is set to be non-writable. The notebook computer can be subjected to customized design on the USB interface when leaving a factory, and is matched with one or more specific peripheral devices and the like. When a customized peripheral device is plugged into a notebook computer, for example, the BIOS reads the SN code of the peripheral device, and determines whether the SN code matches based on a device information list, and if the SN code matches, it indicates that the peripheral device is a specific and secure peripheral device, and then directs an operating system of the notebook computer to set the read-write permission of the peripheral device to be readable and writable. If the SN code is not matched with the equipment information list, the peripheral equipment is indicated to be not specific and safe peripheral equipment, then an operating system of the notebook computer is guided, and the read-write permission of the peripheral equipment is set to be only readable so as to ensure the information safety in the notebook computer.
The above embodiments are only exemplary embodiments of the present invention, and are not intended to limit the present invention, and the scope of the present invention is defined by the claims. Various modifications and equivalents may be made by those skilled in the art within the spirit and scope of the present invention, and such modifications and equivalents should also be considered as falling within the scope of the present invention.

Claims (9)

1. Firmware, comprising:
a determination module configured to: responding to the equipment information of the peripheral equipment, and judging the matching result of the equipment information; the judging module is not writable;
the firmware is configured to at least: guiding an operating system of the electronic equipment based on the matching result under the condition that the matching result is that the equipment information is matched; when the matching result is that the equipment information is not matched, the guiding of an operating system of the electronic equipment is influenced;
the firmware is further configured to: and enabling at least one of the peripheral equipment or the peripheral equipment corresponding to the peripheral equipment based on the matching result when the matching result is that the equipment information is matched.
2. An electronic device operating based on the firmware of claim 1.
3. The electronic device of claim 2, the determination module of the firmware further configured to:
and judging the matching result of the equipment information based on the pre-stored equipment information list.
4. The electronic device of claim 3, the matching result is used at least for:
and setting the read-write permission of the electronic equipment to the peripheral equipment.
5. The electronic device of claim 4, the determination module of the firmware further configured to:
setting the read-write permission of the electronic equipment to the peripheral equipment to be readable and writable under the condition that the matching result is that the equipment information is matched with the equipment information list;
and setting the read-write permission of the electronic equipment to the peripheral equipment to be readable under the condition that the matching result is that the equipment information is not matched with the equipment information list.
6. The electronic device of claim 2, the device information being a product serial number of the peripheral device.
7. The electronic device of claim 2, further comprising: and the data interface is used for being connected with the peripheral equipment to acquire the equipment information of the peripheral equipment.
8. The information processing method is applied to the electronic equipment and comprises the following steps:
responding to the equipment information of the peripheral equipment;
judging a matching result of the equipment information based on a pre-stored equipment information list which cannot be changed through a judging module; the judging module is not writable;
setting the read-write permission of the electronic equipment to the peripheral equipment based on the matching result;
the method further comprises the following steps:
guiding an operating system of the electronic equipment based on the matching result under the condition that the matching result is that the equipment information is matched;
when the matching result is that the equipment information is not matched, the guiding of an operating system of the electronic equipment is influenced;
the method further comprises the following steps:
and enabling at least one of the peripheral equipment or the peripheral equipment corresponding to the peripheral equipment based on the matching result when the matching result is that the equipment information is matched.
9. The information processing method of claim 8, wherein the setting of the read-write permission of the electronic device to the peripheral device based on the matching result comprises:
setting the read-write permission of the electronic equipment to the peripheral equipment to be readable and writable under the condition that the matching result is that the equipment information is matched with the equipment information list;
and setting the read-write permission of the electronic equipment to the peripheral equipment to be readable under the condition that the matching result is that the equipment information is not matched with the equipment information list.
CN201811408973.3A 2018-11-23 2018-11-23 Firmware, electronic device and information processing method Active CN109697375B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811408973.3A CN109697375B (en) 2018-11-23 2018-11-23 Firmware, electronic device and information processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811408973.3A CN109697375B (en) 2018-11-23 2018-11-23 Firmware, electronic device and information processing method

Publications (2)

Publication Number Publication Date
CN109697375A CN109697375A (en) 2019-04-30
CN109697375B true CN109697375B (en) 2022-02-18

Family

ID=66230120

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811408973.3A Active CN109697375B (en) 2018-11-23 2018-11-23 Firmware, electronic device and information processing method

Country Status (1)

Country Link
CN (1) CN109697375B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111859453A (en) * 2020-07-28 2020-10-30 北京中科麒麟信息工程有限责任公司 File safety protection method of external protection equipment and external protection equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102521165A (en) * 2011-11-30 2012-06-27 北京宏思电子技术有限责任公司 Security U disk and recognition method and device thereof
CN105653988A (en) * 2015-12-30 2016-06-08 北京金山安全软件有限公司 External storage device read-write permission control method and device and terminal device
CN105900106A (en) * 2014-01-14 2016-08-24 奥林匹斯冬季和Ibe有限公司 Removable data storage medium, medical appliance and method for operating a removable data storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4738520B2 (en) * 2009-09-18 2011-08-03 株式会社東芝 Electronic device and communication control method
TWI616774B (en) * 2016-12-08 2018-03-01 緯創資通股份有限公司 Electronic apparatus and secure boot method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102521165A (en) * 2011-11-30 2012-06-27 北京宏思电子技术有限责任公司 Security U disk and recognition method and device thereof
CN105900106A (en) * 2014-01-14 2016-08-24 奥林匹斯冬季和Ibe有限公司 Removable data storage medium, medical appliance and method for operating a removable data storage medium
CN105653988A (en) * 2015-12-30 2016-06-08 北京金山安全软件有限公司 External storage device read-write permission control method and device and terminal device

Also Published As

Publication number Publication date
CN109697375A (en) 2019-04-30

Similar Documents

Publication Publication Date Title
US7000249B2 (en) Pre-boot authentication system
CN103164241B (en) Make use of startup method and the computer of the computer of biological authentication apparatus
US9229706B2 (en) Method and apparatus for field firmware updates in data storage systems
US20060010317A1 (en) Pre-boot authentication system
CN107729836B (en) Face recognition method and related product
EP1991927B1 (en) Portable device comprising a bios setting
RU2538329C1 (en) Apparatus for creating trusted environment for computers of information computer systems
US20070006290A1 (en) USB-compliant personal key
RU2569577C1 (en) Device to create trusted execution environment for special purpose computers
US8387133B2 (en) Power on certification method for personal computer and power on certification system thereof
CN104969180A (en) User authorization and presence detection in isolation from interference from and control by host central processing unit and operating system
US20090083849A1 (en) Security protection method and portable electronic device using same
CN110598384B (en) Information protection method, information protection device and mobile terminal
CN101673330A (en) BIOS-based computer security protection method and system
US8549312B2 (en) Mobile terminal and method for protecting its system data
CN109697375B (en) Firmware, electronic device and information processing method
CN114861158A (en) Security authentication method, device, system, electronic equipment and storage medium
CN108197455B (en) Electronic device and safe starting method thereof
JP2001117661A (en) Portable information terminal equipment and program recording medium for the same
US9047457B2 (en) Portable electronic entity, host station and associated method
CN110781527B (en) Control register protection method and device
WO2020097863A1 (en) Flashing control method, flashing control apparatus and terminal device
US9152429B2 (en) Computer system having a near field communication tag with user identification function
CN105760747A (en) Method for protecting intelligent equipment through power-on passwords and intelligent equipment
CN110688663A (en) Execution command protection method and device, android device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant