CN112464244A - Security reinforcement method, system, terminal and storage medium based on system login process - Google Patents
Security reinforcement method, system, terminal and storage medium based on system login process Download PDFInfo
- Publication number
- CN112464244A CN112464244A CN202011350882.6A CN202011350882A CN112464244A CN 112464244 A CN112464244 A CN 112464244A CN 202011350882 A CN202011350882 A CN 202011350882A CN 112464244 A CN112464244 A CN 112464244A
- Authority
- CN
- China
- Prior art keywords
- authentication
- module
- grub
- starting
- login
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 124
- 230000008569 process Effects 0.000 title claims abstract description 64
- 230000002787 reinforcement Effects 0.000 title claims description 17
- 238000004590 computer program Methods 0.000 claims description 9
- 238000012795 verification Methods 0.000 claims description 3
- 230000007246 mechanism Effects 0.000 abstract description 7
- 230000003014 reinforcing effect Effects 0.000 abstract description 6
- 238000005728 strengthening Methods 0.000 abstract description 6
- 230000000694 effects Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 230000007547 defect Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 239000000835 fiber Substances 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
Abstract
The invention provides a security strengthening method based on a system login process, a system, a terminal and a storage medium, wherein a starting control instruction is obtained, and a GRUB guide module is started; the GRUB guiding module judges whether to call a double-factor authentication module; if the dual-factor authentication module is called, acquiring authentication information input by a user, and judging whether the authentication passes; if the authentication is passed, entering an authentication interface configured by the GRUB guide module, and configuring authentication information to an authentication storage area; an automatic login process of the operating system is started. Reading authentication information of the authentication storage area; and entering an operating system desktop, and finishing login. The method for reinforcing the safety based on the system login process customizes the GRUB, increases the two-factor authentication in the boot process, and expands the two-factor authentication mechanism to the system boot process. This ensures the security of the boot part during login.
Description
Technical Field
The invention relates to the technical field of operating systems, in particular to a method, a system, a terminal and a storage medium for security reinforcement based on a system login process.
Background
GNU GRUB (GRand Unified Bootloader "GRUB" for short) is a multiple operating system boot program from the GNU project. GRUB is an implementation of a multi-boot specification that allows a user to have multiple operating systems simultaneously within a computer and select the operating system that he wishes to run at computer boot. GRUB may be used to select different kernels on the operating system partition and may also be used to pass boot parameters to these kernels.
When an operating system is started at present, a user needs to input a password in a login process, and the system is authenticated. If a plurality of operating systems need to be started, the password needs to be repeatedly input and the authentication needs to be repeatedly performed in the login process, and if the authentication fails, the system cannot be normally used, so that the normal operation of the user on the system is influenced.
Disclosure of Invention
In order to overcome the defects in the prior art, the invention provides a method for performing security reinforcement based on a system login process, which comprises the following steps:
step one, acquiring a starting control instruction, and starting a GRUB guide module;
step two, the GRUB guide module judges whether to call a double-factor authentication module;
step three, if a double-factor authentication module is called, acquiring authentication information input by a user, and judging whether the authentication passes;
step four, if the authentication is passed, entering an authentication interface configured by the GRUB guide module, and configuring the authentication information to an authentication storage area;
and step five, starting an automatic login process of the operating system.
It should be further noted that, in the fifth step, the authentication information in the authentication storage area is read;
and entering an operating system desktop, and finishing login.
It should be further noted that in step three, if the authentication fails, the system is restarted and returns to step one.
It should be further noted that, in the second step, if the GRUB boot module determines not to invoke the two-factor authentication module, the system enters a system login interface;
acquiring user login information;
and if the login verification is passed, entering an operating system desktop.
Further, acquiring an application program starting instruction;
acquiring authentication information input by a user, and judging whether the authentication passes;
and if the authentication is passed, starting the application program.
It should be further noted that, after the step five, the method further includes:
acquiring an application program starting instruction;
and reading the user authentication information in the authentication storage area, and starting the application program.
The invention also provides a system for performing security reinforcement based on the system login process, which comprises the following steps: the device comprises a starting module, a GRUB guiding module, an authentication module and an authentication storage module;
the starting module acquires a starting control instruction and starts the GRUB guide module;
the GRUB guiding module judges whether to call a double-factor authentication module;
if the dual-factor authentication module is called, acquiring authentication information input by a user, and judging whether the authentication passes through by the authentication module;
if the authentication is passed, entering an authentication interface configured by the GRUB guide module, and configuring the authentication information to an authentication storage area corresponding to the authentication storage module;
the starting module starts an automatic login process of the operating system.
Further, it should be noted that the method further includes: an application program calling module;
the application program calling module is used for acquiring an application program starting instruction;
and reading the user authentication information in the authentication storage area, and starting the application program.
The invention also provides a terminal for implementing the security reinforcement method based on the system login process, which comprises the following steps:
the memory is used for storing a computer program and carrying out a security reinforcement method based on a system login process;
and the processor is used for executing the computer program and carrying out the security reinforcement method based on the system login process so as to realize the steps of carrying out the security reinforcement method based on the system login process.
The invention also provides a readable storage medium with a security strengthening method based on the system login process, which is characterized in that the readable storage medium is stored with a computer program, and the computer program is executed by a processor to realize the steps of the security strengthening method based on the system login process.
According to the technical scheme, the invention has the following advantages:
the method for reinforcing the safety based on the system login process customizes the GRUB, increases the two-factor authentication in the boot process, and expands the two-factor authentication mechanism to the system boot process. This ensures the security of the boot part during login.
The security reinforcement method based on the system login process can achieve the single sign-on effect. The defects that the user inputs the password repeatedly and the authentication is repeated in the login process are overcome.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings used in the description will be briefly introduced, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
FIG. 1 is a flow chart of a method for security enforcement based on a system login process;
FIG. 2 is a schematic diagram of a terminal;
FIG. 3 is a flowchart of an embodiment of a method for security enforcement based on a system login process;
FIG. 4 is a schematic diagram of a security enforcement system based on a system login process.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The system involved in the invention is a computer operating system, and can comprise a Linux system, a windows system and the like.
Taking Linux system as an example, the login system uses PAM mechanism provided by Linux. The PAM mechanism is that Linux-PAM (Linux pluggable authentication module) is a set of shared library, so that a local system administrator can randomly select an authentication mode of a program.
After the BIOS of the system is electrified, a GRUB program of the disk is started, the GRUB can automatically load a kernel file on the disk or pop up an interface, and a user can select an operating system to be loaded.
The method provided by the invention combines the internal double-factor authentication process of the system and the safety authentication of GRUB, thereby realizing the single sign-on effect and strengthening the safety protection of the system in the longitudinal field.
The system to which the present invention relates is implemented based on terminal devices 200 including mobile terminals such as mobile phones, smart phones, notebook computers, Digital broadcast receivers, Personal Digital Assistants (PDAs), tablet computers (PADs), Portable Multimedia Players (PMPs), navigation devices, and the like, and fixed terminals such as Digital TVs, desktop computers, and the like.
And more particularly to a method for security enforcement based on a system login procedure, as shown in figure 1,
s101, acquiring a starting control instruction, and starting a GRUB guide module;
the start control command can be obtained from the near end, that is, based on the keyboard or the operation keys, or can be obtained based on the remote control command, that is, based on the network communication.
The GRUB boot module functions to initiate a routine of GRUB. Is pre-configured into the terminal.
S102, judging whether a double-factor authentication module is called by a GRUB guide module;
and if the double-factor authentication module is not called, entering a normal login interface of the system, and needing to input the information of the login user. I.e. performing a normal authentication process for entering the DM login interface of the operating system.
S103, if the double-factor authentication module is called, acquiring authentication information input by a user, and judging whether the authentication passes;
s104, if the authentication is passed, entering an authentication interface configured by the GRUB guide module, and configuring authentication information to an authentication storage area;
and S105, starting an automatic login process of the operating system.
Reading authentication information of the authentication storage area;
and entering an operating system desktop, and finishing login.
Therefore, the method for reinforcing the safety based on the system login process customizes the GRUB, increases the two-factor authentication in the boot process, and expands the two-factor authentication mechanism to the system boot process. This ensures the security of the boot part during login.
Meanwhile, the security reinforcement method based on the system login process can achieve the single sign-on effect. The defects that the user inputs the password repeatedly and the authentication is repeated in the login process are overcome.
The elements and algorithm steps of each example described in the embodiments of the method for security enforcement based on system login procedures provided by the present invention can be implemented in electronic hardware, computer software, or a combination of both, and in the above description, the components and steps of each example have been generally described in terms of functionality in order to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The block diagram shown in the figure of the security reinforcing method based on the system login process provided by the invention is only a functional entity and does not necessarily correspond to a physically independent entity. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
FIG. 2 illustrates a schematic block diagram of a computer system suitable for use with a terminal 200 implementing embodiments of the present disclosure.
It should be noted that fig. 2 shows the terminal 200, but should not bring any limitation to the functions and the scope of the application of the embodiments of the present disclosure.
As shown in fig. 2, the terminal 200 includes a Central Processing Unit (CPU) 201 that can perform various appropriate actions and processes in accordance with a program stored in a Read-Only Memory (ROM) 202 or a program loaded from a storage section 208 into a Random Access Memory (RAM) 203. In the RAM 203, various programs and data necessary for system operation are also stored. The CPU 201, ROM 202, and RAM 203 are connected to each other via a bus 204. An input/output (I/O) interface 205 is also connected to bus 204.
The following components are connected to the I/O interface 205: an input portion 206 including a keyboard, a mouse, and the like; an output section 207 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 208 including a hard disk and the like; and a communication section 209 including a Network interface card such as a LAN (Local Area Network) card, a modem, or the like. The communication section 209 performs communication processing via a network such as the internet. A drive 210 is also connected to the I/O interface 205 as needed. A removable medium 211, such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like, is mounted on the drive 210 as necessary, so that a computer program read out therefrom is installed into the storage section 208 as necessary.
It should be noted that the computer-readable storage medium for performing the security strengthening method based on the system login process provided by the present invention may be a computer-readable signal medium or a computer-readable storage medium, or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-Only Memory (ROM), an Erasable programmable read-Only Memory (EPROM) or flash Memory), an optical fiber, a portable compact disc read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable storage medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable storage medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF (Radi o frequency), etc., or any suitable combination of the foregoing.
As shown in fig. 3, the method of the embodiments of the present disclosure described below may be performed by a terminal, but the present disclosure is not limited thereto.
S201, acquiring a starting control instruction, and starting a GRUB guide module;
s202, judging whether a double-factor authentication module is called by a GRUB guide module;
s203, if the double-factor authentication module is called, acquiring authentication information input by a user, and judging whether the authentication passes;
s204, if the authentication fails, the system restarts, and returns to S201.
Therefore, the authentication information of the user cannot enter the operating system when failing, and the safety of system data is ensured.
As another example provided by the present invention, the method of the embodiment of the present disclosure may be executed by a terminal, but the present disclosure is not limited thereto.
Acquiring a starting control instruction, and starting a GRUB guide module;
the GRUB guiding module judges whether to call a double-factor authentication module;
if the GRUB guide module judges that the dual-factor authentication module is not called, entering a system login interface;
acquiring user login information;
and if the login verification is passed, entering an operating system desktop.
Of course, the login information is verified here directly based on the system login interface. Namely, entering the DM login interface of the operating system to perform a normal authentication process.
In this process, of course, after the user enters the operation interface of the operating system, when the user operates the application program in the system,
acquiring an application program starting instruction;
acquiring authentication information input by a user, and judging whether the authentication passes;
and if the authentication is passed, starting the application program.
Namely, the application program is verified, and in the process of verifying the application program, authentication needs to be carried out for the second time, and if the authentication is not passed, the application program cannot be used.
As another example provided by the present invention, the method of the embodiment of the present disclosure may be executed by a terminal, but the present disclosure is not limited thereto.
Acquiring a starting control instruction, and starting a GRUB guide module;
the GRUB guiding module judges whether to call a double-factor authentication module;
if the dual-factor authentication module is called, acquiring authentication information input by a user, and judging whether the authentication passes;
if the authentication is passed, entering an authentication interface configured by the GRUB guide module, and configuring authentication information to an authentication storage area;
an automatic login process of the operating system is started. Reading authentication information of the authentication storage area;
and entering an operating system desktop, and finishing login.
Acquiring an application program starting instruction;
and reading the user authentication information in the authentication storage area, and starting the application program.
That is, the user configures the authentication information to the authentication storage area based on entering the authentication interface configured by the GRUB bootstrap module; the authentication information is stored in the authentication storage area. When the user uses the application program, the system can automatically read the authentication information without secondary output.
Therefore, the method for reinforcing the safety based on the system login process customizes the GRUB, increases the two-factor authentication in the boot process, and expands the two-factor authentication mechanism to the system boot process. This ensures the security of the boot part during login.
Meanwhile, the security reinforcement method based on the system login process can achieve the single sign-on effect. The defects that the user inputs the password repeatedly and the authentication is repeated in the login process are overcome.
As another example provided by the present invention, the method of the embodiment of the present disclosure may be executed by a terminal, but the present disclosure is not limited thereto.
(1) And after the BIOS is electrified, entering a GRUB boot system.
(2) And the GRUB guide system detects whether the user presses an ESC key, and if the user does not press the ESC key, the GRUB guide system enters a DM login interface of the operating system to perform a normal authentication process.
(3) If the GRUB detects that the user presses the ESC KEY, a dual-factor authentication module is called, and the dual-factor authentication module pops up a user name box to require the user to input a system account name, requires the user to insert a USB KEY according to the system account name and requires the user to input a corresponding KEY password or biological information.
(4) And if the GRUB authentication is not passed, restarting the machine, and entering the step (1) again.
(5) And if the GRUB passes the authentication, entering a selection and setting interface of the GRUB, and storing the authentication information in a specific memory area.
(6) After the user finishes setting or selecting the starting item in the GRUB, the GRUB loads the kernel module and enters the autologic process of the operating system DM. And (4) reading the information stored in the step (5) by the Autologin, directly entering an operating system desktop, and finishing login.
The method provided by the invention combines the internal double-factor authentication process of the system and the safety authentication of GRUB, thereby realizing the single sign-on effect and strengthening the safety protection of the system in the longitudinal field.
Based on the above method for performing security reinforcement based on the system login process, the present invention further provides a system for performing security reinforcement based on the system login process, and the method of the system implementation mode may be executed by a terminal, but the present disclosure is not limited thereto.
As shown in fig. 4, the system includes: the system comprises a starting module 1, a GRUB guiding module 2, an authentication module 3 and an authentication storage module 4;
the starting module 1 obtains a starting control instruction and starts the GRUB guide module 2;
the GRUB guiding module 2 judges whether to call the dual-factor authentication module 3;
if the dual-factor authentication module 3 is called, acquiring authentication information input by a user, and judging whether the authentication passes by the authentication module 3;
if the authentication is passed, entering an authentication interface configured by the GRUB guide module 2, and configuring the authentication information to an authentication storage area corresponding to the authentication storage module 4;
the starting module 1 starts an automatic login process of the operating system.
After the user enters the operating system, if the corresponding application program is used, the system further comprises: an application program calling module;
the application program calling module is used for acquiring an application program starting instruction;
and reading the user authentication information in the authentication storage area, and starting the application program.
Therefore, the method for reinforcing the safety based on the system login process customizes the GRUB, increases the two-factor authentication in the boot process, and expands the two-factor authentication mechanism to the system boot process. This ensures the security of the boot part during login.
The method and system for security enforcement based on system login procedure provided by the present invention are the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein, and can be implemented in electronic hardware, computer software, or a combination of both, and in the above description, the components and steps of each example have been generally described in terms of functions in order to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" and "having," as well as any variations thereof, are intended to cover non-exclusive inclusions.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (10)
1. A security reinforcement method based on a system login process is characterized by comprising the following steps:
step one, acquiring a starting control instruction, and starting a GRUB guide module;
step two, the GRUB guide module judges whether to call a double-factor authentication module;
step three, if a double-factor authentication module is called, acquiring authentication information input by a user, and judging whether the authentication passes;
step four, if the authentication is passed, entering an authentication interface configured by the GRUB guide module, and configuring the authentication information to an authentication storage area;
and step five, starting an automatic login process of the operating system.
2. The method for security enforcement based on a system logon procedure according to claim 1,
reading the authentication information of the authentication storage area;
and entering an operating system desktop, and finishing login.
3. The method for security enforcement based on a system logon procedure according to claim 1,
in step three, if the authentication fails, the system restarts and returns to step one.
4. The method for security enforcement based on a system logon procedure according to claim 1,
step two, if the GRUB guide module judges that the dual-factor authentication module is not called, entering a system login interface;
acquiring user login information;
and if the login verification is passed, entering an operating system desktop.
5. The method for security enforcement based on a system logon procedure according to claim 4,
acquiring an application program starting instruction;
acquiring authentication information input by a user, and judging whether the authentication passes;
and if the authentication is passed, starting the application program.
6. The method for security enforcement based on a system logon procedure according to claim 2,
the fifth step is followed by:
acquiring an application program starting instruction;
and reading the user authentication information in the authentication storage area, and starting the application program.
7. A system for security enforcement based on a system logon process, comprising: the device comprises a starting module, a GRUB guiding module, an authentication module and an authentication storage module;
the starting module acquires a starting control instruction and starts the GRUB guide module;
the GRUB guiding module judges whether to call a double-factor authentication module;
if the dual-factor authentication module is called, acquiring authentication information input by a user, and judging whether the authentication passes through by the authentication module;
if the authentication is passed, entering an authentication interface configured by the GRUB guide module, and configuring the authentication information to an authentication storage area corresponding to the authentication storage module;
the starting module starts an automatic login process of the operating system.
8. The system for security enforcement based on a system logon process of claim 7, further comprising: an application program calling module;
the application program calling module is used for acquiring an application program starting instruction;
and reading the user authentication information in the authentication storage area, and starting the application program.
9. A terminal for implementing a security reinforcement method based on a system login process is characterized by comprising the following steps:
the memory is used for storing a computer program and carrying out a security reinforcement method based on a system login process;
a processor for executing the computer program and the method for security enforcement based on system login procedure to realize the steps of the method for security enforcement based on system login procedure as claimed in any one of claims 1 to 6.
10. A readable storage medium having a method for security enforcement based on a system login procedure, the readable storage medium having a computer program stored thereon, the computer program being executable by a processor to implement the steps of the method for security enforcement based on a system login procedure according to any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011350882.6A CN112464244A (en) | 2020-11-26 | 2020-11-26 | Security reinforcement method, system, terminal and storage medium based on system login process |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011350882.6A CN112464244A (en) | 2020-11-26 | 2020-11-26 | Security reinforcement method, system, terminal and storage medium based on system login process |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112464244A true CN112464244A (en) | 2021-03-09 |
Family
ID=74808027
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011350882.6A Pending CN112464244A (en) | 2020-11-26 | 2020-11-26 | Security reinforcement method, system, terminal and storage medium based on system login process |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112464244A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050039013A1 (en) * | 2003-08-11 | 2005-02-17 | Bajikar Sundeep M. | Method and system for authenticating a user of a computer system that has a trusted platform module (TPM) |
CN101256608A (en) * | 2008-03-25 | 2008-09-03 | 北京飞天诚信科技有限公司 | Safe operation method and system |
CN101576944A (en) * | 2008-11-20 | 2009-11-11 | 武汉大学 | Computer secure startup system based on trusted platform module |
US20100299510A1 (en) * | 2009-05-19 | 2010-11-25 | Chip Ueltschey | Bluetooth pre-boot authentication in bios |
CN103020538A (en) * | 2011-09-23 | 2013-04-03 | 国民技术股份有限公司 | Terminal data protection method and terminal |
CN105408910A (en) * | 2013-08-28 | 2016-03-16 | 英特尔公司 | Systems and methods for authenticating access to operating system by user before the operating system is booted using wireless communication token |
CN110574350A (en) * | 2017-09-26 | 2019-12-13 | 谷歌有限责任公司 | method and system for performing a prioritized generation of a second factor certificate |
-
2020
- 2020-11-26 CN CN202011350882.6A patent/CN112464244A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050039013A1 (en) * | 2003-08-11 | 2005-02-17 | Bajikar Sundeep M. | Method and system for authenticating a user of a computer system that has a trusted platform module (TPM) |
CN101256608A (en) * | 2008-03-25 | 2008-09-03 | 北京飞天诚信科技有限公司 | Safe operation method and system |
CN101576944A (en) * | 2008-11-20 | 2009-11-11 | 武汉大学 | Computer secure startup system based on trusted platform module |
US20100299510A1 (en) * | 2009-05-19 | 2010-11-25 | Chip Ueltschey | Bluetooth pre-boot authentication in bios |
CN103020538A (en) * | 2011-09-23 | 2013-04-03 | 国民技术股份有限公司 | Terminal data protection method and terminal |
CN105408910A (en) * | 2013-08-28 | 2016-03-16 | 英特尔公司 | Systems and methods for authenticating access to operating system by user before the operating system is booted using wireless communication token |
CN110574350A (en) * | 2017-09-26 | 2019-12-13 | 谷歌有限责任公司 | method and system for performing a prioritized generation of a second factor certificate |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9916574B2 (en) | Secure computing device and method | |
EP2080146B1 (en) | Extensible bios interface to a preboot authentication module | |
US8645675B2 (en) | Configuration of a basic input/output system (BIOS) based on a series of follow up questions tailored to user type | |
CN106201574B (en) | Application interface starting method and device | |
US9436828B2 (en) | Systems and methods for command-based entry into basic input/output system setup from operating system | |
US10437580B2 (en) | Software updating methods and systems | |
US20120278600A1 (en) | System and method for accelerated boot performance | |
US10831897B2 (en) | Selective enforcement of secure boot database entries in an information handling system | |
CN110825411B (en) | Upgrading method and device for TWS (two way satellite System) earphone system and computer-readable storage medium | |
US9489248B2 (en) | Method, apparatus and system for acquiring input events | |
CN109375937A (en) | Method for upgrading system, device, terminal device and storage medium | |
CN111079125A (en) | Method and device for calling third-party library dynamic lifting authority by application program | |
US20160260073A1 (en) | Device and method for facilitating a transaction | |
CN116048639A (en) | Method and device for starting operating system, electronic equipment and readable storage medium | |
EP3608774A1 (en) | Method for programming and terminal device | |
CN110990798B (en) | Application program permission configuration method and device, electronic equipment and storage medium | |
EP3876101B1 (en) | Abnormality processing method, terminal device and storage medium | |
CN112464244A (en) | Security reinforcement method, system, terminal and storage medium based on system login process | |
CN114153280B (en) | Computer main board | |
CN110262813B (en) | Method and apparatus for installing applications | |
CN109982136B (en) | Volume adjusting method and device | |
US9152429B2 (en) | Computer system having a near field communication tag with user identification function | |
CN113810209A (en) | Initial configuration of a server over an out-of-band channel | |
CN113360172B (en) | Application deployment method, device, computer equipment and storage medium | |
US11669618B2 (en) | Systems and methods for securing and loading bios drivers and dependencies in a predefined and measured load order |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210309 |
|
RJ01 | Rejection of invention patent application after publication |