CN112464244A - Security reinforcement method, system, terminal and storage medium based on system login process - Google Patents

Security reinforcement method, system, terminal and storage medium based on system login process Download PDF

Info

Publication number
CN112464244A
CN112464244A CN202011350882.6A CN202011350882A CN112464244A CN 112464244 A CN112464244 A CN 112464244A CN 202011350882 A CN202011350882 A CN 202011350882A CN 112464244 A CN112464244 A CN 112464244A
Authority
CN
China
Prior art keywords
authentication
module
grub
starting
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011350882.6A
Other languages
Chinese (zh)
Inventor
苗功勋
赵吉建
王金国
王刚刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING ZHONGFU TAIHE TECHNOLOGY DEVELOPMENT CO LTD
Nanjing Zhongfu Information Technology Co Ltd
Zhongfu Information Co Ltd
Zhongfu Safety Technology Co Ltd
Original Assignee
BEIJING ZHONGFU TAIHE TECHNOLOGY DEVELOPMENT CO LTD
Nanjing Zhongfu Information Technology Co Ltd
Zhongfu Information Co Ltd
Zhongfu Safety Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING ZHONGFU TAIHE TECHNOLOGY DEVELOPMENT CO LTD, Nanjing Zhongfu Information Technology Co Ltd, Zhongfu Information Co Ltd, Zhongfu Safety Technology Co Ltd filed Critical BEIJING ZHONGFU TAIHE TECHNOLOGY DEVELOPMENT CO LTD
Priority to CN202011350882.6A priority Critical patent/CN112464244A/en
Publication of CN112464244A publication Critical patent/CN112464244A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot

Abstract

The invention provides a security strengthening method based on a system login process, a system, a terminal and a storage medium, wherein a starting control instruction is obtained, and a GRUB guide module is started; the GRUB guiding module judges whether to call a double-factor authentication module; if the dual-factor authentication module is called, acquiring authentication information input by a user, and judging whether the authentication passes; if the authentication is passed, entering an authentication interface configured by the GRUB guide module, and configuring authentication information to an authentication storage area; an automatic login process of the operating system is started. Reading authentication information of the authentication storage area; and entering an operating system desktop, and finishing login. The method for reinforcing the safety based on the system login process customizes the GRUB, increases the two-factor authentication in the boot process, and expands the two-factor authentication mechanism to the system boot process. This ensures the security of the boot part during login.

Description

Security reinforcement method, system, terminal and storage medium based on system login process
Technical Field
The invention relates to the technical field of operating systems, in particular to a method, a system, a terminal and a storage medium for security reinforcement based on a system login process.
Background
GNU GRUB (GRand Unified Bootloader "GRUB" for short) is a multiple operating system boot program from the GNU project. GRUB is an implementation of a multi-boot specification that allows a user to have multiple operating systems simultaneously within a computer and select the operating system that he wishes to run at computer boot. GRUB may be used to select different kernels on the operating system partition and may also be used to pass boot parameters to these kernels.
When an operating system is started at present, a user needs to input a password in a login process, and the system is authenticated. If a plurality of operating systems need to be started, the password needs to be repeatedly input and the authentication needs to be repeatedly performed in the login process, and if the authentication fails, the system cannot be normally used, so that the normal operation of the user on the system is influenced.
Disclosure of Invention
In order to overcome the defects in the prior art, the invention provides a method for performing security reinforcement based on a system login process, which comprises the following steps:
step one, acquiring a starting control instruction, and starting a GRUB guide module;
step two, the GRUB guide module judges whether to call a double-factor authentication module;
step three, if a double-factor authentication module is called, acquiring authentication information input by a user, and judging whether the authentication passes;
step four, if the authentication is passed, entering an authentication interface configured by the GRUB guide module, and configuring the authentication information to an authentication storage area;
and step five, starting an automatic login process of the operating system.
It should be further noted that, in the fifth step, the authentication information in the authentication storage area is read;
and entering an operating system desktop, and finishing login.
It should be further noted that in step three, if the authentication fails, the system is restarted and returns to step one.
It should be further noted that, in the second step, if the GRUB boot module determines not to invoke the two-factor authentication module, the system enters a system login interface;
acquiring user login information;
and if the login verification is passed, entering an operating system desktop.
Further, acquiring an application program starting instruction;
acquiring authentication information input by a user, and judging whether the authentication passes;
and if the authentication is passed, starting the application program.
It should be further noted that, after the step five, the method further includes:
acquiring an application program starting instruction;
and reading the user authentication information in the authentication storage area, and starting the application program.
The invention also provides a system for performing security reinforcement based on the system login process, which comprises the following steps: the device comprises a starting module, a GRUB guiding module, an authentication module and an authentication storage module;
the starting module acquires a starting control instruction and starts the GRUB guide module;
the GRUB guiding module judges whether to call a double-factor authentication module;
if the dual-factor authentication module is called, acquiring authentication information input by a user, and judging whether the authentication passes through by the authentication module;
if the authentication is passed, entering an authentication interface configured by the GRUB guide module, and configuring the authentication information to an authentication storage area corresponding to the authentication storage module;
the starting module starts an automatic login process of the operating system.
Further, it should be noted that the method further includes: an application program calling module;
the application program calling module is used for acquiring an application program starting instruction;
and reading the user authentication information in the authentication storage area, and starting the application program.
The invention also provides a terminal for implementing the security reinforcement method based on the system login process, which comprises the following steps:
the memory is used for storing a computer program and carrying out a security reinforcement method based on a system login process;
and the processor is used for executing the computer program and carrying out the security reinforcement method based on the system login process so as to realize the steps of carrying out the security reinforcement method based on the system login process.
The invention also provides a readable storage medium with a security strengthening method based on the system login process, which is characterized in that the readable storage medium is stored with a computer program, and the computer program is executed by a processor to realize the steps of the security strengthening method based on the system login process.
According to the technical scheme, the invention has the following advantages:
the method for reinforcing the safety based on the system login process customizes the GRUB, increases the two-factor authentication in the boot process, and expands the two-factor authentication mechanism to the system boot process. This ensures the security of the boot part during login.
The security reinforcement method based on the system login process can achieve the single sign-on effect. The defects that the user inputs the password repeatedly and the authentication is repeated in the login process are overcome.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings used in the description will be briefly introduced, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
FIG. 1 is a flow chart of a method for security enforcement based on a system login process;
FIG. 2 is a schematic diagram of a terminal;
FIG. 3 is a flowchart of an embodiment of a method for security enforcement based on a system login process;
FIG. 4 is a schematic diagram of a security enforcement system based on a system login process.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The system involved in the invention is a computer operating system, and can comprise a Linux system, a windows system and the like.
Taking Linux system as an example, the login system uses PAM mechanism provided by Linux. The PAM mechanism is that Linux-PAM (Linux pluggable authentication module) is a set of shared library, so that a local system administrator can randomly select an authentication mode of a program.
After the BIOS of the system is electrified, a GRUB program of the disk is started, the GRUB can automatically load a kernel file on the disk or pop up an interface, and a user can select an operating system to be loaded.
The method provided by the invention combines the internal double-factor authentication process of the system and the safety authentication of GRUB, thereby realizing the single sign-on effect and strengthening the safety protection of the system in the longitudinal field.
The system to which the present invention relates is implemented based on terminal devices 200 including mobile terminals such as mobile phones, smart phones, notebook computers, Digital broadcast receivers, Personal Digital Assistants (PDAs), tablet computers (PADs), Portable Multimedia Players (PMPs), navigation devices, and the like, and fixed terminals such as Digital TVs, desktop computers, and the like.
And more particularly to a method for security enforcement based on a system login procedure, as shown in figure 1,
s101, acquiring a starting control instruction, and starting a GRUB guide module;
the start control command can be obtained from the near end, that is, based on the keyboard or the operation keys, or can be obtained based on the remote control command, that is, based on the network communication.
The GRUB boot module functions to initiate a routine of GRUB. Is pre-configured into the terminal.
S102, judging whether a double-factor authentication module is called by a GRUB guide module;
and if the double-factor authentication module is not called, entering a normal login interface of the system, and needing to input the information of the login user. I.e. performing a normal authentication process for entering the DM login interface of the operating system.
S103, if the double-factor authentication module is called, acquiring authentication information input by a user, and judging whether the authentication passes;
s104, if the authentication is passed, entering an authentication interface configured by the GRUB guide module, and configuring authentication information to an authentication storage area;
and S105, starting an automatic login process of the operating system.
Reading authentication information of the authentication storage area;
and entering an operating system desktop, and finishing login.
Therefore, the method for reinforcing the safety based on the system login process customizes the GRUB, increases the two-factor authentication in the boot process, and expands the two-factor authentication mechanism to the system boot process. This ensures the security of the boot part during login.
Meanwhile, the security reinforcement method based on the system login process can achieve the single sign-on effect. The defects that the user inputs the password repeatedly and the authentication is repeated in the login process are overcome.
The elements and algorithm steps of each example described in the embodiments of the method for security enforcement based on system login procedures provided by the present invention can be implemented in electronic hardware, computer software, or a combination of both, and in the above description, the components and steps of each example have been generally described in terms of functionality in order to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The block diagram shown in the figure of the security reinforcing method based on the system login process provided by the invention is only a functional entity and does not necessarily correspond to a physically independent entity. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
FIG. 2 illustrates a schematic block diagram of a computer system suitable for use with a terminal 200 implementing embodiments of the present disclosure.
It should be noted that fig. 2 shows the terminal 200, but should not bring any limitation to the functions and the scope of the application of the embodiments of the present disclosure.
As shown in fig. 2, the terminal 200 includes a Central Processing Unit (CPU) 201 that can perform various appropriate actions and processes in accordance with a program stored in a Read-Only Memory (ROM) 202 or a program loaded from a storage section 208 into a Random Access Memory (RAM) 203. In the RAM 203, various programs and data necessary for system operation are also stored. The CPU 201, ROM 202, and RAM 203 are connected to each other via a bus 204. An input/output (I/O) interface 205 is also connected to bus 204.
The following components are connected to the I/O interface 205: an input portion 206 including a keyboard, a mouse, and the like; an output section 207 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 208 including a hard disk and the like; and a communication section 209 including a Network interface card such as a LAN (Local Area Network) card, a modem, or the like. The communication section 209 performs communication processing via a network such as the internet. A drive 210 is also connected to the I/O interface 205 as needed. A removable medium 211, such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like, is mounted on the drive 210 as necessary, so that a computer program read out therefrom is installed into the storage section 208 as necessary.
It should be noted that the computer-readable storage medium for performing the security strengthening method based on the system login process provided by the present invention may be a computer-readable signal medium or a computer-readable storage medium, or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-Only Memory (ROM), an Erasable programmable read-Only Memory (EPROM) or flash Memory), an optical fiber, a portable compact disc read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable storage medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable storage medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF (Radi o frequency), etc., or any suitable combination of the foregoing.
As shown in fig. 3, the method of the embodiments of the present disclosure described below may be performed by a terminal, but the present disclosure is not limited thereto.
S201, acquiring a starting control instruction, and starting a GRUB guide module;
s202, judging whether a double-factor authentication module is called by a GRUB guide module;
s203, if the double-factor authentication module is called, acquiring authentication information input by a user, and judging whether the authentication passes;
s204, if the authentication fails, the system restarts, and returns to S201.
Therefore, the authentication information of the user cannot enter the operating system when failing, and the safety of system data is ensured.
As another example provided by the present invention, the method of the embodiment of the present disclosure may be executed by a terminal, but the present disclosure is not limited thereto.
Acquiring a starting control instruction, and starting a GRUB guide module;
the GRUB guiding module judges whether to call a double-factor authentication module;
if the GRUB guide module judges that the dual-factor authentication module is not called, entering a system login interface;
acquiring user login information;
and if the login verification is passed, entering an operating system desktop.
Of course, the login information is verified here directly based on the system login interface. Namely, entering the DM login interface of the operating system to perform a normal authentication process.
In this process, of course, after the user enters the operation interface of the operating system, when the user operates the application program in the system,
acquiring an application program starting instruction;
acquiring authentication information input by a user, and judging whether the authentication passes;
and if the authentication is passed, starting the application program.
Namely, the application program is verified, and in the process of verifying the application program, authentication needs to be carried out for the second time, and if the authentication is not passed, the application program cannot be used.
As another example provided by the present invention, the method of the embodiment of the present disclosure may be executed by a terminal, but the present disclosure is not limited thereto.
Acquiring a starting control instruction, and starting a GRUB guide module;
the GRUB guiding module judges whether to call a double-factor authentication module;
if the dual-factor authentication module is called, acquiring authentication information input by a user, and judging whether the authentication passes;
if the authentication is passed, entering an authentication interface configured by the GRUB guide module, and configuring authentication information to an authentication storage area;
an automatic login process of the operating system is started. Reading authentication information of the authentication storage area;
and entering an operating system desktop, and finishing login.
Acquiring an application program starting instruction;
and reading the user authentication information in the authentication storage area, and starting the application program.
That is, the user configures the authentication information to the authentication storage area based on entering the authentication interface configured by the GRUB bootstrap module; the authentication information is stored in the authentication storage area. When the user uses the application program, the system can automatically read the authentication information without secondary output.
Therefore, the method for reinforcing the safety based on the system login process customizes the GRUB, increases the two-factor authentication in the boot process, and expands the two-factor authentication mechanism to the system boot process. This ensures the security of the boot part during login.
Meanwhile, the security reinforcement method based on the system login process can achieve the single sign-on effect. The defects that the user inputs the password repeatedly and the authentication is repeated in the login process are overcome.
As another example provided by the present invention, the method of the embodiment of the present disclosure may be executed by a terminal, but the present disclosure is not limited thereto.
(1) And after the BIOS is electrified, entering a GRUB boot system.
(2) And the GRUB guide system detects whether the user presses an ESC key, and if the user does not press the ESC key, the GRUB guide system enters a DM login interface of the operating system to perform a normal authentication process.
(3) If the GRUB detects that the user presses the ESC KEY, a dual-factor authentication module is called, and the dual-factor authentication module pops up a user name box to require the user to input a system account name, requires the user to insert a USB KEY according to the system account name and requires the user to input a corresponding KEY password or biological information.
(4) And if the GRUB authentication is not passed, restarting the machine, and entering the step (1) again.
(5) And if the GRUB passes the authentication, entering a selection and setting interface of the GRUB, and storing the authentication information in a specific memory area.
(6) After the user finishes setting or selecting the starting item in the GRUB, the GRUB loads the kernel module and enters the autologic process of the operating system DM. And (4) reading the information stored in the step (5) by the Autologin, directly entering an operating system desktop, and finishing login.
The method provided by the invention combines the internal double-factor authentication process of the system and the safety authentication of GRUB, thereby realizing the single sign-on effect and strengthening the safety protection of the system in the longitudinal field.
Based on the above method for performing security reinforcement based on the system login process, the present invention further provides a system for performing security reinforcement based on the system login process, and the method of the system implementation mode may be executed by a terminal, but the present disclosure is not limited thereto.
As shown in fig. 4, the system includes: the system comprises a starting module 1, a GRUB guiding module 2, an authentication module 3 and an authentication storage module 4;
the starting module 1 obtains a starting control instruction and starts the GRUB guide module 2;
the GRUB guiding module 2 judges whether to call the dual-factor authentication module 3;
if the dual-factor authentication module 3 is called, acquiring authentication information input by a user, and judging whether the authentication passes by the authentication module 3;
if the authentication is passed, entering an authentication interface configured by the GRUB guide module 2, and configuring the authentication information to an authentication storage area corresponding to the authentication storage module 4;
the starting module 1 starts an automatic login process of the operating system.
After the user enters the operating system, if the corresponding application program is used, the system further comprises: an application program calling module;
the application program calling module is used for acquiring an application program starting instruction;
and reading the user authentication information in the authentication storage area, and starting the application program.
Therefore, the method for reinforcing the safety based on the system login process customizes the GRUB, increases the two-factor authentication in the boot process, and expands the two-factor authentication mechanism to the system boot process. This ensures the security of the boot part during login.
The method and system for security enforcement based on system login procedure provided by the present invention are the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein, and can be implemented in electronic hardware, computer software, or a combination of both, and in the above description, the components and steps of each example have been generally described in terms of functions in order to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" and "having," as well as any variations thereof, are intended to cover non-exclusive inclusions.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A security reinforcement method based on a system login process is characterized by comprising the following steps:
step one, acquiring a starting control instruction, and starting a GRUB guide module;
step two, the GRUB guide module judges whether to call a double-factor authentication module;
step three, if a double-factor authentication module is called, acquiring authentication information input by a user, and judging whether the authentication passes;
step four, if the authentication is passed, entering an authentication interface configured by the GRUB guide module, and configuring the authentication information to an authentication storage area;
and step five, starting an automatic login process of the operating system.
2. The method for security enforcement based on a system logon procedure according to claim 1,
reading the authentication information of the authentication storage area;
and entering an operating system desktop, and finishing login.
3. The method for security enforcement based on a system logon procedure according to claim 1,
in step three, if the authentication fails, the system restarts and returns to step one.
4. The method for security enforcement based on a system logon procedure according to claim 1,
step two, if the GRUB guide module judges that the dual-factor authentication module is not called, entering a system login interface;
acquiring user login information;
and if the login verification is passed, entering an operating system desktop.
5. The method for security enforcement based on a system logon procedure according to claim 4,
acquiring an application program starting instruction;
acquiring authentication information input by a user, and judging whether the authentication passes;
and if the authentication is passed, starting the application program.
6. The method for security enforcement based on a system logon procedure according to claim 2,
the fifth step is followed by:
acquiring an application program starting instruction;
and reading the user authentication information in the authentication storage area, and starting the application program.
7. A system for security enforcement based on a system logon process, comprising: the device comprises a starting module, a GRUB guiding module, an authentication module and an authentication storage module;
the starting module acquires a starting control instruction and starts the GRUB guide module;
the GRUB guiding module judges whether to call a double-factor authentication module;
if the dual-factor authentication module is called, acquiring authentication information input by a user, and judging whether the authentication passes through by the authentication module;
if the authentication is passed, entering an authentication interface configured by the GRUB guide module, and configuring the authentication information to an authentication storage area corresponding to the authentication storage module;
the starting module starts an automatic login process of the operating system.
8. The system for security enforcement based on a system logon process of claim 7, further comprising: an application program calling module;
the application program calling module is used for acquiring an application program starting instruction;
and reading the user authentication information in the authentication storage area, and starting the application program.
9. A terminal for implementing a security reinforcement method based on a system login process is characterized by comprising the following steps:
the memory is used for storing a computer program and carrying out a security reinforcement method based on a system login process;
a processor for executing the computer program and the method for security enforcement based on system login procedure to realize the steps of the method for security enforcement based on system login procedure as claimed in any one of claims 1 to 6.
10. A readable storage medium having a method for security enforcement based on a system login procedure, the readable storage medium having a computer program stored thereon, the computer program being executable by a processor to implement the steps of the method for security enforcement based on a system login procedure according to any one of claims 1 to 6.
CN202011350882.6A 2020-11-26 2020-11-26 Security reinforcement method, system, terminal and storage medium based on system login process Pending CN112464244A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011350882.6A CN112464244A (en) 2020-11-26 2020-11-26 Security reinforcement method, system, terminal and storage medium based on system login process

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011350882.6A CN112464244A (en) 2020-11-26 2020-11-26 Security reinforcement method, system, terminal and storage medium based on system login process

Publications (1)

Publication Number Publication Date
CN112464244A true CN112464244A (en) 2021-03-09

Family

ID=74808027

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011350882.6A Pending CN112464244A (en) 2020-11-26 2020-11-26 Security reinforcement method, system, terminal and storage medium based on system login process

Country Status (1)

Country Link
CN (1) CN112464244A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050039013A1 (en) * 2003-08-11 2005-02-17 Bajikar Sundeep M. Method and system for authenticating a user of a computer system that has a trusted platform module (TPM)
CN101256608A (en) * 2008-03-25 2008-09-03 北京飞天诚信科技有限公司 Safe operation method and system
CN101576944A (en) * 2008-11-20 2009-11-11 武汉大学 Computer secure startup system based on trusted platform module
US20100299510A1 (en) * 2009-05-19 2010-11-25 Chip Ueltschey Bluetooth pre-boot authentication in bios
CN103020538A (en) * 2011-09-23 2013-04-03 国民技术股份有限公司 Terminal data protection method and terminal
CN105408910A (en) * 2013-08-28 2016-03-16 英特尔公司 Systems and methods for authenticating access to operating system by user before the operating system is booted using wireless communication token
CN110574350A (en) * 2017-09-26 2019-12-13 谷歌有限责任公司 method and system for performing a prioritized generation of a second factor certificate

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050039013A1 (en) * 2003-08-11 2005-02-17 Bajikar Sundeep M. Method and system for authenticating a user of a computer system that has a trusted platform module (TPM)
CN101256608A (en) * 2008-03-25 2008-09-03 北京飞天诚信科技有限公司 Safe operation method and system
CN101576944A (en) * 2008-11-20 2009-11-11 武汉大学 Computer secure startup system based on trusted platform module
US20100299510A1 (en) * 2009-05-19 2010-11-25 Chip Ueltschey Bluetooth pre-boot authentication in bios
CN103020538A (en) * 2011-09-23 2013-04-03 国民技术股份有限公司 Terminal data protection method and terminal
CN105408910A (en) * 2013-08-28 2016-03-16 英特尔公司 Systems and methods for authenticating access to operating system by user before the operating system is booted using wireless communication token
CN110574350A (en) * 2017-09-26 2019-12-13 谷歌有限责任公司 method and system for performing a prioritized generation of a second factor certificate

Similar Documents

Publication Publication Date Title
US9916574B2 (en) Secure computing device and method
EP2080146B1 (en) Extensible bios interface to a preboot authentication module
US8645675B2 (en) Configuration of a basic input/output system (BIOS) based on a series of follow up questions tailored to user type
CN106201574B (en) Application interface starting method and device
US9436828B2 (en) Systems and methods for command-based entry into basic input/output system setup from operating system
US10437580B2 (en) Software updating methods and systems
US20120278600A1 (en) System and method for accelerated boot performance
US10831897B2 (en) Selective enforcement of secure boot database entries in an information handling system
CN110825411B (en) Upgrading method and device for TWS (two way satellite System) earphone system and computer-readable storage medium
US9489248B2 (en) Method, apparatus and system for acquiring input events
CN109375937A (en) Method for upgrading system, device, terminal device and storage medium
CN111079125A (en) Method and device for calling third-party library dynamic lifting authority by application program
US20160260073A1 (en) Device and method for facilitating a transaction
CN116048639A (en) Method and device for starting operating system, electronic equipment and readable storage medium
EP3608774A1 (en) Method for programming and terminal device
CN110990798B (en) Application program permission configuration method and device, electronic equipment and storage medium
EP3876101B1 (en) Abnormality processing method, terminal device and storage medium
CN112464244A (en) Security reinforcement method, system, terminal and storage medium based on system login process
CN114153280B (en) Computer main board
CN110262813B (en) Method and apparatus for installing applications
CN109982136B (en) Volume adjusting method and device
US9152429B2 (en) Computer system having a near field communication tag with user identification function
CN113810209A (en) Initial configuration of a server over an out-of-band channel
CN113360172B (en) Application deployment method, device, computer equipment and storage medium
US11669618B2 (en) Systems and methods for securing and loading bios drivers and dependencies in a predefined and measured load order

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210309

RJ01 Rejection of invention patent application after publication