CN112597504B - Two-stage safe starting system and method for domestic computer - Google Patents

Two-stage safe starting system and method for domestic computer Download PDF

Info

Publication number
CN112597504B
CN112597504B CN202011529512.9A CN202011529512A CN112597504B CN 112597504 B CN112597504 B CN 112597504B CN 202011529512 A CN202011529512 A CN 202011529512A CN 112597504 B CN112597504 B CN 112597504B
Authority
CN
China
Prior art keywords
usbkey
computer
password
input
mac address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011529512.9A
Other languages
Chinese (zh)
Other versions
CN112597504A (en
Inventor
唐吉林
涂炯
祝本明
徐碧辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China South Industries Group Automation Research Institute
Original Assignee
China South Industries Group Automation Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China South Industries Group Automation Research Institute filed Critical China South Industries Group Automation Research Institute
Priority to CN202011529512.9A priority Critical patent/CN112597504B/en
Publication of CN112597504A publication Critical patent/CN112597504A/en
Application granted granted Critical
Publication of CN112597504B publication Critical patent/CN112597504B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a two-stage safety starting system and a method for a domestic computer. The second stage of safe starting is completed by inputting the password of the kylin operating system. The invention improves the safety of the domestic computer system through two-stage safety protection and provides stronger support for users with high-level safety requirements.

Description

Two-stage safe starting system and method for domestic computer
Technical Field
The invention relates to the field of computer security, in particular to a two-stage security starting system and method for a domestic computer.
Background
The USBKey is used for enhancing the system safety when the computer operating system is started, so that the operating system can run reliably, and the USBKey is widely applied. A security hole exists in a traditional operating system, and a user cannot determine whether a current system based on the USBKey is invaded by a virus program, so that the security shielding and the protection layer are broken through, and illegal access and malicious operation are performed. The traditional safety protection is based on a secret key and software, the protection is unreliable and the performance is unstable, and an illegal user can break through the protection layer through the bottom hardware of the BIOS to acquire the data information of the computer.
Disclosure of Invention
In order to solve the problems that the operating system has security leakage in the background technology and an illegal user breaks through a protective layer through the bottom hardware of the BIOS and obtains the data information of the computer, the invention provides a two-stage security starting system and a two-stage security starting method of a domestic computer.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
A two-stage safety starting system of a domestic computer comprises a USBKey and PMON firmware; the USBKey and the PMON firmware form two-stage safe starting of the domestic computer;
The first stage safety start is:
The USBKey is connected with the computer through a USB interface and is identified by the computer;
After the USBKey is connected with a computer, communication is carried out between the USBKey and the computer, and first-stage identity verification is carried out;
The PMON firmware reads and analyzes the content stored in the USBKey, the MAC address in the PMON firmware is compared with the MAC address in the USBKey, if the MAC address is matched with the MAC address in the USBKey, the user name is prompted to be input, and if the user name is input correctly, the password is prompted to be input;
the second stage of safe starting is as follows:
The first-stage identity verification is completed, PMON firmware is loaded, and a kylin operating system is started;
And the kylin operating system performs second-stage identity verification, the user interface layer prompts the user to input the password of the kylin operating system, after the user inputs the password of the operating system, the public key of the operating system and the private key of the USBKey respectively decrypt the password and then match, if the passwords are matched, the verification is judged to be successful, and the starting and login guidance are completed.
Wherein: the operation system and the USBKey adopt encrypted communication, namely: the manufacturer sets a public key for the operating system and sets a private key for the USBKey.
The working principle is as follows: inserting the USBKey into a computer through the USBKey and the PMON firmware, performing first-stage safe starting, detecting the USBKey by the PMON firmware, matching an MAC address in the PMON with an MAC address in the USBKey, prompting to input a user name if the MAC address is matched with the MAC address in the USBKey, prompting to input a password if the user name is input correctly, finishing the first-stage safe starting if the password is input correctly, loading the PMON firmware and starting an operating system; and performing second-stage safe starting, inputting a kylin operating system password, and if the password is successfully input, completing the second-stage safe starting.
Further, the PMON stores the MAC address and the login password of the computer.
Further, the USBKey stores the MAC address, the user name and the password of the computer.
Further, the USBKey is identified by a computer through a driving layer, and the driving layer is a USBKey driver meeting a USB protocol; the USBKey is communicated with the computer through a function realization layer, the function realization layer is a USBKey operation interface and is a protocol for communication between the computer and the USBKey; in the first-level identity authentication and the second-level identity authentication, prompt information is displayed through a user interface layer, and the user interface layer comprises a startup authentication interface and a trusted guide interface, namely an input user name and password interface during startup authentication and an input password interface after entering a kylin operating system.
A two-stage safe starting method of a domestic computer comprises the following steps:
s1, connecting a USBKey with a computer through a USB interface;
S2, performing first-stage identity verification, reading and analyzing content stored in the USBKey by using PMON firmware, comparing an MAC address in the PMON firmware with an MAC address in the USBKey, prompting to input a user name if the MAC address is matched with the MAC address in the USBKey, and prompting to input a password if the user name is correctly input;
s3, if the input password is correct, loading PMON firmware and starting a kylin operating system;
s4, performing second-level identity verification, and inputting a kylin operating system password;
s5, if the password is input correctly, starting is completed.
Further, if the PMON and the USBKey cannot be matched, prompting that no corresponding USBKey exists, waiting for the user to insert the USBKey, supporting hot plug in the process, and re-identifying according to a carriage return after the user inserts the USBKey.
Further, the number of times of error input of the user name and the password is 5, if the user name and the password are input for 5 times, an error message is prompted, and after waiting for a user to press the carriage return, the computer is powered off and closed; if the USBKey is used again to log in the computer, a security administrator is required to reset the computer MAC address, the user name and the password of the USBKey by using a special tool of a manufacturer.
Compared with the prior art, the invention has the following advantages and beneficial effects: the invention can ensure the safety of the system starting process from two stages, wherein the first stage is the safety verification of the USBKey equipment, and the second stage is the safety verification of the operating system. After the two-stage safety starting management and control system and the technology are used, the safety of the domestic computer system is improved, and stronger support is provided for users with high-level safety requirements.
Drawings
The accompanying drawings, which are included to provide a further understanding of embodiments of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the principles of the application.
FIG. 1 is a block diagram of the principles of the present invention;
FIG. 2 is a start-up flow chart of the present invention.
Detailed Description
The following examples of the invention are set forth in connection with the accompanying drawings and the description thereof are merely illustrative of the invention and are not intended to be limiting.
Example 1
According to the figures 1 and 2, a two-stage safety starting system of a domestic computer comprises a USBKey and PMON firmware; the USBKey and the PMON firmware form two-stage safe starting of the domestic computer;
The first stage safety start is:
The USBKey is connected with the computer through a USB interface and is identified by the computer;
After the USBKey is connected with a computer, communication is carried out between the USBKey and the computer, and first-stage identity verification is carried out;
The PMON firmware reads and analyzes the content stored in the USBKey, the MAC address in the PMON firmware is compared with the MAC address in the USBKey, if the MAC address is matched with the MAC address in the USBKey, the user name is prompted to be input, and if the user name is input correctly, the password is prompted to be input;
the second stage of safe starting is as follows:
The first-stage identity verification is completed, PMON firmware is loaded, and a kylin operating system is started;
And the kylin operating system performs second-stage identity verification, the user interface layer prompts the user to input the password of the kylin operating system, after the user inputs the password of the operating system, the public key of the operating system and the private key of the USBKey respectively decrypt the password and then match, if the passwords are matched, the verification is judged to be successful, and the starting and login guidance are completed.
Wherein: the operation system and the USBKey adopt encrypted communication, namely: the manufacturer sets a public key for the operating system and sets a private key for the USBKey.
In this embodiment, the PMON stores the MAC address and the login password of the computer.
In this embodiment, the USBKey stores the MAC address, the user name and the password of the computer.
In this embodiment, the USB key is identified by the computer through a driving layer, where the driving layer is a USB key driver that meets the USB protocol; the USBKey is communicated with the computer through a function realization layer, the function realization layer is a USBKey operation interface and is a protocol for communication between the computer and the USBKey; in the first-level identity authentication and the second-level identity authentication, prompt information is displayed through a user interface layer, and the user interface layer comprises a startup authentication interface and a trusted guide interface, namely an input user name and password interface during startup authentication and an input password interface after entering a kylin operating system.
A two-stage safe starting method of a domestic computer comprises the following steps:
s1, connecting a USBKey with a computer through a USB interface;
S2, performing first-stage identity verification, reading and analyzing content stored in the USBKey by using PMON firmware, comparing an MAC address in the PMON firmware with an MAC address in the USBKey, prompting to input a user name if the MAC address is matched with the MAC address in the USBKey, and prompting to input a password if the user name is correctly input;
s3, if the input password is correct, loading PMON firmware and starting a kylin operating system;
s4, performing second-level identity verification, and inputting a kylin operating system password;
s5, if the password is input correctly, starting is completed.
In this embodiment, if the PMON and the USBKey cannot be matched, a prompt is given that there is no corresponding USBKey, and the user is waiting for inserting the USBKey, and this process supports hot plug, and the user performs recognition again according to the carriage return after inserting the USBKey.
In this embodiment, the number of times of error input of the user name and the password is 5 times, if the user name and the password are input for 5 times, an error message is prompted, and after waiting for the user to press the carriage return, the computer is powered off and turned off; if the USBKey is used again to log in the computer, a security administrator is required to reset the computer MAC address, the user name and the password of the USBKey by using a special tool of a manufacturer.
Before the system firmware PMON is booted, a user connects the USBKey device with a computer through a USB interface, and in the starting process, the PMON can search for the USBKey, then reads and analyzes the storage content of the USBKey, and compares the MAC address of the computer stored in the USBKey device with the MAC address of the computer stored in the PMON to see whether the USBKey device can be matched. If the user cannot match, prompting that no corresponding USBKey exists, waiting for the user to insert the correct USBKey, supporting hot plug in the process, and re-identifying according to carriage return after the user inserts the USBKey. If the user is matched, the user is prompted to input a user name, after the user name is correctly input, the user is prompted to input a password, the user name and the password in the process can only be input for 5 times in error, if the user inputs the password for 5 times, an error message is prompted, the USBKey can be locked, after the user presses the carriage return, the computer is powered down and closed, then the USBKey is used for logging in the computer, and a security administrator is required to reset the MAC address, the user name and the password of the computer in the USBKey by using a special system tool of a manufacturer. If the user name and the password are input correctly, loading PMON firmware and starting an operating system;
After the second-stage safe starting is carried out, the operating system is started, the password of the kylin operating system is prompted to be input, if the password is input incorrectly, an error prompt is generated, and the computer is powered down and closed; if the password is input correctly, starting and logging in the guide are completed.
In the starting process of the computer, the security of the domestic computer system is improved through two-stage safe starting, when a user wants to start the operating system, the first-stage safe starting is finished, the kylin operating system starts to be started, the password of the kylin operating system also needs to be input, and the starting and login guiding can be finished after the password is input correctly.
The foregoing description of the embodiments has been provided for the purpose of illustrating the general principles of the invention, and is not meant to limit the scope of the invention, but to limit the invention to the particular embodiments, and any modifications, equivalents, improvements, etc. that fall within the spirit and principles of the invention are intended to be included within the scope of the invention.

Claims (4)

1. A domestic computer two-stage safety starting system is characterized in that: the method comprises the steps of USBKey and PMON firmware; the USBKey and the PMON firmware form two-stage safe starting of the domestic computer;
The first stage safety start is:
The USBKey is connected with the computer through a USB interface and is identified by the computer;
After the USBKey is connected with a computer, communication is carried out between the USBKey and the computer, and first-stage identity verification is carried out;
The PMON firmware reads and analyzes the content stored in the USBKey, the MAC address in the PMON firmware is compared with the MAC address in the USBKey, if the MAC address is matched with the MAC address in the USBKey, the input user name is displayed, the user name is judged to be input correctly, and the password is prompted to be input;
the second stage of safe starting is as follows:
The first-stage identity verification is completed, PMON firmware is loaded, and a kylin operating system is started;
The kylin operating system performs second-stage identity verification, displays the password of the kylin operating system, after a user inputs the password of the operating system, the public key of the operating system and the private key of the USBKey respectively decrypt the password and then match, if the passwords match, the verification is judged to be successful, and the starting and login guidance are completed;
the USBKey stores the MAC address, the user name and the password of the computer;
the PMON firmware stores the MAC address and the login password of the computer;
The USBKey is identified by a computer through a driving layer, and the driving layer is a USBKey driver meeting a USB protocol; the USBKey is communicated with the computer through a function realization layer, the function realization layer is a USBKey operation interface and is a protocol for communication between the computer and the USBKey; in the first-level identity authentication and the second-level identity authentication, prompt information is displayed through a user interface layer, and the user interface layer comprises a startup authentication interface and a trusted guide interface, namely an input user name and password interface during startup authentication and an input password interface after entering a kylin operating system.
2. A domestic computer two-stage safe starting method is characterized in that: the method comprises the following steps:
s1, connecting a USBKey with a computer through a USB interface;
S2, performing first-stage identity verification, reading and analyzing content stored in the USBKey by using PMON firmware, comparing an MAC address in the PMON firmware with an MAC address in the USBKey, prompting to input a user name if the MAC address is matched with the MAC address in the USBKey, and prompting to input a password if the user name is correctly input;
s3, if the input password is correct, loading PMON firmware and starting a kylin operating system;
s4, performing second-level identity verification, and inputting a kylin operating system password;
S5, if the password is input correctly, starting is completed;
the USBKey stores the MAC address, the user name and the password of the computer;
the PMON firmware stores the MAC address and the login password of the computer;
The USBKey is identified by a computer through a driving layer, and the driving layer is a USBKey driver meeting a USB protocol; the USBKey is communicated with the computer through a function realization layer, the function realization layer is a USBKey operation interface and is a protocol for communication between the computer and the USBKey; in the first-level identity authentication and the second-level identity authentication, prompt information is displayed through a user interface layer, and the user interface layer comprises a startup authentication interface and a trusted guide interface, namely an input user name and password interface during startup authentication and an input password interface after entering a kylin operating system.
3. The method for two-stage safe starting of a domestic computer according to claim 2, wherein the method comprises the following steps: if the PMON and the USBKey cannot be matched, prompting that no corresponding USBKey exists, waiting for the user to insert the USBKey, supporting hot plug in the process, and re-identifying according to the carriage return after the user inserts the USBKey.
4. The method for two-stage safe starting of a domestic computer according to claim 2, wherein the method comprises the following steps: the number of times of error input of the user name and the password is 5, if errors are input for 5 times, an error message is prompted, and after a user presses the carriage return, the computer is powered off and closed; if the USBKey is used again to log in the computer, a security administrator is required to reset the computer MAC address, the user name and the password of the USBKey by using a special tool of a manufacturer.
CN202011529512.9A 2020-12-22 2020-12-22 Two-stage safe starting system and method for domestic computer Active CN112597504B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011529512.9A CN112597504B (en) 2020-12-22 2020-12-22 Two-stage safe starting system and method for domestic computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011529512.9A CN112597504B (en) 2020-12-22 2020-12-22 Two-stage safe starting system and method for domestic computer

Publications (2)

Publication Number Publication Date
CN112597504A CN112597504A (en) 2021-04-02
CN112597504B true CN112597504B (en) 2024-04-30

Family

ID=75200167

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011529512.9A Active CN112597504B (en) 2020-12-22 2020-12-22 Two-stage safe starting system and method for domestic computer

Country Status (1)

Country Link
CN (1) CN112597504B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1755572A (en) * 2004-09-30 2006-04-05 联想(北京)有限公司 Computer security startup method
CN1936761A (en) * 2005-09-23 2007-03-28 联想(北京)有限公司 Computer system of bottom identity identification and method therefor
CN101673330A (en) * 2008-09-10 2010-03-17 中国瑞达系统装备公司 BIOS-based computer security protection method and system
CN101986325A (en) * 2010-11-01 2011-03-16 山东超越数控电子有限公司 Computer security access control system and method
CN102184122A (en) * 2011-05-16 2011-09-14 曙光信息产业股份有限公司 Basic input/output system (bios) and interrupt realizing method for Loongson central processing unit (CPU) mainboard
CN102609040A (en) * 2012-01-12 2012-07-25 北京国基科技股份有限公司 Home-made computer to be reinforced and safety BIOS (basic input output system) operating method for same
CN103049295A (en) * 2012-12-25 2013-04-17 中标软件有限公司 Network installation method for Linux operating systems with godson platforms
CN103413083A (en) * 2013-08-15 2013-11-27 水利部水利信息中心 Security defending system for single host
CN105825131A (en) * 2016-03-16 2016-08-03 广东工业大学 Computer security startup protection method on basis of UEFI (Unified Extensible Firmware Interface)
CN106100848A (en) * 2016-06-14 2016-11-09 东北大学 Double factor identity authorization system based on smart mobile phone and user password and method
CN106127016A (en) * 2016-07-18 2016-11-16 浪潮集团有限公司 System and implementation method for trusted authentication of user login of operating system
CN106446658A (en) * 2016-08-30 2017-02-22 孙鸿鹏 Data center security protection method and system
CN106649007A (en) * 2016-11-18 2017-05-10 中国兵器装备集团自动化研究所 Trusted verification method based on Loongson 3A system
CN107704749A (en) * 2017-10-25 2018-02-16 深圳竹云科技有限公司 Windows system safe login methods based on U-shield verification algorithm
CN108243166A (en) * 2016-12-27 2018-07-03 航天信息股份有限公司 A kind of identity identifying method and system based on USBKey

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1755572A (en) * 2004-09-30 2006-04-05 联想(北京)有限公司 Computer security startup method
CN1936761A (en) * 2005-09-23 2007-03-28 联想(北京)有限公司 Computer system of bottom identity identification and method therefor
CN101673330A (en) * 2008-09-10 2010-03-17 中国瑞达系统装备公司 BIOS-based computer security protection method and system
CN101986325A (en) * 2010-11-01 2011-03-16 山东超越数控电子有限公司 Computer security access control system and method
CN102184122A (en) * 2011-05-16 2011-09-14 曙光信息产业股份有限公司 Basic input/output system (bios) and interrupt realizing method for Loongson central processing unit (CPU) mainboard
CN102609040A (en) * 2012-01-12 2012-07-25 北京国基科技股份有限公司 Home-made computer to be reinforced and safety BIOS (basic input output system) operating method for same
CN103049295A (en) * 2012-12-25 2013-04-17 中标软件有限公司 Network installation method for Linux operating systems with godson platforms
CN103413083A (en) * 2013-08-15 2013-11-27 水利部水利信息中心 Security defending system for single host
CN105825131A (en) * 2016-03-16 2016-08-03 广东工业大学 Computer security startup protection method on basis of UEFI (Unified Extensible Firmware Interface)
CN106100848A (en) * 2016-06-14 2016-11-09 东北大学 Double factor identity authorization system based on smart mobile phone and user password and method
CN106127016A (en) * 2016-07-18 2016-11-16 浪潮集团有限公司 System and implementation method for trusted authentication of user login of operating system
CN106446658A (en) * 2016-08-30 2017-02-22 孙鸿鹏 Data center security protection method and system
CN106649007A (en) * 2016-11-18 2017-05-10 中国兵器装备集团自动化研究所 Trusted verification method based on Loongson 3A system
CN108243166A (en) * 2016-12-27 2018-07-03 航天信息股份有限公司 A kind of identity identifying method and system based on USBKey
CN107704749A (en) * 2017-10-25 2018-02-16 深圳竹云科技有限公司 Windows system safe login methods based on U-shield verification algorithm

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"Using TPM to improve boot security at BIOS layer";Kuan-Jen Lin等;2012 IEEE International Conference on Consumer Electronics;20120301;376-377 *
"基于龙芯3A处理器的tPMON设计与实现";张立丽等;电子测量技术;20140615;第37卷(第06期);11-14 *
国产基础软硬件平台可信计算系统应用研究;沈浩;;电子技术;20180525(第05期);19-21 *
基于USBKey的增强型登录认证系统的设计与实现;张小莉;;太原师范学院学报(自然科学版);20151225(第04期);70-73 *

Also Published As

Publication number Publication date
CN112597504A (en) 2021-04-02

Similar Documents

Publication Publication Date Title
CN107196922B (en) Identity authentication method, user equipment and server
US7930264B2 (en) Multi-module authentication platform
US11271745B2 (en) Method and system for operating internet of things device
WO2020199391A1 (en) Vehicle unlocking authentication method and apparatus based on terminal device
US10931663B2 (en) Terminal authenticated access
WO2015117332A1 (en) Method and device for enabling interface in usb debugging mode, and terminal
CN109492382B (en) Single input box login verification method
CN100418033C (en) Computer system of bottom identity identification and method therefor
US20110060899A1 (en) Power on certification method for personal computer and power on certification system thereof
EP3815413A1 (en) User authentication using a companion device
CN105825131A (en) Computer security startup protection method on basis of UEFI (Unified Extensible Firmware Interface)
CN113591057B (en) Biological characteristic off-line identity recognition method and system
CN105243314A (en) USB-key based security system and usage method therefor
CN108809982B (en) Secret-free authentication method and system based on trusted execution environment
CN102456102A (en) Method for carrying out identity recertification on particular operation of information system by using Usb key technology
CN107533598A (en) Input method, device and the terminal of the login password of application program
WO2024103965A1 (en) Usb peripheral authentication method, embedded system, and storage medium
CN112597504B (en) Two-stage safe starting system and method for domestic computer
US9977907B2 (en) Encryption processing method and device for application, and terminal
EP1870832B1 (en) Pairing to a wireless peripheral device at the lock-screen
CN102594815B (en) Before register system, user right is set and performs method, the device of corresponding operating
WO2016165537A1 (en) Method for controlling intelligent terminal and apparatus for controlling intelligent terminal
CN111092731A (en) Authentication method and server
CN112966276B (en) Method, device and medium for safely starting computer
CN106533685B (en) Identity authentication method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20240322

Address after: 621000 Mianyang province Sichuan City Youxian District Road No. 7 two immortals

Applicant after: China Ordnance Equipment Group Automation Research Institute Co.,Ltd.

Country or region after: China

Address before: 621000 Mianyang province Sichuan City Youxian District Road No. 7 two immortals

Applicant before: China Ordnance Equipment Group Automation Research Institute Co.,Ltd.

Country or region before: China

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant