CN113158168A - Authentication method and electronic equipment - Google Patents

Authentication method and electronic equipment Download PDF

Info

Publication number
CN113158168A
CN113158168A CN202110320476.3A CN202110320476A CN113158168A CN 113158168 A CN113158168 A CN 113158168A CN 202110320476 A CN202110320476 A CN 202110320476A CN 113158168 A CN113158168 A CN 113158168A
Authority
CN
China
Prior art keywords
authentication
operating system
signal
key
preset range
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110320476.3A
Other languages
Chinese (zh)
Inventor
何士贵
吴磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN202110320476.3A priority Critical patent/CN113158168A/en
Publication of CN113158168A publication Critical patent/CN113158168A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Power Sources (AREA)

Abstract

The application discloses an authentication method and electronic equipment, wherein the authentication method comprises the following steps: acquiring an authentication signal, wherein the authentication signal is a carrier-free communication signal and is matched with an authentication device installed on the electronic equipment; judging whether the authentication signal meets an authentication condition or not so as to determine whether an operating system can be operated or not; wherein the authentication condition includes whether an authentication position where the authentication signal is located falls within a preset range. According to the authentication method, whether the operating system can be operated or not is determined by judging whether the authentication signal meets the authentication condition or not, so that the safety of information in the electronic equipment can be improved, and the damage to the electronic equipment or the data loss and the like caused by the fact that an unauthorized person closes the system unintentionally or maliciously can be avoided. The authentication condition is whether an authentication position where an authentication signal of the carrier-free communication signal is located falls within a preset range.

Description

Authentication method and electronic equipment
Technical Field
The present disclosure relates to the field of information authentication technologies, and in particular, to an authentication method and an electronic device.
Background
At present, the boot process of an electronic device is as follows: after a user manually presses a power key, a serial interface and a basic input and output system in the electronic equipment start to operate, the basic input and output system verifies a password of the basic input and output system input by the user before operation, and after the verification is passed, the electronic equipment starts to operate an operating system of the electronic equipment, so that the electronic equipment is started. The shutdown process of the electronic equipment comprises the following steps: after the user manually presses the power key, or the mouse executes corresponding operations in the running state of the operating system in the electronic equipment, and the like, the electronic equipment is turned off.
However, in the above boot process, once the password of the bios is revealed, in the field of internet of things and in an unattended scene, unauthorized persons (such as persons who steal the password of the bios) cannot be prevented from starting the operating system of the electronic device, which results in low information security in the electronic device; moreover, when the outdoor electronic device is in the on state, it is impossible to prevent unauthorized persons from unintentionally or maliciously closing the system, resulting in damage to the electronic device or loss of data.
Disclosure of Invention
An object of the embodiments of the present application is to provide a power-on method and an electronic device, which can improve the security of information in the electronic device and can also avoid damage to the electronic device or data loss caused by unauthorized persons accidentally or maliciously closing a system.
In a first aspect, an embodiment of the present application provides an authentication method, including:
acquiring an authentication signal, wherein the authentication signal is a carrier-free communication signal and is matched with an authentication device installed on the electronic equipment;
judging whether the authentication signal meets an authentication condition or not so as to determine whether an operating system can be operated or not; wherein the authentication condition includes whether an authentication position where the authentication signal is located falls within a preset range.
In a possible implementation manner, in a case that a basic input output system of the electronic device is not in operation, the determining whether the authentication signal meets an authentication condition includes:
judging whether the operating system of the electronic equipment is in a running state;
and if the operating system is in the running state, controlling the power supply key to be in a non-locking state.
In a possible implementation manner, in a case that a basic input output system of the electronic device is not in operation, the determining whether the authentication signal meets an authentication condition further includes:
judging whether the operating system of the electronic equipment is in a running state;
if the operating system is not in the running state, determining the authentication position of the authentication signal;
if the authentication position falls into the preset range, controlling the power supply key to be in the non-locking state;
and if the authentication position does not fall into the preset range, controlling the power supply key to be in a locking state.
In one possible embodiment, in a case where the power key is in the unlocked state, the authentication method includes:
and responding to the triggering action of the power supply key to determine to execute the starting operation.
In a possible implementation manner, in a case where the power key is in the locked state, the authentication method further includes:
determining not to execute the starting operation without responding to the triggering action of the power supply key; and
and re-judging whether the operating system is in the running state or not until the power supply key is controlled to be in the non-locking state.
In a possible implementation manner, in a case that a basic input/output system of the electronic device is already running and a trigger action of a power key is acquired, the determining whether the authentication signal meets an authentication condition includes:
determining an authentication position where the authentication signal is located;
if the authentication position falls into the preset range, determining to operate the operating system;
and if the authentication position does not fall into the preset range, determining not to run the operating system.
In a possible implementation manner, in a case that the operating system of the electronic device is in a running state, the method further includes:
acquiring a running stopping instruction; the operation stopping instruction is generated by pressing a power key or clicking a virtual key;
if the authentication position of the authentication signal falls into the preset range, responding to the operation stopping instruction, and determining to stop operating the operating system;
and if the authentication position does not fall into the preset range, the operation stopping instruction is not responded, and the operation of the operating system is determined to be kept.
In a possible embodiment, the authentication condition further includes authorization information; the authentication method further comprises:
responding to the trigger action of the configuration key to display the authorization information;
and updating the authorization information in response to the modification instruction.
In a second aspect, an embodiment of the present application further provides an electronic device, including a control apparatus and an authentication apparatus;
the control device is configured to acquire an authentication signal, wherein the authentication signal is a carrier-free communication signal and is matched with the authentication device;
the authentication device is configured to judge whether the authentication signal meets an authentication condition so as to determine whether an operating system can be operated; wherein the authentication condition includes whether an authentication position where the authentication signal is located falls within a preset range.
In a possible implementation, the electronic device further comprises a configuration means;
the configuration device responds to the trigger action of the configuration key in a configuration mode and displays the authorization information;
and updating the authorization information in response to the modification instruction.
According to the authentication method, whether the operating system can be operated or not is determined by judging whether the authentication signal meets the authentication condition or not, so that the safety of information in the electronic equipment can be improved, and the damage or data loss of the electronic equipment and the like caused by the fact that an unauthorized person closes the system unintentionally or maliciously can be avoided. The authentication condition is whether an authentication position where an authentication signal of the carrier-free communication signal is located falls within a preset range.
In order to make the aforementioned objects, features and advantages of the present disclosure more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions in the present application or the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
FIG. 1 illustrates a flow chart of an authentication method provided herein;
FIG. 2 illustrates a flow chart of another authentication method provided herein;
fig. 3 is a schematic structural diagram of an electronic device corresponding to determining whether an authentication signal meets an authentication condition in an authentication method provided by the present application;
FIG. 4 illustrates a flow chart of another authentication method provided herein;
fig. 5 is a schematic structural diagram of an electronic device corresponding to determining whether an authentication signal meets an authentication condition in another authentication method provided by the present application;
FIG. 6 illustrates a flow chart of another authentication method provided herein;
FIG. 7 illustrates a flow chart of another authentication method provided herein;
fig. 8 shows a schematic structural diagram of an electronic device provided in the present application.
Detailed Description
Various aspects and features of the present application are described herein with reference to the drawings.
It will be understood that various modifications may be made to the embodiments of the present application. Accordingly, the foregoing description should not be construed as limiting, but merely as exemplifications of embodiments. Those skilled in the art will envision other modifications within the scope and spirit of the application.
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the application and, together with a general description of the application given above and the detailed description of the embodiments given below, serve to explain the principles of the application.
These and other characteristics of the present application will become apparent from the following description of preferred forms of embodiment, given as non-limiting examples, with reference to the attached drawings.
It should also be understood that, although the present application has been described with reference to some specific examples, a person of skill in the art shall certainly be able to achieve many other equivalent forms of application, having the characteristics as set forth in the claims and hence all coming within the field of protection defined thereby.
The above and other aspects, features and advantages of the present application will become more apparent in view of the following detailed description when taken in conjunction with the accompanying drawings.
Specific embodiments of the present application are described hereinafter with reference to the accompanying drawings; however, it is to be understood that the disclosed embodiments are merely exemplary of the application, which can be embodied in various forms. Well-known and/or repeated functions and constructions are not described in detail to avoid obscuring the application of unnecessary or unnecessary detail. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present application in virtually any appropriately detailed structure.
The specification may use the phrases "in one embodiment," "in another embodiment," "in yet another embodiment," or "in other embodiments," which may each refer to one or more of the same or different embodiments in accordance with the application.
The information processing method provided by the embodiment of the application can improve the safety of information in the electronic equipment and can also avoid the damage or data loss of the electronic equipment and the like caused by the fact that an unauthorized person closes the system unintentionally or maliciously. For the understanding of the present application, a detailed description of an authentication method provided in the present application will be given first.
In practical applications, the execution subject of the information processing method in the embodiment of the present application may be a server, a processor, or the like, and for convenience of illustration, the processor is hereinafter described in detail. As shown in fig. 1, a flowchart of an authentication method provided in the embodiment of the present application is shown, where the specific steps include:
s101, acquiring an authentication signal, wherein the authentication signal is a carrier-free communication signal and is matched with an authentication device installed on the electronic equipment.
In a specific implementation, the authentication signal may be acquired in real time, or may be set to be acquired periodically, and the interval time may be set according to an application scenario of the electronic device.
The authentication signal is a carrier-free communication signal sent by radio frequency equipment carried by an authorized person, and is arranged in a matching manner with an authentication device installed on the electronic equipment, that is, the authentication device on the electronic equipment can identify the authentication signal.
S102, judging whether the authentication signal meets the authentication condition or not to determine whether the operating system can be operated or not; the authentication condition includes whether the authentication position where the authentication signal is located falls within a preset range.
After the authentication device of the electronic device acquires the authentication signal, whether the authentication signal meets the authentication condition is judged to determine whether the operating system of the electronic device can be operated, specifically, the operating system of the electronic device is operated when the authentication signal meets the authentication condition, and the operating system of the electronic device is not operated when the authentication signal does not meet the authentication condition.
The authentication condition includes whether the authentication position where the authentication signal is located falls within a preset range, and of course, the strength of the authentication signal may also be used as the authentication condition.
According to the authentication method, whether the operating system can be operated or not is determined by judging whether the authentication signal meets the authentication condition or not, so that the safety of information in the electronic equipment can be improved, and the damage or data loss of the electronic equipment and the like caused by the fact that an unauthorized person closes the system unintentionally or maliciously can be avoided. The authentication condition is whether an authentication position where an authentication signal of the carrier-free communication signal is located falls within a preset range.
Specifically, as shown in fig. 2, in the case that the bios of the electronic device is not operating, the specific steps of determining whether the authentication signal meets the authentication condition include S201 to S205.
S201, judging whether an operating system of the electronic equipment is in a running state.
And S202, if the operating system is in the running state, controlling the power key to be in the non-locking state.
S203, if the operating system is not in the running state, determining the authentication position where the authentication signal is located.
And S204, if the authentication position falls into a preset range, controlling the power key to be in a non-locking state.
And S205, if the authentication position does not fall into the preset range, controlling the power key to be in a locking state.
Here, when the electronic device is powered on or has a power supply, the control system of the electronic device is always in an operating state, and at this time, when the bios of the electronic device is not operating, it is determined whether the operating system of the electronic device is in an operating state, that is, whether the electronic device can perform a job. The determination may be made by a chip, a control device, or the like.
If the operating system of the electronic device is determined to be in the running state, that is, if the electronic device is determined to be capable of performing the operation, for example, the electronic device has performed the operation for a period of time and is in a dormant state, the power key is controlled to be in a non-locked state; if it is determined that the operating system of the electronic device is not in an operating state, that is, the electronic device cannot perform the job, the authentication signal is authenticated based on the authentication condition, specifically, the authentication position where the authentication signal is located is determined, for example, the authentication position where the authentication signal is located is determined based on the strength of the authentication signal, where a mapping relationship between the strength of the authentication signal and the authentication position may be preset. After the authentication position where the authentication signal is located is determined, whether the authentication position falls into a preset range or not is judged, and if the authentication position falls into the preset range, namely the authentication signal accords with the authentication condition, the power supply key is controlled to be in an unlocked state. Under the condition that the power key is in a non-locking state, once the power key is triggered, the power key is responded to the triggering action of the power key to determine to execute the starting operation, and the operating system can be operated when the starting operation is executed.
If the authentication position does not fall into the preset range, controlling the power supply key to be in a locking state, namely, not responding to the trigger action of the power supply key, and determining not to execute the starting operation, namely, the operating system of the electronic equipment cannot be started by pressing the power supply key; and judging whether the operating system is in the running state again until the control power supply key is in the non-locking state.
It should be noted that, when the basic input/output system of the electronic device is not in operation and the authentication signal is determined to meet the authentication condition, the structural schematic diagram of the corresponding electronic device may refer to fig. 3, and specifically, the electronic device includes a control device of the electronic device, where the control device is connected to a chip and an authentication device through a Serial Interface (such as a Universal Asynchronous Receiver/Transmitter (UART), a Serial Peripheral Interface (SPI), and the like), and is connected to a power key through a switch, and after the authentication device acquires the authentication signal, the authentication signal is transmitted to the chip through the control device, so that the chip authenticates the authentication signal based on the authentication condition. Further, the locking state of the power key can be controlled by controlling the on and off of the switch, for example, when the authentication position is determined not to fall within the preset range, the switch can be controlled to be off, so that the power key is in the locking state; when the authentication position is determined to fall into the preset range, the switch can be controlled to be switched on, and then the power supply key is in a non-locking state.
When the basic input/output system of the electronic device is already running and acquires a trigger action of the power key, determining whether the authentication signal meets the authentication condition according to the method steps shown in fig. 4, specifically including:
s401, determining the authentication position where the authentication signal is located.
S402, if the authentication position falls into a preset range, determining to run the operating system.
And S403, if the authentication position does not fall within the preset range, determining that the operating system is not operated.
After the authentication signal is obtained, the authentication position where the authentication signal is located is determined, and the method for determining the authentication position is the same as that in the above, and is not described in detail herein. Because the basic input and output system of the electronic equipment is in an operating state, the operating system is directly operated under the condition that the authentication position falls into a preset range; and in the case that the authentication position does not fall within the preset range, determining not to run the operating system of the electronic equipment.
The schematic structural diagram of the electronic device that determines whether the authentication signal meets the authentication condition when the basic input/output system of the electronic device is in operation and acquires the trigger action of the power key is shown in fig. 5, and specifically includes a control device and a chip, and the control device and the chip are connected through a serial interface (such as UART and SPI).
Considering that, when the electronic device is in the on state outdoors, it is impossible to prevent an unauthorized person from unintentionally or maliciously turning off the system, which results in damage to the electronic device or data loss, based on the same idea, when the operating system of the electronic device is in the running state, the method shown in fig. 6 is performed to avoid damage to the electronic device or data loss due to the unauthorized person unintentionally or maliciously turning off the system, which specifically includes S601-S603.
S601, acquiring a stop operation instruction; wherein, the stop operation instruction is generated by pressing a power key or clicking a virtual key.
And S602, responding to the operation stopping instruction and determining to stop operating the operating system if the authentication position where the authentication signal is located falls within a preset range.
S603, if the authentication position does not fall into the preset range, the operation stopping instruction is not responded, and the operation of the operating system is determined to be kept.
And acquiring a running stopping instruction, wherein the running stopping instruction is generated by pressing a power key or clicking a virtual key. After the operation stopping instruction is obtained, searching for an authentication signal, if the authentication position of the authentication signal falls within a preset range, namely the operation stopping instruction is generated by the trigger of authorized personnel, responding to the operation stopping instruction at the moment, and determining to stop operating the operating system; if the authentication position does not fall within the preset range, namely the operation stopping instruction is generated by the triggering of the unauthorized person, the operation stopping instruction is not responded, the operation of the operating system is determined to be kept, and the damage of the electronic equipment or the data loss caused by the fact that the unauthorized person closes the system unintentionally or maliciously is avoided.
In specific implementation, the authentication condition further includes authorization information, and the authentication method provided in the embodiment of the present application further provides the method shown in fig. 7 to modify the authorization information, and the specific steps are as follows:
and S701, responding to the trigger action of the configuration key, and displaying the authorization information.
S702, responding to the modification instruction, and updating the authorization information.
In consideration of the fact that the authentication signal is a carrier-free communication signal sent by a radio frequency device carried by an authorized person, the electronic device according to the embodiment of the present application is further provided with a configuration key, specifically referring to fig. 3, the configuration key is connected with the control device, and the authorized person or an administrator of the electronic device may trigger the configuration key.
After an authorized person or an administrator of the electronic equipment triggers the configuration key, the authorization information is displayed through a display device of the electronic equipment or an external display device in response to the triggering action of the configuration key. The authorized person or an administrator of the electronic device generates the modification instruction based on the current authorization information.
In response to the modification instruction, the authorization information is updated based on the modification instruction, for example, authorized persons are added, authorized persons are deleted, authorized person information is changed, and the like.
Based on the same inventive concept, the second aspect of the present application further provides an electronic device corresponding to the authentication method, and since the principle of solving the problem of the apparatus in the present application is similar to that of the data processing method in the present application, the implementation of the apparatus may refer to the implementation of the method, and repeated details are not repeated.
Fig. 8 shows a schematic diagram of an electronic device provided in an embodiment of the present application, where the electronic device includes a control apparatus 801 and an authentication apparatus 802;
the control device 801 is configured to acquire an authentication signal, wherein the authentication signal is a carrier-free communication signal and is configured to match with the authentication device;
the authentication device 802 configured to determine whether the authentication signal meets an authentication condition to determine whether an operating system can be run; wherein the authentication condition includes whether an authentication position where the authentication signal is located falls within a preset range.
In a further embodiment, the electronic device further comprises a configuration means 803;
the configuration device 803, which responds to the trigger action of the configuration key in a configuration way, displays the authentication condition;
updating the authentication condition in response to a modification instruction.
In another embodiment, in a case where the basic input output system of the electronic device is not in operation, the authentication apparatus 802 includes:
a first judgment unit configured to judge whether the operating system of the electronic device is in a running state;
the first control unit is configured to control the power key to be in a non-locking state if the operating system is in the running state.
In another embodiment, in a case that the basic input output system of the electronic device is not in operation, the authentication apparatus 802 further includes:
a second determination unit configured to determine whether the operating system of the electronic device is in a running state;
a first determination unit configured to determine an authentication position where the authentication signal is located if the operating system is not in the running state;
the second control unit is configured to control the power key to be in the non-locking state if the authentication position falls into the preset range;
and the third control unit is configured to control the power key to be in a locked state if the authentication position does not fall into the preset range.
In another embodiment, in the case that the power key is in the unlocked state, the electronic device further includes a response device 804 configured to determine to perform a power-on operation in response to a trigger action of the power key.
In another embodiment, in the case that the power key is in the locked state, the electronic device further includes a determining device 805 configured not to respond to the triggering action of the power key and determining not to execute a power-on operation; and
and re-judging whether the operating system is in the running state or not until the power supply key is controlled to be in the non-locking state.
In another embodiment, in a case where the bios of the electronic device is already running and a trigger action of the power key is acquired, the authentication apparatus 802 further includes:
a second determination unit configured to determine an authentication position where the authentication signal is located;
a third determining unit configured to determine to operate the operating system if the authentication position falls within the preset range;
a fourth determination unit configured to determine not to run the operating system if the authentication position does not fall within the preset range.
In another embodiment, in the case that the operating system of the electronic device is in a running state, the electronic device further includes a stopping device 806, and the stopping device includes:
an acquisition unit configured to acquire a stop operation instruction; the operation stopping instruction is generated by pressing a power key or clicking a virtual key;
a fifth determining unit, configured to respond to the operation stop instruction and determine to stop operating the operating system if the authentication position where the authentication signal is located falls within the preset range;
a sixth determining unit configured to determine to keep operating the operating system without responding to the stop operation instruction if the authentication position does not fall within the preset range.
According to the electronic equipment, whether the operating system can be operated or not is determined by judging whether the authentication signal meets the authentication condition or not, the safety of information in the electronic equipment can be improved, and the damage to the electronic equipment or the data loss and the like caused by the fact that an unauthorized person closes the system unintentionally or maliciously can be avoided. The authentication condition is whether an authentication position where an authentication signal of the carrier-free communication signal is located falls within a preset range.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the disclosure. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.
Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limitations on the scope of the application. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
The embodiments of the present application have been described in detail, but the present application is not limited to these specific embodiments, and those skilled in the art can make various modifications and modified embodiments based on the concept of the present application, and these modifications and modified embodiments should fall within the scope of the present application.

Claims (10)

1. An authentication method, comprising:
acquiring an authentication signal, wherein the authentication signal is a carrier-free communication signal and is matched with an authentication device installed on the electronic equipment;
judging whether the authentication signal meets an authentication condition or not so as to determine whether an operating system can be operated or not; wherein the authentication condition includes whether an authentication position where the authentication signal is located falls within a preset range.
2. The authentication method of claim 1, wherein the determining whether the authentication signal meets an authentication condition when the bios of the electronic device is not operating comprises:
judging whether the operating system of the electronic equipment is in a running state;
and if the operating system is in the running state, controlling the power supply key to be in a non-locking state.
3. The authentication method according to claim 1, wherein in a case where a bios of the electronic device is not operating, the determining whether the authentication signal meets an authentication condition further comprises:
judging whether the operating system of the electronic equipment is in a running state;
if the operating system is not in the running state, determining the authentication position of the authentication signal;
if the authentication position falls into the preset range, controlling the power supply key to be in the non-locking state;
and if the authentication position does not fall into the preset range, controlling the power supply key to be in a locking state.
4. The authentication method according to claim 3, in a case where the power key is in the unlocked state, the authentication method comprising:
and responding to the triggering action of the power supply key to determine to execute the starting operation.
5. The authentication method according to claim 3, further comprising, with the power key in the locked state:
determining not to execute the starting operation without responding to the triggering action of the power supply key; and
and re-judging whether the operating system is in the running state or not until the power supply key is controlled to be in the non-locking state.
6. The authentication method according to claim 1, wherein the determining whether the authentication signal meets the authentication condition when the bios of the electronic device is already running and a trigger action of a power key is acquired comprises:
determining an authentication position where the authentication signal is located;
if the authentication position falls into the preset range, determining to operate the operating system;
and if the authentication position does not fall into the preset range, determining not to run the operating system.
7. The authentication method according to claim 1, further comprising, in a case where the operating system of the electronic device is in a running state:
acquiring a running stopping instruction; the operation stopping instruction is generated by pressing a power key or clicking a virtual key;
if the authentication position of the authentication signal falls into the preset range, responding to the operation stopping instruction, and determining to stop operating the operating system;
and if the authentication position does not fall into the preset range, the operation stopping instruction is not responded, and the operation of the operating system is determined to be kept.
8. The authentication method according to claim 1, the authentication condition further comprising authorization information; the authentication method further comprises:
responding to the trigger action of the configuration key to display the authorization information;
and updating the authorization information in response to the modification instruction.
9. An electronic device includes a control means and an authentication means;
the control device is configured to acquire an authentication signal, wherein the authentication signal is a carrier-free communication signal and is matched with the authentication device;
the authentication device is configured to judge whether the authentication signal meets an authentication condition so as to determine whether an operating system can be operated; wherein the authentication condition includes whether an authentication position where the authentication signal is located falls within a preset range.
10. The electronic device of claim 9, further comprising a configuration means;
the configuration device responds to the trigger action of the configuration key in a configuration mode and displays the authorization information;
and updating the authorization information in response to the modification instruction.
CN202110320476.3A 2021-03-25 2021-03-25 Authentication method and electronic equipment Pending CN113158168A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110320476.3A CN113158168A (en) 2021-03-25 2021-03-25 Authentication method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110320476.3A CN113158168A (en) 2021-03-25 2021-03-25 Authentication method and electronic equipment

Publications (1)

Publication Number Publication Date
CN113158168A true CN113158168A (en) 2021-07-23

Family

ID=76884782

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110320476.3A Pending CN113158168A (en) 2021-03-25 2021-03-25 Authentication method and electronic equipment

Country Status (1)

Country Link
CN (1) CN113158168A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114553502A (en) * 2022-01-29 2022-05-27 联想开天科技有限公司 Network authentication method and electronic equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114553502A (en) * 2022-01-29 2022-05-27 联想开天科技有限公司 Network authentication method and electronic equipment
CN114553502B (en) * 2022-01-29 2024-03-29 联想开天科技有限公司 Network authentication method and electronic equipment

Similar Documents

Publication Publication Date Title
US8312559B2 (en) System and method of wireless security authentication
US7194631B2 (en) Information-processing apparatus having a user-switching function and user-switching method for use in the apparatus
US10552614B2 (en) Authentication system and method
CN106895553B (en) Air conditioner, control method and device thereof, and alarm method and device
US7913258B2 (en) Information processing device and process control method
EP2207122A1 (en) System and method to provide added security to a platform using locality-based data
CN106874727B (en) Double-screen terminal application processing method and device and terminal
US20120086806A1 (en) Electronic device and security method of electronic device
CN107145772B (en) Terminal equipment security control method and device and terminal equipment
CN108322310B (en) Card reading login method and security login system by using security equipment
CN108737638B (en) Application control method and device, mobile terminal and computer readable medium
CN105912911A (en) Method and system for managing application programs of mobile equipment
CN108337235B (en) Method and system for executing security operation by using security device
CN113158168A (en) Authentication method and electronic equipment
CN112581122A (en) Display method, payment code identification method and device and electronic equipment
WO2016072833A1 (en) System and method to disable factory reset
US20100211687A1 (en) Systems and methods for logging user input data for subsequent retrieval
CN105933503A (en) Information processing method and electronic equipment
US20240054208A1 (en) Terminal anti-theft method and terminal device
CN108763884B (en) Authority management method, device, mobile terminal and storage medium
CN107491685B (en) Face recognition method and mobile terminal
JP2003122443A (en) Electronic equipment with security function and security management system
US20200184116A1 (en) Computer lock system
CN113163392A (en) Method and device for deleting user identity data file
CN111859334A (en) Screen state control method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination