CN117171822A - Hiding method of operation subsystem - Google Patents

Hiding method of operation subsystem Download PDF

Info

Publication number
CN117171822A
CN117171822A CN202311204482.8A CN202311204482A CN117171822A CN 117171822 A CN117171822 A CN 117171822A CN 202311204482 A CN202311204482 A CN 202311204482A CN 117171822 A CN117171822 A CN 117171822A
Authority
CN
China
Prior art keywords
ukey
subsystem
auxiliary authentication
ssd firmware
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311204482.8A
Other languages
Chinese (zh)
Inventor
卢海涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ziguang Computer Technology Co Ltd
Original Assignee
Ziguang Computer Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ziguang Computer Technology Co Ltd filed Critical Ziguang Computer Technology Co Ltd
Priority to CN202311204482.8A priority Critical patent/CN117171822A/en
Publication of CN117171822A publication Critical patent/CN117171822A/en
Pending legal-status Critical Current

Links

Landscapes

  • Stored Programmes (AREA)

Abstract

The invention relates to the technical field of information security, and discloses a hiding method of an operation subsystem, which relates to auxiliary authentication equipment Ukey and safe ssd firmware, wherein the Ukey hides and displays a system where an encrypted partition is located through a driver safe A in an operation system, the safe A, the safe ssd firmware and the Ukey are subjected to safety verification after the Ukey is inserted, the data in the safe ssd firmware is verified and accessed, a guide file, a configuration file and other key information of the subsystem are configured into a configuration item of a guide manager when the partition is in a decryption state, a computer is restarted to see a subsystem selection interface, the guide file, the configuration file and other key information are deleted based on a preset operation ending triggering condition after related operation is carried out by entering the subsystem, the Ukey is pulled out, and the computer subsystem is restarted to be hidden and invisible. The invention realizes the encryption partition display and hiding by plugging the Ukey, and has simple and convenient use and high safety.

Description

Hiding method of operation subsystem
Technical Field
The present invention relates to the field of information security technologies, and in particular, to a method, an apparatus, a device, and a medium for hiding an operation subsystem.
Background
The operating system is a piece of software in a computer system. The system is a set of program modules with specific functions, can effectively manage software and hardware resources, reasonably organize workflow, provide services for users, enable the users to conveniently use the computer, and enable the whole computer system to operate efficiently. A computer can be provided with a plurality of operating systems or subsystems simultaneously, and the computer can be provided with a primary subsystem and a secondary subsystem or can be provided with a default starting system before, so that a user can set the default starting operating system according to own needs. The current subsystem is used as a partition in the operating system, and any file is visible to the operating system; because of the visibility of the subsystem, the security of the subsystem is poor, and the work of the subsystem which needs to be operated cannot be effectively kept secret.
Disclosure of Invention
In view of this, the present invention provides a hiding method for operating a subsystem, which can realize hiding, inaccessible and high security of the subsystem, so as to solve the disadvantages of poor security and incapability of effectively keeping secret the operation of the subsystem in the prior art.
The invention provides a hiding method of an operation subsystem, which relates to auxiliary authentication equipment Ukey and security ssd firmware, and comprises the following steps:
installing a driver safe A in an operating system A, wherein the driver safe A is used for interacting with the auxiliary authentication equipment Ukey and the security ssd firmware;
creating an encryption partition in an operating system A through a pre-installed UI interface program safe C, generating a first key when the encryption partition is created, and performing security verification between an auxiliary authentication device Ukey and a security ssd firmware through a driver safe A and the first key when the auxiliary authentication device Ukey is inserted into computer equipment, and accessing data stored in the security ssd firmware after the verification is passed;
when the encryption partition is in a decryption state, a subsystem B is installed in the encryption partition, after the installation of the subsystem B is completed, auxiliary authentication equipment Ukey is pulled out, and a driver safe A copies a guide file, a configuration file and other key information related to the subsystem from a guide loading program to the position of the guide file in the guide loading program;
when the Ukey of the auxiliary authentication equipment is pulled out, the partition where the subsystem B is located is automatically hidden, the driver safe A deletes the guide file corresponding to the subsystem B and key information required by other subsystems for starting, and the computer automatically enters a default operating system A when being started;
after the auxiliary authentication equipment Ukey is inserted, the driver safe A automatically unlocks the encryption partition, displays the encryption partition, and automatically copies a guide file, a configuration file and other key information of a system B in the encryption partition to a position where the guide file is located in the guide loader;
when the auxiliary authentication equipment Ukey exists, after restarting the computer, when the computer is started, the boot loader starts a system boot interface to generate two systems, namely a system A and a system B, and a user selects an entered system according to the needs;
the user selects to enter the subsystem B and performs related operation of the subsystem B, based on a preset operation ending triggering condition, the guide file, the configuration file and other key information of the current system B are deleted through a pre-installed program safe B in the subsystem B, the auxiliary authentication equipment Ukey is pulled out, the computer is restarted, and the subsystem B is automatically hidden and invisible.
According to the hiding method of the operation subsystem, the encrypted partition display and hiding can be achieved through plugging the Ukey, the use is simple and convenient, the automatic identification and automatic display of the subsystem are achieved through interaction of the driver safe A and the Ukey with the safety SSD firmware, and when the Ukey does not exist, the subsystem is invisible and the safety is high.
In an alternative embodiment, the process of performing security verification between the auxiliary authentication device Ukey and the secure ssd firmware through the driver safeA and the first key, and accessing the data stored in the secure ssd firmware after the verification is passed includes:
when the auxiliary authentication device Ukey is inserted into the computer device, the driver safe A requests the auxiliary authentication device Ukey to verify the identity;
the auxiliary authentication equipment Ukey sends a verification request to the security ssd firmware, the security ssd firmware calculates a challenge value according to a preset challenge algorithm, the challenge value is sent to the auxiliary authentication equipment Ukey, and the auxiliary authentication equipment Ukey calculates a response value according to the challenge value and the preset challenge algorithm;
the auxiliary authentication equipment Ukey calculates a first key value according to the key verification information through a first preset algorithm, and sends the response value and the first key value to the secure ssd firmware;
the security ssd firmware calculates a first verification value according to a preset challenge algorithm and a challenge value based on the received response value and the first key value, and calculates a second verification value according to the first preset algorithm; and comparing the first verification value with the response value, comparing the second verification value with the key verification information stored before, and accessing the data stored in the secure ssd firmware when the comparison results of the first verification value and the response value are consistent.
According to the embodiment of the invention, when the auxiliary authentication device Ukey is inserted into the computer device, the auxiliary authentication device Ukey and the security ssd firmware are subjected to data interaction to perform security verification by adopting a plurality of corresponding algorithms, so that the operation security is ensured.
In an alternative embodiment, the method further comprises: and when the auxiliary authentication equipment Ukey and the secure ssd firmware are used for data transmission, the communication data between the auxiliary authentication equipment Ukey and the secure ssd firmware are encrypted and decrypted by using a second preset algorithm.
In an alternative embodiment, the first preset algorithm and the second preset algorithm are the same or different, and include: logic computation, random number computation, encryption computation, decryption computation, signature verification computation, hash computation message authentication code HMAC computation, key derivation computation, or a combination of several algorithms.
In an alternative embodiment, the process of calculating the challenge value by the secure ssd firmware according to the preset challenge algorithm includes: the secure ssd firmware uses random numbers generated by a random number generator, or any information value generated by a non-replicable function technique.
When the data transmission is carried out between the authentication equipment Ukey and the secure ssd firmware, the embodiment of the invention further improves the security of the data by encrypting and decrypting each piece of interactive data.
In an alternative embodiment, the secure ssd firmware is a hardware-level encryption and decryption module chip supporting the cryptographic SM4 algorithm.
The security ssd firmware in the embodiment of the invention is a hardware-level encryption and decryption module chip supporting the SM4 cryptographic algorithm, and has high security level.
In an alternative embodiment, the bootloader includes: boot manager of Windows system, GRUB or LILO of Linux system.
The embodiment of the invention adaptively selects the boot loader according to different specific operating systems.
In an alternative implementation manner, when the security verification between the auxiliary authentication device Ukey and the secure ssd firmware is not passed, the data in the secure ssd firmware is not decrypted, and the encrypted partition is not displayed.
According to the embodiment of the invention, only when the security verification is passed between the auxiliary authentication device Ukey and the security ssd firmware, the data in the security ssd firmware can be read, the encryption partition is displayed, and the security of the encryption partition is ensured.
In an alternative embodiment, the preset operation end triggering condition includes: the trigger operation end instruction button or the auxiliary authentication device Ukey is pulled out.
The embodiment of the invention can lead the computer to timely identify the current user to exit the subsystem by setting different operation ending triggering conditions, thereby ensuring the safety of the data operation of the subsystem.
In an alternative embodiment, after the step of automatically hiding the invisible sub-system B, the extracting the auxiliary authentication device Ukey will restart the computer, the method further comprises:
if the sub-system B is started next time, after the auxiliary authentication equipment Ukey is inserted and the related setting of the system B is set by using the program safe B, the process of carrying out safety verification between the auxiliary authentication equipment Ukey and the safety ssd firmware through the driver safe A and the first secret key and accessing the data stored in the safety ssd firmware after the verification is passed is repeated.
According to the embodiment of the invention, the security verification process is needed every time the user wants to enter the subsystem of the encryption partition, so that the security of the encryption partition data is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are needed in the description of the embodiments or the prior art will be briefly described, and it is obvious that the drawings in the description below are some embodiments of the present invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow diagram of an example of a hiding method of operating a subsystem according to an embodiment of the present invention;
fig. 2 is a flow chart of a security verification process between the auxiliary authentication device Ukey and the security ssd firmware provided in the embodiment of the present invention;
fig. 3 is a flow diagram of another example of a hiding method of operating a subsystem according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In this embodiment, a method for hiding an operation subsystem is provided, where an auxiliary authentication device (abbreviated as Ukey) based on an intelligent cryptographic key, a secure ssd firmware, a driver safe a and a UI interface safe c are used for interacting with a user, such as first opening an encryption partition, closing the encryption partition, resetting a key, and the like, where the operation of the driver safe a is triggered by the operation system; the Ukey can hide and display the system where the partition is located through the driver safe A, after the Ukey is inserted, the driver safe A, the safe ssd firmware and the Ukey perform data interaction to perform safety verification, after the verification is passed, the driver safe A automatically completes decryption and encryption of the partition, the encryption partition is displayed, a subsystem guide file, partition information where the subsystem is located and a starting file path are configured into a configuration item of a guide manager, a computer is restarted, a subsystem selection interface can be seen, and therefore the subsystem is accessed.
FIG. 1 is a flow chart of a hiding method of operating a subsystem according to an embodiment of the present invention, as shown in FIG. 1, the flow including the steps of:
step S1, a driver safe A is installed in an operating system A, wherein the driver safe A is used for interacting with a Ukey and a secure ssd firmware of the auxiliary authentication device.
The security ssd (Solid State Disk or Solid State Drive, solid State Disk) firmware in the embodiment of the invention is a hardware-level encryption and decryption module chip supporting the SM4 cryptographic algorithm, and the security level is high; the auxiliary authentication device Ukey is an intelligent password key similar to a usb disk, and is only used as an example and not limited to the example.
Step S2, an encryption partition is created in the operating system A through a pre-installed UI (user interface) program safe C, a first key is generated when the encryption partition is created, when the auxiliary authentication device Ukey is inserted into the computer device, safety verification is conducted between the auxiliary authentication device Ukey and the safety ssd firmware through the driver safe A and the first key, and data stored in the safety ssd firmware are accessed after verification is passed.
The first key, that is, the key for encrypting and decrypting the secure SSD firmware in the embodiment of the invention, may be generated by a storage device such as the secure SSD firmware, or may be generated by a Ukey authentication device, or may be generated by another third party key management device, which is not specifically limited herein.
And S3, when the encryption partition is in a decryption state, installing a subsystem B in the encryption partition, pulling out an auxiliary authentication device Ukey after the installation of the subsystem B is completed, and copying a boot file, a configuration file and other key information related to the subsystem from the boot loader by the driver safe A to the position of the boot file in the boot loader.
In the embodiment of the invention, the driver safe A stores the system boot file, the starting configuration file and the partition information of the subsystem from a boot manager (Windows Boot Manager or UEFI partition) or a GRUB (generally GRand Unified Bootloader) or LILO (Linux Loader) to the secure encryption partition. In practical application, the boot loader is adaptively selected according to different specific operating systems.
And S4, when the auxiliary authentication equipment Ukey is pulled out, the partition where the subsystem B is located is automatically hidden, the safe A deletes the guide file corresponding to the subsystem B and other key information required by starting the subsystem, and the computer automatically enters a default operating system A when being started.
In practical applications, under normal conditions, the information such as the boot file, the start configuration file, the partition where the subsystem is located, and the like is stored in the boot loader, and the subsystem B cannot be booted only after the information is removed from the default position.
And S5, after the auxiliary authentication equipment Ukey is inserted, the driver safe A automatically unlocks the encryption partition, displays the encryption partition, and automatically copies the boot file, the configuration file and other key information of the system B in the encryption partition to the position of the boot file in the boot loader.
In the embodiment of the invention, after Ukey is inserted into computer equipment through usb-c, usb and other interfaces, the driver safe A automatically unlocks the encryption partition and displays the encryption partition based on the previous process of creating the encryption partition and security verification.
Step S6, when the auxiliary authentication equipment Ukey exists, after restarting the computer, when the computer is started, the boot loader starts a system boot interface to generate two systems of a system A and a system B, and a user selects an entered system according to the needs;
step S7, the user selects to enter the subsystem B and performs related operation of the subsystem B, the guide file, the configuration file and other key information of the current system B are deleted through a pre-installed program safe B in the subsystem B based on a preset operation ending triggering condition, the auxiliary authentication equipment Ukey is pulled out, the computer is restarted, and the subsystem B is automatically hidden from view.
Other key information in the embodiment of the invention includes partition information, a startup file path and the like. The preset operation ending triggering condition comprises the following steps: the triggering operation end indication button or the auxiliary authentication device Ukey is pulled out, and the triggering operation end indication button can be that a closing button is arranged on an operation interface and used for clicking the closing button after the corresponding operation is finished in the system B by a user to indicate that the system B is to be exited.
The hiding method of the operation subsystem provided by the embodiment of the invention can realize the encryption partition display and hiding through plugging the Ukey, is simple and convenient to use, realizes automatic identification through interaction of the driver safe A and the Ukey with the safety SSD firmware, and automatically displays the subsystem, and when the Ukey does not exist, the subsystem is invisible and has high safety.
In a specific embodiment, as shown in fig. 2, in step S2, security verification is performed between the auxiliary authentication device Ukey and the secure ssd firmware by the driver safeA and the first key, and after the verification is passed, a process of accessing data stored in the secure ssd firmware includes:
step S21: when the auxiliary authentication device Ukey is inserted into the computer device, the driver safe A requests the auxiliary authentication device Ukey to verify the identity;
step S22: the auxiliary authentication equipment Ukey sends a verification request to the security ssd firmware, the security ssd firmware calculates a challenge value according to a preset challenge algorithm, the challenge value is sent to the auxiliary authentication equipment Ukey, and the auxiliary authentication equipment Ukey calculates a response value according to the challenge value and the preset challenge algorithm;
step S23: the auxiliary authentication equipment Ukey calculates a first key value according to the key verification information through a first preset algorithm, and sends the response value and the first key value to the secure ssd firmware;
step S24: the security ssd firmware calculates a first verification value according to a preset challenge algorithm and a challenge value based on the received response value and the first key value, and calculates a second verification value according to the first preset algorithm; and comparing the first verification value with the response value, comparing the second verification value with the key verification information stored before, and accessing the data stored in the secure ssd firmware when the comparison results of the first verification value and the response value are consistent. If any comparison is not passed, the data in the secure SSD firmware is not decrypted and the encrypted partition is not displayed.
In an embodiment, when data transmission is performed between the auxiliary authentication device Ukey and the secure ssd firmware, the communication data between the auxiliary authentication device Ukey and the secure ssd firmware is encrypted and decrypted by using a second preset algorithm. The first preset algorithm and the second preset algorithm in the embodiment of the invention are the same or different, and comprise: logic computation, random number computation, encryption computation, decryption computation, signature verification computation, hash computation message authentication code HMAC computation, key derivation computation, i.e. one or more combinations of the above algorithms are adopted according to requirements.
In one embodiment, the process of calculating the challenge value by the secure ssd firmware according to the preset challenge algorithm includes: the secure ssd firmware uses random numbers generated by a random number generator, or any information value generated by a uncloneable function (PUF) technique, as examples only, and not as limitations.
According to the embodiment of the invention, when the auxiliary authentication device Ukey is inserted into the computer device, the auxiliary authentication device Ukey and the security ssd firmware are subjected to data interaction to perform security verification by adopting a plurality of corresponding algorithms, so that the operation security is ensured. And when data transmission is carried out between the auxiliary authentication equipment Ukey and the secure ssd firmware, each piece of interactive data is encrypted and decrypted, so that the security of the data is further improved.
In an alternative embodiment, as shown in fig. 3, the hiding method of the operating subsystem further includes:
step S8, if the subsystem B is started next time, after the auxiliary authentication equipment Ukey is inserted and the related guide setting of the system B is set by using the program safe B, the process of carrying out safety verification between the auxiliary authentication equipment Ukey and the safety ssd firmware through the driver safe A and the first secret key and accessing the data stored in the safety ssd firmware after the verification is passed is repeated.
According to the embodiment of the invention, the security verification process is needed every time the user wants to enter the subsystem of the encryption partition, so that the security of the encryption partition data is ensured.
Although embodiments of the present invention have been described in connection with the accompanying drawings, various modifications and variations may be made by those skilled in the art without departing from the spirit and scope of the invention, and such modifications and variations fall within the scope of the invention as defined by the appended claims.

Claims (10)

1. A method of hiding an operating subsystem, the method involving a secondary authentication device Ukey and secure ssd firmware, the method comprising:
installing a driver safe A in an operating system A, wherein the driver safe A is used for interacting with the auxiliary authentication equipment Ukey and the security ssd firmware;
creating an encryption partition in an operating system A through a pre-installed UI interface program safe C, generating a first key when the encryption partition is created, and performing security verification between an auxiliary authentication device Ukey and a security ssd firmware through a driver safe A and the first key when the auxiliary authentication device Ukey is inserted into computer equipment, and accessing data stored in the security ssd firmware after the verification is passed;
when the encryption partition is in a decryption state, a subsystem B is installed in the encryption partition, after the installation of the subsystem B is completed, auxiliary authentication equipment Ukey is pulled out, and a driver safe A copies a guide file, a configuration file and other key information related to the subsystem from a guide loading program to the position of the guide file in the guide loading program;
when the Ukey of the auxiliary authentication equipment is pulled out, the partition where the subsystem B is located is automatically hidden, the driver safe A deletes the guide file corresponding to the subsystem B and key information required by other subsystems for starting, and the computer automatically enters a default operating system A when being started;
after the auxiliary authentication equipment Ukey is inserted, the driver safe A automatically unlocks the encryption partition, displays the encryption partition, and automatically copies a guide file, a configuration file and other key information of a system B in the encryption partition to a position where the guide file is located in the guide loader;
when the auxiliary authentication equipment Ukey exists, after restarting the computer, when the computer is started, the boot loader starts a system boot interface to generate two systems, namely a system A and a system B, and a user selects an entered system according to the needs;
the user selects to enter the subsystem B and performs related operation of the subsystem B, based on a preset operation ending triggering condition, the guide file, the configuration file and other key information of the current system B are deleted through a pre-installed program safe B in the subsystem B, the auxiliary authentication equipment Ukey is pulled out, the computer is restarted, and the subsystem B is automatically hidden and invisible.
2. The method of claim 1, wherein the process of performing security verification between the auxiliary authentication device Ukey and the secure ssd firmware by the driver safeA and the first key, and accessing the data stored in the secure ssd firmware after the verification is passed, comprises:
when the auxiliary authentication device Ukey is inserted into the computer device, the driver safe A requests the auxiliary authentication device Ukey to verify the identity;
the auxiliary authentication equipment Ukey sends a verification request to the security ssd firmware, the security ssd firmware calculates a challenge value according to a preset challenge algorithm, the challenge value is sent to the auxiliary authentication equipment Ukey, and the auxiliary authentication equipment Ukey calculates a response value according to the challenge value and the preset challenge algorithm;
the auxiliary authentication equipment Ukey calculates a first key value according to the key verification information through a first preset algorithm, and sends the response value and the first key value to the secure ssd firmware;
the security ssd firmware calculates a first verification value according to a preset challenge algorithm and a challenge value based on the received response value and the first key value, and calculates a second verification value according to the first preset algorithm; and comparing the first verification value with the response value, comparing the second verification value with the key verification information stored before, and accessing the data stored in the secure ssd firmware when the comparison results of the first verification value and the response value are consistent.
3. The method as recited in claim 2, further comprising: and when the auxiliary authentication equipment Ukey and the secure ssd firmware are used for data transmission, the communication data between the auxiliary authentication equipment Ukey and the secure ssd firmware are encrypted and decrypted by using a second preset algorithm.
4. A method according to claim 3, wherein the first and second preset algorithms are the same or different, comprising: logic computation, random number computation, encryption computation, decryption computation, signature verification computation, hash computation message authentication code HMAC computation, key derivation computation, or a combination of several algorithms.
5. The method of claim 2, wherein the process of the secure ssd firmware calculating the challenge value according to a preset challenge algorithm comprises: the secure ssd firmware uses random numbers generated by a random number generator, or any information value generated by a non-replicable function technique.
6. The method of claim 1, wherein the secure ssd firmware is a hardware-level encryption and decryption module chip supporting a cryptographic SM4 algorithm.
7. The method of claim 1, wherein the bootloader comprises: boot manager of Windows system, GRUB or LILO of Linux system.
8. The method of claim 1, wherein when the security verification between the auxiliary authentication device Ukey and the secure ssd firmware is not passed, the data in the secure ssd firmware is not decrypted and the encrypted partition is not displayed.
9. The method according to claim 1, wherein the preset operation end triggering condition includes: the trigger operation end instruction button or the auxiliary authentication device Ukey is pulled out.
10. The method according to any one of claims 1-9, wherein after the step of extracting the auxiliary authentication device Ukey to restart the computer and automatically hiding the sub-system B from view, further comprising:
if the sub-system B is started next time, after the auxiliary authentication equipment Ukey is inserted and the related setting of the system B is set by using the program safe B, the process of carrying out safety verification between the auxiliary authentication equipment Ukey and the safety ssd firmware through the driver safe A and the first secret key and accessing the data stored in the safety ssd firmware after the verification is passed is repeated.
CN202311204482.8A 2023-09-14 2023-09-14 Hiding method of operation subsystem Pending CN117171822A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311204482.8A CN117171822A (en) 2023-09-14 2023-09-14 Hiding method of operation subsystem

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311204482.8A CN117171822A (en) 2023-09-14 2023-09-14 Hiding method of operation subsystem

Publications (1)

Publication Number Publication Date
CN117171822A true CN117171822A (en) 2023-12-05

Family

ID=88946556

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311204482.8A Pending CN117171822A (en) 2023-09-14 2023-09-14 Hiding method of operation subsystem

Country Status (1)

Country Link
CN (1) CN117171822A (en)

Similar Documents

Publication Publication Date Title
WO2020192406A1 (en) Method and apparatus for data storage and verification
CN102449631B (en) For performing the system and method for bookkeeping
CN101246529A (en) System and method of storage device data encryption and data access via a hardware key
US10162565B2 (en) Data erasure of a target device
CN108335105B (en) Data processing method and related equipment
CN101246455A (en) System and method of storage device data encryption and data access
WO2013107362A1 (en) Method and system for protecting data
WO2018205456A1 (en) Password input method, computer device, and storage medium
CN110334531B (en) Virtual machine key management method, master node, system, storage medium and device
CN111614698A (en) Method and device for erasing terminal data
US10686596B2 (en) Mutually authenticated adaptive management interfaces for interaction with sensitive infrastructure
CN115129332A (en) Firmware burning method, computer equipment and readable storage medium
CN113055157B (en) Biological characteristic verification method and device, storage medium and electronic equipment
US9210134B2 (en) Cryptographic processing method and system using a sensitive data item
US20220393869A1 (en) Recovery keys
US8732456B2 (en) Enterprise environment disk encryption
JP2023542099A (en) Wireless terminal and interface access authentication method in Uboot mode of wireless terminal
CN110807186B (en) Method, device, equipment and storage medium for safe storage of storage equipment
CN109033812B (en) Device and method for controlling UKEY to log in multi-partition operating system through UEFI
CN110674525A (en) Electronic equipment and file processing method thereof
Loftus et al. Android 7 file based encryption and the attacks against it
CN112966276B (en) Method, device and medium for safely starting computer
CN108319848B (en) Starting-up control method and device
CN117171822A (en) Hiding method of operation subsystem
CN110851881A (en) Security detection method and device for terminal equipment, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination