CN117171822A - Hiding method of operation subsystem - Google Patents
Hiding method of operation subsystem Download PDFInfo
- Publication number
- CN117171822A CN117171822A CN202311204482.8A CN202311204482A CN117171822A CN 117171822 A CN117171822 A CN 117171822A CN 202311204482 A CN202311204482 A CN 202311204482A CN 117171822 A CN117171822 A CN 117171822A
- Authority
- CN
- China
- Prior art keywords
- ukey
- subsystem
- auxiliary authentication
- ssd firmware
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000012795 verification Methods 0.000 claims abstract description 57
- 238000005192 partition Methods 0.000 claims abstract description 53
- 230000004044 response Effects 0.000 claims description 15
- 230000008569 process Effects 0.000 claims description 13
- 230000005540 biological transmission Effects 0.000 claims description 5
- 238000004891 communication Methods 0.000 claims description 3
- 238000009795 derivation Methods 0.000 claims description 3
- 238000009434 installation Methods 0.000 claims description 3
- 230000003993 interaction Effects 0.000 description 5
- 239000007787 solid Substances 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Landscapes
- Stored Programmes (AREA)
Abstract
The invention relates to the technical field of information security, and discloses a hiding method of an operation subsystem, which relates to auxiliary authentication equipment Ukey and safe ssd firmware, wherein the Ukey hides and displays a system where an encrypted partition is located through a driver safe A in an operation system, the safe A, the safe ssd firmware and the Ukey are subjected to safety verification after the Ukey is inserted, the data in the safe ssd firmware is verified and accessed, a guide file, a configuration file and other key information of the subsystem are configured into a configuration item of a guide manager when the partition is in a decryption state, a computer is restarted to see a subsystem selection interface, the guide file, the configuration file and other key information are deleted based on a preset operation ending triggering condition after related operation is carried out by entering the subsystem, the Ukey is pulled out, and the computer subsystem is restarted to be hidden and invisible. The invention realizes the encryption partition display and hiding by plugging the Ukey, and has simple and convenient use and high safety.
Description
Technical Field
The present invention relates to the field of information security technologies, and in particular, to a method, an apparatus, a device, and a medium for hiding an operation subsystem.
Background
The operating system is a piece of software in a computer system. The system is a set of program modules with specific functions, can effectively manage software and hardware resources, reasonably organize workflow, provide services for users, enable the users to conveniently use the computer, and enable the whole computer system to operate efficiently. A computer can be provided with a plurality of operating systems or subsystems simultaneously, and the computer can be provided with a primary subsystem and a secondary subsystem or can be provided with a default starting system before, so that a user can set the default starting operating system according to own needs. The current subsystem is used as a partition in the operating system, and any file is visible to the operating system; because of the visibility of the subsystem, the security of the subsystem is poor, and the work of the subsystem which needs to be operated cannot be effectively kept secret.
Disclosure of Invention
In view of this, the present invention provides a hiding method for operating a subsystem, which can realize hiding, inaccessible and high security of the subsystem, so as to solve the disadvantages of poor security and incapability of effectively keeping secret the operation of the subsystem in the prior art.
The invention provides a hiding method of an operation subsystem, which relates to auxiliary authentication equipment Ukey and security ssd firmware, and comprises the following steps:
installing a driver safe A in an operating system A, wherein the driver safe A is used for interacting with the auxiliary authentication equipment Ukey and the security ssd firmware;
creating an encryption partition in an operating system A through a pre-installed UI interface program safe C, generating a first key when the encryption partition is created, and performing security verification between an auxiliary authentication device Ukey and a security ssd firmware through a driver safe A and the first key when the auxiliary authentication device Ukey is inserted into computer equipment, and accessing data stored in the security ssd firmware after the verification is passed;
when the encryption partition is in a decryption state, a subsystem B is installed in the encryption partition, after the installation of the subsystem B is completed, auxiliary authentication equipment Ukey is pulled out, and a driver safe A copies a guide file, a configuration file and other key information related to the subsystem from a guide loading program to the position of the guide file in the guide loading program;
when the Ukey of the auxiliary authentication equipment is pulled out, the partition where the subsystem B is located is automatically hidden, the driver safe A deletes the guide file corresponding to the subsystem B and key information required by other subsystems for starting, and the computer automatically enters a default operating system A when being started;
after the auxiliary authentication equipment Ukey is inserted, the driver safe A automatically unlocks the encryption partition, displays the encryption partition, and automatically copies a guide file, a configuration file and other key information of a system B in the encryption partition to a position where the guide file is located in the guide loader;
when the auxiliary authentication equipment Ukey exists, after restarting the computer, when the computer is started, the boot loader starts a system boot interface to generate two systems, namely a system A and a system B, and a user selects an entered system according to the needs;
the user selects to enter the subsystem B and performs related operation of the subsystem B, based on a preset operation ending triggering condition, the guide file, the configuration file and other key information of the current system B are deleted through a pre-installed program safe B in the subsystem B, the auxiliary authentication equipment Ukey is pulled out, the computer is restarted, and the subsystem B is automatically hidden and invisible.
According to the hiding method of the operation subsystem, the encrypted partition display and hiding can be achieved through plugging the Ukey, the use is simple and convenient, the automatic identification and automatic display of the subsystem are achieved through interaction of the driver safe A and the Ukey with the safety SSD firmware, and when the Ukey does not exist, the subsystem is invisible and the safety is high.
In an alternative embodiment, the process of performing security verification between the auxiliary authentication device Ukey and the secure ssd firmware through the driver safeA and the first key, and accessing the data stored in the secure ssd firmware after the verification is passed includes:
when the auxiliary authentication device Ukey is inserted into the computer device, the driver safe A requests the auxiliary authentication device Ukey to verify the identity;
the auxiliary authentication equipment Ukey sends a verification request to the security ssd firmware, the security ssd firmware calculates a challenge value according to a preset challenge algorithm, the challenge value is sent to the auxiliary authentication equipment Ukey, and the auxiliary authentication equipment Ukey calculates a response value according to the challenge value and the preset challenge algorithm;
the auxiliary authentication equipment Ukey calculates a first key value according to the key verification information through a first preset algorithm, and sends the response value and the first key value to the secure ssd firmware;
the security ssd firmware calculates a first verification value according to a preset challenge algorithm and a challenge value based on the received response value and the first key value, and calculates a second verification value according to the first preset algorithm; and comparing the first verification value with the response value, comparing the second verification value with the key verification information stored before, and accessing the data stored in the secure ssd firmware when the comparison results of the first verification value and the response value are consistent.
According to the embodiment of the invention, when the auxiliary authentication device Ukey is inserted into the computer device, the auxiliary authentication device Ukey and the security ssd firmware are subjected to data interaction to perform security verification by adopting a plurality of corresponding algorithms, so that the operation security is ensured.
In an alternative embodiment, the method further comprises: and when the auxiliary authentication equipment Ukey and the secure ssd firmware are used for data transmission, the communication data between the auxiliary authentication equipment Ukey and the secure ssd firmware are encrypted and decrypted by using a second preset algorithm.
In an alternative embodiment, the first preset algorithm and the second preset algorithm are the same or different, and include: logic computation, random number computation, encryption computation, decryption computation, signature verification computation, hash computation message authentication code HMAC computation, key derivation computation, or a combination of several algorithms.
In an alternative embodiment, the process of calculating the challenge value by the secure ssd firmware according to the preset challenge algorithm includes: the secure ssd firmware uses random numbers generated by a random number generator, or any information value generated by a non-replicable function technique.
When the data transmission is carried out between the authentication equipment Ukey and the secure ssd firmware, the embodiment of the invention further improves the security of the data by encrypting and decrypting each piece of interactive data.
In an alternative embodiment, the secure ssd firmware is a hardware-level encryption and decryption module chip supporting the cryptographic SM4 algorithm.
The security ssd firmware in the embodiment of the invention is a hardware-level encryption and decryption module chip supporting the SM4 cryptographic algorithm, and has high security level.
In an alternative embodiment, the bootloader includes: boot manager of Windows system, GRUB or LILO of Linux system.
The embodiment of the invention adaptively selects the boot loader according to different specific operating systems.
In an alternative implementation manner, when the security verification between the auxiliary authentication device Ukey and the secure ssd firmware is not passed, the data in the secure ssd firmware is not decrypted, and the encrypted partition is not displayed.
According to the embodiment of the invention, only when the security verification is passed between the auxiliary authentication device Ukey and the security ssd firmware, the data in the security ssd firmware can be read, the encryption partition is displayed, and the security of the encryption partition is ensured.
In an alternative embodiment, the preset operation end triggering condition includes: the trigger operation end instruction button or the auxiliary authentication device Ukey is pulled out.
The embodiment of the invention can lead the computer to timely identify the current user to exit the subsystem by setting different operation ending triggering conditions, thereby ensuring the safety of the data operation of the subsystem.
In an alternative embodiment, after the step of automatically hiding the invisible sub-system B, the extracting the auxiliary authentication device Ukey will restart the computer, the method further comprises:
if the sub-system B is started next time, after the auxiliary authentication equipment Ukey is inserted and the related setting of the system B is set by using the program safe B, the process of carrying out safety verification between the auxiliary authentication equipment Ukey and the safety ssd firmware through the driver safe A and the first secret key and accessing the data stored in the safety ssd firmware after the verification is passed is repeated.
According to the embodiment of the invention, the security verification process is needed every time the user wants to enter the subsystem of the encryption partition, so that the security of the encryption partition data is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are needed in the description of the embodiments or the prior art will be briefly described, and it is obvious that the drawings in the description below are some embodiments of the present invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow diagram of an example of a hiding method of operating a subsystem according to an embodiment of the present invention;
fig. 2 is a flow chart of a security verification process between the auxiliary authentication device Ukey and the security ssd firmware provided in the embodiment of the present invention;
fig. 3 is a flow diagram of another example of a hiding method of operating a subsystem according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In this embodiment, a method for hiding an operation subsystem is provided, where an auxiliary authentication device (abbreviated as Ukey) based on an intelligent cryptographic key, a secure ssd firmware, a driver safe a and a UI interface safe c are used for interacting with a user, such as first opening an encryption partition, closing the encryption partition, resetting a key, and the like, where the operation of the driver safe a is triggered by the operation system; the Ukey can hide and display the system where the partition is located through the driver safe A, after the Ukey is inserted, the driver safe A, the safe ssd firmware and the Ukey perform data interaction to perform safety verification, after the verification is passed, the driver safe A automatically completes decryption and encryption of the partition, the encryption partition is displayed, a subsystem guide file, partition information where the subsystem is located and a starting file path are configured into a configuration item of a guide manager, a computer is restarted, a subsystem selection interface can be seen, and therefore the subsystem is accessed.
FIG. 1 is a flow chart of a hiding method of operating a subsystem according to an embodiment of the present invention, as shown in FIG. 1, the flow including the steps of:
step S1, a driver safe A is installed in an operating system A, wherein the driver safe A is used for interacting with a Ukey and a secure ssd firmware of the auxiliary authentication device.
The security ssd (Solid State Disk or Solid State Drive, solid State Disk) firmware in the embodiment of the invention is a hardware-level encryption and decryption module chip supporting the SM4 cryptographic algorithm, and the security level is high; the auxiliary authentication device Ukey is an intelligent password key similar to a usb disk, and is only used as an example and not limited to the example.
Step S2, an encryption partition is created in the operating system A through a pre-installed UI (user interface) program safe C, a first key is generated when the encryption partition is created, when the auxiliary authentication device Ukey is inserted into the computer device, safety verification is conducted between the auxiliary authentication device Ukey and the safety ssd firmware through the driver safe A and the first key, and data stored in the safety ssd firmware are accessed after verification is passed.
The first key, that is, the key for encrypting and decrypting the secure SSD firmware in the embodiment of the invention, may be generated by a storage device such as the secure SSD firmware, or may be generated by a Ukey authentication device, or may be generated by another third party key management device, which is not specifically limited herein.
And S3, when the encryption partition is in a decryption state, installing a subsystem B in the encryption partition, pulling out an auxiliary authentication device Ukey after the installation of the subsystem B is completed, and copying a boot file, a configuration file and other key information related to the subsystem from the boot loader by the driver safe A to the position of the boot file in the boot loader.
In the embodiment of the invention, the driver safe A stores the system boot file, the starting configuration file and the partition information of the subsystem from a boot manager (Windows Boot Manager or UEFI partition) or a GRUB (generally GRand Unified Bootloader) or LILO (Linux Loader) to the secure encryption partition. In practical application, the boot loader is adaptively selected according to different specific operating systems.
And S4, when the auxiliary authentication equipment Ukey is pulled out, the partition where the subsystem B is located is automatically hidden, the safe A deletes the guide file corresponding to the subsystem B and other key information required by starting the subsystem, and the computer automatically enters a default operating system A when being started.
In practical applications, under normal conditions, the information such as the boot file, the start configuration file, the partition where the subsystem is located, and the like is stored in the boot loader, and the subsystem B cannot be booted only after the information is removed from the default position.
And S5, after the auxiliary authentication equipment Ukey is inserted, the driver safe A automatically unlocks the encryption partition, displays the encryption partition, and automatically copies the boot file, the configuration file and other key information of the system B in the encryption partition to the position of the boot file in the boot loader.
In the embodiment of the invention, after Ukey is inserted into computer equipment through usb-c, usb and other interfaces, the driver safe A automatically unlocks the encryption partition and displays the encryption partition based on the previous process of creating the encryption partition and security verification.
Step S6, when the auxiliary authentication equipment Ukey exists, after restarting the computer, when the computer is started, the boot loader starts a system boot interface to generate two systems of a system A and a system B, and a user selects an entered system according to the needs;
step S7, the user selects to enter the subsystem B and performs related operation of the subsystem B, the guide file, the configuration file and other key information of the current system B are deleted through a pre-installed program safe B in the subsystem B based on a preset operation ending triggering condition, the auxiliary authentication equipment Ukey is pulled out, the computer is restarted, and the subsystem B is automatically hidden from view.
Other key information in the embodiment of the invention includes partition information, a startup file path and the like. The preset operation ending triggering condition comprises the following steps: the triggering operation end indication button or the auxiliary authentication device Ukey is pulled out, and the triggering operation end indication button can be that a closing button is arranged on an operation interface and used for clicking the closing button after the corresponding operation is finished in the system B by a user to indicate that the system B is to be exited.
The hiding method of the operation subsystem provided by the embodiment of the invention can realize the encryption partition display and hiding through plugging the Ukey, is simple and convenient to use, realizes automatic identification through interaction of the driver safe A and the Ukey with the safety SSD firmware, and automatically displays the subsystem, and when the Ukey does not exist, the subsystem is invisible and has high safety.
In a specific embodiment, as shown in fig. 2, in step S2, security verification is performed between the auxiliary authentication device Ukey and the secure ssd firmware by the driver safeA and the first key, and after the verification is passed, a process of accessing data stored in the secure ssd firmware includes:
step S21: when the auxiliary authentication device Ukey is inserted into the computer device, the driver safe A requests the auxiliary authentication device Ukey to verify the identity;
step S22: the auxiliary authentication equipment Ukey sends a verification request to the security ssd firmware, the security ssd firmware calculates a challenge value according to a preset challenge algorithm, the challenge value is sent to the auxiliary authentication equipment Ukey, and the auxiliary authentication equipment Ukey calculates a response value according to the challenge value and the preset challenge algorithm;
step S23: the auxiliary authentication equipment Ukey calculates a first key value according to the key verification information through a first preset algorithm, and sends the response value and the first key value to the secure ssd firmware;
step S24: the security ssd firmware calculates a first verification value according to a preset challenge algorithm and a challenge value based on the received response value and the first key value, and calculates a second verification value according to the first preset algorithm; and comparing the first verification value with the response value, comparing the second verification value with the key verification information stored before, and accessing the data stored in the secure ssd firmware when the comparison results of the first verification value and the response value are consistent. If any comparison is not passed, the data in the secure SSD firmware is not decrypted and the encrypted partition is not displayed.
In an embodiment, when data transmission is performed between the auxiliary authentication device Ukey and the secure ssd firmware, the communication data between the auxiliary authentication device Ukey and the secure ssd firmware is encrypted and decrypted by using a second preset algorithm. The first preset algorithm and the second preset algorithm in the embodiment of the invention are the same or different, and comprise: logic computation, random number computation, encryption computation, decryption computation, signature verification computation, hash computation message authentication code HMAC computation, key derivation computation, i.e. one or more combinations of the above algorithms are adopted according to requirements.
In one embodiment, the process of calculating the challenge value by the secure ssd firmware according to the preset challenge algorithm includes: the secure ssd firmware uses random numbers generated by a random number generator, or any information value generated by a uncloneable function (PUF) technique, as examples only, and not as limitations.
According to the embodiment of the invention, when the auxiliary authentication device Ukey is inserted into the computer device, the auxiliary authentication device Ukey and the security ssd firmware are subjected to data interaction to perform security verification by adopting a plurality of corresponding algorithms, so that the operation security is ensured. And when data transmission is carried out between the auxiliary authentication equipment Ukey and the secure ssd firmware, each piece of interactive data is encrypted and decrypted, so that the security of the data is further improved.
In an alternative embodiment, as shown in fig. 3, the hiding method of the operating subsystem further includes:
step S8, if the subsystem B is started next time, after the auxiliary authentication equipment Ukey is inserted and the related guide setting of the system B is set by using the program safe B, the process of carrying out safety verification between the auxiliary authentication equipment Ukey and the safety ssd firmware through the driver safe A and the first secret key and accessing the data stored in the safety ssd firmware after the verification is passed is repeated.
According to the embodiment of the invention, the security verification process is needed every time the user wants to enter the subsystem of the encryption partition, so that the security of the encryption partition data is ensured.
Although embodiments of the present invention have been described in connection with the accompanying drawings, various modifications and variations may be made by those skilled in the art without departing from the spirit and scope of the invention, and such modifications and variations fall within the scope of the invention as defined by the appended claims.
Claims (10)
1. A method of hiding an operating subsystem, the method involving a secondary authentication device Ukey and secure ssd firmware, the method comprising:
installing a driver safe A in an operating system A, wherein the driver safe A is used for interacting with the auxiliary authentication equipment Ukey and the security ssd firmware;
creating an encryption partition in an operating system A through a pre-installed UI interface program safe C, generating a first key when the encryption partition is created, and performing security verification between an auxiliary authentication device Ukey and a security ssd firmware through a driver safe A and the first key when the auxiliary authentication device Ukey is inserted into computer equipment, and accessing data stored in the security ssd firmware after the verification is passed;
when the encryption partition is in a decryption state, a subsystem B is installed in the encryption partition, after the installation of the subsystem B is completed, auxiliary authentication equipment Ukey is pulled out, and a driver safe A copies a guide file, a configuration file and other key information related to the subsystem from a guide loading program to the position of the guide file in the guide loading program;
when the Ukey of the auxiliary authentication equipment is pulled out, the partition where the subsystem B is located is automatically hidden, the driver safe A deletes the guide file corresponding to the subsystem B and key information required by other subsystems for starting, and the computer automatically enters a default operating system A when being started;
after the auxiliary authentication equipment Ukey is inserted, the driver safe A automatically unlocks the encryption partition, displays the encryption partition, and automatically copies a guide file, a configuration file and other key information of a system B in the encryption partition to a position where the guide file is located in the guide loader;
when the auxiliary authentication equipment Ukey exists, after restarting the computer, when the computer is started, the boot loader starts a system boot interface to generate two systems, namely a system A and a system B, and a user selects an entered system according to the needs;
the user selects to enter the subsystem B and performs related operation of the subsystem B, based on a preset operation ending triggering condition, the guide file, the configuration file and other key information of the current system B are deleted through a pre-installed program safe B in the subsystem B, the auxiliary authentication equipment Ukey is pulled out, the computer is restarted, and the subsystem B is automatically hidden and invisible.
2. The method of claim 1, wherein the process of performing security verification between the auxiliary authentication device Ukey and the secure ssd firmware by the driver safeA and the first key, and accessing the data stored in the secure ssd firmware after the verification is passed, comprises:
when the auxiliary authentication device Ukey is inserted into the computer device, the driver safe A requests the auxiliary authentication device Ukey to verify the identity;
the auxiliary authentication equipment Ukey sends a verification request to the security ssd firmware, the security ssd firmware calculates a challenge value according to a preset challenge algorithm, the challenge value is sent to the auxiliary authentication equipment Ukey, and the auxiliary authentication equipment Ukey calculates a response value according to the challenge value and the preset challenge algorithm;
the auxiliary authentication equipment Ukey calculates a first key value according to the key verification information through a first preset algorithm, and sends the response value and the first key value to the secure ssd firmware;
the security ssd firmware calculates a first verification value according to a preset challenge algorithm and a challenge value based on the received response value and the first key value, and calculates a second verification value according to the first preset algorithm; and comparing the first verification value with the response value, comparing the second verification value with the key verification information stored before, and accessing the data stored in the secure ssd firmware when the comparison results of the first verification value and the response value are consistent.
3. The method as recited in claim 2, further comprising: and when the auxiliary authentication equipment Ukey and the secure ssd firmware are used for data transmission, the communication data between the auxiliary authentication equipment Ukey and the secure ssd firmware are encrypted and decrypted by using a second preset algorithm.
4. A method according to claim 3, wherein the first and second preset algorithms are the same or different, comprising: logic computation, random number computation, encryption computation, decryption computation, signature verification computation, hash computation message authentication code HMAC computation, key derivation computation, or a combination of several algorithms.
5. The method of claim 2, wherein the process of the secure ssd firmware calculating the challenge value according to a preset challenge algorithm comprises: the secure ssd firmware uses random numbers generated by a random number generator, or any information value generated by a non-replicable function technique.
6. The method of claim 1, wherein the secure ssd firmware is a hardware-level encryption and decryption module chip supporting a cryptographic SM4 algorithm.
7. The method of claim 1, wherein the bootloader comprises: boot manager of Windows system, GRUB or LILO of Linux system.
8. The method of claim 1, wherein when the security verification between the auxiliary authentication device Ukey and the secure ssd firmware is not passed, the data in the secure ssd firmware is not decrypted and the encrypted partition is not displayed.
9. The method according to claim 1, wherein the preset operation end triggering condition includes: the trigger operation end instruction button or the auxiliary authentication device Ukey is pulled out.
10. The method according to any one of claims 1-9, wherein after the step of extracting the auxiliary authentication device Ukey to restart the computer and automatically hiding the sub-system B from view, further comprising:
if the sub-system B is started next time, after the auxiliary authentication equipment Ukey is inserted and the related setting of the system B is set by using the program safe B, the process of carrying out safety verification between the auxiliary authentication equipment Ukey and the safety ssd firmware through the driver safe A and the first secret key and accessing the data stored in the safety ssd firmware after the verification is passed is repeated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311204482.8A CN117171822A (en) | 2023-09-14 | 2023-09-14 | Hiding method of operation subsystem |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311204482.8A CN117171822A (en) | 2023-09-14 | 2023-09-14 | Hiding method of operation subsystem |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117171822A true CN117171822A (en) | 2023-12-05 |
Family
ID=88946556
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311204482.8A Pending CN117171822A (en) | 2023-09-14 | 2023-09-14 | Hiding method of operation subsystem |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117171822A (en) |
-
2023
- 2023-09-14 CN CN202311204482.8A patent/CN117171822A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020192406A1 (en) | Method and apparatus for data storage and verification | |
CN102449631B (en) | For performing the system and method for bookkeeping | |
CN101246529A (en) | System and method of storage device data encryption and data access via a hardware key | |
US10162565B2 (en) | Data erasure of a target device | |
CN108335105B (en) | Data processing method and related equipment | |
CN101246455A (en) | System and method of storage device data encryption and data access | |
WO2013107362A1 (en) | Method and system for protecting data | |
WO2018205456A1 (en) | Password input method, computer device, and storage medium | |
CN110334531B (en) | Virtual machine key management method, master node, system, storage medium and device | |
CN111614698A (en) | Method and device for erasing terminal data | |
US10686596B2 (en) | Mutually authenticated adaptive management interfaces for interaction with sensitive infrastructure | |
CN115129332A (en) | Firmware burning method, computer equipment and readable storage medium | |
CN113055157B (en) | Biological characteristic verification method and device, storage medium and electronic equipment | |
US9210134B2 (en) | Cryptographic processing method and system using a sensitive data item | |
US20220393869A1 (en) | Recovery keys | |
US8732456B2 (en) | Enterprise environment disk encryption | |
JP2023542099A (en) | Wireless terminal and interface access authentication method in Uboot mode of wireless terminal | |
CN110807186B (en) | Method, device, equipment and storage medium for safe storage of storage equipment | |
CN109033812B (en) | Device and method for controlling UKEY to log in multi-partition operating system through UEFI | |
CN110674525A (en) | Electronic equipment and file processing method thereof | |
Loftus et al. | Android 7 file based encryption and the attacks against it | |
CN112966276B (en) | Method, device and medium for safely starting computer | |
CN108319848B (en) | Starting-up control method and device | |
CN117171822A (en) | Hiding method of operation subsystem | |
CN110851881A (en) | Security detection method and device for terminal equipment, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |