CN1405686A - System and method for ensuring computer host safety - Google Patents
System and method for ensuring computer host safety Download PDFInfo
- Publication number
- CN1405686A CN1405686A CN 01142167 CN01142167A CN1405686A CN 1405686 A CN1405686 A CN 1405686A CN 01142167 CN01142167 CN 01142167 CN 01142167 A CN01142167 A CN 01142167A CN 1405686 A CN1405686 A CN 1405686A
- Authority
- CN
- China
- Prior art keywords
- card
- computer
- card reader
- data
- mentioned
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The various protection measures in hardware and in software are utilized in the method in order to prevent the hacker's intruding and protect the safety of the data on the hard disc. In the software, the computer is allowed to start up only the fingerprint authentication is passed or the IC card is utilized. The authentication is done before the computer starts up. In the hardware, the safety of the data on the hardware is protected by use of the encryption/decryption cards and the micro switch on the case. The system at least includes the computer main board, the processor, the north bridge chip, the south chip, the I/O control chip, the keyboard, the card reader, the fingerprint scanner, the hardware, the encryption/decryption card and the case.
Description
Technical field
The present invention is relevant a kind of system and method for guaranteeing computer host safety, particularly utilizes the protected mode of hardware and software simultaneously, to guarantee the safety of host computer.
Background technology
Application along with individual privacy and financial sector, though its convenience is popular, but its security is worrying also, especially will dominate the capital construction of whole application in future network identification and payment system, therefore before being extensive use of, must analyze the safety factor of existing system equipment, otherwise once host computer suffers that the illegal production mode is invaded or hard disk is stolen, will make all data exposures or even distorted.
Protect the identifying procedure of computer host safety traditionally; utilize operating system (OS) to do authentication after being generally start; or in start process, utilize basic input/output system (BIOS) to do authentication; yet these authentication methods are started shooting because of main frame; so can't stop the invasion of hacker (hacker) entirely; therefore the present invention could start shooting after need proposing authentication to pass through, but not just does the invention of authentication after the start.In addition; above-mentioned protected mode only has software mode, if the hard disk that stores data directly is stolen, these with software protection mode will be to make a futile effort; therefore the inventor uses the mode of protection hard disk and data thereof simultaneously again, to reach tight security protection.
Content of the present invention
Fundamental purpose of the present invention is to utilize the protected mode of hardware and software simultaneously, to guarantee the safety of host computer.
Another object of the present invention is to utilize authentication modes such as IC-card and identification of fingerprint, the user need authenticate by after just can make host computer start, but not just do authentication after the start.
Another purpose of the present invention be utilize on an enciphering/deciphering card and the shell microswitch with the protection hardware resources safety.
For achieving the above object, the present invention proposes a kind of system that guarantees computer host safety, and it comprises at least:
One computer motherboard, it comprises at least: a processor (Processor); One north bridge wafer (NorthBridge) is connected with processor, is as the flow management between processor and bus-bar, makes processor one operating system and an identification of fingerprint software be arranged in this storer to the access of devices such as storer; One south bridge wafer (South Bridge) is gone into control wafer with north bridge wafer and output and is connected, and is the bridge as USB interface and peripheral device data input processor; And one output go into control wafer, be connected with the south bridge wafer, this is exported and starts computer after control wafer receives only keyboard input proper password;
One keyboard is gone into control wafer with card reader and output and is connected, and just starts keyboard after this card reader authentication is finished and inputs password for the user;
One card reader, it utilizes operation circuit to be connected to above-mentioned computer motherboard, this card reader can be done authentication to IC-card, if legal user, then start-up control circuit, make the computer normal operation, if remove above-mentioned IC-card before above-mentioned computer normal boot-strap, this card reader starts computer and suspends (suspend) function, stops all and exports into action, and, can't restart above-mentioned computer as not authentication again;
One fingerprint scanner, it is connected with above-mentioned computer motherboard, and this fingerprint scanner is to accept the user to import fingerprint data;
One hard disk, it is connected with above-mentioned computer motherboard, and this hard disk is in order to store data;
One enciphering/deciphering card, it is connected with above-mentioned computer motherboard, this enciphering/deciphering card is to be stored to above-mentioned hard disk more earlier this data is done encryption when storing data after, and read again after when above-mentioned hard disk reads data, earlier this data being done decryption processing, the key of this enciphering/deciphering card is stored on the flash memory of this enciphering/deciphering card; And
One shell, it surrounds above-mentioned computer motherboard, card reader, fingerprint scanner, hard disk and enciphering/deciphering card, this shell comprises a microswitch, can start this microswitch when shell is opened, and removes the key in the flash memory that is stored in above-mentioned enciphering/deciphering card.
Cooperate above-mentioned system, the present invention proposes a kind of method of guaranteeing computer host safety, and it comprises following steps:
A. insert IC-card,, start computer by the IC-card identifying procedure;
B. start the operating system, read fingerprint data from hard disk simultaneously;
C. the user imports fingerprint by fingerprint scanner;
Whether d. identification of fingerprint software is compared above-mentioned fingerprint correct; If not, resumes step (c); If continue next step;
E. login operating system;
F. read/store the data of hard disk by the enciphering/deciphering card; This enciphering/deciphering card is to be stored to above-mentioned hard disk more earlier this data is done encryption when storing data after, and read again after when above-mentioned hard disk reads data, earlier this data being done decryption processing, the key of this enciphering/deciphering card is stored on the flash memory of this enciphering/deciphering card, on the shell microswitch is arranged simultaneously, when shell is opened, can start this microswitch, and remove the key in the flash memory that is stored in above-mentioned enciphering/deciphering card; And
G. check that this IC-card is whether still in card reader; If, but normal shutdown then; If not, then this card reader starts the computer pause function, stops all and exports into action, and display message is notified the user simultaneously.
Description of drawings
Fig. 1 is the system schematic of the embodiment of the invention;
Fig. 2 is the main flow chart of the embodiment of the invention;
Fig. 3 is the IC-card identifying procedure figure of the embodiment of the invention;
Fig. 4 is the process flow diagram that the computer of the embodiment of the invention suspends and remove this halted state.
Specific implementation
For disclosing the present invention in detail, following conjunction with figs. elaborates.Fig. 1 shows the system schematic of the embodiment of the invention, and it comprises at least by finding out system of the present invention among the figure: a computer motherboard 110, and this computer motherboard 110 comprises at least: a processor 111; One north bridge wafer 112 is connected with processor 111, is as the flow management between processor 111 and bus-bar, makes processor 111 one operating system and an identification of fingerprint software be arranged in this storer to the access of devices such as storer; One south bridge wafer 113, going into control wafer (present embodiment is the Winbond Super IO wafer 114 for being produced by winbond electronics company) with north bridge wafer 112 and output and be connected, is the bridge as USB interface, PCI interface, IDE interface and peripheral device (as: keyboard 121, serial port 122 and parallel port 123 etc.) data input processor 111; And a Winbond Super IO wafer 114, being connected with south bridge wafer 113, this Winbond Super IO wafer 114 starts computer after receiving only keyboard 121 input proper passwords; One keyboard 121 is connected with card reader 130 and Winbond Super IO wafer 114, just starts keyboard 121 after these card reader 130 authentications are finished and inputs password for the user; One card reader 130, it utilizes circuit to be connected to above-mentioned computer motherboard 110, this card reader 130 can be done authentication to IC-card, if legal user, start-up control circuit then, make the computer normal operation, if remove above-mentioned IC-card before above-mentioned computer normal shutdown, this card reader starts the computer pause function, stops all and exports into action, and as not authentication again, can't restart above-mentioned computer, this card reader has more comprised a light emitting diode (LED) 131 and a timer (not shown), behind the computer normal shutdown, if IC-card does not remove in the given time, can remind the user; One fingerprint scanner 140, it is connected with the USB interface with above-mentioned computer motherboard 110, and this fingerprint scanner 140 is to accept the user to import fingerprint data; One hard disk 150, it is connected with the IDE interface with above-mentioned computer motherboard 110, and this hard disk 150 is in order to store data; One enciphering/deciphering card 160, it is connected with the PCI interface with above-mentioned computer motherboard 110, this enciphering/deciphering card 160 is to be stored to above-mentioned hard disk 150 again this data is done encryption earlier when storing data after, and read again after when above-mentioned hard disk 150 reads data, earlier this data being done decryption processing, even therefore hard disk 150 goes adrift, its inside information also can't be picked out, and the key of this enciphering/deciphering card 160 is stored on the flash memory of this enciphering/deciphering card 160; An and shell 170, it surrounds above-mentioned computer motherboard 110, card reader 130, fingerprint scanner 140, hard disk 150 and enciphering/deciphering card 160, this shell 170 comprises a microswitch 171, usual shell 170 keeps opening circuit when closing, when being opened, shell 170 can start this microswitch 171, produce a clear signal to enciphering/deciphering card 160, and removing is stored in the interior key of flash memory of enciphering/deciphering card 160, when therefore opening shell 170 as if stealer, key will be eliminated, and also can't use even steal enciphering/deciphering card 160; One IC-card (not shown), whether it is to store the user to discern data, be legal use for card reader 130 identifications.
The main flow chart of the embodiment of the invention shown in Figure 2, the user inserts IC-card, behind the IC-card identifying procedure, start computer (as step 210), then start the operating system, read fingerprint data (as step 220) from hard disk 150 simultaneously, the user is by fingerprint scanner 140 input fingerprints (as step 230) then, and whether the above-mentioned fingerprint of identification of fingerprint software comparison correct (as step 240); If not, resumes step 230; If, then can login operating system (as step 250) and carry out general job, but when reading/store hard disk 150 data, it all needs by enciphering/deciphering card 160 (as step 260), this enciphering/deciphering card 160 is to be stored to above-mentioned hard disk 150 again this data is done encryption earlier when storing data after, and read again after when above-mentioned hard disk 150 reads data, earlier this data being done decryption processing, the key of this enciphering/deciphering card 160 is stored on the flash memory of this enciphering/deciphering card 160, on the shell 170 microswitch 171 is arranged simultaneously, when being opened, shell 170 can start this microswitch 171, and remove the interior key of flash memory that is stored in above-mentioned enciphering/deciphering card, also can't use even therefore steal enciphering/deciphering card 160.
The IC-card identifying procedure figure of the embodiment of the invention shown in Figure 3, it is the detailed process of Fig. 2 step 210, at first, card reader 130 enters holding state (as step 310) behind the input current, then the user inserts IC-card to card reader 130 (as step 320), and whether correctly card reader 130 judges IC-card (as step 330); If not, resumes step 310; If, card reader 130 start-up control circuits, make Winbond Super IO wafer 114 start keyboard 121 (as step 340), card reader 130 display message notify the user to input password simultaneously, then the user by keyboard 121 input passwords after (as step 350), whether correctly Winbond Super IO wafer 114 judges this password (as step 360); If not, resumes step 350; If then Winbond Super IO wafer 114 starts computer.
The computer of the embodiment of the invention shown in Figure 4 suspends and removes the process flow diagram of this halted state, and when computer is carried out general job (as step 410), card reader 130 can check always that IC-card is whether still in card reader 130; If, but normal shutdown (as step 470) then; If not, then this card reader starts the computer pause function, stops all and exports into action, simultaneously notify the user (as step 430) via light emitting diode (LED) 131 display message, see then whether the user inserts IC-card (as step 440) again, if not, resumes step 430; If card reader 130 is checked IC-card whether correct (as step 450) once more, if incorrect, resumes step 430; If correct, card reader 130 is removed this halted state, simultaneously resumes step 410.Behind step 470 computer normal shutdown, card reader 130 can check whether IC-card was extracted (as step 480) in 10 seconds, if then finish this flow process; If not, behind the timer inverse to 10 in the card reader 130 second, the sound that can give a warning is reminded the user, simultaneously resumes step 480 (as step 490).
In sum; a kind of system and method for guaranteeing computer host safety provided by the invention; by hardware and software protected mode layer by layer; to guarantee the safety of host computer; can stop hacker's invasion; and the safety of protection data on hard disc, so the important document of Patent Law invention, mere formality application have in accordance with the law been met.
Below the present invention has been done a detailed description, only the above, when not limiting scope of the invention process.To being familiar with the personage of this skill, when carrying out the variation example of various equivalences to it, precisely because all should be included in spirit of the present invention and the scope.
Claims (9)
1, a kind of system that guarantees computer host safety is characterized in that comprising at least:
One computer motherboard,
One processor;
One north bridge wafer is connected with processor, is as the flow management between processor and bus-bar, makes processor one operating system and an identification of fingerprint software be arranged in this storer to the access of devices such as storer;
One south bridge wafer is gone into control wafer with north bridge wafer and output and is connected, and is the bridge as USB interface, PCI interface, IDE interface and peripheral device data input processor; And
Control wafer is gone in one output, is connected with the south bridge wafer, and this is exported and starts computer after control wafer receives only keyboard input proper password;
One keyboard is gone into control wafer with card reader and output and is connected, and just starts keyboard after this card reader authentication is finished and inputs password for the user;
One card reader, it utilizes operation circuit to be connected to above-mentioned computer motherboard, this card reader can be done affirmation to IC-card, if legal user, then start-up control circuit, make the computer normal operation, if remove above-mentioned IC-card before above-mentioned computer normal boot-strap, this card reader starts the computer pause function, stops all and exports into action, and, can't restart above-mentioned computer as not authentication again;
One fingerprint scanner, it is connected with above-mentioned computer motherboard, and this fingerprint scanner is to accept the user to import fingerprint data;
One hard disk, it is connected with above-mentioned computer motherboard, and this hard disk is in order to store data;
One enciphering/deciphering card, it is connected with above-mentioned computer motherboard, this enciphering/deciphering card is to be stored to above-mentioned hard disk more earlier this data is done encryption when storing data after, and read again after when above-mentioned hard disk reads data, earlier this data being done decryption processing, the key of this enciphering/deciphering card is stored on the flash memory of this enciphering/deciphering card; And
One shell, it surrounds above-mentioned computer motherboard, card reader, fingerprint scanner, hard disk and enciphering/deciphering card, this shell comprises a microswitch, can start this microswitch when shell is opened, and removes the key in the flash memory that is stored in above-mentioned enciphering/deciphering card.
2, the system that guarantees computer host safety as claimed in claim 1 is characterized in that more having comprised:
One IC-card, whether it is to store the user to discern data, be legal use for the card reader identification.
3, the system that guarantees computer host safety as claimed in claim 1 is characterized in that card reader more comprises an also light emitting diode (LED).
4, the system that guarantees computer host safety as claimed in claim 3 is characterized in that card reader has more comprised a timer, behind the computer normal shutdown, if IC-card does not remove in the given time, can remind the user.
5, a kind of method of guaranteeing computer host safety is characterized in that comprising following steps:
A. insert IC-card,, start computer by the IC-card identifying procedure;
B. start the operating system, read fingerprint data from hard disk simultaneously;
C. the user imports fingerprint by fingerprint scanner;
Whether d. identification of fingerprint software is compared above-mentioned fingerprint correct; If not, resumes step (c); If continue next step;
E. login operating system;
F. read/store the data of hard disk by the enciphering/deciphering card; This enciphering/deciphering card is to deposit to above-mentioned hard disk this data is done encryption earlier when storing data after again, and read again after when above-mentioned hard disk reads data, earlier this data being done decryption processing, the key of this enciphering/deciphering card is stored on the flash memory of this enciphering/deciphering card, on the shell microswitch is arranged simultaneously, when shell is opened, can start this microswitch, and remove the key in the flash memory that is stored in above-mentioned enciphering/deciphering card; And
G. check that this IC-card is whether still in card reader; If, but normal shutdown then; If not, then this card reader starts the computer pause function, stops all and exports into action, and display message is notified the user simultaneously.
6, the method for guaranteeing computer host safety as claimed in claim 5 is characterized in that the IC-card identifying procedure of step (a) is to comprise the following step:
A1. card reader enters holding state;
A2. insert IC-card to card reader;
A3. judge whether this IC-card is correct; If not, return (a1) step; If continue next step;
A4. card reader start-up control circuit makes output go into control wafer and starts keyboard, and the card reader display message notifies the user to input password simultaneously;
A5. the user inputs password by keyboard;
A6. export control wafer and judge whether this password is correct; If not, return (a5) step; If continue next step; And
A7. control wafer startup computer is gone in output.
7, as guaranteeing the method for computer host safety as described in claim 5 or 6, it is characterized in that more comprising following steps:
H. whether insert IC-card again; If not, then this computer continues to keep halted state; If continue next step; And
I. judge whether this IC-card is correct; If not, then this computer continues to keep halted state; If then remove this halted state.
8, as guaranteeing the method for computer host safety as described in the claim 5, it is characterized in that in the step (g) that behind the computer normal shutdown, card reader checks whether IC-card removes in the given time; If not, the card reader sound that gives a warning.
9, as guaranteeing the method for computer host safety as described in the claim 8, it is characterized in that the schedule time is 10 seconds.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 01142167 CN1405686A (en) | 2001-09-14 | 2001-09-14 | System and method for ensuring computer host safety |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 01142167 CN1405686A (en) | 2001-09-14 | 2001-09-14 | System and method for ensuring computer host safety |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1405686A true CN1405686A (en) | 2003-03-26 |
Family
ID=4676672
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 01142167 Pending CN1405686A (en) | 2001-09-14 | 2001-09-14 | System and method for ensuring computer host safety |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1405686A (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005041482A1 (en) * | 2003-10-29 | 2005-05-06 | Hui Lin | An authentication method for information storing application and a ic card authentication hardware |
WO2005093581A1 (en) * | 2004-03-26 | 2005-10-06 | Shanghai Sanlen Info Security Co., Ltd. | Title: secret file access authorization system with fingerprint limiation |
WO2006039832A1 (en) * | 2004-10-12 | 2006-04-20 | Hui Lin | Authentication method for storage and application of data, ic card, fingerprint scanner |
CN1312551C (en) * | 2005-06-06 | 2007-04-25 | 李大东 | Portable secret computer |
CN100336042C (en) * | 2004-09-09 | 2007-09-05 | 威盛电子股份有限公司 | Device and relative method for pre-reading data using north bridge circuit to maintain south bridge circuit |
CN100365974C (en) * | 2006-03-31 | 2008-01-30 | 北京飞天诚信科技有限公司 | Device and method for controlling computer access |
CN100386709C (en) * | 2003-06-06 | 2008-05-07 | 中国科学院计算技术研究所 | Dragon core-1 CPU network computer main board system and reset method |
CN100389409C (en) * | 2004-10-14 | 2008-05-21 | 苏州超锐微电子有限公司 | Method of carrying out hard disk protection by utilizing encryption of main zoning |
CN100421047C (en) * | 2005-07-22 | 2008-09-24 | 祥群科技股份有限公司 | Biological signal input device, computer system with said device and its control method |
CN100432890C (en) * | 2005-07-12 | 2008-11-12 | 中国长城计算机深圳股份有限公司 | Computer starting up identifying system and method |
CN100462918C (en) * | 2005-09-01 | 2009-02-18 | 横河电机株式会社 | Os starting method and apparatus using the same |
CN100585723C (en) * | 2006-11-24 | 2010-01-27 | 徐玉梅 | Safe U disk memorizer |
CN101901311A (en) * | 2008-12-22 | 2010-12-01 | 联想(新加坡)私人有限公司 | Management of hardware passwords |
CN101226571B (en) * | 2007-01-16 | 2011-02-09 | 瑞达信息安全产业股份有限公司 | Information safety computer |
CN101604202B (en) * | 2008-06-13 | 2012-02-01 | 昆盈企业股份有限公司 | Method for processing optical capturing module signal |
CN102521170A (en) * | 2010-12-20 | 2012-06-27 | 中国电子科技集团公司第四十一研究所 | Virus immunizing and self-recovering system for calibration data of measuring instrument |
CN101233469B (en) * | 2005-07-21 | 2013-06-05 | 克莱夫公司 | Memory lock system |
CN107894939A (en) * | 2017-11-08 | 2018-04-10 | 南京普宏信息技术有限公司 | The monitoring method and monitoring device of a kind of computer host safety |
-
2001
- 2001-09-14 CN CN 01142167 patent/CN1405686A/en active Pending
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100386709C (en) * | 2003-06-06 | 2008-05-07 | 中国科学院计算技术研究所 | Dragon core-1 CPU network computer main board system and reset method |
WO2005041482A1 (en) * | 2003-10-29 | 2005-05-06 | Hui Lin | An authentication method for information storing application and a ic card authentication hardware |
WO2005093581A1 (en) * | 2004-03-26 | 2005-10-06 | Shanghai Sanlen Info Security Co., Ltd. | Title: secret file access authorization system with fingerprint limiation |
CN100336042C (en) * | 2004-09-09 | 2007-09-05 | 威盛电子股份有限公司 | Device and relative method for pre-reading data using north bridge circuit to maintain south bridge circuit |
WO2006039832A1 (en) * | 2004-10-12 | 2006-04-20 | Hui Lin | Authentication method for storage and application of data, ic card, fingerprint scanner |
CN100389409C (en) * | 2004-10-14 | 2008-05-21 | 苏州超锐微电子有限公司 | Method of carrying out hard disk protection by utilizing encryption of main zoning |
CN1312551C (en) * | 2005-06-06 | 2007-04-25 | 李大东 | Portable secret computer |
CN100432890C (en) * | 2005-07-12 | 2008-11-12 | 中国长城计算机深圳股份有限公司 | Computer starting up identifying system and method |
CN101233469B (en) * | 2005-07-21 | 2013-06-05 | 克莱夫公司 | Memory lock system |
CN100421047C (en) * | 2005-07-22 | 2008-09-24 | 祥群科技股份有限公司 | Biological signal input device, computer system with said device and its control method |
CN100462918C (en) * | 2005-09-01 | 2009-02-18 | 横河电机株式会社 | Os starting method and apparatus using the same |
CN100365974C (en) * | 2006-03-31 | 2008-01-30 | 北京飞天诚信科技有限公司 | Device and method for controlling computer access |
CN100585723C (en) * | 2006-11-24 | 2010-01-27 | 徐玉梅 | Safe U disk memorizer |
CN101226571B (en) * | 2007-01-16 | 2011-02-09 | 瑞达信息安全产业股份有限公司 | Information safety computer |
CN101604202B (en) * | 2008-06-13 | 2012-02-01 | 昆盈企业股份有限公司 | Method for processing optical capturing module signal |
CN101901311A (en) * | 2008-12-22 | 2010-12-01 | 联想(新加坡)私人有限公司 | Management of hardware passwords |
US8756667B2 (en) | 2008-12-22 | 2014-06-17 | Lenovo (Singapore) Pte. Ltd. | Management of hardware passwords |
CN102521170A (en) * | 2010-12-20 | 2012-06-27 | 中国电子科技集团公司第四十一研究所 | Virus immunizing and self-recovering system for calibration data of measuring instrument |
CN102521170B (en) * | 2010-12-20 | 2015-03-11 | 中国电子科技集团公司第四十一研究所 | Virus immunizing and self-recovering system for calibration data of measuring instrument |
CN107894939A (en) * | 2017-11-08 | 2018-04-10 | 南京普宏信息技术有限公司 | The monitoring method and monitoring device of a kind of computer host safety |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1405686A (en) | System and method for ensuring computer host safety | |
US7392404B2 (en) | Enhancing data integrity and security in a processor-based system | |
TWI245182B (en) | Method, chipset, system and recording medium for responding to a sleep attack | |
EP0979442B1 (en) | Method and apparatus for secure processing of cryptographic keys | |
TWI390425B (en) | System for security verification and method for verifying security in a computer system | |
RU2321055C2 (en) | Device for protecting information from unsanctioned access for computers of informational and computing systems | |
EP0743602B1 (en) | Circuit device for function usage control in an integrated circuit | |
US20090106563A1 (en) | Tamper reactive memory device to secure data from tamper attacks | |
US20050228993A1 (en) | Method and apparatus for authenticating a user of an electronic system | |
CN101436247A (en) | Biological personal identification method and system based on UEFI | |
CN1639661A (en) | Method and apparatus for unlocking a computer system hard drive | |
CN110175573A (en) | The coding of face and iris and verification method, system and computer readable storage medium | |
JP2005502944A (en) | Apparatus and method for recognizing at least one individual, apparatus and system for monitoring access, and corresponding use | |
US20010019302A1 (en) | Data converter | |
CN1186732C (en) | Method and system for protecting hard disk of computer | |
CN110175444A (en) | Iris-encoding and verification method, system and computer readable storage medium | |
US11100215B2 (en) | Management of a display of a view of an application on a screen of an electronic data entry device, corresponding method, device and computer program product | |
CN1316327C (en) | Computer lock base on micro-electromechanical system information safety strong chain | |
AU8232187A (en) | Computer security system | |
CN113111336A (en) | Authentication method based on security computer | |
JPH09237183A (en) | Information protecting system | |
US20070030123A1 (en) | Apparatus, system, and method for securely associating identification information with an electronic device | |
JP2003122444A (en) | System and method for assuring security of computer cpu | |
Xiao et al. | TrustZone-based mobile terminal security system | |
JPH02173869A (en) | Personal authentication system using ic card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |