CN1405686A - System and method for ensuring computer host safety - Google Patents

System and method for ensuring computer host safety Download PDF

Info

Publication number
CN1405686A
CN1405686A CN 01142167 CN01142167A CN1405686A CN 1405686 A CN1405686 A CN 1405686A CN 01142167 CN01142167 CN 01142167 CN 01142167 A CN01142167 A CN 01142167A CN 1405686 A CN1405686 A CN 1405686A
Authority
CN
China
Prior art keywords
card
computer
card reader
data
mentioned
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 01142167
Other languages
Chinese (zh)
Inventor
陈雅晃
梁政钦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DONGWEICHENG SCIENCE AND TECHNOLOGY CO Ltd
Original Assignee
DONGWEICHENG SCIENCE AND TECHNOLOGY CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DONGWEICHENG SCIENCE AND TECHNOLOGY CO Ltd filed Critical DONGWEICHENG SCIENCE AND TECHNOLOGY CO Ltd
Priority to CN 01142167 priority Critical patent/CN1405686A/en
Publication of CN1405686A publication Critical patent/CN1405686A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The various protection measures in hardware and in software are utilized in the method in order to prevent the hacker's intruding and protect the safety of the data on the hard disc. In the software, the computer is allowed to start up only the fingerprint authentication is passed or the IC card is utilized. The authentication is done before the computer starts up. In the hardware, the safety of the data on the hardware is protected by use of the encryption/decryption cards and the micro switch on the case. The system at least includes the computer main board, the processor, the north bridge chip, the south chip, the I/O control chip, the keyboard, the card reader, the fingerprint scanner, the hardware, the encryption/decryption card and the case.

Description

Guarantee the system and method for computer host safety
Technical field
The present invention is relevant a kind of system and method for guaranteeing computer host safety, particularly utilizes the protected mode of hardware and software simultaneously, to guarantee the safety of host computer.
Background technology
Application along with individual privacy and financial sector, though its convenience is popular, but its security is worrying also, especially will dominate the capital construction of whole application in future network identification and payment system, therefore before being extensive use of, must analyze the safety factor of existing system equipment, otherwise once host computer suffers that the illegal production mode is invaded or hard disk is stolen, will make all data exposures or even distorted.
Protect the identifying procedure of computer host safety traditionally; utilize operating system (OS) to do authentication after being generally start; or in start process, utilize basic input/output system (BIOS) to do authentication; yet these authentication methods are started shooting because of main frame; so can't stop the invasion of hacker (hacker) entirely; therefore the present invention could start shooting after need proposing authentication to pass through, but not just does the invention of authentication after the start.In addition; above-mentioned protected mode only has software mode, if the hard disk that stores data directly is stolen, these with software protection mode will be to make a futile effort; therefore the inventor uses the mode of protection hard disk and data thereof simultaneously again, to reach tight security protection.
Content of the present invention
Fundamental purpose of the present invention is to utilize the protected mode of hardware and software simultaneously, to guarantee the safety of host computer.
Another object of the present invention is to utilize authentication modes such as IC-card and identification of fingerprint, the user need authenticate by after just can make host computer start, but not just do authentication after the start.
Another purpose of the present invention be utilize on an enciphering/deciphering card and the shell microswitch with the protection hardware resources safety.
For achieving the above object, the present invention proposes a kind of system that guarantees computer host safety, and it comprises at least:
One computer motherboard, it comprises at least: a processor (Processor); One north bridge wafer (NorthBridge) is connected with processor, is as the flow management between processor and bus-bar, makes processor one operating system and an identification of fingerprint software be arranged in this storer to the access of devices such as storer; One south bridge wafer (South Bridge) is gone into control wafer with north bridge wafer and output and is connected, and is the bridge as USB interface and peripheral device data input processor; And one output go into control wafer, be connected with the south bridge wafer, this is exported and starts computer after control wafer receives only keyboard input proper password;
One keyboard is gone into control wafer with card reader and output and is connected, and just starts keyboard after this card reader authentication is finished and inputs password for the user;
One card reader, it utilizes operation circuit to be connected to above-mentioned computer motherboard, this card reader can be done authentication to IC-card, if legal user, then start-up control circuit, make the computer normal operation, if remove above-mentioned IC-card before above-mentioned computer normal boot-strap, this card reader starts computer and suspends (suspend) function, stops all and exports into action, and, can't restart above-mentioned computer as not authentication again;
One fingerprint scanner, it is connected with above-mentioned computer motherboard, and this fingerprint scanner is to accept the user to import fingerprint data;
One hard disk, it is connected with above-mentioned computer motherboard, and this hard disk is in order to store data;
One enciphering/deciphering card, it is connected with above-mentioned computer motherboard, this enciphering/deciphering card is to be stored to above-mentioned hard disk more earlier this data is done encryption when storing data after, and read again after when above-mentioned hard disk reads data, earlier this data being done decryption processing, the key of this enciphering/deciphering card is stored on the flash memory of this enciphering/deciphering card; And
One shell, it surrounds above-mentioned computer motherboard, card reader, fingerprint scanner, hard disk and enciphering/deciphering card, this shell comprises a microswitch, can start this microswitch when shell is opened, and removes the key in the flash memory that is stored in above-mentioned enciphering/deciphering card.
Cooperate above-mentioned system, the present invention proposes a kind of method of guaranteeing computer host safety, and it comprises following steps:
A. insert IC-card,, start computer by the IC-card identifying procedure;
B. start the operating system, read fingerprint data from hard disk simultaneously;
C. the user imports fingerprint by fingerprint scanner;
Whether d. identification of fingerprint software is compared above-mentioned fingerprint correct; If not, resumes step (c); If continue next step;
E. login operating system;
F. read/store the data of hard disk by the enciphering/deciphering card; This enciphering/deciphering card is to be stored to above-mentioned hard disk more earlier this data is done encryption when storing data after, and read again after when above-mentioned hard disk reads data, earlier this data being done decryption processing, the key of this enciphering/deciphering card is stored on the flash memory of this enciphering/deciphering card, on the shell microswitch is arranged simultaneously, when shell is opened, can start this microswitch, and remove the key in the flash memory that is stored in above-mentioned enciphering/deciphering card; And
G. check that this IC-card is whether still in card reader; If, but normal shutdown then; If not, then this card reader starts the computer pause function, stops all and exports into action, and display message is notified the user simultaneously.
Description of drawings
Fig. 1 is the system schematic of the embodiment of the invention;
Fig. 2 is the main flow chart of the embodiment of the invention;
Fig. 3 is the IC-card identifying procedure figure of the embodiment of the invention;
Fig. 4 is the process flow diagram that the computer of the embodiment of the invention suspends and remove this halted state.
Specific implementation
For disclosing the present invention in detail, following conjunction with figs. elaborates.Fig. 1 shows the system schematic of the embodiment of the invention, and it comprises at least by finding out system of the present invention among the figure: a computer motherboard 110, and this computer motherboard 110 comprises at least: a processor 111; One north bridge wafer 112 is connected with processor 111, is as the flow management between processor 111 and bus-bar, makes processor 111 one operating system and an identification of fingerprint software be arranged in this storer to the access of devices such as storer; One south bridge wafer 113, going into control wafer (present embodiment is the Winbond Super IO wafer 114 for being produced by winbond electronics company) with north bridge wafer 112 and output and be connected, is the bridge as USB interface, PCI interface, IDE interface and peripheral device (as: keyboard 121, serial port 122 and parallel port 123 etc.) data input processor 111; And a Winbond Super IO wafer 114, being connected with south bridge wafer 113, this Winbond Super IO wafer 114 starts computer after receiving only keyboard 121 input proper passwords; One keyboard 121 is connected with card reader 130 and Winbond Super IO wafer 114, just starts keyboard 121 after these card reader 130 authentications are finished and inputs password for the user; One card reader 130, it utilizes circuit to be connected to above-mentioned computer motherboard 110, this card reader 130 can be done authentication to IC-card, if legal user, start-up control circuit then, make the computer normal operation, if remove above-mentioned IC-card before above-mentioned computer normal shutdown, this card reader starts the computer pause function, stops all and exports into action, and as not authentication again, can't restart above-mentioned computer, this card reader has more comprised a light emitting diode (LED) 131 and a timer (not shown), behind the computer normal shutdown, if IC-card does not remove in the given time, can remind the user; One fingerprint scanner 140, it is connected with the USB interface with above-mentioned computer motherboard 110, and this fingerprint scanner 140 is to accept the user to import fingerprint data; One hard disk 150, it is connected with the IDE interface with above-mentioned computer motherboard 110, and this hard disk 150 is in order to store data; One enciphering/deciphering card 160, it is connected with the PCI interface with above-mentioned computer motherboard 110, this enciphering/deciphering card 160 is to be stored to above-mentioned hard disk 150 again this data is done encryption earlier when storing data after, and read again after when above-mentioned hard disk 150 reads data, earlier this data being done decryption processing, even therefore hard disk 150 goes adrift, its inside information also can't be picked out, and the key of this enciphering/deciphering card 160 is stored on the flash memory of this enciphering/deciphering card 160; An and shell 170, it surrounds above-mentioned computer motherboard 110, card reader 130, fingerprint scanner 140, hard disk 150 and enciphering/deciphering card 160, this shell 170 comprises a microswitch 171, usual shell 170 keeps opening circuit when closing, when being opened, shell 170 can start this microswitch 171, produce a clear signal to enciphering/deciphering card 160, and removing is stored in the interior key of flash memory of enciphering/deciphering card 160, when therefore opening shell 170 as if stealer, key will be eliminated, and also can't use even steal enciphering/deciphering card 160; One IC-card (not shown), whether it is to store the user to discern data, be legal use for card reader 130 identifications.
The main flow chart of the embodiment of the invention shown in Figure 2, the user inserts IC-card, behind the IC-card identifying procedure, start computer (as step 210), then start the operating system, read fingerprint data (as step 220) from hard disk 150 simultaneously, the user is by fingerprint scanner 140 input fingerprints (as step 230) then, and whether the above-mentioned fingerprint of identification of fingerprint software comparison correct (as step 240); If not, resumes step 230; If, then can login operating system (as step 250) and carry out general job, but when reading/store hard disk 150 data, it all needs by enciphering/deciphering card 160 (as step 260), this enciphering/deciphering card 160 is to be stored to above-mentioned hard disk 150 again this data is done encryption earlier when storing data after, and read again after when above-mentioned hard disk 150 reads data, earlier this data being done decryption processing, the key of this enciphering/deciphering card 160 is stored on the flash memory of this enciphering/deciphering card 160, on the shell 170 microswitch 171 is arranged simultaneously, when being opened, shell 170 can start this microswitch 171, and remove the interior key of flash memory that is stored in above-mentioned enciphering/deciphering card, also can't use even therefore steal enciphering/deciphering card 160.
The IC-card identifying procedure figure of the embodiment of the invention shown in Figure 3, it is the detailed process of Fig. 2 step 210, at first, card reader 130 enters holding state (as step 310) behind the input current, then the user inserts IC-card to card reader 130 (as step 320), and whether correctly card reader 130 judges IC-card (as step 330); If not, resumes step 310; If, card reader 130 start-up control circuits, make Winbond Super IO wafer 114 start keyboard 121 (as step 340), card reader 130 display message notify the user to input password simultaneously, then the user by keyboard 121 input passwords after (as step 350), whether correctly Winbond Super IO wafer 114 judges this password (as step 360); If not, resumes step 350; If then Winbond Super IO wafer 114 starts computer.
The computer of the embodiment of the invention shown in Figure 4 suspends and removes the process flow diagram of this halted state, and when computer is carried out general job (as step 410), card reader 130 can check always that IC-card is whether still in card reader 130; If, but normal shutdown (as step 470) then; If not, then this card reader starts the computer pause function, stops all and exports into action, simultaneously notify the user (as step 430) via light emitting diode (LED) 131 display message, see then whether the user inserts IC-card (as step 440) again, if not, resumes step 430; If card reader 130 is checked IC-card whether correct (as step 450) once more, if incorrect, resumes step 430; If correct, card reader 130 is removed this halted state, simultaneously resumes step 410.Behind step 470 computer normal shutdown, card reader 130 can check whether IC-card was extracted (as step 480) in 10 seconds, if then finish this flow process; If not, behind the timer inverse to 10 in the card reader 130 second, the sound that can give a warning is reminded the user, simultaneously resumes step 480 (as step 490).
In sum; a kind of system and method for guaranteeing computer host safety provided by the invention; by hardware and software protected mode layer by layer; to guarantee the safety of host computer; can stop hacker's invasion; and the safety of protection data on hard disc, so the important document of Patent Law invention, mere formality application have in accordance with the law been met.
Below the present invention has been done a detailed description, only the above, when not limiting scope of the invention process.To being familiar with the personage of this skill, when carrying out the variation example of various equivalences to it, precisely because all should be included in spirit of the present invention and the scope.

Claims (9)

1, a kind of system that guarantees computer host safety is characterized in that comprising at least:
One computer motherboard,
One processor;
One north bridge wafer is connected with processor, is as the flow management between processor and bus-bar, makes processor one operating system and an identification of fingerprint software be arranged in this storer to the access of devices such as storer;
One south bridge wafer is gone into control wafer with north bridge wafer and output and is connected, and is the bridge as USB interface, PCI interface, IDE interface and peripheral device data input processor; And
Control wafer is gone in one output, is connected with the south bridge wafer, and this is exported and starts computer after control wafer receives only keyboard input proper password;
One keyboard is gone into control wafer with card reader and output and is connected, and just starts keyboard after this card reader authentication is finished and inputs password for the user;
One card reader, it utilizes operation circuit to be connected to above-mentioned computer motherboard, this card reader can be done affirmation to IC-card, if legal user, then start-up control circuit, make the computer normal operation, if remove above-mentioned IC-card before above-mentioned computer normal boot-strap, this card reader starts the computer pause function, stops all and exports into action, and, can't restart above-mentioned computer as not authentication again;
One fingerprint scanner, it is connected with above-mentioned computer motherboard, and this fingerprint scanner is to accept the user to import fingerprint data;
One hard disk, it is connected with above-mentioned computer motherboard, and this hard disk is in order to store data;
One enciphering/deciphering card, it is connected with above-mentioned computer motherboard, this enciphering/deciphering card is to be stored to above-mentioned hard disk more earlier this data is done encryption when storing data after, and read again after when above-mentioned hard disk reads data, earlier this data being done decryption processing, the key of this enciphering/deciphering card is stored on the flash memory of this enciphering/deciphering card; And
One shell, it surrounds above-mentioned computer motherboard, card reader, fingerprint scanner, hard disk and enciphering/deciphering card, this shell comprises a microswitch, can start this microswitch when shell is opened, and removes the key in the flash memory that is stored in above-mentioned enciphering/deciphering card.
2, the system that guarantees computer host safety as claimed in claim 1 is characterized in that more having comprised:
One IC-card, whether it is to store the user to discern data, be legal use for the card reader identification.
3, the system that guarantees computer host safety as claimed in claim 1 is characterized in that card reader more comprises an also light emitting diode (LED).
4, the system that guarantees computer host safety as claimed in claim 3 is characterized in that card reader has more comprised a timer, behind the computer normal shutdown, if IC-card does not remove in the given time, can remind the user.
5, a kind of method of guaranteeing computer host safety is characterized in that comprising following steps:
A. insert IC-card,, start computer by the IC-card identifying procedure;
B. start the operating system, read fingerprint data from hard disk simultaneously;
C. the user imports fingerprint by fingerprint scanner;
Whether d. identification of fingerprint software is compared above-mentioned fingerprint correct; If not, resumes step (c); If continue next step;
E. login operating system;
F. read/store the data of hard disk by the enciphering/deciphering card; This enciphering/deciphering card is to deposit to above-mentioned hard disk this data is done encryption earlier when storing data after again, and read again after when above-mentioned hard disk reads data, earlier this data being done decryption processing, the key of this enciphering/deciphering card is stored on the flash memory of this enciphering/deciphering card, on the shell microswitch is arranged simultaneously, when shell is opened, can start this microswitch, and remove the key in the flash memory that is stored in above-mentioned enciphering/deciphering card; And
G. check that this IC-card is whether still in card reader; If, but normal shutdown then; If not, then this card reader starts the computer pause function, stops all and exports into action, and display message is notified the user simultaneously.
6, the method for guaranteeing computer host safety as claimed in claim 5 is characterized in that the IC-card identifying procedure of step (a) is to comprise the following step:
A1. card reader enters holding state;
A2. insert IC-card to card reader;
A3. judge whether this IC-card is correct; If not, return (a1) step; If continue next step;
A4. card reader start-up control circuit makes output go into control wafer and starts keyboard, and the card reader display message notifies the user to input password simultaneously;
A5. the user inputs password by keyboard;
A6. export control wafer and judge whether this password is correct; If not, return (a5) step; If continue next step; And
A7. control wafer startup computer is gone in output.
7, as guaranteeing the method for computer host safety as described in claim 5 or 6, it is characterized in that more comprising following steps:
H. whether insert IC-card again; If not, then this computer continues to keep halted state; If continue next step; And
I. judge whether this IC-card is correct; If not, then this computer continues to keep halted state; If then remove this halted state.
8, as guaranteeing the method for computer host safety as described in the claim 5, it is characterized in that in the step (g) that behind the computer normal shutdown, card reader checks whether IC-card removes in the given time; If not, the card reader sound that gives a warning.
9, as guaranteeing the method for computer host safety as described in the claim 8, it is characterized in that the schedule time is 10 seconds.
CN 01142167 2001-09-14 2001-09-14 System and method for ensuring computer host safety Pending CN1405686A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 01142167 CN1405686A (en) 2001-09-14 2001-09-14 System and method for ensuring computer host safety

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 01142167 CN1405686A (en) 2001-09-14 2001-09-14 System and method for ensuring computer host safety

Publications (1)

Publication Number Publication Date
CN1405686A true CN1405686A (en) 2003-03-26

Family

ID=4676672

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 01142167 Pending CN1405686A (en) 2001-09-14 2001-09-14 System and method for ensuring computer host safety

Country Status (1)

Country Link
CN (1) CN1405686A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005041482A1 (en) * 2003-10-29 2005-05-06 Hui Lin An authentication method for information storing application and a ic card authentication hardware
WO2005093581A1 (en) * 2004-03-26 2005-10-06 Shanghai Sanlen Info Security Co., Ltd. Title: secret file access authorization system with fingerprint limiation
WO2006039832A1 (en) * 2004-10-12 2006-04-20 Hui Lin Authentication method for storage and application of data, ic card, fingerprint scanner
CN1312551C (en) * 2005-06-06 2007-04-25 李大东 Portable secret computer
CN100336042C (en) * 2004-09-09 2007-09-05 威盛电子股份有限公司 Device and relative method for pre-reading data using north bridge circuit to maintain south bridge circuit
CN100365974C (en) * 2006-03-31 2008-01-30 北京飞天诚信科技有限公司 Device and method for controlling computer access
CN100386709C (en) * 2003-06-06 2008-05-07 中国科学院计算技术研究所 Dragon core-1 CPU network computer main board system and reset method
CN100389409C (en) * 2004-10-14 2008-05-21 苏州超锐微电子有限公司 Method of carrying out hard disk protection by utilizing encryption of main zoning
CN100421047C (en) * 2005-07-22 2008-09-24 祥群科技股份有限公司 Biological signal input device, computer system with said device and its control method
CN100432890C (en) * 2005-07-12 2008-11-12 中国长城计算机深圳股份有限公司 Computer starting up identifying system and method
CN100462918C (en) * 2005-09-01 2009-02-18 横河电机株式会社 Os starting method and apparatus using the same
CN100585723C (en) * 2006-11-24 2010-01-27 徐玉梅 Safe U disk memorizer
CN101901311A (en) * 2008-12-22 2010-12-01 联想(新加坡)私人有限公司 Management of hardware passwords
CN101226571B (en) * 2007-01-16 2011-02-09 瑞达信息安全产业股份有限公司 Information safety computer
CN101604202B (en) * 2008-06-13 2012-02-01 昆盈企业股份有限公司 Method for processing optical capturing module signal
CN102521170A (en) * 2010-12-20 2012-06-27 中国电子科技集团公司第四十一研究所 Virus immunizing and self-recovering system for calibration data of measuring instrument
CN101233469B (en) * 2005-07-21 2013-06-05 克莱夫公司 Memory lock system
CN107894939A (en) * 2017-11-08 2018-04-10 南京普宏信息技术有限公司 The monitoring method and monitoring device of a kind of computer host safety

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100386709C (en) * 2003-06-06 2008-05-07 中国科学院计算技术研究所 Dragon core-1 CPU network computer main board system and reset method
WO2005041482A1 (en) * 2003-10-29 2005-05-06 Hui Lin An authentication method for information storing application and a ic card authentication hardware
WO2005093581A1 (en) * 2004-03-26 2005-10-06 Shanghai Sanlen Info Security Co., Ltd. Title: secret file access authorization system with fingerprint limiation
CN100336042C (en) * 2004-09-09 2007-09-05 威盛电子股份有限公司 Device and relative method for pre-reading data using north bridge circuit to maintain south bridge circuit
WO2006039832A1 (en) * 2004-10-12 2006-04-20 Hui Lin Authentication method for storage and application of data, ic card, fingerprint scanner
CN100389409C (en) * 2004-10-14 2008-05-21 苏州超锐微电子有限公司 Method of carrying out hard disk protection by utilizing encryption of main zoning
CN1312551C (en) * 2005-06-06 2007-04-25 李大东 Portable secret computer
CN100432890C (en) * 2005-07-12 2008-11-12 中国长城计算机深圳股份有限公司 Computer starting up identifying system and method
CN101233469B (en) * 2005-07-21 2013-06-05 克莱夫公司 Memory lock system
CN100421047C (en) * 2005-07-22 2008-09-24 祥群科技股份有限公司 Biological signal input device, computer system with said device and its control method
CN100462918C (en) * 2005-09-01 2009-02-18 横河电机株式会社 Os starting method and apparatus using the same
CN100365974C (en) * 2006-03-31 2008-01-30 北京飞天诚信科技有限公司 Device and method for controlling computer access
CN100585723C (en) * 2006-11-24 2010-01-27 徐玉梅 Safe U disk memorizer
CN101226571B (en) * 2007-01-16 2011-02-09 瑞达信息安全产业股份有限公司 Information safety computer
CN101604202B (en) * 2008-06-13 2012-02-01 昆盈企业股份有限公司 Method for processing optical capturing module signal
CN101901311A (en) * 2008-12-22 2010-12-01 联想(新加坡)私人有限公司 Management of hardware passwords
US8756667B2 (en) 2008-12-22 2014-06-17 Lenovo (Singapore) Pte. Ltd. Management of hardware passwords
CN102521170A (en) * 2010-12-20 2012-06-27 中国电子科技集团公司第四十一研究所 Virus immunizing and self-recovering system for calibration data of measuring instrument
CN102521170B (en) * 2010-12-20 2015-03-11 中国电子科技集团公司第四十一研究所 Virus immunizing and self-recovering system for calibration data of measuring instrument
CN107894939A (en) * 2017-11-08 2018-04-10 南京普宏信息技术有限公司 The monitoring method and monitoring device of a kind of computer host safety

Similar Documents

Publication Publication Date Title
CN1405686A (en) System and method for ensuring computer host safety
US7392404B2 (en) Enhancing data integrity and security in a processor-based system
TWI245182B (en) Method, chipset, system and recording medium for responding to a sleep attack
EP0979442B1 (en) Method and apparatus for secure processing of cryptographic keys
TWI390425B (en) System for security verification and method for verifying security in a computer system
RU2321055C2 (en) Device for protecting information from unsanctioned access for computers of informational and computing systems
EP0743602B1 (en) Circuit device for function usage control in an integrated circuit
US20090106563A1 (en) Tamper reactive memory device to secure data from tamper attacks
US20050228993A1 (en) Method and apparatus for authenticating a user of an electronic system
CN101436247A (en) Biological personal identification method and system based on UEFI
CN1639661A (en) Method and apparatus for unlocking a computer system hard drive
CN110175573A (en) The coding of face and iris and verification method, system and computer readable storage medium
JP2005502944A (en) Apparatus and method for recognizing at least one individual, apparatus and system for monitoring access, and corresponding use
US20010019302A1 (en) Data converter
CN1186732C (en) Method and system for protecting hard disk of computer
CN110175444A (en) Iris-encoding and verification method, system and computer readable storage medium
US11100215B2 (en) Management of a display of a view of an application on a screen of an electronic data entry device, corresponding method, device and computer program product
CN1316327C (en) Computer lock base on micro-electromechanical system information safety strong chain
AU8232187A (en) Computer security system
CN113111336A (en) Authentication method based on security computer
JPH09237183A (en) Information protecting system
US20070030123A1 (en) Apparatus, system, and method for securely associating identification information with an electronic device
JP2003122444A (en) System and method for assuring security of computer cpu
Xiao et al. TrustZone-based mobile terminal security system
JPH02173869A (en) Personal authentication system using ic card

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication