TWI698766B - Three-party verification and one-time authentication method based on information security - Google Patents

Three-party verification and one-time authentication method based on information security Download PDF

Info

Publication number
TWI698766B
TWI698766B TW107130346A TW107130346A TWI698766B TW I698766 B TWI698766 B TW I698766B TW 107130346 A TW107130346 A TW 107130346A TW 107130346 A TW107130346 A TW 107130346A TW I698766 B TWI698766 B TW I698766B
Authority
TW
Taiwan
Prior art keywords
operating system
mobile device
personal mobile
password
boot firmware
Prior art date
Application number
TW107130346A
Other languages
Chinese (zh)
Other versions
TW202009762A (en
Inventor
余家庭
林維明
Original Assignee
系微股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 系微股份有限公司 filed Critical 系微股份有限公司
Priority to TW107130346A priority Critical patent/TWI698766B/en
Publication of TW202009762A publication Critical patent/TW202009762A/en
Application granted granted Critical
Publication of TWI698766B publication Critical patent/TWI698766B/en

Links

Images

Abstract

本發明係一種基於資訊安全的三方驗證及其一次性認證方法,主要在於結合一電腦裝置之作業系統與開機韌體的密碼資訊,並儲存於一個人行動裝置中,將原本需要透過兩次手動輸入密碼才能登入該電腦裝置的驗證程序,簡化為透過該個人行動裝置取得作業系統與開機韌體之相關資料,並自動將開機韌體及作業系統之所需帳號密碼直接輸入;藉此在該個人行動裝置、該電腦裝置的開機韌體、該電腦裝置的作業系統之間完成三方驗證,令使用者免密碼登入該開機韌體及該作業系統,達到提升使用方便性兼具安全性的目的。The present invention is a three-party authentication based on information security and its one-time authentication method. It mainly combines the operating system of a computer device and the password information of the boot firmware, and stores it in a mobile device, which would otherwise require two manual input The authentication process for logging in to the computer device with a password is simplified to obtain the relevant information of the operating system and the boot firmware through the personal mobile device, and automatically enter the boot firmware and the required account password of the operating system directly; Three-way authentication is completed between the mobile device, the boot firmware of the computer device, and the operating system of the computer device, so that the user can log in the boot firmware and the operating system without a password, so as to improve the convenience and security of use.

Description

基於資訊安全的三方驗證及其一次性認證方法Three-party verification based on information security and its one-time verification method

本發明係關於一種基於資訊安全的驗證方法,尤指一種應用在行動裝置與電腦裝置之間基於資訊安全的三方驗證及其一次性認證方法。 The present invention relates to a verification method based on information security, in particular to a three-party verification based on information security applied between a mobile device and a computer device and a one-time authentication method thereof.

隨著時代的進步,目前的使用者一般在使用個人電腦裝置時,均會考量到個人資訊安全的問題,所以通常會將個人電腦裝置之開機韌體設定有一密碼,而且在個人電腦裝置的作業系統上,也會加上另一個人密碼來登入一個人帳號,使用者運用多重密碼,係為要保護個人電腦裝置的使用安全及作業系統內的資訊安全等,但是,現有技術中這種多重密碼的安全管制,其實在使用上又會帶來使用者其他的一些困擾,例如:使用者忘記密碼時,為了找回密碼而產生的其他動作,相對的更加麻煩;又如使用者每一次在使用個人電腦裝置時,都要由個人電腦裝置的鍵盤輸入一次密碼。 With the progress of the times, current users generally consider personal information security when using personal computer devices. Therefore, the boot firmware of the personal computer device is usually set with a password, and the operation of the personal computer device On the system, another person’s password is also added to log in to a person’s account. The user uses multiple passwords to protect the use safety of personal computer devices and the information security in the operating system. However, the multiple passwords in the prior art Security control, in fact, in use will bring some other troubles to the user, for example: when the user forgets the password, other actions in order to retrieve the password are relatively more troublesome; another example is that the user uses personal When a computer device is used, the password must be entered once from the keyboard of the personal computer device.

由上述的現有技術可知,使用者在使用個人電腦裝置時為了提升資訊安全,將開機韌體、作業系統設定多重密碼,增加了安全管制但對使用者而言徒增更多麻煩,如何能夠在兼具資訊安全性的同時,還能提高使用者的方便性,確實有待提出更佳解決方案之必要性。 According to the above-mentioned prior art, in order to improve information security when using a personal computer device, a user sets multiple passwords on the boot firmware and operating system, which increases the security control but adds more trouble to the user. At the same time as information security, it can also improve the convenience of users. It is indeed necessary to propose a better solution.

有鑑於上述現有技術之不足,本發明的主要目的在於提供一種基於資訊安全的三方驗證及其一次性認證方法,利用個人的行動裝置登錄個人安全資料並驗證使用者合法性,使個人的電腦裝置免輸入開機韌體之密碼開機,並讓電腦裝置的作業系統免密碼直接登入指定之個人帳號,以提升使用方便性兼具安全性。 In view of the above-mentioned shortcomings of the prior art, the main purpose of the present invention is to provide a three-party verification based on information security and its one-time authentication method, which uses personal mobile devices to log personal security data and verify the legitimacy of the user, so that the personal computer device No need to enter the password of the boot firmware to boot, and allow the operating system of the computer device to directly log in to the designated personal account without a password to enhance the convenience and security.

為達成上述目的所採取的主要技術手段係令前述基於資訊安全的三方驗證方法,係運作於一個人行動裝置與一電腦裝置之間,該個人行動裝置安裝並執行一應用程式,且該電腦裝置具有一開機韌體、一作業系統,該方法包括以下步驟:由該作業系統與該個人行動裝置建立配對以取得一裝置資訊、一認證資料及一自動登入帳號,並儲存於該開機韌體;由該開機韌體與該個人行動裝置進行配對與執行一使用者認證,並且於認證完成後,將該裝置資訊、該自動登入帳號儲存於該作業系統;以及由該作業系統利用該裝置資訊、該自動登入帳號直接向該個人行動裝置取得一回應帳號之密碼,以自動登入該作業系統。 The main technical means adopted to achieve the above purpose is to make the aforementioned three-party authentication method based on information security operate between a personal mobile device and a computer device, the personal mobile device installs and executes an application, and the computer device has A boot firmware and an operating system. The method includes the following steps: establishing a pairing between the operating system and the personal mobile device to obtain a device information, an authentication data and an automatic login account, and store it in the boot firmware; The boot firmware is paired with the personal mobile device to perform a user authentication, and after the authentication is completed, the device information and the automatic login account are stored in the operating system; and the operating system uses the device information, the The automatic login account directly obtains the password of a response account from the personal mobile device to automatically log in to the operating system.

依上述方法,在該個人行動裝置、該電腦裝置的開機韌體、該電腦裝置的作業系統之間完成三方驗證,令使用者免密碼登入該開機韌體及該作業系統,達到提升使用方便性兼具安全性的目的。 According to the above method, three-way authentication is completed between the personal mobile device, the boot firmware of the computer device, and the operating system of the computer device, so that users can log in to the boot firmware and the operating system without a password, thereby improving the convenience of use Both have the purpose of safety.

為達成上述目的所採取的又一主要技術手段係令前述基於資訊安全的三方驗證之一次性認證方法,係運作於一個人行動裝置與一電腦裝置之間,該個人行動裝置安裝並執行一應用程式,且該電腦裝置具有一開機韌體、一作業系統,該方法包括以下步驟:由該作業系統與該個人行動裝置建立配對以取得一裝置資訊、一認證資料及一自動登入帳號,並儲存於該開機韌體;由該開機韌體與該個人行動裝置進行配對與執行一使用者認證,並且於認證完成後,將一直接登入命令、該自動登入帳號及對應的一自動登入密碼儲存於該作業系統;以及由該作業系統直接根據該自動登入帳號、該自動登入密碼,進行自動登入。 Another main technical means adopted to achieve the above-mentioned purpose is to make the aforementioned one-time authentication method based on information security-based three-party verification, which operates between a personal mobile device and a computer device, and the personal mobile device installs and executes an application. , And the computer device has a boot firmware and an operating system. The method includes the following steps: a pairing is established between the operating system and the personal mobile device to obtain device information, authentication data and an automatic login account, and store them in The boot firmware; the boot firmware is paired with the personal mobile device to perform a user authentication, and after the authentication is completed, a direct login command, the automatic login account and the corresponding automatic login password are stored in the The operating system; and the operating system directly performs automatic login based on the automatic login account and the automatic login password.

依上述方法,在該個人行動裝置、該電腦裝置的開機韌體、該電腦裝置的作業系統之間完成三方驗證,而且最後係由該作業系統直接利用該自動登入帳號、該自動登入密碼,就可以進行登入動作,令使用者免密碼登入該開機韌體及該作業系統,達到提升使用方便性兼具安全性的目的。 According to the above method, three-way authentication is completed between the personal mobile device, the boot firmware of the computer device, and the operating system of the computer device, and finally the operating system directly uses the automatic login account and the automatic login password, The login action can be performed to enable the user to log in the boot firmware and the operating system without a password, so as to achieve the purpose of enhancing the convenience of use and security.

10:個人行動裝置 10: Personal mobile device

20:電腦裝置的開機韌體 20: Boot firmware for computer devices

30:電腦裝置的作業系統 30: Operating system of computer device

圖1 係本發明一較佳實施例的三方驗證方法流程圖。 Fig. 1 is a flowchart of a three-party verification method according to a preferred embodiment of the present invention.

圖2 係本發明一較佳實施例的三方驗證方法之開機韌體寫入登入命令流程圖。 FIG. 2 is a flowchart of the boot firmware write login command of the three-party verification method according to a preferred embodiment of the present invention.

圖3 係本發明一較佳實施例的三方驗證方法之開機韌體與裝置通訊流程圖。 FIG. 3 is a flow chart of the communication between the boot firmware and the device of the three-party authentication method according to a preferred embodiment of the present invention.

圖4 係本發明一較佳實施例的三方驗證方法之作業系統與裝置通訊流程圖。 FIG. 4 is a communication flow chart of the operating system and the device of the three-party verification method according to a preferred embodiment of the present invention.

圖5 係本發明一較佳實施例的三方驗證方法之開機韌體啟動流程圖。 FIG. 5 is a flowchart of the boot firmware startup of the three-party verification method according to a preferred embodiment of the present invention.

圖6 係本發明一較佳實施例的三方驗證方法之作業系統啟動流程圖。 Fig. 6 is a flow chart of operating system startup of a three-party verification method according to a preferred embodiment of the present invention.

圖7 係本發明一較佳實施例的三方驗證方法之裝置與作業系統解除配對流程圖。 FIG. 7 is a flowchart of unpairing the device and the operating system of the three-party authentication method according to a preferred embodiment of the present invention.

圖8 係本發明一較佳實施例的三方驗證之一次性認證方法流程圖。 Fig. 8 is a flow chart of a three-party verification one-time authentication method according to a preferred embodiment of the present invention.

圖9 係本發明一較佳實施例的三方驗證之一次性認證方法的開機韌體寫入登入命令流程圖。 FIG. 9 is a flow chart of the boot firmware write login command of the one-time authentication method of three-party verification according to a preferred embodiment of the present invention.

圖10 係本發明一較佳實施例的三方驗證之一次性認證方法的開機韌體與裝置通訊流程圖。 FIG. 10 is a flow chart of the communication between the boot firmware and the device of the one-time authentication method for three-party verification according to a preferred embodiment of the present invention.

圖11 係本發明一較佳實施例的三方驗證之一次性認證方法的作業系統寫入登入資料流程圖。 FIG. 11 is a flow chart of writing login data into the operating system of the one-time authentication method for three-party verification according to a preferred embodiment of the present invention.

圖12 係本發明一較佳實施例的三方驗證之一次性認證方法的開機韌體啟動流程圖。 FIG. 12 is a flowchart of booting firmware of a one-time authentication method for three-party verification according to a preferred embodiment of the present invention.

圖13 係本發明一較佳實施例的三方驗證之一次性認證方法的作業系統啟動流程圖。 FIG. 13 is a flow chart of operating system startup of a one-time authentication method for three-party verification according to a preferred embodiment of the present invention.

圖14 係本發明一較佳實施例的三方驗證之一次性認證方法的開機韌體與作業系統解除配對流程圖。 FIG. 14 is a flow chart of unpairing the boot firmware and the operating system of the one-time authentication method for three-party verification according to a preferred embodiment of the present invention.

關於本發明之第一較佳實施例,主要係提供一種基於資訊安全的三方驗證方法,請參閱圖1所示,其包括一個人行動裝置10(如智慧型手機)與一電腦裝置(如個人電腦、筆記型電腦),該個人行動裝置10安裝並執行一應用程式,該電腦裝置具有一開機韌體20、一作業系統30;於本較佳實施例中,該個人行動裝置10可透過一無線通訊協定與該電腦裝置連結,該無線通訊協定包括一藍牙通訊協定;於本較佳實施例中,該藍牙通訊協定為一BLE(Bluetooth Low Energy)藍牙協定,該BLE藍牙協定係屬於藍牙4.0的核心技術,藍牙4.0的規範包括了傳統藍牙技術(例如Bluetooth 2.1+EDR)、藍牙3.0高速技術(Bluetooth 3.0+High Speed)與最新的藍牙低功耗(Bluetooth Low Energy)技術三類,而其中的低功耗技術便是藍牙4.0的最大優勢特色,因此適合應用於個人行動裝置10。 Regarding the first preferred embodiment of the present invention, it mainly provides a three-party authentication method based on information security. Please refer to FIG. 1, which includes a personal mobile device 10 (such as a smart phone) and a computer device (such as a personal computer). , Notebook computer), the personal mobile device 10 installs and executes an application, the computer device has a boot firmware 20, an operating system 30; in the preferred embodiment, the personal mobile device 10 can be connected via a wireless The communication protocol is connected to the computer device, and the wireless communication protocol includes a Bluetooth communication protocol; in the preferred embodiment, the Bluetooth communication protocol is a BLE (Bluetooth Low Energy) Bluetooth protocol, and the BLE Bluetooth protocol belongs to Bluetooth 4.0 The core technology, Bluetooth 4.0 specifications include traditional Bluetooth technology (such as Bluetooth 2.1+EDR), Bluetooth 3.0 high-speed technology (Bluetooth 3.0+High Speed) and the latest Bluetooth low energy (Bluetooth Low Energy) technology three categories, and among them Low power consumption technology is the biggest advantage of Bluetooth 4.0, so it is suitable for personal mobile devices 10.

如圖1所示,該方法主要係運作於使用者的該個人行動裝置10、該電腦裝置的開機韌體20、該電腦裝置的作業系統30之間,以構成基於資訊安全的三方驗證方法,該方法包括以下步驟:由該作業系統30與該個人行動裝置10建立配對以取得一裝置資訊、一認證資料及一自動登入帳號(S11),並儲存於該開機韌體20(S12); 由該開機韌體20與該個人行動裝置10進行配對與執行一使用者認證(S13),並且於認證完成後,將該裝置資訊、該自動登入帳號儲存於該作業系統30(S14);以及由該作業系統30利用該裝置資訊、該自動登入帳號直接向該個人行動裝置10取得一回應帳號之密碼,以自動登入該作業系統30(S15)。 As shown in FIG. 1, the method is mainly operated between the user's personal mobile device 10, the boot firmware 20 of the computer device, and the operating system 30 of the computer device to form a three-party authentication method based on information security. The method includes the following steps: establishing a pairing between the operating system 30 and the personal mobile device 10 to obtain a device information, an authentication data, and an automatic login account (S11), and store it in the boot firmware 20 (S12); The boot firmware 20 and the personal mobile device 10 are paired and a user authentication is performed (S13), and after the authentication is completed, the device information and the automatic login account are stored in the operating system 30 (S14); and The operating system 30 uses the device information and the automatic login account to directly obtain a password of a response account from the personal mobile device 10 to automatically log in to the operating system 30 (S15).

在該個人行動裝置10、該電腦裝置的開機韌體20、該電腦裝置的作業系統30之間完成三方驗證,令使用者免密碼登入該開機韌體20及該作業系統30,能夠達到提升使用方便性兼具安全性的功效。 Three-way authentication is completed between the personal mobile device 10, the boot firmware 20 of the computer device, and the operating system 30 of the computer device, so that users can log in the boot firmware 20 and the operating system 30 without a password, which can achieve improved usage Convenience and safety.

進一步的,當上述步驟執行至「由該作業系統30與該個人行動裝置10建立配對以取得一裝置資訊、一認證資料及一自動登入帳號(S11),並儲存於該開機韌體20(S12)」之步驟,如圖1所示,該方法更包括以下次步驟:該作業系統30使用該藍牙協定搜尋該個人行動裝置10,並與其配對並要求使用者輸入一登入帳號之密碼,於本較佳實施例中係可先供使用者點選一登入帳號,並由使用者輸入該登入帳號之密碼;由該個人行動裝置10將該登入帳號與密碼儲存,並且回應狀態及安全的認證資料至該作業系統30;由該作業系統30寫入「配對之該個人行動裝置10的該裝置資訊與該安全的認證資料以及該作業系統30之安全的認證資料及該作業系統30之自動登入帳號」至一共用記憶體,並可供該開機韌體20讀取。 Further, when the above steps are executed to "the operating system 30 and the personal mobile device 10 establish a pairing to obtain a device information, an authentication data and an automatic login account (S11), and store it in the boot firmware 20 (S12 )" step, as shown in Figure 1, the method further includes the following steps: the operating system 30 uses the Bluetooth protocol to search for the personal mobile device 10, pair it with it, and request the user to enter a password for the login account. In the preferred embodiment, the user can first select a login account, and the user enters the password of the login account; the personal mobile device 10 stores the login account and password, and responds to the status and secure authentication data To the operating system 30; written by the operating system 30 "the device information of the paired personal mobile device 10 and the secure authentication data, the secure authentication data of the operating system 30, and the automatic login account of the operating system 30 "To a shared memory, which can be read by the boot firmware 20.

進一步的,當上述步驟執行至「由該開機韌體20與該個人行動裝置10進行配對與執行一使用者認證(S13),並且於認證完成後,將該裝置資訊、該自動登入帳號儲存於該作業系統30(S14)」之步驟,如圖1所示,該方法更包括以下次步驟: 當該開機韌體20執行重新啟動開機,則讀取該共用記憶體,以取出配對之該個人行動裝置10及安全的認證資料,並使用該藍牙協定搜尋該個人行動裝置10,並與其連線並要求該個人行動裝置10進行該使用者認證;使用者通過該個人行動裝置10的應用程式,利用一密碼/螢幕鎖/指紋/虹膜辨識/臉部辨識等方式,以完成認證使用者,再由該個人行動裝置10向該開機韌體20回應狀態;當該開機韌體20收到認證完成之回應狀態,則寫入「配對之該個人行動裝置10的該裝置資訊與該作業系統30之自動登入帳號」至該共用記憶體,並可供該作業系統30讀取。 Further, when the above steps are performed to "pairing of the boot firmware 20 and the personal mobile device 10 and performing a user authentication (S13), and after the authentication is completed, the device information and the automatic login account are stored in The steps of the operating system 30 (S14)" are shown in Fig. 1. The method further includes the following steps: When the boot firmware 20 executes a reboot, it reads the shared memory to retrieve the paired personal mobile device 10 and secure authentication data, and uses the Bluetooth protocol to search for the personal mobile device 10 and connect to it And request the personal mobile device 10 to perform the user authentication; the user uses a password/screen lock/fingerprint/iris recognition/face recognition through the application program of the personal mobile device 10 to complete the user authentication, and then The personal mobile device 10 responds to the boot firmware 20; when the boot firmware 20 receives the authentication completion response status, it writes "the device information of the paired personal mobile device 10 and the operating system 30 Automatic login account" to the shared memory, and can be read by the operating system 30.

必須說明的是,該個人行動裝置10(如智慧型手機或平板電腦)都大量攜帶了個人隱私的資料,因此裝置廠商設置了多樣的使用者驗證機制來開啟行動裝置或應用程式(APP),常見的安全驗證如密碼/螢幕鎖,又或者是生物辨識如指紋/眼睛虹膜/臉部辨識,這樣日新月異的使用者驗證方法為的就是更安全的使用者驗證,以確保該個人行動裝置10內的個人隱私資料不會為他人所揭露。 It must be noted that the personal mobile device 10 (such as a smart phone or tablet computer) carries a large amount of personal privacy data, so the device manufacturer has set up a variety of user authentication mechanisms to open the mobile device or application (APP). Common security verifications such as passwords/screen locks, or biometrics such as fingerprints/eyes and iris/face recognition, so the ever-changing user verification methods are more secure user verification to ensure that the personal mobile device 10 The personal privacy information of will not be revealed by others.

進一步的,當上述步驟執行至「由該作業系統30利用該裝置資訊、該自動登入帳號直接向該個人行動裝置10取得一回應帳號之密碼,以自動登入該作業系統30(S15)」之步驟,如圖1所示,該方法更包括以下次步驟:當該作業系統30執行作業系統重新啟動,由該作業系統30讀取該共用記憶體,並取出配對之該個人行動裝置10的該裝置資訊及該自動登入帳號,並使用該藍牙協定搜尋該個人行動裝置10,並與其連線並詢問登入帳號之密碼;當該個人行動裝置10收到該作業系統30發出的詢問,則立即回應一登入帳號之密碼,該作業系統30根據該登入帳號之密碼,自動的在該作業系統30登入帳號。 Further, when the above steps are executed to the step of "the operating system 30 uses the device information and the automatic login account to directly obtain the password of a response account from the personal mobile device 10 to automatically log in to the operating system 30 (S15)" As shown in FIG. 1, the method further includes the following steps: when the operating system 30 executes an operating system restart, the operating system 30 reads the shared memory and takes out the paired personal mobile device 10 Information and the automatic login account, and use the Bluetooth protocol to search for the personal mobile device 10, connect with it and ask for the password of the login account; when the personal mobile device 10 receives the inquiry from the operating system 30, it immediately responds The password of the login account, the operating system 30 automatically logs in the account in the operating system 30 according to the password of the login account.

於本較佳實施例中,為要說明該開機韌體20如何寫入該作業系統30直接登入命令至該共用記憶體,請參閱圖2所示,其中,當上述步驟執行至「並且於認證完成後,將該裝置資訊、該自動登入帳號儲存於該作業系統30(S14)」之步驟,該方法更包括以下次步驟:由該開機韌體20產生一隨機之AES Key,取出該作業系統30之一RSA Public Key並加密成另一隨機之AES Key,並且使用該另一隨機之AES Key,加密該作業系統30的直接登入命令資料,再寫入加密後之AES Key與AES Key加密該作業系統30的直接登入命令資料;由該作業系統30從該共用記憶體讀取該RSA加密之AES Key與AES Key加密後該作業系統30的直接登入命令資料,使用該作業系統30自身的一RSA Private Key解密該AES Key,並使用解密後的一AES Key解密該作業系統30的直接登入命令資料。 In this preferred embodiment, in order to explain how the boot firmware 20 writes the operating system 30 direct login command to the shared memory, please refer to FIG. 2 where, when the above steps are executed to "and in the authentication After completion, save the device information and the automatic login account in the operating system 30 (S14)", the method further includes the following steps: generate a random AES Key from the boot firmware 20, and take out the operating system One of 30 RSA Public Key is encrypted into another random AES Key, and the other random AES Key is used to encrypt the direct login command data of the operating system 30, and then write the encrypted AES Key and AES Key to encrypt the The direct login command data of the operating system 30; the operating system 30 reads the RSA-encrypted AES Key and the AES Key encrypted direct login command data of the operating system 30 from the shared memory, and uses one of the operating system 30 itself The RSA Private Key decrypts the AES Key, and uses the decrypted AES Key to decrypt the direct login command data of the operating system 30.

於本較佳實施例中,為要說明該開機韌體20與該個人行動裝置10進行之通訊,請參閱圖3所示,其中,當上述步驟執行至「由該開機韌體20與該個人行動裝置10進行配對與執行一使用者認證(S13)」之步驟,該方法更包括以下次步驟:由該開機韌體20產生一隨機之AES Key,取出指定的該個人行動裝置10之一RSA Public Key並加密成另一隨機之AES Key,並且使用該另一隨機之AES Key,加密詢問該開機韌體20之密碼的命令資料,透過該藍牙協定連線指定之該個人行動裝置10,並傳送一加密後的AES Key以及一加密後的詢問韌體密碼之命令資料;當該個人行動裝置10收到該開機韌體20傳送過來的資料,則使用自身RSA Private Key解密AES Key,使用解密後的AES Key解密詢問韌體密碼之命令資 料,尋找配對之開機韌體20的密碼資料並用AES Key加密,透過該藍牙協定傳送加密之後的開機韌體20密碼資料;由該開機韌體20利用AES Key解密開機韌體20密碼資料並繼續開機。 In this preferred embodiment, in order to illustrate the communication between the boot firmware 20 and the personal mobile device 10, please refer to FIG. 3, in which, when the above steps are executed to "the boot firmware 20 and the personal mobile device The mobile device 10 performs the steps of pairing and performing a user authentication (S13). The method further includes the following steps: generate a random AES Key from the boot firmware 20, and take out a designated RSA of the personal mobile device 10 The Public Key is encrypted into another random AES Key, and the other random AES Key is used to encrypt the command data asking for the password of the boot firmware 20, connect the designated personal mobile device 10 through the Bluetooth protocol, and Send an encrypted AES Key and an encrypted command data for asking the firmware password; when the personal mobile device 10 receives the data sent by the boot firmware 20, it uses its own RSA Private Key to decrypt the AES Key, and decrypt it After decrypting the AES Key, ask for the command information of the firmware password Data, find the password data of the paired boot firmware 20 and encrypt it with AES Key, send the encrypted boot firmware 20 password data through the Bluetooth protocol; the boot firmware 20 uses the AES Key to decrypt the boot firmware 20 password data and continue Turn on.

於本較佳實施例中,為要說明該作業系統30與該個人行動裝置10進行之通訊,請參閱圖4所示,其中,當上述步驟執行至「由該作業系統30利用該裝置資訊、該自動登入帳號直接向該個人行動裝置10取得一回應帳號之密碼,以自動登入該作業系統30(S15)」之步驟,該方法更包括以下次步驟:由該作業系統30產生隨機之AES Key,取出指定的該個人行動裝置10之RSA Public Key並加密隨機之AES Key,使用隨機之AES Key加密詢問指定使用者帳號密碼之命令資料,透過該藍牙協定連線指定之該個人行動裝置10並傳送加密後的AES Key以及詢問指定使用者帳號密碼之命令資料;當該個人行動裝置10收到作業系統30傳送過來的資料,使用自身RSA Private Key解密AES Key,使用解密後的AES Key解密詢問指定使用者帳號密碼之命令資料,尋找配對之指定使用者帳戶的密碼資料並用AES Key加密,透過該藍牙協定傳送加密之後的指定使用者帳戶的密碼資料;由該作業系統30利用AES Key解密指定使用者帳戶的密碼資料並登入使用者帳戶。 In this preferred embodiment, in order to illustrate the communication between the operating system 30 and the personal mobile device 10, please refer to FIG. 4, where the above steps are executed to "the operating system 30 uses the device information, The automatic login account directly obtains the password of a response account from the personal mobile device 10 to automatically log in to the operating system 30 (S15). The method further includes the following steps: the operating system 30 generates a random AES Key , Take out the designated RSA Public Key of the personal mobile device 10 and encrypt the random AES Key, use the random AES Key to encrypt the command data that asks the designated user account password, connect the designated personal mobile device 10 through the Bluetooth protocol and Send the encrypted AES Key and the command data to ask the specified user account password; when the personal mobile device 10 receives the data sent by the operating system 30, it uses its own RSA Private Key to decrypt the AES Key, and the decrypted AES Key to decrypt the query Specify the command data of the user account password, search for the password data of the matched specified user account and encrypt it with AES Key, and transmit the encrypted password data of the specified user account through the Bluetooth protocol; the operating system 30 uses AES Key to decrypt the specified Password information of the user account and log in to the user account.

於本較佳實施例中,為要說明該開機韌體20啟動之相關流程,請參閱圖5所示,其中,當上述步驟執行至「由該開機韌體20與該個人行動裝置10進行配對與執行一使用者認證(S13)」之步驟,該方法更包括以下次步驟:當該開機韌體20執行重新啟動開機,由該開機韌體20檢查該共用記憶體是否有配對的資料; 若是,則透過該藍牙協定掃描經配對後之該個人行動裝置10並連線;該開機韌體20產生隨機之AES Key並用該個人行動裝置10之RSA Public Key加密AES Key,並用AES Key加密登入資料傳送至該個人行動裝置10;該個人行動裝置10使用自身之RSA Private Key解密AES Key;該個人行動裝置10利用解密後的AES Key解密登入資料並要求使用者驗證(指紋/臉部辨識/密碼),並由該開機韌體20判斷是否為該個人行動裝置10的合法使用者;若是,則該個人行動裝置10利用AES Key加密該開機韌體20的密碼並透過該藍牙協定連線傳送至該開機韌體20,該開機韌體20利用AES Key解密該開機韌體20的密碼,並由該開機韌體20驗證密碼是否正確;若是,則該開機韌體20利用該作業系統30的RSA Public Key加密AES Key並將登入帳號資料用AES Key加密,該開機韌體20將加密後的資料寫入該共用記憶體,再由該開機韌體20繼續執行開機。 In the present preferred embodiment, in order to illustrate the related process of the boot firmware 20 activation, please refer to FIG. 5, wherein, when the above steps are executed to "the boot firmware 20 is paired with the personal mobile device 10 And execute a user authentication (S13)" step, the method further includes the following steps: when the boot firmware 20 executes a restart boot, the boot firmware 20 checks whether the shared memory has paired data; If yes, scan the paired personal mobile device 10 through the Bluetooth protocol and connect; the boot firmware 20 generates a random AES Key and encrypts the AES Key with the RSA Public Key of the personal mobile device 10, and encrypts the login with the AES Key The data is sent to the personal mobile device 10; the personal mobile device 10 uses its own RSA Private Key to decrypt the AES Key; the personal mobile device 10 uses the decrypted AES Key to decrypt the login data and requires user authentication (fingerprint/face recognition/ Password), and the boot firmware 20 determines whether it is a legitimate user of the personal mobile device 10; if so, the personal mobile device 10 uses AES Key to encrypt the password of the boot firmware 20 and transmits it through the Bluetooth protocol connection To the boot firmware 20, the boot firmware 20 uses AES Key to decrypt the password of the boot firmware 20, and the boot firmware 20 verifies whether the password is correct; if so, the boot firmware 20 uses the operating system 30 The RSA Public Key encrypts the AES Key and encrypts the login account data with the AES Key. The boot firmware 20 writes the encrypted data into the shared memory, and the boot firmware 20 continues to boot.

進一步的,當上述步驟執行至「由該開機韌體20檢查該共用記憶體是否有配對的資料」之步驟,若否,則由該開機韌體20詢問使用者密碼,並由該開機韌體20驗證密碼是否正確;若是,則接續執行「由該開機韌體20繼續執行開機」。 Further, when the above steps are executed to the step of "check whether the shared memory has paired data by the boot firmware 20", if not, the boot firmware 20 will ask for the user password, and the boot firmware 20 20 Verify that the password is correct; if it is, continue to execute "Starting from the boot firmware 20 to continue booting".

進一步的,當上述步驟執行至「由該開機韌體20判斷是否為該個人行動裝置10的合法使用者」之步驟,若否,則該個人行動裝置10利用AES Key加密使用者認證失敗的訊息並用該藍牙協定連線傳送訊息至該開機韌體20,由該開機韌體20詢問使用者密碼,並由該開機韌體20驗證密碼是否正確;若是,則接續執行「由該開機韌體20繼續執行開機」。 Further, when the above steps are performed to the step of "determining whether the personal mobile device 10 is a legitimate user by the boot firmware 20", if not, the personal mobile device 10 uses the AES Key to encrypt the user authentication failure message And use the Bluetooth protocol connection to send a message to the boot firmware 20, the boot firmware 20 asks for the user password, and the boot firmware 20 verifies whether the password is correct; if so, continue to execute "from the boot firmware 20 Continue to boot".

進一步的,當上述步驟執行至「該開機韌體20利用AES Key解密該開機韌體20的密碼,並由該開機韌體20驗證密碼是否正確」之步驟,若 否,則由該開機韌體20詢問使用者密碼,並由該開機韌體20驗證密碼是否正確;若是,則接續執行「由該開機韌體20繼續執行開機」。 Further, when the above steps are performed to the step of "the boot firmware 20 uses AES Key to decrypt the password of the boot firmware 20, and the boot firmware 20 verifies whether the password is correct", if If not, the boot firmware 20 will ask the user for the password, and the boot firmware 20 will verify whether the password is correct; if it is, then continue to execute "booting from the boot firmware 20".

於本較佳實施例中,為要說明該作業系統30啟動的相關流程,請參閱圖6所示,其中,當上述步驟執行至「由該作業系統30利用該裝置資訊、該自動登入帳號直接向該個人行動裝置10取得一回應帳號之密碼,以自動登入該作業系統30(S15)」之步驟,如圖6所示,該方法更包括以下次步驟:當該作業系統30開始執行作業系統重新啟動,並令內建的一解鎖應用程式啟動,該解鎖應用程式檢查該開機韌體20是否有命令直接登入,若是,則該解鎖應用程式讀取該共用記憶體用自身RSA Private Key解密AES Key,並用AES Key解密登入帳號資料;由該作業系統30判斷解密是否成功,若是,則判斷該開機韌體20指定的帳號是否存在,若是,則判斷該藍牙協定掃描經配對後之該個人行動裝置10並連線是否成功;若是,則該解鎖應用程式產生隨機之AES Key並用該個人行動裝置10之RSA Public Key加密登入帳號資料,該解鎖應用程式透過該藍牙協定連線將加密後的AES Key及被AESKey加密後的登入資料傳送至該個人行動裝置10,該個人行動裝置10利用RSA Private Key解密AES Key並用AES Key解密登入帳號資料,並由該個人行動裝置10檢查帳號是否存在;若是,則該個人行動裝置10利用AES Key加密該登入帳號的密碼,並透過該藍牙協定連線傳送至該解鎖應用程式,當該解鎖應用程式驗證密碼正確,則使該解鎖應用程式登入帳號。 In this preferred embodiment, in order to illustrate the related process of the operating system 30 activation, please refer to FIG. 6, where the above steps are executed to "the operating system 30 uses the device information and the automatic login account directly Obtain a password of a response account from the personal mobile device 10 to automatically log in to the operating system 30 (S15)", as shown in FIG. 6, the method further includes the following steps: when the operating system 30 starts to execute the operating system Restart and start a built-in unlocking application. The unlocking application checks whether the boot firmware 20 has a command to log in directly. If so, the unlocking application reads the shared memory and decrypts the AES with its own RSA Private Key Key, and use AES Key to decrypt the login account data; the operating system 30 determines whether the decryption is successful, if so, determines whether the account specified by the boot firmware 20 exists, and if so, determines the personal action after the Bluetooth protocol scan is paired Whether the device 10 is connected successfully; if it is, the unlocking application generates a random AES Key and encrypts the login account data with the RSA Public Key of the personal mobile device 10. The unlocking application connects the encrypted AES through the Bluetooth protocol connection The Key and the login information encrypted by AESKey are sent to the personal mobile device 10. The personal mobile device 10 uses RSA Private Key to decrypt the AES Key and uses the AES Key to decrypt the login account data, and the personal mobile device 10 checks whether the account exists; if so; , The personal mobile device 10 uses AES Key to encrypt the password of the login account, and transmits it to the unlocking application through the Bluetooth protocol connection. When the unlocking application verifies that the password is correct, the unlocking application is allowed to log in to the account.

進一步的,當上述步驟執行至「該解鎖應用程式檢查該開機韌體20是否有命令直接登入」之步驟、「由該作業系統30判斷解密是否成功」之步驟、「判斷該開機韌體20指定的帳號是否存在」之步驟、「判斷該藍牙協定 掃描經配對後之該個人行動裝置10並連線是否成功」之步驟、「由該個人行動裝置10檢查帳號是否存在」之步驟,若否,則回到該作業系統30之登入畫面。 Further, when the above steps are executed to the step of "the unlocked application checks whether the boot firmware 20 has a command to log in directly", the step of "determining whether the decryption is successful by the operating system 30", and the step of "determining whether the boot firmware 20 is specified "Does your account exist", "Determine the Bluetooth protocol Scan the paired personal mobile device 10 and whether the connection is successful" step, "check whether the account exists by the personal mobile device 10", if not, return to the login screen of the operating system 30.

於本較佳實施例中,進一步提供該個人行動裝置10與該作業系統30解除配對之流程,請參閱圖7所示,該方法更包括以下步驟:由該作業系統30的一解鎖應用程式,解除配對的該個人行動裝置10;以及刪除該共用記憶體之該個人行動裝置10的配對記錄。 In this preferred embodiment, a process for unpairing the personal mobile device 10 and the operating system 30 is further provided. Please refer to FIG. 7. The method further includes the following steps: unlocking an application program of the operating system 30, The personal mobile device 10 unpaired; and the pairing record of the personal mobile device 10 in the shared memory is deleted.

關於本發明之第二較佳實施例,主要係提供一種基於資訊安全的三方驗證之一次性認證方法,本較佳實施例與前一實施例的技術內容大致相同,惟本較佳實施例的部分流程稍有不同,請參閱圖8所示,該方法包括以下步驟:由該作業系統30與該個人行動裝置10建立配對以取得一裝置資訊、一認證資料及一自動登入帳號(S81),並儲存於該開機韌體20(S82);由該開機韌體20與該個人行動裝置10進行配對與執行一使用者認證(S83),並且於認證完成後,將一直接登入命令、該自動登入帳號及對應的一自動登入密碼儲存於該作業系統30(S84);以及由該作業系統30直接根據該自動登入帳號、該自動登入密碼,進行自動登入(S85)。 Regarding the second preferred embodiment of the present invention, it mainly provides a one-time authentication method based on information security three-party verification. The technical content of this preferred embodiment is roughly the same as that of the previous embodiment. Part of the process is slightly different. Please refer to FIG. 8. The method includes the following steps: the operating system 30 establishes a pairing with the personal mobile device 10 to obtain device information, authentication data and an automatic login account (S81), And stored in the boot firmware 20 (S82); the boot firmware 20 is paired with the personal mobile device 10 and a user authentication is performed (S83), and after the authentication is completed, a direct login command, the automatic The login account and the corresponding automatic login password are stored in the operating system 30 (S84); and the operating system 30 directly performs automatic login according to the automatic login account and the automatic login password (S85).

在該個人行動裝置10、該電腦裝置的開機韌體20、該電腦裝置的作業系統30之間完成三方驗證,而且最後係由該作業系統30直接利用該自動登入帳號、該自動登入密碼,就可以進行登入動作,令使用者免密碼登入該開機韌體20及該作業系統30,能夠達到提升使用方便性兼具安全性的功效。 Three-way authentication is completed between the personal mobile device 10, the computer device’s boot firmware 20, and the computer device’s operating system 30, and finally the operating system 30 directly uses the automatic login account and the automatic login password to The login action can be performed to enable the user to log in the boot firmware 20 and the operating system 30 without a password, which can achieve the effect of improving the convenience of use and security.

進一步的,當上述步驟執行至「由該作業系統30與該個人行動裝置10建立配對以取得一裝置資訊、一認證資料及一自動登入帳號(S81), 並儲存於該開機韌體20(S82)」之步驟,如圖8所示,該方法更包括以下次步驟:該作業系統30使用該藍牙協定搜尋該個人行動裝置10,並與其配對並要求使用者輸入一登入帳號之密碼,於本較佳實施例中係可先供使用者點選一登入帳號,並由使用者輸入該登入帳號之密碼;由該個人行動裝置10將該登入帳號與密碼儲存,並且回應狀態及安全的認證資料至該作業系統30;由該作業系統30寫入「配對之該個人行動裝置10的該裝置資訊與該安全的認證資料以及該作業系統30之安全的認證資料及該作業系統30之自動登入帳號」至一共用記憶體,並可供該開機韌體20讀取。 Further, when the above steps are executed to "the operating system 30 establishes a pairing with the personal mobile device 10 to obtain a device information, an authentication data and an automatic login account (S81), And stored in the boot firmware 20 (S82)", as shown in FIG. 8, the method further includes the following steps: the operating system 30 uses the Bluetooth protocol to search for the personal mobile device 10, pair with it and request to use The user enters a password for a login account. In this preferred embodiment, the user can first click on a login account, and the user enters the password for the login account; the personal mobile device 10 will have the login account and password Store and respond with the status and security authentication data to the operating system 30; the operating system 30 writes "the device information of the paired personal mobile device 10 and the secure authentication data, and the secure authentication of the operating system 30 The data and the automatic login account of the operating system 30" are stored in a shared memory and can be read by the boot firmware 20.

進一步的,當上述步驟執行至「由該開機韌體20與該個人行動裝置10進行配對與執行一使用者認證(S83),並且於認證完成後,將一直接登入命令、該自動登入帳號及對應的一自動登入密碼儲存於該作業系統30(S84)」之步驟,如圖8所示,該方法更包括以下次步驟:當該開機韌體20執行重新啟動開機,則讀取該共用記憶體,以取出配對之該個人行動裝置10及安全的認證資料,並使用該藍牙協定搜尋該個人行動裝置10,並與其連線並要求該個人行動裝置10進行該使用者認證,以及傳送指定該作業系統30登入帳號的密碼;使用者通過該個人行動裝置10的應用程式,利用一密碼/螢幕鎖/指紋/虹膜辨識/臉部辨識等方式,以完成認證使用者,再由該個人行動裝置10向該開機韌體20回應狀態及該作業系統30指定登入帳號之密碼;當該開機韌體20收到認證完成之回應狀態及登入帳號之密碼,則寫入「直接登入之命令與該作業系統30自動登入之帳號與密碼」至該共用記憶體,並可供該作業系統30讀取。 Further, when the above steps are executed to "pairing of the boot firmware 20 and the personal mobile device 10 and performing a user authentication (S83), and after the authentication is completed, a direct login command, the automatic login account and Corresponding to the step of storing an automatic login password in the operating system 30 (S84)", as shown in FIG. 8, the method further includes the following steps: when the boot firmware 20 executes a reboot, read the shared memory Body, to retrieve the paired personal mobile device 10 and secure authentication data, and use the Bluetooth protocol to search for the personal mobile device 10, connect to it, request the personal mobile device 10 to perform the user authentication, and send the designated The password for the login account of the operating system 30; the user uses a password/screen lock/fingerprint/iris recognition/face recognition through the application of the personal mobile device 10 to complete the authentication of the user, and then the personal mobile device 10 Response status to the boot firmware 20 and the password of the specified login account of the operating system 30; when the boot firmware 20 receives the response status of the authentication completion and the password of the login account, it will write "Direct login command and the operation The account and password automatically logged in by the system 30 are stored in the shared memory and can be read by the operating system 30.

進一步的,當上述步驟執行至「由該作業系統30直接根據該自動登入帳號、該自動登入密碼,進行自動登入(S85)」之步驟,如圖8所示,該方法更包括以下次步驟:當該作業系統30執行作業系統重新啟動,由該作業系統30讀取該共用記憶體,並取出直接登入之帳號及密碼,使該作業系統30自動登入帳號。 Further, when the above steps are executed to the step of "automatic login by the operating system 30 directly according to the automatic login account and the automatic login password (S85)", as shown in FIG. 8, the method further includes the following steps: When the operating system 30 executes the operating system restart, the operating system 30 reads the shared memory and retrieves the account and password for direct login, so that the operating system 30 automatically logs in to the account.

於本較佳實施例中,基於安全性的考量,於該作業系統30自動登入帳號完成後,係進一步的由該作業系統30,清空該共用記憶體的直接登入之命令與該作業系統30自動登入之帳號與密碼。 In the present preferred embodiment, based on security considerations, after the operating system 30 automatically logs in to the account, the operating system 30 further clears the shared memory and the direct login command and the operating system 30 automatically Login account and password.

於本較佳實施例中,為要說明該開機韌體20如何寫入該作業系統30直接登入命令至該共用記憶體,請參閱圖9所示,其中,當上述步驟執行至「並且於認證完成後,將一直接登入命令、該自動登入帳號及對應的一自動登入密碼儲存於該作業系統30(S84)」之步驟,該方法更包括以下次步驟:由該開機韌體20產生一隨機之AES Key,取出該作業系統30之一RSA Public Key並加密成另一隨機之AES Key,並且使用該另一隨機之AES Key,加密該作業系統30的直接登入命令資料及該作業系統30直接登入之帳號及密碼資料,再寫入加密後之AES Key與AES Key加密該作業系統30的直接登入命令資料及該作業系統30的直接登入之帳號及密碼資料;由該作業系統30從該共用記憶體讀取該RSA加密之AES Key與AES Key加密後該作業系統30的直接登入命令資料、以及該作業系統30直接登入之帳號及密碼資料,使用該作業系統30自身的一RSA Private Key解密該AES Key,並使用解密後的一AES Key解密該作業系統30的直接登入命令資料、以及該作業系統30的直接登入之帳號及密碼資料。 In this preferred embodiment, in order to explain how the boot firmware 20 writes the operating system 30 direct login command to the shared memory, please refer to FIG. 9 where, when the above steps are executed to "and in the authentication After completion, store a direct login command, the automatic login account and the corresponding automatic login password in the operating system 30 (S84). The method further includes the following steps: generate a random random command from the boot firmware 20 Take out one of the RSA Public Keys of the operating system 30 and encrypt it into another random AES Key, and use the other random AES Key to encrypt the direct login command data of the operating system 30 and the operating system 30 directly The login account and password data are written into the encrypted AES Key and AES Key to encrypt the direct login command data of the operating system 30 and the direct login account and password data of the operating system 30; the operating system 30 will share The memory reads the RSA-encrypted AES Key and the direct login command data of the operating system 30 after being encrypted with the AES Key, and the account and password data of the operating system 30 directly logged in, and decrypts using an RSA Private Key of the operating system 30 itself The AES Key uses the decrypted AES Key to decrypt the direct login command data of the operating system 30 and the direct login account and password data of the operating system 30.

於本較佳實施例中,為要說明該開機韌體20與該個人行動裝置10進行之通訊,請參閱圖10所示,其中,當上述步驟執行至「由該開機韌體20 與該個人行動裝置10進行配對與執行一使用者認證(S83)」之步驟,該方法更包括以下次步驟:由該開機韌體20產生一隨機之AES Key,取出指定的該個人行動裝置10之一RSA Public Key並加密成另一隨機之AES Key,並且使用該另一隨機之AES Key,加密詢問該開機韌體20之密碼與作業系統30直接登入的帳號與密碼之命令資料,透過該藍牙協定連線指定之該個人行動裝置10,並傳送一加密後的AES Key以及一加密後的詢問韌體密碼與作業系統直接登入的帳號與密碼之命令資料;當該個人行動裝置10收到該開機韌體20傳送過來的資料,則使用自身RSA Private Key解密AES Key,使用解密後的AES Key解密詢問韌體密碼20與作業系統30直接登入的帳號與密碼之命令資料,尋找配對之開機韌體20的密碼與作業系統30直接登入帳號的密碼,並用AES Key加密,透過該藍牙協定傳送加密之後的開機韌體20密碼與作業系統30直接登入帳號的密碼資料;由該開機韌體20利用AES Key解密開機韌體20密碼與作業系統直接登入帳號的密碼資料,並繼續開機。 In this preferred embodiment, in order to illustrate the communication between the boot firmware 20 and the personal mobile device 10, please refer to FIG. 10, in which, when the above steps are executed to "from the boot firmware 20 Pairing with the personal mobile device 10 and performing a user authentication (S83)", the method further includes the following steps: generate a random AES Key from the boot firmware 20, and take out the designated personal mobile device 10 One RSA Public Key is encrypted into another random AES Key, and the other random AES Key is used to encrypt the command data that asks the password of the boot firmware 20 and the account and password of the operating system 30 to log in directly. Connect to the personal mobile device 10 specified by the Bluetooth protocol, and send an encrypted AES Key and an encrypted command data asking for the firmware password and the account and password for direct login to the operating system; when the personal mobile device 10 receives The data sent by the boot firmware 20 is decrypted using its own RSA Private Key to decrypt the AES Key, and the decrypted AES Key is used to decrypt the command data that asks for the firmware password 20 and the account and password directly logged in to the operating system 30 to find the paired boot The password of the firmware 20 and the password of the operating system 30 direct login account are encrypted with AES Key, and the encrypted boot firmware 20 password and the password data of the operating system 30 direct login account are transmitted through the Bluetooth protocol; the boot firmware 20 Use AES Key to decrypt the boot firmware 20 password and the password data of the operating system direct login account, and continue to boot.

於本較佳實施例中,為要說明該作業系統30寫入登入資料至該共用記憶體的流程,請參閱圖11所示,其中,當上述步驟執行至「由該作業系統30與該個人行動裝置10建立配對以取得一裝置資訊、一認證資料及一自動登入帳號(S81),並儲存於該開機韌體20(S82)」之步驟,該方法更包括以下次步驟:由該作業系統30產生一隨機之AES Key,取出該作業系統30之一RSA Public Key並加密成另一隨機之AES Key,並且使用該另一隨機之AES Key,加密該作業系統30登入帳號,再寫入加密後之AES Key與AES Key加密該作業系統30登入帳號; 由該開機韌體20從該共用記憶體讀取該RSA加密之AES Key與AES Key加密後該作業系統30登入帳號,使用該作業系統30自身的一RSA Private Key解密該AES Key,並使用解密後的一AES Key解密該作業系統30登入帳號。 In the present preferred embodiment, in order to illustrate the process of the operating system 30 writing login data to the shared memory, please refer to FIG. 11, where the above steps are performed to "the operating system 30 and the individual The mobile device 10 establishes a pairing to obtain a device information, an authentication data, and an automatic login account (S81), and store it in the boot firmware 20 (S82). The method further includes the following steps: from the operating system 30 Generate a random AES Key, take out an RSA Public Key of the operating system 30 and encrypt it into another random AES Key, and use the other random AES Key to encrypt the operating system 30 login account, and then write the encryption The following AES Key and AES Key encrypt the operating system 30 login account; The bootable firmware 20 reads the RSA-encrypted AES Key and the AES Key from the shared memory after encryption, the operating system 30 logs in to the account, uses an RSA Private Key of the operating system 30 to decrypt the AES Key, and decrypts it The subsequent AES Key decrypts the login account of the operating system 30.

於本較佳實施例中,為要說明該開機韌體20啟動之相關流程,請參閱圖12所示,其中,當上述步驟執行至「由該開機韌體20與該個人行動裝置10進行配對與執行一使用者認證(S83)」之步驟,該方法更包括以下次步驟:當該開機韌體20執行重新啟動開機,由該開機韌體20檢查該共用記憶體是否有配對的資料;若是,則透過該藍牙協定掃描經配對後之該個人行動裝置10並連線;該開機韌體20產生隨機之AES Key並用該個人行動裝置10之RSA Public Key加密AES Key,並用AES Key加密登入資料傳送至該個人行動裝置10;該個人行動裝置10使用自身之RSA Private Key解密AES Key;該個人行動裝置10利用解密後的AES Key解密登入資料並要求使用者驗證(指紋/臉部辨識/密碼),並由該開機韌體20判斷是否為該個人行動裝置10的合法使用者;若是,則該個人行動裝置10利用AES Key加密一使用者認證失敗的訊息,並用該藍牙協定連線傳送訊息至該開機韌體20;以及該個人行動裝置10利用AES Key加密該開機韌體20的密碼及指定登入帳號之密碼,並透過該藍牙協定連線傳送至由該開機韌體20,由該開機韌體20驗證密碼是否正確;若是,則該開機韌體20利用該作業系統30的RSA Public Key加密AES Key並將登入帳號及密碼資料用AES Key加密,該開機韌體20將加密後的資料寫入該共用記憶體,再由該開機韌體20繼續執行開機。 In this preferred embodiment, in order to illustrate the related process of the boot firmware 20 activation, please refer to FIG. 12, wherein, when the above steps are executed to "the boot firmware 20 is paired with the personal mobile device 10 And the step of executing a user authentication (S83)", the method further includes the following steps: when the boot firmware 20 executes a restart boot, the boot firmware 20 checks whether the shared memory has matched data; if so , Scan the paired personal mobile device 10 through the Bluetooth protocol and connect; the boot firmware 20 generates a random AES Key and encrypts the AES Key with the RSA Public Key of the personal mobile device 10, and encrypts the login data with the AES Key Send to the personal mobile device 10; the personal mobile device 10 uses its own RSA Private Key to decrypt the AES Key; the personal mobile device 10 uses the decrypted AES Key to decrypt the login data and request user authentication (fingerprint/face recognition/password ), and the boot firmware 20 determines whether it is a legal user of the personal mobile device 10; if so, the personal mobile device 10 uses AES Key to encrypt a user authentication failure message, and uses the Bluetooth protocol connection to send the message To the boot firmware 20; and the personal mobile device 10 uses AES Key to encrypt the password of the boot firmware 20 and the password of the designated login account, and send it to the boot firmware 20 through the Bluetooth protocol connection, and then the boot The firmware 20 verifies whether the password is correct; if so, the boot firmware 20 uses the RSA Public Key of the operating system 30 to encrypt the AES Key and encrypts the login account and password data with the AES Key. The boot firmware 20 will encrypt the data Write to the shared memory, and then the boot firmware 20 continues to perform booting.

進一步的,當上述步驟執行至「由該開機韌體20檢查該共用記憶體是否有配對的資料」之步驟,若否,則由該開機韌體20詢問使用者密碼, 並由該開機韌體20驗證密碼是否正確;若是,則接續執行「由該開機韌體20繼續執行開機」。 Further, when the above steps are executed to the step of "check whether the shared memory has paired data by the boot firmware 20", if not, the boot firmware 20 will ask for the user password, And the boot firmware 20 verifies whether the password is correct; if it is, then continue to execute "the boot firmware 20 continues booting".

進一步的,當上述步驟執行至「由該開機韌體20判斷是否為該個人行動裝置10的合法使用者」之步驟,若否,則該個人行動裝置10利用AES Key加密該使用者認證失敗的訊息,並用該藍牙協定連線傳送訊息至該開機韌體20,由該開機韌體20詢問使用者密碼,並由該開機韌體20驗證密碼是否正確;若是,則接續執行「由該開機韌體20繼續執行開機」。 Further, when the above steps are performed to the step of "determining whether the personal mobile device 10 is a legitimate user by the boot firmware 20", if not, the personal mobile device 10 uses AES Key to encrypt the user authentication failure Message, and use the Bluetooth protocol connection to send a message to the boot firmware 20, the boot firmware 20 asks for the user password, and the boot firmware 20 verifies whether the password is correct; if so, continue to execute "from the boot firmware Body 20 continues to perform booting".

進一步的,當上述步驟執行至「該開機韌體20利用AES Key解密該開機韌體20的密碼,並由該開機韌體20驗證密碼是否正確」之步驟,若否,則由該開機韌體20詢問使用者密碼,並由該開機韌體20驗證密碼是否正確;若是,則接續執行「由該開機韌體20繼續執行開機」。 Further, when the above steps are executed to the step of "the boot firmware 20 uses AES Key to decrypt the password of the boot firmware 20, and the boot firmware 20 verifies whether the password is correct", if not, the boot firmware 20 20 Ask the user for the password, and verify whether the password is correct by the boot firmware 20; if it is, continue to execute "Boot by the boot firmware 20".

於本較佳實施例中,為要說明該作業系統30啟動的相關流程,請參閱圖13所示,其中,當上述步驟執行至「由該作業系統30直接根據該自動登入帳號、該自動登入密碼,進行自動登入(S85)」之步驟,如圖13所示,該方法更包括以下次步驟:當該作業系統30開始執行作業系統重新啟動,並令內建的一解鎖應用程式啟動,判斷該解鎖應用程式檢查該開機韌體20是否有命令直接登入,若是,則該解鎖應用程式讀取該共用記憶體用自身RSA Private Key解密AES Key,並用AES Key解密登入帳號資料;由該作業系統30判斷解密是否成功,若是,則判斷該開機韌體20指定的帳號是否存在;若是,則該作業系統30利用解密後的使用者帳號與密碼,登入該作業系統30,並判斷登入是否成功;若是,則結束此流程。 In this preferred embodiment, in order to explain the related process of the operating system 30 activation, please refer to FIG. 13, where, when the above steps are executed to "the operating system 30 directly based on the automatic login account, the automatic login Password, perform automatic login (S85)" step, as shown in Figure 13, the method further includes the following steps: when the operating system 30 starts to execute the operating system restart, and a built-in unlocking application is activated, judge The unlocking application checks whether the boot firmware 20 has a command to log in directly. If so, the unlocking application reads the shared memory and decrypts the AES Key with its own RSA Private Key, and decrypts the login account data with the AES Key; by the operating system 30 judge whether the decryption is successful, if yes, judge whether the account specified by the boot firmware 20 exists; if yes, the operating system 30 uses the decrypted user account and password to log in to the operating system 30, and judge whether the login is successful; If yes, end this process.

進一步的,當上述步驟執行至「判斷該解鎖應用程式檢查該開機韌體20是否有命令直接登入」之步驟、「由該作業系統30判斷解密是否成 功」之步驟、「判斷該開機韌體20指定的帳號是否存在」之步驟、「判斷登入是否成功」之步驟,若否,則均回到該作業系統30之登入畫面。 Further, when the above steps are performed to the step of "determine whether the unlocked application checks whether the boot firmware 20 has a command to log in directly", "the operating system 30 determines whether the decryption is successful" If not, the steps of “determining whether the account specified by the boot firmware 20 exists”, the step of “determining whether the login is successful”, if not, all return to the login screen of the operating system 30.

於本較佳實施例中,進一步提供該開機韌體20與該作業系統30解除配對之流程,請參閱圖14所示,該方法更包括以下步驟:由該作業系統30的一解鎖應用程式,解除配對;以及刪除該共用記憶體之配對記錄。 In the present preferred embodiment, a process for unpairing the boot firmware 20 and the operating system 30 is further provided. Please refer to FIG. 14. The method further includes the following steps: unlocking an application program of the operating system 30, Unpair; and delete the pairing record of the shared memory.

本發明透過上述各較佳實施例,解決目前個人電腦的使用者為了個人資訊安全的考量,將開機韌體20、作業系統30設多重的密碼加以保護,而多重安全的管制反造成使用者的麻煩、不便及困擾,因此,藉由本發明利用該個人行動裝置10登錄個人安全資料並驗證使用者合法性,使個人的電腦裝置之開機韌體20、作業系統30免輸入密碼、直接開機登入指定之個人帳號,故本發明確實兼具了方便性及安全性之功效。 Through the above-mentioned preferred embodiments, the present invention solves the current personal computer user’s consideration of personal information security by setting up multiple passwords to protect the boot firmware 20 and operating system 30, and the multiple security controls cause the user’s Trouble, inconvenience and trouble. Therefore, the present invention uses the personal mobile device 10 to log in personal security data and verify the user's legitimacy, so that the boot firmware 20 and operating system 30 of the personal computer device are not required to enter a password, and they are directly booted to log in. Therefore, the present invention does have both convenience and safety.

10‧‧‧個人行動裝置 10‧‧‧Personal mobile device

20‧‧‧電腦裝置的開機韌體 20‧‧‧Boot firmware for computer devices

30‧‧‧電腦裝置的作業系統 30‧‧‧Operating system of computer device

Claims (6)

一種基於資訊安全的三方驗證方法,係運作於一個人行動裝置與一電腦裝置之間,該個人行動裝置安裝並執行一應用程式,且該電腦裝置具有一開機韌體、一作業系統,該方法包括以下步驟:由該作業系統與該個人行動裝置建立配對以取得一裝置資訊、一認證資料及一自動登入帳號,並儲存於該開機韌體;由該開機韌體與該個人行動裝置進行配對與執行一使用者認證,並且於認證完成後,將該裝置資訊、該自動登入帳號儲存於該作業系統;以及由該作業系統利用該裝置資訊、該自動登入帳號直接向該個人行動裝置取得一回應帳號之密碼,以自動登入該作業系統;當上述步驟執行至「由該作業系統與該個人行動裝置建立配對以取得一裝置資訊、一認證資料及一自動登入帳號,並儲存於該開機韌體」之步驟,該方法更包括以下次步驟:該作業系統搜尋該個人行動裝置,並與其配對並要求使用者輸入一登入帳號之密碼;由該個人行動裝置將該登入帳號與密碼儲存,並且回應狀態及安全的認證資料至該作業系統;由該作業系統寫入「配對之該裝置資訊與該安全的認證資料以及該作業系統之安全的認證資料及該作業系統之自動登入帳號」至一共用記憶體,並供該開機韌體讀取;當上述步驟執行至「由該開機韌體與該個人行動裝置進行配對與執行一使用者認證,並且於認證完成後,將該裝置資訊、該自動登入帳號儲存於該作業系統」之步驟,該方法更包括以下次步驟: 當該開機韌體執行重新啟動開機,則讀取該共用記憶體,以取出配對之該個人行動裝置及安全的認證資料,並搜尋該個人行動裝置,並與其連線並要求該個人行動裝置進行該使用者認證;使用者通過該個人行動裝置,以完成認證使用者,再由該個人行動裝置向該開機韌體回應狀態;當該開機韌體收到認證完成之回應狀態,則寫入「配對之該裝置資訊與該作業系統之自動登入帳號」至該共用記憶體,並供該作業系統讀取。 A three-party authentication method based on information security is operated between a personal mobile device and a computer device. The personal mobile device installs and executes an application program, and the computer device has a boot firmware and an operating system. The method includes The following steps: establish a pairing between the operating system and the personal mobile device to obtain a device information, an authentication data and an automatic login account, and store it in the boot firmware; the boot firmware is paired with the personal mobile device Perform a user authentication, and after the authentication is completed, store the device information and the automatic login account in the operating system; and the operating system uses the device information and the automatic login account to directly obtain a response from the personal mobile device The password of the account to automatically log in to the operating system; when the above steps are executed to "the operating system and the personal mobile device are paired to obtain a device information, an authentication data and an automatic login account, and store it in the boot firmware The method further includes the following steps: the operating system searches for the personal mobile device, matches it with it, and requires the user to enter a password for a login account; the personal mobile device stores the login account and password, and responds Status and security authentication data to the operating system; the operating system writes "the paired device information and the secure authentication data, the operating system’s secure authentication data and the operating system’s automatic login account" into a shared Memory, and for the boot firmware to read; when the above steps are executed to "pair the boot firmware with the personal mobile device and perform a user authentication, and after the authentication is completed, the device information, the automatic The login account is stored in the operating system. The method further includes the following steps: When the boot firmware executes a reboot, it reads the shared memory to retrieve the paired personal mobile device and secure authentication data, searches for the personal mobile device, connects to it, and requests the personal mobile device to perform The user authentication; the user passes the personal mobile device to complete the authentication user, and then the personal mobile device responds to the boot firmware; when the boot firmware receives the authentication completion response status, write " The matched device information and the automatic login account of the operating system" are stored in the shared memory and read by the operating system. 如請求項1所述之基於資訊安全的三方驗證方法,當上述步驟執行至「由該作業系統利用該裝置資訊、該自動登入帳號直接向該個人行動裝置取得一回應帳號之密碼,以自動登入該作業系統」之步驟,該方法更包括以下次步驟:當該作業系統執行作業系統重新啟動,由該作業系統讀取該共用記憶體,並取出配對之該裝置資訊及該自動登入帳號,並搜尋該個人行動裝置,並與其連線並詢問登入帳號之密碼;當該個人行動裝置收到該作業系統發出的詢問,則立即回應一登入帳號之密碼,該作業系統根據該登入帳號之密碼,自動的在該作業系統登入帳號。 For the information security-based three-party authentication method described in claim 1, when the above steps are executed to "the operating system uses the device information and the automatic login account to directly obtain a response account password from the personal mobile device to automatically log in The operating system" step, the method further includes the following steps: when the operating system restarts the operating system, the operating system reads the shared memory, and retrieves the paired device information and the automatic login account, and Search for the personal mobile device, connect to it, and ask for the password of the login account; when the personal mobile device receives the query from the operating system, it immediately responds to the password of a login account. The operating system will respond to the password of the login account, Automatically log in to the account in the operating system. 如請求項2所述之基於資訊安全的三方驗證方法,進一步提供一解除配對之流程,該方法更包括以下步驟:由該作業系統的一解鎖應用程式,解除配對的該個人行動裝置;以及刪除該共用記憶體之該個人行動裝置的配對記錄。 The three-party authentication method based on information security as described in claim 2 further provides a process of unpairing. The method further includes the following steps: unlocking the application from the operating system, unpairing the personal mobile device; and deleting The pairing record of the personal mobile device of the shared memory. 一種基於資訊安全的三方驗證之一次性認證方法,係運作於一個人行動裝置與一電腦裝置之間,該個人行動裝置安裝並執行一應用程式,且該電腦裝置具有一開機韌體、一作業系統,該方法包括以下步驟: 由該作業系統與該個人行動裝置建立配對以取得一裝置資訊、一認證資料及一自動登入帳號,並儲存於該開機韌體;由該開機韌體與該個人行動裝置進行配對與執行一使用者認證,並且於認證完成後,將一直接登入命令、該自動登入帳號及對應的一自動登入密碼儲存於該作業系統;以及由該作業系統直接根據該自動登入帳號、該自動登入密碼,進行自動登入;當上述步驟執行至「由該作業系統與該個人行動裝置建立配對以取得一裝置資訊、一認證資料及一自動登入帳號,並儲存於該開機韌體」之步驟,該方法更包括以下次步驟:該作業系統搜尋該個人行動裝置,並與其配對並要求使用者輸入一登入帳號之密碼;由該個人行動裝置將該登入帳號與密碼儲存,並且回應狀態及安全的認證資料至該作業系統;由該作業系統寫入「配對之該裝置資訊與該安全的認證資料以及該作業系統之安全的認證資料及該作業系統之自動登入帳號」至一共用記憶體,並供該開機韌體讀取;當上述步驟執行至「由該開機韌體與該個人行動裝置進行配對與執行一使用者認證,並且於認證完成後,將一直接登入命令、該自動登入帳號及對應的一自動登入密碼儲存於該作業系統」之步驟,該方法更包括以下次步驟:當該開機韌體執行重新啟動開機,則讀取該共用記憶體,以取出配對之該個人行動裝置及安全的認證資料,並搜尋該個人行動裝置,並與其連線並要求該個人行動裝置進行該使用者認證,以及傳送指定該作業系統登入帳號的密碼; 使用者通過該個人行動裝置,以完成認證使用者,再由該個人行動裝置向該開機韌體回應狀態及該作業系統指定登入帳號之密碼;當該開機韌體收到認證完成之回應狀態及登入帳號之密碼,則寫入「直接登入之命令與該作業系統自動登入之帳號與密碼」至該共用記憶體,並供該作業系統讀取。 A one-time authentication method based on information security for three-party verification, which operates between a personal mobile device and a computer device. The personal mobile device installs and executes an application program, and the computer device has a boot firmware and an operating system , The method includes the following steps: The operating system is paired with the personal mobile device to obtain a device information, an authentication data, and an automatic login account, and stored in the boot firmware; the boot firmware and the personal mobile device are paired and executed User authentication, and after the authentication is completed, a direct login command, the automatic login account, and the corresponding automatic login password are stored in the operating system; and the operating system directly performs operations based on the automatic login account and the automatic login password. Automatic login; when the above steps are performed to the step of "establishing a pairing between the operating system and the personal mobile device to obtain a device information, an authentication data, and an automatic login account, and store it in the boot firmware", the method further includes The following steps: the operating system searches for the personal mobile device, matches it with it, and requires the user to enter a password for a login account; the personal mobile device stores the login account and password, and responds with status and security authentication data to the Operating system; the operating system writes "the paired device information and the secure authentication data, the secure authentication data of the operating system and the automatic login account of the operating system" to a shared memory, and the boot firmware Body reading; when the above steps are performed to "pairing the boot firmware with the personal mobile device and performing a user authentication, and after the authentication is completed, a direct login command, the automatic login account and the corresponding automatic The step of storing the login password in the operating system", the method further includes the following steps: when the boot firmware executes a reboot, read the shared memory to retrieve the paired personal mobile device and secure authentication data , And search for the personal mobile device, connect to it, request the personal mobile device to authenticate the user, and send the password specifying the operating system login account; The user passes the personal mobile device to complete the authentication user, and then the personal mobile device responds to the boot firmware and the password of the specified login account of the operating system; when the boot firmware receives the authentication completion response status and The password of the login account is written into the shared memory for the command to log in directly and the account and password for automatic login of the operating system for the operating system to read. 如請求項4所述之基於資訊安全的三方驗證之一次性認證方法,當上述步驟執行至「由該作業系統直接根據該自動登入帳號、該自動登入密碼,進行自動登入」之步驟,該方法更包括以下次步驟:當該作業系統執行作業系統重新啟動,由該作業系統讀取該共用記憶體,並取出直接登入之帳號及密碼,使該作業系統自動登入帳號。 For the one-time authentication method based on information security-based three-party authentication as described in claim 4, when the above steps are executed to the step of "automatic login by the operating system directly based on the automatic login account and the automatic login password", the method It further includes the following steps: when the operating system executes the operating system restart, the operating system reads the shared memory, and retrieves the account and password for direct login, so that the operating system automatically logs in to the account. 如請求項5所述之基於資訊安全的三方驗證之一次性認證方法,進一步提供一解除配對之流程,該方法更包括以下步驟:由該作業系統的一解鎖應用程式,解除配對;以及刪除該共用記憶體之配對記錄。 According to claim 5, the one-time authentication method based on information security-based three-party verification further provides a process of unpairing. The method further includes the following steps: unlocking an application of the operating system, unpairing; and deleting the Matching records of shared memory.
TW107130346A 2018-08-30 2018-08-30 Three-party verification and one-time authentication method based on information security TWI698766B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW107130346A TWI698766B (en) 2018-08-30 2018-08-30 Three-party verification and one-time authentication method based on information security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW107130346A TWI698766B (en) 2018-08-30 2018-08-30 Three-party verification and one-time authentication method based on information security

Publications (2)

Publication Number Publication Date
TW202009762A TW202009762A (en) 2020-03-01
TWI698766B true TWI698766B (en) 2020-07-11

Family

ID=70766569

Family Applications (1)

Application Number Title Priority Date Filing Date
TW107130346A TWI698766B (en) 2018-08-30 2018-08-30 Three-party verification and one-time authentication method based on information security

Country Status (1)

Country Link
TW (1) TWI698766B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110167250A1 (en) * 2006-10-24 2011-07-07 Dicks Kent E Methods for remote provisioning of eletronic devices
TWI509413B (en) * 2009-01-12 2015-11-21 Os protecting method
TWI529559B (en) * 2014-05-23 2016-04-11 Insyde Software Corp Computer system with wake-up authentication and its computer equipment
US20160239669A1 (en) * 2014-10-21 2016-08-18 Soongsil University Research Consortium Techno-Park User Terminal And Method For Protecting Core Codes Of Applications Using The Same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110167250A1 (en) * 2006-10-24 2011-07-07 Dicks Kent E Methods for remote provisioning of eletronic devices
TWI509413B (en) * 2009-01-12 2015-11-21 Os protecting method
TWI529559B (en) * 2014-05-23 2016-04-11 Insyde Software Corp Computer system with wake-up authentication and its computer equipment
US20160239669A1 (en) * 2014-10-21 2016-08-18 Soongsil University Research Consortium Techno-Park User Terminal And Method For Protecting Core Codes Of Applications Using The Same

Also Published As

Publication number Publication date
TW202009762A (en) 2020-03-01

Similar Documents

Publication Publication Date Title
US9965653B2 (en) Trusted computing
US9111103B2 (en) Remote access control of storage devices
WO2018099485A1 (en) Method and device for guaranteeing terminal security
KR20220069117A (en) System access using a mobile device
JP6633228B2 (en) Data security system with encryption
TWI753286B (en) Self-encrypting device, management server, method for data security, and non-transitory machine-readable srotage medium thereof
US20150242609A1 (en) Universal Authenticator Across Web and Mobile
US10474804B2 (en) Login mechanism for operating system
TW202020706A (en) Multi-functional authentication apparatus and operating method for the same
TW201608408A (en) Wireless authentication system and method for USB storage device
JP2012009938A (en) Information processing device and program
CN109190389A (en) A kind of solid state hard disk data guard method based on USB flash disk authentication
KR100991191B1 (en) Computer security module and computer apparatus using the same
CN112668032B (en) Method and system for encrypting and decrypting computer, server and mobile equipment
CN109190365A (en) A kind of solid state hard disk data protection system based on USB flash disk authentication
US9727740B2 (en) Secure information access over network
TWI698766B (en) Three-party verification and one-time authentication method based on information security
KR102248132B1 (en) Method, apparatus and program of log-in using biometric information
JP2006031575A (en) Hard disk security management system and method therefor
WO2021120066A1 (en) Mobile storage device, storage system, and storage method
CN109190364A (en) A kind of safe U disc for solid state hard disk authentication
KR102366869B1 (en) System and method for extending and providing digital key service
EP3915030B1 (en) Storage of network credentials
JP2000222289A (en) Information processor and storage medium storing program to be used for the same
WO2023142743A1 (en) Device unlocking method and apparatus, electronic device and computer-readable storage medium