WO2012031508A1 - 计算机存储器访问的控制方法和计算机 - Google Patents

计算机存储器访问的控制方法和计算机 Download PDF

Info

Publication number
WO2012031508A1
WO2012031508A1 PCT/CN2011/077454 CN2011077454W WO2012031508A1 WO 2012031508 A1 WO2012031508 A1 WO 2012031508A1 CN 2011077454 W CN2011077454 W CN 2011077454W WO 2012031508 A1 WO2012031508 A1 WO 2012031508A1
Authority
WO
WIPO (PCT)
Prior art keywords
computer
command
memory
authentication
data
Prior art date
Application number
PCT/CN2011/077454
Other languages
English (en)
French (fr)
Inventor
于红旗
徐欣
吴佳
Original Assignee
湖南源科高新技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 湖南源科高新技术有限公司 filed Critical 湖南源科高新技术有限公司
Publication of WO2012031508A1 publication Critical patent/WO2012031508A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Definitions

  • the present invention relates to the field of computer technologies, and in particular, to a computer memory access control method and computer.
  • BACKGROUND OF THE INVENTION The importance of computers in our lives is increasing, and the convenience and efficiency of their use make us more and more convinced and dependent on it. Often the most important information is given to it for safekeeping.
  • data security risks in the data stored in the computer There are two types of data security risks: memory failure and illegal reading. The former can prevent memory failures by using the highest quality hard disk as an accessory and a protection against falling and shock. For illegal reading, many computer users, whether individuals or businesses, have no data security awareness, no data protection, and the company's related data is stolen, causing the relevant departments to spend a lot of energy to remedy.
  • the password can be set on the computer, but the current password is based on the operating system's power-on password, which is easier to crack, thus accessing the memory, and the memory has no access restrictions, resulting in the user's data being easily lost.
  • the present invention is directed to a control method and computer for computer memory access, which can solve the problem that the memory of the computer has no access restriction and the user's data is easily lost.
  • a control method for computer memory access comprising: the computer receiving a request to access a memory; the computer transmitting an authentication signal through a wireless network, receiving an authentication response; The authentication response determines whether the authentication is successful; if it is determined that the authentication is successful, access to the computer memory is permitted.
  • the method further comprises: the computer receiving a command to clear data through a wireless network, or sensing a command to be detached to generate the clear data; the computer performing the clearing A command of data to clear the data of the memory.
  • the method further includes: the computer receiving a command to clear data through the wireless network, or sensing to be disassembled to generate the clearing Command of data; the computer executes the command to clear data, and clears data of the memory.
  • the method further includes: the computer receiving the command to clear the data through the wireless network, or sensing to be disassembled Generating the command to clear data; the computer executing the command to clear data to clear data of the memory.
  • the method further includes: the computer issuing a prompt for inputting a password through the wireless network, and matching whether the received password is correct; if the password received by the verification is correct, entering the operating system; If the received password is incorrect, the computer shuts down.
  • the method further includes: the computer receiving the power-on signal, and sending a request for power-on through the wireless network; the computer determining whether the power-on command is received within a predetermined time, if When it is determined that the power-on command is received, a power-on command is executed to start the computer; if it is determined that the power-on command is not received, the power is turned off.
  • the power-on command herein may be a power-on command that the user terminal returns to the computer after confirming the power-on after receiving the power-on request from the computer.
  • the memory is a solid state hard disk or a mechanical hard disk.
  • the computer receives the access request or the command to clear the data by SMS or mail.
  • a computer including a memory, a wireless module, further includes: a microprocessor, configured to, after receiving a request to access the memory, control the wireless module to send a certificate through a wireless network A weight signal; determining whether the authentication is successful by the received authentication response, and if so, allowing the request to access the memory.
  • the computer further includes a sensor and a power source, wherein the memory, the wireless module, the microprocessor, the sensor, and the power source are packaged inside the computer; and the sensor is configured to sense that after the computer is disassembled, Generating a command to clear data;
  • the microprocessor includes: an authentication module, configured to: after receiving the request to access the memory, control the wireless module to receive an authentication signal through the wireless network; The authentication response determines whether the authentication is successful, and if so, allows the request to access the memory; the microprocessor further includes: a read/write module, configured to receive a command to clear data through the wireless module or the sensor, to clear the location Describe the data in the memory.
  • the microprocessor further includes: a password matching module, configured to send, by the wireless module, a prompt for inputting a password through the wireless network, and according to the matching of the password, before the authentication module performs an operation In case, the computer is controlled to enter the operating system or shut down the computer.
  • the microprocessor further includes: a power control module, configured to: after the computer receives the power-on signal, before the password matching module sends a request for a password through the wireless network, whether the wireless module sends out Power-on command; Select to execute the power-on command or turn off the power according to the received power-on command within the predetermined time.
  • the memory is a solid state hard disk or a mechanical hard disk.
  • the wireless module is a communication module using GSM, CDMA, wifi or 3G communication technology.
  • the computer is a desktop or a notebook computer.
  • the invention can access the memory of the computer after being authenticated by the command from the wireless network; the computer is powered on and enters the authentication process of the system, thereby increasing the security of the computer. It avoids the problem of free access to the memory after accessing the computer system, and the security of the data is low, thereby improving the confidentiality and security of the user data.
  • the drawings are intended to provide a further understanding of the invention, and are intended to be a part of the invention.
  • FIG. 1 is a block diagram showing the internal structure of a computer in the first embodiment
  • FIG. 1 is a block diagram of a computer in a first embodiment of the present invention, comprising: a microprocessor 10, a wireless module 12, a memory 14, a sensor 16, and a power source 18.
  • the microprocessor 10 can be connected to the wireless module 12, the memory 14, the sensor 16, and the power source 18 via corresponding data lines in the computer.
  • the wireless module 12 can employ communication technologies such as GSM, CDMA, Wifi or 3G;
  • the memory 14 can be a solid state hard disk SSD or a mechanical hard disk, etc., and the power source 18 can also be a battery; these components are packaged in a computer if the computer is not authorized.
  • the sensor 16 sends a trigger signal to the microprocessor 10 to clear the data.
  • the process of clearing data based on the computer in the first embodiment will be described in detail below through the second embodiment. Referring to Figures 1 and 2, the following steps are included:
  • S20 The microprocessor 10 receives a request to access the memory.
  • the microprocessor 10 sends an authentication signal through the wireless module 12, and receives an authentication response.
  • the authentication signal may be that the other party is required to input a password, a user name, and the like, and the authentication response is a username or a password.
  • the authentication signal may also be a verification code, and the receiver processes the verification code by using an algorithm to generate a new verification code, and then replies to the computer as an authentication response.
  • S24 Determine, by the authentication response, whether the authentication is successful, and allow access to the memory.
  • the microprocessor 10 in the computer uses the same algorithm to generate a new verification code, which is compared with the received verification code. If they are the same, it is determined that the authorization is successful. It is also possible that the microprocessor 10 determines that it is an authorized user if the received username or password is correct.
  • the user can also issue a command to clear the data through the wireless network, or after the authentication signal is sent, if the authentication result is that the current user is an illegal user, the user actively Issue or computer automatically issues a command to clear data; memory 14, wireless module 12, microprocessor 10,
  • the sensor 16 and the power source 18 are packaged inside the computer to prevent an illegal user from directly disassembling the memory 14, or if the memory 14 is removed without authorization, and after the sensor 16 is sensed to be detached, a command to clear the data is issued to the microprocessor 10, Processor 10 clears the data in memory 14.
  • the memory 14, the wireless module 12, the microprocessor 10, the sensor 16, and the power source 18 are encapsulated in the computer.
  • the third embodiment includes:
  • the computer receives a command to clear data through a wireless network, or senses a command to be disassembled to generate the cleared data.
  • the user can issue a command to clear the data through the wireless network, and the computer will receive a command to clear the data after the activation; after the authentication signal is sent, if the authentication result is that the current user is an illegal user, the user terminal actively sends out or The computer automatically issues a command to clear the data.
  • the user terminal in this embodiment may be a mobile phone terminal.
  • the computer may control the wireless module to send a request for clearing data to the user terminal, where the user terminal confirms the request for clearing data.
  • the command for clearing the data is sent to the computer, and the method for sending the command for clearing the data may be a method such as a mobile phone short message.
  • the memory 14, the wireless module 12, the microprocessor 10, the sensor 16, and the power source 18 can be packaged inside the computer to prevent an unauthorized user from directly disassembling the memory 14, or if the memory 14 is removed without authorization, the sensor 16 senses that it has been removed. Send a command to the microprocessor 10 to clear the data.
  • the computer executes the command to clear data, and clears data of the memory 14.
  • the computer may receive a command to clear data through the wireless network before the user is authenticated, authenticated, or authenticated, and may also receive a command for the sensor 16 to sense the cleared data that is disassembled. Therefore, the user's memory is prevented from being forcibly accessed without authorization, resulting in data loss.
  • the computer may issue a clear The command of the data, or the microprocessor 10 of the computer automatically issues a command to clear the data; after the user authenticates, if an illegal user logs into the computer, the microprocessor 10 automatically issues a command to clear the data.
  • the power-on authority of the computer or the right to enter the system may be set, and the computer receives the authorization verification through the wireless network, and passes the verification. After that, power up the computer or enter the system. For such a scheme, it is explained by the fourth embodiment, referring to FIG. 1 and FIG. 4, including the following steps:
  • S402 The computer is powered on, and the wireless module 12 sends the initiated authentication request.
  • the microprocessor 10 controls the wireless module 12 to send a message to the network, such as a short message, a packet data command, or an email authentication request. .
  • the wireless module 12 determines whether the user's start command is received within a predetermined time; if yes, executes S406 to start the computer; if not, waits for the trigger again, and returns to step S402.
  • S406 The computer determines whether the authentication is successful. After receiving the startup command of the user, the wireless module 12 performs authentication by using a startup command, and the startup command may adopt a login password, etc., if yes, execute S408, and the computer is powered on; , then execute S414.
  • S408 The computer is powered on, but does not enter the operating system.
  • the microprocessor 10 again sends a request for authentication to the user via the wireless module 12.
  • the microprocessor 10 receives the command to enter the system through the wireless module 12, determines whether the authentication is passed by the command, the authentication process may take the form of a login password, etc.; if yes, execute S412; if not, execute S414.
  • S412 The microprocessor 10 controls the computer to enter the system.
  • S414 The microprocessor 10 controls the computer to shut down and/or turn off the power.
  • the user can enter the computer system and perform various operations. Before accessing the computer memory 14, it is also possible to select whether to perform the authentication process in the first embodiment.
  • the authorization process of powering on the computer and entering the system can be added before the memory 14 of the computer is accessed, thereby increasing the security of the computer.
  • Various embodiments of the method of the present invention have been described in detail above, and the method of the present invention can be integrated into various components as in the first embodiment, which can be installed in a small server, a desktop computer or a mobile notebook computer. The structure of a notebook computer is described in detail below through Embodiment 5. Referring to FIG.
  • the device includes: a memory 14, a wireless module 12, a microprocessor 10, a sensor 16, and a power source 18;
  • the microprocessor 10 is configured to, after receiving the request for accessing the memory 14, control the wireless module 12 to send an authentication signal through the wireless network; and determine the authorized user by the received authentication response, allowing the access memory 14 requests.
  • the computer further includes a sensor and a power source; the memory 14, the wireless module 12, the microprocessor 10, the sensor 16 and the power source 18 are packaged inside the computer; the sensor 16 is configured to sense the computer After being disassembled, generating a command to clear data, or generating a request for clearing data, and forwarding the request for clearing data to the user terminal, where the user terminal sends the command to clear the data after confirming the request for clearing data Computer.
  • the microprocessor 10 includes: an authentication module 100, configured to, after receiving a request to access the memory 14, control the wireless module 12 to receive an authentication signal through a wireless network; and determine, by the received authentication response, The authorized user allows the request to access the memory 14; the microprocessor 10 further includes: a read/write module 102, configured to receive a command to clear data through the wireless module 12 or the sensor 16, and clear the memory 14 The data. Further, the microprocessor 10 further includes: a password matching module 104, configured to send a prompt for inputting a password through the wireless network through the wireless module 12 before the authentication module 100 performs an operation, and according to the The matching of the passwords, controlling the computer to enter the operating system or shut down the computer.
  • an authentication module 100 configured to, after receiving a request to access the memory 14, control the wireless module 12 to receive an authentication signal through a wireless network; and determine, by the received authentication response, The authorized user allows the request to access the memory 14
  • the microprocessor 10 further includes: a read/write module 102, configured
  • the microprocessor 10 further includes: a power control module 106, configured to: after the computer receives the power-on signal, the password matching module 104 sends a wireless network to request a password prompt, before the wireless Module 12 issues a command to power up; select to execute a power up command or turn off the power according to the received power up command within a predetermined time.
  • the memory 14 is a solid state hard disk or a mechanical hard disk.
  • the wireless module 12 is a communication module that adopts GSM, CDMA, wifi or 3G communication technologies.
  • the computer is a desktop or a notebook computer. In the above embodiment, the data security in the user memory is improved by the plurality of modules in the microprocessor in the case of multiple authentications to the user.
  • the microprocessor in each embodiment can adopt 51 single-chip microcomputer, and directly controls the memory through the single chip microcomputer. For some memories, a solid state drive is used and a hard disk controller is configured. The microprocessor can also control the reading and writing of data through the hard disk controller. If the wireless module uses the GSM module, the microprocessor can use the AT command to set parameters through the serial port.
  • modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device so that they may be stored in the storage device by the computing device, or they may be separately fabricated into individual integrated circuit modules, or Multiple modules or steps are made into a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.
  • the above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

计算机存储器访问的控制方法和计算机 技术领域 本发明涉及计算机技术领域, 更具体地, 涉及一种计算机存储器访问的控制方法 和计算机。 背景技术 计算机在我们生活中的重要性与日聚增, 它使用时的便利与高效, 使得我们对它 越来越相信、 越来越依赖。 往往会把最重要的资料都交给它来保管。 计算机存储的资料也会存在数据安全隐患, 数据安全隐患大概分为两类: 存储器 出故障和非法读取。 前者可通过最优质的硬盘作为配件、 采用防摔抗震的保护装置来防止存储器故障 等。 对于非法读取, 很多计算机使用者, 不管是个人还是企业, 由于没有数据方面的 安全意识, 没有对数据进行保护, 公司的相关资料所在的笔记本被盗, 导致相关部门 花费很多精力来补救。 对于非法读取, 在计算机上都可设置密码, 但目前的密码都是基于操作系统的开 机密码, 比较容易破解, 从而访问存储器, 而存储器没有访问限制, 导致用户的数据 容易丢失。 发明内容 本发明旨在提供一种计算机存储器访问的控制方法和计算机, 能够解决计算机的 存储器没有访问限制, 导致用户的数据容易丢失的问题。 根据本发明的一个方面, 提供了一种计算机存储器访问的控制方法, 包括: 所述 计算机收到访问存储器的请求; 所述计算机通过无线网络发出鉴权信号, 接收到鉴权 响应; 通过所述鉴权响应判断鉴权是否成功; 如果判定鉴权成功, 则允许访问所述计 算机存储器。 优选地, 在判定鉴权未成功之后, 所述方法还包括: 所述计算机通过无线网络接 收清除数据的命令、 或感应到被拆卸而生成所述清除数据的命令; 所述计算机执行所 述清除数据的命令, 清除所述存储器的数据。 优选地, 在所述计算机通过无线网络发出鉴权信号, 以及接收鉴权响应之前, 所 述方法还包括: 所述计算机通过无线网络接收清除数据的命令、 或感应到被拆卸而生 成所述清除数据的命令; 所述计算机执行所述清除数据的命令, 清除所述存储器的数 据。 优选地, 在所述计算机收到访问存储器的请求, 并通过无线网络发出鉴权信号的 过程中, 所述方法还包括: 所述计算机通过无线网络接收清除数据的命令、 或感应到 被拆卸而生成所述清除数据的命令; 所述计算机执行所述清除数据的命令, 清除所述 存储器的数据。 优选地, 在所述计算机收到访问请求之前, 还包括: 所述计算机通过无线网络发 出要求输入密码的提示, 并匹配接收的密码是否正确; 如果验证接收的密码正确, 则 进入操作系统; 如果验证接收的密码不正确, 则所述计算机关机。 优选地, 所述计算机输出提示之前, 还包括: 所述计算机接收加电信号, 并通过 所述无线网络发出是否加电的请求; 所述计算机在预定时间内判断是否接收到加电命 令, 如果判定接收到所述加电命令, 则执行加电命令, 启动计算机; 如果判定未接收 到所述加电命令, 则关闭电源。 此处的加电命令可以是用户终端在接收到计算机的加 电请求之后, 在确认加电之后向该计算机返回的加电命令。 优选地, 所述存储器为固态硬盘或机械式硬盘。 优选地, 所述计算机通过短信或邮件接收所述访问请求或清除数据的命令。 根据本发明的另一个方面, 还提供一种计算机, 包括存储器, 无线模块, 还包括: 微处理器, 用于在收到访问所述存储器的请求后, 控制所述无线模块通过无线网络发 出鉴权信号; 通过接收的鉴权响应判断鉴权是否成功, 如果是, 则允许所述访问存储 器的请求。 优选地, 所述计算机还包括传感器和电源, 其中, 所述存储器、 无线模块、 微处 理器、 传感器和电源封装在所述计算机内部; 所述传感器, 用于感应到所述计算机被 拆卸后, 生成清除数据的命令; 所述微处理器包括: 鉴权模块, 用于在接收到访问所 述存储器的请求后, 控制所述无线模块通过无线网络接收发出鉴权信号; 通过接收的 鉴权响应判断鉴权是否成功, 如果是, 则允许所述访问存储器的请求; 所述微处理器 还包括: 读写模块, 用于通过所述无线模块或传感器接收清除数据的命令, 清除所述 存储器中的数据。 优选地, 所述微处理器内还包括: 密码匹配模块, 用于在所述鉴权模块执行操作 之前, 通过所述无线模块通过无线网络发出要求输入密码的提示, 并根据所述密码的 匹配情况, 控制所述计算机进入操作系统或关闭计算机。 优选地, 所述微处理器内还包括: 电源控制模块, 用于在所述计算机接收加电信 号后, 所述密码匹配模块通过无线网络发出要求输入密码提示之前, 通过所述无线模 块发出是否加电的命令; 在预定时间内根据接收的加电命令, 选择执行加电命令或关 闭电源。 优选地, 所述存储器为固态硬盘或机械式硬盘。 优选地, 所述无线模块为采用 GSM、 CDMA, wifi或 3G通信技术的通信模块。 优选地, 所述计算机为台式机或笔记本电脑。 本发明, 通过来自无线网络的命令, 经过鉴权之后, 才能访问计算机的存储器; 增加了计算机加电、 进入系统的鉴权过程, 从而增加计算机的安全性。 避免了进入计 算机的系统后, 自由访问存储器, 数据的安全性较低的问题, 进而提高了用户数据的 保密性和安全性。 附图说明 附图用来提供对本发明的进一步理解, 构成本申请的一部分, 本发明的示意性实 施例及其说明用于解释本发明, 并不构成对本发明的不当限定。 在附图中: 图 1示出了实施例一中的计算机内部结构图; 图 2示出了实施例二的计算机存储器访问的控制方法的流程图; 图 3示出了实施例三的计算机存储器访问的控制方法的流程图; 图 4示出了实施例四的计算机存储器访问的控制方法的流程图; 图 5示出了实施例五中的计算机内部结构图。 具体实施方式 下面将参考附图并结合实施例, 来详细说明本发明。 本发明实施例中的方案可及 时清除笔记本电脑中的数据。 参见图 1, 图 1是本发明实施例一中的计算机结构图, 包括: 微处理器 10、 无线 模块 12、 存储器 14、 传感器 16和电源 18。 其中, 微处理器 10可按照在计算机内, 通过相应的数据线与无线模块 12、 存储 器 14、传感器 16和电源 18相连接。无线模块 12可以采用 GSM、 CDMA、 Wifi或 3G 等通信技术; 存储器 14可采用固态硬盘 SSD或机械硬盘等, 电源 18也可以采用蓄电 池; 这些部件被封装在计算机内, 如果计算机在没有授权的情况下被拆卸, 则传感器 16会向微处理器 10发送清除数据的触发信号。 下面通过实施例二详细说明基于实施例一中的计算机进行数据清楚的过程。 参见 图 1和图 2, 包括以下步骤:
S20: 微处理器 10收到访问存储器的请求。
S22: 微处理器 10通过无线模块 12发出鉴权信号, 接收到鉴权响应。 鉴权信号可以为要求对方输入密码、 用户名等信息, 鉴权响应为用户名或密码。 鉴权信号还可以是验证码, 由接收方采用算法处理验证码, 生成新的验证码后, 作为 鉴权响应回复计算机。
S24: 通过所述鉴权响应判断鉴权是否成功, 则允许访问所述存储器。 计算机内的微处理器 10 采用相同算法生成新的验证码, 与接收的验证码进行比 较, 如果相同, 则确定为授权成功。还可以是微处理器 10如果接收的用户名或密码正 确, 确定为授权用户。 通过上述的方案, 计算机的存储器在接受用户访问时, 需要通过无线网络接收到 授权许可以后, 才能允许访问, 从而避免在没有得到授权的情况下, 访问计算机的存 储器, 提高了用户的数据保密性。 上面通过实施例二详细说明了计算机的存储器接受访问的过程。 优选地, 特别是 当计算机出现丢失的情况, 计算机启动后, 用户还可通过无线网络发出清除数据的命 令, 或在发出鉴权信号之后, 如果鉴权结果为当前用户是非法用户, 则用户主动发出 或计算机自动发出清除数据的命令; 还可将存储器 14、 无线模块 12、 微处理器 10、 传感器 16和电源 18封装在计算机内部, 防止非法用户直接拆卸存储器 14, 或如果没 有通过授权许可, 拆卸存储器 14, 通过传感器 16感应到被拆卸后, 向微处理器 10发 出清除数据的命令, 微处理器 10清除存储器 14中的数据。 下面通过实施例三说明, 在实施例三中, 存储器 14、 无线模块 12、 微处理器 10、 传感器 16和电源 18封装在 计算机内部, 实施例三包括:
S30:所述计算机通过无线网络接收清除数据的命令、或感应到被拆卸而生成所述 清除数据的命令。 用户可通过无线网路发出清除数据的命令, 计算机在启动后会收到清除数据的命 令; 还可在发出鉴权信号之后, 如果鉴权结果为当前用户是非法用户, 则用户终端主 动发出或计算机自动发出清除数据的命令。 该实施例中的用户终端可以是手机终端, 当鉴权当前用户为非法用户时, 计算机 可以控制所述无线模块发出清除数据的请求至用户终端, 所述用户终端在确认所述清 除数据的请求之后发送所述清除数据的命令至所述计算机, 发送所述清除数据的命令 的方式可以是手机短信等方式。 存储器 14、 无线模块 12、 微处理器 10、 传感器 16和电源 18可封装在计算机内 部, 防止非法用户直接拆卸存储器 14, 或如果没有通过授权许可, 拆卸存储器 14, 通 过传感器 16感应到被拆卸后, 向微处理器 10发出清除数据的命令。
S32: 所述计算机执行所述清除数据的命令, 清除所述存储器 14的数据。 在该实施例三的步骤中, 计算机可在用户鉴权前、 鉴权的同时、 或鉴权后通过无 线网络接收清除数据的命令, 还可接收传感器 16 感应到被拆卸发出的清除数据的命 令, 从而避免用户的存储器在没有授权的情况下, 强制访问, 导致的数据丢失。 具体的, 在用户鉴权之前, 如果计算机检测到存储器被拆卸, 则发出清除数据的 命令; 在用户鉴权的过程中, 如果计算机检测到存储器被非法拆卸或者没有通过授权 许可,用户可以发出清除数据的命令, 或者计算机的微处理器 10自动发出清除数据的 命令; 在用户鉴权之后, 如果是非法用户登陆计算机, 微处理器 10会自动发出清除数 据的命令。 在上述的实施例中, 除了对用户访问存储器的鉴权之外, 还可设置计算机的加电 权限或启动进入系统的权限, 由计算机通过无线网络接收授权的验证, 并在验证通过 后, 加电启动计算机或进入系统。 对于这类方案, 通过实施例四进行说明, 参见图 1 和图 4, 包括以下步骤:
S402: 计算机加电启动, 无线模块 12发送启动的鉴权请求; 当计算机加电后, 微处理器 10控制无线模块 12可向网络发送消息, 如短信、 分 组数据的命令或邮件等鉴权请求。
S404: 无线模块 12在预定时间内判断是否接收到用户的启动命令; 如果是, 则执 行 S406, 启动计算机; 如果否, 则等待再次触发, 返回步骤 S402。
S406: 计算机判断鉴权是否成功, 无线模块 12接收到用户的启动命令后, 通过启 动命令进行鉴权, 启动命令可以采用登录密码等方式, 如果是, 则执行 S408, 计算机 加电启动; 如果否, 则执行 S414。
S408: 计算机加电启动, 但并不进入操作系统。 微处理器 10通过无线模块 12再 次向用户发出鉴权的请求。
S410: 微处理器 10通过无线模块 12接收到进入系统的命令, 通过命令判断鉴权 是否通过, 鉴权过程可采用登录密码的形式等; 如果是, 则执行 S412; 如果否, 则执 行 S414。
S412: 微处理器 10控制计算机进入系统。
S414: 微处理器 10控制计算机关机和 /或关闭电源。 经过上述的鉴权过程中, 用户才能进入计算机系统, 并执行各种操作, 在访问计 算机存储器 14之前, 还可选择是否执行实施例一中的鉴权过程。 采用上述的步骤, 可在计算机的存储器 14在访问之前, 增加计算机加电、进入系 统的授权过程, 从而增加计算机的安全性。 上面详细描述了本发明方法的各个实施例, 本发明的方法可集成如实施例一中的 各个部件内, 这些部件可以安装在小型服务器、 台式计算机或移动式笔记本电脑中。 下面通过实施例五详细说明一种笔记本电脑的结构, 参见图 6, 包括: 存储器 14、 无 线模块 12、 微处理器 10、 传感器 16和电源 18 ; 微处理器 10, 用于在收到访问所述存储器 14的请求后, 控制所述无线模块 12通 过无线网络发出鉴权信号; 通过接收的鉴权响应判断为授权用户, 则允许所述访问存 储器 14的请求。 进一步地, 所述计算机还包括传感器和电源; 所述存储器 14、 无线模块 12、 微处理器 10、 传感器 16和电源 18封装在所述计 算机内部; 所述传感器 16, 用于感应到所述计算机被拆卸后, 生成清除数据的命令, 或者生 成清除数据的请求, 并转发该清除数据的请求至用户终端, 所述用户终端在确认所述 清除数据的请求之后发送所述清除数据的命令至所述计算机。 所述微处理器 10包括: 鉴权模块 100,用于在接收到访问所述存储器 14的请求后,控制所述无线模块 12 通过无线网络接收发出鉴权信号; 通过接收的鉴权响应判断为授权用户, 则允许所述 访问存储器 14的请求; 所述微处理器 10还包括: 读写模块 102, 用于通过所述无线模块 12或传感器 16接收清除数据的命令, 清 除所述存储器 14中的数据。 进一步地, 所述微处理器 10内还包括: 密码匹配模块 104, 用于在所述鉴权模块 100执行操作之前, 通过所述无线模块 12通过无线网络发出要求输入密码的提示, 并根据所述密码的匹配情况, 控制所述计 算机进入操作系统或关闭计算机。 进一步地, 所述微处理器 10内还包括: 电源控制模块 106, 用于在所述计算机接收加电信号后, 所述密码匹配模块 104 通过无线网络发出要求输入密码提示之前, 通过所述无线模块 12 发出是否加电的命 令; 在预定时间内根据接收的加电命令, 选择执行加电命令或关闭电源。 步地, 所述存储器 14为固态硬盘或机械式硬盘。 进一步地, 所述无线模块 12为采用 GSM、 CDMA, wifi或 3G通信技术的通信模 块。 进一步地, 所述计算机为台式机或笔记本电脑。 在上述的实施例中, 通过微处理器内的各个模块, 在对用户多次鉴权的情况下, 提高了用户存储器内的数据安全性。当用户的计算机丢失,还可在访问存储器的前后, 清除数据, 从而提高了用户的数据保密性, 使用户的数据处于保密状态, 防止泄密。 各个实施例中的微处理器, 可采用 51单片机, 通过单片机直接控制存储器。对于有些 存储器采用固态硬盘并配置有硬盘控制器, 微处理器还可通过硬盘控制器, 控制数据 的读写。 如果无线模块采用 GSM模块, 微处理器可采用 AT命令通过串口设置参数。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可以用通用 的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布在多个计算装置所 组成的网络上, 可选地, 它们可以用计算装置可执行的程序代码来实现, 从而可以将 它们存储在存储装置中由计算装置来执行,或者将它们分别制作成各个集成电路模块, 或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。 这样, 本发明不限 制于任何特定的硬件和软件结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本领域的技 术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和原则之内, 所作的 任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。

Claims

权 利 要 求 书
1. 一种计算机存储器访问的控制方法, 其特征在于, 包括:
所述计算机收到访问存储器的请求;
所述计算机通过无线网络发出鉴权信号, 以及接收鉴权响应; 通过所述鉴权响应判断鉴权是否成功;
如果判定鉴权成功, 则允许访问所述计算机存储器。
2. 根据权利要求 1所述的方法, 其特征在于, 在判定鉴权未成功之后, 所述方法 还包括:
所述计算机通过无线网络接收清除数据的命令, 或感应到被拆卸而生成所 述清除数据的命令;
所述计算机执行所述清除数据的命令, 清除所述存储器的数据。
3. 根据权利要求 1所述的方法, 其特征在于, 在所述计算机通过无线网络发出鉴 权信号, 以及接收鉴权响应之前, 所述方法还包括:
所述计算机通过无线网络接收清除数据的命令, 或感应到被拆卸而生成所 述清除数据的命令;
所述计算机执行所述清除数据的命令, 清除所述存储器的数据。
4. 根据权利要求 1所述的方法, 其特征在于, 在所述计算机收到访问存储器的请 求, 并通过无线网络发出鉴权信号的过程中, 所述方法还包括:
所述计算机通过无线网络接收清除数据的命令, 或感应到被拆卸而生成所 述清除数据的命令;
所述计算机执行所述清除数据的命令, 清除所述存储器的数据。
5. 根据权利要求 1所述的方法, 其特征在于, 在所述计算机收到访问请求之前, 还包括:
所述计算机通过无线网络发出要求输入密码的提示, 并验证接收的密码是 否正确; 如果验证接收的密码正确,则进入操作系统;如果验证接收的密码不正确, 则所述计算机关机。
6. 根据权利要求 5所述的方法, 其特征在于, 所述计算机通过无线网络发出要求 输入密码提示之前, 还包括:
所述计算机接收加电信号, 并通过所述无线网络发出是否加电的请求; 所述计算机在预定时间内判断是否接收到加电命令, 如果判定接收到所述 加电命令, 则执行所述加电命令, 启动计算机; 如果判定未接收到所述加电命 令, 则关闭电源。
7. 根据权利要求 1所述的方法, 其特征在于, 所述存储器为固态硬盘或机械式硬
8. 根据权利要求 1所述的方法, 其特征在于, 所述计算机通过短信或邮件接收所 述访问请求或清除数据的命令。
9. 一种计算机, 包括存储器, 无线模块, 其特征在于, 还包括:
微处理器, 用于在收到访问所述存储器的请求后, 控制所述无线模块通过 无线网络发出鉴权信号, 并且, 所述微处理器还通过接收的鉴权响应判断鉴权 是否成功, 如果是, 则允许所述访问存储器的请求。
10. 根据权利要求 9所述的计算机,其特征在于,所述计算机还包括传感器和电源, 其中,
所述存储器、 所述无线模块、 所述微处理器、 所述传感器和所述电源封装 在所述计算机内部;
所述存储器为固态硬盘或机械式硬盘;
所述无线模块为采用 GSM、 CDMA, wifi或 3G通信技术的通信模块; 所述传感器, 用于感应到所述计算机被拆卸后, 生成清除数据的命令; 所述微处理器包括:
鉴权模块, 用于在接收到访问所述存储器的请求后, 控制所述无线模块通 过无线网络接收发出鉴权信号, 并且所述鉴权模块通过接收的鉴权响应判断鉴 权是否通过, 如果是, 则允许所述访问存储器的请求;
所述微处理器还包括: 读写模块, 用于通过所述无线模块或传感器接收清除数据的命令, 清除所 述存储器中的数据。
11. 根据权利要求 10所述的计算机, 其特征在于, 所述微处理器内还包括:
密码匹配模块, 用于在所述鉴权模块执行操作之前, 通过所述无线模块通 过无线网络发出要求输入密码的提示, 并根据所述密码的匹配情况, 控制所述 计算机进入操作系统或关闭计算机。
12. 根据权利要求 11所述的计算机, 其特征在于, 所述微处理器内还包括:
电源控制模块, 用于在所述计算机接收加电信号后, 所述密码匹配模块输 出提示之前, 通过所述无线模块发出是否加电的命令; 在预定时间内根据接收 的加电命令, 选择执行所述加电命令或关闭电源。
PCT/CN2011/077454 2010-09-07 2011-07-21 计算机存储器访问的控制方法和计算机 WO2012031508A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010274012.5A CN101937404B (zh) 2010-09-07 2010-09-07 计算机存储器访问的控制方法和计算机
CN201010274012.5 2010-09-07

Publications (1)

Publication Number Publication Date
WO2012031508A1 true WO2012031508A1 (zh) 2012-03-15

Family

ID=43390741

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/077454 WO2012031508A1 (zh) 2010-09-07 2011-07-21 计算机存储器访问的控制方法和计算机

Country Status (3)

Country Link
CN (1) CN101937404B (zh)
HK (1) HK1152398A1 (zh)
WO (1) WO2012031508A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101937404B (zh) * 2010-09-07 2014-01-08 湖南源科高新技术有限公司 计算机存储器访问的控制方法和计算机
CN101916233B (zh) * 2010-09-14 2013-04-10 湖南源科高新技术有限公司 计算机的数据清除方法和计算机
CN102521169B (zh) * 2011-12-30 2014-10-22 郑州信大捷安信息技术股份有限公司 带显示屏的保密usb存储盘及其安全控制方法
CN102568555A (zh) * 2012-01-31 2012-07-11 郑州信大捷安信息技术股份有限公司 基于移动模块的usb存储盘及其远程管理方法
CN104182674A (zh) * 2014-08-12 2014-12-03 清华大学深圳研究生院 一种固态硬盘的保护装置
CN106919863A (zh) * 2017-02-21 2017-07-04 联想长风科技(北京)有限公司 一种自毁硬盘装置

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050182909A1 (en) * 2003-12-23 2005-08-18 Stmicroelectronics S.A. Memory access control in an electronic apparatus
CN101221606A (zh) * 2007-01-12 2008-07-16 迈世亚(北京)科技有限公司 移动存储设备和移动存储设备的认证方法
CN101403996A (zh) * 2008-10-28 2009-04-08 成都市华为赛门铁克科技有限公司 一种数据安全保护方法及装置
US20090119468A1 (en) * 2007-11-07 2009-05-07 Qualcomm Incorporated Systems, methods, and apparatuses for erasing memory on wireless devices
CN101706853A (zh) * 2009-11-10 2010-05-12 徐欣 基于固态硬盘的防失密自毁系统
CN101782951A (zh) * 2009-11-10 2010-07-21 徐欣 硬盘远程销毁防盗系统和方法
CN101916233A (zh) * 2010-09-14 2010-12-15 湖南源科高新技术有限公司 计算机的数据清除方法和计算机
CN101937404A (zh) * 2010-09-07 2011-01-05 湖南源科高新技术有限公司 计算机存储器访问的控制方法和计算机

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7178031B1 (en) * 1999-11-08 2007-02-13 International Business Machines Corporation Wireless security access management for a portable data storage cartridge
US20050186954A1 (en) * 2004-02-20 2005-08-25 Tom Kenney Systems and methods that provide user and/or network personal data disabling commands for mobile devices
US7624279B2 (en) * 2005-06-29 2009-11-24 Lenovo Singapore Pte. Ltd. System and method for secure O.S. boot from password-protected HDD
CN101504630A (zh) * 2009-03-02 2009-08-12 成都市华为赛门铁克科技有限公司 一种存储设备数据销毁的方法和存储设备

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050182909A1 (en) * 2003-12-23 2005-08-18 Stmicroelectronics S.A. Memory access control in an electronic apparatus
CN101221606A (zh) * 2007-01-12 2008-07-16 迈世亚(北京)科技有限公司 移动存储设备和移动存储设备的认证方法
US20090119468A1 (en) * 2007-11-07 2009-05-07 Qualcomm Incorporated Systems, methods, and apparatuses for erasing memory on wireless devices
CN101403996A (zh) * 2008-10-28 2009-04-08 成都市华为赛门铁克科技有限公司 一种数据安全保护方法及装置
CN101706853A (zh) * 2009-11-10 2010-05-12 徐欣 基于固态硬盘的防失密自毁系统
CN101782951A (zh) * 2009-11-10 2010-07-21 徐欣 硬盘远程销毁防盗系统和方法
CN101937404A (zh) * 2010-09-07 2011-01-05 湖南源科高新技术有限公司 计算机存储器访问的控制方法和计算机
CN101916233A (zh) * 2010-09-14 2010-12-15 湖南源科高新技术有限公司 计算机的数据清除方法和计算机

Also Published As

Publication number Publication date
CN101937404A (zh) 2011-01-05
HK1152398A1 (en) 2012-02-24
CN101937404B (zh) 2014-01-08

Similar Documents

Publication Publication Date Title
US11233630B2 (en) Module with embedded wireless user authentication
US10783232B2 (en) Management system for self-encrypting managed devices with embedded wireless user authentication
US9577994B2 (en) Off-host authentication system
JP5657811B2 (ja) ハードウェアベースセキュリティエンジンを用いるセキュアソフトウェアライセンシング及びプロビジョニング
JP6633228B2 (ja) 暗号を伴うデータセキュリティシステム
US11190936B2 (en) Wireless authentication system
KR101654778B1 (ko) 하드웨어 강제 액세스 보호
US20070174906A1 (en) System and Method for the Secure, Transparent and Continuous Synchronization of Access Credentials in an Arbitrary Third Party System
WO2012031508A1 (zh) 计算机存储器访问的控制方法和计算机
TWI424321B (zh) 雲端儲存系統及方法
JP2009528582A (ja) 無線認証
JP2007336287A (ja) 電子機器および無線接続制御方法
EP4242902A2 (en) Self-encrypting module with embedded wireless user authentication
US8181032B2 (en) Method and apparatus with chipset-based protection for local and remote authentication of booting from peripheral devices
EP3198518B1 (en) Prevention of cable-swap security attack on storage devices
JP2010020751A (ja) コンテンツ保護方法、コンピュータシステム、及び記憶媒体
WO2012034453A1 (zh) 计算机的数据清除方法和计算机
WO2011127697A1 (zh) 一种移动终端的安全管理方法及移动终端
WO2019205590A1 (zh) 电池认证方法、设备电池、无人机及存储介质
US20140282985A1 (en) Remote Access Authentication
CN103838997A (zh) 一种单片机密码验证方法及装置
TW201426382A (zh) 電腦控制系統及電腦
TW201315261A (zh) 行動設備開機系統及方法
US20210209238A1 (en) Bios access
TW201318397A (zh) 具有可信任平台模組之計算裝置及用於其上之資訊安全方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11823031

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11823031

Country of ref document: EP

Kind code of ref document: A1