[go: up one dir, main page]

CN100383695C - Safety turn-on method in visual range - Google Patents

Safety turn-on method in visual range Download PDF

Info

Publication number
CN100383695C
CN100383695C CNB2005100702448A CN200510070244A CN100383695C CN 100383695 C CN100383695 C CN 100383695C CN B2005100702448 A CNB2005100702448 A CN B2005100702448A CN 200510070244 A CN200510070244 A CN 200510070244A CN 100383695 C CN100383695 C CN 100383695C
Authority
CN
China
Prior art keywords
central control
control device
controlled device
controlled
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CNB2005100702448A
Other languages
Chinese (zh)
Other versions
CN1862441A (en
Inventor
金峰
杜晓黎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CNB2005100702448A priority Critical patent/CN100383695C/en
Publication of CN1862441A publication Critical patent/CN1862441A/en
Application granted granted Critical
Publication of CN100383695C publication Critical patent/CN100383695C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Selective Calling Equipment (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

公开了一种在包括中控设备、至少一个无线设备和至少一个被控设备的系统中的安全开机方法,以在人眼能观测到范围内进行安全开机,中控设备存储有无线设备的标识符,所述安全开机方法包括步骤:启动被控设备;在被控设备和中控设备之间建立连接;被控设备通过所述连接向中控设备发送认证请求;中控设备响应所述认证请求与被控设备相互认证;中控设备通过短距无线电通信搜索与存储的无线设备标识符所对应的无线设备;以及如果搜索到无线设备,中控设备向被控设备发送允许进行后续操作的信号,否则,设备自动停机。采用上述方法,能够确保与主机相关人员在机器的可视范围内人为地监视机器启动,同时又没有提高开机过程的操作复杂度。

Figure 200510070244

Disclosed is a method for safely booting in a system including a central control device, at least one wireless device, and at least one controlled device, so as to perform safe booting within the range that can be observed by human eyes, and the central control device stores the identification of the wireless device The safe boot method includes the steps of: starting the controlled device; establishing a connection between the controlled device and the central control device; the controlled device sends an authentication request to the central control device through the connection; the central control device responds to the authentication Request mutual authentication with the controlled device; the central control device searches for the wireless device corresponding to the stored wireless device identifier through short-distance radio communication; and if the wireless device is found, the central control device sends a message allowing subsequent operations to the controlled device signal, otherwise, the device will automatically shut down. By adopting the above method, it can be ensured that the personnel related to the main engine can manually monitor the start-up of the machine within the visible range of the machine, and at the same time, the operation complexity of the start-up process is not increased.

Figure 200510070244

Description

在可视范围内安全开机的方法 How to safely power on within sight

技术领域technical field

本发明涉及计算机的安全技术,具体涉及一种通过定制计算机启动过程与策略,在办公环境中人眼能观测到范围内进行安全开机的方法。The invention relates to computer security technology, in particular to a method for safely starting the computer within the range that can be observed by human eyes by customizing the computer startup process and strategy.

背景技术Background technique

扩展固件接口(EFI)是下一代个人计算机、笔记本、服务器以及各种手持设备中广泛采用的固件标准。它具有结构化、标准化以及易于维护等性能,并且在未来会取代传统的基本输入输出系统(BIOS),成为计算机系统的主要固件。EFI的一个突出特点是可以定制计算机的启动过程,并具备比较强大的网络功能。The Extensible Firmware Interface (EFI) is a firmware standard widely used in next-generation personal computers, notebooks, servers, and various handheld devices. It is structured, standardized, and easy to maintain, and will replace the traditional Basic Input Output System (BIOS) in the future as the main firmware of the computer system. A prominent feature of EFI is that it can customize the computer's startup process and has relatively powerful network functions.

另外,随着诸如手机之类的移动通信终端的普及,尤其是配有蓝牙等短距离无线功能的移动终端的普及,如手机之类的移动通信终端成为人们随身必备的个人工具。作为个人随身携带的工具的手机,可以用来提供个人的位置。In addition, with the popularization of mobile communication terminals such as mobile phones, especially mobile terminals equipped with short-range wireless functions such as Bluetooth, mobile communication terminals such as mobile phones have become personal tools that people carry with them. A mobile phone, which is a tool carried by an individual, can be used to provide an individual's location.

本发明就是结合EFI这种固件技术以及移动通信终端的近距无线技术为基础,实现计算机在可视范围内的安全开机,保证开机过程处于合法的监视之下。The present invention combines the EFI firmware technology and the short-distance wireless technology of the mobile communication terminal as the basis to realize the safe booting of the computer within the visible range and ensure that the booting process is under legal monitoring.

开机的安全有很多举措,传统的技术有CMOS密码保护和操作系统密码保护。但是,这些保护措施都有漏洞,想侵入系统的人还是有方法可以进入系统。比如,将计算机主板上的CMOS放电,或者引导另外的操作系统等。最近的开机保护技术主要保护硬盘,在硬盘的固件(firmware)里增加硬盘启动密码功能,这种功能能有效地保护硬盘数据,使得即便硬盘失窃,也不会丢失数据。但是,这种开机保护技术最大的问题是用户忘记密码之后,硬盘数据将很难再得到。因此,这种开机保护方式同样有比较大的风险。There are many measures for the safety of booting. The traditional technology includes CMOS password protection and operating system password protection. However, these protections have loopholes, and people who want to break into the system still have a way to get into the system. For example, discharging the CMOS on the computer motherboard, or booting another operating system, etc. The recent power-on protection technology mainly protects the hard disk, adding a hard disk startup password function in the hard disk firmware (firmware), which can effectively protect the hard disk data, so that even if the hard disk is stolen, the data will not be lost. However, the biggest problem with this power-on protection technology is that after the user forgets the password, hard disk data will be difficult to obtain. Therefore, this power-on protection method also has a relatively large risk.

如联想等系统厂商的笔记本中,广泛采用iKey技术,不过,这种开机保护也局限在操作系统之上,无法真正保护主机系统不被入侵。For example, in the notebooks of Lenovo and other system manufacturers, iKey technology is widely used. However, this kind of boot protection is also limited to the operating system, and cannot really protect the host system from intrusion.

上述开机保护模式,基本上以密码保护为主,主要有三个问题:The above power-on protection mode is basically based on password protection, and there are three main problems:

1、操作复杂度增加,用户必须记住并键入密码才能正常操作;1. The complexity of the operation increases, and the user must remember and type in the password to operate normally;

2、一旦密码丢失,则会给用户带来非常大的麻烦,有的时候是不可逆转的损失;2. Once the password is lost, it will bring a lot of trouble to the user, and sometimes it is an irreversible loss;

3、只认密码不认人,逻辑上,人不是计算机的主宰。3. Only recognize passwords but not people. Logically, people are not the masters of computers.

事实上,最安全的开机措施是开机的时候,应该有相关人员在计算机的可视范围内,这种开机方式可以很大程度上解决技术所带来的种种漏洞,确保与主机相关人员(主机的拥有者或者资产管理者)在机器的可视范围内人为地监视机器启动,同时又没有提高开机过程的操作复杂度,成为围绕人的开机保护模式。In fact, the safest boot-up measure is that relevant personnel should be within the visual range of the computer when booting up. This boot-up method can largely solve various loopholes brought about by technology, and ensure that personnel related to the host (host) The owner or asset manager) artificially monitors the start-up of the machine within the visible range of the machine, and at the same time does not increase the operational complexity of the start-up process, becoming a start-up protection mode around people.

发明内容Contents of the invention

本发明通过无线技术手段确保系统开机过程中有合法用户能够监视整个开机过程,以保证主机的合法使用。通过合法用户在可视范围内监视的方式,提升密码保护的可靠程度,或者以这样的主机保护方法代替密码开机的方式。The invention ensures that a legitimate user can monitor the whole booting process during the booting process of the system through wireless technical means, so as to ensure the legal use of the host computer. Improve the reliability of password protection by allowing legitimate users to monitor within the visible range, or use such a host protection method to replace password booting.

在本发明的一个方面,提供了一种在包括中控设备、至少一个无线设备和至少一个被控设备的系统中的初始设置方法,包括步骤:启动所述被控设备,进入基本输入输出系统;在所述被控设备和所述中控设备之间建立连接;所述被控设备通过所述连接向所述中控设备发送资产登记请求;所述中控设备响应所述资产登记请求产生被控设备密钥,并将其发送给所述被控设备;所述被控设备把所述被控设备密钥保存在专用存储器中;以及所述中控设备通过短距无线电通信搜索无线设备,并将同一组的无线设备的标识符存储在存储器中。In one aspect of the present invention, an initial setting method in a system including a central control device, at least one wireless device, and at least one controlled device is provided, comprising the steps of: starting the controlled device, and entering the basic input and output system ; establish a connection between the controlled device and the central control device; the controlled device sends an asset registration request to the central control device through the connection; the central control device generates an asset registration request in response to the asset registration request the controlled device key, and send it to the controlled device; the controlled device saves the controlled device key in a dedicated memory; and the central control device searches for wireless devices through short-range radio communication , and store the identifiers of the wireless devices of the same group in the memory.

在本发明的另一方面,提供了一种在包括中控设备、至少一个无线设备和至少一个被控设备的系统中的安全开机方法,所述中控设备存储有所述无线设备的标识符,所述安全开机方法包括步骤:启动所述被控设备;在所述被控设备和所述中控设备之间建立连接;所述被控设备通过所述连接向所述中控设备发送认证请求;所述中控设备响应所述认证请求与所述被控设备相互认证;所述中控设备通过短距无线电通信搜索与存储的无线设备标识符所对应的无线设备;以及如果搜索到所述无线设备,所述中控设备向所述被控设备发送允许进行后续操作的信号,否则,被控设备自动停机。In another aspect of the present invention, there is provided a secure boot method in a system including a central control device, at least one wireless device, and at least one controlled device, the central control device storing an identifier of the wireless device , the secure boot method includes the steps of: starting the controlled device; establishing a connection between the controlled device and the central control device; the controlled device sends an authentication to the central control device through the connection request; the central control device responds to the authentication request and mutually authenticates the controlled device; the central control device searches for the wireless device corresponding to the stored wireless device identifier through short-range radio communication; and if the searched The wireless device, the central control device sends a signal allowing subsequent operations to the controlled device, otherwise, the controlled device automatically shuts down.

在本发明中,因为能确保在开机的过程中有合法用户在可视的范围,从而避免了密码丢失所带来的不能正常进入系统的问题。此外,本发明通过集中管理和注册的方式,保证当手机丢失或其他无法近距离访问的情况下,同样能使用该主机。In the present invention, because it can ensure that there are legal users in the visible range during the booting process, the problem of not being able to enter the system normally caused by password loss is avoided. In addition, the present invention ensures that the host can also be used when the mobile phone is lost or cannot be accessed at close range through centralized management and registration.

附图说明Description of drawings

图1是本发明一个实施例的方法的系统使用场景,其中的圆圈表示中控设备的无线电覆盖范围;Figure 1 is a system usage scenario of a method according to an embodiment of the present invention, in which the circle represents the radio coverage of the central control device;

图2示出了被控设备向中控设备登记的过程;Figure 2 shows the process of the controlled device registering with the central control device;

图3示出了无线设备向中控设备登记的过程;Fig. 3 shows the process of the wireless device registering with the central control device;

图4是根据本发明实施例的安全开机方法的流程图。Fig. 4 is a flow chart of a secure boot method according to an embodiment of the present invention.

具体实施方式Detailed ways

下面对照附图详细描述本发明的具体实施方式。Specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

图1是本发明一个实施例的方法的系统使用场景,其中的圆圈表示中控设备的无线电覆盖范围。如图1所示,在人眼可视的办公区域内的多个被控设备11和12通过网络40联系在一起,组成一个组,设置一中控设备(标准PC、服务器或者专有设备)20,该中控设备20具有短距无线(如蓝牙)以及网络连接(以太网或者WiFi)等能力,并具有一定的信息处理能力,下面的描述中,以一台标准PC作为该中控设备20的原型。在图1中,被控设备11和12,例如计算机通过局域网(LAN)40与中控设备20连接。被控设备11和12的固件支持扩展固件接口标准。被控设备12的合法拥有者30携带一具有短距无线通信能力的无线设备(未示出)。FIG. 1 is a system usage scenario of a method according to an embodiment of the present invention, where the circles represent the radio coverage of the central control device. As shown in Figure 1, a plurality of controlled devices 11 and 12 in the office area visible to the human eye are linked together through a network 40 to form a group, and a central control device (standard PC, server or dedicated device) is set 20. The central control device 20 has short-distance wireless (such as Bluetooth) and network connection (Ethernet or WiFi) capabilities, and has certain information processing capabilities. In the following description, a standard PC is used as the central control device 20 prototypes. In FIG. 1 , controlled devices 11 and 12 , such as computers, are connected to a central control device 20 through a local area network (LAN) 40 . The firmware of the controlled devices 11 and 12 supports the extended firmware interface standard. The legal owner 30 of the controlled device 12 carries a wireless device (not shown) capable of short-range wireless communication.

图2示出了根据本发明实施例的初始设置过程的流程图。对于一台诸如计算机之类的被控设备,首先要将其设置为本发明的工作模式。如图2所示,在启动被控设备之后,就进入PEI过程,也就是预EFI初始化过程。之后,用户例如通过按下DEL键之类的键盘操作使流程进入基本输入输出系统(BIOS),进行设置。FIG. 2 shows a flowchart of an initial setup process according to an embodiment of the present invention. For a controlled device such as a computer, it must first be set to the working mode of the present invention. As shown in Figure 2, after the controlled device is started, it enters the PEI process, that is, the pre-EFI initialization process. Afterwards, the user enters the basic input output system (BIOS) through keyboard operations such as pressing the DEL key, and performs settings.

接下来,调用网络驱动程序,以建立与中控设备之间的连接。如果能够在被控设备11和12与中控设备20之间建立连接,则还要进一步判断中控设备20是否受Key的保护,例如中控设备20上是否插有USB Key。如果不能建立连接,或者中控设备20没有受Key的保护,则认为被控设备的登记失败。如果此时中控设备20上插有USB Key,也就是中控设备20受密钥保护,则被控设备11和12通过建立的连接向中控设备20发送资产登记请求。中控设备20收到被控设备11和12的资产登记请求之后,产生针对该控设备11和12的密钥,并将密钥分别发回给被控设备11和12。Next, call the network driver to establish a connection with the central control device. If a connection can be established between the controlled devices 11 and 12 and the central control device 20, it will be further judged whether the central control device 20 is protected by the Key, for example, whether the central control device 20 is inserted with a USB Key. If the connection cannot be established, or the central control device 20 is not protected by the Key, it is considered that the registration of the controlled device fails. If a USB Key is inserted on the central control device 20 at this time, that is, the central control device 20 is protected by the key, then the controlled devices 11 and 12 send an asset registration request to the central control device 20 through the established connection. After receiving the asset registration requests from the controlled devices 11 and 12, the central control device 20 generates keys for the controlled devices 11 and 12, and sends the keys back to the controlled devices 11 and 12 respectively.

然后,被控制设备11和12比较收到的密钥与预先存储的密钥,或者使用者判断该密钥是否合法,如果不合法,则认为登记失败,否则,将收到的密钥保存在诸如OptionROM或者HPA之类的专用存储器中,登记过程结束。Then, the controlled devices 11 and 12 compare the received key with the pre-stored key, or the user judges whether the key is legal. In a dedicated memory such as OptionROM or HPA, the registration process ends.

在本发明的开机方法中,需要合法使用者处于可视范围之内,因此需要事先对合法的使用者进行认证,也就是事先认证属于同一组的无线设备的ID,图3示出了对无线设备进行认证的流程图。In the power-on method of the present invention, legal users need to be within the visible range, so legal users need to be authenticated in advance, that is, the IDs of wireless devices belonging to the same group are authenticated in advance. Flow chart of device authentication.

如图3所示,在认证过程的开始,同样要判断中控设备20是否受Key的保护,也就是判断在中控设备20中是否插有USB Key。如果中控设备20不受密钥保护,则退出认证过程。如果中控设备20受Key保护,则中控设备20通过短距无线通信搜索有效范围A(见图1)之内的无线设备,然后判断是否有无线设备加入本组,如果没有则认证失败。如果此时有无线设备要加入本组,则进一步判断该无线设备是否适合加入本组,如果认为不适合,则退出认证过程。As shown in Figure 3, at the beginning of the authentication process, it is also necessary to judge whether the central control device 20 is protected by the Key, that is, to judge whether a USB Key is inserted in the central control device 20. If the central control device 20 is not protected by the key, exit the authentication process. If the central control device 20 is protected by the Key, the central control device 20 searches for wireless devices within the effective range A (see FIG. 1 ) through short-distance wireless communication, and then judges whether any wireless device joins the group. If not, the authentication fails. If there is a wireless device to join the group at this time, it is further judged whether the wireless device is suitable for joining the group, and if it is deemed not suitable, the authentication process is exited.

如果要加入本组的无线设备是合适的,则中控设备20将该无线设备的ID保存在存储器中,结束认证过程。If the wireless device to be added to this group is suitable, the central control device 20 saves the ID of the wireless device in the memory, and ends the authentication process.

图4示出了本发明的安全开机方法的流程图。如图4所示,在重新启动被控设备11和12后,进入PEI过程,也就是预EFI初始化过程。Fig. 4 shows a flow chart of the secure boot method of the present invention. As shown in FIG. 4 , after the controlled devices 11 and 12 are restarted, they enter the PEI process, that is, the pre-EFI initialization process.

然后,载入诸如TCP/IP协议之类的网络驱动程序,以建立与中控设备20之间的网络连接。如果无法连接中控设备20,则被控设备自动停机,如果连接到中控设备20,还要进一步判断中控设备20是否受Key保护,例如中控设备20中是否插有USB Key。Then, a network driver program such as TCP/IP protocol is loaded to establish a network connection with the central control device 20 . If the central control device 20 cannot be connected, the controlled device will automatically stop. If it is connected to the central control device 20, it will be further judged whether the central control device 20 is protected by the Key, such as whether a USB Key is inserted in the central control device 20.

如果中控设备20受密钥保护,则被控设备11和12就可以向中控设备20发送认证请求,例如通过Kerboros等认证方法进行相互之间的认证,以确认对方是否合法。If the central control device 20 is protected by a key, the controlled devices 11 and 12 can send authentication requests to the central control device 20, for example, authenticate each other through authentication methods such as Kerboros to confirm whether the other party is legal.

通过认证之后,中控设备20通过短距无线电通信搜索与存储的无线设备ID所对应的无线设备是否处于有效范围之内,也就是能不能再次找到存储的无线设备的ID。After passing the authentication, the central control device 20 searches whether the wireless device corresponding to the stored wireless device ID is within the valid range through short-distance radio communication, that is, whether the stored wireless device ID can be found again.

如果同一组无线设备中有一个无线设备处于有效范围之内,则中控设备20向被控设备11和12发送确认信号,可以进行后续的操作,例如进入操作系统。如果此时中控设备20没有找到相关的无线设备,则被控设备11和12自动停机或者提示使用者等待合法用户的到来。If one wireless device in the same group of wireless devices is within the effective range, the central control device 20 sends a confirmation signal to the controlled devices 11 and 12, and subsequent operations can be performed, such as entering the operating system. If the central control device 20 does not find the relevant wireless device at this time, the controlled devices 11 and 12 will automatically shut down or prompt the user to wait for the arrival of a legitimate user.

在上述的方法中,以一台可以通过KEY保护的台式机设备作为中控设备20,这样的设备具备蓝牙或者其它短距无线通信能力以及以太网络接口。但是本发明所应用的环境并不局限于上述的系统,也可以使用专门的中控设备作为诸如PC之类的被控设备11和12的附件,附带在被控设备上,通过USB接口与被控设备直接相连,并且该中控设备同样要具备独立的蓝牙功能或者其它短距无线电通信功能。In the above method, a desktop device that can be protected by KEY is used as the central control device 20, and such a device has Bluetooth or other short-distance wireless communication capabilities and an Ethernet interface. However, the application environment of the present invention is not limited to the above-mentioned system, and a special central control device can also be used as an accessory of the controlled devices 11 and 12 such as a PC, attached to the controlled device, and communicated with the controlled device through a USB interface. The central control device is directly connected, and the central control device must also have an independent Bluetooth function or other short-distance radio communication functions.

在将中控设备作为被控设备的附件的情况下,被控制设备于中控设备之间的连接不是上述的网络连接,而是直接连接。In the case where the central control device is used as an accessory of the controlled device, the connection between the controlled device and the central control device is not the above-mentioned network connection, but a direct connection.

此外,在上述的方法中,需要合法使用者随时携带无线设备,如果合法用户无意将无线设备置于中控设备20的有效范围之内,而自己处于有效范围之外时,就存在不安全开机的风险。所以,如果在中控设备20的搜索过程中没有找到合适的无线设备,则中控设备20向同一组中的所有无线设备发送请求信号,在一组中的至少一个无线设备返回确认信号,表示允许开机之后,中控设备20再向被控设备11和12发出允许进行后续操作的信号。In addition, in the above-mentioned method, the legal user needs to carry the wireless device at any time. If the legal user does not intend to place the wireless device within the effective range of the central control device 20, but when he is outside the effective range, there will be an unsafe boot. risks of. Therefore, if no suitable wireless device is found during the search process of the central control device 20, the central control device 20 sends a request signal to all wireless devices in the same group, and at least one wireless device in a group returns an acknowledgment signal, indicating After being allowed to start up, the central control device 20 sends a signal to the controlled devices 11 and 12 to allow subsequent operations.

此外,还可以设置中控设备20搜索无线设备的时间,如果超过预定的时间阈值,则禁止被控设备11和12进行后续的操作或者进入操作系统。In addition, the time for the central control device 20 to search for wireless devices can also be set. If the time exceeds a predetermined time threshold, the controlled devices 11 and 12 are prohibited from performing subsequent operations or entering the operating system.

以上所述,仅为本发明中的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉该技术的人在本发明所揭露的技术范围内,可轻易想到的变换或替换,都应涵盖在本发明的包含范围之内。因此,本发明的保护范围应该以权利要求书的保护范围为准。The above is only a specific implementation mode in the present invention, but the scope of protection of the present invention is not limited thereto. Anyone familiar with the technology can easily think of changes or replacements within the technical scope disclosed in the present invention. All should be covered within the scope of the present invention. Therefore, the protection scope of the present invention should be determined by the protection scope of the claims.

Claims (20)

1.一种在包括中控设备、至少一个无线设备和至少一个被控设备的系统中的初始设置方法,包括步骤:1. An initial setting method in a system including a central control device, at least one wireless device and at least one controlled device, comprising the steps of: 启动所述被控设备,进入基本输入输出系统;Start the controlled device and enter the basic input and output system; 在所述被控设备和所述中控设备之间建立连接;establishing a connection between the controlled device and the central control device; 所述被控设备通过所述连接向所述中控设备发送资产登记请求;The controlled device sends an asset registration request to the central control device through the connection; 所述中控设备响应所述资产登记请求产生被控设备密钥,并将其发送给所述被控设备;The central control device generates a controlled device key in response to the asset registration request, and sends it to the controlled device; 所述被控设备把所述被控设备密钥保存在专用存储器中;以及The controlled device stores the controlled device key in a dedicated memory; and 所述中控设备通过短距无线电通信搜索无线设备,并将同一组的无线设备的标识符存储在存储器中。The central control device searches for wireless devices through short-distance radio communication, and stores identifiers of wireless devices in the same group in a memory. 2.如权利要求1所述的初始设置方法,其特征在于,还包括步骤:2. The initial setting method according to claim 1, further comprising the steps of: 在建立所述连接之前判断所述中控设备是否受密钥保护;以及judging whether the central control device is protected by a key before establishing the connection; and 如果所述中控设备受密钥保护,则建立连接,否则结束设置过程。If the central control device is protected by a key, a connection is established; otherwise, the setting process is ended. 3.如权利要求2所述的初始设置方法,其特征在于,所述密钥是USB密钥。3. The initial setting method according to claim 2, wherein the key is a USB key. 4.如权利要求1或2所述的初始设置方法,其特征在于,还包括步骤:4. The initial setting method according to claim 1 or 2, further comprising the steps of: 判断接收的所述被控设备密钥是否合法;以及judging whether the received controlled device key is legal; and 如果所述被控设备密钥合法,则将其存储在专用存储器中,否则结束设置过程。If the key of the controlled device is legal, it is stored in the dedicated memory, otherwise, the setting process is ended. 5.如权利要求4所述的初始设置方法,其特征在于,通过比较所述被控设备密钥与预先存储的密钥来判断所述被控设备密钥是否合法。5. The initial setting method according to claim 4, wherein it is determined whether the controlled device key is legal by comparing the controlled device key with a pre-stored key. 6.如权利要求5所述的初始设置方法,其特征在于,所述专用存储器是OptionROM或者隐藏分区。6. The initial setting method according to claim 5, wherein the dedicated memory is OptionROM or a hidden partition. 7.如权利要求1所述的初始设置方法,其特征在于,所述中控设备通过蓝牙通信搜索所述无线设备。7. The initial setting method according to claim 1, wherein the central control device searches for the wireless device through Bluetooth communication. 8.如权利要求1所述的初始设置方法,其特征在于,所述被控设备调用网络驱动程序与所述中控设备之间建立网络连接。8. The initial setting method according to claim 1, wherein the controlled device invokes a network driver to establish a network connection with the central control device. 9.如权利要求1所述的初始设置方法,其特征在于,所述中控设备通过通用串行总线接口与所述中控设备直接连接。9. The initial setting method according to claim 1, wherein the central control device is directly connected to the central control device through a universal serial bus interface. 10.如权利要求1所述的初始设置方法,其特征在于,所述被控设备支持扩展固件接口标准。10. The initial setting method according to claim 1, wherein the controlled device supports the extended firmware interface standard. 11.一种在包括中控设备、至少一个无线设备和至少一个被控设备的系统中的安全开机方法,所述中控设备存储有所述无线设备的标识符,所述安全开机方法包括步骤:11. A method of secure booting in a system including a central control device, at least one wireless device, and at least one controlled device, the central control device stores an identifier of the wireless device, and the secure boot method comprises steps : 启动所述被控设备;activate said controlled device; 在所述被控设备和所述中控设备之间建立连接;establishing a connection between the controlled device and the central control device; 所述被控设备通过所述连接向所述中控设备发送认证请求;The controlled device sends an authentication request to the central control device through the connection; 所述中控设备响应所述认证请求与所述被控设备相互认证;The central control device responds to the authentication request to mutually authenticate with the controlled device; 所述中控设备通过短距无线电通信搜索与存储的无线设备标识符所对应的无线设备;以及The central control device searches for a wireless device corresponding to the stored wireless device identifier through short-range radio communication; and 如果搜索到所述无线设备,所述中控设备向所述被控设备发送允许进行后续操作的信号,否则,被控设备自动停机。If the wireless device is found, the central control device sends a signal allowing subsequent operations to the controlled device, otherwise, the controlled device automatically shuts down. 12.如权利要求11所述的安全开机方法,其特征在于,还包括步骤:12. The safe boot method according to claim 11, further comprising the steps of: 在建立所述连接之前判断所述中控设备是否受密钥保护;以及judging whether the central control device is protected by a key before establishing the connection; and 如果所述中控设备受密钥保护,则建立连接,否则结束开机过程。If the central control device is protected by a key, a connection is established; otherwise, the booting process is terminated. 13.如权利要求12所述的安全开机方法,其特征在于,所述密钥是USB密钥。13. The secure boot method according to claim 12, wherein the key is a USB key. 14.如权利要求11所述的安全开机方法,其特征在于,所述中控设备通过短距无线电通信搜索与存储的无线设备标识符所对应的无线设备的步骤包括:14. The secure boot method according to claim 11, wherein the step of the central control device searching for the wireless device corresponding to the stored wireless device identifier through short-distance radio communication comprises: 所述中控设备向所述无线设备发送请求信号;The central control device sends a request signal to the wireless device; 所述无线设备响应所述请求信号向所述中控设备返回确认信号。The wireless device returns an acknowledgment signal to the central control device in response to the request signal. 15.如权利要求11-14之一所述的安全开机方法,其特征在于,如果搜索无线设备的时间超过预定的时间阈值,则禁止所述被控设备进行后续的操作。15. The safe boot method according to any one of claims 11-14, characterized in that if the search time for the wireless device exceeds a predetermined time threshold, the controlled device is prohibited from performing subsequent operations. 16.如权利要求11所述的安全开机方法,其特征在于,所述被控设备和所述中控设备通过Kerboros认证方法进行相互之间的认证。16. The secure boot method according to claim 11, wherein the controlled device and the central control device perform mutual authentication through a Kerboros authentication method. 17.如权利要求11所述的安全开机方法,其特征在于,所述被控设备调用网络驱动程序与所述中控设备之间建立网络连接。17. The secure boot method according to claim 11, wherein the controlled device invokes a network driver to establish a network connection with the central control device. 18.如权利要求11所述的安全开机方法,其特征在于,所述中控设备通过通用串行总线接口与所述中控设备直接连接。18. The secure boot method according to claim 11, wherein the central control device is directly connected to the central control device through a Universal Serial Bus interface. 19.如权利要求11所述的安全开机方法,其特征在于,所述被控设备支持扩展固件接口标准。19. The secure boot method according to claim 11, wherein the controlled device supports the extended firmware interface standard. 20.如权利要求11所述的安全开机方法,其特征在于,如果所述中控设备没有搜索到所述无线设备,则发出等待合法用户到来的提示。20. The secure boot method according to claim 11, wherein if the central control device does not find the wireless device, it sends a prompt to wait for a legitimate user to arrive.
CNB2005100702448A 2005-05-11 2005-05-11 Safety turn-on method in visual range Expired - Lifetime CN100383695C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100702448A CN100383695C (en) 2005-05-11 2005-05-11 Safety turn-on method in visual range

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100702448A CN100383695C (en) 2005-05-11 2005-05-11 Safety turn-on method in visual range

Publications (2)

Publication Number Publication Date
CN1862441A CN1862441A (en) 2006-11-15
CN100383695C true CN100383695C (en) 2008-04-23

Family

ID=37389892

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100702448A Expired - Lifetime CN100383695C (en) 2005-05-11 2005-05-11 Safety turn-on method in visual range

Country Status (1)

Country Link
CN (1) CN100383695C (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7837102B2 (en) * 2006-06-15 2010-11-23 Mstar Semiconductor, Inc. Method and apparatus for computer login security using RFID technology
CN102200917B (en) * 2010-03-25 2014-09-03 研祥智能科技股份有限公司 Computing equipment and method for determining guiding equipment in startup process
CN105933291B (en) * 2016-04-07 2019-04-05 合肥联宝信息技术有限公司 A kind of method, smart machine and the server of smart machine safe handling

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0661845A2 (en) * 1993-12-29 1995-07-05 International Business Machines Corporation System and method for message authentication in a non-malleable public-key cryptosystem
CN1253320A (en) * 1998-10-30 2000-05-17 联阳半导体股份有限公司 A device for monitoring the booting process of a personal computer system
WO2004004279A1 (en) * 2002-06-26 2004-01-08 Intel Corporation Active key for wireless device configuration
CN1527600A (en) * 2003-03-05 2004-09-08 华为技术有限公司 Method and device for secure access to digital broadcasting television network
US20040190718A1 (en) * 2003-03-25 2004-09-30 Dacosta Behram Mario Apparatus and method for location based wireless client authentication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0661845A2 (en) * 1993-12-29 1995-07-05 International Business Machines Corporation System and method for message authentication in a non-malleable public-key cryptosystem
CN1253320A (en) * 1998-10-30 2000-05-17 联阳半导体股份有限公司 A device for monitoring the booting process of a personal computer system
WO2004004279A1 (en) * 2002-06-26 2004-01-08 Intel Corporation Active key for wireless device configuration
CN1527600A (en) * 2003-03-05 2004-09-08 华为技术有限公司 Method and device for secure access to digital broadcasting television network
US20040190718A1 (en) * 2003-03-25 2004-09-30 Dacosta Behram Mario Apparatus and method for location based wireless client authentication

Also Published As

Publication number Publication date
CN1862441A (en) 2006-11-15

Similar Documents

Publication Publication Date Title
US8132236B2 (en) System and method for providing secured access to mobile devices
EP2549678B1 (en) Method and apparatus for protecting software of mobile terminal
KR100584429B1 (en) How to monitor security on your Bluetooth device
EP2895982B1 (en) Hardware-enforced access protection
WO2018072215A1 (en) Security verification method and apparatus
RU2684584C1 (en) Device for storing information and operation method thereof
US20070226778A1 (en) Bluetooth theft protection
US20030199267A1 (en) Security system for information processing apparatus
US8654977B2 (en) System and method for controlling access between Bluetooth devices
US20120135683A1 (en) System and method for configuring an access list for bluetooth devices
JP2004102682A (en) Terminal lock system and terminal lock method
CN101655814A (en) Method for authenticating smart battery and terminal
WO2016072833A1 (en) System and method to disable factory reset
WO2016070611A1 (en) Method for processing data, server and terminal
WO2020193965A1 (en) A computing device, method and system for controlling the accessibility of data
CN100383695C (en) Safety turn-on method in visual range
CN104376251A (en) Computer, computer start-up control system and computer start-up control method
JP2022076942A (en) Communication equipment, control methods for communication equipment, and programs
JP6071109B2 (en) Portable terminal device and program
CN107154999B (en) Terminal and unlocking method and storage device based on environmental information
KR20090127676A (en) Security system of personal computer using Bluetooth communication and security method by the system
JP4894382B2 (en) Security system, information processing apparatus, information protection method, program
JP6911303B2 (en) Authentication system and authentication method
JP6311804B2 (en) Terminal device and program
JP6517641B2 (en) Wireless communication device, method, system and program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20080423