CN100383695C - Safety turn-on method in visual range - Google Patents
Safety turn-on method in visual range Download PDFInfo
- Publication number
- CN100383695C CN100383695C CNB2005100702448A CN200510070244A CN100383695C CN 100383695 C CN100383695 C CN 100383695C CN B2005100702448 A CNB2005100702448 A CN B2005100702448A CN 200510070244 A CN200510070244 A CN 200510070244A CN 100383695 C CN100383695 C CN 100383695C
- Authority
- CN
- China
- Prior art keywords
- central control
- control device
- controlled device
- controlled
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Landscapes
- Selective Calling Equipment (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
公开了一种在包括中控设备、至少一个无线设备和至少一个被控设备的系统中的安全开机方法,以在人眼能观测到范围内进行安全开机,中控设备存储有无线设备的标识符,所述安全开机方法包括步骤:启动被控设备;在被控设备和中控设备之间建立连接;被控设备通过所述连接向中控设备发送认证请求;中控设备响应所述认证请求与被控设备相互认证;中控设备通过短距无线电通信搜索与存储的无线设备标识符所对应的无线设备;以及如果搜索到无线设备,中控设备向被控设备发送允许进行后续操作的信号,否则,设备自动停机。采用上述方法,能够确保与主机相关人员在机器的可视范围内人为地监视机器启动,同时又没有提高开机过程的操作复杂度。
Disclosed is a method for safely booting in a system including a central control device, at least one wireless device, and at least one controlled device, so as to perform safe booting within the range that can be observed by human eyes, and the central control device stores the identification of the wireless device The safe boot method includes the steps of: starting the controlled device; establishing a connection between the controlled device and the central control device; the controlled device sends an authentication request to the central control device through the connection; the central control device responds to the authentication Request mutual authentication with the controlled device; the central control device searches for the wireless device corresponding to the stored wireless device identifier through short-distance radio communication; and if the wireless device is found, the central control device sends a message allowing subsequent operations to the controlled device signal, otherwise, the device will automatically shut down. By adopting the above method, it can be ensured that the personnel related to the main engine can manually monitor the start-up of the machine within the visible range of the machine, and at the same time, the operation complexity of the start-up process is not increased.
Description
技术领域technical field
本发明涉及计算机的安全技术,具体涉及一种通过定制计算机启动过程与策略,在办公环境中人眼能观测到范围内进行安全开机的方法。The invention relates to computer security technology, in particular to a method for safely starting the computer within the range that can be observed by human eyes by customizing the computer startup process and strategy.
背景技术Background technique
扩展固件接口(EFI)是下一代个人计算机、笔记本、服务器以及各种手持设备中广泛采用的固件标准。它具有结构化、标准化以及易于维护等性能,并且在未来会取代传统的基本输入输出系统(BIOS),成为计算机系统的主要固件。EFI的一个突出特点是可以定制计算机的启动过程,并具备比较强大的网络功能。The Extensible Firmware Interface (EFI) is a firmware standard widely used in next-generation personal computers, notebooks, servers, and various handheld devices. It is structured, standardized, and easy to maintain, and will replace the traditional Basic Input Output System (BIOS) in the future as the main firmware of the computer system. A prominent feature of EFI is that it can customize the computer's startup process and has relatively powerful network functions.
另外,随着诸如手机之类的移动通信终端的普及,尤其是配有蓝牙等短距离无线功能的移动终端的普及,如手机之类的移动通信终端成为人们随身必备的个人工具。作为个人随身携带的工具的手机,可以用来提供个人的位置。In addition, with the popularization of mobile communication terminals such as mobile phones, especially mobile terminals equipped with short-range wireless functions such as Bluetooth, mobile communication terminals such as mobile phones have become personal tools that people carry with them. A mobile phone, which is a tool carried by an individual, can be used to provide an individual's location.
本发明就是结合EFI这种固件技术以及移动通信终端的近距无线技术为基础,实现计算机在可视范围内的安全开机,保证开机过程处于合法的监视之下。The present invention combines the EFI firmware technology and the short-distance wireless technology of the mobile communication terminal as the basis to realize the safe booting of the computer within the visible range and ensure that the booting process is under legal monitoring.
开机的安全有很多举措,传统的技术有CMOS密码保护和操作系统密码保护。但是,这些保护措施都有漏洞,想侵入系统的人还是有方法可以进入系统。比如,将计算机主板上的CMOS放电,或者引导另外的操作系统等。最近的开机保护技术主要保护硬盘,在硬盘的固件(firmware)里增加硬盘启动密码功能,这种功能能有效地保护硬盘数据,使得即便硬盘失窃,也不会丢失数据。但是,这种开机保护技术最大的问题是用户忘记密码之后,硬盘数据将很难再得到。因此,这种开机保护方式同样有比较大的风险。There are many measures for the safety of booting. The traditional technology includes CMOS password protection and operating system password protection. However, these protections have loopholes, and people who want to break into the system still have a way to get into the system. For example, discharging the CMOS on the computer motherboard, or booting another operating system, etc. The recent power-on protection technology mainly protects the hard disk, adding a hard disk startup password function in the hard disk firmware (firmware), which can effectively protect the hard disk data, so that even if the hard disk is stolen, the data will not be lost. However, the biggest problem with this power-on protection technology is that after the user forgets the password, hard disk data will be difficult to obtain. Therefore, this power-on protection method also has a relatively large risk.
如联想等系统厂商的笔记本中,广泛采用iKey技术,不过,这种开机保护也局限在操作系统之上,无法真正保护主机系统不被入侵。For example, in the notebooks of Lenovo and other system manufacturers, iKey technology is widely used. However, this kind of boot protection is also limited to the operating system, and cannot really protect the host system from intrusion.
上述开机保护模式,基本上以密码保护为主,主要有三个问题:The above power-on protection mode is basically based on password protection, and there are three main problems:
1、操作复杂度增加,用户必须记住并键入密码才能正常操作;1. The complexity of the operation increases, and the user must remember and type in the password to operate normally;
2、一旦密码丢失,则会给用户带来非常大的麻烦,有的时候是不可逆转的损失;2. Once the password is lost, it will bring a lot of trouble to the user, and sometimes it is an irreversible loss;
3、只认密码不认人,逻辑上,人不是计算机的主宰。3. Only recognize passwords but not people. Logically, people are not the masters of computers.
事实上,最安全的开机措施是开机的时候,应该有相关人员在计算机的可视范围内,这种开机方式可以很大程度上解决技术所带来的种种漏洞,确保与主机相关人员(主机的拥有者或者资产管理者)在机器的可视范围内人为地监视机器启动,同时又没有提高开机过程的操作复杂度,成为围绕人的开机保护模式。In fact, the safest boot-up measure is that relevant personnel should be within the visual range of the computer when booting up. This boot-up method can largely solve various loopholes brought about by technology, and ensure that personnel related to the host (host) The owner or asset manager) artificially monitors the start-up of the machine within the visible range of the machine, and at the same time does not increase the operational complexity of the start-up process, becoming a start-up protection mode around people.
发明内容Contents of the invention
本发明通过无线技术手段确保系统开机过程中有合法用户能够监视整个开机过程,以保证主机的合法使用。通过合法用户在可视范围内监视的方式,提升密码保护的可靠程度,或者以这样的主机保护方法代替密码开机的方式。The invention ensures that a legitimate user can monitor the whole booting process during the booting process of the system through wireless technical means, so as to ensure the legal use of the host computer. Improve the reliability of password protection by allowing legitimate users to monitor within the visible range, or use such a host protection method to replace password booting.
在本发明的一个方面,提供了一种在包括中控设备、至少一个无线设备和至少一个被控设备的系统中的初始设置方法,包括步骤:启动所述被控设备,进入基本输入输出系统;在所述被控设备和所述中控设备之间建立连接;所述被控设备通过所述连接向所述中控设备发送资产登记请求;所述中控设备响应所述资产登记请求产生被控设备密钥,并将其发送给所述被控设备;所述被控设备把所述被控设备密钥保存在专用存储器中;以及所述中控设备通过短距无线电通信搜索无线设备,并将同一组的无线设备的标识符存储在存储器中。In one aspect of the present invention, an initial setting method in a system including a central control device, at least one wireless device, and at least one controlled device is provided, comprising the steps of: starting the controlled device, and entering the basic input and output system ; establish a connection between the controlled device and the central control device; the controlled device sends an asset registration request to the central control device through the connection; the central control device generates an asset registration request in response to the asset registration request the controlled device key, and send it to the controlled device; the controlled device saves the controlled device key in a dedicated memory; and the central control device searches for wireless devices through short-range radio communication , and store the identifiers of the wireless devices of the same group in the memory.
在本发明的另一方面,提供了一种在包括中控设备、至少一个无线设备和至少一个被控设备的系统中的安全开机方法,所述中控设备存储有所述无线设备的标识符,所述安全开机方法包括步骤:启动所述被控设备;在所述被控设备和所述中控设备之间建立连接;所述被控设备通过所述连接向所述中控设备发送认证请求;所述中控设备响应所述认证请求与所述被控设备相互认证;所述中控设备通过短距无线电通信搜索与存储的无线设备标识符所对应的无线设备;以及如果搜索到所述无线设备,所述中控设备向所述被控设备发送允许进行后续操作的信号,否则,被控设备自动停机。In another aspect of the present invention, there is provided a secure boot method in a system including a central control device, at least one wireless device, and at least one controlled device, the central control device storing an identifier of the wireless device , the secure boot method includes the steps of: starting the controlled device; establishing a connection between the controlled device and the central control device; the controlled device sends an authentication to the central control device through the connection request; the central control device responds to the authentication request and mutually authenticates the controlled device; the central control device searches for the wireless device corresponding to the stored wireless device identifier through short-range radio communication; and if the searched The wireless device, the central control device sends a signal allowing subsequent operations to the controlled device, otherwise, the controlled device automatically shuts down.
在本发明中,因为能确保在开机的过程中有合法用户在可视的范围,从而避免了密码丢失所带来的不能正常进入系统的问题。此外,本发明通过集中管理和注册的方式,保证当手机丢失或其他无法近距离访问的情况下,同样能使用该主机。In the present invention, because it can ensure that there are legal users in the visible range during the booting process, the problem of not being able to enter the system normally caused by password loss is avoided. In addition, the present invention ensures that the host can also be used when the mobile phone is lost or cannot be accessed at close range through centralized management and registration.
附图说明Description of drawings
图1是本发明一个实施例的方法的系统使用场景,其中的圆圈表示中控设备的无线电覆盖范围;Figure 1 is a system usage scenario of a method according to an embodiment of the present invention, in which the circle represents the radio coverage of the central control device;
图2示出了被控设备向中控设备登记的过程;Figure 2 shows the process of the controlled device registering with the central control device;
图3示出了无线设备向中控设备登记的过程;Fig. 3 shows the process of the wireless device registering with the central control device;
图4是根据本发明实施例的安全开机方法的流程图。Fig. 4 is a flow chart of a secure boot method according to an embodiment of the present invention.
具体实施方式Detailed ways
下面对照附图详细描述本发明的具体实施方式。Specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
图1是本发明一个实施例的方法的系统使用场景,其中的圆圈表示中控设备的无线电覆盖范围。如图1所示,在人眼可视的办公区域内的多个被控设备11和12通过网络40联系在一起,组成一个组,设置一中控设备(标准PC、服务器或者专有设备)20,该中控设备20具有短距无线(如蓝牙)以及网络连接(以太网或者WiFi)等能力,并具有一定的信息处理能力,下面的描述中,以一台标准PC作为该中控设备20的原型。在图1中,被控设备11和12,例如计算机通过局域网(LAN)40与中控设备20连接。被控设备11和12的固件支持扩展固件接口标准。被控设备12的合法拥有者30携带一具有短距无线通信能力的无线设备(未示出)。FIG. 1 is a system usage scenario of a method according to an embodiment of the present invention, where the circles represent the radio coverage of the central control device. As shown in Figure 1, a plurality of controlled
图2示出了根据本发明实施例的初始设置过程的流程图。对于一台诸如计算机之类的被控设备,首先要将其设置为本发明的工作模式。如图2所示,在启动被控设备之后,就进入PEI过程,也就是预EFI初始化过程。之后,用户例如通过按下DEL键之类的键盘操作使流程进入基本输入输出系统(BIOS),进行设置。FIG. 2 shows a flowchart of an initial setup process according to an embodiment of the present invention. For a controlled device such as a computer, it must first be set to the working mode of the present invention. As shown in Figure 2, after the controlled device is started, it enters the PEI process, that is, the pre-EFI initialization process. Afterwards, the user enters the basic input output system (BIOS) through keyboard operations such as pressing the DEL key, and performs settings.
接下来,调用网络驱动程序,以建立与中控设备之间的连接。如果能够在被控设备11和12与中控设备20之间建立连接,则还要进一步判断中控设备20是否受Key的保护,例如中控设备20上是否插有USB Key。如果不能建立连接,或者中控设备20没有受Key的保护,则认为被控设备的登记失败。如果此时中控设备20上插有USB Key,也就是中控设备20受密钥保护,则被控设备11和12通过建立的连接向中控设备20发送资产登记请求。中控设备20收到被控设备11和12的资产登记请求之后,产生针对该控设备11和12的密钥,并将密钥分别发回给被控设备11和12。Next, call the network driver to establish a connection with the central control device. If a connection can be established between the controlled
然后,被控制设备11和12比较收到的密钥与预先存储的密钥,或者使用者判断该密钥是否合法,如果不合法,则认为登记失败,否则,将收到的密钥保存在诸如OptionROM或者HPA之类的专用存储器中,登记过程结束。Then, the controlled
在本发明的开机方法中,需要合法使用者处于可视范围之内,因此需要事先对合法的使用者进行认证,也就是事先认证属于同一组的无线设备的ID,图3示出了对无线设备进行认证的流程图。In the power-on method of the present invention, legal users need to be within the visible range, so legal users need to be authenticated in advance, that is, the IDs of wireless devices belonging to the same group are authenticated in advance. Flow chart of device authentication.
如图3所示,在认证过程的开始,同样要判断中控设备20是否受Key的保护,也就是判断在中控设备20中是否插有USB Key。如果中控设备20不受密钥保护,则退出认证过程。如果中控设备20受Key保护,则中控设备20通过短距无线通信搜索有效范围A(见图1)之内的无线设备,然后判断是否有无线设备加入本组,如果没有则认证失败。如果此时有无线设备要加入本组,则进一步判断该无线设备是否适合加入本组,如果认为不适合,则退出认证过程。As shown in Figure 3, at the beginning of the authentication process, it is also necessary to judge whether the
如果要加入本组的无线设备是合适的,则中控设备20将该无线设备的ID保存在存储器中,结束认证过程。If the wireless device to be added to this group is suitable, the
图4示出了本发明的安全开机方法的流程图。如图4所示,在重新启动被控设备11和12后,进入PEI过程,也就是预EFI初始化过程。Fig. 4 shows a flow chart of the secure boot method of the present invention. As shown in FIG. 4 , after the controlled
然后,载入诸如TCP/IP协议之类的网络驱动程序,以建立与中控设备20之间的网络连接。如果无法连接中控设备20,则被控设备自动停机,如果连接到中控设备20,还要进一步判断中控设备20是否受Key保护,例如中控设备20中是否插有USB Key。Then, a network driver program such as TCP/IP protocol is loaded to establish a network connection with the
如果中控设备20受密钥保护,则被控设备11和12就可以向中控设备20发送认证请求,例如通过Kerboros等认证方法进行相互之间的认证,以确认对方是否合法。If the
通过认证之后,中控设备20通过短距无线电通信搜索与存储的无线设备ID所对应的无线设备是否处于有效范围之内,也就是能不能再次找到存储的无线设备的ID。After passing the authentication, the
如果同一组无线设备中有一个无线设备处于有效范围之内,则中控设备20向被控设备11和12发送确认信号,可以进行后续的操作,例如进入操作系统。如果此时中控设备20没有找到相关的无线设备,则被控设备11和12自动停机或者提示使用者等待合法用户的到来。If one wireless device in the same group of wireless devices is within the effective range, the
在上述的方法中,以一台可以通过KEY保护的台式机设备作为中控设备20,这样的设备具备蓝牙或者其它短距无线通信能力以及以太网络接口。但是本发明所应用的环境并不局限于上述的系统,也可以使用专门的中控设备作为诸如PC之类的被控设备11和12的附件,附带在被控设备上,通过USB接口与被控设备直接相连,并且该中控设备同样要具备独立的蓝牙功能或者其它短距无线电通信功能。In the above method, a desktop device that can be protected by KEY is used as the
在将中控设备作为被控设备的附件的情况下,被控制设备于中控设备之间的连接不是上述的网络连接,而是直接连接。In the case where the central control device is used as an accessory of the controlled device, the connection between the controlled device and the central control device is not the above-mentioned network connection, but a direct connection.
此外,在上述的方法中,需要合法使用者随时携带无线设备,如果合法用户无意将无线设备置于中控设备20的有效范围之内,而自己处于有效范围之外时,就存在不安全开机的风险。所以,如果在中控设备20的搜索过程中没有找到合适的无线设备,则中控设备20向同一组中的所有无线设备发送请求信号,在一组中的至少一个无线设备返回确认信号,表示允许开机之后,中控设备20再向被控设备11和12发出允许进行后续操作的信号。In addition, in the above-mentioned method, the legal user needs to carry the wireless device at any time. If the legal user does not intend to place the wireless device within the effective range of the
此外,还可以设置中控设备20搜索无线设备的时间,如果超过预定的时间阈值,则禁止被控设备11和12进行后续的操作或者进入操作系统。In addition, the time for the
以上所述,仅为本发明中的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉该技术的人在本发明所揭露的技术范围内,可轻易想到的变换或替换,都应涵盖在本发明的包含范围之内。因此,本发明的保护范围应该以权利要求书的保护范围为准。The above is only a specific implementation mode in the present invention, but the scope of protection of the present invention is not limited thereto. Anyone familiar with the technology can easily think of changes or replacements within the technical scope disclosed in the present invention. All should be covered within the scope of the present invention. Therefore, the protection scope of the present invention should be determined by the protection scope of the claims.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005100702448A CN100383695C (en) | 2005-05-11 | 2005-05-11 | Safety turn-on method in visual range |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005100702448A CN100383695C (en) | 2005-05-11 | 2005-05-11 | Safety turn-on method in visual range |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1862441A CN1862441A (en) | 2006-11-15 |
CN100383695C true CN100383695C (en) | 2008-04-23 |
Family
ID=37389892
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2005100702448A Expired - Lifetime CN100383695C (en) | 2005-05-11 | 2005-05-11 | Safety turn-on method in visual range |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100383695C (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7837102B2 (en) * | 2006-06-15 | 2010-11-23 | Mstar Semiconductor, Inc. | Method and apparatus for computer login security using RFID technology |
CN102200917B (en) * | 2010-03-25 | 2014-09-03 | 研祥智能科技股份有限公司 | Computing equipment and method for determining guiding equipment in startup process |
CN105933291B (en) * | 2016-04-07 | 2019-04-05 | 合肥联宝信息技术有限公司 | A kind of method, smart machine and the server of smart machine safe handling |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0661845A2 (en) * | 1993-12-29 | 1995-07-05 | International Business Machines Corporation | System and method for message authentication in a non-malleable public-key cryptosystem |
CN1253320A (en) * | 1998-10-30 | 2000-05-17 | 联阳半导体股份有限公司 | A device for monitoring the booting process of a personal computer system |
WO2004004279A1 (en) * | 2002-06-26 | 2004-01-08 | Intel Corporation | Active key for wireless device configuration |
CN1527600A (en) * | 2003-03-05 | 2004-09-08 | 华为技术有限公司 | Method and device for secure access to digital broadcasting television network |
US20040190718A1 (en) * | 2003-03-25 | 2004-09-30 | Dacosta Behram Mario | Apparatus and method for location based wireless client authentication |
-
2005
- 2005-05-11 CN CNB2005100702448A patent/CN100383695C/en not_active Expired - Lifetime
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0661845A2 (en) * | 1993-12-29 | 1995-07-05 | International Business Machines Corporation | System and method for message authentication in a non-malleable public-key cryptosystem |
CN1253320A (en) * | 1998-10-30 | 2000-05-17 | 联阳半导体股份有限公司 | A device for monitoring the booting process of a personal computer system |
WO2004004279A1 (en) * | 2002-06-26 | 2004-01-08 | Intel Corporation | Active key for wireless device configuration |
CN1527600A (en) * | 2003-03-05 | 2004-09-08 | 华为技术有限公司 | Method and device for secure access to digital broadcasting television network |
US20040190718A1 (en) * | 2003-03-25 | 2004-09-30 | Dacosta Behram Mario | Apparatus and method for location based wireless client authentication |
Also Published As
Publication number | Publication date |
---|---|
CN1862441A (en) | 2006-11-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8132236B2 (en) | System and method for providing secured access to mobile devices | |
EP2549678B1 (en) | Method and apparatus for protecting software of mobile terminal | |
KR100584429B1 (en) | How to monitor security on your Bluetooth device | |
EP2895982B1 (en) | Hardware-enforced access protection | |
WO2018072215A1 (en) | Security verification method and apparatus | |
RU2684584C1 (en) | Device for storing information and operation method thereof | |
US20070226778A1 (en) | Bluetooth theft protection | |
US20030199267A1 (en) | Security system for information processing apparatus | |
US8654977B2 (en) | System and method for controlling access between Bluetooth devices | |
US20120135683A1 (en) | System and method for configuring an access list for bluetooth devices | |
JP2004102682A (en) | Terminal lock system and terminal lock method | |
CN101655814A (en) | Method for authenticating smart battery and terminal | |
WO2016072833A1 (en) | System and method to disable factory reset | |
WO2016070611A1 (en) | Method for processing data, server and terminal | |
WO2020193965A1 (en) | A computing device, method and system for controlling the accessibility of data | |
CN100383695C (en) | Safety turn-on method in visual range | |
CN104376251A (en) | Computer, computer start-up control system and computer start-up control method | |
JP2022076942A (en) | Communication equipment, control methods for communication equipment, and programs | |
JP6071109B2 (en) | Portable terminal device and program | |
CN107154999B (en) | Terminal and unlocking method and storage device based on environmental information | |
KR20090127676A (en) | Security system of personal computer using Bluetooth communication and security method by the system | |
JP4894382B2 (en) | Security system, information processing apparatus, information protection method, program | |
JP6911303B2 (en) | Authentication system and authentication method | |
JP6311804B2 (en) | Terminal device and program | |
JP6517641B2 (en) | Wireless communication device, method, system and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CX01 | Expiry of patent term | ||
CX01 | Expiry of patent term |
Granted publication date: 20080423 |