[go: up one dir, main page]

CN100468434C - Protection method and device for opening computer - Google Patents

Protection method and device for opening computer Download PDF

Info

Publication number
CN100468434C
CN100468434C CNB2006100905216A CN200610090521A CN100468434C CN 100468434 C CN100468434 C CN 100468434C CN B2006100905216 A CNB2006100905216 A CN B2006100905216A CN 200610090521 A CN200610090521 A CN 200610090521A CN 100468434 C CN100468434 C CN 100468434C
Authority
CN
China
Prior art keywords
information safety
safety devices
legal
user
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2006100905216A
Other languages
Chinese (zh)
Other versions
CN1869999A (en
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Original Assignee
Beijing Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Feitian Technologies Co Ltd filed Critical Beijing Feitian Technologies Co Ltd
Priority to CNB2006100905216A priority Critical patent/CN100468434C/en
Publication of CN1869999A publication Critical patent/CN1869999A/en
Priority to JP2007165000A priority patent/JP2008009981A/en
Application granted granted Critical
Publication of CN100468434C publication Critical patent/CN100468434C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Stored Programmes (AREA)

Abstract

A method for realizing protection of opening computer verifies user status by utilizing self-written program integrated with information safety device when computer is started up by user. The start-up protection device of computer consists of initialization system module, program verification module and information safety module.

Description

Guard method of a kind of realization opening computer and device
Technical field
The present invention relates to information security field, the particularly a kind of USB of utilization Key realizes the method and the device of computer booting protection.
Background technology
At present, under common power on mode, when the user started computing machine, power-on protection method commonly used was to confirm by requiring the user to input password whether user's identity is legal.
Each user's password is set by this user oneself, has only own this talent to know, as long as therefore can correctly input password, computing machine just thinks that he is exactly the user of this machine.Yet because many users forget Password in order to prevent, often employing such as own or household's birthday, telephone number etc. are as password, and these significant character strings are guessed by other people easily; Perhaps adopt password copied at one and oneself think safe place, this also exists potential safety hazard, very easily causes password to reveal; And if hard disk is transplanted in the computing machine that does not have cryptoguard the just normal startup of feasible system.Therefore the usemame/password mode is a kind of identification authentication mode with potential safety hazard.
In general, computing machine can only be discerned user's digital identity, and all mandates to the user also are the mandates at the number identity.And our real world of life is a real physical world, and everyone has unique physical identity.How to guarantee with the operator that digital identity is operated to be exactly the lawful owner of this digital identity, that is to say that the physical identity that guarantees the operator is corresponding with digital identity, just become a very important problem.
In addition, the various computing machine uses the mode of different chipset visit USB difference can occur, and promptly there is defective in compatibility.This just need be with utilizing a kind of technology to shield this difference.
In sum, the shortcoming of prior art is:
1. there is potential safety hazard, causes password to reveal;
2. the binding of operator's physical identity and digital identity does not guarantee;
3. there is defective in compatibility.
Summary of the invention
There is potential safety hazard in computing machine power-on protection method in the prior art in order to overcome, and the purpose of this invention is to provide the guard method of a kind of realization opening computer, said method comprising the steps of:
The new MBR program of on hard disk, packing into and simplify operating system, described new MBR program is positioned at the zone of former MBR program, and carries out following steps:
Steps A: when the user starts computing machine, after mainboard BIOS is booted, system's control is transferred to described new MBR program;
Step B: after the described new MBR program run,, and transfer system's control to the described operating system of simplifying the described operating system graftabl of simplifying;
Step C: described operating system and the information safety devices associated of simplifying, utilize described information safety devices identifying user identity, if the verification passes, finish power-on protection; Otherwise authentication failed, computing machine enter the abnormality processing state.
The described new MBR program and simplify operating system and specifically may further comprise the steps of on hard disk, packing into:
Steps A ': original MBR program on the hard disc of computer is sheared, and be put into the appointed area of hard disk;
Step B ': pack into the MBR zone of described hard disk of the new MBR program that will develop;
Step C ': will simplify pack into another appointed area of hard disk of operating system.
Describedly utilize described information safety devices identifying user identity, if the verification passes, finish power-on protection; Otherwise authentication failed, computing machine enter the abnormality processing state and specifically may further comprise the steps:
Step C1: check whether the user inserts information safety devices, if inserted described information safety devices, execution in step C2, otherwise execution in step C3;
Step C2: utilize described information safety devices identifying user identity whether legal, if carry out step C4; Otherwise carry out step C5;
Step C3: the prompting user inserts described information safety devices, and forwards step C1 to;
Step C4: the user is by authentication, and computing machine continues normal the startup;
Step C5: whether the checking number of times of judging this start back user's failure reaches setting value, if reach this setting value, computing machine enters the abnormality processing state; Otherwise return step C2.
Described information safety devices is USB Key.
Whether legal concrete grammar comprises following method to identifying user identity among the described step C2:
Whether the PIN code of checking user input is legal;
Whether checking user's biological characteristic is legal;
Whether comprise legal data in the information safety devices that the checking user provides;
Whether the information safety devices that the checking user provides has legal hardware sequence number;
Some data are sent to information safety devices carry out computing, check whether operation result is legal.
Computing machine among the described step C4 continues normal the startup and is meant that simplifying operating system is transferred to former MBR program to system's control, perhaps skips former MBR programmed instruction, directly control is handed to next programmed instruction.
The present invention provides a kind of realization opening computer protective device simultaneously, and described device comprises initialization system module, proving program module and information safety devices;
Described initialization system module is used for original MBR program on the hard disc of computer is sheared, and be put into the appointed area of hard disk, with the new MBR program of exploitation pack into described hard disk MBR zone and will simplify pack into another appointed area of hard disk of operating system, the relevant information that also is used for the configuration information safety equipment simultaneously, and be associated with the proving program module;
Described proving program module is associated with the information safety devices of configuration, when being used to start computing machine, after mainboard BIOS is booted, control is transferred to new MBR program; And after the described new MBR program run,, transfer system's control to the described operating system of simplifying the described operating system graftabl of simplifying, be used for also that the combining information safety equipment are verified user identity and the reduction of data;
Described information safety devices is used to finish the checking of user identity.
Concrete verification method to user identity in the described proving program module comprises following method:
Whether the PIN code of checking user input is legal;
Whether checking user's biological characteristic is legal;
Whether comprise legal data in the information safety devices that the checking user provides;
Whether the information safety devices that the checking user provides has legal hardware sequence number;
Some data are sent to information safety devices carry out computing, check whether operation result is legal.
Information safety devices is USB Key described in this power-on protection device.
The beneficial effect that technical solution of the present invention is brought is:
Utilize USB Key identifying user identity information; user's physical identity and digital identity are bound; realized protection, utilized the compatible good characteristics of simplifying operating system to overcome the difficulty that the various computing machine uses different chipsets to there are differences simultaneously when visit USB computer booting.
Description of drawings
Fig. 1 is a kind of realization opening computer guard method process flow diagram provided by the invention;
Fig. 2 is the method flow diagram of the USB of utilization Key identifying user identity provided by the invention;
Fig. 3 is a kind of realization opening computer protective device synoptic diagram provided by the invention.
Embodiment
The invention will be further described below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
The invention provides guard method of a kind of realization opening computer and device; this method and apparatus is by writing specific MBR program and simplify operating system in hard disk; in conjunction with USB Key user identity is verified; realization is protected opening computer, utilizes the compatible good characteristics of simplifying operating system to overcome the difficulty that the various computing machine uses different chipsets to there are differences simultaneously when visit USB.
In order better to understand this programme, that the noun specific explanations that the present invention relates to is as follows:
BIOS (Basic Input/Output System, Basic Input or Output System (BIOS)): full name is ROM-BIOS, is writing a Chinese character in simplified form of ROM (read-only memory) basic input/output.It is actual to be one group and to be cured in the computer, for computer provides the lowermost level program of direct hardware controls, it is " converter " or perhaps the interface (though itself also is a program) between hardware and the software program, be responsible for solving the instant requirement of hardware, and hardware operated by the specific requirement of software.The BIOS chip is mainboard lastblock rectangle or square cake core, is provided with the system bootstrapping load module among the BIOS, after self check success with disk the boot graftabl on 0 sector, relative 0 road, allow its operation with the DOS system of packing into; Since BIOS directly and system hardware resources come into contacts with, so always at the hardware system of a certain type, and various hardware system is had nothing in common with each other, so there are various different types of BIOS.
MBR (Main Boot Record, Master boot sector): first sector (being exactly 0 cylinder, 0 magnetic head, 1 sector) that is hard disk, depositing main bootstrap program and primary partition table (Main Partition Table) and end mark " 55AA ", when being used for computing machine system's control is being transferred to certain operating system that computing machine is installed from hard disk startup.When starting computing machine, BIOS at first tests hardware device, i.e. BIOS self check enters bootstrap routine after testing successfully, the Main Boot Record content of reading disk 0 cylinder, 0 magnetic head, 1 sector is transferred to control the programmed instruction among the MBR then to the internal memory designating unit then.Described bootstrapping is meant the MBR that reads in the hard disk after BIOS finishes self check, and drops it off in the internal memory and go.Programmed instruction among the MBR is called in internal memory prior to all operating system, and plays a role.In general, the major function of MBR programmed instruction is as follows: check whether hard disk partition table is intact; In partition table, seek and be labeled as guidable subregion; The first logic sector content graftabl with guidable subregion; System's control is transferred to the memory address that previous step is packed into suddenly.
Linux: be the free class Unix operating system of using and freely propagating of a cover, be one based on the real-time of multi-user, multitask, support multithreading and the many CPU of POSIX (PortableOperating System Interface for UNIX, UNIX portable operation) and UNIX operating system preferably.It can move main unix tool software, application program and procotol.It supports 32 and 64 hardware.It is the design philosophy of core with the network that Linux has inherited Unix, is the multiple-user network operating system of a stable performance.It is mainly used on the computing machine based on Intel x86 series CPU.The Linux open source code can be reduced as required, through the linux system size of reducing even can be less than 1Mb.
FreeBSD: the Unix system that be on a kind of Intel of operating in platform, can freely use, it can go up free the acquisition from Internet.Its reliability height, network performance is strong, and is safe, compatible strong.Other application program of writing on UNIX operating system, source code are passed through a spot of modification or are not just revised and can compile execution on the Freebsd platform.FreeBSD is the same with Linux all to belong to open source software, but FreeBSD has carried out a kind of copyright agreement more open than Linux agreement.FreeBSD allows third party commercial company to develop the application software of copyright to one's name on the FreeBSD platform, or FreeBSD system itself is revised, and need not disclose source code.
Authentication based on USB Key: USB Key is a kind of hardware device of USB interface, and its built-in single-chip microcomputer or intelligent card chip can be stored user's key or digital certificate, utilizes the authentication of the built-in cryptographic algorithm realization of USB Key to user identity.The present main application of USB Key is two kinds: the one, and the protection software copyright; The 2nd, as the digital certificates container and the use of identification sign of internet safe.Authentication based on USB Key is a kind of convenience that grew up in recent years, safe, economic identity identifying technology, and the double strong factor certification mode that it adopts software and hardware to combine has solved the contradiction between security and the ease for use well.Each USB Key hardware all has user PIN (PersonalIndentity Number, PIN (Personal Identification Number)) protection, to realize the double factor authentication function.
Referring to Fig. 1, the invention provides the guard method of a kind of realization opening computer, said method comprising the steps of: the user starts computing machine, after mainboard BIOS is booted, control is handed to new MBR, and again control is handed to by new MBR and to be simplified operating system, simplify operating system and enable one section program,, and utilize this information safety devices identifying user identity with the information safety devices associated, if the verification passes, finish power-on protection; Otherwise authentication failed, computing machine enter the abnormality processing state.The present embodiment information safety devices is example (also can be floppy disk or CD etc.) with USB Key.
These method concrete steps are as follows:
Step 101: utilize the erecting tools program that original MBR program on the hard disc of computer is clipped to the appointed area of hard disk, the appointed area here can be arbitrary zone of removing the MBR zone on the hard disk.
Step 102:, when this new MBR program run, can read automatically and simplify operating system with pack into the MBR zone of described hard disk of MBR program newly developed.
Step 103: utilize the erecting tools program will simplify pack into another appointed area of hard disk of operating system, the appointed area here can be the regional different arbitrary zone that clips to original MBR in the hard disk.
Wherein simplifying operating system is the system of an open source code, utilizing the source code configuration tool that module unnecessary in the origin operation system is removed the back recompilates, just can obtain the required operating system of simplifying, this simplify operating system can remedy original operating system to USB can not fine compatibility problem, its concrete function can compile as required voluntarily, the major function of simplifying operating system of present embodiment is to discern any USB, reach the purpose of compatible all USB, and carry out interactive operation with USB key, reach identifying user identity.The concrete operating system of simplifying can be through the linux system of reduction or the FreeBSD system of process reduction etc., simplifies at this and puts into one section specific program in operating system in advance, and system can visit USB device by this specific program during operation.
Step 101 to step 103 is the system initialization process, and after system initialization was finished, described opening computer guard method specific implementation process was as follows:
Step 104: when the user starts computing machine, after mainboard BIOS is booted, control is transferred to new MBR program.
Step 105: after the new MBR program run, system's control transferred to simplify operating system.
Step 106: simplify operating system and enable one section program,, and utilize this USB Key identifying user identity, if the verification passes, finish power-on protection with USB Key associated; Otherwise authentication failed, computing machine enter the abnormality processing state.
Referring to Fig. 2, simplify operating system and USB Key interactive operation, as follows to the concrete proof procedure of user identity:
Step 201: simplify operating system, check whether the user inserts USB Key, if inserted USB Key, execution in step 202, otherwise execution in step 203.
Step 202: utilize USB Key checking user whether legal, if carry out step 204; Otherwise carry out step 205; Here concrete verification method comprises but following method:
1) whether the PIN code of checking user input can be by USB Key checking;
2) whether checking user's biological characteristic can be by USB Key checking, for example fingerprint, sound, retina etc.;
3) whether comprise legal data among the USB Key that the checking user provides, this legal data packet is drawn together user identity
Relevant information, digital certificate etc.;
4) whether the USB Key that provides of checking user has the hardware sequence number of appointment;
5) some data are sent to USB Key and carry out computing, check whether operation result is expected.
Step 203: the prompting user inserts USB Key, and forwards step 201 to.
Step 204: the user is by authentication, computing machine continues normal the startup, promptly system's control is transferred to former MBR program by simplifying operating system, perhaps skip former MBR programmed instruction, directly control is handed to next programmed instruction, be the object (as: start-up picture) that former MBR is about to deliver control, also might need in this course data are decrypted reduction.
Step 205: whether the checking number of times of judging this start back user's failure reaches setting value, if reach this setting value, carry out step 206, otherwise returns step 202, carries out authentication again.
Step 206: user's checking number of times has surpassed this setting value, and program enters the abnormality processing state.
The realization of this process is by one section programmed instruction of simplifying operating system, realizes jointly in conjunction with USB Key.
Referring to Fig. 3, the present invention provides a kind of realization opening computer protective device simultaneously, and described device comprises initialization system module, proving program module and information safety devices;
Described initialization system module is used for original MBR program on the hard disc of computer is sheared, and be put into the appointed area of hard disk, with the new MBR program of exploitation pack into described hard disk MBR zone and will simplify pack into another appointed area of described hard disk of operating system, the relevant information that also is used for the configuration information safety equipment simultaneously, and be associated with the proving program module;
Described proving program module is associated with the information safety devices of configuration, when being used to start computing machine, after mainboard BIOS is booted, control is transferred to new MBR program; And after the described new MBR program run, system's control transferred to simplify operating system, be used for also that the combining information safety equipment are verified user identity and the reduction of data;
Described information safety devices is used to finish the checking of user identity.
Concrete verification method to user identity in the described proving program module comprises following method:
Whether the PIN code of checking user input is legal;
Whether checking user's biological characteristic is legal;
Whether comprise legal data in the information safety devices that the checking user provides, this legal data packet is drawn together user identity relevant information, digital certificate etc.;
Whether the information safety devices that the checking user provides has legal hardware sequence number;
Some data are sent to information safety devices carry out computing, check whether operation result is legal.
Information safety devices described in this device is USB Key.
Utilize technical solutions according to the invention; user's identity information is stored among the USB Key; legitimacy by USB Key identifying user identity; user's physical identity and digital identity are bound; other people can not obtain the password of validated user by conjecture, have realized the protection to computer booting.
Utilize the compatible good characteristics of simplifying operating system to solve the difficulty that the various computing machine uses different chipsets to there are differences simultaneously when visit USB.
Above-described embodiment, the present invention embodiment a kind of more preferably just, common variation and replacement that those skilled in the art carries out in the technical solution of the present invention scope all should be included in protection scope of the present invention.

Claims (9)

1. realize the opening computer guard method for one kind, it is characterized in that described method specifically comprises: the new MBR program of on hard disk, packing into and simplify operating system, described new MBR program is positioned at the zone of former MBR program, and carries out following steps:
Steps A: when the user starts computing machine, after mainboard BIOS is booted, control is transferred to new MBR program;
Step B: after the described new MBR program run,, and transfer system's control to the described operating system of simplifying the described operating system graftabl of simplifying;
Step C: described operating system and the information safety devices associated of simplifying, utilize described information safety devices identifying user identity, if the verification passes, finish power-on protection; Otherwise authentication failed, computing machine enter the abnormality processing state.
2. a kind of realization opening computer as claimed in claim 1 guard method is characterized in that, the described new MBR program and simplify operating system and specifically may further comprise the steps of packing on hard disk:
Steps A ': original MBR program on the hard disc of computer is sheared, and be put into the appointed area of hard disk;
Step B ': pack into the MBR zone of described hard disk of the new MBR program that will develop;
Step C ': will simplify pack into another appointed area of hard disk of operating system.
3. a kind of realization opening computer as claimed in claim 1 or 2 guard method is characterized in that, describedly utilizes described information safety devices identifying user identity, if the verification passes, finishes power-on protection; Otherwise authentication failed, computing machine enter the abnormality processing state and specifically may further comprise the steps:
Step C1: check whether the user inserts information safety devices, if inserted described information safety devices, execution in step C2, otherwise execution in step C3;
Step C2: utilize described information safety devices identifying user identity whether legal, if carry out step C4; Otherwise carry out step C5;
Step C3: the prompting user inserts described information safety devices, and forwards step C1 to;
Step C4: the user is by authentication, and computing machine continues normal the startup;
Step C5: whether the checking number of times of judging this start back user's failure reaches setting value, if reach this setting value, computing machine enters the abnormality processing state; Otherwise return step C2.
4. a kind of realization opening computer as claimed in claim 3 guard method is characterized in that, described information safety devices is USB Key.
5. a kind of realization opening computer as claimed in claim 3 guard method is characterized in that, whether legal concrete grammar comprises the identifying user identity among the described step C2:
Whether the PIN code of checking user input is legal;
Whether checking user's biological characteristic is legal;
Whether comprise legal data in the information safety devices that the checking user provides;
Whether the information safety devices that the checking user provides has legal hardware sequence number;
Checking sends to information safety devices with some data and carries out computing, checks whether operation result is legal.
6. a kind of realization opening computer as claimed in claim 3 guard method; it is characterized in that; computing machine among the described step C4 continues normal the startup and is meant that simplifying operating system is transferred to former MBR program to system's control; perhaps skip former MBR programmed instruction, directly control is handed to next programmed instruction.
7. realize the opening computer protective device for one kind, it is characterized in that described device comprises initialization system module, proving program module and information safety devices;
Described initialization system module is used for original MBR program on the hard disc of computer is sheared, and be put into the appointed area of hard disk, with the new MBR program of exploitation pack into described hard disk MBR zone and will simplify pack into another appointed area of hard disk of operating system, the relevant information that also is used for the configuration information safety equipment simultaneously, and be associated with the proving program module;
Described proving program module is associated with the information safety devices of configuration, when being used to start computing machine, after mainboard BIOS is booted, control is transferred to new MBR program; And after the described new MBR program run,, transfer system's control to the described operating system of simplifying the described operating system graftabl of simplifying, be used for also that the combining information safety equipment are verified user identity and the reduction of data;
Described information safety devices is used to finish the checking of user identity.
8. a kind of realization opening computer protective device as claimed in claim 7 is characterized in that the concrete verification method to user identity in the described proving program module comprises:
Whether the PIN code of checking user input is legal;
Whether checking user's biological characteristic is legal;
Whether comprise legal data in the information safety devices that the checking user provides;
Whether the information safety devices that the checking user provides has legal hardware sequence number;
Checking sends to information safety devices with some data and carries out computing, checks whether operation result is legal.
9. as claim 7 or 8 described a kind of realization opening computer protective devices, it is characterized in that described information safety devices is USB Key.
CNB2006100905216A 2006-06-28 2006-06-28 Protection method and device for opening computer Expired - Fee Related CN100468434C (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CNB2006100905216A CN100468434C (en) 2006-06-28 2006-06-28 Protection method and device for opening computer
JP2007165000A JP2008009981A (en) 2006-06-28 2007-06-22 Method and device for realizing protection of starting computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2006100905216A CN100468434C (en) 2006-06-28 2006-06-28 Protection method and device for opening computer

Publications (2)

Publication Number Publication Date
CN1869999A CN1869999A (en) 2006-11-29
CN100468434C true CN100468434C (en) 2009-03-11

Family

ID=37443659

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006100905216A Expired - Fee Related CN100468434C (en) 2006-06-28 2006-06-28 Protection method and device for opening computer

Country Status (2)

Country Link
JP (1) JP2008009981A (en)
CN (1) CN100468434C (en)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101256608B (en) 2008-03-25 2010-04-07 北京飞天诚信科技有限公司 Safe operation method and system
CN101377803B (en) * 2008-09-28 2011-08-17 北京飞天诚信科技有限公司 Method and system for implementing start-up protection
CN101770386B (en) * 2010-03-08 2013-06-19 飞天诚信科技股份有限公司 Safe startup method for Linux embedded system
CN102346819A (en) * 2010-07-30 2012-02-08 汉王科技股份有限公司 Electronic reader information display method and device
CN101916348A (en) * 2010-08-16 2010-12-15 武汉天喻信息产业股份有限公司 Method and system for safely guiding operating system of user
CN102455923A (en) * 2010-10-27 2012-05-16 北京南车时代信息技术有限公司 Method and device for processing man-machine interface startup data of engineering machinery vehicle
CN103309769B (en) * 2011-06-20 2016-09-28 北京奇虎科技有限公司 Os starting guard method and device
CN102262574B (en) * 2011-06-20 2013-08-14 奇智软件(北京)有限公司 Boot protecting method and device of operating system
CN103713966B (en) * 2011-06-20 2018-04-13 北京奇虎科技有限公司 Mobile terminal system starting protection method and apparatus
CN102314574A (en) * 2011-07-07 2012-01-11 曙光信息产业股份有限公司 HID (human interface device)-based method for setting access rights of host machine
CN102929824B (en) * 2012-10-15 2016-01-06 天地融科技股份有限公司 A kind of system of multiplexing USB interface transmission data
CN104657644B (en) * 2013-11-22 2018-09-28 中国长城科技集团股份有限公司 a kind of fingerprint collecting authentication method and device
CN103886233B (en) * 2014-04-11 2017-08-04 快车科技有限公司 Method, device and system for improving equipment security by binding hardware
CN104484625B (en) * 2014-12-29 2017-11-03 北京明朝万达科技股份有限公司 A kind of computer and its implementation with dual operating systems
CN104615938A (en) * 2015-02-25 2015-05-13 山东超越数控电子有限公司 Power-on authentication method based on solid-state hard disk drive
CN105046138A (en) * 2015-07-13 2015-11-11 山东超越数控电子有限公司 FT-processor based trust management system and method
CN106897626B (en) * 2017-02-16 2020-04-14 合肥联宝信息技术有限公司 Method and device for realizing intelligent terminal safety guide
CN107741914A (en) * 2017-11-20 2018-02-27 丹东瑞银科技有限公司 Insertion type mobile network information security device and safety protection method
CN110851820B (en) * 2019-11-08 2023-02-03 周口师范学院 A computer management device designed based on artificial intelligence
CN115296854B (en) * 2022-07-08 2024-09-10 中金金融认证中心有限公司 Method for binding intelligent cipher key and terminal and related product

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20020087202A (en) * 2001-05-14 2002-11-22 삼성전자 주식회사 Computer
EP1442349A1 (en) * 2001-09-28 2004-08-04 High Density Devices As Method and device for encryption/decryption of data on mass storage device
JP2005130028A (en) * 2003-10-21 2005-05-19 Yazaki Corp Encryption key and encryption device and decryption device using the same
JP2005202621A (en) * 2004-01-15 2005-07-28 Dainippon Printing Co Ltd Sim adaptor
JP4561213B2 (en) * 2004-07-21 2010-10-13 株式会社日立製作所 Hard disk security management system and method thereof
US7600105B2 (en) * 2004-09-22 2009-10-06 Cyberlink Corp. Systems, methods, and apparatus for providing efficient startup to computers with peripheral devices
JP2006146358A (en) * 2004-11-16 2006-06-08 Nec Nexsolutions Ltd Usb peripheral equipment control system and usb peripheral equipment control method
JP2006163453A (en) * 2004-12-02 2006-06-22 Hitachi Ltd Authentication method using biometric authentication
JP2006158944A (en) * 2005-05-30 2006-06-22 Hq Research Japan:Kk Cerebral function measuring system and method, and computer program

Also Published As

Publication number Publication date
CN1869999A (en) 2006-11-29
JP2008009981A (en) 2008-01-17

Similar Documents

Publication Publication Date Title
CN100468434C (en) Protection method and device for opening computer
CN100454324C (en) A Booting Method for Embedded Platform Based on Trusted Mechanism
Smalley et al. Security enhanced (se) android: bringing flexible mac to android.
CN104794393B (en) A kind of embedded partitions image safety certification and kernel trusted bootstrap method and its equipment
AU635690B2 (en) An apparatus and method for loading a system reference diskette image from a system partition in a personal computer system
CN103748594B (en) For ARM TRUSTZONETMImplemented firmware-based trusted platform module
US8909940B2 (en) Extensible pre-boot authentication
JP5821034B2 (en) Information processing apparatus, virtual machine generation method, and application distribution system
CN100353320C (en) Boot process
CN102004876B (en) Security terminal reinforcing model and reinforcing method of tolerable non-trusted component
CN101167060A (en) System and method for providing a secure boot architecture
JP2001356913A (en) Method and system for booting user authentication type network os utilizing bios pre-boot environment
CN101630353A (en) System and method to secure boot uefi firmware and uefi-aware operating systems on a mobile internet device (mid)
JP2011238277A (en) High integrity firmware
BRPI0707062A2 (en) portable device and method
CN105825131B (en) A kind of computer safety start means of defence based on UEFI
US20130227262A1 (en) Authentication device and authentication method
CN107479931A (en) A kind of method that Linux system application layer refreshes BIOS
EP1631905A1 (en) Dynamic bios execution and concurrent update for a blade server
Spear et al. Solving the starting problem: device drivers as self-describing artifacts
CN104657644A (en) Method and device for acquiring and verifying fingerprint
CN102855421A (en) Method for protecting BIOS (basic input and output system) program from being embezzled, basic input and output system and computing device
CN105138378B (en) A kind of BIOS writes with a brush dipped in Chinese ink method and electronic equipment
CN113486411B (en) Security chip and design method and initialization method thereof
JPH10301854A (en) Chip card and method for importing information on the same

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: FEITIAN CHENGXIN TECHNOLOGIES CO., LTD.

Free format text: FORMER NAME: BEIJING FEITIAN CHENGXIN SCIENCE + TECHNOLOGY CO. LTD.

CP03 Change of name, title or address

Address after: 100085 Beijing city Haidian District Xueqing Road No. 9 Ebizal building B block 17 layer

Patentee after: Feitian Technologies Co.,Ltd.

Address before: 100083, Haidian District, Xueyuan Road, No. 40 research, 7 floor, 5 floor, Beijing

Patentee before: FEITIAN TECHNOLOGIES Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090311