CN101916348A - Method and system for safely guiding operating system of user - Google Patents
Method and system for safely guiding operating system of user Download PDFInfo
- Publication number
- CN101916348A CN101916348A CN2010102535794A CN201010253579A CN101916348A CN 101916348 A CN101916348 A CN 101916348A CN 2010102535794 A CN2010102535794 A CN 2010102535794A CN 201010253579 A CN201010253579 A CN 201010253579A CN 101916348 A CN101916348 A CN 101916348A
- Authority
- CN
- China
- Prior art keywords
- kernel
- micro
- user
- authentication
- operating system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention belongs to the field of information security, and in particular relates to a method for performing login authentication and safely guiding another operating system by using a microkernel. The method comprises the following steps of: running the microkernel after starting a computer; by using security environment provided by the microkernel, performing authentication on a microkernel local computer and performing authentication on a network server or a USB key; and performing secondary authentication on a user account and a password input by a user. After two-time authentication is successful, the microkernel guides the operating system of the user, so that the information security of the user is protected and the safety and confidentiality of computer user information are improved.
Description
Technical field
The invention belongs to information security field, be specifically related to a kind of safety guide method and guidance system of operating system of user, carry out login authentication, and realize entering operating system of user by this micro-kernel safe guidance by micro-kernel.The present invention has ensured the operating system security start guiding of computer, improves the security and the confidentiality of computer user information.
Technical background
Along with popularizing of computing machine and notebook, computer has become the indispensable part of live and work, except the storage individual privacy information, the business information that has unit one belongs to and mechanism simultaneously, storing important country and department's confidential information in government bodies, military project computing machine and notebook, sensitive data is in case stolen by the lawless person or lose, will cause the consequence that can't estimate.The first step for the protection of user computer generally realizes with startup password.
Current method for user's startup password protection computer has 2 kinds at present, and a kind of is the start of cmod password, and also having a kind of is operating system of user account password login start.These two kinds of starts have been proved to be safety inadequately, be easy to be cracked, thereby for the user be inadequately safety.
Summary of the invention
The object of the present invention is to provide a kind of safety guide method of operating system of user, this method can guarantee that operating system starts shooting under the situation of being authorized to authenticate, start to user's operating system, prevent the potential safety hazard that disabled user's start brings effectively, and had safe characteristics.
The method of the pre-bootstrapping authentication of micro-kernel provided by the invention is characterized in that: a Mach goes to guide another operating system; Micro-kernel has at first passed through the bidirectional identity authentication with the webserver or usb key; again after the safety certification by user cipher and the webserver or user cipher and usb key; just can go to guide the operating system that starts on the computer; tackle all operations, the protection computerized information at disabled user's start.
Based on the method for pre-another operating system of bootstrapping authentication of above-mentioned micro-kernel, its step comprises:
1. booting computer moves micro-kernel;
2. micro-kernel starts network and is connected with server and carries out bidirectional identity authentication, and perhaps micro-kernel startup usb is connected with usb key and carries out bidirectional identity authentication, after bidirectional identity authentication passes through, changes step over to 3.; If above verification process does not all pass through, then still change step over to 2., repeatedly behind the authentification failure, change step over to 5.;
3. user account and password input frame appear in micro-kernel; Wait for user's input; After the user inputs user account and password, again these information are submitted to server or usb key carries out the user account password authentification of message, after authentication is passed through, change step over to 4.; If above verification process please weigh first input, and change step over to 3. not by then pointing out user account and password input error; Behind three authentification failures of user, change step over to 5.;
4. micro-kernel guides user's operating system (windows or linux or mac or other operating system).The computer security guiding, the user enters the operating system that oneself will be used.
5. micro-kernel prompting authentification failure shuts down after 3 seconds automatically.Shut down of computer after 3 seconds;
6. stop.
The invention allows for a kind of secure guiding system of realizing said method, comprise certificate server, and usb key flash memory device and micro-kernel; Certificate server and usb key user computer finger print information and user account password Hash information in internal storage respectively, are used to provide computer authentication and authenticating user identification respectively; Put the finger print information of certificate server and usb key in the micro-kernel, be used to provide the authentication of certificate server and the authentication of usb key respectively; Certificate server places in certain trust domain, micro-kernel is kept in communication with it by network, micro-kernel obtains the identity fingerprint information of certificate server earlier and compares, again oneself computer authentication information and user's ID authentication information are issued server after the unanimity, certificate server passes computer authentication information and the information of authenticating user identification and the comparing of preserving before of coming with micro-kernel by network, and comparative result is returned to micro-kernel; Usbkey is taken care of by the user, and guarantees its safety by the user; Micro-kernel is by usb and usb key communication, micro-kernel obtains usb key identity fingerprint information earlier and compares, again oneself computer authentication information and user's ID authentication information are issued usb key after the unanimity, usb key passes computer authentication information and the user's ID authentication information and comparing of preserving before come with micro-kernel, and returns comparative result to micro-kernel.
Described micro-kernel is made up of following module: the authentication interface module, the usb module, mixed-media network modules mixed-media, os-bootloader module schedules module, wherein, the authentication interface module provides the output of user account password input and current information, the usb module provides usb host function, and communicate with usb key, mixed-media network modules mixed-media provides a network environment, communicates with network authentication server, and the os-bootloader module provides the function of guiding operating system of user, scheduler module then is to handle the function of dispatching between the above-mentioned module, thereby realizes the function of micro-kernel safe guidance.
The present invention has guaranteed the safe guidance of operating system of user from three aspects, at first micro-kernel moves and mixed-media network modules mixed-media and usb module are provided, and the environment of a safety certification is provided for system; Next is the information of user computer fingerprint, the bidirectional identity authentication of the information of user account password and the webserver or the finger print information of usb key own and user account password authentification of message, computer that the assurance legal users is legal and the ability of legitimate network server or usb key authenticate effectively.Be at last behind the authentication success micro-kernel guiding user operating system, guaranteed the safe guidance of operating system of user.
Description of drawings
Fig. 1 is the synoptic diagram of normal computer guiding start-up course;
Fig. 2 is the employed micro-kernel bootstrapping authentication of a inventive method synoptic diagram;
Fig. 3 is the process flow diagram of the employed usb key authentication of the inventive method version;
Fig. 4 is the process flow diagram of the employed webserver authentication of the inventive method version;
Embodiment
Below in conjunction with accompanying drawing, describe the present invention in detail by concrete case study on implementation.
As Fig. 1, be normal launch computer process synoptic diagram.
As Fig. 2, be the used launch computer process synoptic diagram of the present invention, with normal different place, be before the guiding operating system of user, to have moved micro-kernel earlier, carried out authentication operation, after the authentication success, go to guide user's operating system again.
According to the difference of authenticating device, be divided into webserver authentication version and usb key authentication version, detailed workflow is seen Fig. 3 (usb key authenticates version) and Fig. 4 (webserver authentication version).Describe this course of work below in detail.
The installation process step is as follows:
1. the webserver is installed: move installation procedure on the webserver, the webserver is collected the hardware information of this machine, as hard disk serial number, CPU serial number, the information that network interface card mac etc. are relevant, generate the identity fingerprint information of the webserver according to these information and random number, and preserve.
2. micro-kernel is installed (webserver authentication version): move installation procedure on user computer, installation procedure is collected the hardware information of this machine, as hard disk serial number, CPU serial number, the information that network interface card mac etc. are relevant is according to the identity fingerprint information of these information and this machine of random number generation user.User account and password input frame occur, collect user account and encrypted message, add random number, generate user account and encrypted message.Micro-kernel connects the webserver then, and the identity fingerprint information of fetching the webserver is preserved, and oneself identity fingerprint information and user account and encrypted message are sent to webserver preservation.Installation procedure is write micro-kernel on the hard disk of user computer, and the new mbr that can guide micro-kernel is write on 0 sector of hard disk, replaces the mbr on the hard disk, can guide micro-kernel so that computer weighs when starting shooting earlier, starts the login authentication service.
3. micro-kernel is installed (usb key authenticates version): move installation procedure on user computer, installation procedure is collected the hardware information of this machine, as hard disk serial number, CPU serial number, the information that network interface card mac etc. are relevant is according to the identity fingerprint information of these information and this machine of random number generation user.Micro-kernel is searched usb key, find usb key after, the identity fingerprint information of the usb key that reads back is also preserved.User account and password input frame occur, collect user account and encrypted message, add random number, generate user account and encrypted message, the identity fingerprint information of oneself and user account and encrypted message are write back to usb key preserve.Installation procedure is write micro-kernel on the hard disk of user computer, and the new mbr that can guide micro-kernel is write on 0 sector of hard disk, replaces the mbr on the hard disk, can guide micro-kernel so that computer weighs when starting shooting earlier, starts the login authentication service.
System's operational process step is as follows, as Fig. 3 and Fig. 4:
1. user's start, the micro-kernel operation.User's start, computer begins self check, after self check finishes, and the mbr on the operation hard disk, this mbr can guide micro-kernel, after micro-kernel moved, the authentication of this machine was being carried out in prompting, and begins to enter the bidirectional identity authentication stage, the webserver authenticates version in this way, then arrive step 2, otherwise be usb key authentication version, to step 3.
2. bidirectional identity authentication process (webserver authentication version): micro-kernel starts the network service and connects with the webserver, and obtain the identity fingerprint information of the webserver, these information of preserving when installing with this machine relatively, think that the webserver is legal when consistent, and then the identity fingerprint information of oneself issued the webserver, the webserver thinks that the user computer identity is legal with information of receiving and the comparison of preserving before when consistent.All during success, the success of bidirectional identity authentication process just can enter user account and cipher authentication stage for two authentications, to step 4, otherwise to authentification failure the processing stage, arrives step 7.
3. bidirectional identity authentication process (usb key authenticates version): user computer start, the operation micro-kernel, micro-kernel starts usb, and scanning usb key equipment is after scanning usb key, obtain usb key fingerprint identity information, these information of preserving when installing with this machine are relatively thought that usb key is legal when consistent, and then the identity fingerprint information of oneself are issued usb key, usb key thinks that the user computer identity is legal with information of receiving and the comparison of preserving before when consistent.When two authentications were all successful, the success of bidirectional identity authentication process just can enter user account and cipher authentication stage, to step 5., otherwise to the authentification failure processing stage, to step 7.
4. user account and cipher authentication (webserver authentication version): micro-kernel sends to the webserver with the account and the encrypted message of user's input, the webserver is write the comparison of preserving before after receiving these information, the result is returned to micro-kernel, when consistent, think that user account and cipher authentication are successful, to the micro-kernel guiding operating system of user stage, to step 6.Otherwise the processing stage of to authentification failure, to step 7.
5. user account and cipher authentication (usb key authenticates version): micro-kernel sends to usb key with the account and the encrypted message of user's input, usb key writes the comparison of preserving before after receiving these information, the result is returned to micro-kernel, when consistent, think that user account and cipher authentication are successful, to the micro-kernel guiding operating system of user stage, to step 6.Otherwise the processing stage of to authentification failure, to step 7.
6. micro-kernel guides operating system of user: micro-kernel calls booting operating system program (bootloader) not respectively according to the difference of operating system of user type, guides user's operating system.The user enters the operating system of oneself.
7. authentification failure is handled: safe micro-kernel prompting authentification failure, shutdown after 3 seconds, shutdown after 3 seconds then.
The above is preferred embodiment of the present invention, but the present invention should not be confined to the disclosed content of this embodiment and accompanying drawing.So everyly do not break away from the equivalence of finishing under the spirit disclosed in this invention or revise, all fall into the scope of protection of the invention.
Claims (7)
1. the safety guide method of an operating system of user, utilize micro-kernel carry out safety certification and safety certification by after go to guide user's operating system, thereby realize safe guidance to operating system of user, these method concrete steps are as follows:
(1) booting computer, the operation micro-kernel;
(2) described micro-kernel and authenticating device carry out bidirectional identity authentication, after bidirectional identity authentication passes through, enter step (3); If repeatedly behind the authentification failure, micro-kernel is pointed out authentification failure, and shutdown automatically behind certain hour;
(3) user account password authentification of message
User account and password input frame appear in micro-kernel, after the user inputs user account and password, again these information are submitted to described authenticating device and carry out the user account password authentification of message, after authentication is passed through, enter step (4), if repeatedly behind the authentification failure, micro-kernel is pointed out authentification failure, and shutdown automatically behind certain hour;
(4) micro-kernel guiding user's operating system
Micro-kernel calls booting operating system program not respectively according to the difference of operating system of user type, guides user's operating system, and the user enters the operating system of oneself.
2. the safety guide method of a kind of operating system according to claim 1 is characterized in that, described authenticating device is the webserver, and described bidirectional identity authentication detailed process is:
(2.1) micro-kernel is initiated and the connecting of the webserver, and connecting fails directly returns failure;
(2.2) if connects successfully, then from the webserver obtain the server identity finger print information and with micro-kernel the check and correction of preserving, think the authenticating network server during unanimity successfully, otherwise authentification failure directly returns failure;
(2.3) after the authenticating network server success, the identity fingerprint information of micro-kernel is sent to webserver check and correction, think the success of this machine of authentication micro-kernel when consistent, and the return authentication result gives micro-kernel, otherwise authentification failure directly returns failure.
3. the safety guide method of a kind of operating system according to claim 1 is characterized in that, described authenticating device is usb key, and described bidirectional identity authentication detailed process is:
(3.1) described micro-kernel scanning usb key, scanning is returned failure less than to usb key the time;
(3.2) scan usb key after, send command information to usb key, fetch the identity fingerprint information of usb key, the inner finger print information of preserving in these information and the micro-kernel is compared, when consistent, think legal usb key, authentication usb key success, otherwise failure is returned in authentication usb key failure;
(3.3) after the authentication usb key success, micro-kernel sends to usbkey with the identity fingerprint information of this machine, usb key compares these information and inner this machine of micro-kernel finger print information of preserving, and the result who returns comparison gives micro-kernel, this machine of usb key authentication micro-kernel success when returning success, otherwise usbkey authenticates the failure of this machine, returns failure.
4. according to the safety guide method of one of claim 1-3 described a kind of operating system, it is characterized in that the detailed process of described user account password authentification of message is:
(4.1) micro-kernel is according to user's account and cryptographic calculations cryptographic hash, and this cryptographic hash is passed to authenticating device;
(4.2) described authenticating device compares the value of above-mentioned cryptographic hash with storage in advance, and is successful to micro-kernel return authentication user when consistent, return authentication user failure when inconsistent.
5. according to the safety guide method of one of claim 1-4 described a kind of operating system, it is characterized in that described micro-kernel comprises:
The authentication interface module is used to provide the output of user account password input and current information;
The usb module is used to provide usb host function, and communicates with usb key;
Mixed-media network modules mixed-media is used to provide network environment, to communicate with network authentication server;
The os-bootloader module provides the booting operating system program, is used to provide operating system of user;
Scheduler module is used for the scheduling between each module, realizes the safe guidance of micro-kernel.
6. realize the secure guiding system of one of claim 1-5 described safety guide method, comprise authenticating device and micro-kernel, described authenticating device has been deposited user computer finger print information and user account password Hash information, be used to provide computer authentication and authenticating user identification respectively, described safe micro-kernel internal memory is placed with the finger print information of authenticating device, be used to provide the authentication of authenticating device
Described micro-kernel obtains the identity fingerprint information of authenticating device earlier and compares, again oneself computer authentication information and user's ID authentication information are issued described authenticating device after the unanimity, described authenticating device is with the information of this computer authentication information and authenticating user identification and comparing of preserving before, if comparative result unanimity, show authentication success, micro-kernel enters the operating system of oneself according to operating system of user type guiding user.
7. secure guiding system according to claim 6 is characterized in that, described authenticating device is the webserver or usb key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102535794A CN101916348A (en) | 2010-08-16 | 2010-08-16 | Method and system for safely guiding operating system of user |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102535794A CN101916348A (en) | 2010-08-16 | 2010-08-16 | Method and system for safely guiding operating system of user |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101916348A true CN101916348A (en) | 2010-12-15 |
Family
ID=43323858
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010102535794A Pending CN101916348A (en) | 2010-08-16 | 2010-08-16 | Method and system for safely guiding operating system of user |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101916348A (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102685125A (en) * | 2012-05-07 | 2012-09-19 | 上海市共进通信技术有限公司 | System for realizing cloud-end encrypted control of wireless device and cloud-end encryption starting method |
CN102904719A (en) * | 2011-07-27 | 2013-01-30 | 国民技术股份有限公司 | USB (universal serial bus)-key and application method thereof |
CN104580136A (en) * | 2014-09-10 | 2015-04-29 | 中电科技(北京)有限公司 | UEFI-based long-distance identity authentication system and method |
CN104572093A (en) * | 2014-12-30 | 2015-04-29 | 北京工业大学 | Method for realizing bi-operation system starting of terminal equipment by using USB (universal serial bus) controller |
CN104615938A (en) * | 2015-02-25 | 2015-05-13 | 山东超越数控电子有限公司 | Power-on authentication method based on solid-state hard disk drive |
CN104981778A (en) * | 2013-02-22 | 2015-10-14 | 马维尔国际贸易有限公司 | Patching boot code of read-only memory |
CN105630519A (en) * | 2014-10-29 | 2016-06-01 | 江苏威盾网络科技有限公司 | Safety boot authentication method based on two-dimensional code |
WO2016090836A1 (en) * | 2014-12-12 | 2016-06-16 | 中兴通讯股份有限公司 | Method and apparatus for starting embedded system |
CN106295318A (en) * | 2015-06-05 | 2017-01-04 | 北京壹人壹本信息科技有限公司 | A kind of system start-up bootstrap technique and device |
CN106897626A (en) * | 2017-02-16 | 2017-06-27 | 合肥联宝信息技术有限公司 | It is a kind of to realize the method and device that intelligent terminal is guided safely |
CN106973054A (en) * | 2017-03-29 | 2017-07-21 | 山东超越数控电子有限公司 | A kind of operating system login authentication method and system based on credible platform |
CN107292182A (en) * | 2017-06-29 | 2017-10-24 | 江苏鲁汶仪器有限公司 | A kind of semiconductor equipment control system hot plug is anti-to crack tailored version hardware encipherment protection device |
CN107506289A (en) * | 2017-07-06 | 2017-12-22 | 广东网金控股股份有限公司 | The abnormality monitoring method and financial terminal of a kind of financial terminal |
CN108388792A (en) * | 2018-03-21 | 2018-08-10 | 北京力鼎创软科技有限公司 | A kind of office operation system reinforcement method and system |
CN109327597A (en) * | 2018-08-03 | 2019-02-12 | 奇酷互联网络科技(深圳)有限公司 | The method, apparatus of the entrance of mobile terminal and secret system |
CN110502280A (en) * | 2019-07-09 | 2019-11-26 | 宇龙计算机通信科技(深圳)有限公司 | Starting method, apparatus, storage medium and the terminal of Android operation system |
CN112818304A (en) * | 2019-11-15 | 2021-05-18 | 鹤壁天海电子信息系统有限公司 | Unlocking method and device |
CN112966276A (en) * | 2021-04-02 | 2021-06-15 | 杭州华澜微电子股份有限公司 | Method, device and medium for safely starting computer |
CN113254904A (en) * | 2021-07-06 | 2021-08-13 | 浙江宇视科技有限公司 | Intelligent processing method, device, equipment and medium for multi-dimensional information acquisition and identification |
CN114139131A (en) * | 2021-12-03 | 2022-03-04 | 深圳竹云科技有限公司 | Operating system login method and device and electronic equipment |
CN114417305A (en) * | 2021-12-31 | 2022-04-29 | 联想(北京)有限公司 | A control method and control device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1869999A (en) * | 2006-06-28 | 2006-11-29 | 北京飞天诚信科技有限公司 | Protection method and device for opening computer |
CN1936761A (en) * | 2005-09-23 | 2007-03-28 | 联想(北京)有限公司 | Computer system of bottom identity identification and method therefor |
KR100910541B1 (en) * | 2009-04-08 | 2009-07-31 | 장인천 | Computer Security System and Operation Method Using Tag |
CN101777105A (en) * | 2010-01-25 | 2010-07-14 | 上海北大方正科技电脑系统有限公司 | Computer booting anti-counterfeit authentication method based on BIOS |
-
2010
- 2010-08-16 CN CN2010102535794A patent/CN101916348A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1936761A (en) * | 2005-09-23 | 2007-03-28 | 联想(北京)有限公司 | Computer system of bottom identity identification and method therefor |
CN1869999A (en) * | 2006-06-28 | 2006-11-29 | 北京飞天诚信科技有限公司 | Protection method and device for opening computer |
KR100910541B1 (en) * | 2009-04-08 | 2009-07-31 | 장인천 | Computer Security System and Operation Method Using Tag |
CN101777105A (en) * | 2010-01-25 | 2010-07-14 | 上海北大方正科技电脑系统有限公司 | Computer booting anti-counterfeit authentication method based on BIOS |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102904719A (en) * | 2011-07-27 | 2013-01-30 | 国民技术股份有限公司 | USB (universal serial bus)-key and application method thereof |
CN102904719B (en) * | 2011-07-27 | 2016-05-18 | 国民技术股份有限公司 | The using method of a kind of USB-key and USB-key |
CN102685125A (en) * | 2012-05-07 | 2012-09-19 | 上海市共进通信技术有限公司 | System for realizing cloud-end encrypted control of wireless device and cloud-end encryption starting method |
CN104981778A (en) * | 2013-02-22 | 2015-10-14 | 马维尔国际贸易有限公司 | Patching boot code of read-only memory |
CN104580136A (en) * | 2014-09-10 | 2015-04-29 | 中电科技(北京)有限公司 | UEFI-based long-distance identity authentication system and method |
CN105630519A (en) * | 2014-10-29 | 2016-06-01 | 江苏威盾网络科技有限公司 | Safety boot authentication method based on two-dimensional code |
WO2016090836A1 (en) * | 2014-12-12 | 2016-06-16 | 中兴通讯股份有限公司 | Method and apparatus for starting embedded system |
CN104572093A (en) * | 2014-12-30 | 2015-04-29 | 北京工业大学 | Method for realizing bi-operation system starting of terminal equipment by using USB (universal serial bus) controller |
CN104615938A (en) * | 2015-02-25 | 2015-05-13 | 山东超越数控电子有限公司 | Power-on authentication method based on solid-state hard disk drive |
CN106295318A (en) * | 2015-06-05 | 2017-01-04 | 北京壹人壹本信息科技有限公司 | A kind of system start-up bootstrap technique and device |
CN106897626A (en) * | 2017-02-16 | 2017-06-27 | 合肥联宝信息技术有限公司 | It is a kind of to realize the method and device that intelligent terminal is guided safely |
CN106897626B (en) * | 2017-02-16 | 2020-04-14 | 合肥联宝信息技术有限公司 | Method and device for realizing intelligent terminal safety guide |
CN106973054A (en) * | 2017-03-29 | 2017-07-21 | 山东超越数控电子有限公司 | A kind of operating system login authentication method and system based on credible platform |
CN107292182A (en) * | 2017-06-29 | 2017-10-24 | 江苏鲁汶仪器有限公司 | A kind of semiconductor equipment control system hot plug is anti-to crack tailored version hardware encipherment protection device |
CN107506289A (en) * | 2017-07-06 | 2017-12-22 | 广东网金控股股份有限公司 | The abnormality monitoring method and financial terminal of a kind of financial terminal |
CN108388792A (en) * | 2018-03-21 | 2018-08-10 | 北京力鼎创软科技有限公司 | A kind of office operation system reinforcement method and system |
CN109327597A (en) * | 2018-08-03 | 2019-02-12 | 奇酷互联网络科技(深圳)有限公司 | The method, apparatus of the entrance of mobile terminal and secret system |
CN110502280A (en) * | 2019-07-09 | 2019-11-26 | 宇龙计算机通信科技(深圳)有限公司 | Starting method, apparatus, storage medium and the terminal of Android operation system |
CN110502280B (en) * | 2019-07-09 | 2024-01-05 | 宇龙计算机通信科技(深圳)有限公司 | Android operating system starting method and device, storage medium and terminal |
CN112818304A (en) * | 2019-11-15 | 2021-05-18 | 鹤壁天海电子信息系统有限公司 | Unlocking method and device |
CN112966276A (en) * | 2021-04-02 | 2021-06-15 | 杭州华澜微电子股份有限公司 | Method, device and medium for safely starting computer |
CN113254904A (en) * | 2021-07-06 | 2021-08-13 | 浙江宇视科技有限公司 | Intelligent processing method, device, equipment and medium for multi-dimensional information acquisition and identification |
CN113254904B (en) * | 2021-07-06 | 2021-10-22 | 浙江宇视科技有限公司 | Intelligent processing method, device, equipment and medium for multi-dimensional information acquisition and identification |
CN114139131A (en) * | 2021-12-03 | 2022-03-04 | 深圳竹云科技有限公司 | Operating system login method and device and electronic equipment |
CN114417305A (en) * | 2021-12-31 | 2022-04-29 | 联想(北京)有限公司 | A control method and control device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101916348A (en) | Method and system for safely guiding operating system of user | |
CN101340281B (en) | Method and system for safe login input on network | |
KR102493744B1 (en) | Security Verification Method Based on Biometric Characteristics, Client Terminal, and Server | |
EP3706019B1 (en) | Hardware-enforced access protection | |
CN102624699B (en) | Method and system for protecting data | |
EP3262560B1 (en) | System and method for verifying integrity of an electronic device | |
CN112513857A (en) | Personalized cryptographic security access control in a trusted execution environment | |
US20050228993A1 (en) | Method and apparatus for authenticating a user of an electronic system | |
US20120030475A1 (en) | Machine-machine authentication method and human-machine authentication method for cloud computing | |
JP6468013B2 (en) | Authentication system, service providing apparatus, authentication apparatus, authentication method, and program | |
WO2019205389A1 (en) | Electronic device, authentication method based on block chain, and program and computer storage medium | |
EP3767502B1 (en) | Secure storing and processing of data | |
CN102184357B (en) | Portable trustworthy private information processing system | |
US20150264047A1 (en) | Method and system for providing secure communication between multiple operating systems in a communication device | |
US20170147801A1 (en) | Pre-boot authentication credential sharing system | |
CN102184358B (en) | USB (Universal Serial Bus) embedded trustworthiness private information processing device and system | |
US20170201528A1 (en) | Method for providing trusted service based on secure area and apparatus using the same | |
CN113221095A (en) | Application program protection method and device, electronic equipment and storage medium | |
CN106911744A (en) | The management method and managing device of a kind of image file | |
EP3901799A1 (en) | Systems and methods for remote anomaly data scanner for cyber-physical systems | |
US11032261B2 (en) | Account recovery using identity assurance scoring system | |
US20220413936A1 (en) | Software containers | |
Kamal et al. | Secure mobile id architecture on android devices based on trust zone | |
US20230327876A1 (en) | Authentication apparatus and authentication method | |
CN106598773B (en) | Trusted system reduction apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20101215 |