[go: up one dir, main page]

CN1405686A - System and method for ensuring computer host security - Google Patents

System and method for ensuring computer host security Download PDF

Info

Publication number
CN1405686A
CN1405686A CN 01142167 CN01142167A CN1405686A CN 1405686 A CN1405686 A CN 1405686A CN 01142167 CN01142167 CN 01142167 CN 01142167 A CN01142167 A CN 01142167A CN 1405686 A CN1405686 A CN 1405686A
Authority
CN
China
Prior art keywords
card
computer
card reader
mentioned
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 01142167
Other languages
Chinese (zh)
Inventor
陈雅晃
梁政钦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ATOZ TECHNOLOGY (TAIWAN) Inc
Original Assignee
ATOZ TECHNOLOGY (TAIWAN) Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ATOZ TECHNOLOGY (TAIWAN) Inc filed Critical ATOZ TECHNOLOGY (TAIWAN) Inc
Priority to CN 01142167 priority Critical patent/CN1405686A/en
Publication of CN1405686A publication Critical patent/CN1405686A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a system and a method for ensuring the security of a computer host, which ensure the security of the computer host by a hardware and software layer-by-layer protection mode, can prevent the invasion of hackers and protect the security of hard disk data. The system of the present invention is characterized by comprising: a computer motherboard, a processor, a north bridge chip, a south bridge chip, an input/output control chip, a keyboard, a card reader, a fingerprint scanner, a hard disk, an encryption/decryption card, and a shell.

Description

Guarantee the system and method for computer host safety
Technical field
The present invention is relevant a kind of system and method for guaranteeing computer host safety, particularly utilizes the protected mode of hardware and software simultaneously, to guarantee the safety of host computer.
Background technology
Application along with individual privacy and financial sector, though its convenience is popular, but its security is worrying also, especially will dominate the capital construction of whole application in future network identification and payment system, therefore before being extensive use of, must analyze the safety factor of existing system equipment, otherwise once host computer suffers that the illegal production mode is invaded or hard disk is stolen, will make all data exposures or even distorted.
Protect the identifying procedure of computer host safety traditionally; utilize operating system (OS) to do authentication after being generally start; or in start process, utilize basic input/output system (BIOS) to do authentication; yet these authentication methods are started shooting because of main frame; so can't stop the invasion of hacker (hacker) entirely; therefore the present invention could start shooting after need proposing authentication to pass through, but not just does the invention of authentication after the start.In addition; above-mentioned protected mode only has software mode, if the hard disk that stores data directly is stolen, these with software protection mode will be to make a futile effort; therefore the inventor uses the mode of protection hard disk and data thereof simultaneously again, to reach tight security protection.
Content of the present invention
Fundamental purpose of the present invention is to utilize the protected mode of hardware and software simultaneously, to guarantee the safety of host computer.
Another object of the present invention is to utilize authentication modes such as IC-card and identification of fingerprint, the user need authenticate by after just can make host computer start, but not just do authentication after the start.
Another purpose of the present invention be utilize on an enciphering/deciphering card and the shell microswitch with the protection hardware resources safety.
For achieving the above object, the present invention proposes a kind of system that guarantees computer host safety, and it comprises at least:
One computer motherboard, it comprises at least: a processor (Processor); One north bridge wafer (NorthBridge) is connected with processor, is as the flow management between processor and bus-bar, makes processor one operating system and an identification of fingerprint software be arranged in this storer to the access of devices such as storer; One south bridge wafer (South Bridge) is gone into control wafer with north bridge wafer and output and is connected, and is the bridge as USB interface and peripheral device data input processor; And one output go into control wafer, be connected with the south bridge wafer, this is exported and starts computer after control wafer receives only keyboard input proper password;
One keyboard is gone into control wafer with card reader and output and is connected, and just starts keyboard after this card reader authentication is finished and inputs password for the user;
One card reader, it utilizes operation circuit to be connected to above-mentioned computer motherboard, this card reader can be done authentication to IC-card, if legal user, then start-up control circuit, make the computer normal operation, if remove above-mentioned IC-card before above-mentioned computer normal boot-strap, this card reader starts computer and suspends (suspend) function, stops all and exports into action, and, can't restart above-mentioned computer as not authentication again;
One fingerprint scanner, it is connected with above-mentioned computer motherboard, and this fingerprint scanner is to accept the user to import fingerprint data;
One hard disk, it is connected with above-mentioned computer motherboard, and this hard disk is in order to store data;
One enciphering/deciphering card, it is connected with above-mentioned computer motherboard, this enciphering/deciphering card is to be stored to above-mentioned hard disk more earlier this data is done encryption when storing data after, and read again after when above-mentioned hard disk reads data, earlier this data being done decryption processing, the key of this enciphering/deciphering card is stored on the flash memory of this enciphering/deciphering card; And
One shell, it surrounds above-mentioned computer motherboard, card reader, fingerprint scanner, hard disk and enciphering/deciphering card, this shell comprises a microswitch, can start this microswitch when shell is opened, and removes the key in the flash memory that is stored in above-mentioned enciphering/deciphering card.
Cooperate above-mentioned system, the present invention proposes a kind of method of guaranteeing computer host safety, and it comprises following steps:
A. insert IC-card,, start computer by the IC-card identifying procedure;
B. start the operating system, read fingerprint data from hard disk simultaneously;
C. the user imports fingerprint by fingerprint scanner;
Whether d. identification of fingerprint software is compared above-mentioned fingerprint correct; If not, resumes step (c); If continue next step;
E. login operating system;
F. read/store the data of hard disk by the enciphering/deciphering card; This enciphering/deciphering card is to be stored to above-mentioned hard disk more earlier this data is done encryption when storing data after, and read again after when above-mentioned hard disk reads data, earlier this data being done decryption processing, the key of this enciphering/deciphering card is stored on the flash memory of this enciphering/deciphering card, on the shell microswitch is arranged simultaneously, when shell is opened, can start this microswitch, and remove the key in the flash memory that is stored in above-mentioned enciphering/deciphering card; And
G. check that this IC-card is whether still in card reader; If, but normal shutdown then; If not, then this card reader starts the computer pause function, stops all and exports into action, and display message is notified the user simultaneously.
Description of drawings
Fig. 1 is the system schematic of the embodiment of the invention;
Fig. 2 is the main flow chart of the embodiment of the invention;
Fig. 3 is the IC-card identifying procedure figure of the embodiment of the invention;
Fig. 4 is the process flow diagram that the computer of the embodiment of the invention suspends and remove this halted state.
Specific implementation
For disclosing the present invention in detail, following conjunction with figs. elaborates.Fig. 1 shows the system schematic of the embodiment of the invention, and it comprises at least by finding out system of the present invention among the figure: a computer motherboard 110, and this computer motherboard 110 comprises at least: a processor 111; One north bridge wafer 112 is connected with processor 111, is as the flow management between processor 111 and bus-bar, makes processor 111 one operating system and an identification of fingerprint software be arranged in this storer to the access of devices such as storer; One south bridge wafer 113, going into control wafer (present embodiment is the Winbond Super IO wafer 114 for being produced by winbond electronics company) with north bridge wafer 112 and output and be connected, is the bridge as USB interface, PCI interface, IDE interface and peripheral device (as: keyboard 121, serial port 122 and parallel port 123 etc.) data input processor 111; And a Winbond Super IO wafer 114, being connected with south bridge wafer 113, this Winbond Super IO wafer 114 starts computer after receiving only keyboard 121 input proper passwords; One keyboard 121 is connected with card reader 130 and Winbond Super IO wafer 114, just starts keyboard 121 after these card reader 130 authentications are finished and inputs password for the user; One card reader 130, it utilizes circuit to be connected to above-mentioned computer motherboard 110, this card reader 130 can be done authentication to IC-card, if legal user, start-up control circuit then, make the computer normal operation, if remove above-mentioned IC-card before above-mentioned computer normal shutdown, this card reader starts the computer pause function, stops all and exports into action, and as not authentication again, can't restart above-mentioned computer, this card reader has more comprised a light emitting diode (LED) 131 and a timer (not shown), behind the computer normal shutdown, if IC-card does not remove in the given time, can remind the user; One fingerprint scanner 140, it is connected with the USB interface with above-mentioned computer motherboard 110, and this fingerprint scanner 140 is to accept the user to import fingerprint data; One hard disk 150, it is connected with the IDE interface with above-mentioned computer motherboard 110, and this hard disk 150 is in order to store data; One enciphering/deciphering card 160, it is connected with the PCI interface with above-mentioned computer motherboard 110, this enciphering/deciphering card 160 is to be stored to above-mentioned hard disk 150 again this data is done encryption earlier when storing data after, and read again after when above-mentioned hard disk 150 reads data, earlier this data being done decryption processing, even therefore hard disk 150 goes adrift, its inside information also can't be picked out, and the key of this enciphering/deciphering card 160 is stored on the flash memory of this enciphering/deciphering card 160; An and shell 170, it surrounds above-mentioned computer motherboard 110, card reader 130, fingerprint scanner 140, hard disk 150 and enciphering/deciphering card 160, this shell 170 comprises a microswitch 171, usual shell 170 keeps opening circuit when closing, when being opened, shell 170 can start this microswitch 171, produce a clear signal to enciphering/deciphering card 160, and removing is stored in the interior key of flash memory of enciphering/deciphering card 160, when therefore opening shell 170 as if stealer, key will be eliminated, and also can't use even steal enciphering/deciphering card 160; One IC-card (not shown), whether it is to store the user to discern data, be legal use for card reader 130 identifications.
The main flow chart of the embodiment of the invention shown in Figure 2, the user inserts IC-card, behind the IC-card identifying procedure, start computer (as step 210), then start the operating system, read fingerprint data (as step 220) from hard disk 150 simultaneously, the user is by fingerprint scanner 140 input fingerprints (as step 230) then, and whether the above-mentioned fingerprint of identification of fingerprint software comparison correct (as step 240); If not, resumes step 230; If, then can login operating system (as step 250) and carry out general job, but when reading/store hard disk 150 data, it all needs by enciphering/deciphering card 160 (as step 260), this enciphering/deciphering card 160 is to be stored to above-mentioned hard disk 150 again this data is done encryption earlier when storing data after, and read again after when above-mentioned hard disk 150 reads data, earlier this data being done decryption processing, the key of this enciphering/deciphering card 160 is stored on the flash memory of this enciphering/deciphering card 160, on the shell 170 microswitch 171 is arranged simultaneously, when being opened, shell 170 can start this microswitch 171, and remove the interior key of flash memory that is stored in above-mentioned enciphering/deciphering card, also can't use even therefore steal enciphering/deciphering card 160.
The IC-card identifying procedure figure of the embodiment of the invention shown in Figure 3, it is the detailed process of Fig. 2 step 210, at first, card reader 130 enters holding state (as step 310) behind the input current, then the user inserts IC-card to card reader 130 (as step 320), and whether correctly card reader 130 judges IC-card (as step 330); If not, resumes step 310; If, card reader 130 start-up control circuits, make Winbond Super IO wafer 114 start keyboard 121 (as step 340), card reader 130 display message notify the user to input password simultaneously, then the user by keyboard 121 input passwords after (as step 350), whether correctly Winbond Super IO wafer 114 judges this password (as step 360); If not, resumes step 350; If then Winbond Super IO wafer 114 starts computer.
The computer of the embodiment of the invention shown in Figure 4 suspends and removes the process flow diagram of this halted state, and when computer is carried out general job (as step 410), card reader 130 can check always that IC-card is whether still in card reader 130; If, but normal shutdown (as step 470) then; If not, then this card reader starts the computer pause function, stops all and exports into action, simultaneously notify the user (as step 430) via light emitting diode (LED) 131 display message, see then whether the user inserts IC-card (as step 440) again, if not, resumes step 430; If card reader 130 is checked IC-card whether correct (as step 450) once more, if incorrect, resumes step 430; If correct, card reader 130 is removed this halted state, simultaneously resumes step 410.Behind step 470 computer normal shutdown, card reader 130 can check whether IC-card was extracted (as step 480) in 10 seconds, if then finish this flow process; If not, behind the timer inverse to 10 in the card reader 130 second, the sound that can give a warning is reminded the user, simultaneously resumes step 480 (as step 490).
In sum; a kind of system and method for guaranteeing computer host safety provided by the invention; by hardware and software protected mode layer by layer; to guarantee the safety of host computer; can stop hacker's invasion; and the safety of protection data on hard disc, so the important document of Patent Law invention, mere formality application have in accordance with the law been met.
Below the present invention has been done a detailed description, only the above, when not limiting scope of the invention process.To being familiar with the personage of this skill, when carrying out the variation example of various equivalences to it, precisely because all should be included in spirit of the present invention and the scope.

Claims (9)

1、一种确保电脑主机安全的系统,其特征在于至少包含:1. A system for ensuring the security of a computer host, characterized in that it at least includes: 一电脑主机板,a computer motherboard, 一处理器;a processor; 一北桥晶片,与处理器相连接,是作为处理器与汇流排间的流量管制,使处理器能对存储器等装置的存取,该存储器内有一操作系统及一指纹辨识软件;A north bridge chip is connected with the processor, and is used as a flow control between the processor and the bus, so that the processor can access devices such as memory, and the memory has an operating system and a fingerprint identification software; 一南桥晶片,与北桥晶片及输出入控制晶片相连接,是作为USB介面、PCI介面、IDE介面及周边装置资料输入处理器的桥梁;以及A south bridge chip is connected with the north bridge chip and the input and output control chip, and is used as a bridge for USB interface, PCI interface, IDE interface and peripheral device data input processor; and 一输出入控制晶片,与南桥晶片相连接,该输出入控制晶片只接收键盘输入正确密码后启动电脑;An I/O control chip is connected with the south bridge chip, and the I/O control chip only receives the correct password from the keyboard to start the computer; 一键盘,与读卡机及输出入控制晶片相连接,该读卡机认证完成后才启动键盘供使用者输入密码;A keyboard is connected with the card reader and the input/output control chip, and the keyboard is activated for the user to input the password after the card reader authentication is completed; 一读卡机,其利用控制线路连接至上述电脑主机板,该读卡机可对IC卡做确认,若为合法使用者,则启动控制线路,使电脑正常运作,若在上述电脑正常开机前移开上述IC卡,该读卡机启动电脑暂停功能,停止一切输出入动作,且如未重新认证,无法重新启动上述电脑;A card reader, which utilizes a control line to connect to the above-mentioned computer main board, the card reader can confirm the IC card, if it is a legitimate user, then start the control line to make the computer operate normally, if the above-mentioned computer is normally started before Remove the above-mentioned IC card, the card reader will activate the computer suspend function, stop all input and output actions, and the above-mentioned computer cannot be restarted without re-authentication; 一指纹扫描器,其与上述电脑主机板相连接,该指纹扫描器是接受使用者输入指纹资料;A fingerprint scanner, which is connected to the above-mentioned computer motherboard, and the fingerprint scanner accepts fingerprint data input by the user; 一硬盘,其与上述电脑主机板相连接,该硬盘是用以储存资料;A hard disk, which is connected to the above-mentioned computer motherboard, and the hard disk is used for storing data; 一加/解密卡,其与上述电脑主机板相连接,该加/解密卡是在储存资料时先将该资料做加密处理后再储存至上述硬盘,以及从上述硬盘读取资料时先将该资料做解密处理后再读出,该加/解密卡的密钥储存于该加/解密卡的快闪存储器上;以及An encryption/decryption card, which is connected with the above-mentioned computer mainboard, the encryption/decryption card encrypts the data before storing the data in the above-mentioned hard disk, and first encrypts the data when reading the data from the above-mentioned hard disk. The data is read out after being decrypted, and the key of the encryption/decryption card is stored on the flash memory of the encryption/decryption card; and 一外壳,其包围住上述电脑主机板、读卡机、指纹扫描器、硬盘及加/解密卡,该外壳包含一微动开关,当外壳被打开时会启动该微动开关,而清除储存于上述加/解密卡的快闪存储器内的密钥。A shell, which surrounds the above-mentioned computer main board, card reader, fingerprint scanner, hard disk and encryption/decryption card, the shell includes a micro switch, when the shell is opened, the micro switch will be activated, and the memory stored in the The key in the flash memory of the above-mentioned encryption/decryption card. 2、如权利要求1所述的确保电脑主机安全的系统,其特征在于更包括了:2. The system for ensuring the security of a computer host as claimed in claim 1, further comprising: 一IC卡,其是储存使用者识别资料,供读卡机辨识是否为合法使用。An IC card is used to store user identification information for the card reader to identify whether it is legally used. 3、如权利要求1所述的确保电脑主机安全的系统,其特征在于读卡机更包括也一发光二极管(LED)。3. The system for ensuring the security of a computer host as claimed in claim 1, wherein the card reader further includes a light emitting diode (LED). 4、如权利要求3所述的确保电脑主机安全的系统,其特征在于读卡机更包括了一计时器,当电脑正常关机后,若在预定时间内IC卡未移除,可提醒使用者。4. The system for ensuring the safety of the computer host as claimed in claim 3, wherein the card reader further includes a timer, which can remind the user if the IC card is not removed within a predetermined time after the computer is shut down normally . 5、一种确保电脑主机安全的方法,其特征在于包含以下步骤:5. A method for ensuring the safety of a computer host, characterized in that it comprises the following steps: a.插入IC卡,通过IC卡认证流程,启动电脑;a. Insert the IC card, pass the IC card authentication process, and start the computer; b.启动操作系统,同时从硬盘读取指纹资料;b. Start the operating system and read the fingerprint data from the hard disk at the same time; c.使用者通过指纹扫描器输入指纹;c. The user inputs the fingerprint through the fingerprint scanner; d.指纹辨识软件比对上述的指纹是否正确;若否,重回步骤(c);若是,继续下一步骤;d. Whether the fingerprint recognition software compares the above fingerprints is correct; if not, go back to step (c); if so, continue to the next step; e.登入操作系统;e. Log in to the operating system; f.通过加/解密卡读取/储存硬盘的资料;该加/解密卡是在储存资料时先将该资料做加密处理后再存至上述硬盘,以及从上述硬盘读取资料时先将该资料做解密处理后再读出,该加/解密卡的密钥储存于该加/解密卡的快闪存储器上,同时外壳上有一微动开关,当外壳被打开时会启动该微动开关,而清除储存于上述加/解密卡的快闪存储器内的密钥;以及f. Read/store the data of the hard disk through the encryption/decryption card; After the data is decrypted and then read out, the key of the encryption/decryption card is stored on the flash memory of the encryption/decryption card, and there is a micro switch on the casing, which will be activated when the casing is opened. And clear the key stored in the flash memory of the above-mentioned encryption/decryption card; and g.检查该IC卡是否仍在读卡机内;若是,则可正常关机;若否,则该读卡机启动电脑暂停功能,停止一切输出入动作,同时显示信息通知使用者。g. Check whether the IC card is still in the card reader; if so, it can be shut down normally; if not, the card reader will activate the computer suspend function, stop all input and output actions, and display information to notify the user at the same time. 6、如权利要求5所述的确保电脑主机安全的方法,其特征在于步骤(a)的IC卡认证流程是包含下列步骤:6. The method for ensuring the safety of a computer host as claimed in claim 5, wherein the IC card authentication process in step (a) includes the following steps: a1.读卡机进入待机状态;a1. The card reader enters the standby state; a2.插入IC卡至读卡机;a2. Insert the IC card into the card reader; a3.判断该IC卡是否正确;若否,重回(a1)步骤;若是,继续下一步骤;a3. Determine whether the IC card is correct; if not, return to step (a1); if so, continue to the next step; a4.读卡机启动控制线路,使输出入控制晶片启动键盘,同时读卡机显示信息通知使用者输入密码;a4. The card reader activates the control circuit so that the input/output control chip activates the keyboard, and at the same time the card reader displays information to inform the user to enter the password; a5.使用者通过键盘输入密码;a5. The user enters the password through the keyboard; a6.输出入控制晶片判断该密码是否正确;若否,重回(a5)步骤;若是,继续下一步骤;以及a6. The I/O control chip judges whether the password is correct; if not, return to step (a5); if so, proceed to the next step; and a7.输出入控制晶片启动电脑。a7. The I/O control chip starts the computer. 7、如权利要求5或6所述确保电脑主机安全的方法,其特征在于更包含以下步骤:7. The method for ensuring the security of a computer host as claimed in claim 5 or 6, further comprising the following steps: h.是否重新插入IC卡;若否,则该电脑继续保持暂停状态;若是,继续下一步骤;以及h. Whether to re-insert the IC card; if not, the computer continues to be suspended; if so, continue to the next step; and i.判断该IC卡是否正确;若否,则该电脑继续保持暂停状态;若是,则解除该暂停状态。i. Judging whether the IC card is correct; if not, the computer continues to stay in the suspended state; if so, the suspended state is released. 8、如权利要求5所述确保电脑主机安全的方法,其特征在于步骤(g)中,电脑正常关机后,读卡机检查在预定时间内IC卡是否已移除;若否,读卡机发出警告声。8. The method for ensuring the safety of the computer host as claimed in claim 5, wherein in step (g), after the computer is shut down normally, the card reader checks whether the IC card has been removed within a predetermined time; if not, the card reader Sound the warning. 9、如权利要求8所述确保电脑主机安全的方法,其特征在于预定时间为10秒。9. The method for ensuring the security of a computer host as claimed in claim 8, wherein the predetermined time is 10 seconds.
CN 01142167 2001-09-14 2001-09-14 System and method for ensuring computer host security Pending CN1405686A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 01142167 CN1405686A (en) 2001-09-14 2001-09-14 System and method for ensuring computer host security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 01142167 CN1405686A (en) 2001-09-14 2001-09-14 System and method for ensuring computer host security

Publications (1)

Publication Number Publication Date
CN1405686A true CN1405686A (en) 2003-03-26

Family

ID=4676672

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 01142167 Pending CN1405686A (en) 2001-09-14 2001-09-14 System and method for ensuring computer host security

Country Status (1)

Country Link
CN (1) CN1405686A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005041482A1 (en) * 2003-10-29 2005-05-06 Hui Lin An authentication method for information storing application and a ic card authentication hardware
WO2005093581A1 (en) * 2004-03-26 2005-10-06 Shanghai Sanlen Info Security Co., Ltd. Title: secret file access authorization system with fingerprint limiation
WO2006039832A1 (en) * 2004-10-12 2006-04-20 Hui Lin Authentication method for storage and application of data, ic card, fingerprint scanner
CN1312551C (en) * 2005-06-06 2007-04-25 李大东 Portable secret computer
CN100336042C (en) * 2004-09-09 2007-09-05 威盛电子股份有限公司 Device and related method for maintaining pre-reading data of south bridge circuit with north bridge circuit
CN100365974C (en) * 2006-03-31 2008-01-30 北京飞天诚信科技有限公司 Device and method for controlling computer login
CN100386709C (en) * 2003-06-06 2008-05-07 中国科学院计算技术研究所 A method for resetting the network computer main board system of Godson-1CPU
CN100389409C (en) * 2004-10-14 2008-05-21 苏州超锐微电子有限公司 Method of carrying out hard disk protection by utilizing encryption of main zoning
CN100421047C (en) * 2005-07-22 2008-09-24 祥群科技股份有限公司 Biological signal input device, computer system having the same and control method thereof
CN100432890C (en) * 2005-07-12 2008-11-12 中国长城计算机深圳股份有限公司 Computer starting up identifying system and method
CN100462918C (en) * 2005-09-01 2009-02-18 横河电机株式会社 Operating system startup method and device using the method
CN100585723C (en) * 2006-11-24 2010-01-27 徐玉梅 Safe U disk memorizer
CN101901311A (en) * 2008-12-22 2010-12-01 联想(新加坡)私人有限公司 Management of hardware passwords
CN101226571B (en) * 2007-01-16 2011-02-09 瑞达信息安全产业股份有限公司 Information safety computer
CN101604202B (en) * 2008-06-13 2012-02-01 昆盈企业股份有限公司 Optical acquisition module signal processing method
CN102521170A (en) * 2010-12-20 2012-06-27 中国电子科技集团公司第四十一研究所 Virus immunizing and self-recovering system for calibration data of measuring instrument
CN101233469B (en) * 2005-07-21 2013-06-05 克莱夫公司 Memory lock system
CN107894939A (en) * 2017-11-08 2018-04-10 南京普宏信息技术有限公司 The monitoring method and monitoring device of a kind of computer host safety

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100386709C (en) * 2003-06-06 2008-05-07 中国科学院计算技术研究所 A method for resetting the network computer main board system of Godson-1CPU
WO2005041482A1 (en) * 2003-10-29 2005-05-06 Hui Lin An authentication method for information storing application and a ic card authentication hardware
CN100469012C (en) * 2003-10-29 2009-03-11 林晖 Data storage application authentication method
WO2005093581A1 (en) * 2004-03-26 2005-10-06 Shanghai Sanlen Info Security Co., Ltd. Title: secret file access authorization system with fingerprint limiation
CN100336042C (en) * 2004-09-09 2007-09-05 威盛电子股份有限公司 Device and related method for maintaining pre-reading data of south bridge circuit with north bridge circuit
WO2006039832A1 (en) * 2004-10-12 2006-04-20 Hui Lin Authentication method for storage and application of data, ic card, fingerprint scanner
CN100389409C (en) * 2004-10-14 2008-05-21 苏州超锐微电子有限公司 Method of carrying out hard disk protection by utilizing encryption of main zoning
CN1312551C (en) * 2005-06-06 2007-04-25 李大东 Portable secret computer
CN100432890C (en) * 2005-07-12 2008-11-12 中国长城计算机深圳股份有限公司 Computer starting up identifying system and method
CN101233469B (en) * 2005-07-21 2013-06-05 克莱夫公司 Memory lock system
CN100421047C (en) * 2005-07-22 2008-09-24 祥群科技股份有限公司 Biological signal input device, computer system having the same and control method thereof
CN100462918C (en) * 2005-09-01 2009-02-18 横河电机株式会社 Operating system startup method and device using the method
CN100365974C (en) * 2006-03-31 2008-01-30 北京飞天诚信科技有限公司 Device and method for controlling computer login
CN100585723C (en) * 2006-11-24 2010-01-27 徐玉梅 Safe U disk memorizer
CN101226571B (en) * 2007-01-16 2011-02-09 瑞达信息安全产业股份有限公司 Information safety computer
CN101604202B (en) * 2008-06-13 2012-02-01 昆盈企业股份有限公司 Optical acquisition module signal processing method
CN101901311A (en) * 2008-12-22 2010-12-01 联想(新加坡)私人有限公司 Management of hardware passwords
US8756667B2 (en) 2008-12-22 2014-06-17 Lenovo (Singapore) Pte. Ltd. Management of hardware passwords
CN102521170A (en) * 2010-12-20 2012-06-27 中国电子科技集团公司第四十一研究所 Virus immunizing and self-recovering system for calibration data of measuring instrument
CN102521170B (en) * 2010-12-20 2015-03-11 中国电子科技集团公司第四十一研究所 Virus immunizing and self-recovering system for calibration data of measuring instrument
CN107894939A (en) * 2017-11-08 2018-04-10 南京普宏信息技术有限公司 The monitoring method and monitoring device of a kind of computer host safety

Similar Documents

Publication Publication Date Title
CN1405686A (en) System and method for ensuring computer host security
US6032257A (en) Hardware theft-protection architecture
TWI245182B (en) Method, chipset, system and recording medium for responding to a sleep attack
CN101436247B (en) Biological personal identification method and system based on UEFI
US7490245B2 (en) System and method for data processing system planar authentication
US5887131A (en) Method for controlling access to a computer system by utilizing an external device containing a hash value representation of a user password
CN1229705C (en) Biometric-based devices and systems and associated security systems
US7392404B2 (en) Enhancing data integrity and security in a processor-based system
RU2321055C2 (en) Device for protecting information from unsanctioned access for computers of informational and computing systems
US20090288161A1 (en) Method for establishing a trusted running environment in the computer
US20050228993A1 (en) Method and apparatus for authenticating a user of an electronic system
WO2009052385A1 (en) Tamper reactive memory device to secure data from tamper attacks
JP2000516373A (en) Method and apparatus for secure processing of encryption keys
CN1639661A (en) Method and apparatus for unlocking a computer system hard drive
EP1495393A2 (en) Protection against memory attacks following reset
JP2003263618A (en) Nv fuse authenticating method and device, authentication computer program product and computer readable storage medium with its program stored
CN1177277C (en) Method for controlling computer use time
US20060020810A1 (en) System and method for software load authentication
CN1186732C (en) Computer Hard Disk Protection Method and Protection System
WO2005098569A1 (en) Information processor and method for ensuring security thereof
US20020169989A1 (en) Method and apparatus for access security in computers
JPH09237183A (en) Information protection system
CN112905961A (en) Network communication method for computer software protection
JP2003122444A (en) System and method for assuring security of computer cpu
RU2748575C1 (en) Method and device for trusted computer booting with control of peripheral interfaces

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication