CN1405686A - System and method for ensuring computer host security - Google Patents
System and method for ensuring computer host security Download PDFInfo
- Publication number
- CN1405686A CN1405686A CN 01142167 CN01142167A CN1405686A CN 1405686 A CN1405686 A CN 1405686A CN 01142167 CN01142167 CN 01142167 CN 01142167 A CN01142167 A CN 01142167A CN 1405686 A CN1405686 A CN 1405686A
- Authority
- CN
- China
- Prior art keywords
- card
- computer
- card reader
- mentioned
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 230000006870 function Effects 0.000 claims description 6
- 230000002093 peripheral effect Effects 0.000 claims description 3
- 230000009545 invasion Effects 0.000 abstract description 3
- 230000008676 import Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000010276 construction Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to a system and a method for ensuring the security of a computer host, which ensure the security of the computer host by a hardware and software layer-by-layer protection mode, can prevent the invasion of hackers and protect the security of hard disk data. The system of the present invention is characterized by comprising: a computer motherboard, a processor, a north bridge chip, a south bridge chip, an input/output control chip, a keyboard, a card reader, a fingerprint scanner, a hard disk, an encryption/decryption card, and a shell.
Description
Technical field
The present invention is relevant a kind of system and method for guaranteeing computer host safety, particularly utilizes the protected mode of hardware and software simultaneously, to guarantee the safety of host computer.
Background technology
Application along with individual privacy and financial sector, though its convenience is popular, but its security is worrying also, especially will dominate the capital construction of whole application in future network identification and payment system, therefore before being extensive use of, must analyze the safety factor of existing system equipment, otherwise once host computer suffers that the illegal production mode is invaded or hard disk is stolen, will make all data exposures or even distorted.
Protect the identifying procedure of computer host safety traditionally; utilize operating system (OS) to do authentication after being generally start; or in start process, utilize basic input/output system (BIOS) to do authentication; yet these authentication methods are started shooting because of main frame; so can't stop the invasion of hacker (hacker) entirely; therefore the present invention could start shooting after need proposing authentication to pass through, but not just does the invention of authentication after the start.In addition; above-mentioned protected mode only has software mode, if the hard disk that stores data directly is stolen, these with software protection mode will be to make a futile effort; therefore the inventor uses the mode of protection hard disk and data thereof simultaneously again, to reach tight security protection.
Content of the present invention
Fundamental purpose of the present invention is to utilize the protected mode of hardware and software simultaneously, to guarantee the safety of host computer.
Another object of the present invention is to utilize authentication modes such as IC-card and identification of fingerprint, the user need authenticate by after just can make host computer start, but not just do authentication after the start.
Another purpose of the present invention be utilize on an enciphering/deciphering card and the shell microswitch with the protection hardware resources safety.
For achieving the above object, the present invention proposes a kind of system that guarantees computer host safety, and it comprises at least:
One computer motherboard, it comprises at least: a processor (Processor); One north bridge wafer (NorthBridge) is connected with processor, is as the flow management between processor and bus-bar, makes processor one operating system and an identification of fingerprint software be arranged in this storer to the access of devices such as storer; One south bridge wafer (South Bridge) is gone into control wafer with north bridge wafer and output and is connected, and is the bridge as USB interface and peripheral device data input processor; And one output go into control wafer, be connected with the south bridge wafer, this is exported and starts computer after control wafer receives only keyboard input proper password;
One keyboard is gone into control wafer with card reader and output and is connected, and just starts keyboard after this card reader authentication is finished and inputs password for the user;
One card reader, it utilizes operation circuit to be connected to above-mentioned computer motherboard, this card reader can be done authentication to IC-card, if legal user, then start-up control circuit, make the computer normal operation, if remove above-mentioned IC-card before above-mentioned computer normal boot-strap, this card reader starts computer and suspends (suspend) function, stops all and exports into action, and, can't restart above-mentioned computer as not authentication again;
One fingerprint scanner, it is connected with above-mentioned computer motherboard, and this fingerprint scanner is to accept the user to import fingerprint data;
One hard disk, it is connected with above-mentioned computer motherboard, and this hard disk is in order to store data;
One enciphering/deciphering card, it is connected with above-mentioned computer motherboard, this enciphering/deciphering card is to be stored to above-mentioned hard disk more earlier this data is done encryption when storing data after, and read again after when above-mentioned hard disk reads data, earlier this data being done decryption processing, the key of this enciphering/deciphering card is stored on the flash memory of this enciphering/deciphering card; And
One shell, it surrounds above-mentioned computer motherboard, card reader, fingerprint scanner, hard disk and enciphering/deciphering card, this shell comprises a microswitch, can start this microswitch when shell is opened, and removes the key in the flash memory that is stored in above-mentioned enciphering/deciphering card.
Cooperate above-mentioned system, the present invention proposes a kind of method of guaranteeing computer host safety, and it comprises following steps:
A. insert IC-card,, start computer by the IC-card identifying procedure;
B. start the operating system, read fingerprint data from hard disk simultaneously;
C. the user imports fingerprint by fingerprint scanner;
Whether d. identification of fingerprint software is compared above-mentioned fingerprint correct; If not, resumes step (c); If continue next step;
E. login operating system;
F. read/store the data of hard disk by the enciphering/deciphering card; This enciphering/deciphering card is to be stored to above-mentioned hard disk more earlier this data is done encryption when storing data after, and read again after when above-mentioned hard disk reads data, earlier this data being done decryption processing, the key of this enciphering/deciphering card is stored on the flash memory of this enciphering/deciphering card, on the shell microswitch is arranged simultaneously, when shell is opened, can start this microswitch, and remove the key in the flash memory that is stored in above-mentioned enciphering/deciphering card; And
G. check that this IC-card is whether still in card reader; If, but normal shutdown then; If not, then this card reader starts the computer pause function, stops all and exports into action, and display message is notified the user simultaneously.
Description of drawings
Fig. 1 is the system schematic of the embodiment of the invention;
Fig. 2 is the main flow chart of the embodiment of the invention;
Fig. 3 is the IC-card identifying procedure figure of the embodiment of the invention;
Fig. 4 is the process flow diagram that the computer of the embodiment of the invention suspends and remove this halted state.
Specific implementation
For disclosing the present invention in detail, following conjunction with figs. elaborates.Fig. 1 shows the system schematic of the embodiment of the invention, and it comprises at least by finding out system of the present invention among the figure: a computer motherboard 110, and this computer motherboard 110 comprises at least: a processor 111; One north bridge wafer 112 is connected with processor 111, is as the flow management between processor 111 and bus-bar, makes processor 111 one operating system and an identification of fingerprint software be arranged in this storer to the access of devices such as storer; One south bridge wafer 113, going into control wafer (present embodiment is the Winbond Super IO wafer 114 for being produced by winbond electronics company) with north bridge wafer 112 and output and be connected, is the bridge as USB interface, PCI interface, IDE interface and peripheral device (as: keyboard 121, serial port 122 and parallel port 123 etc.) data input processor 111; And a Winbond Super IO wafer 114, being connected with south bridge wafer 113, this Winbond Super IO wafer 114 starts computer after receiving only keyboard 121 input proper passwords; One keyboard 121 is connected with card reader 130 and Winbond Super IO wafer 114, just starts keyboard 121 after these card reader 130 authentications are finished and inputs password for the user; One card reader 130, it utilizes circuit to be connected to above-mentioned computer motherboard 110, this card reader 130 can be done authentication to IC-card, if legal user, start-up control circuit then, make the computer normal operation, if remove above-mentioned IC-card before above-mentioned computer normal shutdown, this card reader starts the computer pause function, stops all and exports into action, and as not authentication again, can't restart above-mentioned computer, this card reader has more comprised a light emitting diode (LED) 131 and a timer (not shown), behind the computer normal shutdown, if IC-card does not remove in the given time, can remind the user; One fingerprint scanner 140, it is connected with the USB interface with above-mentioned computer motherboard 110, and this fingerprint scanner 140 is to accept the user to import fingerprint data; One hard disk 150, it is connected with the IDE interface with above-mentioned computer motherboard 110, and this hard disk 150 is in order to store data; One enciphering/deciphering card 160, it is connected with the PCI interface with above-mentioned computer motherboard 110, this enciphering/deciphering card 160 is to be stored to above-mentioned hard disk 150 again this data is done encryption earlier when storing data after, and read again after when above-mentioned hard disk 150 reads data, earlier this data being done decryption processing, even therefore hard disk 150 goes adrift, its inside information also can't be picked out, and the key of this enciphering/deciphering card 160 is stored on the flash memory of this enciphering/deciphering card 160; An and shell 170, it surrounds above-mentioned computer motherboard 110, card reader 130, fingerprint scanner 140, hard disk 150 and enciphering/deciphering card 160, this shell 170 comprises a microswitch 171, usual shell 170 keeps opening circuit when closing, when being opened, shell 170 can start this microswitch 171, produce a clear signal to enciphering/deciphering card 160, and removing is stored in the interior key of flash memory of enciphering/deciphering card 160, when therefore opening shell 170 as if stealer, key will be eliminated, and also can't use even steal enciphering/deciphering card 160; One IC-card (not shown), whether it is to store the user to discern data, be legal use for card reader 130 identifications.
The main flow chart of the embodiment of the invention shown in Figure 2, the user inserts IC-card, behind the IC-card identifying procedure, start computer (as step 210), then start the operating system, read fingerprint data (as step 220) from hard disk 150 simultaneously, the user is by fingerprint scanner 140 input fingerprints (as step 230) then, and whether the above-mentioned fingerprint of identification of fingerprint software comparison correct (as step 240); If not, resumes step 230; If, then can login operating system (as step 250) and carry out general job, but when reading/store hard disk 150 data, it all needs by enciphering/deciphering card 160 (as step 260), this enciphering/deciphering card 160 is to be stored to above-mentioned hard disk 150 again this data is done encryption earlier when storing data after, and read again after when above-mentioned hard disk 150 reads data, earlier this data being done decryption processing, the key of this enciphering/deciphering card 160 is stored on the flash memory of this enciphering/deciphering card 160, on the shell 170 microswitch 171 is arranged simultaneously, when being opened, shell 170 can start this microswitch 171, and remove the interior key of flash memory that is stored in above-mentioned enciphering/deciphering card, also can't use even therefore steal enciphering/deciphering card 160.
The IC-card identifying procedure figure of the embodiment of the invention shown in Figure 3, it is the detailed process of Fig. 2 step 210, at first, card reader 130 enters holding state (as step 310) behind the input current, then the user inserts IC-card to card reader 130 (as step 320), and whether correctly card reader 130 judges IC-card (as step 330); If not, resumes step 310; If, card reader 130 start-up control circuits, make Winbond Super IO wafer 114 start keyboard 121 (as step 340), card reader 130 display message notify the user to input password simultaneously, then the user by keyboard 121 input passwords after (as step 350), whether correctly Winbond Super IO wafer 114 judges this password (as step 360); If not, resumes step 350; If then Winbond Super IO wafer 114 starts computer.
The computer of the embodiment of the invention shown in Figure 4 suspends and removes the process flow diagram of this halted state, and when computer is carried out general job (as step 410), card reader 130 can check always that IC-card is whether still in card reader 130; If, but normal shutdown (as step 470) then; If not, then this card reader starts the computer pause function, stops all and exports into action, simultaneously notify the user (as step 430) via light emitting diode (LED) 131 display message, see then whether the user inserts IC-card (as step 440) again, if not, resumes step 430; If card reader 130 is checked IC-card whether correct (as step 450) once more, if incorrect, resumes step 430; If correct, card reader 130 is removed this halted state, simultaneously resumes step 410.Behind step 470 computer normal shutdown, card reader 130 can check whether IC-card was extracted (as step 480) in 10 seconds, if then finish this flow process; If not, behind the timer inverse to 10 in the card reader 130 second, the sound that can give a warning is reminded the user, simultaneously resumes step 480 (as step 490).
In sum; a kind of system and method for guaranteeing computer host safety provided by the invention; by hardware and software protected mode layer by layer; to guarantee the safety of host computer; can stop hacker's invasion; and the safety of protection data on hard disc, so the important document of Patent Law invention, mere formality application have in accordance with the law been met.
Below the present invention has been done a detailed description, only the above, when not limiting scope of the invention process.To being familiar with the personage of this skill, when carrying out the variation example of various equivalences to it, precisely because all should be included in spirit of the present invention and the scope.
Claims (9)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN 01142167 CN1405686A (en) | 2001-09-14 | 2001-09-14 | System and method for ensuring computer host security |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN 01142167 CN1405686A (en) | 2001-09-14 | 2001-09-14 | System and method for ensuring computer host security |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN1405686A true CN1405686A (en) | 2003-03-26 |
Family
ID=4676672
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN 01142167 Pending CN1405686A (en) | 2001-09-14 | 2001-09-14 | System and method for ensuring computer host security |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN1405686A (en) |
Cited By (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2005041482A1 (en) * | 2003-10-29 | 2005-05-06 | Hui Lin | An authentication method for information storing application and a ic card authentication hardware |
| WO2005093581A1 (en) * | 2004-03-26 | 2005-10-06 | Shanghai Sanlen Info Security Co., Ltd. | Title: secret file access authorization system with fingerprint limiation |
| WO2006039832A1 (en) * | 2004-10-12 | 2006-04-20 | Hui Lin | Authentication method for storage and application of data, ic card, fingerprint scanner |
| CN1312551C (en) * | 2005-06-06 | 2007-04-25 | 李大东 | Portable secret computer |
| CN100336042C (en) * | 2004-09-09 | 2007-09-05 | 威盛电子股份有限公司 | Device and related method for maintaining pre-reading data of south bridge circuit with north bridge circuit |
| CN100365974C (en) * | 2006-03-31 | 2008-01-30 | 北京飞天诚信科技有限公司 | Device and method for controlling computer login |
| CN100386709C (en) * | 2003-06-06 | 2008-05-07 | 中国科学院计算技术研究所 | A method for resetting the network computer main board system of Godson-1CPU |
| CN100389409C (en) * | 2004-10-14 | 2008-05-21 | 苏州超锐微电子有限公司 | Method of carrying out hard disk protection by utilizing encryption of main zoning |
| CN100421047C (en) * | 2005-07-22 | 2008-09-24 | 祥群科技股份有限公司 | Biological signal input device, computer system having the same and control method thereof |
| CN100432890C (en) * | 2005-07-12 | 2008-11-12 | 中国长城计算机深圳股份有限公司 | Computer starting up identifying system and method |
| CN100462918C (en) * | 2005-09-01 | 2009-02-18 | 横河电机株式会社 | Operating system startup method and device using the method |
| CN100585723C (en) * | 2006-11-24 | 2010-01-27 | 徐玉梅 | Safe U disk memorizer |
| CN101901311A (en) * | 2008-12-22 | 2010-12-01 | 联想(新加坡)私人有限公司 | Management of hardware passwords |
| CN101226571B (en) * | 2007-01-16 | 2011-02-09 | 瑞达信息安全产业股份有限公司 | Information safety computer |
| CN101604202B (en) * | 2008-06-13 | 2012-02-01 | 昆盈企业股份有限公司 | Optical acquisition module signal processing method |
| CN102521170A (en) * | 2010-12-20 | 2012-06-27 | 中国电子科技集团公司第四十一研究所 | Virus immunizing and self-recovering system for calibration data of measuring instrument |
| CN101233469B (en) * | 2005-07-21 | 2013-06-05 | 克莱夫公司 | Memory lock system |
| CN107894939A (en) * | 2017-11-08 | 2018-04-10 | 南京普宏信息技术有限公司 | The monitoring method and monitoring device of a kind of computer host safety |
-
2001
- 2001-09-14 CN CN 01142167 patent/CN1405686A/en active Pending
Cited By (21)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN100386709C (en) * | 2003-06-06 | 2008-05-07 | 中国科学院计算技术研究所 | A method for resetting the network computer main board system of Godson-1CPU |
| WO2005041482A1 (en) * | 2003-10-29 | 2005-05-06 | Hui Lin | An authentication method for information storing application and a ic card authentication hardware |
| CN100469012C (en) * | 2003-10-29 | 2009-03-11 | 林晖 | Data storage application authentication method |
| WO2005093581A1 (en) * | 2004-03-26 | 2005-10-06 | Shanghai Sanlen Info Security Co., Ltd. | Title: secret file access authorization system with fingerprint limiation |
| CN100336042C (en) * | 2004-09-09 | 2007-09-05 | 威盛电子股份有限公司 | Device and related method for maintaining pre-reading data of south bridge circuit with north bridge circuit |
| WO2006039832A1 (en) * | 2004-10-12 | 2006-04-20 | Hui Lin | Authentication method for storage and application of data, ic card, fingerprint scanner |
| CN100389409C (en) * | 2004-10-14 | 2008-05-21 | 苏州超锐微电子有限公司 | Method of carrying out hard disk protection by utilizing encryption of main zoning |
| CN1312551C (en) * | 2005-06-06 | 2007-04-25 | 李大东 | Portable secret computer |
| CN100432890C (en) * | 2005-07-12 | 2008-11-12 | 中国长城计算机深圳股份有限公司 | Computer starting up identifying system and method |
| CN101233469B (en) * | 2005-07-21 | 2013-06-05 | 克莱夫公司 | Memory lock system |
| CN100421047C (en) * | 2005-07-22 | 2008-09-24 | 祥群科技股份有限公司 | Biological signal input device, computer system having the same and control method thereof |
| CN100462918C (en) * | 2005-09-01 | 2009-02-18 | 横河电机株式会社 | Operating system startup method and device using the method |
| CN100365974C (en) * | 2006-03-31 | 2008-01-30 | 北京飞天诚信科技有限公司 | Device and method for controlling computer login |
| CN100585723C (en) * | 2006-11-24 | 2010-01-27 | 徐玉梅 | Safe U disk memorizer |
| CN101226571B (en) * | 2007-01-16 | 2011-02-09 | 瑞达信息安全产业股份有限公司 | Information safety computer |
| CN101604202B (en) * | 2008-06-13 | 2012-02-01 | 昆盈企业股份有限公司 | Optical acquisition module signal processing method |
| CN101901311A (en) * | 2008-12-22 | 2010-12-01 | 联想(新加坡)私人有限公司 | Management of hardware passwords |
| US8756667B2 (en) | 2008-12-22 | 2014-06-17 | Lenovo (Singapore) Pte. Ltd. | Management of hardware passwords |
| CN102521170A (en) * | 2010-12-20 | 2012-06-27 | 中国电子科技集团公司第四十一研究所 | Virus immunizing and self-recovering system for calibration data of measuring instrument |
| CN102521170B (en) * | 2010-12-20 | 2015-03-11 | 中国电子科技集团公司第四十一研究所 | Virus immunizing and self-recovering system for calibration data of measuring instrument |
| CN107894939A (en) * | 2017-11-08 | 2018-04-10 | 南京普宏信息技术有限公司 | The monitoring method and monitoring device of a kind of computer host safety |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN1405686A (en) | System and method for ensuring computer host security | |
| US6032257A (en) | Hardware theft-protection architecture | |
| TWI245182B (en) | Method, chipset, system and recording medium for responding to a sleep attack | |
| CN101436247B (en) | Biological personal identification method and system based on UEFI | |
| US7490245B2 (en) | System and method for data processing system planar authentication | |
| US5887131A (en) | Method for controlling access to a computer system by utilizing an external device containing a hash value representation of a user password | |
| CN1229705C (en) | Biometric-based devices and systems and associated security systems | |
| US7392404B2 (en) | Enhancing data integrity and security in a processor-based system | |
| RU2321055C2 (en) | Device for protecting information from unsanctioned access for computers of informational and computing systems | |
| US20090288161A1 (en) | Method for establishing a trusted running environment in the computer | |
| US20050228993A1 (en) | Method and apparatus for authenticating a user of an electronic system | |
| WO2009052385A1 (en) | Tamper reactive memory device to secure data from tamper attacks | |
| JP2000516373A (en) | Method and apparatus for secure processing of encryption keys | |
| CN1639661A (en) | Method and apparatus for unlocking a computer system hard drive | |
| EP1495393A2 (en) | Protection against memory attacks following reset | |
| JP2003263618A (en) | Nv fuse authenticating method and device, authentication computer program product and computer readable storage medium with its program stored | |
| CN1177277C (en) | Method for controlling computer use time | |
| US20060020810A1 (en) | System and method for software load authentication | |
| CN1186732C (en) | Computer Hard Disk Protection Method and Protection System | |
| WO2005098569A1 (en) | Information processor and method for ensuring security thereof | |
| US20020169989A1 (en) | Method and apparatus for access security in computers | |
| JPH09237183A (en) | Information protection system | |
| CN112905961A (en) | Network communication method for computer software protection | |
| JP2003122444A (en) | System and method for assuring security of computer cpu | |
| RU2748575C1 (en) | Method and device for trusted computer booting with control of peripheral interfaces |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
| WD01 | Invention patent application deemed withdrawn after publication |