Electronic device, authentication method, storage medium, and program product

文档序号:1963904 发布日期:2021-12-14 浏览:10次 中文

阅读说明:本技术 电子设备、认证方法、存储介质和程序产品 (Electronic device, authentication method, storage medium, and program product ) 是由 杨昆 凌阳 于 2021-09-29 设计创作,主要内容包括:本申请实施例提供一种电子设备、认证方法、存储介质和程序产品。电子设备包括:主板和信息输入接口;主板包括:电源单元和处理单元;处理单元包括:信息认证模块;信息认证模块分别与信息输入接口、电源单元的供电端和控制端连接;信息输入接口也与电源单元的供电端连接;其中,信息认证模块用于通过信息输入接口获取待认证信息,在确定待认证信息通过认证之后,向电源单元发送上电使能信号,以使电源单元启动向主板至少与开机运行有关的部分供电。用于提高电子设备的安全性。(An embodiment of the application provides an electronic device, an authentication method, a storage medium and a program product. The electronic device includes: the main board and the information input interface; the mainboard includes: a power supply unit and a processing unit; the processing unit includes: an information authentication module; the information authentication module is respectively connected with the information input interface, the power supply end and the control end of the power supply unit; the information input interface is also connected with the power supply end of the power supply unit; the information authentication module is used for acquiring information to be authenticated through the information input interface, and sending a power-on enabling signal to the power supply unit after the information to be authenticated is determined to pass authentication so that the power supply unit starts to supply power to at least a part of the mainboard related to startup operation. For improving the security of the electronic device.)

1. An electronic device, comprising: the main board and the information input interface;

the main board includes: a power supply unit and a processing unit;

the processing unit includes: an information authentication module;

the information authentication module is respectively connected with the information input interface, the power supply end and the control end of the power supply unit; the information input interface is also connected with the power supply end of the power supply unit;

the information authentication module is used for acquiring information to be authenticated through the information input interface, and sending a power-on enabling signal to the power supply unit after the information to be authenticated is determined to pass authentication so that the power supply unit starts to supply power to at least a part of the mainboard related to startup operation.

2. The electronic device according to claim 1, wherein the power supply unit includes: a first power module and a second power module;

the power supply end of the first power supply module is respectively connected with the information authentication module and the information input interface, and the control end of the second power supply module is connected with the information authentication module;

the first power supply module is used for supplying power to the information authentication module and the information input interface;

the second power supply module is used for receiving the power-on enabling signal sent by the information authentication module and starting to supply power to at least a part of the mainboard related to startup operation.

3. The electronic device of claim 2, wherein the information authentication module comprises: a controller and an authentication memory;

the controller is respectively connected with the authentication memory, the information input interface, the power supply end of the first power supply module and the control end of the second power supply module; the authentication memory is also connected with the power supply end of the first power supply module;

wherein, the authentication memory is used for storing standard authentication information;

the controller is used for acquiring information to be authenticated through the information input interface, acquiring the standard authentication information from the authentication memory, and sending a power-on enabling signal to the second power module if the standard authentication information is matched with the information to be authenticated.

4. The electronic device of claim 2, wherein the information authentication module comprises: the device comprises a controller, an encryption and decryption tool and an authentication memory; the controller is respectively connected with the encryption and decryption tool, the authentication memory, the information input interface, the power supply end of the first power supply module and the control end of the second power supply module; the encryption and decryption tool and the authentication memory are also respectively connected with the power supply end of the first power supply module;

the authentication memory is used for storing encrypted original authentication information after the original authentication information is encrypted by the encryption and decryption tool;

the controller is used for acquiring information to be authenticated through the information input interface, acquiring the encrypted original authentication information from the authentication storage, decrypting the encrypted original authentication information through the encryption and decryption tool to obtain the original authentication information, and if the original authentication information is determined to be matched with the information to be authenticated, sending a power-on enabling signal to the second power module.

5. The electronic device of claim 3 or 4, further comprising: the device comprises an electric quantity detection unit and a prompt unit;

the electric quantity detection unit is respectively connected with the first power supply module and the controller; the prompting unit is connected with the controller;

the electric quantity detection unit is used for detecting the residual electric quantity of the first power supply module;

the controller is further configured to acquire the remaining power detected by the power detection unit, and control the prompting unit to perform power warning on the user if it is determined that the remaining power is less than or equal to a preset value.

6. The electronic device of claim 1, further comprising: and the information input unit is connected with the information input interface and comprises an information acquisition module.

7. An information authentication method applied to the electronic device according to any one of claims 1 to 6, the method comprising:

acquiring information to be authenticated;

judging whether the information to be authenticated passes authentication;

if the information to be authenticated is determined to pass the authentication, sending a power-on enabling signal to a power supply unit in the electronic equipment so that the power supply unit starts to supply power to at least a part of the mainboard related to the startup operation.

8. The method of claim 7, wherein the determining whether the information to be authenticated is authenticated comprises:

acquiring pre-stored standard authentication information;

and if the standard authentication information is matched with the information to be authenticated, determining that the information to be authenticated passes authentication.

9. The method of claim 7, wherein the determining whether the information to be authenticated is authenticated comprises:

acquiring pre-stored encrypted original authentication information, wherein the encrypted original authentication information is obtained after the original authentication information is encrypted;

and if the original authentication information obtained after the encrypted original authentication information is decrypted is matched with the information to be authenticated, determining that the information to be authenticated passes authentication.

10. A computer-readable storage medium having stored therein computer-executable instructions that, when executed by a processor, implement the information authentication method according to any one of claims 7-9.

11. A computer program product comprising a computer program, characterized in that the computer program, when executed by a processor, implements the information authentication method according to any one of claims 7-9.

Technical Field

Embodiments of the present disclosure relate to chip design, and in particular, to an electronic device, an authentication method, a storage medium, and a program product.

Background

Currently, before using a Personal Computer (PC), a user inputs authentication information to the PC, and after determining that the authentication information is correct, the PC starts a computer operating system.

In the related art, a user presses a power switch on a PC to cause a power supply in the PC to supply power to a motherboard in the PC, for example, to a processor, a Flash Memory (Flash Memory), a hard disk, and the like. The method comprises the steps that Basic Input Output System (BIOS) firmware is stored in a flash memory, preset standard authentication information is stored in the BIOS firmware, the BIOS firmware is read by a processor in the process of supplying power to a power supply main board, an authentication information Input frame is displayed when an authentication information Input program which is in front of the standard authentication information in the BIOS firmware is read, a user inputs authentication information in the authentication information Input frame, and the processor starts a computer operating System after determining that the Input authentication information is correct according to the standard authentication information.

During the use of the PC by the user, the network virus may store the dictionary for cracking the standard authentication information, for example, in a hard disk. When the PC displays the authentication information input box, the processor can read the dictionary in the hard disk and sequentially input the code words in the dictionary into the authentication information input box because the power supply supplies power to the mainboard, so that the standard authentication information is cracked, the PC starts a computer operating system, information in the PC is leaked, and the safety of the PC is reduced.

Disclosure of Invention

An embodiment of the application provides an electronic device, an authentication method, a storage medium and a program product, which are used for improving the safety of the electronic device.

In a first aspect, an embodiment of the present application provides an electronic device, including: the main board and the information input interface;

the mainboard includes: a power supply unit and a processing unit;

the processing unit includes: an information authentication module;

the information authentication module is respectively connected with the information input interface, the power supply end and the control end of the power supply unit; the information input interface is also connected with the power supply end of the power supply unit;

the information authentication module is used for acquiring information to be authenticated through the information input interface, and sending a power-on enabling signal to the power supply unit after the information to be authenticated is determined to pass authentication so that the power supply unit starts to supply power to at least a part of the mainboard related to startup operation.

As an alternative embodiment, the power supply unit comprises: a first power module and a second power module; the power supply end of the first power supply module is respectively connected with the information authentication module and the information input interface, and the control end of the second power supply module is connected with the information authentication module;

the first power supply module is used for supplying power to the information authentication module and the information input interface;

the second power supply module is used for receiving the power-on enabling signal sent by the information authentication module and starting to supply power to at least the part of the mainboard related to the startup operation.

As an optional implementation, the information authentication module includes: a controller and an authentication memory; the controller is respectively connected with the authentication memory, the information input interface, the power supply end of the first power supply module and the control end of the second power supply module; the authentication memory is also connected with the power supply end of the first power supply module;

the authentication memory is used for storing standard authentication information;

the controller is used for acquiring information to be authenticated through the information input interface, acquiring standard authentication information from the authentication memory, and sending a power-on enabling signal to the second power module if the standard authentication information is matched with the information to be authenticated.

As an optional implementation, the information authentication module includes: the device comprises a controller, an encryption and decryption tool and an authentication memory; the controller is respectively connected with the encryption and decryption tool, the authentication memory, the information input interface, the power supply end of the first power supply module and the control end of the second power supply module; the encryption and decryption tool and the authentication memory are also respectively connected with the power supply end of the first power supply module;

the authentication memory is used for storing encrypted original authentication information after the original authentication information is encrypted by the encryption and decryption tool;

the controller is used for acquiring information to be authenticated through the information input interface, acquiring encrypted original authentication information from the authentication memory, decrypting the encrypted original authentication information through the encryption and decryption tool to obtain standard authentication information, and if the original authentication information is determined to be matched with the information to be authenticated, sending a power-on enabling signal to the second power supply module.

As an optional implementation, the electronic device further comprises: the device comprises an electric quantity detection unit and a prompt unit; the electric quantity detection unit is respectively connected with the first power supply module and the controller; the prompting unit is connected with the controller;

the electric quantity detection unit is used for detecting the residual electric quantity of the first power supply module;

the controller is also used for acquiring the residual electric quantity detected by the electric quantity detection unit, and if the residual electric quantity is determined to be smaller than or equal to a preset value, the controller controls the prompt unit to alarm the electric quantity of the user.

As an optional implementation, the electronic device further comprises: and the information input unit is connected with the information input interface and comprises an information acquisition module.

In a second aspect, an embodiment of the present application provides an information authentication method, which is applied to the electronic device in any one of the first aspects, and the method includes:

acquiring information to be authenticated;

judging whether the information to be authenticated passes authentication;

and if the information to be authenticated passes the authentication, sending a power-on enabling signal to a power supply unit in the electronic equipment so that the power supply unit starts to supply power to at least a part of the mainboard related to the startup operation.

As an optional implementation manner, the determining whether the information to be authenticated passes the authentication includes:

acquiring pre-stored standard authentication information;

and if the standard authentication information is matched with the information to be authenticated, determining that the information to be authenticated passes the authentication.

As an optional implementation manner, the determining whether the information to be authenticated passes the authentication includes:

acquiring pre-stored encrypted original authentication information, wherein the encrypted original authentication information is obtained after the original authentication information is encrypted;

and if the original authentication information obtained after the encrypted original authentication information is decrypted is matched with the information to be authenticated, determining that the information to be authenticated passes the authentication.

In a third aspect, an embodiment of the present application provides a computer-readable storage medium, where computer-executable instructions are stored in the computer-readable storage medium, and when the processor executes the computer-executable instructions, the information authentication method according to any one of the above second aspects is implemented.

In a fourth aspect, the present application provides a computer program product, which includes a computer program and when the computer program is executed by a processor, implements the information authentication method as in any one of the second aspect above.

An embodiment of the application provides an electronic device, an authentication method, a storage medium and a program product. In the electronic device provided by the embodiment of the application, the information authentication module is integrated in the processing unit, so that information in the information authentication module is not easy to lose, and the information authentication module is arranged in the preset isolation region in the processing unit and cannot perform data interaction with other modules, so that the problem of security holes does not exist, the information in the information authentication module can be prevented from being illegally tampered, user verification is prevented from being bypassed, and the security of the electronic device is improved.

Drawings

In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and those skilled in the art can also obtain other drawings according to the drawings without inventive exercise.

Fig. 1 is a first schematic structural diagram of an electronic device according to an embodiment of the present disclosure;

fig. 2 is a schematic structural diagram of an electronic device according to an embodiment of the present application;

fig. 3 is a schematic structural diagram three of an electronic device according to an embodiment of the present application;

fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application;

fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application;

fig. 6 is a flowchart illustrating an information authentication method according to an embodiment of the present application.

Detailed Description

At present, along with the popularization and development of computer technology, the application of computer technology brings profound influence to the life and work of people. While users have enjoyed the convenience of computer technology advancement, the security of computers has become more and more critical.

In a prior art, a flash memory in a PC stores BIOS firmware including standard authentication information, when a user presses a power switch on the PC, that is, after the PC is powered on, a power supply in the PC supplies power to a processor on a motherboard in the PC, so that the processor reads the BIOS firmware, when an authentication information input program in the BIOS firmware is read, an authentication information input box is displayed, the user inputs authentication information in the authentication information input box, and the processor starts a computer operating system after determining that the authentication information is correct according to the standard authentication information. The above prior art has the following three disadvantages: (1) when a user uses the PC, the PC is accessed to the Internet, and the network virus stores the dictionary for cracking the authentication information into a hard disk, for example, so that when the PC displays an authentication information input box, a processor can read the dictionary in the hard disk and sequentially input code words in the dictionary into the authentication information input box to crack the standard authentication information as a power supply in the PC supplies power to a component on a mainboard in the PC; (2) when the BIOS firmware has a security hole, the PC can directly start the computer operating system without receiving authentication information, namely the risk of bypassing user authentication exists; (3) an illegal user inserts a USB device into a PC, and inputs authentication information into the PC through the USB device in a keyboard input mode or inputs the authentication information into the PC through a keyboard matched with the PC, so that the standard authentication information is cracked violently. The above three defects may reveal information in the PC, that is, an illegal user can obtain personal information of the user and/or secret information of business stored in the PC, and the security of the PC is reduced.

In another prior art, standard authentication information is included in a computer operating system, after a user presses a power switch on a PC, a power supply in the PC supplies power to a processor on a motherboard in the PC, so that the processor starts the computer operating system, when an authentication information input program in the computer operating system is read, an authentication information input box is displayed, the user inputs authentication information in the authentication information input box, and after the processor determines that currently input authentication information is the same as the standard authentication information, the processor enters the computer operating system, so that the user can use the PC. The prior art has the following four defects: (1) when a user uses the PC, the PC is accessed to the Internet, and the network virus can store the dictionary for cracking the authentication information into a hard disk, so that when the PC displays an authentication information input box, a processor can read the dictionary in the hard disk and sequentially input code words in the dictionary into the authentication information input box to crack the standard authentication information as a power supply in the PC supplies power to a component on a mainboard in the PC; (2) when a computer operating system has a security vulnerability, the risk of bypassing user authentication exists; (3) the risk of user authentication is bypassed by illegal users through peripheral equipment such as a U disk, a network card, a simulation keyboard and the like; (4) an illegal user inserts a USB device into a PC, and inputs authentication information into the PC through the USB device in a keyboard input mode or inputs the authentication information into the PC through a keyboard matched with the PC, so that the standard authentication information is cracked violently. The four defects can reveal information in the PC and reduce the safety of the PC.

In another prior art, a Radio Frequency Identification (RFID) card reading device is additionally installed on a host computer, a user holds an RFID card, before the user presses a power switch on a PC, the user swipes the RFID card on the RFID card reading device, and after the RFID card reading device verifies the identity of the user, the PC automatically enters a boot process. The prior art has the following two defects: (1) if the RFID card is lost, the risk of falsifying the RFID card by an illegal user exists; (2) when the RFID card reading device has a security hole, the risk of bypassing the user authentication exists. The two defects cause the information in the PC to be leaked, and the safety of the PC is reduced.

In the application, in order to improve the security of electronic equipment such as a PC, a server and the like, before a processor such as a CPU is powered on, authentication information to be authenticated is authenticated, after the authentication information to be authenticated passes authentication, power is supplied to a mainboard, so that the electronic equipment starts a computer system, the problems that a processor reads a dictionary in a hard disk, standard authentication information is cracked and the like are solved, and the security of the electronic equipment is improved.

The technical solution of the present application will be described in detail below with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.

Fig. 1 is a first schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 1, the electronic apparatus includes: a main board 11 and an information input interface 12.

The main board 11 includes: a power supply unit 111 and a processing unit 112.

The processing unit 112 includes: an information authentication module 1130.

The information authentication module 1130 may be integrally provided within a preset isolation area in the processing unit 112. Alternatively, the processing unit 112 may be a CPU, other general-purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), and/or the like.

Illustratively, when the processing unit 112 is a CPU, in the CPU, the information authentication module 1130 is disposed in a preset isolation area completely isolated from the conventional modules in the CPU, the conventional modules cannot access or modify the processing logic and information in the information authentication module 1130, and the information authentication module 1130 cannot access or modify data storage devices such as control logic, registers, or address spaces of other modules in the CPU. The conventional module in the CPU may include an arithmetic device and/or a memory device.

The information authentication module 1130 is connected to the information input interface 12, the power supply terminal and the control terminal of the power supply unit 111, respectively, and the information input interface 12 is also connected to the power supply terminal of the power supply unit 111.

The power supply unit 111 is used to supply power to the information authentication module 1130 and the information input interface 12.

The information authentication module 1130 is configured to obtain information to be authenticated through the information input interface 12, and after it is determined that the information to be authenticated passes authentication, send a power-on enable signal to the power supply unit 111 through the control terminal of the power supply unit 111, so that the power supply unit 111 starts power supply to at least a portion of the motherboard 11 related to power-on operation.

In the process that the power supply unit 111 supplies power to the information authentication module 1130 and the information input interface 12, the information authentication module 1130 can acquire information to be authenticated through the information input interface 12.

Specifically, the motherboard 11 may further include a memory, a bridge, various boards, a Hard Disk Drive (Hard Disk Drive), and/or a peripheral interface. For example, the Memory may include Dynamic Random Access Memory (DRAM), Static Random Access Memory (SRAM), and/or flash Memory (flash). The bridge chip may include a south bridge chip and/or a north bridge chip, etc. The various boards may include a Video Card (Video Card), a Sound Card (Sound Card), and/or a Network Card (Network Interface Card).

The power supply unit 111 may be connected to at least one of conventional modules, memory, bridge, and peripheral interfaces in the processing unit 112 on the motherboard 11. The power supply unit 111 is configured to supply power to a conventional module, a memory, a bridge, and/or a peripheral device in the processing unit 112 on the motherboard 11 according to the power-on enable signal sent by the information authentication module 1130.

In the embodiment of the present application shown in fig. 1, the information authentication module 1130 is integrated in the processing unit 112, so that the information authentication module 1130 is not easily lost like an RFID card or a USB key. Moreover, the information authentication module 1130 is disposed in a preset isolation area in the processing unit 112, so that the information authentication module 1130 cannot perform data interaction with other modules, information in the information authentication module 1130 is prevented from being illegally tampered, and the risk of bypassing authentication information due to peripheral hardware defects, BIOS firmware bugs, computer operating system bugs and the like is reduced.

On the basis of the embodiment described above in connection with fig. 1, the power supply unit 111 is explained below in connection with fig. 2.

Fig. 2 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 2, the power supply unit 111 includes: a first power supply module 101 and a second power supply module 102. The power supply terminal of the first power module 101 is connected to the information authentication module 1130 and the information input interface 12, respectively. The control terminal of the second power module 102 is connected to the information authentication module 1130.

The first power module 101 is used to supply power to the information authentication module 1130 and the information input interface 12. The first power module 101 may include a battery. Alternatively, the battery may be a button battery, a detachable or non-detachable rechargeable battery, or the like. Alternatively, the first power module 101 may be operated in the low power consumption state all the time after the electronic device is shipped from the factory.

The second power module 102 is configured to receive the power-on enable signal sent by the information authentication module 1130, and start power supply to at least a portion of the motherboard 11 related to the power-on operation.

In the electronic device provided in the embodiment of fig. 2, the first power module 101 supplies power to the information authentication module 1130 and the information input interface 12, so that the information authentication module 1130 and the information input interface 12 can normally operate, in the process that the information authentication module 1130 and the information input interface 12 normally operate, the information authentication module 1130 acquires information to be authenticated through the information input interface 12, after it is determined that the information to be authenticated is authenticated, the second power module 102 supplies power to the motherboard 11 according to the power-on enable signal sent by the information authentication module 1130, and starts the computer operating system, that is, authentication information verification is performed before the second power module 102 supplies power to the motherboard 11, so that the risk that standard authentication information is cracked can be reduced, information leakage in the electronic device is avoided, and the security of the electronic device is improved. In addition, in the present application, the second power module 102 may be a power unit pre-designed on the motherboard, and the first power module 101 is a power unit re-designed on the motherboard, and the first power module 101 and the second power module 102 are separately arranged, so that the modification on the motherboard can be reduced, and the original circuit of the motherboard is prevented from being damaged.

On the basis of the above embodiments, the electronic device provided in the embodiments of the present application is further described below with reference to fig. 3, specifically, refer to the embodiment of fig. 3.

Fig. 3 is a schematic structural diagram three of an electronic device according to an embodiment of the present application. On the basis of fig. 2, as shown in fig. 3, the information authentication module 1130 includes: a controller 31 and an authentication memory 32. The controller 31 is connected to the authentication memory 32, the information input interface 12, and the power supply terminal of the first power module 101 and the control terminal of the second power module 102, respectively. The authentication memory 32 is also connected to the power supply terminal of the first power module 101.

The authentication memory 32 is used to store standard authentication information.

The controller 31 is configured to obtain information to be authenticated through the information input interface 12, obtain standard authentication information from the authentication memory 32, and send a power-on enable signal to the second power module 102 if it is determined that the standard authentication information matches the information to be authenticated.

The controller 31 may be a Micro Control Unit (MCU).

After purchasing the processing unit 112, the manufacturer of the electronic device sets the processing unit 112 on the motherboard, and completes the wiring of the data signal line, the control signal line, and the like of the processing unit 112 in the electronic device according to a pre-designed drawing, so as to complete the power supply design in the electronic device, the wiring may include the connection relationship between the control terminal of the second power module, the information input interface, and the processing unit 112, and sets the wiring between the power supply terminal of the first power module and the information input interface, the processing unit 112, and the like on the motherboard according to the power supply design.

Alternatively, the authentication information of the administrator may be stored in the authentication memory 32 before the processing unit 112 is shipped.

When a user purchases an electronic device, an administrator connects a preset input device to the information input interface 12, the administrator provides the to-be-authenticated information of the administrator to the controller 31 through the input device and the information input interface 12, after it is determined that the to-be-authenticated information of the administrator passes authentication based on the to-be-authenticated information of the administrator and authentication information of the administrator stored in advance in the authentication memory 32, the authentication information of the administrator stored in advance in the authentication memory 32 may be deleted (or the authentication information of the administrator may be retained), and standard authentication information of at least one user may be entered into the authentication memory 32 by the administrator through the input device.

During the process of using the electronic device by the user, the information to be authenticated of the user may be provided to the controller 31 through the information input interface 12, after the information to be authenticated of the user is obtained, the controller 31 obtains the standard authentication information from the authentication memory 32, and if it is determined that the standard authentication information matches the information to be authenticated of the user, the controller sends a power-on enable signal to the second power module 102.

As an optional implementation, the electronic device further comprises: and the information input unit is connected with the information input interface 12. When the user uses the electronic apparatus, the user supplies the information to be authenticated to the information input interface 12 through the information input unit, so that the information input interface 12 supplies the information to be authenticated to the controller 31.

Optionally, the information input unit may include an information acquisition module, and the information acquisition module may include at least one of the following components: fingerprint identification module, face identification module, iris identification module and ID card identification module. Alternatively, the information input unit may include a communication module and/or a peripheral such as a keyboard. The communication module is used for receiving information to be authenticated sent by mobile communication equipment such as a mobile phone.

For example, when the information acquisition module is a fingerprint identification module, the information to be authenticated is fingerprint information; and when the information acquisition module is an iris recognition module, the information to be authenticated is iris information. In the application, the information input interface 12 can receive various types of information to be authenticated, such as iris information and/or fingerprint information, so that the safety problem that the user can be violently cracked when the weak password key is used for identifying and verifying the user is solved, the type of the information to be authenticated can be freely selected by the user, and the flexibility of authenticating the information to be authenticated, namely identifying the identity of the user is improved.

On the basis of the above embodiments, the electronic device provided in the embodiments of the present application is further described below with reference to fig. 4, specifically, please refer to the embodiment of fig. 4.

Fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application. On the basis of fig. 2, as shown in fig. 4, the information authentication module 1130 includes: a controller 31, an encryption and decryption tool 33 and an authentication memory 32.

The controller 31 is connected to the encryption/decryption tool 33, the authentication memory 32, the information input interface 12, the power supply terminal of the first power module 101, and the control terminal of the second power module 102.

The encryption and decryption tool 33 and the authentication memory 32 are also connected to the power supply terminals of the first power module 101, respectively.

The authentication memory 32 is used for storing encrypted original authentication information after the original authentication information is encrypted by the encryption/decryption tool 33.

The controller 31 is configured to obtain information to be authenticated through the information input interface 12, obtain encrypted original authentication information from the authentication memory 32, decrypt the encrypted original authentication information through the encryption and decryption tool 33 to obtain original authentication information, and send a power-on enable signal to the second power module 102 if it is determined that the original authentication information matches the information to be authenticated.

The encrypted original authentication information of the administrator after the encryption processing of the original authentication information of the administrator by the encryption/decryption tool 33 may be stored in advance in the authentication memory 32 before shipment of the processing unit 112.

As an optional implementation manner, when the user purchases the electronic device, the administrator connects the information collection module to the information input interface 12, the administrator provides the to-be-authenticated information of the administrator to the controller 31 through the information collection module and the information input interface 12, after receiving the to-be-authenticated information of the administrator, the controller 31 obtains the encrypted original authentication information stored in the authentication memory 32 in advance, decrypts the encrypted original authentication information through the encryption and decryption tool 33 to obtain the original authentication information of the administrator, and if it is determined that the original authentication information of the administrator matches the to-be-authenticated information of the administrator, the to-be-authenticated information of the administrator is authenticated. After passing the authentication, the encrypted original authentication information pre-stored in the authentication memory 32 may be deleted, and the administrator may provide the original authentication information of the user to the controller 31 through the information collecting module, so that the controller 31 performs an encryption process on the original authentication information of the user through the encryption and decryption tool 33 to obtain the encrypted original authentication information of the user, and stores the encrypted original authentication information in the authentication memory 32.

During the process of using the electronic device by the user, the information to be authenticated of the user can be provided to the controller 31 through the information input interface 12, after the information to be authenticated of the user is obtained, the controller 31 obtains the encrypted original authentication information of the user from the authentication memory 32, and decrypts the encrypted original authentication information of the user through the encryption and decryption tool 33 to obtain the original authentication information of the user. If it is determined that the original authentication information of the user matches the to-be-authenticated information of the user, the to-be-authenticated information of the user passes authentication, and a power-on enable signal is sent to the second power module 102.

The original authentication information is encrypted by the encryption/decryption tool 33 included in the information authentication module 1130 to obtain encrypted original authentication information, and the encrypted original authentication information is stored in the authentication memory 32, so that the security of the original authentication information can be improved, and the original authentication information can be prevented from being illegally tampered.

Or, in the process of using the electronic device by the user, the information to be authenticated of the user may be provided to the controller 31 through the information input interface 12, the controller 31 encrypts the information to be authenticated through the encryption and decryption tool to obtain encrypted information to be authenticated, and obtains the pre-stored encrypted original authentication information from the authentication memory 32, where the encrypted original authentication information is obtained after the original authentication information is encrypted. The controller 31 determines whether the encrypted original authentication information matches the encrypted information to be authenticated, and determines that the information to be authenticated of the user passes authentication if the encrypted original authentication information matches the encrypted information to be authenticated.

As an optional implementation, the electronic device further comprises: and the information input unit is connected with the controller 31 through the information input interface 12. When the user uses the electronic device, the user inputs information to be authenticated through the information input unit, and the controller 31 acquires the information to be authenticated input by the user through the information input interface 12. Optionally, the information input unit may include an information acquisition module, and the information acquisition module may include at least one of the following modules: fingerprint identification module, face identification module, iris identification module and ID card identification module. Alternatively, the information input unit may include a communication module for receiving information to be authenticated transmitted by a mobile communication device, such as a mobile phone.

On the basis of the above embodiment, the electronic device may further include: a power detection unit 13 and a prompt unit 14. The electronic device is described in further detail below with reference to fig. 5.

Fig. 5 is a schematic structural diagram five of an electronic device provided in the embodiment of the present application. On the basis of the embodiment of fig. 3, as shown in fig. 5, the electronic device further includes: a power detection unit 13 and a prompt unit 14.

The power amount detection unit 13 is connected to the first power module 101 and the controller 31, respectively.

The presentation unit 14 is connected to the controller 31.

The power detecting unit 13 is configured to detect a remaining power of the first power module 101.

The controller 31 is further configured to obtain the remaining power detected by the power detection unit 13, and if it is determined that the remaining power is less than or equal to the preset value, control the prompt unit 14 to alarm the power of the user. Optionally, the size of the preset value may be equal to the size of the electric quantity required for performing one authentication, or may be other.

Alternatively, the power amount detection unit 13 may include a voltage sensor and/or other sensors for measuring the remaining power amount. The prompting unit 14 may include an electronic device such as a buzzer and/or a Light Emitting Diode (LED).

In this embodiment of the application, the electronic device includes the electric quantity detection unit 13 and the prompt unit 14, so that when it is determined that the remaining electric quantity is less than or equal to the preset value, the controller 31 can control the prompt unit 14 to alarm the electric quantity of the user, and the user can charge the first power module, thereby improving the timeliness of charging the first power module, avoiding the problem that the authentication information cannot be treated due to the exhaustion of the electric quantity in the first power module, and thus the user mistakenly believes that the electronic device fails, and improving the user experience.

Fig. 6 is a flowchart illustrating an information authentication method according to an embodiment of the present application. As shown in fig. 6, the method includes:

step S601, obtaining information to be authenticated.

Optionally, the execution subject of the embodiment of the method may be the controller 31 in the information authentication module 1130 in the electronic device, and may be an information authentication device disposed in the controller 31, where the information authentication device may be implemented by software or hardware, or a combination of software and hardware.

Step S602, determining whether the information to be authenticated passes authentication.

If the information to be authenticated is determined to pass the authentication, step S603 is executed, otherwise step S604 is executed.

For example, on the basis of fig. 2, determining whether the information to be authenticated is authenticated may include the following steps: acquiring pre-stored standard authentication information; judging whether the standard authentication information is matched with the information to be authenticated; and if the standard authentication information is matched with the information to be authenticated, determining that the information to be authenticated passes the authentication.

For example, on the basis of fig. 4, determining whether the information to be authenticated is authenticated may include the following steps: acquiring pre-stored encrypted original authentication information, wherein the encrypted original authentication information is obtained after the original authentication information is encrypted; decrypting the encrypted original authentication information through an encryption and decryption tool to obtain original authentication information; judging whether the original authentication information is matched with the information to be authenticated; and if the original authentication information is matched with the information to be authenticated, determining that the information to be authenticated passes the authentication.

For example, on the basis of fig. 4, determining whether the information to be authenticated is authenticated may include the following steps: encrypting the information to be authenticated through an encryption and decryption tool to obtain encrypted information to be authenticated; acquiring pre-stored encrypted original authentication information, wherein the encrypted original authentication information is obtained after the original authentication information is encrypted; judging whether the encrypted original authentication information is matched with the encrypted to-be-authenticated information; and if the encrypted original authentication information is matched with the encrypted information to be authenticated, determining that the information to be authenticated passes authentication.

Step S603, sending a power-on enable signal to a power supply unit in the electronic device, so that the power supply unit starts to supply power to at least a part of the motherboard related to the startup operation.

For the embodiment in which the power supply unit includes the first power supply module and the second power supply module, the power-on enable signal may be sent to the second power supply module in the power supply unit, so that the second power supply module starts to supply power to at least a portion of the motherboard related to the startup operation.

Step S604, a power-on enable signal is not sent to the power unit in the electronic device, and the motherboard is kept in a power-off state. For the embodiment in which the power supply unit includes the first power supply module and the second power supply module, the power-on enable signal is not sent to the second power supply module in the power supply unit, and the motherboard is kept in the power-off state.

The embodiment of the application provides a computer-readable storage medium, wherein a computer executing instruction is stored in the computer-readable storage medium, and when a processor executes the computer executing instruction, the information authentication method of any one of the embodiments is implemented.

The embodiment of the present application provides a computer program product, which includes a computer program, and when the computer program is executed by a processor, the information authentication method of any one of the above embodiments is implemented.

Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: various changes and modifications can be made to the technical solutions described in the foregoing embodiments without departing from the spirit and scope of the present application. Thus, if such modifications and variations of the embodiments of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to encompass such modifications and variations.

In the present application, the terms "include" and variations thereof may refer to non-limiting inclusions; the term "or" and variations thereof may mean "and/or". The terms "first," "second," and the like in this application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. In the present application, "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.

18页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:身份数据验证方法、装置、计算机设备和存储介质

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类