CN101482902A - Intelligent computer anti-theft system - Google Patents

Intelligent computer anti-theft system Download PDF

Info

Publication number
CN101482902A
CN101482902A CNA2008100012569A CN200810001256A CN101482902A CN 101482902 A CN101482902 A CN 101482902A CN A2008100012569 A CNA2008100012569 A CN A2008100012569A CN 200810001256 A CN200810001256 A CN 200810001256A CN 101482902 A CN101482902 A CN 101482902A
Authority
CN
China
Prior art keywords
security personnel
theft system
intelligent computer
data
computer anti
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008100012569A
Other languages
Chinese (zh)
Inventor
应勤民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Grand Tyrant Digital (group) Holding Ltd
Original Assignee
Grand Tyrant Digital (group) Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Grand Tyrant Digital (group) Holding Ltd filed Critical Grand Tyrant Digital (group) Holding Ltd
Priority to CNA2008100012569A priority Critical patent/CN101482902A/en
Publication of CN101482902A publication Critical patent/CN101482902A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The invention relates to an intelligent computer anti-theft system which comprises a modem driven by a security personnel and a data protection software communicating with the modem driven by the security personnel. The modem driven by the security personnel is arranged in an object notebook computer and/or a personal computer and/or a system which is provided with compatible interfaces under the protection, and is used for sending information to the data protection software to process data protection, remote operation, internet communication and position-trailing of the object computer. The anti-theft system also comprises the data protection software which communicates with the modem driven by the security personnel to protect data, receives a remote control command, sends an internet communication request and/or processes position-trailing data. The user can receive real-time warning messages of the modem driven by the security personnel. The intelligent computer anti-theft system not only can be used as an independent anti-theft system, but also can realize the remote operation of the object computer via the long-distance SMS/Data order.

Description

Intelligent computer anti-theft system
Technical field
The present invention relates to a kind of intelligent computer anti-theft system, more specifically, relate to a kind of computer anti-theft system that data protection, remote control, internet communication and Position Tracking can be provided.
Background technology
The burglary-resisting system of prior art is difficult to notebook and mobile device provides the real time data protection and provide the system of remote control mode to control.
Summary of the invention
The objective of the invention is to solve that prior art is difficult to accomplish provides the technical matters of real time data protection and telechirics to notebook and mobile device; and solve the user and carry out interactive problem, a kind of transient data protection burglary-resisting system that is simple and easy to usefulness is provided simultaneously from long distance terminal and shielded mobile device.
Purpose of the present invention is achieved by the following technical programs.
According to a kind of intelligent computer anti-theft system of the present invention; comprise modulator-demodular unit key and data protection module that security personnel drive, modulator-demodular unit key and described data protection module that wherein said security personnel drive are installed to target protected computer device.
According to the present invention, can set up a kind of like this burglary-resisting system, comprising modulator-demodular unit and data protection software that the modulator-demodular unit that drives with these security personnel communicates of security personnel's driving; The modulator-demodular unit that described security personnel drive is arranged on target notebook computing machine and/or personal computer and/or has in the system of the compatibility interface under the protection, and is used for information is sent to data protection, remote control, internet communication and the Position Tracking of this data protection software to carry out object computer.
This burglary-resisting system also comprises a data protection software, and it communicates with protected data in object computer, receives guidance command, sends the internet communication request and/or handle the Position Tracking data with the modulator-demodular unit that security personnel drive.
The user will receive the real-time alerting information of the modulator-demodular unit of this security personnel's driving.
This burglary-resisting system not only can be used as an independently burglary-resisting system, and can be by the distant remote control that realizes object computer apart from the SMS/Data order.
The present invention is also for the use of intelligent computer anti-theft system, comprising: utilize security personnel's key storage device and and the data protection of system lock submodule, different operating system is supported in this data protection; Utilize the remote control of notebook and system lock submodule, this notebook communicates with the data communication equipment (DCE) of one of them kind of supporting multiple general wireless data communication standard, and this system lock submodule drives the access control of the shielded device of target of the modulator-demodular unit that has security personnel's driving; Utilize the communication of data communication equipment (DCE), this data communication equipment (DCE) is supported one of them kind of multiple general wireless data communication standard; And, utilize the Position Tracking of described data communication equipment (DCE)
Utilize burglary-resisting system of the present invention, can reach following technique effect and advantage: notice is implemented in utilization and for the control of protecting sensitive data, the user can protect the sensitive data of notebook;
Description of drawings
Fig. 1 illustrates system construction drawing of the present invention;
Fig. 2 illustrates the groundwork flow process of system of the present invention;
Fig. 3 illustrates the virtual disk installation procedure of system of the present invention;
Fig. 4 illustrates the workflow of the service of recovery.
Embodiment
Below embodiments of the invention are described.But should be appreciated that described embodiment only is of the present invention giving an example.In fact embodiment can realize by various form.Therefore, specific 26S Proteasome Structure and Function details described herein is not construed as limiting the invention, and just as the basis of claim and as the basis of carrying out the instruction of various suitable enforcements to those skilled in the art in practice.
Fig. 1 is that the structure of this system is constructed in the mode of the information transmission between each parts according to the system architecture synoptic diagram of computer anti-theft of the present invention system.
In technical scheme shown in Figure 1, comprising modulator-demodular unit that security personnel drive and the data protection software that communicates with the modulator-demodular unit of this security personnel driving.
The modulator-demodular unit that security personnel drive comprises data communication equipment (DCE), security personnel's key storage device and Position Tracking drive unit, wherein, data communication equipment (DCE) is supported the wherein at least a of multiple general wireless data communications standard, and multiple wireless data communications standard comprises Radio Frequency, WiFi, Wimax, Bluetooth, HSDPA, 3G, EDGE, CDMA, GPRS and SMS.
Modulator-demodular unit key and shielded mobile device that security personnel drive can be integrated in the shared computer external connecting interface; this shared computer external connecting interface can be PCMCIA; perhaps USB; perhaps ExpressCard; perhaps PCI; perhaps MiniPCI, perhaps serial port.
The modulator-demodular unit that security personnel drive is connected to mobile device through above-mentioned peripheral connecting interface.By in the storage medium of mobile device, setting up the virtual disk space, protected data can be stored in the protected mobile device.All data that are stored in this virtual disk space are encrypted, and can be decrypted by setting up the public-private key superstructure.
When having only the modulator-demodular unit that drives as security personnel to be connected to shielded mobile device, described virtual disk space can be installed by the prior private code of setting up of the owner of this shielded mobile device by input.In order to improve security personnel's level, can adopt double code mechanism, the additional password that the modulator-demodular unit that therefore requires the owner of this shielded mobile device to input again to be driven by security personnel produces at random.
Lost the owner under the situation of this shielded mobile device, the modulator-demodular unit that the owner can utilize supvr's cell phone to drive to security personnel by telecommunications operation person's network sends distant distance order and controls this shielded mobile device.The modulator-demodular unit that security personnel drive receives this order and transfers to this shielded mobile device, in case this shielded mobile device is connected, just can carry out relevant instruction.
Position Tracking drive unit in the modulator-demodular unit that security personnel drive can operate in the Position Tracking of accepting usually, and the Position Tracking of described common acceptance is the GPS location, or RFID location or based on the telecommunication system of operator position.When starting following function, the modulator-demodular unit that security personnel drive will send the positional information of mobile device to the location server of place-centric.Thus, the owner of mobile device can come the position of tracking shifter by remote control computer.
Usually; the modulator-demodular unit that security personnel drive is arranged on target notebook computing machine and/or personal computer and/or has in the system of the compatibility interface under the protection; and operate with the data protection software collaboration; be used for information is sent to this data protection software to carry out 1) data protection of object computer; 2) remote control, 3) internet communication and 4) Position Tracking.
In intelligent computer anti-theft system of the present invention, data protection module can comprise data protection submodule and system lock submodule, wherein, the data protection submodule is supported one or more data protections of protected device, comprises that file and/or catalogue catalogue are hidden, the encryption and the virtual disk protection based on data of file and/or catalogue; The modulator-demodular unit that the system lock submodule adopts described security personnel to drive drives the access control of the shielded device of described target, and access control comprises the screen saver of the modulator-demodular unit cryptographic key protection that extra log in page, security personnel drive, closes electricity and automatic format automatically.
Particularly, for data protection, data protection module is that data protection software can comprise following part:
1. login protection-this data protection software is installed to after the goal systems, this software will combine with the logging program of the operating system of the shielded device of target.This burglary-resisting system requires to possess the modulator-demodular unit that security personnel drive, otherwise will intercept user's login.
2. login warning-during the login of the system that possesses modulator-demodular unit, system will be to its owner with the form of SMS and/or the data warning information that give a warning.
3. warning-during protected data is installed to computing machine is installed, and this system will be to its owner with the form of SMS and/or the data warning information that give a warning.
4. the sensitive data of storage data protection-system can be protected with encrypted form and/or hidden form by described data protection software.These sensitive datas of being protected by burglary-resisting system of the present invention can utilize the modulator-demodular unit of the security personnel's driving that is possessed to conduct interviews.
5. the sensitive data of disposal password-this system can be protected by additional disposal password.During protected data is installed to computing machine, system will send a disposal password to the owner.Need can be installed in conjunction with disposal password and user's phrase by protected data.
6. system lock-during removing the modulator-demodular unit that security personnel drive, this system will be locked immediately, and the protected data that presets of mandatory protection.
7. invasion is attempted data destroying down-the receive sensitive data that data protection software is protected and is being invaded between trial period and can destroy.For example, but mistake key in three login re-try attempt trigger data and destroy.
8. the modulator-demodular unit that recovers service-security personnel driving its lose and age at failure between can generate once more.Protected data only can be accessed under the situation of the modulator-demodular unit that possesses security personnel's driving.
For remote control, data protection module is that data protection software can comprise following part:
1. interaction warning-under the situation of the modulator-demodular unit that possesses security personnel's driving, this system can notify system state with SMS form or data-message form to the device owner.This message can be triggered or answered owner's requirement and trigger by system itself.
2. remote control actions-under the situation of the modulator-demodular unit that possesses security personnel's driving, this system can utilize this data protection software to carry out remote control with SMS form or data-message form by the device owner.For example, this data protection software can lock this system, closes this system or destroy sensitive data.
For internet communication, the modulator-demodular unit that security personnel drive can comprise following part:
1.SMS the modulator-demodular unit that communication-these security personnel drive can utilize telecommunications operation person's mobile telephone network to send and receive SMS.
2. modulator-demodular unit and telecommunications operation person's data communication network that data communication-these security personnel drive are compatible, and allow the owner by the suitable interconnected surfing on the net that is arranged on.
In force, the modulator-demodular unit that security personnel drive can be placed in the recharge-able battery circuit, and mode that can contactless shielded mobile device is supported the remote control of the modulator-demodular unit of this security personnel driving.
For locking tracking, data protection module is that data protection software can comprise following part:
1. location-based tracking-during the modulator-demodular unit that these security personnel drive is connected, utilize the telecommunications operation person system that supports location-based tracking, the position that the owner can tracking shifter.
2.GPS the modulator-demodular unit that tracking-these security personnel drive selectively comprises the GPS function on hardware, and provides interactive exact position to follow the tracks of.
3.RFID the modulator-demodular unit that Position Tracking-these security personnel drive RFID function selectively on hardware, and provide interactive Position Tracking in the zone of reader's configuration.
Fig. 2 illustrates the example according to the groundwork flow process of computer anti-theft of the present invention system; the main use of computer anti-theft just of the present invention system, wherein basic step be included in and insert judgement and install software behind the modulator-demodular unit, with protected device registration, visit or shielded device is installed and then is visited data in the protected device.
Concrete use comprises: utilize security personnel's key storage device and and the data protection of system lock submodule, different operating system is supported in this data protection; Utilize the remote control of notebook and system lock submodule, this notebook communicates with the data communication equipment (DCE) of one of them kind of supporting multiple general wireless data communication standard, and this system lock submodule drives the access control of the shielded device of target of the modulator-demodular unit that has security personnel's driving; Utilize the communication of data communication equipment (DCE), this data communication equipment (DCE) is supported one of them kind of multiple general wireless data communication standard; And the Position Tracking of utilizing data communication equipment (DCE).
Above-mentioned different operating system can comprise Microsoft Windows XP, Microsoft WindowsVISTA, Linux and Mac OS; Above-mentioned multiple wireless data communications standard can comprise RadioFrequency, WiFi, Wimax, Bluetooth, HSDPA, 3G, EDGE, CDMA, GPRS and SMS; And above-mentioned access control comprises the screen saver of the modulator-demodular unit protection that extra log in page, security personnel drive, closes electricity and automatic format automatically.
Above-mentioned security personnel's key storage device is supported the general-purpose storage of encryption key or unidirectional security personnel's hash data of this encryption key, perhaps supports the identifier of this encryption key; The module that said system locking submodule adopts security personnel to drive drives the access control of shielded mobile device.
Fig. 3 illustrates the example according to the virtual disk installation procedure of computer anti-theft of the present invention system.
At first judge whether to select to install new data file; If the result who judges is certainly, then import correlation parameter, comprise document location and file size; Select the virtual drive mark then; If the result who judges negates then directly to select the virtual drive mark.
Judge again whether driving is relevant with disposal password; If the result who judges is sure, then send disposal password to supvr's phone; Ask the user to import disposal password and pass phrase then; If the result who judges negates then to ask the user to import pass phrase.
Need to judge whether the SMS of transmission again about installing; If the result who judges is sure, then send the capacity that SMS installs to user notification; Finish the whole erection operation then; If judging does not need to send SMS, then installation process finishes.
Fig. 4 illustrates the example of the workflow of the service of recovery, comprising: obtain recovery request; Judge whether the claimant is registered; Recover the information of modulator-demodular unit from server; Old information is write new modulator-demodular unit; Distribute or start the function of modulator-demodular unit then.
For the above embodiments, those skilled in the art can carry out various modifications or variation under the situation that does not break away from essence of the present invention, and the protection domain that these modifications and variations all belong to claim of the present invention to be limited.

Claims (21)

1. intelligent computer anti-theft system comprises:
The modulator-demodular unit that security personnel drive; With
Data protection module,
Modulator-demodular unit and described data protection module that wherein said security personnel drive are installed to target protected computer device.
2. according to the described intelligent computer anti-theft system of claim 1, the modulator-demodular unit that wherein said security personnel drive comprises:
Data communication equipment (DCE);
Security personnel's key storage device; With
The Position Tracking drive unit.
3. according to the described intelligent computer anti-theft system of claim 2, wherein said data communication equipment (DCE) is supported the wherein at least a of multiple general wireless data communications standard.
4. according to the described intelligent computer anti-theft system of claim 3, wherein said multiple wireless data communications standard comprises Radio Frequency, WiFi, Wimax, Bluetooth, HSDPA, 3G, EDGE, CDMA, GPRS and SMS.
5. according to the described intelligent computer anti-theft system of claim 2, wherein said security personnel's key storage device is supported the general-purpose storage of encryption key or unidirectional security personnel's hash data of this encryption key, perhaps supports the identifier of this encryption key.
6. according to the described intelligent computer anti-theft system of claim 2, wherein said Position Tracking drive unit can operate in the Position Tracking of accepting usually.
7. intelligent computer anti-theft system according to claim 6, the Position Tracking of wherein said common acceptance are GPS location, or the RFID location, or based on the telecommunication system of operator position.
8. intelligent computer anti-theft system according to claim 1, wherein said data protection module comprises:
The data protection submodule; With
The system lock submodule.
9. according to the described intelligent computer anti-theft system of claim 8, wherein said data protection submodule is supported one or more data protections of protected device.
10. according to the described intelligent computer anti-theft system of claim 9, wherein said data protection comprises that file and/or catalogue catalogue are hidden, the encryption and the virtual disk protection based on data of file and/or catalogue.
11. the modulator-demodular unit that intelligent computer anti-theft system according to claim 8, wherein said system lock submodule adopt described security personnel to drive drives the access control of the shielded device of described target.
12. according to the described intelligent computer anti-theft system of claim 11, wherein said access control comprises the screen saver of the modulator-demodular unit protection that extra log in page, security personnel drive, closes electricity and automatic format automatically.
13. according to the described intelligent computer anti-theft system of claim 1, modulator-demodular unit and described target protected computer device that wherein said security personnel drive are integrated in the shared computer external connecting interface.
14. according to the described intelligent computer anti-theft system of claim 13, wherein said shared computer external connecting interface is PCMCIA, perhaps USB, perhaps ExpressCard, perhaps PCI, perhaps MiniPCI, perhaps serial port.
15. according to the described intelligent computer anti-theft system of claim 2; the modulator-demodular unit that wherein said security personnel drive selectively is placed in the recharge-able battery circuit, and mode that can the shielded device of contactless described target is supported the remote control of the modulator-demodular unit that described security personnel drive.
16. the use of the described intelligent computer anti-theft system of claim 1 comprises:
Utilize security personnel's key storage device and and the data protection of system lock submodule, different operating system is supported in this data protection;
Utilize the remote control of notebook and system lock submodule, this notebook communicates with the data communication equipment (DCE) of one of them kind of supporting multiple general wireless data communication standard, and this system lock submodule drives the access control of the shielded device of target of the modulator-demodular unit that has security personnel's driving;
Utilize the communication of data communication equipment (DCE), this data communication equipment (DCE) is supported one of them kind of multiple general wireless data communication standard; And
Utilize the Position Tracking of described data communication equipment (DCE).
17. according to the use of the described intelligent computer anti-theft system of claim 16, wherein said security personnel's key storage device is supported the general-purpose storage of encryption key or unidirectional security personnel's hash data of this encryption key, perhaps supports the identifier of this encryption key.
18. according to the use of the described intelligent computer anti-theft system of claim 16, the module that wherein said system lock submodule adopts security personnel to drive drives the access control of the shielded device of described target.
19. according to the use of the described intelligent computer anti-theft system of claim 16, wherein said different operating system comprises Microsoft Windows XP, Microsoft Windows VISTA, Linux and Mac OS.
20. according to the use of the described intelligent computer anti-theft system of claim 16, wherein said multiple wireless data communications standard comprises Radio Frequency, WiFi, Wimax, Bluetooth, HSDPA, 3G, EDGE, CDMA, GPRS and SMS.
21. according to the use of the described intelligent computer anti-theft system of claim 16, wherein said access control comprises the screen saver of the modulator-demodular unit protection that extra log in page, security personnel drive, closes electricity and automatic format automatically.
CNA2008100012569A 2008-01-07 2008-01-07 Intelligent computer anti-theft system Pending CN101482902A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008100012569A CN101482902A (en) 2008-01-07 2008-01-07 Intelligent computer anti-theft system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008100012569A CN101482902A (en) 2008-01-07 2008-01-07 Intelligent computer anti-theft system

Publications (1)

Publication Number Publication Date
CN101482902A true CN101482902A (en) 2009-07-15

Family

ID=40880007

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008100012569A Pending CN101482902A (en) 2008-01-07 2008-01-07 Intelligent computer anti-theft system

Country Status (1)

Country Link
CN (1) CN101482902A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103200169A (en) * 2013-01-30 2013-07-10 中国科学院自动化研究所 Method and system of user data protection based on proxy
CN103294973A (en) * 2012-10-17 2013-09-11 西安晨安电子科技有限公司 Method for preventing computer from being stolen

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103294973A (en) * 2012-10-17 2013-09-11 西安晨安电子科技有限公司 Method for preventing computer from being stolen
CN103200169A (en) * 2013-01-30 2013-07-10 中国科学院自动化研究所 Method and system of user data protection based on proxy

Similar Documents

Publication Publication Date Title
KR101524881B1 (en) A security module having a secondary agent in coordination with a host agent
US9967252B2 (en) Secure storage device with automatic command filtering
EP2503806B1 (en) Anti-theft mobile terminal and anti-theft method for mobile terminal
CA2721429C (en) Privacy management for tracked devices
US9560026B1 (en) Secure computer operations
US20080004039A1 (en) Portable computer system having wireless communication functionality and global geographic positioning functionality
CN102171674B (en) Method and apparatus for access to a computer unit
CN105447406A (en) Method and apparatus for accessing storage space
JP2006099769A (en) Method for disabling computing device, based on location of device
WO2013166886A1 (en) Anti-theft method, device and system for portable computer equipment
CN109691075B (en) Mobile terminal anti-theft method and device
JP2006309532A (en) Information processor
JP2006279321A (en) Security software for mobile terminal and security communication system
EP2456247B1 (en) System and method for hindering a cold boot attack
CN102687135B (en) Data are recovered in the storage medium of the electronic equipment be tampered
CN101937404A (en) Control method for accessing computer memory and computer thereof
CN101482902A (en) Intelligent computer anti-theft system
CN102480724A (en) Software authentication data card, software authentication system and software authentication method
JP4240962B2 (en) Information terminal management system
KR101737061B1 (en) Personal information data safeguarding and tracing method for mobile telecommunication terminal
US20100132054A1 (en) System and Method for Securing a Computer System
WO2009095354A2 (en) Method for the remote management of mobile devices and mobile device suited thereto

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1128348

Country of ref document: HK

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20090715

REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1128348

Country of ref document: HK