CN101482902A - Intelligent computer anti-theft system - Google Patents
Intelligent computer anti-theft system Download PDFInfo
- Publication number
- CN101482902A CN101482902A CNA2008100012569A CN200810001256A CN101482902A CN 101482902 A CN101482902 A CN 101482902A CN A2008100012569 A CNA2008100012569 A CN A2008100012569A CN 200810001256 A CN200810001256 A CN 200810001256A CN 101482902 A CN101482902 A CN 101482902A
- Authority
- CN
- China
- Prior art keywords
- security personnel
- theft system
- intelligent computer
- data
- computer anti
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The invention relates to an intelligent computer anti-theft system which comprises a modem driven by a security personnel and a data protection software communicating with the modem driven by the security personnel. The modem driven by the security personnel is arranged in an object notebook computer and/or a personal computer and/or a system which is provided with compatible interfaces under the protection, and is used for sending information to the data protection software to process data protection, remote operation, internet communication and position-trailing of the object computer. The anti-theft system also comprises the data protection software which communicates with the modem driven by the security personnel to protect data, receives a remote control command, sends an internet communication request and/or processes position-trailing data. The user can receive real-time warning messages of the modem driven by the security personnel. The intelligent computer anti-theft system not only can be used as an independent anti-theft system, but also can realize the remote operation of the object computer via the long-distance SMS/Data order.
Description
Technical field
The present invention relates to a kind of intelligent computer anti-theft system, more specifically, relate to a kind of computer anti-theft system that data protection, remote control, internet communication and Position Tracking can be provided.
Background technology
The burglary-resisting system of prior art is difficult to notebook and mobile device provides the real time data protection and provide the system of remote control mode to control.
Summary of the invention
The objective of the invention is to solve that prior art is difficult to accomplish provides the technical matters of real time data protection and telechirics to notebook and mobile device; and solve the user and carry out interactive problem, a kind of transient data protection burglary-resisting system that is simple and easy to usefulness is provided simultaneously from long distance terminal and shielded mobile device.
Purpose of the present invention is achieved by the following technical programs.
According to a kind of intelligent computer anti-theft system of the present invention; comprise modulator-demodular unit key and data protection module that security personnel drive, modulator-demodular unit key and described data protection module that wherein said security personnel drive are installed to target protected computer device.
According to the present invention, can set up a kind of like this burglary-resisting system, comprising modulator-demodular unit and data protection software that the modulator-demodular unit that drives with these security personnel communicates of security personnel's driving; The modulator-demodular unit that described security personnel drive is arranged on target notebook computing machine and/or personal computer and/or has in the system of the compatibility interface under the protection, and is used for information is sent to data protection, remote control, internet communication and the Position Tracking of this data protection software to carry out object computer.
This burglary-resisting system also comprises a data protection software, and it communicates with protected data in object computer, receives guidance command, sends the internet communication request and/or handle the Position Tracking data with the modulator-demodular unit that security personnel drive.
The user will receive the real-time alerting information of the modulator-demodular unit of this security personnel's driving.
This burglary-resisting system not only can be used as an independently burglary-resisting system, and can be by the distant remote control that realizes object computer apart from the SMS/Data order.
The present invention is also for the use of intelligent computer anti-theft system, comprising: utilize security personnel's key storage device and and the data protection of system lock submodule, different operating system is supported in this data protection; Utilize the remote control of notebook and system lock submodule, this notebook communicates with the data communication equipment (DCE) of one of them kind of supporting multiple general wireless data communication standard, and this system lock submodule drives the access control of the shielded device of target of the modulator-demodular unit that has security personnel's driving; Utilize the communication of data communication equipment (DCE), this data communication equipment (DCE) is supported one of them kind of multiple general wireless data communication standard; And, utilize the Position Tracking of described data communication equipment (DCE)
Utilize burglary-resisting system of the present invention, can reach following technique effect and advantage: notice is implemented in utilization and for the control of protecting sensitive data, the user can protect the sensitive data of notebook;
Description of drawings
Fig. 1 illustrates system construction drawing of the present invention;
Fig. 2 illustrates the groundwork flow process of system of the present invention;
Fig. 3 illustrates the virtual disk installation procedure of system of the present invention;
Fig. 4 illustrates the workflow of the service of recovery.
Embodiment
Below embodiments of the invention are described.But should be appreciated that described embodiment only is of the present invention giving an example.In fact embodiment can realize by various form.Therefore, specific 26S Proteasome Structure and Function details described herein is not construed as limiting the invention, and just as the basis of claim and as the basis of carrying out the instruction of various suitable enforcements to those skilled in the art in practice.
Fig. 1 is that the structure of this system is constructed in the mode of the information transmission between each parts according to the system architecture synoptic diagram of computer anti-theft of the present invention system.
In technical scheme shown in Figure 1, comprising modulator-demodular unit that security personnel drive and the data protection software that communicates with the modulator-demodular unit of this security personnel driving.
The modulator-demodular unit that security personnel drive comprises data communication equipment (DCE), security personnel's key storage device and Position Tracking drive unit, wherein, data communication equipment (DCE) is supported the wherein at least a of multiple general wireless data communications standard, and multiple wireless data communications standard comprises Radio Frequency, WiFi, Wimax, Bluetooth, HSDPA, 3G, EDGE, CDMA, GPRS and SMS.
Modulator-demodular unit key and shielded mobile device that security personnel drive can be integrated in the shared computer external connecting interface; this shared computer external connecting interface can be PCMCIA; perhaps USB; perhaps ExpressCard; perhaps PCI; perhaps MiniPCI, perhaps serial port.
The modulator-demodular unit that security personnel drive is connected to mobile device through above-mentioned peripheral connecting interface.By in the storage medium of mobile device, setting up the virtual disk space, protected data can be stored in the protected mobile device.All data that are stored in this virtual disk space are encrypted, and can be decrypted by setting up the public-private key superstructure.
When having only the modulator-demodular unit that drives as security personnel to be connected to shielded mobile device, described virtual disk space can be installed by the prior private code of setting up of the owner of this shielded mobile device by input.In order to improve security personnel's level, can adopt double code mechanism, the additional password that the modulator-demodular unit that therefore requires the owner of this shielded mobile device to input again to be driven by security personnel produces at random.
Lost the owner under the situation of this shielded mobile device, the modulator-demodular unit that the owner can utilize supvr's cell phone to drive to security personnel by telecommunications operation person's network sends distant distance order and controls this shielded mobile device.The modulator-demodular unit that security personnel drive receives this order and transfers to this shielded mobile device, in case this shielded mobile device is connected, just can carry out relevant instruction.
Position Tracking drive unit in the modulator-demodular unit that security personnel drive can operate in the Position Tracking of accepting usually, and the Position Tracking of described common acceptance is the GPS location, or RFID location or based on the telecommunication system of operator position.When starting following function, the modulator-demodular unit that security personnel drive will send the positional information of mobile device to the location server of place-centric.Thus, the owner of mobile device can come the position of tracking shifter by remote control computer.
Usually; the modulator-demodular unit that security personnel drive is arranged on target notebook computing machine and/or personal computer and/or has in the system of the compatibility interface under the protection; and operate with the data protection software collaboration; be used for information is sent to this data protection software to carry out 1) data protection of object computer; 2) remote control, 3) internet communication and 4) Position Tracking.
In intelligent computer anti-theft system of the present invention, data protection module can comprise data protection submodule and system lock submodule, wherein, the data protection submodule is supported one or more data protections of protected device, comprises that file and/or catalogue catalogue are hidden, the encryption and the virtual disk protection based on data of file and/or catalogue; The modulator-demodular unit that the system lock submodule adopts described security personnel to drive drives the access control of the shielded device of described target, and access control comprises the screen saver of the modulator-demodular unit cryptographic key protection that extra log in page, security personnel drive, closes electricity and automatic format automatically.
Particularly, for data protection, data protection module is that data protection software can comprise following part:
1. login protection-this data protection software is installed to after the goal systems, this software will combine with the logging program of the operating system of the shielded device of target.This burglary-resisting system requires to possess the modulator-demodular unit that security personnel drive, otherwise will intercept user's login.
2. login warning-during the login of the system that possesses modulator-demodular unit, system will be to its owner with the form of SMS and/or the data warning information that give a warning.
3. warning-during protected data is installed to computing machine is installed, and this system will be to its owner with the form of SMS and/or the data warning information that give a warning.
4. the sensitive data of storage data protection-system can be protected with encrypted form and/or hidden form by described data protection software.These sensitive datas of being protected by burglary-resisting system of the present invention can utilize the modulator-demodular unit of the security personnel's driving that is possessed to conduct interviews.
5. the sensitive data of disposal password-this system can be protected by additional disposal password.During protected data is installed to computing machine, system will send a disposal password to the owner.Need can be installed in conjunction with disposal password and user's phrase by protected data.
6. system lock-during removing the modulator-demodular unit that security personnel drive, this system will be locked immediately, and the protected data that presets of mandatory protection.
7. invasion is attempted data destroying down-the receive sensitive data that data protection software is protected and is being invaded between trial period and can destroy.For example, but mistake key in three login re-try attempt trigger data and destroy.
8. the modulator-demodular unit that recovers service-security personnel driving its lose and age at failure between can generate once more.Protected data only can be accessed under the situation of the modulator-demodular unit that possesses security personnel's driving.
For remote control, data protection module is that data protection software can comprise following part:
1. interaction warning-under the situation of the modulator-demodular unit that possesses security personnel's driving, this system can notify system state with SMS form or data-message form to the device owner.This message can be triggered or answered owner's requirement and trigger by system itself.
2. remote control actions-under the situation of the modulator-demodular unit that possesses security personnel's driving, this system can utilize this data protection software to carry out remote control with SMS form or data-message form by the device owner.For example, this data protection software can lock this system, closes this system or destroy sensitive data.
For internet communication, the modulator-demodular unit that security personnel drive can comprise following part:
1.SMS the modulator-demodular unit that communication-these security personnel drive can utilize telecommunications operation person's mobile telephone network to send and receive SMS.
2. modulator-demodular unit and telecommunications operation person's data communication network that data communication-these security personnel drive are compatible, and allow the owner by the suitable interconnected surfing on the net that is arranged on.
In force, the modulator-demodular unit that security personnel drive can be placed in the recharge-able battery circuit, and mode that can contactless shielded mobile device is supported the remote control of the modulator-demodular unit of this security personnel driving.
For locking tracking, data protection module is that data protection software can comprise following part:
1. location-based tracking-during the modulator-demodular unit that these security personnel drive is connected, utilize the telecommunications operation person system that supports location-based tracking, the position that the owner can tracking shifter.
2.GPS the modulator-demodular unit that tracking-these security personnel drive selectively comprises the GPS function on hardware, and provides interactive exact position to follow the tracks of.
3.RFID the modulator-demodular unit that Position Tracking-these security personnel drive RFID function selectively on hardware, and provide interactive Position Tracking in the zone of reader's configuration.
Fig. 2 illustrates the example according to the groundwork flow process of computer anti-theft of the present invention system; the main use of computer anti-theft just of the present invention system, wherein basic step be included in and insert judgement and install software behind the modulator-demodular unit, with protected device registration, visit or shielded device is installed and then is visited data in the protected device.
Concrete use comprises: utilize security personnel's key storage device and and the data protection of system lock submodule, different operating system is supported in this data protection; Utilize the remote control of notebook and system lock submodule, this notebook communicates with the data communication equipment (DCE) of one of them kind of supporting multiple general wireless data communication standard, and this system lock submodule drives the access control of the shielded device of target of the modulator-demodular unit that has security personnel's driving; Utilize the communication of data communication equipment (DCE), this data communication equipment (DCE) is supported one of them kind of multiple general wireless data communication standard; And the Position Tracking of utilizing data communication equipment (DCE).
Above-mentioned different operating system can comprise Microsoft Windows XP, Microsoft WindowsVISTA, Linux and Mac OS; Above-mentioned multiple wireless data communications standard can comprise RadioFrequency, WiFi, Wimax, Bluetooth, HSDPA, 3G, EDGE, CDMA, GPRS and SMS; And above-mentioned access control comprises the screen saver of the modulator-demodular unit protection that extra log in page, security personnel drive, closes electricity and automatic format automatically.
Above-mentioned security personnel's key storage device is supported the general-purpose storage of encryption key or unidirectional security personnel's hash data of this encryption key, perhaps supports the identifier of this encryption key; The module that said system locking submodule adopts security personnel to drive drives the access control of shielded mobile device.
Fig. 3 illustrates the example according to the virtual disk installation procedure of computer anti-theft of the present invention system.
At first judge whether to select to install new data file; If the result who judges is certainly, then import correlation parameter, comprise document location and file size; Select the virtual drive mark then; If the result who judges negates then directly to select the virtual drive mark.
Judge again whether driving is relevant with disposal password; If the result who judges is sure, then send disposal password to supvr's phone; Ask the user to import disposal password and pass phrase then; If the result who judges negates then to ask the user to import pass phrase.
Need to judge whether the SMS of transmission again about installing; If the result who judges is sure, then send the capacity that SMS installs to user notification; Finish the whole erection operation then; If judging does not need to send SMS, then installation process finishes.
Fig. 4 illustrates the example of the workflow of the service of recovery, comprising: obtain recovery request; Judge whether the claimant is registered; Recover the information of modulator-demodular unit from server; Old information is write new modulator-demodular unit; Distribute or start the function of modulator-demodular unit then.
For the above embodiments, those skilled in the art can carry out various modifications or variation under the situation that does not break away from essence of the present invention, and the protection domain that these modifications and variations all belong to claim of the present invention to be limited.
Claims (21)
1. intelligent computer anti-theft system comprises:
The modulator-demodular unit that security personnel drive; With
Data protection module,
Modulator-demodular unit and described data protection module that wherein said security personnel drive are installed to target protected computer device.
2. according to the described intelligent computer anti-theft system of claim 1, the modulator-demodular unit that wherein said security personnel drive comprises:
Data communication equipment (DCE);
Security personnel's key storage device; With
The Position Tracking drive unit.
3. according to the described intelligent computer anti-theft system of claim 2, wherein said data communication equipment (DCE) is supported the wherein at least a of multiple general wireless data communications standard.
4. according to the described intelligent computer anti-theft system of claim 3, wherein said multiple wireless data communications standard comprises Radio Frequency, WiFi, Wimax, Bluetooth, HSDPA, 3G, EDGE, CDMA, GPRS and SMS.
5. according to the described intelligent computer anti-theft system of claim 2, wherein said security personnel's key storage device is supported the general-purpose storage of encryption key or unidirectional security personnel's hash data of this encryption key, perhaps supports the identifier of this encryption key.
6. according to the described intelligent computer anti-theft system of claim 2, wherein said Position Tracking drive unit can operate in the Position Tracking of accepting usually.
7. intelligent computer anti-theft system according to claim 6, the Position Tracking of wherein said common acceptance are GPS location, or the RFID location, or based on the telecommunication system of operator position.
8. intelligent computer anti-theft system according to claim 1, wherein said data protection module comprises:
The data protection submodule; With
The system lock submodule.
9. according to the described intelligent computer anti-theft system of claim 8, wherein said data protection submodule is supported one or more data protections of protected device.
10. according to the described intelligent computer anti-theft system of claim 9, wherein said data protection comprises that file and/or catalogue catalogue are hidden, the encryption and the virtual disk protection based on data of file and/or catalogue.
11. the modulator-demodular unit that intelligent computer anti-theft system according to claim 8, wherein said system lock submodule adopt described security personnel to drive drives the access control of the shielded device of described target.
12. according to the described intelligent computer anti-theft system of claim 11, wherein said access control comprises the screen saver of the modulator-demodular unit protection that extra log in page, security personnel drive, closes electricity and automatic format automatically.
13. according to the described intelligent computer anti-theft system of claim 1, modulator-demodular unit and described target protected computer device that wherein said security personnel drive are integrated in the shared computer external connecting interface.
14. according to the described intelligent computer anti-theft system of claim 13, wherein said shared computer external connecting interface is PCMCIA, perhaps USB, perhaps ExpressCard, perhaps PCI, perhaps MiniPCI, perhaps serial port.
15. according to the described intelligent computer anti-theft system of claim 2; the modulator-demodular unit that wherein said security personnel drive selectively is placed in the recharge-able battery circuit, and mode that can the shielded device of contactless described target is supported the remote control of the modulator-demodular unit that described security personnel drive.
16. the use of the described intelligent computer anti-theft system of claim 1 comprises:
Utilize security personnel's key storage device and and the data protection of system lock submodule, different operating system is supported in this data protection;
Utilize the remote control of notebook and system lock submodule, this notebook communicates with the data communication equipment (DCE) of one of them kind of supporting multiple general wireless data communication standard, and this system lock submodule drives the access control of the shielded device of target of the modulator-demodular unit that has security personnel's driving;
Utilize the communication of data communication equipment (DCE), this data communication equipment (DCE) is supported one of them kind of multiple general wireless data communication standard; And
Utilize the Position Tracking of described data communication equipment (DCE).
17. according to the use of the described intelligent computer anti-theft system of claim 16, wherein said security personnel's key storage device is supported the general-purpose storage of encryption key or unidirectional security personnel's hash data of this encryption key, perhaps supports the identifier of this encryption key.
18. according to the use of the described intelligent computer anti-theft system of claim 16, the module that wherein said system lock submodule adopts security personnel to drive drives the access control of the shielded device of described target.
19. according to the use of the described intelligent computer anti-theft system of claim 16, wherein said different operating system comprises Microsoft Windows XP, Microsoft Windows VISTA, Linux and Mac OS.
20. according to the use of the described intelligent computer anti-theft system of claim 16, wherein said multiple wireless data communications standard comprises Radio Frequency, WiFi, Wimax, Bluetooth, HSDPA, 3G, EDGE, CDMA, GPRS and SMS.
21. according to the use of the described intelligent computer anti-theft system of claim 16, wherein said access control comprises the screen saver of the modulator-demodular unit protection that extra log in page, security personnel drive, closes electricity and automatic format automatically.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008100012569A CN101482902A (en) | 2008-01-07 | 2008-01-07 | Intelligent computer anti-theft system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008100012569A CN101482902A (en) | 2008-01-07 | 2008-01-07 | Intelligent computer anti-theft system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101482902A true CN101482902A (en) | 2009-07-15 |
Family
ID=40880007
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2008100012569A Pending CN101482902A (en) | 2008-01-07 | 2008-01-07 | Intelligent computer anti-theft system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101482902A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103200169A (en) * | 2013-01-30 | 2013-07-10 | 中国科学院自动化研究所 | Method and system of user data protection based on proxy |
CN103294973A (en) * | 2012-10-17 | 2013-09-11 | 西安晨安电子科技有限公司 | Method for preventing computer from being stolen |
-
2008
- 2008-01-07 CN CNA2008100012569A patent/CN101482902A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103294973A (en) * | 2012-10-17 | 2013-09-11 | 西安晨安电子科技有限公司 | Method for preventing computer from being stolen |
CN103200169A (en) * | 2013-01-30 | 2013-07-10 | 中国科学院自动化研究所 | Method and system of user data protection based on proxy |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101524881B1 (en) | A security module having a secondary agent in coordination with a host agent | |
US9967252B2 (en) | Secure storage device with automatic command filtering | |
EP2503806B1 (en) | Anti-theft mobile terminal and anti-theft method for mobile terminal | |
CA2721429C (en) | Privacy management for tracked devices | |
US9560026B1 (en) | Secure computer operations | |
US20080004039A1 (en) | Portable computer system having wireless communication functionality and global geographic positioning functionality | |
CN102171674B (en) | Method and apparatus for access to a computer unit | |
CN105447406A (en) | Method and apparatus for accessing storage space | |
JP2006099769A (en) | Method for disabling computing device, based on location of device | |
WO2013166886A1 (en) | Anti-theft method, device and system for portable computer equipment | |
CN109691075B (en) | Mobile terminal anti-theft method and device | |
JP2006309532A (en) | Information processor | |
JP2006279321A (en) | Security software for mobile terminal and security communication system | |
EP2456247B1 (en) | System and method for hindering a cold boot attack | |
CN102687135B (en) | Data are recovered in the storage medium of the electronic equipment be tampered | |
CN101937404A (en) | Control method for accessing computer memory and computer thereof | |
CN101482902A (en) | Intelligent computer anti-theft system | |
CN102480724A (en) | Software authentication data card, software authentication system and software authentication method | |
JP4240962B2 (en) | Information terminal management system | |
KR101737061B1 (en) | Personal information data safeguarding and tracing method for mobile telecommunication terminal | |
US20100132054A1 (en) | System and Method for Securing a Computer System | |
WO2009095354A2 (en) | Method for the remote management of mobile devices and mobile device suited thereto |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1128348 Country of ref document: HK |
|
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20090715 |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1128348 Country of ref document: HK |