CN100365534C - Method for adding locking function into universal interface of mobile phone to protect computer - Google Patents
Method for adding locking function into universal interface of mobile phone to protect computer Download PDFInfo
- Publication number
- CN100365534C CN100365534C CNB2005100233801A CN200510023380A CN100365534C CN 100365534 C CN100365534 C CN 100365534C CN B2005100233801 A CNB2005100233801 A CN B2005100233801A CN 200510023380 A CN200510023380 A CN 200510023380A CN 100365534 C CN100365534 C CN 100365534C
- Authority
- CN
- China
- Prior art keywords
- computer
- mobile phone
- data
- general purpose
- promptly
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Abstract
The present invention relates to a method for protecting a computer by adding a locking function in a universal interface of a mobile telephone. The method is characterized in that locking software for locking a universal interface (for example, a general-purpose universal serial bus (USB)) is arranged in the mobile telephone, and a driver for driving the locking software is arranged in the computer. After the software locking function of the mobile telephone is started and the mobile telephone is connected with another universal interface of the computer by a transmission line cable, protection program is started; then, after the connection between the computer and the mobile telephone is cut off, the computer can display a prompt frame to inquire whether the computer needs to be locked; when selecting need, the computer enters a protective mode; only the mobile telephone is newly connected to the computer by the transmission line cable and the uniqueness is confirmed, the computer can be started to enter the normal work mode. In this way, the data in the computer of a user can be protected more strictly.
Description
Technical field
The present invention is relevant for a kind of method of protecting computer information; especially refer to that a kind of General Purpose Interface at existing mobile phone (for example: add locking (lock) function universal serial (USB)); with a hardware and a corresponding software mode that utilizes this mobile phone; be used as making the data in user's computer (PC) that one more tight safeguard measure is provided, and then effectively improve the security of data in this computer.
Background technology
Every technology obtains the today that develops rapidly in the information field, transport interface has been used among the products such as consumption electronic products, mobile phone, notebook computer and information household electrical appliances in large quantities, and later show of universal serial (Universal Series Bus is called for short USB) becomes the utilization main flow of back computer (PC) epoch product step by step.
Because the user often complains more and more complexity and difficult of computer and its periphery equipment connected mode before, therefore, manufacturer is that proposing formulation a kind of is the standard interface of main shaft with the computer, so that simplify existing computer and the multiple linkage interface of peripheral equipment, this notion is generally supported, so work up this universal serial (USB), its target is at the standard interface that a kind of simple cheap with user's angle thinking is provided, utilize a transmission lines cable to be connected in series all kinds of peripheral equipments, solve a lot of line bodies in present computer back disorderly around predicament, and utilize interface communications protocol Auto-Sensing to install, can not start shooting again or complicated the setting under the state of installing, at any time assign and use various peripheral equipment--and plug and play (PnP, hot-swapping).
Therefore, this universal serial (USB) is a kind of information product string type standard universal interface specification of global general-use, it can connect keyboard, mouse, peripheral equipments such as recreation rocking bar, also support the audio-visual information transmission of digital compression fast, also just because of this universal serial (USB) transport interface has the simple structure of the entity of connection, the characteristic of the good and hot plug plug and play of extendibility, so can become the Crispy Fried Chicken of transport interface, and impel this computer, peripheral equipment, mobile phone and consumption electronic products utilize this universal serial (USB) to go into the interface as output in a large number.
Yet, portability along with this mobile phone, and this mobile phone has been configured aforesaid universal serial (USB) interface mostly on hardware, therefore, anyone is under present environmental baseline, all can utilize this mobile phone to carry out in a large number between computer and fast data export into, be considerably convenient and frequent.
But, under this situation, the user is stored in the data in this computer, relatively can't obtain the protection on the safety, obviously, the present practice does not reach the requirement of user for data security, and by this, the data that the user is stored in its computer will be optionally by anyone institute's free access; Therefore, the inventor in sense of smell to this problem, and for early in response to the demand in market, promptly develop a kind of solution that proposes at above-mentioned situation energetically, use unlikely the leaking of data in this computer of general protection effectively.
Summary of the invention
Because the portability of this mobile phone; and this mobile phone has been configured universal serial (USB) interface mostly on hardware; therefore; anyone is under present environmental baseline; all can utilize this mobile phone that computer is carried out in a large number and fast data export into; yet; this practice can't obtain protection on the safety for user's data in this computer of being stored in obviously; its data can be optionally by anyone institute's free access; the shortcoming that causes data to leak; it is greatly inconvenient also to bring the user; so the inventor is to be engaged in the sector experience for many years; through permanent make great efforts research and experiment after, development and Design goes out a kind of " adding the method for lock function with the protection computer in the General Purpose Interface of mobile phone " of the present invention and in the hope of by clever thought of the present invention, effectively addresses the above problem finally.
Purpose of the present invention; add the method for lock function providing in a kind of General Purpose Interface with the protection computer at mobile phone; in this method; be provided with a locked software in order to the locking General Purpose Interface in one mobile phone; be equipped with one in order to drive the driver of this locked software in a computer, this method comprises following steps:
At first, this computer detects this mobile phone and has been connected on it;
This computer inspection and when judging locked software function in this mobile phone and having opened promptly sends a random data to this mobile phone, preserves this random data simultaneously;
Then, this mobile phone is stored to this random data in one reservoir of its inside, and the position data that returns this storage location is simultaneously given this computer;
This computer can store the position data of relevant this storage location after receiving the position data of this passback;
This computer cuts off and being connected of this mobile phone then, and shows that a prompting frame is inquired and whether lock this computer;
When need selecting, this computer enters protected mode.
See through method of the present invention, will have following advantage:
1, can protect the interior data of user's computer all sidedly, the security that improves data, effectively solving the domestic-investment material of known computer can be arbitrarily by the problem of anyone free access.
2, see through the surcharge that this method can improve this mobile phone.
For ease of technological means of the present invention and operation are had further understanding and understanding, for the embodiment conjunction with figs., be described in detail as follows now:
Description of drawings
Fig. 1 is the configuration diagram of the embodiment of the invention;
Fig. 2 is the schematic flow sheet that computer of the present invention mobile phone under normal condition is connected to the computer General Purpose Interface;
Fig. 3 is the schematic flow sheet that computer of the present invention mobile phone under protected mode is connected to the computer General Purpose Interface;
Fig. 4 is that computer of the present invention cuts off and schematic flow sheet after mobile phone is connected in normal operation.
Embodiment
The present invention is a kind of " adding the method for lock function with the protection computer in the General Purpose Interface of mobile phone ", see also shown in Figure 1, this method is to be provided with a locked software 14 in order to locking (lock) General Purpose Interface 13 in a mobile phone 10, and a driver 24 in order to drive this locked software 14 is installed in a computer 20 (PC), when locking software 14 functions of this mobile phone 10 are opened, and after seeing through a transmission cable 30 and another General Purpose Interface 23 of this computer 20 being connected, promptly start defence program, then, this computer 20 cut off with being connected of mobile phone 10 after, whether this computer 20 can demonstrate prompting frame inquiry needs to lock this computer 20, when need selecting, this computer 20 promptly enters protected mode, have only again this mobile phone 10 is connected to this computer 20 through this transmission cable 30, and confirm that its uniqueness just can start this computer 20 and enter normal mode of operation; By this, the data in user's computer 20 can be subjected to more tight protection.
In framework of the present invention, see also shown in Figure 1 again, provide the central authorities of communication module group 11 that Communications service uses, a master control to handle module 12 and a General Purpose Interface 13 (in the present embodiment except having one in this mobile phone 10, this General Purpose Interface 13 is a universal serial (Universal Series Bus, be called for short USB)) outside, also include this locked software 14, make to see through the function that this locking software 14 is available for users to select whether to open this locked software 14 in order to locking General Purpose Interface 13.
And in this computer 20 except the CPU (central processing unit) 21 (CPU), with a master control provides the operating system 22 and another General Purpose Interface 23 that can transmit mutually with this General Purpose Interface 13 of operation usefulness, this driver 24 in order to drive this locked software 14 need be installed.
Below will be at above-mentioned these locked software 14 functions of adding in this mobile phone 10 of the present invention, be elaborated in conjunction with an embodiment, see also shown in Figure 2, when this computer 20 is under the normal operating conditions, this mobile phone 10 will be controlled processing according to the following step after being connected to another General Purpose Interface 23 of this computer 20 through this transmission cable 30 (as shown in Figure 1):
Step (201) at first, this computer 20 detects this mobile phone 10 and has been connected to another General Purpose Interface 23 on it;
Is this computer 20 of step (202) checked immediately and is judged that locked software 14 functions in this mobile phone 10 open? if open, promptly continue next step (203), if do not open, then do general processing;
This computer 20 of step (203) promptly sends a random data to this mobile phone 10, preserves this random data simultaneously;
Step (204) then, this mobile phone 10 is stored to a reservoir (not shown) of its inside with this random data, and the position of its storage is to adopt storing mode at random, the position data that returns this storage location is simultaneously given this computer 20;
This computer 20 of step (205) can store the position data of relevant this storage location after receiving the position data of this passback, then, finish this time handling procedure.
Moreover, when this computer 20 under aforementioned protected mode, mobile phone 10 will be controlled processing according to the following step after being connected to another General Purpose Interface 23 of this computer 20, see also shown in Figure 3:
Step (301) at first, this computer 20 detects this mobile phone 10 and has been connected to another General Purpose Interface 23 on it;
Is this computer 20 of step (302) checked immediately and is judged that locked software 14 functions in this mobile phone 10 open? if open, promptly continue next step (303), if do not open, then do not process;
This computer 20 of step (303) promptly sends storage position data (this position data is the storage location data that are stored in its interior magazine that original mobile phone 10 passbacks are accused for this computer 20) within it to this mobile phone 10;
Step (304) then, this mobile phone 10 is searched the location conten data that put in place within it according to this position data, and these location conten data are sent to this computer 20;
Whether does this computer 20 of step (305) compare consistent with the data of preserving within it received location conten data? if consistent, promptly continue next step (306), if there is not unanimity, then disregard;
Does step (306) demonstrate a password box, and judges whether cryptographic check correct? if correct, promptly continue next step (307), if incorrect, then still get back to protected mode;
Step (307) is recovered the duty of this computer 20, then, finishes this time handling procedure.
In addition, when this computer 20 in normal operation, cut off with being connected of this mobile phone 10 after, will control processing according to the following step, see also shown in Figure 4:
Step (401) at first, this computer 20 detects this mobile phone 10 and has disconnected and being connected of this another General Purpose Interface 23;
Is this computer 20 of step (402) checked immediately and is judged that locked software 14 functions in this mobile phone 10 open? if open, promptly continue next step (403), if do not open, then do not process;
Whether step (403) demonstrates prompting frame inquiry needs to lock this computer 20, if need locking, promptly continues next step (404), if do not need locking, does not then process the maintenance original state;
Step (404) shows the multiselect item in this prompting frame, comprising: whether lock keyboard (keyboard) and mouse (mouse), whether lock infrared transmission device (irda), whether lock bluetooth (bluetooth) transmission, whether lock wireless network, whether lock cable network and whether lock other outer interface etc.., and according to the directly row locking of these option contents, then, finish this time handling procedure.
Wherein work as this computer 20 under guard mode, if illegally started, this computer 20 still can rest on guard mode after restarting.
In the method for the invention, when each user pulls up this transmission cable 30 and cuts off being connected of mobile phones 10 and computer 20, all can trigger once and inquire, to ask about the prompting that whether needs to lock this computer 20; Behind illegal the startup, the guard mode that this computer 20 stops locks, and has only again this mobile phone 10 is connected to this computer 20 through this transmission cable 30, and confirms that its uniqueness just can start this computer 20 and enter normal mode of operation; In addition, can on this mobile phone 10, set up the locking switch (not shown) of this General Purpose Interface 13 of locking, in order to select whether to start this lock function.
The above, only be a specific embodiment of the best of the present invention, but structural attitude of the present invention is not limited thereto, allly anyly is familiar with present technique field person in field of the present invention, can think easily and variation or modification, should all covered in the claim of following this case.
Claims (3)
1. one kind adds the method for lock function with the protection computer in the General Purpose Interface of mobile phone; in this method; be provided with a locked software in order to the locking General Purpose Interface in one mobile phone, be equipped with one in order to drive the driver of this locked software in a computer, this method comprises following steps:
At first, this computer detects this mobile phone and has been connected on it;
This computer inspection and when judging locked software function in this mobile phone and having opened promptly sends a random data to this mobile phone, preserves this random data simultaneously;
Then, this mobile phone is stored to this random data in one reservoir of its inside, and the position data that returns this storage location is simultaneously given this computer;
This computer can store the position data of relevant this storage location after receiving the position data of this passback;
This computer cuts off and being connected of this mobile phone then, and shows that a prompting frame is inquired and whether lock this computer;
When need selecting, this computer enters protected mode.
2. the method that adds lock function with the protection computer in the General Purpose Interface of mobile phone as claimed in claim 1 is characterized in that, when this computer under protected mode, this method also comprises following steps:
At first, this computer detects this mobile phone and has been connected on it;
This computer inspection and when judging locked software function in this mobile phone and having opened promptly sends the position data that stores within it to this mobile phone;
Then, this mobile phone is searched the location conten data that put in place within it according to this position data, and these location conten data are sent to this computer;
This computer is with received location conten data and preserve within it data and compare out when consistent, promptly demonstrates a password box, and when to judge a cryptographic check be correct, promptly recovers the duty of this computer.
3. the method that adds lock function with the protection computer in the General Purpose Interface of mobile phone as claimed in claim 2 is characterized in that, when this computer in normal operation, cut off with being connected of this mobile phone after, this method also comprises following steps:
At first, this computer detects this mobile phone and has disconnected and its be connected;
This computer inspection and when judging locked software function in this mobile phone and having opened, whether promptly demonstrate prompting frame inquiry needs to lock this computer;
When the information that is received is when needing locking, promptly in this prompting frame, show the multiselect item, and directly lock according to these option contents.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005100233801A CN100365534C (en) | 2005-01-17 | 2005-01-17 | Method for adding locking function into universal interface of mobile phone to protect computer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005100233801A CN100365534C (en) | 2005-01-17 | 2005-01-17 | Method for adding locking function into universal interface of mobile phone to protect computer |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1808324A CN1808324A (en) | 2006-07-26 |
CN100365534C true CN100365534C (en) | 2008-01-30 |
Family
ID=36840257
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2005100233801A Expired - Fee Related CN100365534C (en) | 2005-01-17 | 2005-01-17 | Method for adding locking function into universal interface of mobile phone to protect computer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100365534C (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105844741A (en) * | 2016-03-17 | 2016-08-10 | 苏州八方电机科技有限公司 | Locking and unlocking method, locking and unlocking apparatus and authorization method for electric car |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1208876A (en) * | 1997-08-19 | 1999-02-24 | 英业达股份有限公司 | Method for protecting computer system utilizing hand electronic device |
US6097385A (en) * | 1994-11-15 | 2000-08-01 | Compaq Computer Corporation | Computer resource regulation |
CN1349197A (en) * | 2001-12-04 | 2002-05-15 | 上海复旦光华信息科技股份有限公司 | IC card-based protecting system for WINDOWS series of computers |
CN1376982A (en) * | 2001-03-28 | 2002-10-30 | 高崧 | User ID recognizing system for computer |
-
2005
- 2005-01-17 CN CNB2005100233801A patent/CN100365534C/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6097385A (en) * | 1994-11-15 | 2000-08-01 | Compaq Computer Corporation | Computer resource regulation |
CN1208876A (en) * | 1997-08-19 | 1999-02-24 | 英业达股份有限公司 | Method for protecting computer system utilizing hand electronic device |
CN1376982A (en) * | 2001-03-28 | 2002-10-30 | 高崧 | User ID recognizing system for computer |
CN1349197A (en) * | 2001-12-04 | 2002-05-15 | 上海复旦光华信息科技股份有限公司 | IC card-based protecting system for WINDOWS series of computers |
Also Published As
Publication number | Publication date |
---|---|
CN1808324A (en) | 2006-07-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101002180B (en) | Method and system for coordinating client and host security modules | |
EP1659818B1 (en) | Protecting information stored on a lost or stolen portable terminal by a control device notifying the terminal of a protection instruction | |
CA2768497C (en) | Remote device diagnostic and repair apparatus and methods | |
CN1656456A (en) | Display device and funds transaction device including the display device | |
US20020073334A1 (en) | Method and system for embedded, automated, component-level control of computer systems and other complex systems | |
JP5117483B2 (en) | Method, apparatus, storage medium and removable storage device for pre-boot recovery in a locked computer system | |
CN102413456A (en) | User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network | |
US20190155697A1 (en) | Data backup method and terminal | |
CN106326718A (en) | Unlocking method, unlocking device and terminal equipment | |
CN105577648A (en) | Method for obtaining and sending short message identifying code, calculating device and mobile terminal | |
CN107615294A (en) | A kind of identifying code short message display method and mobile terminal | |
CN105574376A (en) | Screen unlocking device, system and method | |
CN103973437A (en) | Method, device and system for acquiring RSA secret key authorization when terminal is locked | |
CN101414342B (en) | Software dog and method for implementing software protection | |
CN100365534C (en) | Method for adding locking function into universal interface of mobile phone to protect computer | |
CN102833737A (en) | Computer to vehicle wireless link | |
US20040098584A1 (en) | Method and system for embedded, automated, component-level control of computer systems and other complex systems | |
CN103699821B (en) | The processing method of stolen terminal and server | |
CN105791552B (en) | A kind of SMS processing method, device and mobile terminal | |
CN114697007B (en) | Key management method, corresponding device and system | |
CN103092721B (en) | Application backing up method, electronic equipment and system | |
CN106791176A (en) | A kind of anti-theft method for mobile terminal, device and mobile terminal | |
CN103824014A (en) | Isolation certificating and monitoring method of USB (universal serial bus) port within local area network | |
CN101324911A (en) | Access protection method and system of computer system internal information with first level verification | |
GB2294787A (en) | Electronic device and method of cloning |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20080130 Termination date: 20220117 |