CN100365534C - Method for adding locking function into universal interface of mobile phone to protect computer - Google Patents

Method for adding locking function into universal interface of mobile phone to protect computer Download PDF

Info

Publication number
CN100365534C
CN100365534C CNB2005100233801A CN200510023380A CN100365534C CN 100365534 C CN100365534 C CN 100365534C CN B2005100233801 A CNB2005100233801 A CN B2005100233801A CN 200510023380 A CN200510023380 A CN 200510023380A CN 100365534 C CN100365534 C CN 100365534C
Authority
CN
China
Prior art keywords
computer
mobile phone
data
general purpose
promptly
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2005100233801A
Other languages
Chinese (zh)
Other versions
CN1808324A (en
Inventor
赖振兴
管科
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inventec Appliances Nanjing Corp
Original Assignee
Inventec Appliances Nanjing Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Appliances Nanjing Corp filed Critical Inventec Appliances Nanjing Corp
Priority to CNB2005100233801A priority Critical patent/CN100365534C/en
Publication of CN1808324A publication Critical patent/CN1808324A/en
Application granted granted Critical
Publication of CN100365534C publication Critical patent/CN100365534C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The present invention relates to a method for protecting a computer by adding a locking function in a universal interface of a mobile telephone. The method is characterized in that locking software for locking a universal interface (for example, a general-purpose universal serial bus (USB)) is arranged in the mobile telephone, and a driver for driving the locking software is arranged in the computer. After the software locking function of the mobile telephone is started and the mobile telephone is connected with another universal interface of the computer by a transmission line cable, protection program is started; then, after the connection between the computer and the mobile telephone is cut off, the computer can display a prompt frame to inquire whether the computer needs to be locked; when selecting need, the computer enters a protective mode; only the mobile telephone is newly connected to the computer by the transmission line cable and the uniqueness is confirmed, the computer can be started to enter the normal work mode. In this way, the data in the computer of a user can be protected more strictly.

Description

In the General Purpose Interface of mobile phone, add the method for lock function with the protection computer
Technical field
The present invention is relevant for a kind of method of protecting computer information; especially refer to that a kind of General Purpose Interface at existing mobile phone (for example: add locking (lock) function universal serial (USB)); with a hardware and a corresponding software mode that utilizes this mobile phone; be used as making the data in user's computer (PC) that one more tight safeguard measure is provided, and then effectively improve the security of data in this computer.
Background technology
Every technology obtains the today that develops rapidly in the information field, transport interface has been used among the products such as consumption electronic products, mobile phone, notebook computer and information household electrical appliances in large quantities, and later show of universal serial (Universal Series Bus is called for short USB) becomes the utilization main flow of back computer (PC) epoch product step by step.
Because the user often complains more and more complexity and difficult of computer and its periphery equipment connected mode before, therefore, manufacturer is that proposing formulation a kind of is the standard interface of main shaft with the computer, so that simplify existing computer and the multiple linkage interface of peripheral equipment, this notion is generally supported, so work up this universal serial (USB), its target is at the standard interface that a kind of simple cheap with user's angle thinking is provided, utilize a transmission lines cable to be connected in series all kinds of peripheral equipments, solve a lot of line bodies in present computer back disorderly around predicament, and utilize interface communications protocol Auto-Sensing to install, can not start shooting again or complicated the setting under the state of installing, at any time assign and use various peripheral equipment--and plug and play (PnP, hot-swapping).
Therefore, this universal serial (USB) is a kind of information product string type standard universal interface specification of global general-use, it can connect keyboard, mouse, peripheral equipments such as recreation rocking bar, also support the audio-visual information transmission of digital compression fast, also just because of this universal serial (USB) transport interface has the simple structure of the entity of connection, the characteristic of the good and hot plug plug and play of extendibility, so can become the Crispy Fried Chicken of transport interface, and impel this computer, peripheral equipment, mobile phone and consumption electronic products utilize this universal serial (USB) to go into the interface as output in a large number.
Yet, portability along with this mobile phone, and this mobile phone has been configured aforesaid universal serial (USB) interface mostly on hardware, therefore, anyone is under present environmental baseline, all can utilize this mobile phone to carry out in a large number between computer and fast data export into, be considerably convenient and frequent.
But, under this situation, the user is stored in the data in this computer, relatively can't obtain the protection on the safety, obviously, the present practice does not reach the requirement of user for data security, and by this, the data that the user is stored in its computer will be optionally by anyone institute's free access; Therefore, the inventor in sense of smell to this problem, and for early in response to the demand in market, promptly develop a kind of solution that proposes at above-mentioned situation energetically, use unlikely the leaking of data in this computer of general protection effectively.
Summary of the invention
Because the portability of this mobile phone; and this mobile phone has been configured universal serial (USB) interface mostly on hardware; therefore; anyone is under present environmental baseline; all can utilize this mobile phone that computer is carried out in a large number and fast data export into; yet; this practice can't obtain protection on the safety for user's data in this computer of being stored in obviously; its data can be optionally by anyone institute's free access; the shortcoming that causes data to leak; it is greatly inconvenient also to bring the user; so the inventor is to be engaged in the sector experience for many years; through permanent make great efforts research and experiment after, development and Design goes out a kind of " adding the method for lock function with the protection computer in the General Purpose Interface of mobile phone " of the present invention and in the hope of by clever thought of the present invention, effectively addresses the above problem finally.
Purpose of the present invention; add the method for lock function providing in a kind of General Purpose Interface with the protection computer at mobile phone; in this method; be provided with a locked software in order to the locking General Purpose Interface in one mobile phone; be equipped with one in order to drive the driver of this locked software in a computer, this method comprises following steps:
At first, this computer detects this mobile phone and has been connected on it;
This computer inspection and when judging locked software function in this mobile phone and having opened promptly sends a random data to this mobile phone, preserves this random data simultaneously;
Then, this mobile phone is stored to this random data in one reservoir of its inside, and the position data that returns this storage location is simultaneously given this computer;
This computer can store the position data of relevant this storage location after receiving the position data of this passback;
This computer cuts off and being connected of this mobile phone then, and shows that a prompting frame is inquired and whether lock this computer;
When need selecting, this computer enters protected mode.
See through method of the present invention, will have following advantage:
1, can protect the interior data of user's computer all sidedly, the security that improves data, effectively solving the domestic-investment material of known computer can be arbitrarily by the problem of anyone free access.
2, see through the surcharge that this method can improve this mobile phone.
For ease of technological means of the present invention and operation are had further understanding and understanding, for the embodiment conjunction with figs., be described in detail as follows now:
Description of drawings
Fig. 1 is the configuration diagram of the embodiment of the invention;
Fig. 2 is the schematic flow sheet that computer of the present invention mobile phone under normal condition is connected to the computer General Purpose Interface;
Fig. 3 is the schematic flow sheet that computer of the present invention mobile phone under protected mode is connected to the computer General Purpose Interface;
Fig. 4 is that computer of the present invention cuts off and schematic flow sheet after mobile phone is connected in normal operation.
Embodiment
The present invention is a kind of " adding the method for lock function with the protection computer in the General Purpose Interface of mobile phone ", see also shown in Figure 1, this method is to be provided with a locked software 14 in order to locking (lock) General Purpose Interface 13 in a mobile phone 10, and a driver 24 in order to drive this locked software 14 is installed in a computer 20 (PC), when locking software 14 functions of this mobile phone 10 are opened, and after seeing through a transmission cable 30 and another General Purpose Interface 23 of this computer 20 being connected, promptly start defence program, then, this computer 20 cut off with being connected of mobile phone 10 after, whether this computer 20 can demonstrate prompting frame inquiry needs to lock this computer 20, when need selecting, this computer 20 promptly enters protected mode, have only again this mobile phone 10 is connected to this computer 20 through this transmission cable 30, and confirm that its uniqueness just can start this computer 20 and enter normal mode of operation; By this, the data in user's computer 20 can be subjected to more tight protection.
In framework of the present invention, see also shown in Figure 1 again, provide the central authorities of communication module group 11 that Communications service uses, a master control to handle module 12 and a General Purpose Interface 13 (in the present embodiment except having one in this mobile phone 10, this General Purpose Interface 13 is a universal serial (Universal Series Bus, be called for short USB)) outside, also include this locked software 14, make to see through the function that this locking software 14 is available for users to select whether to open this locked software 14 in order to locking General Purpose Interface 13.
And in this computer 20 except the CPU (central processing unit) 21 (CPU), with a master control provides the operating system 22 and another General Purpose Interface 23 that can transmit mutually with this General Purpose Interface 13 of operation usefulness, this driver 24 in order to drive this locked software 14 need be installed.
Below will be at above-mentioned these locked software 14 functions of adding in this mobile phone 10 of the present invention, be elaborated in conjunction with an embodiment, see also shown in Figure 2, when this computer 20 is under the normal operating conditions, this mobile phone 10 will be controlled processing according to the following step after being connected to another General Purpose Interface 23 of this computer 20 through this transmission cable 30 (as shown in Figure 1):
Step (201) at first, this computer 20 detects this mobile phone 10 and has been connected to another General Purpose Interface 23 on it;
Is this computer 20 of step (202) checked immediately and is judged that locked software 14 functions in this mobile phone 10 open? if open, promptly continue next step (203), if do not open, then do general processing;
This computer 20 of step (203) promptly sends a random data to this mobile phone 10, preserves this random data simultaneously;
Step (204) then, this mobile phone 10 is stored to a reservoir (not shown) of its inside with this random data, and the position of its storage is to adopt storing mode at random, the position data that returns this storage location is simultaneously given this computer 20;
This computer 20 of step (205) can store the position data of relevant this storage location after receiving the position data of this passback, then, finish this time handling procedure.
Moreover, when this computer 20 under aforementioned protected mode, mobile phone 10 will be controlled processing according to the following step after being connected to another General Purpose Interface 23 of this computer 20, see also shown in Figure 3:
Step (301) at first, this computer 20 detects this mobile phone 10 and has been connected to another General Purpose Interface 23 on it;
Is this computer 20 of step (302) checked immediately and is judged that locked software 14 functions in this mobile phone 10 open? if open, promptly continue next step (303), if do not open, then do not process;
This computer 20 of step (303) promptly sends storage position data (this position data is the storage location data that are stored in its interior magazine that original mobile phone 10 passbacks are accused for this computer 20) within it to this mobile phone 10;
Step (304) then, this mobile phone 10 is searched the location conten data that put in place within it according to this position data, and these location conten data are sent to this computer 20;
Whether does this computer 20 of step (305) compare consistent with the data of preserving within it received location conten data? if consistent, promptly continue next step (306), if there is not unanimity, then disregard;
Does step (306) demonstrate a password box, and judges whether cryptographic check correct? if correct, promptly continue next step (307), if incorrect, then still get back to protected mode;
Step (307) is recovered the duty of this computer 20, then, finishes this time handling procedure.
In addition, when this computer 20 in normal operation, cut off with being connected of this mobile phone 10 after, will control processing according to the following step, see also shown in Figure 4:
Step (401) at first, this computer 20 detects this mobile phone 10 and has disconnected and being connected of this another General Purpose Interface 23;
Is this computer 20 of step (402) checked immediately and is judged that locked software 14 functions in this mobile phone 10 open? if open, promptly continue next step (403), if do not open, then do not process;
Whether step (403) demonstrates prompting frame inquiry needs to lock this computer 20, if need locking, promptly continues next step (404), if do not need locking, does not then process the maintenance original state;
Step (404) shows the multiselect item in this prompting frame, comprising: whether lock keyboard (keyboard) and mouse (mouse), whether lock infrared transmission device (irda), whether lock bluetooth (bluetooth) transmission, whether lock wireless network, whether lock cable network and whether lock other outer interface etc.., and according to the directly row locking of these option contents, then, finish this time handling procedure.
Wherein work as this computer 20 under guard mode, if illegally started, this computer 20 still can rest on guard mode after restarting.
In the method for the invention, when each user pulls up this transmission cable 30 and cuts off being connected of mobile phones 10 and computer 20, all can trigger once and inquire, to ask about the prompting that whether needs to lock this computer 20; Behind illegal the startup, the guard mode that this computer 20 stops locks, and has only again this mobile phone 10 is connected to this computer 20 through this transmission cable 30, and confirms that its uniqueness just can start this computer 20 and enter normal mode of operation; In addition, can on this mobile phone 10, set up the locking switch (not shown) of this General Purpose Interface 13 of locking, in order to select whether to start this lock function.
The above, only be a specific embodiment of the best of the present invention, but structural attitude of the present invention is not limited thereto, allly anyly is familiar with present technique field person in field of the present invention, can think easily and variation or modification, should all covered in the claim of following this case.

Claims (3)

1. one kind adds the method for lock function with the protection computer in the General Purpose Interface of mobile phone; in this method; be provided with a locked software in order to the locking General Purpose Interface in one mobile phone, be equipped with one in order to drive the driver of this locked software in a computer, this method comprises following steps:
At first, this computer detects this mobile phone and has been connected on it;
This computer inspection and when judging locked software function in this mobile phone and having opened promptly sends a random data to this mobile phone, preserves this random data simultaneously;
Then, this mobile phone is stored to this random data in one reservoir of its inside, and the position data that returns this storage location is simultaneously given this computer;
This computer can store the position data of relevant this storage location after receiving the position data of this passback;
This computer cuts off and being connected of this mobile phone then, and shows that a prompting frame is inquired and whether lock this computer;
When need selecting, this computer enters protected mode.
2. the method that adds lock function with the protection computer in the General Purpose Interface of mobile phone as claimed in claim 1 is characterized in that, when this computer under protected mode, this method also comprises following steps:
At first, this computer detects this mobile phone and has been connected on it;
This computer inspection and when judging locked software function in this mobile phone and having opened promptly sends the position data that stores within it to this mobile phone;
Then, this mobile phone is searched the location conten data that put in place within it according to this position data, and these location conten data are sent to this computer;
This computer is with received location conten data and preserve within it data and compare out when consistent, promptly demonstrates a password box, and when to judge a cryptographic check be correct, promptly recovers the duty of this computer.
3. the method that adds lock function with the protection computer in the General Purpose Interface of mobile phone as claimed in claim 2 is characterized in that, when this computer in normal operation, cut off with being connected of this mobile phone after, this method also comprises following steps:
At first, this computer detects this mobile phone and has disconnected and its be connected;
This computer inspection and when judging locked software function in this mobile phone and having opened, whether promptly demonstrate prompting frame inquiry needs to lock this computer;
When the information that is received is when needing locking, promptly in this prompting frame, show the multiselect item, and directly lock according to these option contents.
CNB2005100233801A 2005-01-17 2005-01-17 Method for adding locking function into universal interface of mobile phone to protect computer Expired - Fee Related CN100365534C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100233801A CN100365534C (en) 2005-01-17 2005-01-17 Method for adding locking function into universal interface of mobile phone to protect computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100233801A CN100365534C (en) 2005-01-17 2005-01-17 Method for adding locking function into universal interface of mobile phone to protect computer

Publications (2)

Publication Number Publication Date
CN1808324A CN1808324A (en) 2006-07-26
CN100365534C true CN100365534C (en) 2008-01-30

Family

ID=36840257

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100233801A Expired - Fee Related CN100365534C (en) 2005-01-17 2005-01-17 Method for adding locking function into universal interface of mobile phone to protect computer

Country Status (1)

Country Link
CN (1) CN100365534C (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105844741A (en) * 2016-03-17 2016-08-10 苏州八方电机科技有限公司 Locking and unlocking method, locking and unlocking apparatus and authorization method for electric car

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1208876A (en) * 1997-08-19 1999-02-24 英业达股份有限公司 Method for protecting computer system utilizing hand electronic device
US6097385A (en) * 1994-11-15 2000-08-01 Compaq Computer Corporation Computer resource regulation
CN1349197A (en) * 2001-12-04 2002-05-15 上海复旦光华信息科技股份有限公司 IC card-based protecting system for WINDOWS series of computers
CN1376982A (en) * 2001-03-28 2002-10-30 高崧 User ID recognizing system for computer

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6097385A (en) * 1994-11-15 2000-08-01 Compaq Computer Corporation Computer resource regulation
CN1208876A (en) * 1997-08-19 1999-02-24 英业达股份有限公司 Method for protecting computer system utilizing hand electronic device
CN1376982A (en) * 2001-03-28 2002-10-30 高崧 User ID recognizing system for computer
CN1349197A (en) * 2001-12-04 2002-05-15 上海复旦光华信息科技股份有限公司 IC card-based protecting system for WINDOWS series of computers

Also Published As

Publication number Publication date
CN1808324A (en) 2006-07-26

Similar Documents

Publication Publication Date Title
CN101002180B (en) Method and system for coordinating client and host security modules
EP1659818B1 (en) Protecting information stored on a lost or stolen portable terminal by a control device notifying the terminal of a protection instruction
CA2768497C (en) Remote device diagnostic and repair apparatus and methods
CN1656456A (en) Display device and funds transaction device including the display device
US20020073334A1 (en) Method and system for embedded, automated, component-level control of computer systems and other complex systems
JP5117483B2 (en) Method, apparatus, storage medium and removable storage device for pre-boot recovery in a locked computer system
CN102413456A (en) User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
US20190155697A1 (en) Data backup method and terminal
CN106326718A (en) Unlocking method, unlocking device and terminal equipment
CN105577648A (en) Method for obtaining and sending short message identifying code, calculating device and mobile terminal
CN107615294A (en) A kind of identifying code short message display method and mobile terminal
CN105574376A (en) Screen unlocking device, system and method
CN103973437A (en) Method, device and system for acquiring RSA secret key authorization when terminal is locked
CN101414342B (en) Software dog and method for implementing software protection
CN100365534C (en) Method for adding locking function into universal interface of mobile phone to protect computer
CN102833737A (en) Computer to vehicle wireless link
US20040098584A1 (en) Method and system for embedded, automated, component-level control of computer systems and other complex systems
CN103699821B (en) The processing method of stolen terminal and server
CN105791552B (en) A kind of SMS processing method, device and mobile terminal
CN114697007B (en) Key management method, corresponding device and system
CN103092721B (en) Application backing up method, electronic equipment and system
CN106791176A (en) A kind of anti-theft method for mobile terminal, device and mobile terminal
CN103824014A (en) Isolation certificating and monitoring method of USB (universal serial bus) port within local area network
CN101324911A (en) Access protection method and system of computer system internal information with first level verification
GB2294787A (en) Electronic device and method of cloning

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080130

Termination date: 20220117