CN102024101B - Automatic locking electronic equipment of protecting is adopted to prevent the method usurped by people - Google Patents

Automatic locking electronic equipment of protecting is adopted to prevent the method usurped by people Download PDF

Info

Publication number
CN102024101B
CN102024101B CN200910190421.4A CN200910190421A CN102024101B CN 102024101 B CN102024101 B CN 102024101B CN 200910190421 A CN200910190421 A CN 200910190421A CN 102024101 B CN102024101 B CN 102024101B
Authority
CN
China
Prior art keywords
electronic equipment
wireless
recognition device
identity recognition
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200910190421.4A
Other languages
Chinese (zh)
Other versions
CN102024101A (en
Inventor
黄金富
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN200910190421.4A priority Critical patent/CN102024101B/en
Publication of CN102024101A publication Critical patent/CN102024101A/en
Application granted granted Critical
Publication of CN102024101B publication Critical patent/CN102024101B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

A kind ofly automatic locking electronic equipment of protecting is adopted to prevent the method usurped by people, for mobile phone, PDA, computing machine, the electronic equipments such as notebook computer (1), described method uses the wireless identity recognition device (2) that can send identity information as the voucher of electronic equipment (1) validated user, the identity information that watchdog routine supervision wireless identity recognition device (2) sends is set in electronic equipment (1), when watchdog routine does not receive in continuous one period of fixed time (the such as fixed time is 5 seconds) identity information that wireless identity recognition device (2) sends, watchdog routine manipulates this electronic equipment (1) and enters protected state, this electronic equipment (1) is made to suspend response only for the operation that validated user carries out, when watchdog routine receives the identity information sent from wireless identity recognition device (2) again, watchdog routine manipulates this electronic equipment (1) and returns original state from protected state, and the operation that recovery response user carries out.

Description

Automatic locking electronic equipment of protecting is adopted to prevent the method usurped by people
[technical field]
The present invention relates to and a kind ofly adopt automatic locking electronic equipment of protecting to prevent the method usurped by people.
[background technology]
Along with the development of computing machine and electronic technology, adopt the electronic equipment of these technology also more and more universal, such as mobile phone, PDA, notebook computer, desk-top computer etc., become the necessity that a lot of people is in life, some personal informations or the confidential data of user can be stored time a lot of on these electronic equipments, such as mobile phone, PDA etc. can store the telephone directory of user, e-mail etc., such as notebook computer again, desk-top computers etc. may store some coml confidential datas, although can cryptoguard being added on an electronic device limit, only accurate validated user is consulted, but this all will input password before making each operating electronic equipment of validated user, very inconvenient.In addition; the staff of some financial institution, government bodies etc.; often to process some confidential datas; time a lot of, staff is the confidential data gone by computing machine in access database; in order to protect these confidential datas; even if work people is single leave computing machine very short time; all computing machine to be exited listed database; prevent from stealthily being consulted confidential data by people during leaving; to staff get back to computing machine work on time; re-enter password again and login database, the confidential data in ability access database, very inconvenient.
[summary of the invention]
Object of the present invention, be that providing a kind of adopts automatic locking electronic equipment of protecting to prevent the method usurped by people, as long as validated user leaves electronic equipment, electronic equipment will be automatic locking, suspends response only for the operation that validated user carries out.
The object of the present invention is achieved like this, adopt and a kind ofly like this adopt automatic locking electronic equipment of protecting to prevent the method usurped by people, can be used for mobile phone, PDA, computing machine, the electronic equipments such as notebook computer (1), it is characterized in that, described method comprises the validated user voucher of wireless identity recognition device (2) as electronic equipment (1) that use one can send identity information, and be used for the wireless communication apparatus with this wireless identity recognition device (2) communication in the upper setting of electronic equipment (1), and, in electronic equipment (1), watchdog routine is set, this watchdog routine receives and supervises the identity information that wireless identity recognition device (2) sends by wireless communication apparatus, when watchdog routine does not receive in continuous one period of fixed time (the such as fixed time is 5 seconds) effective identity information that wireless identity recognition device (2) sends, watchdog routine manipulates this electronic equipment (1) and enters protected state, this electronic equipment (1) is locked, it is made to suspend response only for the operation that validated user carries out.In addition; described method also comprises after electronic equipment (1) enters protected state; when watchdog routine receives by wireless communication apparatus the effective identity information sent from wireless identity recognition device (2); watchdog routine manipulates this electronic equipment (1) and returns original state from protected state; this electronic equipment (1) is unblanked, makes it recover to respond only for the operation that validated user carries out.
So just achieve object of the present invention.
The automatic locking electronic equipment of protecting of employing of the present invention is used to prevent the method usurped by people, the upper original cryptoguard of electronic equipment (1) can be replaced, as long as validated user carries with wireless identity recognition device (2), just can unrestrictedly operating electronic equipment (1), and when validated user leaves electronic equipment (1), electronic equipment (1) does not receive in continuous one period of fixed time effective identity information that wireless identity recognition device (2) that validated user carries sends with it, electronic equipment (1) will be manipulated immediately lock, it is made to enter protected state, suspend response only for the operational order that validated user carries out, make other people cannot use this electronic equipment (1), thus protection electronic equipment (1) is not usurped by people.
[accompanying drawing explanation]
Fig. 1 is the schematic illustration of the first embodiment of the present invention;
Fig. 2 is the schematic illustration of the second embodiment of the present invention;
Fig. 3 is the schematic illustration of the third embodiment of the present invention;
Fig. 4 is the schematic illustration of the fourth embodiment of the present invention;
Fig. 5 is the schematic illustration of the fifth embodiment of the present invention;
Fig. 6 is the schematic illustration of the sixth embodiment of the present invention;
Fig. 7 is the schematic illustration of the seventh embodiment of the present invention;
Fig. 8 is the schematic illustration of the eighth embodiment of the present invention;
Fig. 9 is the schematic illustration of the ninth embodiment of the present invention;
Figure 10 is the schematic illustration of the tenth embodiment of the present invention.
In figure, the device that identical digitized representation is identical, component devices, the straight line of method step band numeral and arrow marked.Accompanying drawing is schematic, by principal character to illustrate the method for the present invention.
[embodiment]
Below in conjunction with accompanying drawing, method of the present invention is described in further detail.
Consult Fig. 1, Fig. 1 is the schematic illustration of the first embodiment of the present invention, electronic equipment (1) and wireless identity recognition device (2) is included shown in Fig. 1, wherein, wireless identity recognition device (2) is as the validated user voucher of electronic equipment (1), electronic equipment (1) is provided with for the wireless communication apparatus with this wireless identity recognition device (2) communication, wireless identity recognition device stores identity information in (2), by radio signal, this identity information outwards can be sent, and, in electronic equipment (1), watchdog routine is set, this watchdog routine receives and supervises the identity information that wireless identity recognition device (2) sends by wireless communication apparatus, when watchdog routine does not receive in continuous one period of fixed time (the such as fixed time is 5 seconds) effective identity information that wireless identity recognition device (2) sends, watchdog routine manipulates this electronic equipment (1) and enters protected state, this electronic equipment (1) is locked, it is made to suspend response only for the operation that validated user carries out, such as by manipulations electronic equipment (1) such as slide-mouse keyboards, data stored by electronic equipment (1) etc. is consulted by display screen.In addition; after electronic equipment (1) enters protected state; when watchdog routine receives by wireless communication apparatus the effective identity information sent from wireless identity recognition device (2) again; watchdog routine manipulates this electronic equipment (1) and returns original state from protected state; this electronic equipment (1) is unblanked, makes it recover to respond only for the operation that validated user carries out.
In arranging, the identity information for certification validated user identity is stored in wireless identity recognition device (2), and this identity information and electronic equipment (1) are matched, electronic equipment (1) receives the identity information of this pairing, just can confirm the identity of validated user, allow validated user use this electronic equipment (1).In a first embodiment, wireless-identification device (2) can adopt RFID tag (RadioFrequencyIdentification, be called for short RFID), comprise the RFID tag of RFID tag with battery and not charged, and the wireless communication apparatus on electronic equipment (1) can adopt RFID tag reader, the effective reading distance of this RFID tag and RFID tag reader can not be too short, can not be oversize, optimal effective reading distance is 1 to 3 meter.As long as such validated user carries with this RFID tag; just can use electronic equipment (1); when validated user leaves beyond electronic equipment (1) distance 3 meters; electronic equipment (1) reads less than the identity information in RFID tag; just can enter protected state immediately; electronic equipment (1) is locked; and suspending the operational order of response from input media input, protection electronic equipment (1) can not be usurped by other people.In addition; described wireless-identification device (2) also can adopt contact type intelligent card; described wireless communication apparatus then can adopt wireless smart card reader, and all can realize object of the present invention well, be all belong to protection scope of the present invention.
Consult Fig. 2 to Fig. 5, Fig. 2 is the schematic illustration of the second embodiment of the present invention, Fig. 3 is the schematic illustration of the third embodiment of the present invention, Fig. 4 is the schematic illustration of the fourth embodiment of the present invention, Fig. 5 is the schematic illustration of the fifth embodiment of the present invention, of different embodiments of the invention shown in Fig. 2 to Fig. 5.In the second embodiment compared with the first embodiment, difference is that the electronic equipment (1) of the second embodiment is mobile phone; In the third embodiment, electronic equipment (1) is computing machine, comprise desk-top computer and notebook computer, and wireless-identification device (2) is mobile phone; In the fourth embodiment, electronic equipment (1) is same with the 3rd embodiment is computing machine, but wireless-identification device (2) adopts wireless headset; In the 5th embodiment, electronic equipment (1) is mobile phone, and wireless-identification device (2) adopts wireless headset; In addition, in the third embodiment, personal digital assistant (PersonalDigitalAssistant can be adopted, be called for short PDA) as wireless-identification device (2), and in the 5th embodiment, personal digital assistant can be adopted as electronic equipment (1), all can realize object of the present invention well.Continue to consult Fig. 1 to Fig. 5; shown in Fig. 1 to Fig. 5 first is in the 5th embodiment; electronic equipment (1) can be that notebook computer, desk-top computer, mobile phone, personal digital assistant etc. need protection only for the equipment of validated user, and wireless-identification device (2) device that can be RFID tag, wireless headset, mobile phone, personal digital assistant etc. can facilitate validated user carries with.
Consult Fig. 6, Fig. 6 is the schematic illustration of the sixth embodiment of the present invention, in the 6th embodiment shown in Fig. 6, electronic equipment (1) is computing machine, comprise desk-top computer and notebook computer, and wireless-identification device (2) is wireless headset, in addition, mobile phone (3) is also show in Fig. 6, this mobile phone (3) is the dual role of simultaneously serving as wireless-identification device (2) and electronic equipment (1) in the present embodiment, wherein, between mobile phone (3) and electronic equipment (1), the role of wireless-identification device (2) served as by mobile phone (3), and between mobile phone (3) and wireless-identification device (2), the role of electronic equipment (1) served as by mobile phone (3).As long as the advantage of the present embodiment is validated user carried with wireless headset, computing machine and mobile phone (3) just can be prevented by people's illegal use simultaneously, and more when wireless headset does not have electricity, the wireless-identification device (2) of the validated user identity documents as this computing machine of operation can be served as using mobile phone (3).
Continue to consult Fig. 1 to Fig. 6, in each embodiment shown in Fig. 1 to Fig. 6, adopt wireless communication mode communication between electronic equipment (1) and wireless-identification device (2), the communication device of different size standard can be adopted to realize the communication between them, comprise and adopt following any one wherein to realize the communication between them:
◆ the wireless communication apparatus in described electronic equipment (1) is blue-tooth device, and described wireless-identification device (2) is provided with the blue-tooth device communicated with described wireless communication apparatus.
◆ the wireless communication apparatus in described electronic equipment (1) is WiFi device, and described wireless-identification device (2) is provided with the WiFi device communicated with described wireless communication apparatus.
◆ the wireless communication apparatus in described electronic equipment (1) is WAPI device, and described wireless-identification device (2) is provided with the WAPI device communicated with described wireless communication apparatus.
Of the present inventionly further to improve, increase electronic equipment (1) function that prevents loss, the method realizing this improvement comprises electronic equipment (1) and sends identifying information by wireless communication apparatus to wireless identity recognition device (2), when described wireless identity recognition device (2) does not receive the identifying information that described electronic equipment (1) sends, wireless identity recognition device (2) can send information, and this wireless identity recognition device (2) of prompting user can not receive the information of electronic equipment (1).As long as such user carries with wireless identity recognition device (2), when user leaves electronic equipment (1), wireless identity recognition device (2) will send information to user immediately, and prompting user does not leave behind electronic equipment (1) to avoid losing.
Consult Fig. 7 to Figure 10, Fig. 7 is the schematic illustration of the seventh embodiment of the present invention, Fig. 8 is the schematic illustration of the eighth embodiment of the present invention, Fig. 9 is the schematic illustration of the ninth embodiment of the present invention, Figure 10 is the schematic illustration of the tenth embodiment of the present invention, each embodiment shown in Fig. 7 to Figure 10 is the improvement adopting PKI key to carry out reinforcing security, the method adopted comprises the identity information that transmits between use a pair PKI double secret key electronic equipment (1) and wireless identity recognition device (2) and identifying information encrypts and decrypts, wherein, wireless identity recognition device (2) is provided with this wherein PKI key to PKI key, and electronic equipment (1) is provided with another corresponding PKI key, and, the information sending electronic equipment (1) to is encrypted rear ability transmission by its PKI key by wireless identity recognition device (2), and by its PKI key, the information received is decrypted, and, the information sending wireless identity recognition device (2) to is encrypted rear ability transmission by its PKI key by electronic equipment (1), and by its PKI key, the information received is decrypted.
Continue to consult Fig. 7, illustrated and comprise following A group step in Fig. 7, be the step being initiated certification both sides identity by wireless identity recognition device (2), concrete A group step is as follows:
A1. wireless identity recognition device (2) at random produces a random number, with its PKI key by the identity information of wireless identity recognition device (2) together with sending electronic equipment (1) after random number encryption to;
A2. the decrypts information received is restored identity information and random number with its PKI key by electronic equipment (1), then passes random number and identity information back wireless identity recognition device (2) together with after the identifying information encryption of electronic equipment (1) with its PKI key;
A3. the decrypts information sent back to be restored identity information and random number and identifying information with its PKI key by wireless identity recognition device (2), check random number errorless after, just confirm the identity of electronic equipment (1), then produce a new random number at random, then send identity information to electronic equipment (1) together with after the random number newly produced and identifying information encryption with its PKI key;
A4. the decrypts information received to be restored identity information and random number and identifying information with its PKI key by electronic equipment (1), check identity information and identifying information errorless after, just confirm the identity of wireless identity recognition device (2);
Electronic equipment (1) passes random number and identity information back wireless identity recognition device (2) together with after the identifying information encryption of electronic equipment (1) with its PKI key, then forwards steps A 3 to.
Continue to consult Fig. 8, illustrated in Fig. 8 and comprised following B group step, compared with the embodiment of Fig. 7, main difference part is in the embodiment of Fig. 8, and be the step being initiated certification both sides identity by electronic equipment (1), concrete B group step is as follows:
B1. electronic equipment (1) at random produces a random number, with its PKI key by the identifying information of electronic equipment (1) together with sending wireless identity recognition device (2) after random number encryption to;
B2. the decrypts information received is restored identifying information and random number with its PKI key by wireless identity recognition device (2), then passes random number and identifying information back radio-based electronic devices (1) together with after the identity information encryption of wireless identity recognition device (2) with its PKI key;
B3. the decrypts information sent back to be restored identifying information and random number and identity information with its PKI key by electronic equipment (1), check random number errorless after, just confirm the identity of wireless identity recognition device (2), then produce a new random number at random, then send identifying information to wireless identity recognition device (2) together with after the random number newly produced and identity information encryption with its PKI key;
B4. the decrypts information received to be restored identifying information and random number and identity information with its PKI key by wireless identity recognition device (2), check identifying information and identity information errorless after, just confirm the identity of electronic equipment (1);
Wireless identity recognition device (2) passes random number and identifying information back electronic equipment (1) together with after the identity information encryption of wireless identity recognition device (2) with its PKI key, then forwards step B3 to.
Continue to consult Fig. 9, illustrate in Fig. 9 and comprised following C group step, compared with the embodiment of Fig. 8, main difference part is in the embodiment of Fig. 9, the random number that electronic equipment (1) and wireless identity recognition device (2) produce oneself separately carries out authenticating step, and concrete C group step is as follows:
C1. electronic equipment (1) produces a random number first at random, sends the identifying information of electronic equipment (1) to wireless identity recognition device (2) with its PKI key together with after the encryption of random number first;
C2. the decrypts information received is restored identifying information and random number first with its PKI key by wireless identity recognition device (2), and random produce a random number second, then wireless identity recognition device (2) passes random number first and identifying information back electronic equipment (1) together with after the identity information of wireless identity recognition device (2) and the encryption of random number second with its PKI key;
C3. the decrypts information sent back to be restored identifying information and random number first and identity information and random number second with its PKI key by electronic equipment (1), check random number first errorless after, just confirm the identity of wireless identity recognition device (2), then produce a new random number first at random, then send identifying information to wireless identity recognition device (2) together with after the random number first newly produced and identity information and the encryption of random number second with its PKI key;
C4. the decrypts information received to restore with its PKI key and identifies part information and random number first and identity information and random number second by wireless identity recognition device (2), check identifying information and identity information and random number second errorless after, just confirm the identity of electronic equipment (1);
Wireless identity recognition device (2) produces a new random number second at random, then pass random number first and identifying information back electronic equipment (1) together with after the identity information of wireless identity recognition device (2) and the encryption of random number second with its PKI key, then forward step C3 to.
Continue to consult Figure 10, illustrated in Figure 10 and comprised following D group step, compared with the embodiment of Fig. 9, main difference part is in the embodiment of Figure 10, be the step being initiated certification both sides identity by wireless identity recognition device (2), concrete D group step is as follows:
D1. wireless identity recognition device (2) produces a random number first at random, sends the identity information of wireless identity recognition device (2) to electronic equipment (1) with its PKI key together with after the encryption of random number first;
D2. the decrypts information received is restored identity information and random number first with its PKI key by electronic equipment (1), and random produce a random number second, then electronic equipment (1) passes random number first and identity information back wireless identity recognition device (2) together with after the identifying information of electronic equipment (1) and the encryption of random number second with its PKI key;
D3. the decrypts information sent back to be restored identity information and random number first and identifying information and random number second with its PKI key by wireless identity recognition device (2), check random number first errorless after, just confirm the identity of electronic equipment (1), then produce a new random number first at random, then send identity information to electronic equipment (1) together with after the random number first newly produced and identifying information and the encryption of random number second with its PKI key;
D4. the decrypts information received to be restored identity part information and random number first and identifying information and random number second with its PKI key by electronic equipment (1), check identity information and identifying information and random number second errorless after, just confirm the identity of wireless identity recognition device (2);
Electronic equipment (1) produces a new random number second at random, then pass random number first and identity information back wireless identity recognition device (2) together with after the identifying information of electronic equipment (1) and the encryption of random number second with its PKI key, then forward step D3 to.
Below described feature of the present invention in detail, although the present invention is illustrated with the above embodiments, the present invention is not limited to this, when not leaving the scope of spirit of the present invention and appended claims, can do multiple change and change.
The automatic locking electronic equipment of protecting of employing of the present invention prevents the method usurped by people, can prevent electronic equipment (1) from being usurped by people, as long as validated user carries with wireless identity recognition device (2), just can unrestrictedly operating electronic equipment as usual (1), as long as validated user leaves electronic equipment (1), electronic equipment (1) will be locked immediately and be entered protected state, make other people cannot use this electronic equipment (1), until validated user to get back to electronic equipment (1) front, electronic equipment (1) will recover original state immediately, validated user again can unrestrictedly operating electronic equipment as usual (1).In addition, when validated user leaves electronic equipment (1), wireless identity recognition device (2) more can send information, and prompting user does not leave behind electronic equipment (1) to avoid losing.

Claims (8)

1. one kind adopts automatic locking electronic equipment of protecting to prevent the method usurped by people, it is characterized in that, described method comprises the validated user voucher of wireless identity recognition device (2) as electronic equipment (1) that use one can send identity information, and be used for the wireless communication apparatus with this wireless identity recognition device (2) communication in the upper setting of electronic equipment (1), and, in electronic equipment (1), watchdog routine is set, this watchdog routine receives and supervises the identity information that wireless identity recognition device (2) sends by wireless communication apparatus, when watchdog routine does not receive in continuous one period of fixed time effective identity information that wireless identity recognition device (2) sends, watchdog routine manipulates this electronic equipment (1) and enters protected state, it is made to suspend response only for the operation that validated user carries out, and, described method also comprises after electronic equipment (1) enters protected state, when watchdog routine receives by wireless communication apparatus the effective identity information sent from wireless identity recognition device (2), watchdog routine manipulates this electronic equipment (1) and returns original state from protected state, it is made to recover to respond only for the operation that validated user carries out, and, described method also comprises electronic equipment (1) and sends identifying information by wireless communication apparatus to wireless identity recognition device (2), when described wireless identity recognition device (2) does not receive the identifying information that described electronic equipment (1) sends, wireless identity recognition device (2) can send information, this wireless identity recognition device (2) of prompting user can not receive the information of electronic equipment (1).
2. the automatic locking electronic equipment of protecting of employing as claimed in claim 1 prevents the method usurped by people; it is characterized in that; described wireless-identification device (2) is RFID tag, and described wireless communication apparatus is RFID tag reader.
3. the automatic locking electronic equipment of protecting of employing as claimed in claim 1 prevents the method usurped by people; it is characterized in that; described wireless-identification device (2) is contact type intelligent card, and described wireless communication apparatus is wireless smart card reader.
4. the automatic locking electronic equipment of protecting of employing as claimed in claim 1 prevents the method usurped by people; it is characterized in that; described electronic equipment (1) is computing machine; comprise desk-top computer and notebook computer; and described wireless-identification device (2) is mobile phone or wireless headset or personal digital assistant.
5. the automatic locking electronic equipment of protecting of employing as claimed in claim 4 prevents the method usurped by people; it is characterized in that; wireless communication apparatus in described electronic equipment (1) is blue-tooth device, and described wireless-identification device (2) is provided with the blue-tooth device communicated with described wireless communication apparatus.
6. the automatic locking electronic equipment of protecting of employing as claimed in claim 4 prevents the method usurped by people; it is characterized in that; wireless communication apparatus in described electronic equipment (1) is WiFi device, and described wireless-identification device (2) is provided with the WiFi device communicated with described wireless communication apparatus.
7. the automatic locking electronic equipment of protecting of employing as claimed in claim 4 prevents the method usurped by people; it is characterized in that; wireless communication apparatus in described electronic equipment (1) is WAPI device, and described wireless-identification device (2) is provided with the WAPI device communicated with described wireless communication apparatus.
8. the automatic locking electronic equipment of protecting of the employing as described in any one of claim 1 to 7 prevents the method usurped by people, it is characterized in that, described method also comprises the identity information that transmits between use a pair PKI double secret key electronic equipment (1) and wireless identity recognition device (2) and identifying information encrypts and decrypts, wherein, wireless identity recognition device (2) is provided with this wherein PKI key to PKI key, and electronic equipment (1) is provided with another corresponding PKI key, and, the information sending electronic equipment (1) to is encrypted rear ability transmission by its PKI key by wireless identity recognition device (2), and by its PKI key, the information received is decrypted, and, the information sending wireless identity recognition device (2) to is encrypted rear ability transmission by its PKI key by electronic equipment (1), and by its PKI key, the information received is decrypted.
CN200910190421.4A 2009-09-17 2009-09-17 Automatic locking electronic equipment of protecting is adopted to prevent the method usurped by people Expired - Fee Related CN102024101B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910190421.4A CN102024101B (en) 2009-09-17 2009-09-17 Automatic locking electronic equipment of protecting is adopted to prevent the method usurped by people

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910190421.4A CN102024101B (en) 2009-09-17 2009-09-17 Automatic locking electronic equipment of protecting is adopted to prevent the method usurped by people

Publications (2)

Publication Number Publication Date
CN102024101A CN102024101A (en) 2011-04-20
CN102024101B true CN102024101B (en) 2016-02-03

Family

ID=43865388

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910190421.4A Expired - Fee Related CN102024101B (en) 2009-09-17 2009-09-17 Automatic locking electronic equipment of protecting is adopted to prevent the method usurped by people

Country Status (1)

Country Link
CN (1) CN102024101B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102982267A (en) * 2012-11-06 2013-03-20 周万荣 Safety protection method and system and terminal
CN103942480A (en) * 2014-04-14 2014-07-23 惠州Tcl移动通信有限公司 Method and system for achieving mobile terminal screen unlocking through matching of retina information

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2164081Y (en) * 1993-09-29 1994-05-04 三全电子有限公司 Loss-proof theft alarm for boxes and bags
CN1624709A (en) * 2004-12-21 2005-06-08 上海中策工贸有限公司 Mobile phone earphone with read-write device
CN101188645A (en) * 2006-11-17 2008-05-28 英华达(上海)电子有限公司 Theft-prevention alarming device and method for handheld device
CN201281885Y (en) * 2008-09-24 2009-07-29 徐浩铭 Mobile phone anti-theft device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6992585B2 (en) * 2001-10-02 2006-01-31 Rameez Saleh Security system incorporating a single modular unit motion sensor

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2164081Y (en) * 1993-09-29 1994-05-04 三全电子有限公司 Loss-proof theft alarm for boxes and bags
CN1624709A (en) * 2004-12-21 2005-06-08 上海中策工贸有限公司 Mobile phone earphone with read-write device
CN101188645A (en) * 2006-11-17 2008-05-28 英华达(上海)电子有限公司 Theft-prevention alarming device and method for handheld device
CN201281885Y (en) * 2008-09-24 2009-07-29 徐浩铭 Mobile phone anti-theft device

Also Published As

Publication number Publication date
CN102024101A (en) 2011-04-20

Similar Documents

Publication Publication Date Title
CN109472166B (en) Electronic signature method, device, equipment and medium
CN101465019B (en) Method and system for implementing network authentication
US8213902B2 (en) Smart card accessible over a personal area network
EP2770702B1 (en) Mobile phone and communication method thereof
EP2290873B1 (en) Protocol for protecting content protection data
US20130009756A1 (en) Verification using near field communications
CN102315942A (en) Security terminal with Bluetooth and communication method thereof of security terminal and client end
CN103826221A (en) Bluetooth based encryption communication method, and correlation systems and methods
CN104299300B (en) The unblanking and close locking method of safety intelligent lock system based on NFC
AU2019204724B2 (en) Cryptography chip with identity verification
CN103853672A (en) Mobile secure storage equipment with multiple data protection functions
WO2013123453A1 (en) Data storage devices, systems, and methods
CN103488920A (en) Implementation method and system of wireless information safety device
CN103632081A (en) Encrypted storage device and authentication system and authentication method thereof
CN103838988A (en) Information security protection method and device
US9325670B2 (en) Communication information transmitting process and system
JP2007041954A (en) Value information movement system and value information moving method
CN105631298B (en) A kind of ciphering and deciphering device and method
CN204069000U (en) Mobile encrypted authenticate device
CN101859453A (en) Smart card loss reporting method based on short message service and system
CN102024101B (en) Automatic locking electronic equipment of protecting is adopted to prevent the method usurped by people
CN101415185A (en) Mobile terminal, method and system for keeping secret of platform-striding information
CN103186805A (en) Smart card and signature authentication method based on smart card
CN101980309A (en) NFC mobile terminal and method for realizing NFC secure payment thereof
CN201974884U (en) Vehicle-mounted system

Legal Events

Date Code Title Description
C57 Notification of unclear or unknown address
DD01 Delivery of document by public notice

Addressee: Huang Jinfu

Document name: Notification of Passing Preliminary Examination of the Application for Invention

C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent for invention or patent application
CB02 Change of applicant information

Address after: The International Chamber of Commerce building, No. 2 Beijing 100035 Xicheng District huapichang alley 16

Applicant after: Huang Jinfu

Address before: 518026, room 27, floor 2705, golden central business building, 3037 Jintian Road, Shenzhen, Guangdong, Futian District

Applicant before: Huang Jinfu

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160203

Termination date: 20160917