[embodiment]
Below in conjunction with accompanying drawing, method of the present invention is described in further detail.
Consult Fig. 1, Fig. 1 is the schematic illustration of the first embodiment of the present invention, electronic equipment (1) and wireless identity recognition device (2) is included shown in Fig. 1, wherein, wireless identity recognition device (2) is as the validated user voucher of electronic equipment (1), electronic equipment (1) is provided with for the wireless communication apparatus with this wireless identity recognition device (2) communication, wireless identity recognition device stores identity information in (2), by radio signal, this identity information outwards can be sent, and, in electronic equipment (1), watchdog routine is set, this watchdog routine receives and supervises the identity information that wireless identity recognition device (2) sends by wireless communication apparatus, when watchdog routine does not receive in continuous one period of fixed time (the such as fixed time is 5 seconds) effective identity information that wireless identity recognition device (2) sends, watchdog routine manipulates this electronic equipment (1) and enters protected state, this electronic equipment (1) is locked, it is made to suspend response only for the operation that validated user carries out, such as by manipulations electronic equipment (1) such as slide-mouse keyboards, data stored by electronic equipment (1) etc. is consulted by display screen.In addition; after electronic equipment (1) enters protected state; when watchdog routine receives by wireless communication apparatus the effective identity information sent from wireless identity recognition device (2) again; watchdog routine manipulates this electronic equipment (1) and returns original state from protected state; this electronic equipment (1) is unblanked, makes it recover to respond only for the operation that validated user carries out.
In arranging, the identity information for certification validated user identity is stored in wireless identity recognition device (2), and this identity information and electronic equipment (1) are matched, electronic equipment (1) receives the identity information of this pairing, just can confirm the identity of validated user, allow validated user use this electronic equipment (1).In a first embodiment, wireless-identification device (2) can adopt RFID tag (RadioFrequencyIdentification, be called for short RFID), comprise the RFID tag of RFID tag with battery and not charged, and the wireless communication apparatus on electronic equipment (1) can adopt RFID tag reader, the effective reading distance of this RFID tag and RFID tag reader can not be too short, can not be oversize, optimal effective reading distance is 1 to 3 meter.As long as such validated user carries with this RFID tag; just can use electronic equipment (1); when validated user leaves beyond electronic equipment (1) distance 3 meters; electronic equipment (1) reads less than the identity information in RFID tag; just can enter protected state immediately; electronic equipment (1) is locked; and suspending the operational order of response from input media input, protection electronic equipment (1) can not be usurped by other people.In addition; described wireless-identification device (2) also can adopt contact type intelligent card; described wireless communication apparatus then can adopt wireless smart card reader, and all can realize object of the present invention well, be all belong to protection scope of the present invention.
Consult Fig. 2 to Fig. 5, Fig. 2 is the schematic illustration of the second embodiment of the present invention, Fig. 3 is the schematic illustration of the third embodiment of the present invention, Fig. 4 is the schematic illustration of the fourth embodiment of the present invention, Fig. 5 is the schematic illustration of the fifth embodiment of the present invention, of different embodiments of the invention shown in Fig. 2 to Fig. 5.In the second embodiment compared with the first embodiment, difference is that the electronic equipment (1) of the second embodiment is mobile phone; In the third embodiment, electronic equipment (1) is computing machine, comprise desk-top computer and notebook computer, and wireless-identification device (2) is mobile phone; In the fourth embodiment, electronic equipment (1) is same with the 3rd embodiment is computing machine, but wireless-identification device (2) adopts wireless headset; In the 5th embodiment, electronic equipment (1) is mobile phone, and wireless-identification device (2) adopts wireless headset; In addition, in the third embodiment, personal digital assistant (PersonalDigitalAssistant can be adopted, be called for short PDA) as wireless-identification device (2), and in the 5th embodiment, personal digital assistant can be adopted as electronic equipment (1), all can realize object of the present invention well.Continue to consult Fig. 1 to Fig. 5; shown in Fig. 1 to Fig. 5 first is in the 5th embodiment; electronic equipment (1) can be that notebook computer, desk-top computer, mobile phone, personal digital assistant etc. need protection only for the equipment of validated user, and wireless-identification device (2) device that can be RFID tag, wireless headset, mobile phone, personal digital assistant etc. can facilitate validated user carries with.
Consult Fig. 6, Fig. 6 is the schematic illustration of the sixth embodiment of the present invention, in the 6th embodiment shown in Fig. 6, electronic equipment (1) is computing machine, comprise desk-top computer and notebook computer, and wireless-identification device (2) is wireless headset, in addition, mobile phone (3) is also show in Fig. 6, this mobile phone (3) is the dual role of simultaneously serving as wireless-identification device (2) and electronic equipment (1) in the present embodiment, wherein, between mobile phone (3) and electronic equipment (1), the role of wireless-identification device (2) served as by mobile phone (3), and between mobile phone (3) and wireless-identification device (2), the role of electronic equipment (1) served as by mobile phone (3).As long as the advantage of the present embodiment is validated user carried with wireless headset, computing machine and mobile phone (3) just can be prevented by people's illegal use simultaneously, and more when wireless headset does not have electricity, the wireless-identification device (2) of the validated user identity documents as this computing machine of operation can be served as using mobile phone (3).
Continue to consult Fig. 1 to Fig. 6, in each embodiment shown in Fig. 1 to Fig. 6, adopt wireless communication mode communication between electronic equipment (1) and wireless-identification device (2), the communication device of different size standard can be adopted to realize the communication between them, comprise and adopt following any one wherein to realize the communication between them:
◆ the wireless communication apparatus in described electronic equipment (1) is blue-tooth device, and described wireless-identification device (2) is provided with the blue-tooth device communicated with described wireless communication apparatus.
◆ the wireless communication apparatus in described electronic equipment (1) is WiFi device, and described wireless-identification device (2) is provided with the WiFi device communicated with described wireless communication apparatus.
◆ the wireless communication apparatus in described electronic equipment (1) is WAPI device, and described wireless-identification device (2) is provided with the WAPI device communicated with described wireless communication apparatus.
Of the present inventionly further to improve, increase electronic equipment (1) function that prevents loss, the method realizing this improvement comprises electronic equipment (1) and sends identifying information by wireless communication apparatus to wireless identity recognition device (2), when described wireless identity recognition device (2) does not receive the identifying information that described electronic equipment (1) sends, wireless identity recognition device (2) can send information, and this wireless identity recognition device (2) of prompting user can not receive the information of electronic equipment (1).As long as such user carries with wireless identity recognition device (2), when user leaves electronic equipment (1), wireless identity recognition device (2) will send information to user immediately, and prompting user does not leave behind electronic equipment (1) to avoid losing.
Consult Fig. 7 to Figure 10, Fig. 7 is the schematic illustration of the seventh embodiment of the present invention, Fig. 8 is the schematic illustration of the eighth embodiment of the present invention, Fig. 9 is the schematic illustration of the ninth embodiment of the present invention, Figure 10 is the schematic illustration of the tenth embodiment of the present invention, each embodiment shown in Fig. 7 to Figure 10 is the improvement adopting PKI key to carry out reinforcing security, the method adopted comprises the identity information that transmits between use a pair PKI double secret key electronic equipment (1) and wireless identity recognition device (2) and identifying information encrypts and decrypts, wherein, wireless identity recognition device (2) is provided with this wherein PKI key to PKI key, and electronic equipment (1) is provided with another corresponding PKI key, and, the information sending electronic equipment (1) to is encrypted rear ability transmission by its PKI key by wireless identity recognition device (2), and by its PKI key, the information received is decrypted, and, the information sending wireless identity recognition device (2) to is encrypted rear ability transmission by its PKI key by electronic equipment (1), and by its PKI key, the information received is decrypted.
Continue to consult Fig. 7, illustrated and comprise following A group step in Fig. 7, be the step being initiated certification both sides identity by wireless identity recognition device (2), concrete A group step is as follows:
A1. wireless identity recognition device (2) at random produces a random number, with its PKI key by the identity information of wireless identity recognition device (2) together with sending electronic equipment (1) after random number encryption to;
A2. the decrypts information received is restored identity information and random number with its PKI key by electronic equipment (1), then passes random number and identity information back wireless identity recognition device (2) together with after the identifying information encryption of electronic equipment (1) with its PKI key;
A3. the decrypts information sent back to be restored identity information and random number and identifying information with its PKI key by wireless identity recognition device (2), check random number errorless after, just confirm the identity of electronic equipment (1), then produce a new random number at random, then send identity information to electronic equipment (1) together with after the random number newly produced and identifying information encryption with its PKI key;
A4. the decrypts information received to be restored identity information and random number and identifying information with its PKI key by electronic equipment (1), check identity information and identifying information errorless after, just confirm the identity of wireless identity recognition device (2);
Electronic equipment (1) passes random number and identity information back wireless identity recognition device (2) together with after the identifying information encryption of electronic equipment (1) with its PKI key, then forwards steps A 3 to.
Continue to consult Fig. 8, illustrated in Fig. 8 and comprised following B group step, compared with the embodiment of Fig. 7, main difference part is in the embodiment of Fig. 8, and be the step being initiated certification both sides identity by electronic equipment (1), concrete B group step is as follows:
B1. electronic equipment (1) at random produces a random number, with its PKI key by the identifying information of electronic equipment (1) together with sending wireless identity recognition device (2) after random number encryption to;
B2. the decrypts information received is restored identifying information and random number with its PKI key by wireless identity recognition device (2), then passes random number and identifying information back radio-based electronic devices (1) together with after the identity information encryption of wireless identity recognition device (2) with its PKI key;
B3. the decrypts information sent back to be restored identifying information and random number and identity information with its PKI key by electronic equipment (1), check random number errorless after, just confirm the identity of wireless identity recognition device (2), then produce a new random number at random, then send identifying information to wireless identity recognition device (2) together with after the random number newly produced and identity information encryption with its PKI key;
B4. the decrypts information received to be restored identifying information and random number and identity information with its PKI key by wireless identity recognition device (2), check identifying information and identity information errorless after, just confirm the identity of electronic equipment (1);
Wireless identity recognition device (2) passes random number and identifying information back electronic equipment (1) together with after the identity information encryption of wireless identity recognition device (2) with its PKI key, then forwards step B3 to.
Continue to consult Fig. 9, illustrate in Fig. 9 and comprised following C group step, compared with the embodiment of Fig. 8, main difference part is in the embodiment of Fig. 9, the random number that electronic equipment (1) and wireless identity recognition device (2) produce oneself separately carries out authenticating step, and concrete C group step is as follows:
C1. electronic equipment (1) produces a random number first at random, sends the identifying information of electronic equipment (1) to wireless identity recognition device (2) with its PKI key together with after the encryption of random number first;
C2. the decrypts information received is restored identifying information and random number first with its PKI key by wireless identity recognition device (2), and random produce a random number second, then wireless identity recognition device (2) passes random number first and identifying information back electronic equipment (1) together with after the identity information of wireless identity recognition device (2) and the encryption of random number second with its PKI key;
C3. the decrypts information sent back to be restored identifying information and random number first and identity information and random number second with its PKI key by electronic equipment (1), check random number first errorless after, just confirm the identity of wireless identity recognition device (2), then produce a new random number first at random, then send identifying information to wireless identity recognition device (2) together with after the random number first newly produced and identity information and the encryption of random number second with its PKI key;
C4. the decrypts information received to restore with its PKI key and identifies part information and random number first and identity information and random number second by wireless identity recognition device (2), check identifying information and identity information and random number second errorless after, just confirm the identity of electronic equipment (1);
Wireless identity recognition device (2) produces a new random number second at random, then pass random number first and identifying information back electronic equipment (1) together with after the identity information of wireless identity recognition device (2) and the encryption of random number second with its PKI key, then forward step C3 to.
Continue to consult Figure 10, illustrated in Figure 10 and comprised following D group step, compared with the embodiment of Fig. 9, main difference part is in the embodiment of Figure 10, be the step being initiated certification both sides identity by wireless identity recognition device (2), concrete D group step is as follows:
D1. wireless identity recognition device (2) produces a random number first at random, sends the identity information of wireless identity recognition device (2) to electronic equipment (1) with its PKI key together with after the encryption of random number first;
D2. the decrypts information received is restored identity information and random number first with its PKI key by electronic equipment (1), and random produce a random number second, then electronic equipment (1) passes random number first and identity information back wireless identity recognition device (2) together with after the identifying information of electronic equipment (1) and the encryption of random number second with its PKI key;
D3. the decrypts information sent back to be restored identity information and random number first and identifying information and random number second with its PKI key by wireless identity recognition device (2), check random number first errorless after, just confirm the identity of electronic equipment (1), then produce a new random number first at random, then send identity information to electronic equipment (1) together with after the random number first newly produced and identifying information and the encryption of random number second with its PKI key;
D4. the decrypts information received to be restored identity part information and random number first and identifying information and random number second with its PKI key by electronic equipment (1), check identity information and identifying information and random number second errorless after, just confirm the identity of wireless identity recognition device (2);
Electronic equipment (1) produces a new random number second at random, then pass random number first and identity information back wireless identity recognition device (2) together with after the identifying information of electronic equipment (1) and the encryption of random number second with its PKI key, then forward step D3 to.
Below described feature of the present invention in detail, although the present invention is illustrated with the above embodiments, the present invention is not limited to this, when not leaving the scope of spirit of the present invention and appended claims, can do multiple change and change.
The automatic locking electronic equipment of protecting of employing of the present invention prevents the method usurped by people, can prevent electronic equipment (1) from being usurped by people, as long as validated user carries with wireless identity recognition device (2), just can unrestrictedly operating electronic equipment as usual (1), as long as validated user leaves electronic equipment (1), electronic equipment (1) will be locked immediately and be entered protected state, make other people cannot use this electronic equipment (1), until validated user to get back to electronic equipment (1) front, electronic equipment (1) will recover original state immediately, validated user again can unrestrictedly operating electronic equipment as usual (1).In addition, when validated user leaves electronic equipment (1), wireless identity recognition device (2) more can send information, and prompting user does not leave behind electronic equipment (1) to avoid losing.