CN102043921A - Computer data security system and computer data security method - Google Patents
Computer data security system and computer data security method Download PDFInfo
- Publication number
- CN102043921A CN102043921A CN2009101779712A CN200910177971A CN102043921A CN 102043921 A CN102043921 A CN 102043921A CN 2009101779712 A CN2009101779712 A CN 2009101779712A CN 200910177971 A CN200910177971 A CN 200910177971A CN 102043921 A CN102043921 A CN 102043921A
- Authority
- CN
- China
- Prior art keywords
- coupling arrangement
- computer
- induction installation
- data security
- identification code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a computer data security system and a computer data security method. The computer data security system comprises a connection device and an induction device, wherein a microprocessor of the connection device is respectively connected with a connection interface, a joint interface and a transmission unit; and a processing unit of the induction device is respectively connected with a transmission interface and a plug interface. When the connection device is plugged with a preset computer by the connection interface or is constructed into the preset computer, the plug interface of the induction device is plugged with the plug interface of the connection device, a first identification code can be stored between the connection device and a computer, the initialized set of a second identification code is generated between the connection device and the induction device, and thus, when the induction device is far from the presetting range of the connection device, the connection device can control the computer to encrypt and can prevent other persons to use the computer; and when the induction device approaches to the presetting range of the connection device, the connection device can automatically input the first identification code into the computer at the moment, and a user can directly use the computer.
Description
Technical field
The invention provides a kind of computer data security system and method; especially refer to that the user is with induction installation during away from coupling arrangement; its computer can enter the screen defence program; can prevent that other people from using computer; and induction installation is when the coupling arrangement; the user need not import first identification code, can directly control computer, has with this and maintains secrecy and effect easy to use.
Background technology
Because computer is multi-functional and universal day by day; so become the required article of people's daily life; and because the convenience of computer storage data; make people how some can be had the data storing of confidentiality in computer; and use these data in order to take precautions against other people; the user utilizes diverse ways to carry out Data Protection more, and the application process of traditional computer protecting has the startup password in smart card, fingerprint identification system or the basic input/output (BIOS).
The mode of above-mentioned smart card must be after inserting corresponding smart card for the user; computer just can be logined network; but this kind mode is not saved from damage when starting shooting or under the situation about waking up from the screen defence program computer; so the third party is not having under the situation of smart card; still can open computer; just can't enter network, therefore for Data Protection in the computer and imperfection.
In addition, using fingerprint identification system to carry out the mode that computer is saved from damage, then is when booting computer, the identification user's of elder generation fingerprint, after confirming, just can start shooting, but fingerprint distinguishes that the hardware cost of the system of knitting is higher, and need corresponding fingeprint distinguisher and software.
In addition; the third method is protected by setting startup password in BIOS; when computer system boot-strap, just require to input password; just can start shooting after the affirmation; but computer in use; startup password among the BIOS can't be confirmed again; therefore anyone can use computer; so above-mentioned three kinds of methods are not all saved from damage under situation about using computer; therefore the screen defence program that uses the windows workspace system is arranged in addition; and the user can be set in and not use computer in the Preset Time; computer just can enter the screen defence program; and if cancellation screen defence program, the user must input title and password, uses computer so can prevent other people; but after also causing the user to leave the computer Preset Time at every turn; will input the title password once more, and the necessary again storage password of user, and produce trouble and the time waste of using formality.
Be with, how to solve problem and the disappearance of commonly using computer data security, be the relevant manufacturer that is engaged in the industry and desire most ardently the direction place that research improves.
So the inventor is because above-mentioned problem and disappearance is to collect related data, via assessing in many ways and considering, and utilize the research and development experience for many years of engaging in the industry, via constantly studying and revising, the beginning is designed the invention birth survivor of this kind computer data security system and method.
Summary of the invention
The objective of the invention is to, the secrecy system that solves existing computer data is perfect inadequately, and uses inconvenient technical matters.
For achieving the above object, the invention provides a kind of computer data security system, include coupling arrangement and induction installation,
This coupling arrangement is in order to electrically connecting with default computer, and store can with preset first identification code that computer encrypts and with corresponding second identification code of induction installation;
This induction installation is in order to storing and corresponding second identification code of coupling arrangement, and with mutual wireless transmission second identification code of coupling arrangement, make coupling arrangement import first identification code to computer and decipher automatically.
The present invention also provides a kind of computer data security system, includes computer and induction installation;
Be electrically connected with coupling arrangement in this computer, and coupling arrangement store can with preset first identification code that computer encrypts and with corresponding second identification code of induction installation;
This induction installation is in order to storing and corresponding second identification code of coupling arrangement, and with mutual wireless transmission second identification code of coupling arrangement, make coupling arrangement import first identification code to computer and decipher automatically.
The present invention further provides a kind of computer data security method, especially refer to that the user is with induction installation during away from coupling arrangement, its computer can enter encrypted state, to prevent that other people from using computer, and when induction installation is positioned at the coupling arrangement preset range, promptly be decrypted, use computer for the user, its execution in step is carried out as follows:
(A) coupling arrangement and computer electrically connect;
(B) whether need initialization, if, carry out initialization after, enter step C again, if not, directly enter step C;
(C) coupling arrangement confirms that in Preset Time whether induction installation is effectively, if not, enters step D, if enter step e;
(D) the coupling arrangement controlling computer is maintained in the encrypted state;
(E) coupling arrangement transmits first identification code to default computer, and computer is deciphered automatically.
Beneficial effect of the present invention is that the microprocessor of coupling arrangement is connected with connecting interface and transmission unit respectively; and the processing unit of induction installation is connected with transmission interface; when coupling arrangement sees through connecting interface and computer grafting; and when induction installation and coupling arrangement are pegged graft; utilize the initializing set that produces second identification code between coupling arrangement and the induction installation; so; when induction installation during away from the coupling arrangement preset range; its coupling arrangement can controlling computer enter the screen defence program; to prevent that other people from using computer; and the user with induction installation near coupling arrangement during to preset range; its coupling arrangement input first identification code automatically can not must oneself be imported under first identification code to computer again, and after removing the screen defence program; can directly use computer, to reach data security and purpose easy to use.
Description of drawings
Fig. 1 is a circuit block diagram of the present invention.
Fig. 2 is the operational flowchart of the default computer of the present invention.
Fig. 3 is the operational flowchart of coupling arrangement of the present invention.
Fig. 4 is the operational flowchart of induction installation of the present invention.
Description of reference numerals:
The 1-coupling arrangement; The 11-microprocessor; The 12-transmission unit; The 13-storage unit; 14-engages interface; The 15-connecting interface; The 16-button; The 17-light-emitting component; The 2-induction installation; The 21-processing unit; The 22-transmission interface; The 23-storage element; The 24-splicing interface; The 25-power supply unit; 26-presses press button; The 27-luminescence unit; The 3-computer.
Embodiment
For reaching above-mentioned purpose and structure, the technology used in the present invention means and effect thereof, drawing now illustrates in detail that with regard to preferred embodiment of the present invention its step and function are as follows, understand fully in order to do profit.
See also shown in Figure 1ly, be circuit block diagram of the present invention, find out that by knowing among the figure computer data security system and method for the present invention includes coupling arrangement 1 and induction installation 2, wherein:
This coupling arrangement 1 is for having microprocessor 11, and microprocessor 11 can connect the running that control has transmission unit 12, storage unit 13, engages interface 14, connecting interface 15, button 16 and light-emitting component 17 respectively.
This induction installation 2 is for having processing unit 21, and processing unit 21 can connect control respectively transmission interface 22, storage element 23, splicing interface 24, power supply unit 25 are arranged, by the running of press button 26 and luminescence unit 27.
Above-mentioned coupling arrangement 1 and induction installation 2 are when using for the first time, the user needs to install earlier default driver to default computer 3, and coupling arrangement 1 sees through connecting interface 15 and computer 3 corresponding connectors are done the grafting (not shown), and coupling arrangement 1 also can in be built in the default computer, again the splicing interface 24 of induction installation 2 is plugged to the joint interface of coupling arrangement 1, and the driver of computer 3 can require the user to enter computer 3 operating systems setting screen defence program, to import first identification code (as title, pass code) and the default stand-by period of screen defence program (as 1 minute), and with the storage unit 13 and the computer 3 of coupling arrangement 1 store this first identification code respectively; And when the button 16 of pressed by external force coupling arrangement 1, whether coupling arrangement 1 can be connected with induction installation 2 in detection, if any, can push again induction installation 2 by press button 26, make second identification code (as being connected yard (65534) and a transmission channel (the 11st channel)) that produces between coupling arrangement 1 and the induction installation 2 at random, second identification code is stored in the storage unit 13 of coupling arrangement 1 and the storage element 23 of induction installation 2 respectively simultaneously, finishing linker with this sets, and the light-emitting component 17 of coupling arrangement 1 produces light and shows, induction installation 2 is chosen from coupling arrangement 1 again.
So; when the user takes induction installation 2 with oneself; and when presetting transmission range away from coupling arrangement 1; the microprocessor 11 of its coupling arrangement 1 can controlling computer 3 enter encryption (as the screen defence program); make other people can't use computer 3; and induction installation 2 can be every through Preset Time (as 30 seconds); the transmission interface 22 of its induction installation 2 and the transmission unit 12 of coupling arrangement 1 wireless signal transmission are each other done affirmation, and this transmission interface 22 and transmission unit 12 are corresponding radio transmission elements (as RF or bluetooth etc.).
Above-mentioned induction installation 2 transmission interfaces 22 can be unidirectional or two-way wireless signal transmission with the transmission signals mode of coupling arrangement 1 transmission unit 12, to confirm that coupling arrangement 1 and induction installation 2 are that same set product, corresponding second identification code get final product, therefore use the simple and easy modification of doing and the equivalent structure of instructions of the present invention and graphic content to change, must in like manner be contained in the claim that the present invention contains, close and give Chen Ming.
When induction installation 2 near coupling arrangements 1 during to preset range; the microprocessor 11 of its coupling arrangement 1 can check that whether this induction installation 2 is same set product with coupling arrangement 1; corresponding second identification code; because in same zone (as distinguishing public chamber); may there be a plurality of people to use induction installation 2 of the present invention simultaneously; so whether coupling arrangement 1 must detection be the induction installation 2 of corresponding second identification code; if not words; through presetting the stand-by period (as 1 minute) afterwards; the microprocessor 11 of coupling arrangement 1 can controlling computer 3 enter encryption (as the screen defence program); and coupling arrangement 1 must detect this induction installation 2 and is identical product and corresponding second identification code; this moment, the microprocessor 11 of coupling arrangement 1 will transmit first identification code automatically to computer 3; the user just can use computer 3; when avoiding the user to leave returning again behind the computer 3 with this; need the laborious procedures of input first identification code under the screen defence program; so the user does not have the puzzlement of forgetting first identification code; and can prevent that other people from using computer 3, have protection computer 3 data and double effects easy to use with this.
See also Fig. 1, shown in Figure 2,, find out that its step is carried out as follows for the operational flowchart of circuit block diagram of the present invention, default computer by knowing among the figure:
(401) beginning.
(402) whether computer 3 detects coupling arrangement 1, if, enter step (404), if not, enter step (403).
(403) user must input title and password voluntarily to computer 3.
(404) operating system that enters computer 3 is set user's title and pass code.
(405) all store user's title and pass code between computer 3 and the coupling arrangement 1.
(406) whether need initialization between computer 3 and the coupling arrangement 1, if, enter step (401), if not, enter step (407).
(407) whether induction installation 2 is low electric weight, if, enter step (408), if not, enter step (409).
(408) computer 3 screens show warning message.
(409) between coupling arrangement 1 and the induction installation 2 be connected sign indicating number and whether channel effective, if, enter step (404), if not, enter step (401).
Be with; whether computer 3 detects to have with coupling arrangement 1 and pegs graft; words if not; when the screen defence program appears in computer 3; the user must import first identification code (as title and pass code) voluntarily just can cancel the screen defence program; but coupling arrangement 1 and computer 3 have the words of grafting; the microprocessor 11 of its coupling arrangement 1 can controlling computer 3 supply the user to set the default stand-by period of screen defence program; title and pass code; and title and pass code are stored the storage unit 13 of backup at computer 3 and coupling arrangement 1 respectively; inquire again between computer 3 and the coupling arrangement 1 and whether need initialization; if unwanted words; whether the power supply unit 25 that the microprocessor 11 of coupling arrangement 1 can detect induction installation 2 is low electric weight; if the words of low electric weight; the screen that the microprocessor 11 meeting controlling computer 3 of its coupling arrangement 1 are connected shows the warning message (not shown); words if not low electric weight; check directly whether second identification code between coupling arrangement 1 and the induction installation 2 (as being connected yard and channel) is effective; if effectively talk about; the user can return the default stand-by period of setting the screen defence program; first identification code (as title and pass code); if invalid, whether 3 detections of computer have with coupling arrangement 1 is pegged graft.
See also Fig. 1, shown in Figure 3, be the operational flowchart of circuit block diagram of the present invention, coupling arrangement, find out by knowing among the figure, its step is carried out as follows:
(501) coupling arrangement 1 is plugged to computer 3.
(502) whether computer 3 is opened, if, enter step (503), if not, repeat to enter step (502).
(503) computer 3 detects coupling arrangement 1.
(504) whether need initialization, if, enter step (505), if not, enter step (513).
(505) whether the button 16 of pushing coupling arrangement 1 is arranged, if, enter step (508), if not, enter step (506).
(506) light-emitting component 17 produces the light demonstration.
(507) inform computer 3 these induction installations 2 for invalid, and enter step (513).
(508) whether detection pegs graft with induction installation 2, if, enter step (509), if not, repeat to enter step (508).
(509) whether push induction installation 2 by press button 26, if, enter step (510), if not, repeat to enter step (509).
(510) produce connection sign indicating number and transmission channel.
(511) store connection sign indicating number and transmission channel.
(512) close the light-emitting component 17 of coupling arrangement 1 and the luminescence unit 27 of induction installation 2.
(513) whether induction installation 2 is effective, if, enter step (514), if not, enter step (516).
(514) transmit user's title and pass code to computer 3.
(515) wait for 30 seconds, and enter step (513).
(516) start the screen defence program, and enter step (504).
Be with; this coupling arrangement 1 sees through connecting interface 15 and pegs graft with computer 3; and user and confirm whether computer 3 is unlatching; if open; computer 3 can be confirmed to be with coupling arrangement 1 and peg graft; rather than peg graft with other devices (as carry-on dish or card reader etc.); and computer 3 can inquire between this coupling arrangement 1 of user and the induction installation 2 whether need initialization; if necessary; the user can push the button 16 of coupling arrangement 1; when not having pressing keys 16; the light-emitting component 17 of coupling arrangement 1 produces light and shows; and the microprocessor 11 that sees through coupling arrangement 1 informs that computer 3 these induction installations 2 are for invalid; and the words of the button 16 of pushing coupling arrangement 1 are arranged; the user need check whether the joint interface 14 of coupling arrangement 1 pegs graft with the splicing interface 24 of induction installation 2; if any; the user push again induction installation 2 by press button 26; make the microprocessor 11 of coupling arrangement 1 can produce corresponding sign indicating number and the transmission channel of being connected mutually with the processing unit 21 of induction installation 2; be stored in the storage unit 13 of coupling arrangement 1 and the storage element 23 of induction installation 2 more respectively; and the luminescence unit 27 of the light-emitting component 17 of coupling arrangement 1 and induction installation 2 is closed light; confirm with the microprocessor 11 of coupling arrangement 1 whether induction installation 2 serves as effective again; if it is invalid; the microprocessor 11 of coupling arrangement 1 just can controlling computer 3 enter screen defence program state; if effectively talk about; the microprocessor 11 of coupling arrangement 1 sees through connecting interface 15 and transmits user's first identification code (as title and password) automatically to computer 3; cancel the screen defence program with this; and coupling arrangement 1 is every through Preset Time (as 30 seconds) with induction installation 2; will transmit signal mutually, to confirm whether induction installation 2 serves as effective (as same set product and corresponding second identification code).
See also Fig. 1, shown in Figure 4, be the operational flowchart of circuit block diagram of the present invention, induction installation 2, find out by knowing among the figure, its step is carried out as follows:
(601) beginning.
(602) whether induction installation 2 is plugged to coupling arrangement 1, if, enter step (603), if not, enter step (607).
(603) whether push induction installation 2 by press button 26, if enter step (604), otherwise repeat to enter step (603).
(604) produce connection sign indicating number and transmission channel.
(605) store connection sign indicating number and transmission channel.
(606) close the light-emitting component 17 of coupling arrangement 1 and the luminescence unit 27 of induction installation 2, and enter step (602).
(607) whether induction installation 2 is low electric weight, if, enter step (608), if not, enter step (609).
(608) luminescence unit 27 of induction installation 2 shows light.
(609) induction installation 2 transmits the work signal to coupling arrangement 1.
(610) close luminescence unit 27.
(611) wait for 30 seconds, and enter step (601).
Be with, whether the microprocessor 11 of this coupling arrangement 1 detects pegs graft with induction installation 2, if words, the user can push induction installation 2 by press button 26, make the microprocessor 11 of coupling arrangement 1 can produce corresponding storage second identification code (as being connected sign indicating number and transmission channel) mutually with the processing unit 21 of induction installation 2, be stored in the storage unit 13 of coupling arrangement 1 and the storage element 23 of induction installation 2 more respectively, whether and the luminescence unit 27 of the light-emitting component 17 of coupling arrangement 1 and induction installation 2 is closed light, and detect and peg graft with induction installation 2; If the joint interface of above-mentioned coupling arrangement 1 14 is not pegged graft with the splicing interface 24 of induction installation 2, the microprocessor 11 of coupling arrangement 1 can detect whether induction installation 2 is low electric weight, if low electric weight, the luminescence unit 27 of induction installation 2 shows light, and the work of transmission signal is to coupling arrangement 1, if there is not low electric weight, the direct transmission work signal of its induction installation 2 meetings is to coupling arrangement 1, and induction installation 2 cuts out luminescence unit 27 and waits for Preset Time (as 30 seconds), repeat above-mentioned steps again, whether microprocessor 11 detections of coupling arrangement 1 are pegged graft with induction installation 2.
When above-mentioned power supply when induction installation 2 power supply units uses up, coupling arrangement 1 can transmit a signal to computer 3, and meeting shows the faint (not shown) of signal of hanging down electric weight or induction installation 2 on the screen that computer 3 is connected, at this moment, the user can see through coupling arrangement 1 connecting interface 15 and peg graft with computer 3, and the transmission interface 22 of induction installation 2 is plugged to the transmission unit 12 of coupling arrangement 1, and the user must be in computer 3 input first identification codes (title and pass code), and can produce the second new identification code between coupling arrangement 1 and the induction installation 2 again, see through the power supply unit 25 that coupling arrangement 1 charges to induction installation 2 by computer 3 again.
In addition; the processing unit 21 of this induction installation 2 can be connected with the finger print identification unit (not shown); and user's finger print data can be stored in the storage element 23 of induction installation 2; as the user with induction installation 2 near coupling arrangements 1; and user's finger presses is when finger print identification unit; make the finger print identification unit of induction installation 2 can carry out the comparison of fingerprint; if fingerprint is correct; induction installation 2 can transmit signal to coupling arrangement 1; this moment, coupling arrangement 1 meeting was transmitted first identification code (as title and pass code) automatically to computer 3; the user just can use computer 3; if the incorrect words of user's fingerprint, its coupling arrangement 1 can controlling computer 3 enter the screen defence program.
Be with, computer data security system and method for the present invention is for improving the key problem in technology of commonly using:
(1) when induction installation 2 near coupling arrangements 1 during to preset range; this moment, coupling arrangement 1 meeting was imported title and pass code automatically to computer 3; and during away from coupling arrangement 1 preset range; its coupling arrangement 1 can controlling computer 3 enter the screen defence program; and can prevent that other people from using computer 3, and then has the effect of automatic protection computer 3.
(2) because the storage unit 13 of coupling arrangement 1 can store title and pass code, when induction installation 2 near coupling arrangements 1 during to preset range, coupling arrangement 1 can be imported title and pass code automatically to computer 3, so the user does not need store name and pass code, do not need spended time to import title and pass code voluntarily yet, can save time and increase convenience with this.
So; the present invention is primarily aimed at the user with induction installation during away from coupling arrangement; its computer can enter the screen defence program; can prevent that other people from using computer; and induction installation is when the coupling arrangement; the user need not input password, can directly control computer, has with this and maintains secrecy and effect easy to use.
The above description of this invention is illustrative, and nonrestrictive, and those skilled in the art is understood, and can carry out many modifications, variation or equivalence to it within spirit that claim limits and scope, but they will fall within the scope of protection of the present invention all.
Claims (17)
1. a computer data security system includes coupling arrangement and induction installation; It is characterized in that,
This coupling arrangement is in order to electrically connecting with default computer, and store can with preset first identification code that computer encrypts and with corresponding second identification code of induction installation;
This induction installation is in order to storing and corresponding second identification code of coupling arrangement, and with mutual wireless transmission second identification code of coupling arrangement, make coupling arrangement import first identification code to computer and decipher automatically.
2. computer data security as claimed in claim 1 system, it is characterized in that, this coupling arrangement is for having microprocessor, and microprocessor be connected with can with the transmission unit of induction installation transmission signal, and microprocessor is connected with can be for the joint interface of induction installation grafting, and be connected with the connecting interface that can peg graft with default computer with microprocessor, be connected with storage unit with microprocessor again.
3. computer data security as claimed in claim 1 system, it is characterized in that, this induction installation is for having processing unit, and but processing unit is connected with the transmission interface of transmission signal to the coupling arrangement transmission unit, and be connected with storage element with processing unit, be connected with the splicing interface that can be connected with processing unit again with the joint interface of coupling arrangement.
4. computer data security as claimed in claim 2 system is characterized in that, the microprocessor of this coupling arrangement is connected with and can carries out initialized button for after pushing, and microprocessor is connected with the light-emitting component that can produce light.
5. computer data security as claimed in claim 3 system is characterized in that, the processing unit of this induction installation is connected with and can carries out initializedly by press button for pushing, and processing unit is connected with the luminescence unit that can produce light.
6. computer data security as claimed in claim 3 system it is characterized in that, but the processing unit of this induction installation is connected with the power supply unit of power supply.
7. computer data security as claimed in claim 1 system is characterized in that, this first identification code is the user's title and the pass code of default computer, and second identification code is connection sign indicating number and channel between coupling arrangement and the induction installation.
8. a computer data security system includes computer and induction installation; It is characterized in that,
Be electrically connected with coupling arrangement in this computer, and coupling arrangement store can with preset first identification code that computer encrypts and with corresponding second identification code of induction installation;
This induction installation is in order to storing and corresponding second identification code of coupling arrangement, and with mutual wireless transmission second identification code of coupling arrangement, make coupling arrangement import first identification code to computer and decipher automatically.
9. computer data security as claimed in claim 8 system, it is characterized in that, this coupling arrangement is for having microprocessor, and microprocessor be connected with can with the transmission unit of induction installation transmission signal, and microprocessor is connected with can be for the joint interface of induction installation grafting, and be connected with the connecting interface that can peg graft with default computer with microprocessor, be connected with storage unit with microprocessor again.
10. computer data security as claimed in claim 8 system, it is characterized in that, this induction installation is for having processing unit, and but processing unit is connected with the transmission interface of transmission signal to the coupling arrangement transmission unit, and be connected with storage element with processing unit, be connected with the splicing interface that can be connected with processing unit again with the joint interface of coupling arrangement.
11. computer data security as claimed in claim 9 system is characterized in that, the microprocessor of this coupling arrangement is connected with and can carries out initialized button for after pushing, and microprocessor is connected with the light-emitting component that can produce light.
12. computer data security as claimed in claim 10 system is characterized in that, the processing unit of this induction installation is connected with and can carries out initializedly by press button for pushing, and processing unit is connected with the luminescence unit that can produce light.
13. computer data security as claimed in claim 10 system it is characterized in that, but the processing unit of this induction installation is connected with the power supply unit of power supply.
14. computer data security as claimed in claim 8 system is characterized in that, this first identification code is the user's title and the pass code of default computer, and second identification code is connection sign indicating number and channel between coupling arrangement and the induction installation.
15. computer data security method, especially refer to that the user is with induction installation during away from coupling arrangement, its computer can enter encrypted state, to prevent that other people from using computer, and when induction installation is positioned at the coupling arrangement preset range, promptly be decrypted, use computer for the user, it is characterized in that its execution in step is carried out as follows:
(A) coupling arrangement and computer electrically connect;
(B) whether need initialization, if, carry out initialization after, enter step C again, if not, directly enter step C;
(C) coupling arrangement confirms that in Preset Time whether induction installation is effectively, if not, enters step D, if enter step e;
(D) the coupling arrangement controlling computer is maintained in the encrypted state;
(E) coupling arrangement transmits first identification code to default computer, and computer is deciphered automatically.
16. computer data security method as claimed in claim 15 is characterized in that, coupling arrangement and the induction installation initialization step of this step B are as follows:
(A) whether the user has the button of pushing coupling arrangement, if, enter step (D), if not, enter step (B).
(B) light-emitting component of coupling arrangement produces the light demonstration.
(C) coupling arrangement informs that this induction installation of computer is invalid, and finishes.
(D) whether coupling arrangement detects and pegs graft with induction installation, if, enter step (E), if not, repeat to enter step (D).
(E) coupling arrangement detects whether being pressed by press button of induction installation, if, enter step (F), if not, repeat to enter step (E).
(F) produce between coupling arrangement and the induction installation and is connected yard and transmission channel.
(G) store between coupling arrangement and the induction installation and is connected yard and transmission channel.
(H) close the light-emitting component of coupling arrangement and the luminescence unit of induction installation.
17. computer data security method as claimed in claim 15, it is characterized in that, the coupling arrangement of this step B and computer are pegged graft, and induction installation is plugged to coupling arrangement, and coupling arrangement requires the user to import title and pass code to computer, and coupling arrangement and computer all can store this title and pass code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009101779712A CN102043921A (en) | 2009-10-23 | 2009-10-23 | Computer data security system and computer data security method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009101779712A CN102043921A (en) | 2009-10-23 | 2009-10-23 | Computer data security system and computer data security method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102043921A true CN102043921A (en) | 2011-05-04 |
Family
ID=43910053
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2009101779712A Pending CN102043921A (en) | 2009-10-23 | 2009-10-23 | Computer data security system and computer data security method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102043921A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105740718A (en) * | 2014-11-26 | 2016-07-06 | 纬创资通股份有限公司 | Electronic system, electronic device and access authentication method of electronic device |
-
2009
- 2009-10-23 CN CN2009101779712A patent/CN102043921A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105740718A (en) * | 2014-11-26 | 2016-07-06 | 纬创资通股份有限公司 | Electronic system, electronic device and access authentication method of electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102915588B (en) | Based on intelligent lock system and the control method thereof of Bluetooth technology | |
CN103838992A (en) | Fingerprint identifying method and terminal | |
US9690916B2 (en) | Multi-function identification system and operation method thereof | |
CN105184179A (en) | Embedded encrypted mobile storage device and operation method thereof | |
CN103763107A (en) | Intelligent household appliance system secret key control method and intelligent household appliance system | |
CN103647587A (en) | Method and system for unlocking mobile terminal, mobile terminal and wearable electronic device | |
CN103916537A (en) | Bluetooth device and quick pairing method and system thereof | |
EP2272192A2 (en) | Processing module operating methods, processing modules, and communications systems | |
CN101010652A (en) | Wireless lock | |
CN104992086A (en) | Method for unlocking key function by defining keystroke rhythm by user and intelligent terminal | |
CN104573575A (en) | Fingerprint recognition device and method and mobile terminal | |
CN103973437A (en) | Method, device and system for acquiring RSA secret key authorization when terminal is locked | |
CN103488920A (en) | Implementation method and system of wireless information safety device | |
CN205068524U (en) | Intelligent gate inhibition system | |
CN103995572A (en) | Computer unlocking method and computer with unlocking module | |
CN101645124B (en) | Method for unlocking PIN code and intelligent secret key device | |
CN110485825A (en) | A kind of safety intelligent lock | |
CN103824014A (en) | Isolation certificating and monitoring method of USB (universal serial bus) port within local area network | |
CN102043921A (en) | Computer data security system and computer data security method | |
CN103390140A (en) | Mobile terminal and information security control method thereof | |
CN204791236U (en) | Light -operated lock system of intelligent terminal | |
CN103561478A (en) | Method and device for automatically achieving wireless connection between devices | |
KR101879326B1 (en) | Method and device for transmitting and receiving instruction information | |
CN101271496A (en) | Cipher output method and device | |
CN101639881A (en) | Data transmission line |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20110504 |