CN102043921A - Computer data security system and computer data security method - Google Patents

Computer data security system and computer data security method Download PDF

Info

Publication number
CN102043921A
CN102043921A CN2009101779712A CN200910177971A CN102043921A CN 102043921 A CN102043921 A CN 102043921A CN 2009101779712 A CN2009101779712 A CN 2009101779712A CN 200910177971 A CN200910177971 A CN 200910177971A CN 102043921 A CN102043921 A CN 102043921A
Authority
CN
China
Prior art keywords
coupling arrangement
computer
induction installation
data security
identification code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009101779712A
Other languages
Chinese (zh)
Inventor
吴铭津
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2009101779712A priority Critical patent/CN102043921A/en
Publication of CN102043921A publication Critical patent/CN102043921A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a computer data security system and a computer data security method. The computer data security system comprises a connection device and an induction device, wherein a microprocessor of the connection device is respectively connected with a connection interface, a joint interface and a transmission unit; and a processing unit of the induction device is respectively connected with a transmission interface and a plug interface. When the connection device is plugged with a preset computer by the connection interface or is constructed into the preset computer, the plug interface of the induction device is plugged with the plug interface of the connection device, a first identification code can be stored between the connection device and a computer, the initialized set of a second identification code is generated between the connection device and the induction device, and thus, when the induction device is far from the presetting range of the connection device, the connection device can control the computer to encrypt and can prevent other persons to use the computer; and when the induction device approaches to the presetting range of the connection device, the connection device can automatically input the first identification code into the computer at the moment, and a user can directly use the computer.

Description

The computer data security system and method
Technical field
The invention provides a kind of computer data security system and method; especially refer to that the user is with induction installation during away from coupling arrangement; its computer can enter the screen defence program; can prevent that other people from using computer; and induction installation is when the coupling arrangement; the user need not import first identification code, can directly control computer, has with this and maintains secrecy and effect easy to use.
Background technology
Because computer is multi-functional and universal day by day; so become the required article of people's daily life; and because the convenience of computer storage data; make people how some can be had the data storing of confidentiality in computer; and use these data in order to take precautions against other people; the user utilizes diverse ways to carry out Data Protection more, and the application process of traditional computer protecting has the startup password in smart card, fingerprint identification system or the basic input/output (BIOS).
The mode of above-mentioned smart card must be after inserting corresponding smart card for the user; computer just can be logined network; but this kind mode is not saved from damage when starting shooting or under the situation about waking up from the screen defence program computer; so the third party is not having under the situation of smart card; still can open computer; just can't enter network, therefore for Data Protection in the computer and imperfection.
In addition, using fingerprint identification system to carry out the mode that computer is saved from damage, then is when booting computer, the identification user's of elder generation fingerprint, after confirming, just can start shooting, but fingerprint distinguishes that the hardware cost of the system of knitting is higher, and need corresponding fingeprint distinguisher and software.
In addition; the third method is protected by setting startup password in BIOS; when computer system boot-strap, just require to input password; just can start shooting after the affirmation; but computer in use; startup password among the BIOS can't be confirmed again; therefore anyone can use computer; so above-mentioned three kinds of methods are not all saved from damage under situation about using computer; therefore the screen defence program that uses the windows workspace system is arranged in addition; and the user can be set in and not use computer in the Preset Time; computer just can enter the screen defence program; and if cancellation screen defence program, the user must input title and password, uses computer so can prevent other people; but after also causing the user to leave the computer Preset Time at every turn; will input the title password once more, and the necessary again storage password of user, and produce trouble and the time waste of using formality.
Be with, how to solve problem and the disappearance of commonly using computer data security, be the relevant manufacturer that is engaged in the industry and desire most ardently the direction place that research improves.
So the inventor is because above-mentioned problem and disappearance is to collect related data, via assessing in many ways and considering, and utilize the research and development experience for many years of engaging in the industry, via constantly studying and revising, the beginning is designed the invention birth survivor of this kind computer data security system and method.
Summary of the invention
The objective of the invention is to, the secrecy system that solves existing computer data is perfect inadequately, and uses inconvenient technical matters.
For achieving the above object, the invention provides a kind of computer data security system, include coupling arrangement and induction installation,
This coupling arrangement is in order to electrically connecting with default computer, and store can with preset first identification code that computer encrypts and with corresponding second identification code of induction installation;
This induction installation is in order to storing and corresponding second identification code of coupling arrangement, and with mutual wireless transmission second identification code of coupling arrangement, make coupling arrangement import first identification code to computer and decipher automatically.
The present invention also provides a kind of computer data security system, includes computer and induction installation;
Be electrically connected with coupling arrangement in this computer, and coupling arrangement store can with preset first identification code that computer encrypts and with corresponding second identification code of induction installation;
This induction installation is in order to storing and corresponding second identification code of coupling arrangement, and with mutual wireless transmission second identification code of coupling arrangement, make coupling arrangement import first identification code to computer and decipher automatically.
The present invention further provides a kind of computer data security method, especially refer to that the user is with induction installation during away from coupling arrangement, its computer can enter encrypted state, to prevent that other people from using computer, and when induction installation is positioned at the coupling arrangement preset range, promptly be decrypted, use computer for the user, its execution in step is carried out as follows:
(A) coupling arrangement and computer electrically connect;
(B) whether need initialization, if, carry out initialization after, enter step C again, if not, directly enter step C;
(C) coupling arrangement confirms that in Preset Time whether induction installation is effectively, if not, enters step D, if enter step e;
(D) the coupling arrangement controlling computer is maintained in the encrypted state;
(E) coupling arrangement transmits first identification code to default computer, and computer is deciphered automatically.
Beneficial effect of the present invention is that the microprocessor of coupling arrangement is connected with connecting interface and transmission unit respectively; and the processing unit of induction installation is connected with transmission interface; when coupling arrangement sees through connecting interface and computer grafting; and when induction installation and coupling arrangement are pegged graft; utilize the initializing set that produces second identification code between coupling arrangement and the induction installation; so; when induction installation during away from the coupling arrangement preset range; its coupling arrangement can controlling computer enter the screen defence program; to prevent that other people from using computer; and the user with induction installation near coupling arrangement during to preset range; its coupling arrangement input first identification code automatically can not must oneself be imported under first identification code to computer again, and after removing the screen defence program; can directly use computer, to reach data security and purpose easy to use.
Description of drawings
Fig. 1 is a circuit block diagram of the present invention.
Fig. 2 is the operational flowchart of the default computer of the present invention.
Fig. 3 is the operational flowchart of coupling arrangement of the present invention.
Fig. 4 is the operational flowchart of induction installation of the present invention.
Description of reference numerals:
The 1-coupling arrangement; The 11-microprocessor; The 12-transmission unit; The 13-storage unit; 14-engages interface; The 15-connecting interface; The 16-button; The 17-light-emitting component; The 2-induction installation; The 21-processing unit; The 22-transmission interface; The 23-storage element; The 24-splicing interface; The 25-power supply unit; 26-presses press button; The 27-luminescence unit; The 3-computer.
Embodiment
For reaching above-mentioned purpose and structure, the technology used in the present invention means and effect thereof, drawing now illustrates in detail that with regard to preferred embodiment of the present invention its step and function are as follows, understand fully in order to do profit.
See also shown in Figure 1ly, be circuit block diagram of the present invention, find out that by knowing among the figure computer data security system and method for the present invention includes coupling arrangement 1 and induction installation 2, wherein:
This coupling arrangement 1 is for having microprocessor 11, and microprocessor 11 can connect the running that control has transmission unit 12, storage unit 13, engages interface 14, connecting interface 15, button 16 and light-emitting component 17 respectively.
This induction installation 2 is for having processing unit 21, and processing unit 21 can connect control respectively transmission interface 22, storage element 23, splicing interface 24, power supply unit 25 are arranged, by the running of press button 26 and luminescence unit 27.
Above-mentioned coupling arrangement 1 and induction installation 2 are when using for the first time, the user needs to install earlier default driver to default computer 3, and coupling arrangement 1 sees through connecting interface 15 and computer 3 corresponding connectors are done the grafting (not shown), and coupling arrangement 1 also can in be built in the default computer, again the splicing interface 24 of induction installation 2 is plugged to the joint interface of coupling arrangement 1, and the driver of computer 3 can require the user to enter computer 3 operating systems setting screen defence program, to import first identification code (as title, pass code) and the default stand-by period of screen defence program (as 1 minute), and with the storage unit 13 and the computer 3 of coupling arrangement 1 store this first identification code respectively; And when the button 16 of pressed by external force coupling arrangement 1, whether coupling arrangement 1 can be connected with induction installation 2 in detection, if any, can push again induction installation 2 by press button 26, make second identification code (as being connected yard (65534) and a transmission channel (the 11st channel)) that produces between coupling arrangement 1 and the induction installation 2 at random, second identification code is stored in the storage unit 13 of coupling arrangement 1 and the storage element 23 of induction installation 2 respectively simultaneously, finishing linker with this sets, and the light-emitting component 17 of coupling arrangement 1 produces light and shows, induction installation 2 is chosen from coupling arrangement 1 again.
So; when the user takes induction installation 2 with oneself; and when presetting transmission range away from coupling arrangement 1; the microprocessor 11 of its coupling arrangement 1 can controlling computer 3 enter encryption (as the screen defence program); make other people can't use computer 3; and induction installation 2 can be every through Preset Time (as 30 seconds); the transmission interface 22 of its induction installation 2 and the transmission unit 12 of coupling arrangement 1 wireless signal transmission are each other done affirmation, and this transmission interface 22 and transmission unit 12 are corresponding radio transmission elements (as RF or bluetooth etc.).
Above-mentioned induction installation 2 transmission interfaces 22 can be unidirectional or two-way wireless signal transmission with the transmission signals mode of coupling arrangement 1 transmission unit 12, to confirm that coupling arrangement 1 and induction installation 2 are that same set product, corresponding second identification code get final product, therefore use the simple and easy modification of doing and the equivalent structure of instructions of the present invention and graphic content to change, must in like manner be contained in the claim that the present invention contains, close and give Chen Ming.
When induction installation 2 near coupling arrangements 1 during to preset range; the microprocessor 11 of its coupling arrangement 1 can check that whether this induction installation 2 is same set product with coupling arrangement 1; corresponding second identification code; because in same zone (as distinguishing public chamber); may there be a plurality of people to use induction installation 2 of the present invention simultaneously; so whether coupling arrangement 1 must detection be the induction installation 2 of corresponding second identification code; if not words; through presetting the stand-by period (as 1 minute) afterwards; the microprocessor 11 of coupling arrangement 1 can controlling computer 3 enter encryption (as the screen defence program); and coupling arrangement 1 must detect this induction installation 2 and is identical product and corresponding second identification code; this moment, the microprocessor 11 of coupling arrangement 1 will transmit first identification code automatically to computer 3; the user just can use computer 3; when avoiding the user to leave returning again behind the computer 3 with this; need the laborious procedures of input first identification code under the screen defence program; so the user does not have the puzzlement of forgetting first identification code; and can prevent that other people from using computer 3, have protection computer 3 data and double effects easy to use with this.
See also Fig. 1, shown in Figure 2,, find out that its step is carried out as follows for the operational flowchart of circuit block diagram of the present invention, default computer by knowing among the figure:
(401) beginning.
(402) whether computer 3 detects coupling arrangement 1, if, enter step (404), if not, enter step (403).
(403) user must input title and password voluntarily to computer 3.
(404) operating system that enters computer 3 is set user's title and pass code.
(405) all store user's title and pass code between computer 3 and the coupling arrangement 1.
(406) whether need initialization between computer 3 and the coupling arrangement 1, if, enter step (401), if not, enter step (407).
(407) whether induction installation 2 is low electric weight, if, enter step (408), if not, enter step (409).
(408) computer 3 screens show warning message.
(409) between coupling arrangement 1 and the induction installation 2 be connected sign indicating number and whether channel effective, if, enter step (404), if not, enter step (401).
Be with; whether computer 3 detects to have with coupling arrangement 1 and pegs graft; words if not; when the screen defence program appears in computer 3; the user must import first identification code (as title and pass code) voluntarily just can cancel the screen defence program; but coupling arrangement 1 and computer 3 have the words of grafting; the microprocessor 11 of its coupling arrangement 1 can controlling computer 3 supply the user to set the default stand-by period of screen defence program; title and pass code; and title and pass code are stored the storage unit 13 of backup at computer 3 and coupling arrangement 1 respectively; inquire again between computer 3 and the coupling arrangement 1 and whether need initialization; if unwanted words; whether the power supply unit 25 that the microprocessor 11 of coupling arrangement 1 can detect induction installation 2 is low electric weight; if the words of low electric weight; the screen that the microprocessor 11 meeting controlling computer 3 of its coupling arrangement 1 are connected shows the warning message (not shown); words if not low electric weight; check directly whether second identification code between coupling arrangement 1 and the induction installation 2 (as being connected yard and channel) is effective; if effectively talk about; the user can return the default stand-by period of setting the screen defence program; first identification code (as title and pass code); if invalid, whether 3 detections of computer have with coupling arrangement 1 is pegged graft.
See also Fig. 1, shown in Figure 3, be the operational flowchart of circuit block diagram of the present invention, coupling arrangement, find out by knowing among the figure, its step is carried out as follows:
(501) coupling arrangement 1 is plugged to computer 3.
(502) whether computer 3 is opened, if, enter step (503), if not, repeat to enter step (502).
(503) computer 3 detects coupling arrangement 1.
(504) whether need initialization, if, enter step (505), if not, enter step (513).
(505) whether the button 16 of pushing coupling arrangement 1 is arranged, if, enter step (508), if not, enter step (506).
(506) light-emitting component 17 produces the light demonstration.
(507) inform computer 3 these induction installations 2 for invalid, and enter step (513).
(508) whether detection pegs graft with induction installation 2, if, enter step (509), if not, repeat to enter step (508).
(509) whether push induction installation 2 by press button 26, if, enter step (510), if not, repeat to enter step (509).
(510) produce connection sign indicating number and transmission channel.
(511) store connection sign indicating number and transmission channel.
(512) close the light-emitting component 17 of coupling arrangement 1 and the luminescence unit 27 of induction installation 2.
(513) whether induction installation 2 is effective, if, enter step (514), if not, enter step (516).
(514) transmit user's title and pass code to computer 3.
(515) wait for 30 seconds, and enter step (513).
(516) start the screen defence program, and enter step (504).
Be with; this coupling arrangement 1 sees through connecting interface 15 and pegs graft with computer 3; and user and confirm whether computer 3 is unlatching; if open; computer 3 can be confirmed to be with coupling arrangement 1 and peg graft; rather than peg graft with other devices (as carry-on dish or card reader etc.); and computer 3 can inquire between this coupling arrangement 1 of user and the induction installation 2 whether need initialization; if necessary; the user can push the button 16 of coupling arrangement 1; when not having pressing keys 16; the light-emitting component 17 of coupling arrangement 1 produces light and shows; and the microprocessor 11 that sees through coupling arrangement 1 informs that computer 3 these induction installations 2 are for invalid; and the words of the button 16 of pushing coupling arrangement 1 are arranged; the user need check whether the joint interface 14 of coupling arrangement 1 pegs graft with the splicing interface 24 of induction installation 2; if any; the user push again induction installation 2 by press button 26; make the microprocessor 11 of coupling arrangement 1 can produce corresponding sign indicating number and the transmission channel of being connected mutually with the processing unit 21 of induction installation 2; be stored in the storage unit 13 of coupling arrangement 1 and the storage element 23 of induction installation 2 more respectively; and the luminescence unit 27 of the light-emitting component 17 of coupling arrangement 1 and induction installation 2 is closed light; confirm with the microprocessor 11 of coupling arrangement 1 whether induction installation 2 serves as effective again; if it is invalid; the microprocessor 11 of coupling arrangement 1 just can controlling computer 3 enter screen defence program state; if effectively talk about; the microprocessor 11 of coupling arrangement 1 sees through connecting interface 15 and transmits user's first identification code (as title and password) automatically to computer 3; cancel the screen defence program with this; and coupling arrangement 1 is every through Preset Time (as 30 seconds) with induction installation 2; will transmit signal mutually, to confirm whether induction installation 2 serves as effective (as same set product and corresponding second identification code).
See also Fig. 1, shown in Figure 4, be the operational flowchart of circuit block diagram of the present invention, induction installation 2, find out by knowing among the figure, its step is carried out as follows:
(601) beginning.
(602) whether induction installation 2 is plugged to coupling arrangement 1, if, enter step (603), if not, enter step (607).
(603) whether push induction installation 2 by press button 26, if enter step (604), otherwise repeat to enter step (603).
(604) produce connection sign indicating number and transmission channel.
(605) store connection sign indicating number and transmission channel.
(606) close the light-emitting component 17 of coupling arrangement 1 and the luminescence unit 27 of induction installation 2, and enter step (602).
(607) whether induction installation 2 is low electric weight, if, enter step (608), if not, enter step (609).
(608) luminescence unit 27 of induction installation 2 shows light.
(609) induction installation 2 transmits the work signal to coupling arrangement 1.
(610) close luminescence unit 27.
(611) wait for 30 seconds, and enter step (601).
Be with, whether the microprocessor 11 of this coupling arrangement 1 detects pegs graft with induction installation 2, if words, the user can push induction installation 2 by press button 26, make the microprocessor 11 of coupling arrangement 1 can produce corresponding storage second identification code (as being connected sign indicating number and transmission channel) mutually with the processing unit 21 of induction installation 2, be stored in the storage unit 13 of coupling arrangement 1 and the storage element 23 of induction installation 2 more respectively, whether and the luminescence unit 27 of the light-emitting component 17 of coupling arrangement 1 and induction installation 2 is closed light, and detect and peg graft with induction installation 2; If the joint interface of above-mentioned coupling arrangement 1 14 is not pegged graft with the splicing interface 24 of induction installation 2, the microprocessor 11 of coupling arrangement 1 can detect whether induction installation 2 is low electric weight, if low electric weight, the luminescence unit 27 of induction installation 2 shows light, and the work of transmission signal is to coupling arrangement 1, if there is not low electric weight, the direct transmission work signal of its induction installation 2 meetings is to coupling arrangement 1, and induction installation 2 cuts out luminescence unit 27 and waits for Preset Time (as 30 seconds), repeat above-mentioned steps again, whether microprocessor 11 detections of coupling arrangement 1 are pegged graft with induction installation 2.
When above-mentioned power supply when induction installation 2 power supply units uses up, coupling arrangement 1 can transmit a signal to computer 3, and meeting shows the faint (not shown) of signal of hanging down electric weight or induction installation 2 on the screen that computer 3 is connected, at this moment, the user can see through coupling arrangement 1 connecting interface 15 and peg graft with computer 3, and the transmission interface 22 of induction installation 2 is plugged to the transmission unit 12 of coupling arrangement 1, and the user must be in computer 3 input first identification codes (title and pass code), and can produce the second new identification code between coupling arrangement 1 and the induction installation 2 again, see through the power supply unit 25 that coupling arrangement 1 charges to induction installation 2 by computer 3 again.
In addition; the processing unit 21 of this induction installation 2 can be connected with the finger print identification unit (not shown); and user's finger print data can be stored in the storage element 23 of induction installation 2; as the user with induction installation 2 near coupling arrangements 1; and user's finger presses is when finger print identification unit; make the finger print identification unit of induction installation 2 can carry out the comparison of fingerprint; if fingerprint is correct; induction installation 2 can transmit signal to coupling arrangement 1; this moment, coupling arrangement 1 meeting was transmitted first identification code (as title and pass code) automatically to computer 3; the user just can use computer 3; if the incorrect words of user's fingerprint, its coupling arrangement 1 can controlling computer 3 enter the screen defence program.
Be with, computer data security system and method for the present invention is for improving the key problem in technology of commonly using:
(1) when induction installation 2 near coupling arrangements 1 during to preset range; this moment, coupling arrangement 1 meeting was imported title and pass code automatically to computer 3; and during away from coupling arrangement 1 preset range; its coupling arrangement 1 can controlling computer 3 enter the screen defence program; and can prevent that other people from using computer 3, and then has the effect of automatic protection computer 3.
(2) because the storage unit 13 of coupling arrangement 1 can store title and pass code, when induction installation 2 near coupling arrangements 1 during to preset range, coupling arrangement 1 can be imported title and pass code automatically to computer 3, so the user does not need store name and pass code, do not need spended time to import title and pass code voluntarily yet, can save time and increase convenience with this.
So; the present invention is primarily aimed at the user with induction installation during away from coupling arrangement; its computer can enter the screen defence program; can prevent that other people from using computer; and induction installation is when the coupling arrangement; the user need not input password, can directly control computer, has with this and maintains secrecy and effect easy to use.
The above description of this invention is illustrative, and nonrestrictive, and those skilled in the art is understood, and can carry out many modifications, variation or equivalence to it within spirit that claim limits and scope, but they will fall within the scope of protection of the present invention all.

Claims (17)

1. a computer data security system includes coupling arrangement and induction installation; It is characterized in that,
This coupling arrangement is in order to electrically connecting with default computer, and store can with preset first identification code that computer encrypts and with corresponding second identification code of induction installation;
This induction installation is in order to storing and corresponding second identification code of coupling arrangement, and with mutual wireless transmission second identification code of coupling arrangement, make coupling arrangement import first identification code to computer and decipher automatically.
2. computer data security as claimed in claim 1 system, it is characterized in that, this coupling arrangement is for having microprocessor, and microprocessor be connected with can with the transmission unit of induction installation transmission signal, and microprocessor is connected with can be for the joint interface of induction installation grafting, and be connected with the connecting interface that can peg graft with default computer with microprocessor, be connected with storage unit with microprocessor again.
3. computer data security as claimed in claim 1 system, it is characterized in that, this induction installation is for having processing unit, and but processing unit is connected with the transmission interface of transmission signal to the coupling arrangement transmission unit, and be connected with storage element with processing unit, be connected with the splicing interface that can be connected with processing unit again with the joint interface of coupling arrangement.
4. computer data security as claimed in claim 2 system is characterized in that, the microprocessor of this coupling arrangement is connected with and can carries out initialized button for after pushing, and microprocessor is connected with the light-emitting component that can produce light.
5. computer data security as claimed in claim 3 system is characterized in that, the processing unit of this induction installation is connected with and can carries out initializedly by press button for pushing, and processing unit is connected with the luminescence unit that can produce light.
6. computer data security as claimed in claim 3 system it is characterized in that, but the processing unit of this induction installation is connected with the power supply unit of power supply.
7. computer data security as claimed in claim 1 system is characterized in that, this first identification code is the user's title and the pass code of default computer, and second identification code is connection sign indicating number and channel between coupling arrangement and the induction installation.
8. a computer data security system includes computer and induction installation; It is characterized in that,
Be electrically connected with coupling arrangement in this computer, and coupling arrangement store can with preset first identification code that computer encrypts and with corresponding second identification code of induction installation;
This induction installation is in order to storing and corresponding second identification code of coupling arrangement, and with mutual wireless transmission second identification code of coupling arrangement, make coupling arrangement import first identification code to computer and decipher automatically.
9. computer data security as claimed in claim 8 system, it is characterized in that, this coupling arrangement is for having microprocessor, and microprocessor be connected with can with the transmission unit of induction installation transmission signal, and microprocessor is connected with can be for the joint interface of induction installation grafting, and be connected with the connecting interface that can peg graft with default computer with microprocessor, be connected with storage unit with microprocessor again.
10. computer data security as claimed in claim 8 system, it is characterized in that, this induction installation is for having processing unit, and but processing unit is connected with the transmission interface of transmission signal to the coupling arrangement transmission unit, and be connected with storage element with processing unit, be connected with the splicing interface that can be connected with processing unit again with the joint interface of coupling arrangement.
11. computer data security as claimed in claim 9 system is characterized in that, the microprocessor of this coupling arrangement is connected with and can carries out initialized button for after pushing, and microprocessor is connected with the light-emitting component that can produce light.
12. computer data security as claimed in claim 10 system is characterized in that, the processing unit of this induction installation is connected with and can carries out initializedly by press button for pushing, and processing unit is connected with the luminescence unit that can produce light.
13. computer data security as claimed in claim 10 system it is characterized in that, but the processing unit of this induction installation is connected with the power supply unit of power supply.
14. computer data security as claimed in claim 8 system is characterized in that, this first identification code is the user's title and the pass code of default computer, and second identification code is connection sign indicating number and channel between coupling arrangement and the induction installation.
15. computer data security method, especially refer to that the user is with induction installation during away from coupling arrangement, its computer can enter encrypted state, to prevent that other people from using computer, and when induction installation is positioned at the coupling arrangement preset range, promptly be decrypted, use computer for the user, it is characterized in that its execution in step is carried out as follows:
(A) coupling arrangement and computer electrically connect;
(B) whether need initialization, if, carry out initialization after, enter step C again, if not, directly enter step C;
(C) coupling arrangement confirms that in Preset Time whether induction installation is effectively, if not, enters step D, if enter step e;
(D) the coupling arrangement controlling computer is maintained in the encrypted state;
(E) coupling arrangement transmits first identification code to default computer, and computer is deciphered automatically.
16. computer data security method as claimed in claim 15 is characterized in that, coupling arrangement and the induction installation initialization step of this step B are as follows:
(A) whether the user has the button of pushing coupling arrangement, if, enter step (D), if not, enter step (B).
(B) light-emitting component of coupling arrangement produces the light demonstration.
(C) coupling arrangement informs that this induction installation of computer is invalid, and finishes.
(D) whether coupling arrangement detects and pegs graft with induction installation, if, enter step (E), if not, repeat to enter step (D).
(E) coupling arrangement detects whether being pressed by press button of induction installation, if, enter step (F), if not, repeat to enter step (E).
(F) produce between coupling arrangement and the induction installation and is connected yard and transmission channel.
(G) store between coupling arrangement and the induction installation and is connected yard and transmission channel.
(H) close the light-emitting component of coupling arrangement and the luminescence unit of induction installation.
17. computer data security method as claimed in claim 15, it is characterized in that, the coupling arrangement of this step B and computer are pegged graft, and induction installation is plugged to coupling arrangement, and coupling arrangement requires the user to import title and pass code to computer, and coupling arrangement and computer all can store this title and pass code.
CN2009101779712A 2009-10-23 2009-10-23 Computer data security system and computer data security method Pending CN102043921A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009101779712A CN102043921A (en) 2009-10-23 2009-10-23 Computer data security system and computer data security method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009101779712A CN102043921A (en) 2009-10-23 2009-10-23 Computer data security system and computer data security method

Publications (1)

Publication Number Publication Date
CN102043921A true CN102043921A (en) 2011-05-04

Family

ID=43910053

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009101779712A Pending CN102043921A (en) 2009-10-23 2009-10-23 Computer data security system and computer data security method

Country Status (1)

Country Link
CN (1) CN102043921A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105740718A (en) * 2014-11-26 2016-07-06 纬创资通股份有限公司 Electronic system, electronic device and access authentication method of electronic device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105740718A (en) * 2014-11-26 2016-07-06 纬创资通股份有限公司 Electronic system, electronic device and access authentication method of electronic device

Similar Documents

Publication Publication Date Title
CN102915588B (en) Based on intelligent lock system and the control method thereof of Bluetooth technology
CN103838992A (en) Fingerprint identifying method and terminal
US9690916B2 (en) Multi-function identification system and operation method thereof
CN105184179A (en) Embedded encrypted mobile storage device and operation method thereof
CN103763107A (en) Intelligent household appliance system secret key control method and intelligent household appliance system
CN103647587A (en) Method and system for unlocking mobile terminal, mobile terminal and wearable electronic device
CN103916537A (en) Bluetooth device and quick pairing method and system thereof
EP2272192A2 (en) Processing module operating methods, processing modules, and communications systems
CN101010652A (en) Wireless lock
CN104992086A (en) Method for unlocking key function by defining keystroke rhythm by user and intelligent terminal
CN104573575A (en) Fingerprint recognition device and method and mobile terminal
CN103973437A (en) Method, device and system for acquiring RSA secret key authorization when terminal is locked
CN103488920A (en) Implementation method and system of wireless information safety device
CN205068524U (en) Intelligent gate inhibition system
CN103995572A (en) Computer unlocking method and computer with unlocking module
CN101645124B (en) Method for unlocking PIN code and intelligent secret key device
CN110485825A (en) A kind of safety intelligent lock
CN103824014A (en) Isolation certificating and monitoring method of USB (universal serial bus) port within local area network
CN102043921A (en) Computer data security system and computer data security method
CN103390140A (en) Mobile terminal and information security control method thereof
CN204791236U (en) Light -operated lock system of intelligent terminal
CN103561478A (en) Method and device for automatically achieving wireless connection between devices
KR101879326B1 (en) Method and device for transmitting and receiving instruction information
CN101271496A (en) Cipher output method and device
CN101639881A (en) Data transmission line

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110504