CN102110194A - Security system and method enabling computer to be used only by pre-dialing unlock center - Google Patents

Security system and method enabling computer to be used only by pre-dialing unlock center Download PDF

Info

Publication number
CN102110194A
CN102110194A CN2009101891619A CN200910189161A CN102110194A CN 102110194 A CN102110194 A CN 102110194A CN 2009101891619 A CN2009101891619 A CN 2009101891619A CN 200910189161 A CN200910189161 A CN 200910189161A CN 102110194 A CN102110194 A CN 102110194A
Authority
CN
China
Prior art keywords
computing machine
unblanking
center
status flag
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2009101891619A
Other languages
Chinese (zh)
Other versions
CN102110194B (en
Inventor
黄金富
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN200910189161.9A priority Critical patent/CN102110194B/en
Publication of CN102110194A publication Critical patent/CN102110194A/en
Application granted granted Critical
Publication of CN102110194B publication Critical patent/CN102110194B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A safety system and a method enabling a computer to be used only by pre-dialing an unlock center. The safety system comprises an unlock center (1), an user computer (2) and a cell phone (3), wherein a status flag corresponding to the computer (2) and the cell phone (3) is arranged on the unlock center (3) , remains in a locked status in ordinary times, and can be set as an unlocked status after a user sends an unlocking instruction to the unlock center (1) through the cell phone; a monitoring software (201) is arranged on the computer (2), before the computer (2) is being monitored, the monitoring software (201) inquiries the corresponding status of the status flag from the unlock center (1), and the computer can only be monitored as long as the status flag is in the unlocked status. The invention can be combined with anti-virus software service, so as to integrate the unlock center (1) to an anti-virus update service host computer and integrate the monitoring software (201) to an anti-virus software, as a result, not only the computer is protected by the anti-virus software from being infected by virus, but also the computer is prevented from being illegally used.

Description

Will send a telegraph the center of unblanking in advance could computed security system and method
[technical field]
The present invention relates to computing machine safety technique field, particularly relating to a kind of center of unblanking of will sending a telegraph in advance could computed security system and method.
[background technology]
Along with popularizing of computer technology; computer application more and more widely; computing machine has become the indispensable common equipment on people's live and work; the security of computing machine also more and more receives publicity; more especially store the computing machine of privacy of the individual or confidential information, in order to protect the safety of computing machine internal information, these computing machines all are provided with cryptoguard usually; after importing correct login password and logining, just can use a computer.But some unprincipled fellows; steal computer user's the password of logining by all means; under ignorant the user then and situation about being absent from the scene; use is stolen the password fake user of logining of returning and is logined computing machine; carry out some lawbreaking activitiess; for example steal important information in the computing machine, destroy the important information in the computing machine even some viruses or wooden horse formula installed want in the computing machine; when finding, the user often causes loss without redemption to the user; how to protect computing machine illegally not used by other people, being one has problem to be solved.
[summary of the invention]
Purpose of the present invention is to provide a kind of and will sends a telegraph unblank center computed security system of ability and method in advance, to realize preventing the application that computing machine is illegally used.
The object of the present invention is achieved like this, adopt a kind of like this security system that prevents that computing machine from illegally being used, it is characterized in that, described system includes the center of unblanking (1), each user's computer (2) and mobile phone (3), wherein, the center (1) of unblanking is provided with a plurality of Status Flags, corresponding user's computer (2) of each Status Flag and mobile phone (3), each Status Flag is to be in " locking " state usually, and the user sends unlock instruction by mobile phone (3) to the center of unblanking (1), and the pairing Status Flag of this mobile phone (3) can be set is " unblanking " state; And, in computing machine (2), be provided with and comprise monitoring software (201), this monitoring software (201) is used for the running of supervisory control comuter (2), when finding that computing machine (2) execution is subjected to policer operation, monitoring software (201) suspends this and is subjected to policer operation, and inquire about the state of the corresponding Status Flag of this computing machine (2) to the center of unblanking (1), when only the state that (1) answers this Status Flag at the center of unblanking is for " unblanking ", monitoring software (201) just allow computing machine to continue execution this is subjected to policer operation.
And, also adopt a kind of like this security method that prevents that computing machine from illegally being used, it is characterized in that, described method is included in the center of unblanking (1) a plurality of Status Flags is set, corresponding user's computer (2) of each Status Flag and mobile phone (3), each Status Flag is to be in " locking " state usually, and the user sends unlock instruction by mobile phone (3) to the center of unblanking (1), and the pairing Status Flag of this mobile phone (3) can be set is " unblanking " state; And, at computing machine (2) monitoring software (201) is set, this monitoring software (201) is used for the running of supervisory control comuter (2), when finding that computing machine (2) execution is subjected to policer operation, monitoring software (201) suspends this and is subjected to policer operation, and inquire about the state of the corresponding Status Flag of this computing machine (2) to the center of unblanking (1), when only the state that (1) answers this Status Flag at the center of unblanking is for " unblanking ", monitoring software (201) just allow computing machine to continue execution this is subjected to policer operation.
In this manual, describedly comprised by policer operation: the protected data in log into thr computer (2) and/or the access computer (2) and/or duplicate protected data and/or the protected data in the storage computation machine (2) in the computing machine (2) and/or revise protected data in the computing machine (2).
So just realized purpose of the present invention.
Security system and the method that prevents that computing machine from illegally being used of the present invention, can ensure the safety of user's computer (2), use a computer before (2) be subjected to policer operation at every turn, the user will use mobile phone (3) to send the corresponding Status Flag of this computing machine of effective unlock instruction (2) to the center of unblanking (1) in advance and be set to " unblanking " state, this is subjected to policer operation the ability successful execution, even user's login password has been stolen by the people, do not have user's mobile phone (3) just can't " unblank ", also just can't use a computer (2) are subjected to policer operation.
[description of drawings]
Fig. 1 is the schematic illustration that prevents the security system that computing machine is illegally used of the present invention;
Fig. 2 is the step schematic illustration that prevents the security method that computing machine is illegally used of the present invention.
Among the figure, the system that identical digitized representation is identical, device, parts device, method step marks with the numeral of circle and the straight line of band arrow.Accompanying drawing is schematically, in order to the principal character of system and method for the present invention to be described.
[embodiment]
Below in conjunction with accompanying drawing, system and method for the present invention is described in further detail.
Consult Fig. 1, Fig. 1 is the schematic illustration that prevents the security system that computing machine is illegally used of the present invention, system shown in Fig. 1 includes the center of unblanking (1), each user's computer (2) and mobile phone (3), wherein, the center (1) of unblanking is provided with a plurality of Status Flags, corresponding user's computer (2) of each Status Flag and mobile phone (3), each Status Flag is to be in " locking " state usually, and the user sends unlock instruction by mobile phone (3) to the center of unblanking (1), and the pairing Status Flag of this mobile phone (3) can be set is " unblanking " state; And, in computing machine (2), be provided with and comprise monitoring software (201), this monitoring software (201) is used for the running of supervisory control comuter (2), when finding that computing machine (2) execution is subjected to policer operation, monitoring software (201) suspends this and is subjected to policer operation, and inquire about the state of the corresponding Status Flag of this computing machine (2) to the center of unblanking (1), when only the state that (1) answers this Status Flag at the center of unblanking is for " unblanking ", monitoring software (201) just allow computing machine to continue execution this is subjected to policer operation.
Aspect being provided with, the center (1) of unblanking is provided with circuit and the device and the device that is connected internet (5) that connects telephone network (4), and be provided with a plurality of Status Flags that are used to indicate Account Status, respectively corresponding user's computer (2) of each Status Flag and his mobile phone (3), the user will be provided with a monitoring software (201) and digital certificates are set in his computing machine (2), these digital certificates are exactly the identity documents of user's computer (2), also can adopt other embodiment to replace the identity documents of digital certificates as user's computer (2), the user need (1) register mobile phone (3) telephone number of oneself and the identity documents of computing machine (2) at the center of unblanking, distribute a Status Flag to give the user by the center of unblanking (1), user's mobile phone (3) telephone number and the identity documents of computing machine (2) are bound mutually with this Status Flag.In addition, the user also will select to set a unlock instruction that is used to unblank, can adopt the user to use mobile phone (3) to send a telegraph to call out the center (1) of unblanking to use mobile phone (3) to send to the center of unblanking (1) as unlock instruction or user to include the note of unlocking cipher or multimedia message as unlock instruction or use mobile phone (3) to send to the e-mail that the center of unblanking (1) includes unlocking cipher with the user to be unlock instruction or the like and so on mode, can be sent to the center of unblanking (1) as unlock instruction as unblank unlocking cipher that user behind the incoming call of mobile phone (3) of center (1) listening user imported at mobile phone (3) of unlock instruction or employing.Later on the user use a computer (2) carry out be subjected to policer operation before, the user will use mobile phone (3) to send the corresponding Status Flag of this computing machine of effective unlock instruction (2) to the center of unblanking (1) in advance and be set to " unblanking " state, and the monitoring software (201) in the computing machine (2) just allows to carry out this and is subjected to policer operation.
Consult Fig. 2, Fig. 2 is the step schematic illustration that prevents the security method that computing machine is illegally used of the present invention, method shown in Fig. 2 is included in the center of unblanking (1) a plurality of Status Flags is set, corresponding user's computer (2) of each Status Flag and mobile phone (3), each Status Flag is to be in " locking " state usually, and the user sends unlock instruction by mobile phone (3) to the center of unblanking (1), and the pairing Status Flag of this mobile phone (3) can be set is " unblanking " state; And, at computing machine (2) monitoring software (201) is set, this monitoring software (201) is used for the running of supervisory control comuter (2), when finding that computing machine (2) execution is subjected to policer operation, monitoring software (201) suspends this and is subjected to policer operation, and inquire about the state of the corresponding Status Flag of this computing machine (2) to the center of unblanking (1) by internet (5), when only the state that (1) answers this Status Flag at the center of unblanking is for " unblanking ", monitoring software (201) just allow computing machine to continue execution this is subjected to policer operation.
In addition, after the center of unblanking (1) receives the unlock instruction that mobile phone (3) sends, the pairing Status Flag of this mobile phone of center (1) (3) of unblanking is set to one period fixed time of " unblanking " state (for example the fixed time is 5 minutes), and the fixed time center (1) of unblanking later is provided with this Status Flag automatically to reply and is " locking " state.Like this restriction effective time of at every turn unblanking, can strengthen the security of system and method for the present invention.In addition, further improvement of the present invention, be to be inquired about its state by computing machine (2) at described Status Flag, unblank center (1) after computing machine (2) is replied the state of this Status Flag, automatically this Status Flag is provided with to reply and is " locking " state, can guarantee like this that unlock operation each time can only be carried out once is subjected to policer operation, can further improve the security of system and method for the present invention.
In this manual, describedly comprised by policer operation: the protected data in log into thr computer (2) and/or the access computer (2) and/or duplicate protected data and/or the protected data in the storage computation machine (2) in the computing machine (2) and/or revise protected data in the computing machine (2).In addition; the user can also be set at protected data with the partial data in the computing machine (2); before these protected datas conducted interviews, duplicate, store, modification etc. operated; user's Status Flag that this computing machine (2) is corresponding in advance is set to " unblanking " state, could conduct interviews to these protected datas, duplicates, stores, operation such as modification.
Continue to consult Fig. 2, the method shown in Fig. 2 also comprises the steps, is that the user uses its computing machine (2) to carry out the step that is subjected to policer operation, and concrete step is as follows:
1. the user uses a computer before (2) be subjected to policer operation, uses mobile phone (3) to send a telegraph the center of unblanking (1), puts through just hanging wire immediately of back;
The center (1) of unblanking is found out Status Flag that should mobile phone (3) telephone number from the telephone number of incoming call, this Status Flag is set to one period fixed time of " unblanking " state then, and this section fixed time later automatically this Status Flag be set to " locking " state;
2. the user is during this section fixed time, use a computer (2) be subjected to policer operation, monitoring software (201) in the computing machine (2) finds that computing machine (2) execution is subjected to policer operation, suspend this and be subjected to policer operation, inquire about the state of the corresponding Status Flag of this computing machine (2) then to the center of unblanking (1);
3. the state of the corresponding Status Flag of this computing machine (2) is found out at the center (1) of unblanking, because computing machine (2) is the state of this Status Flag of inquiry during this section fixed time, the center so unblank (1) is that " unblanking " status information replies to computing machine (2) with the state of this Status Flag, and the center (1) of unblanking then is provided with this Status Flag to reply and is " locking " state;
After computing machine (2) was received this status information of " unblanking ", monitoring software (201) allowed to continue to carry out this and is subjected to policer operation;
4. send short messages and notify this computing machine of user (2) to carry out once being subjected to policer operation to user mobile phone (3) in the center (1) of unblanking.
Below described the feature of system and method for the present invention in detail, though the present invention is illustrated with the above embodiments, but the present invention is not limited to this, under the situation of the scope of not leaving spirit of the present invention and appended claims, can do multiple change and variation.For example system and method for the present invention is combined with the service of computing machine anti-virus software; the center (1) of will unblanking is incorporated in the server host that the anti-virus software update service is provided; and monitoring software (201) is incorporated in the anti-virus software; make anti-virus software except protecting computing machine, also can provide to prevent that computing machine from illegally being used by the people not by virus infections.Because anti-virus software has generally all possessed monitor operating system and the function by network and server line, as long as do some modifications at anti-virus software, and in server host, set up some telephone lines and relevant device, just can realize purpose of the present invention well.
The center of unblanking of will sending a telegraph in advance of the present invention could computed security system and method, can protect computing machine illegally not used by other people.Enforcement of the present invention is to computer user's ten minutes benifit.

Claims (10)

1. security system that prevents that computing machine from illegally being used, it is characterized in that, described system includes the center of unblanking (1), each user's computer (2) and mobile phone (3), wherein, the center (1) of unblanking is provided with a plurality of Status Flags, corresponding user's computer (2) of each Status Flag and mobile phone (3), each Status Flag is to be in " locking " state usually, and the user sends unlock instruction by mobile phone (3) to the center of unblanking (1), and the pairing Status Flag of this mobile phone (3) can be set is " unblanking " state; And, in computing machine (2), be provided with and comprise monitoring software (201), this monitoring software (201) is used for the running of supervisory control comuter (2), when finding that computing machine (2) execution is subjected to policer operation, monitoring software (201) suspends this and is subjected to policer operation, and inquire about the state of the corresponding Status Flag of this computing machine (2) to the center of unblanking (1), when only the state that (1) answers this Status Flag at the center of unblanking is for " unblanking ", monitoring software (201) just allow computing machine to continue execution this is subjected to policer operation.
2. security method that prevents that computing machine from illegally being used, it is characterized in that, described method is included in the center of unblanking (1) a plurality of Status Flags is set, corresponding user's computer (2) of each Status Flag and mobile phone (3), each Status Flag is to be in " locking " state usually, and the user sends unlock instruction by mobile phone (3) to the center of unblanking (1), and the pairing Status Flag of this mobile phone (3) can be set is " unblanking " state; And, at computing machine (2) monitoring software (201) is set, this monitoring software (201) is used for the running of supervisory control comuter (2), when finding that computing machine (2) execution is subjected to policer operation, monitoring software (201) suspends this and is subjected to policer operation, and inquire about the state of the corresponding Status Flag of this computing machine (2) to the center of unblanking (1), when only the state that (1) answers this Status Flag at the center of unblanking is for " unblanking ", monitoring software (201) just allow computing machine to continue execution this is subjected to policer operation.
3. the security method that prevents that computing machine from illegally being used as claimed in claim 2; it is characterized in that, describedly comprised by policer operation: the protected data in log into thr computer (2) and/or the access computer (2) and/or duplicate protected data and/or the protected data in the storage computation machine (2) in the computing machine (2) and/or revise protected data in the computing machine (2).
4. the security method that prevents that computing machine from illegally being used as claimed in claim 2, it is characterized in that, after the center of unblanking (1) receives the unlock instruction that mobile phone (3) sends, the pairing Status Flag of this mobile phone of center (1) (3) of unblanking is set to one period fixed time of " unblanking " state, and the fixed time center (1) of unblanking later is provided with this Status Flag automatically to reply and is " locking " state.
5. the security method that prevents that computing machine from illegally being used as claimed in claim 2, it is characterized in that, when described Status Flag is inquired about its state by computing machine (2), unblank center (1) after computing machine (2) is replied the state of this Status Flag, automatically this Status Flag is provided with answer and is " locking " state.
6. as each described security method that prevents that computing machine from illegally being used of claim 2 to 5, it is characterized in that described method is used mobile phone (3) to send a telegraph calling with the user and unblanked center (1) as unlock instruction.
7. as each described security method that prevents that computing machine from illegally being used of claim 2 to 5, it is characterized in that described method adopts unlocking cipher that user behind the incoming call of mobile phone (3) of center (1) listening user of unblanking imported at mobile phone (3) as unlock instruction.
8. as each described security method that prevents that computing machine from illegally being used of claim 2 to 5, it is characterized in that described method is used mobile phone (3) to send to the center of unblanking (1) with the user to include the note of unlocking cipher or multimedia message as unlock instruction.
9. as each described security method that prevents that computing machine from illegally being used of claim 2 to 5, it is characterized in that described method is used mobile phone (3) to send to the e-mail that the center of unblanking (1) includes unlocking cipher with the user to be unlock instruction.
10. as each described security method that prevents that computing machine from illegally being used of claim 2 to 5, it is characterized in that described method also comprises the steps, is that the user uses its computing machine (2) to carry out the step that is subjected to policer operation, concrete step is as follows:
1. the user uses a computer before (2) be subjected to policer operation, uses mobile phone (3) to send a telegraph the center of unblanking (1), puts through just hanging wire immediately of back;
The center (1) of unblanking is found out Status Flag that should mobile phone (3) telephone number from the telephone number of incoming call, this Status Flag is set to one period fixed time of " unblanking " state then, and this section fixed time later automatically this Status Flag be set to " locking " state;
2. the user is during this section fixed time, use a computer (2) be subjected to policer operation, monitoring software (201) in the computing machine (2) finds that computing machine (2) execution is subjected to policer operation, suspend this and be subjected to policer operation, inquire about the state of the corresponding Status Flag of this computing machine (2) then to the center of unblanking (1);
3. the state of the corresponding Status Flag of this computing machine (2) is found out at the center (1) of unblanking, because computing machine (2) is the state of this Status Flag of inquiry during this section fixed time, the center so unblank (1) is that " unblanking " status information replies to computing machine (2) with the state of this Status Flag, and the center (1) of unblanking then is provided with this Status Flag to reply and is " locking " state;
After computing machine (2) was received this status information of " unblanking ", monitoring software (201) allowed to continue to carry out this and is subjected to policer operation;
4. send short messages and notify this computing machine of user (2) to carry out once being subjected to policer operation to user mobile phone (3) in the center (1) of unblanking.
CN200910189161.9A 2009-12-24 2009-12-24 Will send a telegraph center of unblanking in advance could computed security system and method Expired - Fee Related CN102110194B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910189161.9A CN102110194B (en) 2009-12-24 2009-12-24 Will send a telegraph center of unblanking in advance could computed security system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910189161.9A CN102110194B (en) 2009-12-24 2009-12-24 Will send a telegraph center of unblanking in advance could computed security system and method

Publications (2)

Publication Number Publication Date
CN102110194A true CN102110194A (en) 2011-06-29
CN102110194B CN102110194B (en) 2016-02-03

Family

ID=44174354

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910189161.9A Expired - Fee Related CN102110194B (en) 2009-12-24 2009-12-24 Will send a telegraph center of unblanking in advance could computed security system and method

Country Status (1)

Country Link
CN (1) CN102110194B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050257050A1 (en) * 2004-03-23 2005-11-17 International Business Machines Corporation System, method and program product for controlling access to computer system
CN101188499A (en) * 2007-11-26 2008-05-28 唐荣华 A secure protection method and system with dual identity authentication
CN101309140A (en) * 2007-05-18 2008-11-19 游戏新干线科技股份有限公司 Account anti-theft system having communication mechanism

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050257050A1 (en) * 2004-03-23 2005-11-17 International Business Machines Corporation System, method and program product for controlling access to computer system
CN101309140A (en) * 2007-05-18 2008-11-19 游戏新干线科技股份有限公司 Account anti-theft system having communication mechanism
CN101188499A (en) * 2007-11-26 2008-05-28 唐荣华 A secure protection method and system with dual identity authentication

Also Published As

Publication number Publication date
CN102110194B (en) 2016-02-03

Similar Documents

Publication Publication Date Title
CN101404056B (en) Software protection method, apparatus and equipment
CN109088866B (en) Multi-cloud platform unified identity authentication method and device based on alliance chain
CN104468611B (en) The data safety processing method and device switched based on dual system
CN1852094B (en) Method and system for protecting account of network business user
CN102271035B (en) Password transmission method and device
CN107113613B (en) Server, mobile terminal, network real-name authentication system and method
CN101984692A (en) Method and device for preventing malicious software from transmitting data
JP4692776B2 (en) Method for protecting SIP-based applications
CN110636505A (en) Method and system for protecting account security
US20110135073A1 (en) Methods to improve fraud detection on conference calling systems by detection of conference moderator password utilization from a non-authorized device
CN113079258A (en) Number privacy protection method, network device and computer storage medium
CN101252596A (en) Method and system for protecting number information privacy
CN102483786A (en) Method and system for restoring domain management
CN108737390A (en) Protect the authentication method and system of user name privacy
CN104980338A (en) Enterprise instant messaging security application system based on mobile intelligent terminal
CN105228156B (en) A kind of method for processing communication messages, apparatus and system
CN109981677A (en) A kind of credit management method and device
Hamandi et al. Android SMS botnet: a new perspective
KR102072134B1 (en) Message transmission apparatus, message server and message receipt appratus
CN107509180A (en) A kind of method, storage device and the mobile terminal of automatic Encrypted short message
CN105323254A (en) A mail encryption system based on a domestic commercial cipher code chip and an implementation method thereof
CN102842000A (en) Method for realizing common software registration system
Soghoian The spies we trust: Third party service providers and law enforcement surveillance
CN102110194B (en) Will send a telegraph center of unblanking in advance could computed security system and method
Bhatt et al. Study of Indian Banks Websites for Cyber Crime Safety Mechanism

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: The International Chamber of Commerce building, No. 2 Beijing 100035 Xicheng District huapichang alley 16

Applicant after: Huang Jinfu

Address before: 100032, Beijing, Financial Street, Xicheng District No. 27 investment Plaza, block B, 19

Applicant before: Huang Jinfu

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160203

Termination date: 20171224

CF01 Termination of patent right due to non-payment of annual fee