CN102110194B - Will send a telegraph center of unblanking in advance could computed security system and method - Google Patents
Will send a telegraph center of unblanking in advance could computed security system and method Download PDFInfo
- Publication number
- CN102110194B CN102110194B CN200910189161.9A CN200910189161A CN102110194B CN 102110194 B CN102110194 B CN 102110194B CN 200910189161 A CN200910189161 A CN 200910189161A CN 102110194 B CN102110194 B CN 102110194B
- Authority
- CN
- China
- Prior art keywords
- computing machine
- unblanking
- center
- status flag
- state
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
One will send a telegraph unblank the center computed security system of ability and method in advance, comprise the center of unblanking (1), subscriber computer (2) and mobile phone (3), center (1) of unblanking is provided with the Status Flag of respective user computing machine (2) and mobile phone (3), Status Flag is locking state usually, and user sends out unlock instruction by mobile phone (3) to the center of unblanking (1) can be set to unlocking condition; Computing machine (2) is provided with monitoring software (201), when computing machine (2) performs monitored operation, monitoring software (201), to the Status Flag state of the center of unblanking (1) inquiry correspondence, just allows computing machine to perform this monitored operation when state is for unblanking.The present invention can combine with anti-virus software service; center (1) of unblanking is incorporated into anti-virus update service main frame; monitoring software (201) is incorporated into anti-virus software; make anti-virus software except protection calculation machine is not by virus infections, also prevent computing machine by people's illegal use.
Description
[technical field]
The present invention relates to computing machine safety technique field, particularly relate to one and will send a telegraph unblank the center computed security system of ability and method in advance.
[background technology]
Along with popularizing of computer technology; computer application is more and more extensive; computing machine has become the indispensable common equipment on people's live and work; the security of computing machine also more and more receives publicity; more especially store the computing machine of privacy of the individual or confidential information, in order to the safety of protection calculation machine internal information, these computing machines are all provided with cryptoguard usually; input after correct login password logins, could computing machine be used.But some unprincipled fellows; that steals computer user by all means logins password; then ignorant with when being absent from the scene when user; use is stolen the password fake user of logining of returning and is logined computing machine; carry out some lawbreaking activitiess; such as steal the important information in the important information in computing machine, destruction computing machine, even some viruses or the installation of wooden horse formula are wanted in computing machine; often loss without redemption is caused to user when finding to user; how protection calculation machine is not by other people illegal use, and being one has problem to be solved.
[summary of the invention]
Object of the present invention, is to provide one to send a telegraph in advance and unblanks that center could computed security system and method, to realize the application preventing computing machine to be illegally used.
The object of the present invention is achieved like this, adopt a kind of like this security system preventing computing machine to be illegally used, it is characterized in that, described system includes the center of unblanking (1), the computing machine (2) of each user and mobile phone (3), wherein, center (1) of unblanking is provided with multiple Status Flag, the computing machine (2) of the corresponding user of each Status Flag and mobile phone (3), each Status Flag is be in " locking " state usually, it is " unblanking " state that user sends the unlock instruction Status Flag that can arrange corresponding to this mobile phone (3) by mobile phone (3) to the center of unblanking (1), and, be provided with in computing machine (2) and comprise monitoring software (201), this monitoring software (201) is for the running of supervisory control comuter (2), when finding that computing machine (2) performs monitored operation, monitoring software (201) suspends this monitored operation, and the state of Status Flag corresponding to this computing machine (2) is inquired about to the center of unblanking (1), only when the state that the center of unblanking (1) answers this Status Flag is " unblanking ", monitoring software (201) just allows computing machine to continue to perform this monitored operation.
And, also adopt a kind of like this security method preventing computing machine to be illegally used, it is characterized in that, described method is included in the center of unblanking (1) and arranges multiple Status Flag, the computing machine (2) of the corresponding user of each Status Flag and mobile phone (3), each Status Flag is be in " locking " state usually, and it is " unblanking " state that user sends the unlock instruction Status Flag that can arrange corresponding to this mobile phone (3) by mobile phone (3) to the center of unblanking (1); And, at computing machine (2), monitoring software (201) is set, this monitoring software (201) is for the running of supervisory control comuter (2), when finding that computing machine (2) performs monitored operation, monitoring software (201) suspends this monitored operation, and the state of Status Flag corresponding to this computing machine (2) is inquired about to the center of unblanking (1), only when the state that the center of unblanking (1) answers this Status Flag is " unblanking ", monitoring software (201) just allows computing machine to continue to perform this monitored operation.
In this manual, described monitored operation comprises: the protected data in the protected data in log into thr computer (2) and/or access computer (2) and/or the protected data copied in computing machine (2) and/or the protected data stored in computing machine (2) and/or amendment computing machine (2).
So just achieve object of the present invention.
Of the present invention prevent computing machine to be illegally used security system and method, the safety of the computing machine (2) of user can be ensured, before each use computing machine (2) carries out monitored operation, user will use mobile phone (3) to send effective unlock instruction to the center of unblanking (1) in advance and the Status Flag that this computing machine (2) is corresponding is set to " unblanking " state, this the monitored operation of ability successful execution, even if the login password of user has been stolen by people, the mobile phone of user (3) is not had just cannot " to unblank ", also computing machine (2) just cannot be used to carry out monitored operation.
[accompanying drawing explanation]
Fig. 1 is the schematic illustration of the security system preventing computing machine to be illegally used of the present invention;
Fig. 2 is the step schematic illustration of the security method preventing computing machine to be illegally used of the present invention.
In figure, the system that identical digitized representation is identical, device, component devices, the numeral of method step circle and the straight line of band arrow marked.Accompanying drawing is schematic, in order to the principal character of system and method for the present invention to be described.
[embodiment]
Below in conjunction with accompanying drawing, system and method for the present invention is described in further detail.
Consult Fig. 1, Fig. 1 is the schematic illustration of the security system preventing computing machine to be illegally used of the present invention, system shown in Fig. 1 includes the center of unblanking (1), the computing machine (2) of each user and mobile phone (3), wherein, center (1) of unblanking is provided with multiple Status Flag, the computing machine (2) of the corresponding user of each Status Flag and mobile phone (3), each Status Flag is be in " locking " state usually, it is " unblanking " state that user sends the unlock instruction Status Flag that can arrange corresponding to this mobile phone (3) by mobile phone (3) to the center of unblanking (1), and, be provided with in computing machine (2) and comprise monitoring software (201), this monitoring software (201) is for the running of supervisory control comuter (2), when finding that computing machine (2) performs monitored operation, monitoring software (201) suspends this monitored operation, and the state of Status Flag corresponding to this computing machine (2) is inquired about to the center of unblanking (1), only when the state that the center of unblanking (1) answers this Status Flag is " unblanking ", monitoring software (201) just allows computing machine to continue to perform this monitored operation.
In arranging, center (1) of unblanking is provided with the circuit and the device of device and connecting Internet network (5) that connect telephone network (4), and be provided with multiple Status Flag being used to indicate Account Status, the computing machine (2) of the corresponding user of each Status Flag difference and his mobile phone (3), user will arrange a monitoring software (201) and arrange digital certificates in his computing machine (2), these digital certificates are exactly the identity documents of the computing machine (2) of user, also other embodiment can be adopted to replace digital certificates as the identity documents of the computing machine (2) of user, user needs to register mobile phone (3) telephone number of oneself and the identity documents of computing machine (2) in the center of unblanking (1), a Status Flag is distributed to user by the center of unblanking (1), mobile phone (3) telephone number of user is bound with this Status Flag mutually with the identity documents of computing machine (2).In addition, user also will select the unlock instruction of setting one for unblanking, can adopt user use mobile phone (3) send a telegraph calling unblank center (1) as unlock instruction or employing unblank center (1) listening user mobile phone (3) incoming call after the unlocking cipher that inputs at mobile phone (3) of user as unlock instruction or user use mobile phone (3) be sent to the center of unblanking (1) include the note of unlocking cipher or multimedia message as unlock instruction or use mobile phone (3) to be sent to user e-mail that the center of unblanking (1) includes unlocking cipher is unlock instruction etc. and so on mode, the center of unblanking (1) can be sent to as unlock instruction.Before later user uses computing machine (2) to perform monitored operation, user will use mobile phone (3) to send effective unlock instruction to the center of unblanking (1) in advance and the Status Flag that this computing machine (2) is corresponding is set to " unblanking " state, and the monitoring software (201) in computing machine (2) just allows to perform this monitored operation.
Consult Fig. 2, Fig. 2 is the step schematic illustration of the security method preventing computing machine to be illegally used of the present invention, method shown in Fig. 2 is included in the center of unblanking (1) and arranges multiple Status Flag, the computing machine (2) of the corresponding user of each Status Flag and mobile phone (3), each Status Flag is be in " locking " state usually, and it is " unblanking " state that user sends the unlock instruction Status Flag that can arrange corresponding to this mobile phone (3) by mobile phone (3) to the center of unblanking (1); And, at computing machine (2), monitoring software (201) is set, this monitoring software (201) is for the running of supervisory control comuter (2), when finding that computing machine (2) performs monitored operation, monitoring software (201) suspends this monitored operation, and inquired about the state of Status Flag corresponding to this computing machine (2) to the center of unblanking (1) by internet (5), only when the state that the center of unblanking (1) answers this Status Flag is " unblanking ", monitoring software (201) just allows computing machine to continue to perform this monitored operation.
In addition, after the center of unblanking (1) receives the unlock instruction that mobile phone (3) sends, Status Flag corresponding to this mobile phone (3) is set to " unblanking " state one section of fixed time (the such as fixed time is 5 minutes) by center (1) of unblanking, and this Status Flag arranges by center (1) of unblanking after the fixed time automatically replys as " locking " state.The effective time that such restriction is unblanked at every turn, the security of system and method for the present invention can be strengthened.In addition, further improvement of the present invention, inquired about its state at described Status Flag by computing machine (2), unblank after center (1) replys the state of this Status Flag to computing machine (2), automatically this Status Flag is arranged and reply as " locking " state, can ensure that unlock operation each time can only perform once monitored operation, can further improve the security of system and method for the present invention like this.
In this manual, described monitored operation comprises: the protected data in the protected data in log into thr computer (2) and/or access computer (2) and/or the protected data copied in computing machine (2) and/or the protected data stored in computing machine (2) and/or amendment computing machine (2).In addition; partial data in computing machine (2) can also be set as protected data by user; before conduct interviews to these protected datas, copy, store, amendment etc. operates; Status Flag corresponding for this computing machine (2) will be set to " unblanking " state by user in advance, could conduct interviews, copy, store, the operation such as amendment to these protected datas.
Continue to consult Fig. 2, the method shown in Fig. 2 also comprises the steps, be that user uses its computing machine (2) to perform the step of monitored operation, concrete step is as follows:
1., before user uses computing machine (2) to carry out monitored operation, use mobile phone (3) to send a telegraph the center of unblanking (1), just can hanging wire immediately after putting through;
Center (1) of unblanking is found out should the Status Flag of mobile phone (3) telephone number from the telephone number of incoming call, then this Status Flag is set to one period of fixed time of " unblanking " state, and automatically this Status Flag is set to " locking " state after this period of fixed time;
2. user is during this period of fixed time, computing machine (2) is used to carry out monitored operation, monitoring software (201) in computing machine (2) finds that computing machine (2) performs monitored operation, suspend this monitored operation, then inquire about the state of Status Flag corresponding to this computing machine (2) to the center of unblanking (1);
3. the state of Status Flag corresponding to this computing machine (2) is found out at center (1) of unblanking, because computing machine (2) is the state of inquiring about this Status Flag during this period of fixed time, so unblank, the state of this Status Flag i.e. " unblanking " status information is replied to computing machine (2) by center (1), and this Status Flag arranges by center (1) of then unblanking replys as " locking " state;
After computing machine (2) receives this status information of " unblanking ", monitoring software (201) allows to continue to perform this monitored operation;
4. send short messages and notify that this computing machine of user (2) has carried out once monitored operation to user mobile phone (3) in center (1) of unblanking.
Below the feature of system and method for the present invention has been described in detail, although the present invention is illustrated with the above embodiments, but the present invention is not limited to this, when not leaving the scope of spirit of the present invention and appended claims, multiple change and change can be done.Such as system and method for the present invention is combined with the service of computing machine anti-virus software; center (1) of unblanking is incorporated in the server host providing anti-virus software update service; and monitoring software (201) is incorporated in anti-virus software; make anti-virus software except can protection calculation machine not by virus infections, also can provide and prevent computing machine by people's illegal use.Because anti-virus software has generally all possessed monitor operating system and the function by network and server line, as long as do some amendments at anti-virus software, and in server host, set up some telephone lines and relevant device, just can realize object of the present invention well.
Center of unblanking of will sending a telegraph in advance of the present invention could computed security system and method, can protection calculation machine not by other people illegal use.Enforcement of the present invention, to computer user's very benifit.
Claims (10)
1. the security system preventing computing machine to be illegally used, it is characterized in that, described system includes the center of unblanking (1), the computing machine (2) of each user and mobile phone (3), wherein, center (1) of unblanking is provided with multiple Status Flag, the computing machine (2) of the corresponding user of each Status Flag and mobile phone (3), each Status Flag is be in " locking " state usually, and it is " unblanking " state that user sends the unlock instruction Status Flag arranged corresponding to this mobile phone (3) by mobile phone (3) to the center of unblanking (1); And, be provided with in computing machine (2) and comprise monitoring software (201), this monitoring software (201) is for the running of supervisory control comuter (2), when finding that computing machine (2) performs monitored operation, monitoring software (201) suspends this monitored operation, and the state of Status Flag corresponding to this computing machine (2) is inquired about to the center of unblanking (1), only when the state that the center of unblanking (1) answers this Status Flag is " unblanking ", monitoring software (201) just allows computing machine to continue to perform this monitored operation.
2. the security method preventing computing machine to be illegally used, it is characterized in that, described method is included in the center of unblanking (1) and arranges multiple Status Flag, the computing machine (2) of the corresponding user of each Status Flag and mobile phone (3), each Status Flag is be in " locking " state usually, and it is " unblanking " state that user sends the unlock instruction Status Flag arranged corresponding to this mobile phone (3) by mobile phone (3) to the center of unblanking (1); And, at computing machine (2), monitoring software (201) is set, this monitoring software (201) is for the running of supervisory control comuter (2), when finding that computing machine (2) performs monitored operation, monitoring software (201) suspends this monitored operation, and the state of Status Flag corresponding to this computing machine (2) is inquired about to the center of unblanking (1), only when the state that the center of unblanking (1) answers this Status Flag is " unblanking ", monitoring software (201) just allows computing machine to continue to perform this monitored operation.
3. prevent the security method that computing machine is illegally used as claimed in claim 2; it is characterized in that, described monitored operation comprises: the protected data in the protected data in access computer (2) and/or the protected data copied in computing machine (2) and/or the protected data stored in computing machine (2) and/or amendment computing machine (2).
4. prevent the security method that computing machine is illegally used as claimed in claim 2, it is characterized in that, after the center of unblanking (1) receives the unlock instruction that mobile phone (3) sends, Status Flag corresponding to this mobile phone (3) is set to one period of fixed time of " unblanking " state by center (1) of unblanking, and this Status Flag arranges by center (1) of unblanking after the fixed time automatically replys as " locking " state.
5. prevent the security method that computing machine is illegally used as claimed in claim 2, it is characterized in that, when described Status Flag is inquired about its state by computing machine (2), unblank after center (1) replys the state of this Status Flag to computing machine (2), automatically this Status Flag to be arranged and reply as " locking " state.
6. the security method preventing computing machine to be illegally used as described in any one of claim 2 to 5, is characterized in that, described method uses mobile phone (3) to send a telegraph calling using user and unblanks center (1) as unlock instruction.
7. the security method preventing computing machine to be illegally used as described in any one of claim 2 to 5, it is characterized in that, the unlocking cipher that after described method adopts the incoming call of the mobile phone (3) of center (1) listening user of unblanking, user inputs at mobile phone (3) is as unlock instruction.
8. the security method preventing computing machine to be illegally used as described in any one of claim 2 to 5, it is characterized in that, described method uses mobile phone (3) to be sent to the center of unblanking (1) using user to include the note of unlocking cipher or multimedia message as unlock instruction.
9. the security method preventing computing machine to be illegally used as described in any one of claim 2 to 5, it is characterized in that, described method uses mobile phone (3) to be sent to the center of unblanking (1) with user to include the e-mail of unlocking cipher for unlock instruction.
10. the security method preventing computing machine to be illegally used as described in any one of claim 2 to 5, it is characterized in that, described method also comprises the steps, be that user uses its computing machine (2) to perform the step of monitored operation, concrete step is as follows:
1., before user uses computing machine (2) to carry out monitored operation, use mobile phone (3) to send a telegraph the center of unblanking (1), just can hanging wire immediately after putting through;
Center (1) of unblanking is found out should the Status Flag of mobile phone (3) telephone number from the telephone number of incoming call, then this Status Flag is set to one period of fixed time of " unblanking " state, and automatically this Status Flag is set to " locking " state after this period of fixed time;
2. user is during this period of fixed time, computing machine (2) is used to carry out monitored operation, monitoring software (201) in computing machine (2) finds that computing machine (2) performs monitored operation, suspend this monitored operation, then inquire about the state of Status Flag corresponding to this computing machine (2) to the center of unblanking (1);
3. the state of Status Flag corresponding to this computing machine (2) is found out at center (1) of unblanking, because computing machine (2) is the state of inquiring about this Status Flag during this period of fixed time, so unblank, the state of this Status Flag i.e. " unblanking " status information is replied to computing machine (2) by center (1), and this Status Flag arranges by center (1) of then unblanking replys as " locking " state;
After computing machine (2) receives this status information of " unblanking ", monitoring software (201) allows to continue to perform this monitored operation;
4. send short messages and notify that this computing machine of user (2) has carried out once monitored operation to user mobile phone (3) in center (1) of unblanking.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910189161.9A CN102110194B (en) | 2009-12-24 | 2009-12-24 | Will send a telegraph center of unblanking in advance could computed security system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910189161.9A CN102110194B (en) | 2009-12-24 | 2009-12-24 | Will send a telegraph center of unblanking in advance could computed security system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102110194A CN102110194A (en) | 2011-06-29 |
CN102110194B true CN102110194B (en) | 2016-02-03 |
Family
ID=44174354
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200910189161.9A Expired - Fee Related CN102110194B (en) | 2009-12-24 | 2009-12-24 | Will send a telegraph center of unblanking in advance could computed security system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102110194B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101188499A (en) * | 2007-11-26 | 2008-05-28 | 唐荣华 | A secure protection method and system with dual identity authentication |
CN101309140A (en) * | 2007-05-18 | 2008-11-19 | 游戏新干线科技股份有限公司 | Account anti-theft system having communication mechanism |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7870376B2 (en) * | 2004-03-23 | 2011-01-11 | International Business Machines Corporation | System, method and program product for controlling access to computer system |
-
2009
- 2009-12-24 CN CN200910189161.9A patent/CN102110194B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101309140A (en) * | 2007-05-18 | 2008-11-19 | 游戏新干线科技股份有限公司 | Account anti-theft system having communication mechanism |
CN101188499A (en) * | 2007-11-26 | 2008-05-28 | 唐荣华 | A secure protection method and system with dual identity authentication |
Also Published As
Publication number | Publication date |
---|---|
CN102110194A (en) | 2011-06-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104468611B (en) | The data safety processing method and device switched based on dual system | |
WO2019047513A1 (en) | Internet defense method and authentication server | |
CN103647784B (en) | A kind of method and apparatus of public and private isolation | |
CN107113613B (en) | Server, mobile terminal, network real-name authentication system and method | |
CN101404056A (en) | Software protection method, apparatus and equipment | |
US20090216795A1 (en) | System and method for detecting and blocking phishing attacks | |
US9245118B2 (en) | Methods for identifying key logging activities with a portable device and devices thereof | |
Atanassov et al. | Mobile device threat: Malware | |
CN113079258A (en) | Number privacy protection method, network device and computer storage medium | |
US10469535B1 (en) | Systems and methods for network security | |
CN104980338A (en) | Enterprise instant messaging security application system based on mobile intelligent terminal | |
CN109981677A (en) | A kind of credit management method and device | |
CN107509180A (en) | A kind of method, storage device and the mobile terminal of automatic Encrypted short message | |
CN102110194B (en) | Will send a telegraph center of unblanking in advance could computed security system and method | |
KR101619928B1 (en) | Remote control system of mobile | |
CN106878233A (en) | The read method of secure data, security server, terminal and system | |
CN111193706B (en) | Identity verification method and device | |
CN102124767B (en) | A kind of method and apparatus for providing identity Confidentiality protection for user of communication terminal | |
CN107864136A (en) | A kind of stolen method of anti-locking system short message service | |
CN110768972B (en) | Security verification method and router | |
Igor et al. | Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals. | |
CN103812843A (en) | Authentication method and system based on Web Service | |
WO2006065029A1 (en) | Security service method of data | |
CN111737725A (en) | User marking method, device, server and storage medium | |
CN105871788A (en) | Server login password generation method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C53 | Correction of patent for invention or patent application | ||
CB02 | Change of applicant information |
Address after: The International Chamber of Commerce building, No. 2 Beijing 100035 Xicheng District huapichang alley 16 Applicant after: Huang Jinfu Address before: 100032, Beijing, Financial Street, Xicheng District No. 27 investment Plaza, block B, 19 Applicant before: Huang Jinfu |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160203 Termination date: 20171224 |