CN102110194B - Will send a telegraph center of unblanking in advance could computed security system and method - Google Patents

Will send a telegraph center of unblanking in advance could computed security system and method Download PDF

Info

Publication number
CN102110194B
CN102110194B CN200910189161.9A CN200910189161A CN102110194B CN 102110194 B CN102110194 B CN 102110194B CN 200910189161 A CN200910189161 A CN 200910189161A CN 102110194 B CN102110194 B CN 102110194B
Authority
CN
China
Prior art keywords
computing machine
unblanking
center
status flag
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200910189161.9A
Other languages
Chinese (zh)
Other versions
CN102110194A (en
Inventor
黄金富
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN200910189161.9A priority Critical patent/CN102110194B/en
Publication of CN102110194A publication Critical patent/CN102110194A/en
Application granted granted Critical
Publication of CN102110194B publication Critical patent/CN102110194B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

One will send a telegraph unblank the center computed security system of ability and method in advance, comprise the center of unblanking (1), subscriber computer (2) and mobile phone (3), center (1) of unblanking is provided with the Status Flag of respective user computing machine (2) and mobile phone (3), Status Flag is locking state usually, and user sends out unlock instruction by mobile phone (3) to the center of unblanking (1) can be set to unlocking condition; Computing machine (2) is provided with monitoring software (201), when computing machine (2) performs monitored operation, monitoring software (201), to the Status Flag state of the center of unblanking (1) inquiry correspondence, just allows computing machine to perform this monitored operation when state is for unblanking.The present invention can combine with anti-virus software service; center (1) of unblanking is incorporated into anti-virus update service main frame; monitoring software (201) is incorporated into anti-virus software; make anti-virus software except protection calculation machine is not by virus infections, also prevent computing machine by people's illegal use.

Description

Will send a telegraph center of unblanking in advance could computed security system and method
[technical field]
The present invention relates to computing machine safety technique field, particularly relate to one and will send a telegraph unblank the center computed security system of ability and method in advance.
[background technology]
Along with popularizing of computer technology; computer application is more and more extensive; computing machine has become the indispensable common equipment on people's live and work; the security of computing machine also more and more receives publicity; more especially store the computing machine of privacy of the individual or confidential information, in order to the safety of protection calculation machine internal information, these computing machines are all provided with cryptoguard usually; input after correct login password logins, could computing machine be used.But some unprincipled fellows; that steals computer user by all means logins password; then ignorant with when being absent from the scene when user; use is stolen the password fake user of logining of returning and is logined computing machine; carry out some lawbreaking activitiess; such as steal the important information in the important information in computing machine, destruction computing machine, even some viruses or the installation of wooden horse formula are wanted in computing machine; often loss without redemption is caused to user when finding to user; how protection calculation machine is not by other people illegal use, and being one has problem to be solved.
[summary of the invention]
Object of the present invention, is to provide one to send a telegraph in advance and unblanks that center could computed security system and method, to realize the application preventing computing machine to be illegally used.
The object of the present invention is achieved like this, adopt a kind of like this security system preventing computing machine to be illegally used, it is characterized in that, described system includes the center of unblanking (1), the computing machine (2) of each user and mobile phone (3), wherein, center (1) of unblanking is provided with multiple Status Flag, the computing machine (2) of the corresponding user of each Status Flag and mobile phone (3), each Status Flag is be in " locking " state usually, it is " unblanking " state that user sends the unlock instruction Status Flag that can arrange corresponding to this mobile phone (3) by mobile phone (3) to the center of unblanking (1), and, be provided with in computing machine (2) and comprise monitoring software (201), this monitoring software (201) is for the running of supervisory control comuter (2), when finding that computing machine (2) performs monitored operation, monitoring software (201) suspends this monitored operation, and the state of Status Flag corresponding to this computing machine (2) is inquired about to the center of unblanking (1), only when the state that the center of unblanking (1) answers this Status Flag is " unblanking ", monitoring software (201) just allows computing machine to continue to perform this monitored operation.
And, also adopt a kind of like this security method preventing computing machine to be illegally used, it is characterized in that, described method is included in the center of unblanking (1) and arranges multiple Status Flag, the computing machine (2) of the corresponding user of each Status Flag and mobile phone (3), each Status Flag is be in " locking " state usually, and it is " unblanking " state that user sends the unlock instruction Status Flag that can arrange corresponding to this mobile phone (3) by mobile phone (3) to the center of unblanking (1); And, at computing machine (2), monitoring software (201) is set, this monitoring software (201) is for the running of supervisory control comuter (2), when finding that computing machine (2) performs monitored operation, monitoring software (201) suspends this monitored operation, and the state of Status Flag corresponding to this computing machine (2) is inquired about to the center of unblanking (1), only when the state that the center of unblanking (1) answers this Status Flag is " unblanking ", monitoring software (201) just allows computing machine to continue to perform this monitored operation.
In this manual, described monitored operation comprises: the protected data in the protected data in log into thr computer (2) and/or access computer (2) and/or the protected data copied in computing machine (2) and/or the protected data stored in computing machine (2) and/or amendment computing machine (2).
So just achieve object of the present invention.
Of the present invention prevent computing machine to be illegally used security system and method, the safety of the computing machine (2) of user can be ensured, before each use computing machine (2) carries out monitored operation, user will use mobile phone (3) to send effective unlock instruction to the center of unblanking (1) in advance and the Status Flag that this computing machine (2) is corresponding is set to " unblanking " state, this the monitored operation of ability successful execution, even if the login password of user has been stolen by people, the mobile phone of user (3) is not had just cannot " to unblank ", also computing machine (2) just cannot be used to carry out monitored operation.
[accompanying drawing explanation]
Fig. 1 is the schematic illustration of the security system preventing computing machine to be illegally used of the present invention;
Fig. 2 is the step schematic illustration of the security method preventing computing machine to be illegally used of the present invention.
In figure, the system that identical digitized representation is identical, device, component devices, the numeral of method step circle and the straight line of band arrow marked.Accompanying drawing is schematic, in order to the principal character of system and method for the present invention to be described.
[embodiment]
Below in conjunction with accompanying drawing, system and method for the present invention is described in further detail.
Consult Fig. 1, Fig. 1 is the schematic illustration of the security system preventing computing machine to be illegally used of the present invention, system shown in Fig. 1 includes the center of unblanking (1), the computing machine (2) of each user and mobile phone (3), wherein, center (1) of unblanking is provided with multiple Status Flag, the computing machine (2) of the corresponding user of each Status Flag and mobile phone (3), each Status Flag is be in " locking " state usually, it is " unblanking " state that user sends the unlock instruction Status Flag that can arrange corresponding to this mobile phone (3) by mobile phone (3) to the center of unblanking (1), and, be provided with in computing machine (2) and comprise monitoring software (201), this monitoring software (201) is for the running of supervisory control comuter (2), when finding that computing machine (2) performs monitored operation, monitoring software (201) suspends this monitored operation, and the state of Status Flag corresponding to this computing machine (2) is inquired about to the center of unblanking (1), only when the state that the center of unblanking (1) answers this Status Flag is " unblanking ", monitoring software (201) just allows computing machine to continue to perform this monitored operation.
In arranging, center (1) of unblanking is provided with the circuit and the device of device and connecting Internet network (5) that connect telephone network (4), and be provided with multiple Status Flag being used to indicate Account Status, the computing machine (2) of the corresponding user of each Status Flag difference and his mobile phone (3), user will arrange a monitoring software (201) and arrange digital certificates in his computing machine (2), these digital certificates are exactly the identity documents of the computing machine (2) of user, also other embodiment can be adopted to replace digital certificates as the identity documents of the computing machine (2) of user, user needs to register mobile phone (3) telephone number of oneself and the identity documents of computing machine (2) in the center of unblanking (1), a Status Flag is distributed to user by the center of unblanking (1), mobile phone (3) telephone number of user is bound with this Status Flag mutually with the identity documents of computing machine (2).In addition, user also will select the unlock instruction of setting one for unblanking, can adopt user use mobile phone (3) send a telegraph calling unblank center (1) as unlock instruction or employing unblank center (1) listening user mobile phone (3) incoming call after the unlocking cipher that inputs at mobile phone (3) of user as unlock instruction or user use mobile phone (3) be sent to the center of unblanking (1) include the note of unlocking cipher or multimedia message as unlock instruction or use mobile phone (3) to be sent to user e-mail that the center of unblanking (1) includes unlocking cipher is unlock instruction etc. and so on mode, the center of unblanking (1) can be sent to as unlock instruction.Before later user uses computing machine (2) to perform monitored operation, user will use mobile phone (3) to send effective unlock instruction to the center of unblanking (1) in advance and the Status Flag that this computing machine (2) is corresponding is set to " unblanking " state, and the monitoring software (201) in computing machine (2) just allows to perform this monitored operation.
Consult Fig. 2, Fig. 2 is the step schematic illustration of the security method preventing computing machine to be illegally used of the present invention, method shown in Fig. 2 is included in the center of unblanking (1) and arranges multiple Status Flag, the computing machine (2) of the corresponding user of each Status Flag and mobile phone (3), each Status Flag is be in " locking " state usually, and it is " unblanking " state that user sends the unlock instruction Status Flag that can arrange corresponding to this mobile phone (3) by mobile phone (3) to the center of unblanking (1); And, at computing machine (2), monitoring software (201) is set, this monitoring software (201) is for the running of supervisory control comuter (2), when finding that computing machine (2) performs monitored operation, monitoring software (201) suspends this monitored operation, and inquired about the state of Status Flag corresponding to this computing machine (2) to the center of unblanking (1) by internet (5), only when the state that the center of unblanking (1) answers this Status Flag is " unblanking ", monitoring software (201) just allows computing machine to continue to perform this monitored operation.
In addition, after the center of unblanking (1) receives the unlock instruction that mobile phone (3) sends, Status Flag corresponding to this mobile phone (3) is set to " unblanking " state one section of fixed time (the such as fixed time is 5 minutes) by center (1) of unblanking, and this Status Flag arranges by center (1) of unblanking after the fixed time automatically replys as " locking " state.The effective time that such restriction is unblanked at every turn, the security of system and method for the present invention can be strengthened.In addition, further improvement of the present invention, inquired about its state at described Status Flag by computing machine (2), unblank after center (1) replys the state of this Status Flag to computing machine (2), automatically this Status Flag is arranged and reply as " locking " state, can ensure that unlock operation each time can only perform once monitored operation, can further improve the security of system and method for the present invention like this.
In this manual, described monitored operation comprises: the protected data in the protected data in log into thr computer (2) and/or access computer (2) and/or the protected data copied in computing machine (2) and/or the protected data stored in computing machine (2) and/or amendment computing machine (2).In addition; partial data in computing machine (2) can also be set as protected data by user; before conduct interviews to these protected datas, copy, store, amendment etc. operates; Status Flag corresponding for this computing machine (2) will be set to " unblanking " state by user in advance, could conduct interviews, copy, store, the operation such as amendment to these protected datas.
Continue to consult Fig. 2, the method shown in Fig. 2 also comprises the steps, be that user uses its computing machine (2) to perform the step of monitored operation, concrete step is as follows:
1., before user uses computing machine (2) to carry out monitored operation, use mobile phone (3) to send a telegraph the center of unblanking (1), just can hanging wire immediately after putting through;
Center (1) of unblanking is found out should the Status Flag of mobile phone (3) telephone number from the telephone number of incoming call, then this Status Flag is set to one period of fixed time of " unblanking " state, and automatically this Status Flag is set to " locking " state after this period of fixed time;
2. user is during this period of fixed time, computing machine (2) is used to carry out monitored operation, monitoring software (201) in computing machine (2) finds that computing machine (2) performs monitored operation, suspend this monitored operation, then inquire about the state of Status Flag corresponding to this computing machine (2) to the center of unblanking (1);
3. the state of Status Flag corresponding to this computing machine (2) is found out at center (1) of unblanking, because computing machine (2) is the state of inquiring about this Status Flag during this period of fixed time, so unblank, the state of this Status Flag i.e. " unblanking " status information is replied to computing machine (2) by center (1), and this Status Flag arranges by center (1) of then unblanking replys as " locking " state;
After computing machine (2) receives this status information of " unblanking ", monitoring software (201) allows to continue to perform this monitored operation;
4. send short messages and notify that this computing machine of user (2) has carried out once monitored operation to user mobile phone (3) in center (1) of unblanking.
Below the feature of system and method for the present invention has been described in detail, although the present invention is illustrated with the above embodiments, but the present invention is not limited to this, when not leaving the scope of spirit of the present invention and appended claims, multiple change and change can be done.Such as system and method for the present invention is combined with the service of computing machine anti-virus software; center (1) of unblanking is incorporated in the server host providing anti-virus software update service; and monitoring software (201) is incorporated in anti-virus software; make anti-virus software except can protection calculation machine not by virus infections, also can provide and prevent computing machine by people's illegal use.Because anti-virus software has generally all possessed monitor operating system and the function by network and server line, as long as do some amendments at anti-virus software, and in server host, set up some telephone lines and relevant device, just can realize object of the present invention well.
Center of unblanking of will sending a telegraph in advance of the present invention could computed security system and method, can protection calculation machine not by other people illegal use.Enforcement of the present invention, to computer user's very benifit.

Claims (10)

1. the security system preventing computing machine to be illegally used, it is characterized in that, described system includes the center of unblanking (1), the computing machine (2) of each user and mobile phone (3), wherein, center (1) of unblanking is provided with multiple Status Flag, the computing machine (2) of the corresponding user of each Status Flag and mobile phone (3), each Status Flag is be in " locking " state usually, and it is " unblanking " state that user sends the unlock instruction Status Flag arranged corresponding to this mobile phone (3) by mobile phone (3) to the center of unblanking (1); And, be provided with in computing machine (2) and comprise monitoring software (201), this monitoring software (201) is for the running of supervisory control comuter (2), when finding that computing machine (2) performs monitored operation, monitoring software (201) suspends this monitored operation, and the state of Status Flag corresponding to this computing machine (2) is inquired about to the center of unblanking (1), only when the state that the center of unblanking (1) answers this Status Flag is " unblanking ", monitoring software (201) just allows computing machine to continue to perform this monitored operation.
2. the security method preventing computing machine to be illegally used, it is characterized in that, described method is included in the center of unblanking (1) and arranges multiple Status Flag, the computing machine (2) of the corresponding user of each Status Flag and mobile phone (3), each Status Flag is be in " locking " state usually, and it is " unblanking " state that user sends the unlock instruction Status Flag arranged corresponding to this mobile phone (3) by mobile phone (3) to the center of unblanking (1); And, at computing machine (2), monitoring software (201) is set, this monitoring software (201) is for the running of supervisory control comuter (2), when finding that computing machine (2) performs monitored operation, monitoring software (201) suspends this monitored operation, and the state of Status Flag corresponding to this computing machine (2) is inquired about to the center of unblanking (1), only when the state that the center of unblanking (1) answers this Status Flag is " unblanking ", monitoring software (201) just allows computing machine to continue to perform this monitored operation.
3. prevent the security method that computing machine is illegally used as claimed in claim 2; it is characterized in that, described monitored operation comprises: the protected data in the protected data in access computer (2) and/or the protected data copied in computing machine (2) and/or the protected data stored in computing machine (2) and/or amendment computing machine (2).
4. prevent the security method that computing machine is illegally used as claimed in claim 2, it is characterized in that, after the center of unblanking (1) receives the unlock instruction that mobile phone (3) sends, Status Flag corresponding to this mobile phone (3) is set to one period of fixed time of " unblanking " state by center (1) of unblanking, and this Status Flag arranges by center (1) of unblanking after the fixed time automatically replys as " locking " state.
5. prevent the security method that computing machine is illegally used as claimed in claim 2, it is characterized in that, when described Status Flag is inquired about its state by computing machine (2), unblank after center (1) replys the state of this Status Flag to computing machine (2), automatically this Status Flag to be arranged and reply as " locking " state.
6. the security method preventing computing machine to be illegally used as described in any one of claim 2 to 5, is characterized in that, described method uses mobile phone (3) to send a telegraph calling using user and unblanks center (1) as unlock instruction.
7. the security method preventing computing machine to be illegally used as described in any one of claim 2 to 5, it is characterized in that, the unlocking cipher that after described method adopts the incoming call of the mobile phone (3) of center (1) listening user of unblanking, user inputs at mobile phone (3) is as unlock instruction.
8. the security method preventing computing machine to be illegally used as described in any one of claim 2 to 5, it is characterized in that, described method uses mobile phone (3) to be sent to the center of unblanking (1) using user to include the note of unlocking cipher or multimedia message as unlock instruction.
9. the security method preventing computing machine to be illegally used as described in any one of claim 2 to 5, it is characterized in that, described method uses mobile phone (3) to be sent to the center of unblanking (1) with user to include the e-mail of unlocking cipher for unlock instruction.
10. the security method preventing computing machine to be illegally used as described in any one of claim 2 to 5, it is characterized in that, described method also comprises the steps, be that user uses its computing machine (2) to perform the step of monitored operation, concrete step is as follows:
1., before user uses computing machine (2) to carry out monitored operation, use mobile phone (3) to send a telegraph the center of unblanking (1), just can hanging wire immediately after putting through;
Center (1) of unblanking is found out should the Status Flag of mobile phone (3) telephone number from the telephone number of incoming call, then this Status Flag is set to one period of fixed time of " unblanking " state, and automatically this Status Flag is set to " locking " state after this period of fixed time;
2. user is during this period of fixed time, computing machine (2) is used to carry out monitored operation, monitoring software (201) in computing machine (2) finds that computing machine (2) performs monitored operation, suspend this monitored operation, then inquire about the state of Status Flag corresponding to this computing machine (2) to the center of unblanking (1);
3. the state of Status Flag corresponding to this computing machine (2) is found out at center (1) of unblanking, because computing machine (2) is the state of inquiring about this Status Flag during this period of fixed time, so unblank, the state of this Status Flag i.e. " unblanking " status information is replied to computing machine (2) by center (1), and this Status Flag arranges by center (1) of then unblanking replys as " locking " state;
After computing machine (2) receives this status information of " unblanking ", monitoring software (201) allows to continue to perform this monitored operation;
4. send short messages and notify that this computing machine of user (2) has carried out once monitored operation to user mobile phone (3) in center (1) of unblanking.
CN200910189161.9A 2009-12-24 2009-12-24 Will send a telegraph center of unblanking in advance could computed security system and method Expired - Fee Related CN102110194B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910189161.9A CN102110194B (en) 2009-12-24 2009-12-24 Will send a telegraph center of unblanking in advance could computed security system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910189161.9A CN102110194B (en) 2009-12-24 2009-12-24 Will send a telegraph center of unblanking in advance could computed security system and method

Publications (2)

Publication Number Publication Date
CN102110194A CN102110194A (en) 2011-06-29
CN102110194B true CN102110194B (en) 2016-02-03

Family

ID=44174354

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910189161.9A Expired - Fee Related CN102110194B (en) 2009-12-24 2009-12-24 Will send a telegraph center of unblanking in advance could computed security system and method

Country Status (1)

Country Link
CN (1) CN102110194B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101188499A (en) * 2007-11-26 2008-05-28 唐荣华 A secure protection method and system with dual identity authentication
CN101309140A (en) * 2007-05-18 2008-11-19 游戏新干线科技股份有限公司 Account anti-theft system having communication mechanism

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7870376B2 (en) * 2004-03-23 2011-01-11 International Business Machines Corporation System, method and program product for controlling access to computer system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309140A (en) * 2007-05-18 2008-11-19 游戏新干线科技股份有限公司 Account anti-theft system having communication mechanism
CN101188499A (en) * 2007-11-26 2008-05-28 唐荣华 A secure protection method and system with dual identity authentication

Also Published As

Publication number Publication date
CN102110194A (en) 2011-06-29

Similar Documents

Publication Publication Date Title
CN104468611B (en) The data safety processing method and device switched based on dual system
WO2019047513A1 (en) Internet defense method and authentication server
CN103647784B (en) A kind of method and apparatus of public and private isolation
CN107113613B (en) Server, mobile terminal, network real-name authentication system and method
CN101404056A (en) Software protection method, apparatus and equipment
US20090216795A1 (en) System and method for detecting and blocking phishing attacks
US9245118B2 (en) Methods for identifying key logging activities with a portable device and devices thereof
Atanassov et al. Mobile device threat: Malware
CN113079258A (en) Number privacy protection method, network device and computer storage medium
US10469535B1 (en) Systems and methods for network security
CN104980338A (en) Enterprise instant messaging security application system based on mobile intelligent terminal
CN109981677A (en) A kind of credit management method and device
CN107509180A (en) A kind of method, storage device and the mobile terminal of automatic Encrypted short message
CN102110194B (en) Will send a telegraph center of unblanking in advance could computed security system and method
KR101619928B1 (en) Remote control system of mobile
CN106878233A (en) The read method of secure data, security server, terminal and system
CN111193706B (en) Identity verification method and device
CN102124767B (en) A kind of method and apparatus for providing identity Confidentiality protection for user of communication terminal
CN107864136A (en) A kind of stolen method of anti-locking system short message service
CN110768972B (en) Security verification method and router
Igor et al. Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals.
CN103812843A (en) Authentication method and system based on Web Service
WO2006065029A1 (en) Security service method of data
CN111737725A (en) User marking method, device, server and storage medium
CN105871788A (en) Server login password generation method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent for invention or patent application
CB02 Change of applicant information

Address after: The International Chamber of Commerce building, No. 2 Beijing 100035 Xicheng District huapichang alley 16

Applicant after: Huang Jinfu

Address before: 100032, Beijing, Financial Street, Xicheng District No. 27 investment Plaza, block B, 19

Applicant before: Huang Jinfu

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160203

Termination date: 20171224