CN103488933A - Non-contact type computer login protection system - Google Patents
Non-contact type computer login protection system Download PDFInfo
- Publication number
- CN103488933A CN103488933A CN201310447931.1A CN201310447931A CN103488933A CN 103488933 A CN103488933 A CN 103488933A CN 201310447931 A CN201310447931 A CN 201310447931A CN 103488933 A CN103488933 A CN 103488933A
- Authority
- CN
- China
- Prior art keywords
- computer
- protection system
- mobile client
- protection
- bluetooth
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
Abstract
The invention discloses a non-contact type computer login protection system which comprises a mobile client, a computer receiving device and information docking software. The mobile client is mounted in a mobile phone, with a Bluetooth function, of a user. The computer receiving device is a Bluetooth receiver which is mounted at a protection-required USB (universal serial bus) interface of a computer. The information docking software is mounted in a protection-required computer system and comprises a Bluetooth receiver driver, a docking setting module and a timing sensing module. By the non-contact type computer login protection system, login and locking of a computer by the user are facilitated, communication between the mobile phone Bluetooth and the computer is utilized, and wireless communication, convenience, flexibility and good safety are achieved.
Description
Technical field
The present invention relates to computerized information protection field, particularly relate to a kind of contactless computer and log in protection system.
Background technology
Science and technology is maked rapid progress, and has changed greatly people's the invention of production and life, particularly computer and universal, makes people more and more be unable to do without network and intelligentized life.People handle official business, play, online, video, see TV with computer, the function of computer is very powerful, so network also becomes another battlefield of lawless person, the hacker that quantity is huge and lawless person's intention are stolen data and the bank account password of computer user.In order to prevent the leakage of information, computer user has mostly been installed antivirus software and has been stoped viral invasion and attack, but, concerning office computer, because the field of employment personnel are numerous, in order to prevent other people, opens the computer of oneself, usually also on login page, is provided with password.
Logging in password can stop other people to open the computer of oneself to a great extent, but of short durationly in use procedure leave computer and often can not make it enter holding state at once, thereby give other people with opportunity, and log in all at every turn and will again input password, use inconvenience.If computer can be as the keyless access system of automobile, when the operator leaves computer desk, computer can enter locking state automatically, just can stop computer and maliciously be logged in so at once.
Summary of the invention
The technical matters that the present invention mainly solves is to provide a kind of contactless computer and logs in protection system, can make computer be automatically locked beyond distance operator certain distance, recovers normal in certain distance and uses.
For solving the problems of the technologies described above, the technical scheme that the present invention adopts is: provide a kind of contactless computer to log in protection system, comprise: mobile client, connecting computer receiving apparatus and information butt joint software, described mobile client is arranged in the mobile phone that the user has Bluetooth function, described connecting computer receiving apparatus is Bluetooth Receiver, described Bluetooth Receiver is arranged on the USB interface place of the computer needed protection, described information butt joint software is arranged in the computer system needed protection, described information butt joint software comprises that Bluetooth Receiver drives, docking arranges module and timing induction module.
In a preferred embodiment of the present invention, module is set in described docking and mobile client communicates.
In a preferred embodiment of the present invention, described timing induction module and mobile client communicate.
The invention has the beneficial effects as follows: the contactless computer that the present invention points out logs in protection system, can the handled easily person to the logging in locked of computer, utilize the communication between Bluetooth of mobile phone and computer, wireless connections, convenient, flexible, security is good.
The accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, in below describing embodiment, the accompanying drawing of required use is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings, wherein:
Fig. 1 is the structural representation that the contactless computer of the present invention logs in protection system one preferred embodiment;
In accompanying drawing, the mark of each parts is as follows: 1, mobile client, 2, the connecting computer receiving apparatus, 3, information butt joint software.
Embodiment
Below will the technical scheme in the embodiment of the present invention be clearly and completely described, obviously, described embodiment is only a part of embodiment of the present invention, rather than whole embodiment.Embodiment based in the present invention, those of ordinary skills, not making all other embodiment that obtain under the creative work prerequisite, belong to the scope of protection of the invention.
Refer to Fig. 1, the embodiment of the present invention comprises:
A kind of contactless computer logs in protection system; comprise: mobile client 1, connecting computer receiving apparatus 2 and information butt joint software 3; described mobile client 1 is arranged in the mobile phone that the user has Bluetooth function; described connecting computer receiving apparatus 2 is Bluetooth Receiver; described Bluetooth Receiver is arranged on the USB interface place of the computer needed protection; described information butt joint software 3 is arranged in the computer system needed protection, and described information butt joint software 3 comprises that Bluetooth Receiver drives, docking arranges module and the timing induction module.
The contactless computer of the present invention logs in protection system and utilizes blue teeth wireless to connect to control the state that logs in of computer; after information butt joint software 3 is arranged in computer; the driving of Auto-mounting Bluetooth Receiver; then open docking module is set; module is set in docking and mobile client 1 communicates; to set signal code, facilitate the authentication of mobile phone and computer.
Further, described timing induction module and mobile client 1 communicate.Regularly induction module is accessed one time mobile client 1 every 5 seconds, if apart from the superelevation communication distance, regularly induction module and mobile client 1 can't be carried out communication, so regularly induction module will send locked instruction, namely in user's computer away from keyboard, automatically make computer enter locking state, and in before the user gets back to computer, automatic unlocking is logged in.
In sum, a kind of contactless computer that the present invention points out logs in protection system, can effectively protect computer arbitrarily not logged in by other people, good confidentiality, and also higher than traditional password login mode efficiency, blind area is little, easy to use.
The foregoing is only embodiments of the invention; not thereby limit the scope of the claims of the present invention; every equivalent structure or conversion of equivalent flow process that utilizes description of the present invention to do; or directly or indirectly be used in other relevant technical field, all in like manner be included in scope of patent protection of the present invention.
Claims (3)
1. a contactless computer logs in protection system; it is characterized in that; comprise: mobile client, connecting computer receiving apparatus and information butt joint software; described mobile client is arranged in the mobile phone that the user has Bluetooth function; described connecting computer receiving apparatus is Bluetooth Receiver; described Bluetooth Receiver is arranged on the USB interface place of the computer needed protection; described information butt joint software is arranged in the computer system needed protection, and described information butt joint software comprises that Bluetooth Receiver drives, docking arranges module and the timing induction module.
2. contactless computer according to claim 1 logs in protection system, it is characterized in that, module is set in described docking and mobile client communicates.
3. contactless computer according to claim 1 logs in protection system, it is characterized in that, described timing induction module and mobile client communicate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310447931.1A CN103488933A (en) | 2013-09-27 | 2013-09-27 | Non-contact type computer login protection system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310447931.1A CN103488933A (en) | 2013-09-27 | 2013-09-27 | Non-contact type computer login protection system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103488933A true CN103488933A (en) | 2014-01-01 |
Family
ID=49829148
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310447931.1A Pending CN103488933A (en) | 2013-09-27 | 2013-09-27 | Non-contact type computer login protection system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103488933A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106411831A (en) * | 2016-03-11 | 2017-02-15 | 山东渔翁信息技术股份有限公司 | Office environment login system and method |
CN109325324A (en) * | 2018-09-29 | 2019-02-12 | 韩浩杨 | Computer booting verifies system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1614924A (en) * | 2004-11-26 | 2005-05-11 | 王小矿 | Identity certifying system based on intelligent card and dynamic coding |
CN101064535A (en) * | 2007-04-12 | 2007-10-31 | 复旦大学 | Intelligent authentication method and system based on close range wireless communication handset |
US20100306837A1 (en) * | 2009-06-01 | 2010-12-02 | Sony Corporation | Communication apparatus, mobile terminal, communication system, non-contact communication device, network connection method, and program |
CN102136048A (en) * | 2011-03-28 | 2011-07-27 | 东南大学 | Mobile phone Bluetooth-based ambient intelligent computer protection device and method |
-
2013
- 2013-09-27 CN CN201310447931.1A patent/CN103488933A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1614924A (en) * | 2004-11-26 | 2005-05-11 | 王小矿 | Identity certifying system based on intelligent card and dynamic coding |
CN101064535A (en) * | 2007-04-12 | 2007-10-31 | 复旦大学 | Intelligent authentication method and system based on close range wireless communication handset |
US20100306837A1 (en) * | 2009-06-01 | 2010-12-02 | Sony Corporation | Communication apparatus, mobile terminal, communication system, non-contact communication device, network connection method, and program |
CN102136048A (en) * | 2011-03-28 | 2011-07-27 | 东南大学 | Mobile phone Bluetooth-based ambient intelligent computer protection device and method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106411831A (en) * | 2016-03-11 | 2017-02-15 | 山东渔翁信息技术股份有限公司 | Office environment login system and method |
CN109325324A (en) * | 2018-09-29 | 2019-02-12 | 韩浩杨 | Computer booting verifies system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102915588B (en) | Based on intelligent lock system and the control method thereof of Bluetooth technology | |
CN103295304B (en) | Based on community intelligent entrance guard control method and the device thereof of mobile phone 3G network | |
CN202772921U (en) | Network login authentication protection system based on face identification | |
CN203849784U (en) | NFC-based access control system | |
CN204990454U (en) | Intelligence lock based on control of cell -phone APP | |
CN105610832A (en) | Bluetooth device pairing method and Bluetooth device | |
CN103152329A (en) | Method and system for identity authentication by Bluetooth | |
CN105421934A (en) | Network intelligent fingerprint safe case | |
CN204069000U (en) | Mobile encrypted authenticate device | |
CN102413146A (en) | Client authorized logon method based on dynamic codes | |
CN103488933A (en) | Non-contact type computer login protection system | |
CN204883880U (en) | Family's thing allies oneself with control and authenticate device based on NFC | |
CN203206256U (en) | A mobile storage device | |
CN104574054A (en) | Wearable device with payment function and method for exerting payment function | |
CN106572094B (en) | Intelligent identification system based on authority data chain format | |
CN205880953U (en) | Visual fingerprint code lock of talkbacking of ultra -low power consumption WIFI | |
CN204392264U (en) | A kind of finger-print type dynamic password authentication Apparatus and system based on Bluetooth communication | |
CA2611549A1 (en) | Method and system for providing a secure login solution using one-time passwords | |
CN103136489A (en) | Portable and secure automatic password input unit | |
CN203978074U (en) | Handcuffss | |
CN203490700U (en) | Computer security boot-up protection system | |
CN202495055U (en) | second generation identity card reader | |
CN204883832U (en) | E -Government device with long -range monitoring function | |
CN204303346U (en) | The portable hard drive that a kind of remote password controls | |
CN202495042U (en) | Remote control system for face recognition computer |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140101 |