CN103886231A - Computer information security system and method for operating same - Google Patents

Computer information security system and method for operating same Download PDF

Info

Publication number
CN103886231A
CN103886231A CN201210560213.0A CN201210560213A CN103886231A CN 103886231 A CN103886231 A CN 103886231A CN 201210560213 A CN201210560213 A CN 201210560213A CN 103886231 A CN103886231 A CN 103886231A
Authority
CN
China
Prior art keywords
sensor
computing machine
coupling arrangement
connection device
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210560213.0A
Other languages
Chinese (zh)
Inventor
汤武惊
罗笑南
杨艾琳
刘海亮
吴超如
郭江波
李圳龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Research Institute of Sun Yat Sen University
Original Assignee
Shenzhen Research Institute of Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Research Institute of Sun Yat Sen University filed Critical Shenzhen Research Institute of Sun Yat Sen University
Priority to CN201210560213.0A priority Critical patent/CN103886231A/en
Publication of CN103886231A publication Critical patent/CN103886231A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices

Abstract

The invention relates to a computer information security system and a method for operating the same. The computer information security system comprises connecting equipment and a sensor. The computer information security system and the method have the advantages that when the connecting equipment is embedded in a preset computer, the sensor and the computer are connected with each other by the connecting equipment, and first identification codes can be stored in the computer via the connection, and second identification codes can be initialized; a screen protection mode is executed by the computer when the sensor is not located in a preset connecting equipment range, so that unauthorized users can be prevented from using the computer; users do not need to input the first identification codes when the sensor is located within the preset connecting equipment range, so that complicated programs for repeatedly inputting the first identification codes can be omitted; the security of information in the computer can be improved, and the computer information security system is convenient to operate.

Description

Computer information safe system and method for operating
Technical field
Invention relates to information safety system and its method of operating of computing machine.In the time that sensor is the preset range of the connection device that is distributed in, computing machine is carried out a screen protection pattern, to prevent that unwarranted user from using computing machine, and is positioned near connection device when sensor.User does not need to input the first cognizance code, has strengthened security and the more convenient operation of information in computing machine.
Background technology
The function of computer is varied, essential in daily routines of today.Because computing machine provides information storage easily.People preserve secret information on computers conventionally.In order to prevent that unwarranted user's access is stored in the confidential information in computing machine, user protects them by a lot of different modes.The conventional method that protection is stored in the information in computing machine mainly comprises smart card.Fingerprint recognition system or the basic input/output (BIOS) of operator password.
Use the method for smart card, comprise after smart card is inserted to computing machine and just can sign in to network.But this method is at booting computer or while waking screen protection pattern up and unsafe.Therefore.Unwarranted user still can operating computer, even without smart card, although cannot sign in to network.This shows, in computing machine, the protection of canned data is inadequate.
In addition, fingerprint recognition system can be used on computing machine, and the fingerprint of identification fixed-line subscriber, only when the authentic user of identification just can operate computing machine.But the hardware cost of fingerprint recognition system is high.
The third method, BIOS comprises the protection of setting operation password.It is characterized in that, the password of described user's input is used for connecting computing machine, and this computing machine can operate only when the cipher authentication of input is correct.But, when computing machine just in use, BIOS need to or not again to input password, anyone can use computer.Understandable from description above; method does not above have method to guarantee the safety of computer; in use, the computing machine of the Windows operating system that screen protection program creates adds more protection, and the time that user can arrange one-period is moved the screen protection of idle running computer.During for cancellation screen protection, user must input username and password, to prevent unwarranted user.But each user leaves this computing machine and is longer than Preset Time section.The title that user must input and password are again and again.In addition.The password that user need to remember, and the input message of taking time, just cause another trouble.
Therefore, how to have become important problem in order to solve above-mentioned defect, in the supplier in this field.
Summary of the invention
The object of the invention is to comprise a microprocessor at a connection device.Microprocessor, is characterized in that, described connection device is connected respectively to connecting interface and transmitting element.The processing unit of described sensor is connected to a transmission interface.When connection device is to be connected to computing machine via connecting interface, and the insertion connection device of sensor.Between connection device and sensor, generate the second authentication code initialization.Therefore,, when sensor is not during in predetermined connection device scope, computing machine is carried out a screen protection pattern, to prevent that unwarranted user from using computing machine.In the time that sensor is positioned at the preset range of connection device, user does not need to input the first cognizance code, to avoid repeatedly inputting the complicated process of the first cognizance code.Strengthen security and the more convenient operation of information in computing machine.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, to the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is an embodiment of circuit block diagram of the present invention.
Fig. 2 is an embodiment of the operational flowchart of computing machine of the present invention.
Fig. 3 is an embodiment of the operational flowchart of connection device of the present invention.
Fig. 4 is an embodiment of the operational flowchart of sensor of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Based on the embodiment in the present invention, those of ordinary skills, not making all other embodiment that obtain under creative work prerequisite, belong to the scope of protection of the invention.
Fig. 1 is an embodiment of circuit block diagram of the present invention.Computer information safe system and method comprises connection device 1 and sensor 2.
Connection device 1 comprises a microprocessor 11, and it is connected respectively to, and transmitting element 12 is connected, associating interface 14, connecting interface 15, key assignments 16 and a light-emitting component 17
Sensor 2 comprises a processing unit 21, and it is connected respectively to a transmission interface 22, storage unit 23, card i/f 24, power supply unit 25, button 26 and a luminescence unit 27.
Connection device 1 in the time using for the first time and sensor 2.User need to arrange the driver of the connection device 1 of predetermined computation machine 3 in advance.Connection device 1, in computing machine 3, inserts corresponding connector (not shown) by connecting interface 15, and connector can be built in the connection device in computing machine 3.In the computer 3 of operating system, a stand-by period startup screen protected mode can be set.Carry out after unwarranted access operation screen protection pattern (encoding state) at predetermined stand-by period computing machine.Driver will require user to input the first identifying code, wake the screen protection pattern of computing machine 3 up.For example, set username and password and the stand-by period (for example one minute) of screen protection program, and the storage unit 13 of coupling arrangement 1 and computing machine 3 first identification code (for example, user name and user password) of storing respectively.In the time pressing the key 16 of lower connecting device, coupling arrangement 1 detects whether it is to be connected to sensor 2, if it is connected to sensor 2.When the button 26 of sensor 2 is pressed, between coupling arrangement 1 and sensor 2, produce a second random cognizance code (for example, connecting code 65534 and transmission channel 11).Meanwhile, the second cognizance code is respectively stored in the storage unit 13 of coupling arrangement 1 and the storage unit 23 of sensor 2.Like this, the setting of linker completes.The light-emitting component 17 of coupling arrangement 1 produces light, to notify user to delete the connection of sensor 2 to connection device 1.
When user's carry sensors 2 leaves the preset range of coupling arrangement 1.The microprocessor 11 of coupling arrangement 1 is encoded control computing machine 3, for example, enters screen protection pattern.Other users cannot use computing machine 3.The transmission interface 22 of sensor 2 and the mutual signal transmission of the transmitting element of coupling arrangement 1 12, confirm for example, whether change in each default time (30 seconds), transmission interface 22 and transmission unit 12 comprise corresponding to radio transmission elements, for example, and radio frequency or bluetooth.
When sensor 2 is in the predetermined scope of coupling arrangement 1, whether microprocessor 11 detecting sensors 2 are connected with connection device 1, and coupling arrangement 1 has one group of corresponding second cognizance code.The microprocessor 11 of coupling arrangement 1 will be controlled computing machine 3 (for example 1 minute) after Preset Time and enter coding mode (for example, screen protection pattern).If coupling arrangement 1 detects phase the second cognizance code on the same group, microcontroller 11 will send the first identification code automatically to computing machine 3, and it can be used.After need not inputting the first identification code and return, user still can on computing machine 3, work.Even if forget Password or can use computing machine 3. therefore, the information security that the present invention can protection calculation machine 3 and user-friendly.
With reference to the circuit block diagram shown in Fig. 1 and 2, describe as follows according to the operational flowchart of embodiment.
In step 401, start this process.
In step 402, computing machine 3 detects whether be connected to coupling arrangement 1.Be connected to coupling arrangement 1 if detected.Jump to step 404, otherwise advance to step 403.
In step 403, user manually inputs the username and password of computing machine 3.
In step 404, the username and password of the operating system of computing machine 3 is set.
In step 405, the username and password that computing machine 3 and coupling arrangement 1 are stored respectively.
In step 406, judge whether to carry out initialized computing machine 3 and coupling arrangement 1, if be judged as initializing computer 3, this process advances to step 401, otherwise, proceed to step 407.
In step 407, whether sensor 2 is at lower power, if sensor is that this process advances to step 408 in the time of lower power, otherwise, proceed to step 409.
In step 408, Computer display croaking of a frog signal is on screen.
In step 409, connection code and the channel between coupling arrangement 1 and sensor 2 is effective.If it is that effectively process enters into step 404, else process advances to step 401.
Whether computing machine 3 detects connection device 1 and connects; if on coupling arrangement 1 does not connect; computing machine 3 will enter screen protection pattern; and user needs first cognizance code (username and password) of manually input to cancel screen protection; if it is upper that coupling arrangement 1 connects; microprocessor 11 is controlled computing machine 3, and permission user arranges the time of screen protection, username and password.And respectively by these information back-ups in the storage unit 13 of computing machine 3 and connection device 1.
Fig. 3 is an embodiment of the operational flowchart of connection device of the present invention, is described as following program step.
In step 501, coupling arrangement 1 is linked into computing machine 3.
In step 502, if confirmed on computing machine 3.This process proceeds to step 503, otherwise program is to step 502.
In step 503, computing machine 3 detects this coupling arrangement 1.
In step 504, whether initialization.If it is confirmed as initialization, this process proceeds to step 505.Otherwise process advances to step 513.
In step 505, whether the key 16 of coupling arrangement 1 is pressed.If determine that while pressing key 16, this process proceeds to step 508.Otherwise process advances to step 506.
In step 506, the light indication that light-emitting component 17 irradiates.
In step 507, computing machine 3 notifies sensor 2 information invalid, and this process proceeds to step 513.
In step 508, whether sensor 2 accesses, if determine that sensor 2 accesses, this process proceeds to step 509, otherwise this process turns back to step 508.
In step 509, confirm whether the button 26 of sensor 2 is pressed, if it is confirmed as being pressed, this process proceeds to step 510, else process turns back to step 509.
In step 510, connect code and transmission channel and produce.
In step 511, connect code and transmission channel and be stored.
In step 512, light-emitting component 17 is connected with coupling arrangement 1, and luminescence unit 27 is closed.
In step 513, judge whether that sensor 2 is effective.If it is confirmed as effectively, this process proceeds to step 514.Otherwise process advances to step 516.
In step 514, username and password is sent to computing machine 3.
In step 515, stop at 30 seconds and this process advances to step 513.
In step 516, enter screen protection pattern.And this process advances to step 504.
By connecting interface 15, connection device 1 is connected to computing machine 3, and user is confirmed whether it is computing machine 3, is connected, rather than is connected to other equipment if computing machine 3 is identified with connection device 1.Computing machine 3 requires user to be confirmed whether to want initialized coupling arrangement 1 and sensor 2.If need the key 16 that user can press.If in the time that the key 16 of coupling arrangement 1 is pressed, user checks whether connecting interface 14 is connected with interface 2.User presses the button at 26 o'clock, generates the corresponding code that connects and makes to be connected between microprocessor 11 and processing unit 21 transmission channels.And store into respectively in the storage unit 23 of storage unit 13 and sensor 2.Light-emitting component 17 and Optical Transmit Unit 27 are closed.Microprocessor 11 confirms whether sensor 2 is effective.If it is invalid, control computing machine 3 is input to screen protection pattern by microprocessor 11.If it is effectively, the identification code (username and password) that microprocessor 11 sends user automatically by connecting interface 15, to computer 3, is cancelled screen protection pattern.Effective or invalid judgement is by the second cognizance code corresponding between coupling arrangement 1 and sensor 2.Coupling arrangement 1 and sensor 2 mutually transmit signal within each default period, to be confirmed whether that sensor is effective.
Shown in Fig. 1 and 4, the operational flowchart of sensor embodiment according to the present invention, treatment step is described below.
In step 601, start this process.
In step 602, confirm whether sensor 2 is access in coupling arrangement 1.If it accesses, this process advances to step 603, and else process is to step 607.
In step 603, whether being pressed of ACK button 26.If it is pressed, this process proceeds to step 604, and else process advances to step 603.
In step 604, produce and connect code and transmission channel.
In step 605, will connect code and transmission channel storage.
In step 606, the light-emitting component 17 of coupling arrangement 1 and the Optical Transmit Unit 27 of sensor 2 are closed.And this process advances to step 602.
In step 607, confirm that whether sensor 2 is in low-power consumption amount state, if so, this process advances to step 608, if not, processing procedure advances to step 609.
In step 608, the luminescence unit 27 of sensor 2 is illuminated.
In step 609, the coupling arrangement 1 of the signal of the work of the transmission of sensor 2.
In step 610, Optical Transmit Unit 27 is closed.
In step 611, wait for 30 seconds, and this process turns back to step 601.
Whether microprocessor 11 detecting sensors 2 are stopped up, when obstruction, user can press the button 26, produces corresponding the second cognizance code (connecting code and transmission channel), and store respectively storage unit 13 and storage unit 23 between microprocessor 11 and processing unit 21.Light-emitting component 17 and luminescence unit 27 will be closed.Whether sensor 2 is access in, and will be detected.If the interface 24 that the connecting interface 14 of coupling arrangement above 1 is not connected to.Whether microprocessor 11 detecting sensors 2 are in lower quantity of power.If be detected as in lower quantity of power.The luminescence unit 27 of sensor 2 luminous, and send a working signal to coupling arrangement 1.If not, sensor 2 will directly send working signal to coupling arrangement 1.Whether sensor 2 is by the luminescence unit of cutting out 27 and wait for the default time period (for example 30 seconds), repeats above-mentioned steps, access in the detecting sensor 2 of the microprocessor 11 of coupling arrangement 1 to allow.
Computer information safety system of the present invention and method, at least have the following advantages.
1, when sensor 2 is positioned at coupling arrangement 1 preset range.Coupling arrangement 1 by automatically input username and password.Outside the preset range of coupling arrangement 1 time, control computing machine is entered screen protection pattern by connection device.Thereby prevent that other users from using this computing machine and protection to be stored in information wherein.
2, in memory cell 13, store the username and password of coupling arrangement 1.When sensor 2 is positioned at preset range, the username and password of the automatic input computing machine 3 of coupling arrangement 1.Therefore, user does not need the username and password of remembeing.User does not need to take time and manually inputs username and password, thereby saves time and more convenient operation.
Embodiments of the invention mainly comprise when user and sensor are during away from coupling arrangement, make computing machine can enter screen protection pattern, to prevent that other users from using this computing machine.When the position nigh coupling arrangement of sensor, user does not need to input password, just can operate computing machine.Provide user to operate more easily.
System to computer information safe and method of operating are described in detail above, applied specific case herein principle of the present invention and embodiment are set forth, the explanation of above embodiment is just for helping to understand method of the present invention and core concept thereof; , for one of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention meanwhile.

Claims (2)

1. for the protection of the method for computerized information.It is characterized in that, when user is with sensor during away from connection device, computing machine will enter encoding state, to prevent that other users from using described computing machine.In the time of the preset range of described sensor at connection device, described computing machine will be decoded for user's operation, and the method comprises:
(A) described connection of electronic devices is received described computing machine;
(B) described coupling arrangement initialization (if needs).And continue execution step (C), otherwise continue execution step (D);
(C) operation initialization;
(D) described connection device verifies whether described sensor has corresponding second cognizance code within predefined a period of time.If no, carry out step (E), otherwise, if it is effectively, advance to step (F).
(E) connection device control computing machine rests on encoding state;
(F) the first cognizance code that connection device sends, described computing machine is used for decoding, described the first cognizance code comprises username and password, for connecting described predetermined computing machine and described connection device, described the second identification code comprises that one connects code and a passage, be used for connecting described coupling arrangement and sensor, (C) is further comprising the steps for step: (a) user presses the mobile device of the described connection of key.Wherein, if determined when this key is pressed, proceed step (d), otherwise carry out step (b).
(b) light that light-emitting component of described connection device produces;
(c) coupling arrangement notice sensor, the disarmed state of described computing machine, and continue to (i);
(d) whether described sensor is linked into described coupling arrangement.If sensor access, carries out step (e), otherwise returns to step (d);
(e) whether the button that coupling arrangement detects described sensor is pressed, and it is characterized in that, if described sensor is pressed, proceeds to step (t), otherwise continues execution step (e);
(t) generate the second cognizance code between described coupling arrangement and described sensor;
(g) for storing the second identification code generating between described coupling arrangement and described sensor;
(h) close the light-emitting component of described coupling arrangement and the luminescence unit of described sensor, finish (i), execution step (C).
2. the method for the protection of computerized information according to claim 1.It is characterized in that, the connection device described in connecting and described computing machine are at step (c), and the described computer equipment of sensor access.Described connection device requires user to input username and password, and connection device and described computing machine keep respectively username and password.
CN201210560213.0A 2012-12-20 2012-12-20 Computer information security system and method for operating same Pending CN103886231A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210560213.0A CN103886231A (en) 2012-12-20 2012-12-20 Computer information security system and method for operating same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210560213.0A CN103886231A (en) 2012-12-20 2012-12-20 Computer information security system and method for operating same

Publications (1)

Publication Number Publication Date
CN103886231A true CN103886231A (en) 2014-06-25

Family

ID=50955120

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210560213.0A Pending CN103886231A (en) 2012-12-20 2012-12-20 Computer information security system and method for operating same

Country Status (1)

Country Link
CN (1) CN103886231A (en)

Similar Documents

Publication Publication Date Title
US8312559B2 (en) System and method of wireless security authentication
CA2723647C (en) Remote control device with password functions
CN114067193A (en) Fingerprint identification card and method for operating a fingerprint identification card
CN111038445B (en) Mobile terminal device and vehicle control system
KR101165325B1 (en) System and Method for Processing Opening and Shutting Door-Lock using One-Time Bar Code, Door-Lock Device
CN104916010A (en) Control system of mobile device and wearable control equipment
CN107422838B (en) Wearable device, unlocking control system and unlocking control method
CN105957208A (en) Smartphone flashlight-controlled light-operated anti-theft lock and unlocking method
US20150228137A1 (en) Wireless access control to a locking device
US20140359312A1 (en) Power on with near field communication
CN103391195B (en) A kind of method of work of dynamic token
CN106157409A (en) Communication means between intelligent terminal and gate inhibition and device
AU2021328076B2 (en) Control circuitry for offline authentication in an aerosol-generating device
CN103226856B (en) Multi-identification based security system
CN105279547A (en) Biological recognition IC card and control method thereof
CN105824547A (en) Intelligent mobile phone unlocking method
KR20070076317A (en) Apparatus and method for attesting use of computer
CN104123512A (en) Method and device for switching between intelligent secrete key equipment modes
CN103886231A (en) Computer information security system and method for operating same
TWM450603U (en) Periodic code control module for controller and electronic lock using same
CN105468958A (en) Electronic apparatus unlocking method and system
JP2009025945A (en) Authentication system, authentication method, and authentication program
US8302156B2 (en) Computer information security system and operation method thereof
KR100683326B1 (en) Method and device for security in mobile station
CN112417423A (en) Electronic equipment use control method and device, electronic equipment and computer equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140625