CN111695104A - System and method for automatically locking and unlocking computer screen - Google Patents
System and method for automatically locking and unlocking computer screen Download PDFInfo
- Publication number
- CN111695104A CN111695104A CN202010507147.5A CN202010507147A CN111695104A CN 111695104 A CN111695104 A CN 111695104A CN 202010507147 A CN202010507147 A CN 202010507147A CN 111695104 A CN111695104 A CN 111695104A
- Authority
- CN
- China
- Prior art keywords
- bluetooth
- computer
- protocol stack
- unlocking
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 238000004891 communication Methods 0.000 claims abstract description 19
- 238000013475 authorization Methods 0.000 claims description 36
- 238000012986 modification Methods 0.000 claims description 8
- 230000004048 modification Effects 0.000 claims description 8
- 238000012544 monitoring process Methods 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 3
- 230000026676 system process Effects 0.000 claims 1
- 238000012545 processing Methods 0.000 abstract description 4
- 230000006870 function Effects 0.000 description 17
- 230000008569 process Effects 0.000 description 13
- 238000013459 approach Methods 0.000 description 5
- 230000006399 behavior Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000005059 dormancy Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a system and a method for automatically locking and unlocking a computer screen, and belongs to the technical field of Bluetooth communication. The system for automatically locking and unlocking the computer comprises: the Bluetooth protocol stack provides a Bluetooth service interface, searches for Bluetooth equipment, acquires a received signal strength indicating value of the Bluetooth equipment, and establishes communication with the client; the first Bluetooth client displays the searched Bluetooth equipment through a user graphic interface, determines target Bluetooth equipment, determines a standard received signal strength indicated value of the target Bluetooth equipment, and performs screen locking processing on a computer when a Bluetooth protocol stack determines that the received signal strength indicated value of the target Bluetooth equipment is smaller than the standard received signal strength indicated value; and the second Bluetooth client side is used for unlocking the computer when the Bluetooth protocol stack determines that the received signal strength indicated value of the target Bluetooth equipment is greater than the standard received signal strength indicated value. The application of the invention improves the use safety of the computer and improves the use experience of the user.
Description
Technical Field
The invention relates to the technical field of Bluetooth communication, in particular to a system and a method for automatically locking and unlocking a screen of a computer.
Background
The computer is commonly called as computer, is a modern electronic computing machine for high-speed computation, can perform numerical computation and logic computation, and also has the function of storage and memory. The intelligent electronic device can be operated according to a program, and can automatically process mass data at a high speed.
When using personal computers in office chairs and public places, such a scenario is often encountered: when a computer is used, the computer needs to leave the personal computer for a period of time due to sudden situations, in order to prevent other people from operating the computer at will, a shortcut key WIN + L of Windows or other related software can be used for locking a screen, but in actual working life, people often leave the computer, forget to lock the screen, and the computer is not closed in time. At present, computers are essential products for communication and office, but compared with individuals, the existing computers are low in safety performance protection, incapable of intelligently locking screens and intelligent in dormancy, and accordingly the computers run for a long time and are low in safety performance. In this case, the computer data is most likely to be stolen or damaged, and thus privacy and confidentiality of an individual or a company are easily leaked. Therefore, the invention provides a system and a method for automatically locking and unlocking a computer screen, which solve the problems.
Disclosure of Invention
In order to solve the technical problems, the invention provides a system and a method for automatically locking and unlocking a computer, which improve the safety of the computer and avoid the safety problem of computer data leakage.
In order to achieve the above object, the first technical solution adopted by the present invention is: the system for automatically locking and unlocking the screen of the computer comprises: the Bluetooth protocol stack provides a Bluetooth service interface, searches for Bluetooth equipment, acquires a received signal strength indicating value of the Bluetooth equipment, and establishes communication with the client; the first Bluetooth client establishes communication with a Bluetooth protocol stack, searches Bluetooth equipment through the Bluetooth protocol stack, displays the Bluetooth equipment through a user graphical interface, determines one Bluetooth equipment as a target Bluetooth equipment in the displayed Bluetooth equipment, determines a standard received signal strength indicated value on a target distance through the Bluetooth protocol stack, and receives Bluetooth and performs screen locking processing on a computer according to screen locking event information of the protocol stack when the Bluetooth protocol stack determines that the received signal strength indicated value of the target Bluetooth equipment is smaller than the standard received signal strength indicated value; and the second Bluetooth client establishes communication with the Bluetooth protocol stack, and receives the unlocking event information of the Bluetooth protocol stack to unlock the computer when the Bluetooth protocol stack determines that the received signal strength indicated value of the target Bluetooth device is greater than the standard received signal strength indicated value.
In order to achieve the above object, the second technical solution adopted by the present invention is: the method comprises the steps of determining target information, identifying Bluetooth equipment through a Bluetooth protocol stack, measuring a receiving intensity signal indicating value of the Bluetooth equipment, selecting the target Bluetooth equipment from the Bluetooth equipment, determining a target distance between the target Bluetooth equipment and a computer, and determining a standard receiving intensity signal indicating value of the target Bluetooth equipment at the target distance; a computer screen locking step, wherein a first Bluetooth client establishes communication with a Bluetooth protocol stack, and when the Bluetooth protocol stack determines that a receiving intensity signal indicated value of a target Bluetooth device is smaller than a standard receiving intensity signal indicated value, a screen locking task instruction in a computer system is called to perform screen locking operation on the computer; and a computer unlocking step, wherein the second Bluetooth client establishes communication with the Bluetooth protocol stack, and when the Bluetooth protocol stack determines that the receiving intensity signal indicated value of the target Bluetooth device is greater than the standard receiving intensity signal indicated value, an unlocking task instruction in the computer system is called to unlock the computer.
The invention has the beneficial effects that: in the using process of the computer, the screen of the computer is locked in time, so that the safety of the computer is improved, and the data safety of the computer is guaranteed; and the computer is unlocked in time, so that the computer is more convenient to use, and the user experience is improved.
Drawings
FIG. 1 is a schematic structural diagram of an automatic computer screen locking and unlocking system according to the present invention;
FIG. 2 is a schematic view illustrating a computer unlocking operation according to the present invention;
FIG. 3 is a flow chart of the automatic screen locking and unlocking method of the computer according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The following describes the technical solutions of the present invention and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
In an embodiment of the present invention, fig. 1 shows a schematic structural diagram of an automatic screen locking and unlocking system of a computer according to the present invention. As shown in fig. 1, the system for automatically locking and unlocking a computer in the present invention includes a Bluetooth protocol stack, which is integrated for implementing a computer system Service process, provides a Bluetooth Service (Bluetooth-Service) output interface, can search for a Bluetooth device around the computer, and simultaneously obtains a RSSI value indicating a reception intensity signal of the Bluetooth device, and establishes communication with a client. The received strength signal indication RSSI value represents the strength of the Bluetooth signal, when the distance between the computer and the Bluetooth equipment is longer, the Bluetooth signal is weakened, and the received strength signal indication RSSI value is reduced; when the distance between the computer and the Bluetooth equipment is close, the Bluetooth signals are enhanced, the RSSI value indicated by the received strength signals is increased, the distance relationship between the computer and the Bluetooth equipment can be judged by indicating the RSSI value through the received strength signals, and the distance relationship between the computer and a Bluetooth equipment carrier is further judged. And communication is established between the Bluetooth protocol stack and the execution client, so that the transmission of computer screen locking or computer unlocking events is realized.
In an embodiment of the invention, the bluetooth protocol stack judges the distance between the bluetooth device and the computer by measuring the RSSI value of the received strength signal indication of the bluetooth device, and when the bluetooth device is far away from the computer, an event indication of locking the screen of the computer is made, and when the bluetooth device is close to the computer, an event indication of unlocking the computer is made. In the invention, the Bluetooth device can be a mobile phone, an intelligent bracelet and the like. According to the distance between the Bluetooth device and the computer, the distance between the user and the computer is further judged, so that when the user approaches the computer, the computer is automatically unlocked, and when the user is far away from the computer, the computer automatically locks the screen, and the use safety of the computer is improved.
In one embodiment of the present invention, as shown in fig. 1, the automatic computer screen locking and unlocking system of the present invention includes a first bluetooth client. The first Bluetooth client side is communicated with a Bluetooth protocol stack, Bluetooth equipment is searched through the Bluetooth protocol stack and displayed through a graphical user interface, one Bluetooth equipment is determined as a target Bluetooth equipment in the displayed Bluetooth equipment, the first Bluetooth client side determines a standard received signal strength indicated value on a target distance through the Bluetooth protocol stack, and when the Bluetooth protocol stack determines that the received signal strength indicated value of the target Bluetooth equipment is smaller than the standard received signal strength indicated value, the first client side receives Bluetooth and carries out screen locking processing on a computer according to screen locking event information of the Bluetooth protocol stack. Wherein the target bluetooth device can select a mobile phone, a bluetooth headset and the like. The selection of the target bluetooth device may be selected according to the user's habit, and the present invention is not particularly limited with respect to the selection of the target bluetooth device.
In an embodiment of the present invention, the first bluetooth client invokes an output interface of a bluetooth protocol stack to search for the bluetooth device, obtains information of the bluetooth device, and displays the information to the user through the display interface. The user selects the Bluetooth equipment displayed by the first Bluetooth client, selects the target Bluetooth equipment, and then determines the target distance and the standard received strength signal indicator RSSI value of the Bluetooth equipment. The target distance and the standard receiving strength signal indication RSSI value of the target Bluetooth device are used as the basis for judging the screen locking and unlocking of the computer. After the target Bluetooth device is selected, the target Bluetooth device needs to be in a continuous power-on state so that the Bluetooth protocol stack can conveniently identify the target Bluetooth device and judge the distance of the target Bluetooth device.
In this example, for example, a smart band may be selected as the target bluetooth device, and a target distance of 1 meter may be selected. Place intelligent bracelet on the position of about 1 meter apart from the computer, survey intelligent bracelet and instruct RSSI value for the received strength signal of computer through bluetooth protocol stack, instruct RSSI value and store as standard received strength signal. When a user carries the intelligent bracelet and is more than 1 meter away from a computer, the Bluetooth protocol stack determines that the intelligent bracelet is far away from the computer by judging that the RSSI value indicated by the received strength signal of the intelligent bracelet is lower than the RSSI value indicated by the standard received strength signal, and at the moment, an indication of locking the screen of the computer is made; after receiving the screen locking instruction of the computer, the first client calls a screen locking instruction of the computer in the computer to control the computer to perform screen locking operation.
In one example of the invention, the first bluetooth client prompts the user to enter authorization information and performs validity verification. First calls the display system security dialog box (creduipromptforwindows creatives) of the API in the Windows system, and then the user can enter authorization information, including a username and password. The first Bluetooth client obtains and analyzes user authorization information by calling an API (CredUnPackAuthenticationBufferW), and finally calls an API (LogonUserW) to verify the validity of user input information (user name/password) (namely, the user and the password can be used for logging in a windows system). And then, after receiving the event instruction of the screen locking of the computer in the Bluetooth protocol stack, the first Bluetooth client calls a screen locking instruction (lockwork) in the Windows system to complete the screen locking operation of the computer.
In an embodiment of the present invention, as shown in fig. 1, the system for automatically locking and unlocking a computer includes a second bluetooth client, where the second bluetooth client establishes communication with a bluetooth protocol stack, and receives unlocking event information of the bluetooth protocol stack to unlock the computer when the bluetooth protocol stack determines that a received signal strength indicated value of a target bluetooth device is greater than a standard received signal strength indicated value. And monitoring the modification behavior of the authorization information, and storing the modified new authorization information.
In one example of the invention, for example, a smart bracelet may be selected as the target bluetooth device, and a target distance of 1 meter may be selected. Place intelligent bracelet on the position of about 1 meter apart from the computer, survey intelligent bracelet and instruct RSSI value for the received strength signal of computer through bluetooth protocol stack, instruct RSSI value and store as standard received strength signal. When a user carries the intelligent bracelet and is less than 1 meter away from the computer, the Bluetooth protocol stack determines that the intelligent bracelet is close to the computer by judging that the RSSI value indicated by the received strength signal of the intelligent bracelet is higher than the RSSI value indicated by the standard received strength signal, and at the moment, an indication for unlocking the computer is made; and the second Bluetooth client performs unlocking operation on the computer by calling an unlocking instruction in the computer.
In one example of the invention, the second bluetooth client monitors the modification behavior of the user authorization information in a dynamic link library mode. Firstly, a 'passed filter' operation is registered, and the name of the DLL is added in 'Notification packages' under a registry 'HKEY _ LOCAL _ MACHINE \ SYSTEM \ Current Control set \ Control \ Lsa' of the SYSTEM, but the suffix name 'DLL' is not included. After the registration is finished, when the user modifies the login password of the system user, the related authorization information is returned to the corresponding interface of the second Bluetooth client. And the second client receives the relevant information, stores the relevant information and unlocks the information for use.
According to the requirement of a Local Security Authority (LSA) component of the Windows system, the second client outputs three interfaces in a stdcall mode at least.
(1) Initializing a function, calling the function when the DLL is loaded by the LSA component, and informing the second Bluetooth client to carry out initialization operation. The second client must return True after initialization is complete.
(2) PasswordChangeNotify: after the user has modified the username and password in the system, the function is invoked to return the username and new password that have just modified the password. The second client stores the authorization information as the basis for unlocking later.
(3) PasswordFilter: it is verified whether the new password complies with the password policy of the system (e.g., at least 8 bits, including letters, numbers, etc.). The system is not concerned in this respect and can therefore return True directly.
The significance of realizing the 'PasswordFilter' by the second bluetooth client is that when the user uses the screen locking and unlocking function of the example, the user needs to tell the example the user name and the password for unlocking the computer. But if the user subsequently modifies the user's password in the system, the previously entered authorization information will be invalidated. The 'PasswordFilter' can monitor the modification of the system login password and update the authorization information, thus ensuring the validity of the authorization information.
In an embodiment of the present invention, the second bluetooth client controls the computer to perform an unlocking operation after receiving the computer unlocking event information of the bluetooth protocol stack. Fig. 2 shows a schematic view of an operation flow of unlocking a computer by a second bluetooth client, which includes the following steps:
in step S201, a file is registered.
The second client first needs to declare to the Windows system that it is a credential provider (CredentialProvider). Each creative Provider must be a component within a process whose files appear as dynamically linked library DLLs.
Windows systems require a unique CLSID for each component. For example, the CLSID of the present example may be defined as follows:
DEFINE _ GUID (CLSID _ BRT _ creative _ Provider,0x50ac03e0,0x91b8,0x49c7, 0x90,0xb8,0xbe,0xaf,0x78,0x12,0x61,0x 50). The following information needs to be added to the registry of the system to complete the registration of the present instance.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers\{50ac03e0-91b8-49c7-90b8-beaf78126150}]
@ = "BrtCredent provider"// name of this example
[HKEY_CLASSES_ROOT\CLSID\{50ac03e0-91b8-49c7-90b8-beaf78126150}]
@="BrtCredentialProvider"
[HKEY_CLASSES_ROOT\CLSID\{50ac03e0-91b8-49c7-90b8-beaf78126150}\InprocServer32]
@="BrtCredentialProvider.dll"
"ThreadingModel"="Apartment"
Step S202: a first interface function is implemented.
In an example of the present invention, when the second bluetooth client performs the operation of unlocking the computer, the function of the Credential Provider is required to be implemented, where the Credential Provider is an architecture provided by the Windows system, and allows a third party manufacturer to implement a customized login manner, such as fingerprint unlocking, face recognition, and modifying a customized login interface. In the automatic screen locking and unlocking system for the computer, the scene related to the invention is that when the Bluetooth device approaches the computer, the automatic unlocking of the computer is realized, and the related functions in a first interface ICrepentialprovider interface and a second interface ICrepentialprovidercreditial interface in a credential providing program need to be realized and are called by a LogonUI process of a Windows system.
The method for realizing the first interface ICrepentialprovider and the related system instruction calling sequence are as follows:
(1) the Login UI calls a SetUsageScenario function to inquire the user use scene supported by the example, and the specific function prototype is as follows:
HRESULT SetUsageScenario(CREDENTIAL_PROVIDER_USAGE_SCENARIO cpus,DWORDdwFlags)。
here, HRESULT tells LogonUI whether this instance supports cpu-defined scenarios; the dwFlags parameter does not need to be processed here. In the above instructions, the cpu parameter may select INVALID processing "CPUS _ INVALID", desktop unlocking "CPUS _ UNLOCK _ work", PASSWORD modification "CPUS _ CHANGE _ PASSWORD", and the like, in the automatic computer screen locking and unlocking system of the present invention, because the present invention relates to a scenario in which the computer is automatically unlocked when the bluetooth device is close to the computer, here, when the cpu parameter is "CPUS _ UNLOCK _ work", the HRESULT needs to return S _ OK.
(2) The LogonUI will continue to call the Advise function implemented in this example, with the function prototype as follows:
HRESULT Advise(ICredentialProviderEvents *pcpe, UINT_PTR upAdviseContext)
the pcpe parameter is a callback interface object, and the object realizes a unique method (ICredientialproviderEvents: creatitialsChanged). The example can notify the LogonUI through the method that the current authorization information changes. The LogonUI will then obtain authorization information from this instance and automatically log in.
In order to realize automatic login when a Bluetooth device approaches, the creative Provider needs to save two parameters, namely a pcpe object and upAdviseContext. Wherein the upAdviseContext parameter is used to uniquely identify the currently enumerated creative Provider object. This value needs to be passed in when the value of icrodentalproviderevents, creatialchanged, is called.
(3) The LogonUI acquires the number of authorization methods supported by the current instance, and the specific instruction is as follows:
HRESULT GetCredentialCount(DWORD *pdwCount,DWORD *pdwDefault,BOOL *pbAutoLogonWithDefault)
in the system for automatically locking and unlocking the computer, the RSSI value is indicated by the received strength signal of the measured Bluetooth equipment to judge whether the computer is unlocked or locked, wherein only one mode is used for logging in the RSSI value by the received strength signal of the measured Bluetooth equipment, in the command, pdwCount can return 1, pdwDefault returns the default Credential index 0, and pbAutoLogonWithDefault returns TRUE.
(4) The Login UI returns an ICredentialpProviderCreential object according to the dwIndex index number, and the specific instruction is as follows:
HRESULT GetCredentialAt(DWORD dwIndex,ICredentialProviderCredential **ppcpc)
(5) the LogonUI system obtains the maximum number of authorization elements (such as user name, password, user head portrait, Submit button, etc.) supported by this example, and the specific instruction is as follows:
HRESULT GetFieldDescriptorCount(DWORD *pdwCount)
(6) the LogonUI acquires the description information of each authorization element according to the index, and the specific instruction is as follows:
HRESULT GetFieldDescriptorAt(DWORD dwIndex,CREDENTIAL_PROVIDER_FIELD_DESCRIPTOR **ppcpfd)
step S203: the second interface function is implemented.
In an embodiment of the present invention, the icrodentalprovidercreditial interface is used as a second interface for implementing the creditalprovider function, and is a true Provider of login authorization, and in step S202, when the setusagescreenario method of the icrodentalprovider interface is called, an icrodentalprovidercreditial interface object needs to be created and initialized. And returning the previously created ICredentialprevidericreditial interface object according to the index when the GetCreentialaAt method is called. The relevant instructions and methods are as follows:
HRESULT GetSerialization(
__out CREDENTIAL_PROVIDER_GET_SERIALIZATION_RESPONSE* pcpgsr,
__out CREDENTIAL_PROVIDER_CREDENTIAL_SERIALIZATION* pcpcs,
__deref_out_opt LPWSTR*ppszOptionalStatusText,
__out CREDENTIAL_PROVIDER_STATUS_ICON *pcpsiOptionalStatusIcon);
the LogonUI obtains authorization information through this function.
Two parameters, a credential validity parameter pcpgsr and a credential indication parameter pcpcs, need to be processed in this function.
If the current instance has valid authorization information (username and password), the parameter pcpgsr should RETURN "CPGSR _ RETURN _ CREDENTIAL _ FINISHED" with the corresponding username and password returned in Pcpcs.
Two other invalid values of the parameter pcpgsr, "CPGSR _ NO _ CREDENTIAL _ NOT _ fixed", and "CPGSR _ NO _ CREDENTIAL _ fixed", indicate that the current instance has NO valid unlocking authorization information.
It is noted that this instance (brtcredentialprevider.dll) is loaded by a system component (such as logona ui). These system services all belong to Windows Shell processes. On a Windows 64-bit system, these processes are 64-bit. Hence for 64-bit windows systems brtcredutanpro. dll is also implemented in 64-bit fashion.
According to the automatic screen locking and unlocking system for the computer, the screen of the computer can be locked in time when a user is far away from the computer in the use process of the computer, so that the safety of the computer is improved, and the data safety of the computer is guaranteed; when a user approaches the computer, the computer is unlocked in time, so that the computer is more convenient to use, and the user experience is improved.
The flow diagram of the automatic screen locking and unlocking method of the computer is shown in fig. 3. The automatic screen locking and unlocking method for the computer comprises the following steps:
step S301: target information is determined.
In an embodiment of the present invention, the bluetooth protocol stack integrates a computer system service process, searches for bluetooth devices around a computer through an output interface of the bluetooth protocol stack, and simultaneously obtains a RSSI value indicating a received strength signal of the bluetooth device, and displays information such as a device name of the bluetooth device to a user through a graphical display interface of the first bluetooth client. The user selects a suitable bluetooth device as the target bluetooth device and selects a suitable distance as the target distance.
In one example of the present invention, for example, the target bluetooth device may select a smart band closely related to the user, and the target distance between the target bluetooth device and the computer may be selected to be 1 meter. After the target Bluetooth equipment and the target distance are determined, the target Bluetooth equipment is placed at the target distance, and the RSSI value of the standard received strength signal indication of the target Bluetooth equipment is measured and stored. When a user carries the intelligent bracelet and is more than 1 meter away from the computer, the Bluetooth protocol stack makes an indication of screen locking of the computer at the moment by judging that the RSSI value indicated by the received strength signal of the intelligent bracelet is lower than the RSSI value indicated by the standard received strength signal; when the user carries the intelligent bracelet and is less than 1 meter apart from the computer, the bluetooth protocol stack makes the instruction of computer unblock this moment when judging that the received strength signal indication RSSI value of intelligent bracelet is higher than standard received strength signal indication RSSI value.
The method for automatically locking and unlocking the computer adopts the Bluetooth communication technology, and realizes the screen locking operation on the computer when a user leaves the computer through the judgment of the distance of the target Bluetooth equipment; when a user approaches the computer, the computer is unlocked, so that the safety of the computer is improved, and the computer use experience of the user is improved.
Step S302: and (5) locking a screen of the computer.
In one embodiment of the present invention, as shown in fig. 2, the method for automatically locking and unlocking a computer screen of the present invention includes a step of locking the computer screen. In the specific embodiment, when the bluetooth protocol stack judges that the RSSI value indicated by the received strength signal of the target bluetooth device is smaller than the RSSI value indicated by the standard received strength signal, that is, the target bluetooth device is far away from the computer, the bluetooth protocol stack sends the event information of the computer screen locking to the first bluetooth client, and the first bluetooth client calls a screen locking instruction (lockwork) in the Windows system after receiving the event indication of the computer screen locking of the bluetooth protocol stack, so as to complete the screen locking operation of the computer.
Step S303: and (5) unlocking the computer.
In one embodiment of the present invention, as shown in fig. 3, the method for automatically locking and unlocking a computer according to the present invention includes a computer unlocking step. In the specific embodiment, when the bluetooth protocol stack judges that the RSSI value indicated by the received strength signal of the target bluetooth device is greater than the RSSI value indicated by the standard received strength signal, that is, when the target bluetooth device is closer to the computer, the bluetooth protocol stack sends the event information of unlocking the computer to the second bluetooth client, and the second bluetooth client needs to implement two interface function instances of an innovative provider and an innovative provider defined in the innovative provider architecture. The user authorization information changes by calling icredialproviderevents:. credentialeschanged notifies the LogonUI component. And the Login UI subsequently calls the ICrepentialprovider and the ICrepentialprovidercreditial method to acquire system authorization information and log in, and finally the unlocking operation of the computer is completed.
In an embodiment of the present invention, the method for automatically locking and unlocking a computer further includes a step of verifying user authorization information, wherein the first bluetooth client first calls an API in the Windows system to display a system security dialog (creduipromptforwindows subscriptions), and then the user inputs user authorization information including a user name and a password. The first Bluetooth client analyzes the user authorization information through a (CredUnPackAuthenticationBufferW) method, and verifies the validity of the information through a (LogonUserW).
In an embodiment of the present invention, the method for automatically locking and unlocking a screen of a computer further includes a step of monitoring modification of user authorization information, wherein the second bluetooth client implements a related interface defined in a "Password filter" architecture, and can monitor a behavior of a user modifying a login Password.
By applying the automatic screen locking and unlocking method for the computer, the screen of the computer can be locked in time in the using process of the computer, so that the safety of the computer is improved, and the data safety of the computer is guaranteed; and the computer is unlocked in time, so that the computer is more convenient to use, and the user experience is improved.
In addition, an embodiment of the present invention further provides a computer-readable storage medium, in which computer-executable instructions are stored, and when at least one processor of the user equipment executes the computer-executable instructions, the user equipment performs the above-mentioned various possible methods.
Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an ASIC. Additionally, the ASIC may reside in user equipment. Of course, the processor and the storage medium may reside as discrete components in a communication device.
Those skilled in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (10)
1. A system for automatically locking and unlocking a screen of a computer is characterized by comprising:
the Bluetooth protocol stack provides a Bluetooth service interface, searches Bluetooth equipment, acquires a received signal strength indicating value of the Bluetooth equipment and establishes communication with a client;
the first Bluetooth client side is communicated with the Bluetooth protocol stack, searches the Bluetooth devices through the Bluetooth protocol stack and displays the Bluetooth devices through a graphical user interface, determines one Bluetooth device as a target Bluetooth device in the displayed Bluetooth devices, determines a standard received signal strength indicated value on a target distance through the Bluetooth protocol stack, and receives screen locking event information of the Bluetooth according to the Bluetooth protocol stack to lock the screen of the computer when the Bluetooth protocol stack determines that the received signal strength indicated value of the target Bluetooth device is smaller than the standard received signal strength indicated value;
and the second Bluetooth client establishes communication with the Bluetooth protocol stack, and receives the unlocking event information of the Bluetooth protocol stack to unlock the computer when the Bluetooth protocol stack determines that the received signal strength indicated value of the target Bluetooth device is greater than the standard received signal strength indicated value.
2. The system for automatically locking and unlocking a computer screen according to claim 1, wherein the bluetooth protocol stack is integrated by a computer system process, the bluetooth device is continuously monitored, and the target bluetooth device is always in an on state.
3. The system for automatically locking and unlocking a computer screen according to claim 1, wherein the first bluetooth client calls the bluetooth service interface of the bluetooth protocol stack to search for the bluetooth device and obtains the information of the bluetooth device, and the bluetooth device information includes the name of the bluetooth device.
4. The system for automatically locking and unlocking a computer screen according to claim 1, wherein the first client prompts a user to input authorization information and verifies the authorization information, and if the authorization information is valid, the computer screen is locked and unlocked.
5. The system for automatically locking and unlocking a computer screen according to claim 1, wherein the second client monitors the modification action of the authorization information and stores the modified new authorization information.
6. The system for automatically locking and unlocking a computer according to claim 1, wherein the target distance is a judgment distance for controlling the computer to lock or unlock the computer, and the standard RSSI value is an RSSI value of the target Bluetooth device at the target distance measured by the Bluetooth protocol stack.
7. A method for automatically locking and unlocking a computer screen is characterized by comprising the following steps:
determining target information, namely identifying Bluetooth equipment through a Bluetooth protocol stack, measuring a receiving intensity signal indicating value of the Bluetooth equipment, selecting target Bluetooth equipment from the Bluetooth equipment, determining the target distance between the target Bluetooth equipment and the computer, and determining a standard receiving intensity signal indicating value of the target Bluetooth equipment at the target distance;
a computer screen locking step, wherein a first Bluetooth client establishes communication with the Bluetooth protocol stack, and when the Bluetooth protocol stack determines that the receiving intensity signal indicated value of the target Bluetooth device is smaller than the standard receiving intensity signal indicated value, a screen locking task instruction in the computer system is called to lock the screen of the computer;
and a computer unlocking step, wherein a second Bluetooth client establishes communication with the Bluetooth protocol stack, and when the Bluetooth protocol stack determines that the receiving intensity signal indicated value of the target Bluetooth device is greater than the standard receiving intensity signal indicated value, an unlocking task instruction in the computer system is called to unlock the computer.
8. The method for automatically locking and unlocking a computer screen according to claim 7, further comprising a user authorization information verification step of displaying a dialog box through the first Bluetooth client, prompting a user to input authorization information, and performing validity verification on the authorization information.
9. The method for automatically locking and unlocking the computer screen as claimed in claim 7, further comprising a step of monitoring modification of the authorization information by the second bluetooth client, and storing the modified authorization information.
10. The method of claim 7, wherein the target distance is a determined distance for controlling the computer to lock or unlock the computer, and the standard RSSI value is an RSSI value of the target Bluetooth device at the target distance as measured by the Bluetooth protocol stack.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010507147.5A CN111695104A (en) | 2020-06-05 | 2020-06-05 | System and method for automatically locking and unlocking computer screen |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010507147.5A CN111695104A (en) | 2020-06-05 | 2020-06-05 | System and method for automatically locking and unlocking computer screen |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111695104A true CN111695104A (en) | 2020-09-22 |
Family
ID=72479630
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010507147.5A Pending CN111695104A (en) | 2020-06-05 | 2020-06-05 | System and method for automatically locking and unlocking computer screen |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111695104A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112272372A (en) * | 2020-09-28 | 2021-01-26 | 西安万像电子科技有限公司 | Zero terminal login method and system |
CN113535247A (en) * | 2021-06-15 | 2021-10-22 | 荣耀终端有限公司 | Screen locking and unlocking method and system |
CN117034279A (en) * | 2023-07-11 | 2023-11-10 | 成都安易迅科技有限公司 | Safety protection method and system for computer equipment, storage medium and equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100120406A1 (en) * | 2008-11-08 | 2010-05-13 | Phoenix Technologies Ltd. | Secure platform management with power savings capacity |
CN103488932A (en) * | 2013-10-16 | 2014-01-01 | 重庆邮电大学 | Desktop security intercommunication system for mobile device and personal computer and implementation method thereof |
CN104978544A (en) * | 2014-04-02 | 2015-10-14 | 联想(北京)有限公司 | Method and device for switching state of electronic equipment |
CN105893802A (en) * | 2016-03-29 | 2016-08-24 | 四川效率源信息安全技术股份有限公司 | Method for locking/unlocking computer screen based on Bluetooth |
CN106846590A (en) * | 2017-03-07 | 2017-06-13 | 上海聚宝数字传媒有限公司 | A kind of intelligent entrance guard interactive management method based on bluetooth connection under IOS systems |
-
2020
- 2020-06-05 CN CN202010507147.5A patent/CN111695104A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100120406A1 (en) * | 2008-11-08 | 2010-05-13 | Phoenix Technologies Ltd. | Secure platform management with power savings capacity |
CN103488932A (en) * | 2013-10-16 | 2014-01-01 | 重庆邮电大学 | Desktop security intercommunication system for mobile device and personal computer and implementation method thereof |
CN104978544A (en) * | 2014-04-02 | 2015-10-14 | 联想(北京)有限公司 | Method and device for switching state of electronic equipment |
CN105893802A (en) * | 2016-03-29 | 2016-08-24 | 四川效率源信息安全技术股份有限公司 | Method for locking/unlocking computer screen based on Bluetooth |
CN106846590A (en) * | 2017-03-07 | 2017-06-13 | 上海聚宝数字传媒有限公司 | A kind of intelligent entrance guard interactive management method based on bluetooth connection under IOS systems |
Non-Patent Citations (1)
Title |
---|
FREEBUF 官方: "DLLPasswordFilterImplant:一款功能带有提取功能的DLL密码过滤器", 《百度HTTPS://WWW.SOHU.COM/A/378982334_354899》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112272372A (en) * | 2020-09-28 | 2021-01-26 | 西安万像电子科技有限公司 | Zero terminal login method and system |
CN113535247A (en) * | 2021-06-15 | 2021-10-22 | 荣耀终端有限公司 | Screen locking and unlocking method and system |
CN113535247B (en) * | 2021-06-15 | 2022-10-14 | 荣耀终端有限公司 | Screen locking and unlocking method and system |
CN117034279A (en) * | 2023-07-11 | 2023-11-10 | 成都安易迅科技有限公司 | Safety protection method and system for computer equipment, storage medium and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111695104A (en) | System and method for automatically locking and unlocking computer screen | |
US10936755B2 (en) | Device lock bypass on selectable alert | |
US20180314536A1 (en) | Method and apparatus for invoking function in application | |
KR102471289B1 (en) | A method for quickly opening an application or application function, and a terminal | |
EP2869528B1 (en) | Method for performing authentication using biometrics information and portable electronic device supporting the same | |
US11537408B2 (en) | Method for managing application program use time offline, and terminal device | |
EP2904535B1 (en) | Limiting the functionality of a software program based on a security model | |
US20090177783A1 (en) | Pairing and storage access scheme between a handheld device and a computing system | |
KR20150080736A (en) | Method for executing a function and Electronic device using the same | |
CA2813172A1 (en) | Multiple-access-level lock screen | |
US20240176900A1 (en) | Systems and methods for managing hardware privacy configuration in modern workspaces | |
CN113781686A (en) | Verification method, generation method and device for temporary password of intelligent door lock | |
CN107248078A (en) | Mobile payment means of defence, mobile terminal and computer-readable recording medium | |
CN112446984A (en) | Intelligent door lock control method and device | |
CN106778297B (en) | Application program running method and device and mobile terminal | |
US20180132104A1 (en) | Preventing mobile phone accessing when it is in unlocked state | |
CN108681668B (en) | Equipment manager management method and device and mobile terminal | |
CN111279339A (en) | Application locking method, terminal equipment and computer readable medium | |
CN116700815B (en) | Hardware resource control method, electronic device and readable storage medium | |
CN115185425B (en) | Method and device for controlling electronic book page turning displayed by terminal | |
CN116956261A (en) | Heterogeneous system integration strategy method, system, platform and storage medium | |
CN115174077A (en) | Equipment safety protection method and system | |
CN117407848A (en) | Authorization mechanism optimization method, device and equipment for custom authority and storage medium | |
CN114422535A (en) | Method and device for deploying contracts in block chain, computer equipment and storage medium | |
CN110210186A (en) | A kind of latent function starting method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200922 |
|
RJ01 | Rejection of invention patent application after publication |