CN111695104A - System and method for automatically locking and unlocking computer screen - Google Patents

System and method for automatically locking and unlocking computer screen Download PDF

Info

Publication number
CN111695104A
CN111695104A CN202010507147.5A CN202010507147A CN111695104A CN 111695104 A CN111695104 A CN 111695104A CN 202010507147 A CN202010507147 A CN 202010507147A CN 111695104 A CN111695104 A CN 111695104A
Authority
CN
China
Prior art keywords
bluetooth
computer
protocol stack
unlocking
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010507147.5A
Other languages
Chinese (zh)
Inventor
祁飞
王凌志
朱敏觉
朱勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Barrot Wireless Co Ltd
Original Assignee
Barrot Wireless Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Barrot Wireless Co Ltd filed Critical Barrot Wireless Co Ltd
Priority to CN202010507147.5A priority Critical patent/CN111695104A/en
Publication of CN111695104A publication Critical patent/CN111695104A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a system and a method for automatically locking and unlocking a computer screen, and belongs to the technical field of Bluetooth communication. The system for automatically locking and unlocking the computer comprises: the Bluetooth protocol stack provides a Bluetooth service interface, searches for Bluetooth equipment, acquires a received signal strength indicating value of the Bluetooth equipment, and establishes communication with the client; the first Bluetooth client displays the searched Bluetooth equipment through a user graphic interface, determines target Bluetooth equipment, determines a standard received signal strength indicated value of the target Bluetooth equipment, and performs screen locking processing on a computer when a Bluetooth protocol stack determines that the received signal strength indicated value of the target Bluetooth equipment is smaller than the standard received signal strength indicated value; and the second Bluetooth client side is used for unlocking the computer when the Bluetooth protocol stack determines that the received signal strength indicated value of the target Bluetooth equipment is greater than the standard received signal strength indicated value. The application of the invention improves the use safety of the computer and improves the use experience of the user.

Description

System and method for automatically locking and unlocking computer screen
Technical Field
The invention relates to the technical field of Bluetooth communication, in particular to a system and a method for automatically locking and unlocking a screen of a computer.
Background
The computer is commonly called as computer, is a modern electronic computing machine for high-speed computation, can perform numerical computation and logic computation, and also has the function of storage and memory. The intelligent electronic device can be operated according to a program, and can automatically process mass data at a high speed.
When using personal computers in office chairs and public places, such a scenario is often encountered: when a computer is used, the computer needs to leave the personal computer for a period of time due to sudden situations, in order to prevent other people from operating the computer at will, a shortcut key WIN + L of Windows or other related software can be used for locking a screen, but in actual working life, people often leave the computer, forget to lock the screen, and the computer is not closed in time. At present, computers are essential products for communication and office, but compared with individuals, the existing computers are low in safety performance protection, incapable of intelligently locking screens and intelligent in dormancy, and accordingly the computers run for a long time and are low in safety performance. In this case, the computer data is most likely to be stolen or damaged, and thus privacy and confidentiality of an individual or a company are easily leaked. Therefore, the invention provides a system and a method for automatically locking and unlocking a computer screen, which solve the problems.
Disclosure of Invention
In order to solve the technical problems, the invention provides a system and a method for automatically locking and unlocking a computer, which improve the safety of the computer and avoid the safety problem of computer data leakage.
In order to achieve the above object, the first technical solution adopted by the present invention is: the system for automatically locking and unlocking the screen of the computer comprises: the Bluetooth protocol stack provides a Bluetooth service interface, searches for Bluetooth equipment, acquires a received signal strength indicating value of the Bluetooth equipment, and establishes communication with the client; the first Bluetooth client establishes communication with a Bluetooth protocol stack, searches Bluetooth equipment through the Bluetooth protocol stack, displays the Bluetooth equipment through a user graphical interface, determines one Bluetooth equipment as a target Bluetooth equipment in the displayed Bluetooth equipment, determines a standard received signal strength indicated value on a target distance through the Bluetooth protocol stack, and receives Bluetooth and performs screen locking processing on a computer according to screen locking event information of the protocol stack when the Bluetooth protocol stack determines that the received signal strength indicated value of the target Bluetooth equipment is smaller than the standard received signal strength indicated value; and the second Bluetooth client establishes communication with the Bluetooth protocol stack, and receives the unlocking event information of the Bluetooth protocol stack to unlock the computer when the Bluetooth protocol stack determines that the received signal strength indicated value of the target Bluetooth device is greater than the standard received signal strength indicated value.
In order to achieve the above object, the second technical solution adopted by the present invention is: the method comprises the steps of determining target information, identifying Bluetooth equipment through a Bluetooth protocol stack, measuring a receiving intensity signal indicating value of the Bluetooth equipment, selecting the target Bluetooth equipment from the Bluetooth equipment, determining a target distance between the target Bluetooth equipment and a computer, and determining a standard receiving intensity signal indicating value of the target Bluetooth equipment at the target distance; a computer screen locking step, wherein a first Bluetooth client establishes communication with a Bluetooth protocol stack, and when the Bluetooth protocol stack determines that a receiving intensity signal indicated value of a target Bluetooth device is smaller than a standard receiving intensity signal indicated value, a screen locking task instruction in a computer system is called to perform screen locking operation on the computer; and a computer unlocking step, wherein the second Bluetooth client establishes communication with the Bluetooth protocol stack, and when the Bluetooth protocol stack determines that the receiving intensity signal indicated value of the target Bluetooth device is greater than the standard receiving intensity signal indicated value, an unlocking task instruction in the computer system is called to unlock the computer.
The invention has the beneficial effects that: in the using process of the computer, the screen of the computer is locked in time, so that the safety of the computer is improved, and the data safety of the computer is guaranteed; and the computer is unlocked in time, so that the computer is more convenient to use, and the user experience is improved.
Drawings
FIG. 1 is a schematic structural diagram of an automatic computer screen locking and unlocking system according to the present invention;
FIG. 2 is a schematic view illustrating a computer unlocking operation according to the present invention;
FIG. 3 is a flow chart of the automatic screen locking and unlocking method of the computer according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The following describes the technical solutions of the present invention and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
In an embodiment of the present invention, fig. 1 shows a schematic structural diagram of an automatic screen locking and unlocking system of a computer according to the present invention. As shown in fig. 1, the system for automatically locking and unlocking a computer in the present invention includes a Bluetooth protocol stack, which is integrated for implementing a computer system Service process, provides a Bluetooth Service (Bluetooth-Service) output interface, can search for a Bluetooth device around the computer, and simultaneously obtains a RSSI value indicating a reception intensity signal of the Bluetooth device, and establishes communication with a client. The received strength signal indication RSSI value represents the strength of the Bluetooth signal, when the distance between the computer and the Bluetooth equipment is longer, the Bluetooth signal is weakened, and the received strength signal indication RSSI value is reduced; when the distance between the computer and the Bluetooth equipment is close, the Bluetooth signals are enhanced, the RSSI value indicated by the received strength signals is increased, the distance relationship between the computer and the Bluetooth equipment can be judged by indicating the RSSI value through the received strength signals, and the distance relationship between the computer and a Bluetooth equipment carrier is further judged. And communication is established between the Bluetooth protocol stack and the execution client, so that the transmission of computer screen locking or computer unlocking events is realized.
In an embodiment of the invention, the bluetooth protocol stack judges the distance between the bluetooth device and the computer by measuring the RSSI value of the received strength signal indication of the bluetooth device, and when the bluetooth device is far away from the computer, an event indication of locking the screen of the computer is made, and when the bluetooth device is close to the computer, an event indication of unlocking the computer is made. In the invention, the Bluetooth device can be a mobile phone, an intelligent bracelet and the like. According to the distance between the Bluetooth device and the computer, the distance between the user and the computer is further judged, so that when the user approaches the computer, the computer is automatically unlocked, and when the user is far away from the computer, the computer automatically locks the screen, and the use safety of the computer is improved.
In one embodiment of the present invention, as shown in fig. 1, the automatic computer screen locking and unlocking system of the present invention includes a first bluetooth client. The first Bluetooth client side is communicated with a Bluetooth protocol stack, Bluetooth equipment is searched through the Bluetooth protocol stack and displayed through a graphical user interface, one Bluetooth equipment is determined as a target Bluetooth equipment in the displayed Bluetooth equipment, the first Bluetooth client side determines a standard received signal strength indicated value on a target distance through the Bluetooth protocol stack, and when the Bluetooth protocol stack determines that the received signal strength indicated value of the target Bluetooth equipment is smaller than the standard received signal strength indicated value, the first client side receives Bluetooth and carries out screen locking processing on a computer according to screen locking event information of the Bluetooth protocol stack. Wherein the target bluetooth device can select a mobile phone, a bluetooth headset and the like. The selection of the target bluetooth device may be selected according to the user's habit, and the present invention is not particularly limited with respect to the selection of the target bluetooth device.
In an embodiment of the present invention, the first bluetooth client invokes an output interface of a bluetooth protocol stack to search for the bluetooth device, obtains information of the bluetooth device, and displays the information to the user through the display interface. The user selects the Bluetooth equipment displayed by the first Bluetooth client, selects the target Bluetooth equipment, and then determines the target distance and the standard received strength signal indicator RSSI value of the Bluetooth equipment. The target distance and the standard receiving strength signal indication RSSI value of the target Bluetooth device are used as the basis for judging the screen locking and unlocking of the computer. After the target Bluetooth device is selected, the target Bluetooth device needs to be in a continuous power-on state so that the Bluetooth protocol stack can conveniently identify the target Bluetooth device and judge the distance of the target Bluetooth device.
In this example, for example, a smart band may be selected as the target bluetooth device, and a target distance of 1 meter may be selected. Place intelligent bracelet on the position of about 1 meter apart from the computer, survey intelligent bracelet and instruct RSSI value for the received strength signal of computer through bluetooth protocol stack, instruct RSSI value and store as standard received strength signal. When a user carries the intelligent bracelet and is more than 1 meter away from a computer, the Bluetooth protocol stack determines that the intelligent bracelet is far away from the computer by judging that the RSSI value indicated by the received strength signal of the intelligent bracelet is lower than the RSSI value indicated by the standard received strength signal, and at the moment, an indication of locking the screen of the computer is made; after receiving the screen locking instruction of the computer, the first client calls a screen locking instruction of the computer in the computer to control the computer to perform screen locking operation.
In one example of the invention, the first bluetooth client prompts the user to enter authorization information and performs validity verification. First calls the display system security dialog box (creduipromptforwindows creatives) of the API in the Windows system, and then the user can enter authorization information, including a username and password. The first Bluetooth client obtains and analyzes user authorization information by calling an API (CredUnPackAuthenticationBufferW), and finally calls an API (LogonUserW) to verify the validity of user input information (user name/password) (namely, the user and the password can be used for logging in a windows system). And then, after receiving the event instruction of the screen locking of the computer in the Bluetooth protocol stack, the first Bluetooth client calls a screen locking instruction (lockwork) in the Windows system to complete the screen locking operation of the computer.
In an embodiment of the present invention, as shown in fig. 1, the system for automatically locking and unlocking a computer includes a second bluetooth client, where the second bluetooth client establishes communication with a bluetooth protocol stack, and receives unlocking event information of the bluetooth protocol stack to unlock the computer when the bluetooth protocol stack determines that a received signal strength indicated value of a target bluetooth device is greater than a standard received signal strength indicated value. And monitoring the modification behavior of the authorization information, and storing the modified new authorization information.
In one example of the invention, for example, a smart bracelet may be selected as the target bluetooth device, and a target distance of 1 meter may be selected. Place intelligent bracelet on the position of about 1 meter apart from the computer, survey intelligent bracelet and instruct RSSI value for the received strength signal of computer through bluetooth protocol stack, instruct RSSI value and store as standard received strength signal. When a user carries the intelligent bracelet and is less than 1 meter away from the computer, the Bluetooth protocol stack determines that the intelligent bracelet is close to the computer by judging that the RSSI value indicated by the received strength signal of the intelligent bracelet is higher than the RSSI value indicated by the standard received strength signal, and at the moment, an indication for unlocking the computer is made; and the second Bluetooth client performs unlocking operation on the computer by calling an unlocking instruction in the computer.
In one example of the invention, the second bluetooth client monitors the modification behavior of the user authorization information in a dynamic link library mode. Firstly, a 'passed filter' operation is registered, and the name of the DLL is added in 'Notification packages' under a registry 'HKEY _ LOCAL _ MACHINE \ SYSTEM \ Current Control set \ Control \ Lsa' of the SYSTEM, but the suffix name 'DLL' is not included. After the registration is finished, when the user modifies the login password of the system user, the related authorization information is returned to the corresponding interface of the second Bluetooth client. And the second client receives the relevant information, stores the relevant information and unlocks the information for use.
According to the requirement of a Local Security Authority (LSA) component of the Windows system, the second client outputs three interfaces in a stdcall mode at least.
(1) Initializing a function, calling the function when the DLL is loaded by the LSA component, and informing the second Bluetooth client to carry out initialization operation. The second client must return True after initialization is complete.
(2) PasswordChangeNotify: after the user has modified the username and password in the system, the function is invoked to return the username and new password that have just modified the password. The second client stores the authorization information as the basis for unlocking later.
(3) PasswordFilter: it is verified whether the new password complies with the password policy of the system (e.g., at least 8 bits, including letters, numbers, etc.). The system is not concerned in this respect and can therefore return True directly.
The significance of realizing the 'PasswordFilter' by the second bluetooth client is that when the user uses the screen locking and unlocking function of the example, the user needs to tell the example the user name and the password for unlocking the computer. But if the user subsequently modifies the user's password in the system, the previously entered authorization information will be invalidated. The 'PasswordFilter' can monitor the modification of the system login password and update the authorization information, thus ensuring the validity of the authorization information.
In an embodiment of the present invention, the second bluetooth client controls the computer to perform an unlocking operation after receiving the computer unlocking event information of the bluetooth protocol stack. Fig. 2 shows a schematic view of an operation flow of unlocking a computer by a second bluetooth client, which includes the following steps:
in step S201, a file is registered.
The second client first needs to declare to the Windows system that it is a credential provider (CredentialProvider). Each creative Provider must be a component within a process whose files appear as dynamically linked library DLLs.
Windows systems require a unique CLSID for each component. For example, the CLSID of the present example may be defined as follows:
DEFINE _ GUID (CLSID _ BRT _ creative _ Provider,0x50ac03e0,0x91b8,0x49c7, 0x90,0xb8,0xbe,0xaf,0x78,0x12,0x61,0x 50). The following information needs to be added to the registry of the system to complete the registration of the present instance.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers\{50ac03e0-91b8-49c7-90b8-beaf78126150}]
@ = "BrtCredent provider"// name of this example
[HKEY_CLASSES_ROOT\CLSID\{50ac03e0-91b8-49c7-90b8-beaf78126150}]
@="BrtCredentialProvider"
[HKEY_CLASSES_ROOT\CLSID\{50ac03e0-91b8-49c7-90b8-beaf78126150}\InprocServer32]
@="BrtCredentialProvider.dll"
"ThreadingModel"="Apartment"
Step S202: a first interface function is implemented.
In an example of the present invention, when the second bluetooth client performs the operation of unlocking the computer, the function of the Credential Provider is required to be implemented, where the Credential Provider is an architecture provided by the Windows system, and allows a third party manufacturer to implement a customized login manner, such as fingerprint unlocking, face recognition, and modifying a customized login interface. In the automatic screen locking and unlocking system for the computer, the scene related to the invention is that when the Bluetooth device approaches the computer, the automatic unlocking of the computer is realized, and the related functions in a first interface ICrepentialprovider interface and a second interface ICrepentialprovidercreditial interface in a credential providing program need to be realized and are called by a LogonUI process of a Windows system.
The method for realizing the first interface ICrepentialprovider and the related system instruction calling sequence are as follows:
(1) the Login UI calls a SetUsageScenario function to inquire the user use scene supported by the example, and the specific function prototype is as follows:
HRESULT SetUsageScenario(CREDENTIAL_PROVIDER_USAGE_SCENARIO cpus,DWORDdwFlags)。
here, HRESULT tells LogonUI whether this instance supports cpu-defined scenarios; the dwFlags parameter does not need to be processed here. In the above instructions, the cpu parameter may select INVALID processing "CPUS _ INVALID", desktop unlocking "CPUS _ UNLOCK _ work", PASSWORD modification "CPUS _ CHANGE _ PASSWORD", and the like, in the automatic computer screen locking and unlocking system of the present invention, because the present invention relates to a scenario in which the computer is automatically unlocked when the bluetooth device is close to the computer, here, when the cpu parameter is "CPUS _ UNLOCK _ work", the HRESULT needs to return S _ OK.
(2) The LogonUI will continue to call the Advise function implemented in this example, with the function prototype as follows:
HRESULT Advise(ICredentialProviderEvents *pcpe, UINT_PTR upAdviseContext)
the pcpe parameter is a callback interface object, and the object realizes a unique method (ICredientialproviderEvents: creatitialsChanged). The example can notify the LogonUI through the method that the current authorization information changes. The LogonUI will then obtain authorization information from this instance and automatically log in.
In order to realize automatic login when a Bluetooth device approaches, the creative Provider needs to save two parameters, namely a pcpe object and upAdviseContext. Wherein the upAdviseContext parameter is used to uniquely identify the currently enumerated creative Provider object. This value needs to be passed in when the value of icrodentalproviderevents, creatialchanged, is called.
(3) The LogonUI acquires the number of authorization methods supported by the current instance, and the specific instruction is as follows:
HRESULT GetCredentialCount(DWORD *pdwCount,DWORD *pdwDefault,BOOL *pbAutoLogonWithDefault)
in the system for automatically locking and unlocking the computer, the RSSI value is indicated by the received strength signal of the measured Bluetooth equipment to judge whether the computer is unlocked or locked, wherein only one mode is used for logging in the RSSI value by the received strength signal of the measured Bluetooth equipment, in the command, pdwCount can return 1, pdwDefault returns the default Credential index 0, and pbAutoLogonWithDefault returns TRUE.
(4) The Login UI returns an ICredentialpProviderCreential object according to the dwIndex index number, and the specific instruction is as follows:
HRESULT GetCredentialAt(DWORD dwIndex,ICredentialProviderCredential **ppcpc)
(5) the LogonUI system obtains the maximum number of authorization elements (such as user name, password, user head portrait, Submit button, etc.) supported by this example, and the specific instruction is as follows:
HRESULT GetFieldDescriptorCount(DWORD *pdwCount)
(6) the LogonUI acquires the description information of each authorization element according to the index, and the specific instruction is as follows:
HRESULT GetFieldDescriptorAt(DWORD dwIndex,CREDENTIAL_PROVIDER_FIELD_DESCRIPTOR **ppcpfd)
step S203: the second interface function is implemented.
In an embodiment of the present invention, the icrodentalprovidercreditial interface is used as a second interface for implementing the creditalprovider function, and is a true Provider of login authorization, and in step S202, when the setusagescreenario method of the icrodentalprovider interface is called, an icrodentalprovidercreditial interface object needs to be created and initialized. And returning the previously created ICredentialprevidericreditial interface object according to the index when the GetCreentialaAt method is called. The relevant instructions and methods are as follows:
HRESULT GetSerialization(
__out CREDENTIAL_PROVIDER_GET_SERIALIZATION_RESPONSE* pcpgsr,
__out CREDENTIAL_PROVIDER_CREDENTIAL_SERIALIZATION* pcpcs,
__deref_out_opt LPWSTR*ppszOptionalStatusText,
__out CREDENTIAL_PROVIDER_STATUS_ICON *pcpsiOptionalStatusIcon);
the LogonUI obtains authorization information through this function.
Two parameters, a credential validity parameter pcpgsr and a credential indication parameter pcpcs, need to be processed in this function.
If the current instance has valid authorization information (username and password), the parameter pcpgsr should RETURN "CPGSR _ RETURN _ CREDENTIAL _ FINISHED" with the corresponding username and password returned in Pcpcs.
Two other invalid values of the parameter pcpgsr, "CPGSR _ NO _ CREDENTIAL _ NOT _ fixed", and "CPGSR _ NO _ CREDENTIAL _ fixed", indicate that the current instance has NO valid unlocking authorization information.
It is noted that this instance (brtcredentialprevider.dll) is loaded by a system component (such as logona ui). These system services all belong to Windows Shell processes. On a Windows 64-bit system, these processes are 64-bit. Hence for 64-bit windows systems brtcredutanpro. dll is also implemented in 64-bit fashion.
According to the automatic screen locking and unlocking system for the computer, the screen of the computer can be locked in time when a user is far away from the computer in the use process of the computer, so that the safety of the computer is improved, and the data safety of the computer is guaranteed; when a user approaches the computer, the computer is unlocked in time, so that the computer is more convenient to use, and the user experience is improved.
The flow diagram of the automatic screen locking and unlocking method of the computer is shown in fig. 3. The automatic screen locking and unlocking method for the computer comprises the following steps:
step S301: target information is determined.
In an embodiment of the present invention, the bluetooth protocol stack integrates a computer system service process, searches for bluetooth devices around a computer through an output interface of the bluetooth protocol stack, and simultaneously obtains a RSSI value indicating a received strength signal of the bluetooth device, and displays information such as a device name of the bluetooth device to a user through a graphical display interface of the first bluetooth client. The user selects a suitable bluetooth device as the target bluetooth device and selects a suitable distance as the target distance.
In one example of the present invention, for example, the target bluetooth device may select a smart band closely related to the user, and the target distance between the target bluetooth device and the computer may be selected to be 1 meter. After the target Bluetooth equipment and the target distance are determined, the target Bluetooth equipment is placed at the target distance, and the RSSI value of the standard received strength signal indication of the target Bluetooth equipment is measured and stored. When a user carries the intelligent bracelet and is more than 1 meter away from the computer, the Bluetooth protocol stack makes an indication of screen locking of the computer at the moment by judging that the RSSI value indicated by the received strength signal of the intelligent bracelet is lower than the RSSI value indicated by the standard received strength signal; when the user carries the intelligent bracelet and is less than 1 meter apart from the computer, the bluetooth protocol stack makes the instruction of computer unblock this moment when judging that the received strength signal indication RSSI value of intelligent bracelet is higher than standard received strength signal indication RSSI value.
The method for automatically locking and unlocking the computer adopts the Bluetooth communication technology, and realizes the screen locking operation on the computer when a user leaves the computer through the judgment of the distance of the target Bluetooth equipment; when a user approaches the computer, the computer is unlocked, so that the safety of the computer is improved, and the computer use experience of the user is improved.
Step S302: and (5) locking a screen of the computer.
In one embodiment of the present invention, as shown in fig. 2, the method for automatically locking and unlocking a computer screen of the present invention includes a step of locking the computer screen. In the specific embodiment, when the bluetooth protocol stack judges that the RSSI value indicated by the received strength signal of the target bluetooth device is smaller than the RSSI value indicated by the standard received strength signal, that is, the target bluetooth device is far away from the computer, the bluetooth protocol stack sends the event information of the computer screen locking to the first bluetooth client, and the first bluetooth client calls a screen locking instruction (lockwork) in the Windows system after receiving the event indication of the computer screen locking of the bluetooth protocol stack, so as to complete the screen locking operation of the computer.
Step S303: and (5) unlocking the computer.
In one embodiment of the present invention, as shown in fig. 3, the method for automatically locking and unlocking a computer according to the present invention includes a computer unlocking step. In the specific embodiment, when the bluetooth protocol stack judges that the RSSI value indicated by the received strength signal of the target bluetooth device is greater than the RSSI value indicated by the standard received strength signal, that is, when the target bluetooth device is closer to the computer, the bluetooth protocol stack sends the event information of unlocking the computer to the second bluetooth client, and the second bluetooth client needs to implement two interface function instances of an innovative provider and an innovative provider defined in the innovative provider architecture. The user authorization information changes by calling icredialproviderevents:. credentialeschanged notifies the LogonUI component. And the Login UI subsequently calls the ICrepentialprovider and the ICrepentialprovidercreditial method to acquire system authorization information and log in, and finally the unlocking operation of the computer is completed.
In an embodiment of the present invention, the method for automatically locking and unlocking a computer further includes a step of verifying user authorization information, wherein the first bluetooth client first calls an API in the Windows system to display a system security dialog (creduipromptforwindows subscriptions), and then the user inputs user authorization information including a user name and a password. The first Bluetooth client analyzes the user authorization information through a (CredUnPackAuthenticationBufferW) method, and verifies the validity of the information through a (LogonUserW).
In an embodiment of the present invention, the method for automatically locking and unlocking a screen of a computer further includes a step of monitoring modification of user authorization information, wherein the second bluetooth client implements a related interface defined in a "Password filter" architecture, and can monitor a behavior of a user modifying a login Password.
By applying the automatic screen locking and unlocking method for the computer, the screen of the computer can be locked in time in the using process of the computer, so that the safety of the computer is improved, and the data safety of the computer is guaranteed; and the computer is unlocked in time, so that the computer is more convenient to use, and the user experience is improved.
In addition, an embodiment of the present invention further provides a computer-readable storage medium, in which computer-executable instructions are stored, and when at least one processor of the user equipment executes the computer-executable instructions, the user equipment performs the above-mentioned various possible methods.
Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an ASIC. Additionally, the ASIC may reside in user equipment. Of course, the processor and the storage medium may reside as discrete components in a communication device.
Those skilled in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A system for automatically locking and unlocking a screen of a computer is characterized by comprising:
the Bluetooth protocol stack provides a Bluetooth service interface, searches Bluetooth equipment, acquires a received signal strength indicating value of the Bluetooth equipment and establishes communication with a client;
the first Bluetooth client side is communicated with the Bluetooth protocol stack, searches the Bluetooth devices through the Bluetooth protocol stack and displays the Bluetooth devices through a graphical user interface, determines one Bluetooth device as a target Bluetooth device in the displayed Bluetooth devices, determines a standard received signal strength indicated value on a target distance through the Bluetooth protocol stack, and receives screen locking event information of the Bluetooth according to the Bluetooth protocol stack to lock the screen of the computer when the Bluetooth protocol stack determines that the received signal strength indicated value of the target Bluetooth device is smaller than the standard received signal strength indicated value;
and the second Bluetooth client establishes communication with the Bluetooth protocol stack, and receives the unlocking event information of the Bluetooth protocol stack to unlock the computer when the Bluetooth protocol stack determines that the received signal strength indicated value of the target Bluetooth device is greater than the standard received signal strength indicated value.
2. The system for automatically locking and unlocking a computer screen according to claim 1, wherein the bluetooth protocol stack is integrated by a computer system process, the bluetooth device is continuously monitored, and the target bluetooth device is always in an on state.
3. The system for automatically locking and unlocking a computer screen according to claim 1, wherein the first bluetooth client calls the bluetooth service interface of the bluetooth protocol stack to search for the bluetooth device and obtains the information of the bluetooth device, and the bluetooth device information includes the name of the bluetooth device.
4. The system for automatically locking and unlocking a computer screen according to claim 1, wherein the first client prompts a user to input authorization information and verifies the authorization information, and if the authorization information is valid, the computer screen is locked and unlocked.
5. The system for automatically locking and unlocking a computer screen according to claim 1, wherein the second client monitors the modification action of the authorization information and stores the modified new authorization information.
6. The system for automatically locking and unlocking a computer according to claim 1, wherein the target distance is a judgment distance for controlling the computer to lock or unlock the computer, and the standard RSSI value is an RSSI value of the target Bluetooth device at the target distance measured by the Bluetooth protocol stack.
7. A method for automatically locking and unlocking a computer screen is characterized by comprising the following steps:
determining target information, namely identifying Bluetooth equipment through a Bluetooth protocol stack, measuring a receiving intensity signal indicating value of the Bluetooth equipment, selecting target Bluetooth equipment from the Bluetooth equipment, determining the target distance between the target Bluetooth equipment and the computer, and determining a standard receiving intensity signal indicating value of the target Bluetooth equipment at the target distance;
a computer screen locking step, wherein a first Bluetooth client establishes communication with the Bluetooth protocol stack, and when the Bluetooth protocol stack determines that the receiving intensity signal indicated value of the target Bluetooth device is smaller than the standard receiving intensity signal indicated value, a screen locking task instruction in the computer system is called to lock the screen of the computer;
and a computer unlocking step, wherein a second Bluetooth client establishes communication with the Bluetooth protocol stack, and when the Bluetooth protocol stack determines that the receiving intensity signal indicated value of the target Bluetooth device is greater than the standard receiving intensity signal indicated value, an unlocking task instruction in the computer system is called to unlock the computer.
8. The method for automatically locking and unlocking a computer screen according to claim 7, further comprising a user authorization information verification step of displaying a dialog box through the first Bluetooth client, prompting a user to input authorization information, and performing validity verification on the authorization information.
9. The method for automatically locking and unlocking the computer screen as claimed in claim 7, further comprising a step of monitoring modification of the authorization information by the second bluetooth client, and storing the modified authorization information.
10. The method of claim 7, wherein the target distance is a determined distance for controlling the computer to lock or unlock the computer, and the standard RSSI value is an RSSI value of the target Bluetooth device at the target distance as measured by the Bluetooth protocol stack.
CN202010507147.5A 2020-06-05 2020-06-05 System and method for automatically locking and unlocking computer screen Pending CN111695104A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010507147.5A CN111695104A (en) 2020-06-05 2020-06-05 System and method for automatically locking and unlocking computer screen

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010507147.5A CN111695104A (en) 2020-06-05 2020-06-05 System and method for automatically locking and unlocking computer screen

Publications (1)

Publication Number Publication Date
CN111695104A true CN111695104A (en) 2020-09-22

Family

ID=72479630

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010507147.5A Pending CN111695104A (en) 2020-06-05 2020-06-05 System and method for automatically locking and unlocking computer screen

Country Status (1)

Country Link
CN (1) CN111695104A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112272372A (en) * 2020-09-28 2021-01-26 西安万像电子科技有限公司 Zero terminal login method and system
CN113535247A (en) * 2021-06-15 2021-10-22 荣耀终端有限公司 Screen locking and unlocking method and system
CN117034279A (en) * 2023-07-11 2023-11-10 成都安易迅科技有限公司 Safety protection method and system for computer equipment, storage medium and equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100120406A1 (en) * 2008-11-08 2010-05-13 Phoenix Technologies Ltd. Secure platform management with power savings capacity
CN103488932A (en) * 2013-10-16 2014-01-01 重庆邮电大学 Desktop security intercommunication system for mobile device and personal computer and implementation method thereof
CN104978544A (en) * 2014-04-02 2015-10-14 联想(北京)有限公司 Method and device for switching state of electronic equipment
CN105893802A (en) * 2016-03-29 2016-08-24 四川效率源信息安全技术股份有限公司 Method for locking/unlocking computer screen based on Bluetooth
CN106846590A (en) * 2017-03-07 2017-06-13 上海聚宝数字传媒有限公司 A kind of intelligent entrance guard interactive management method based on bluetooth connection under IOS systems

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100120406A1 (en) * 2008-11-08 2010-05-13 Phoenix Technologies Ltd. Secure platform management with power savings capacity
CN103488932A (en) * 2013-10-16 2014-01-01 重庆邮电大学 Desktop security intercommunication system for mobile device and personal computer and implementation method thereof
CN104978544A (en) * 2014-04-02 2015-10-14 联想(北京)有限公司 Method and device for switching state of electronic equipment
CN105893802A (en) * 2016-03-29 2016-08-24 四川效率源信息安全技术股份有限公司 Method for locking/unlocking computer screen based on Bluetooth
CN106846590A (en) * 2017-03-07 2017-06-13 上海聚宝数字传媒有限公司 A kind of intelligent entrance guard interactive management method based on bluetooth connection under IOS systems

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
FREEBUF 官方: "DLLPasswordFilterImplant:一款功能带有提取功能的DLL密码过滤器", 《百度HTTPS://WWW.SOHU.COM/A/378982334_354899》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112272372A (en) * 2020-09-28 2021-01-26 西安万像电子科技有限公司 Zero terminal login method and system
CN113535247A (en) * 2021-06-15 2021-10-22 荣耀终端有限公司 Screen locking and unlocking method and system
CN113535247B (en) * 2021-06-15 2022-10-14 荣耀终端有限公司 Screen locking and unlocking method and system
CN117034279A (en) * 2023-07-11 2023-11-10 成都安易迅科技有限公司 Safety protection method and system for computer equipment, storage medium and equipment

Similar Documents

Publication Publication Date Title
CN111695104A (en) System and method for automatically locking and unlocking computer screen
US10936755B2 (en) Device lock bypass on selectable alert
US20180314536A1 (en) Method and apparatus for invoking function in application
KR102471289B1 (en) A method for quickly opening an application or application function, and a terminal
EP2869528B1 (en) Method for performing authentication using biometrics information and portable electronic device supporting the same
US11537408B2 (en) Method for managing application program use time offline, and terminal device
EP2904535B1 (en) Limiting the functionality of a software program based on a security model
US20090177783A1 (en) Pairing and storage access scheme between a handheld device and a computing system
KR20150080736A (en) Method for executing a function and Electronic device using the same
CA2813172A1 (en) Multiple-access-level lock screen
US20240176900A1 (en) Systems and methods for managing hardware privacy configuration in modern workspaces
CN113781686A (en) Verification method, generation method and device for temporary password of intelligent door lock
CN107248078A (en) Mobile payment means of defence, mobile terminal and computer-readable recording medium
CN112446984A (en) Intelligent door lock control method and device
CN106778297B (en) Application program running method and device and mobile terminal
US20180132104A1 (en) Preventing mobile phone accessing when it is in unlocked state
CN108681668B (en) Equipment manager management method and device and mobile terminal
CN111279339A (en) Application locking method, terminal equipment and computer readable medium
CN116700815B (en) Hardware resource control method, electronic device and readable storage medium
CN115185425B (en) Method and device for controlling electronic book page turning displayed by terminal
CN116956261A (en) Heterogeneous system integration strategy method, system, platform and storage medium
CN115174077A (en) Equipment safety protection method and system
CN117407848A (en) Authorization mechanism optimization method, device and equipment for custom authority and storage medium
CN114422535A (en) Method and device for deploying contracts in block chain, computer equipment and storage medium
CN110210186A (en) A kind of latent function starting method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200922

RJ01 Rejection of invention patent application after publication