CN117034279A - Safety protection method and system for computer equipment, storage medium and equipment - Google Patents

Safety protection method and system for computer equipment, storage medium and equipment Download PDF

Info

Publication number
CN117034279A
CN117034279A CN202310849517.7A CN202310849517A CN117034279A CN 117034279 A CN117034279 A CN 117034279A CN 202310849517 A CN202310849517 A CN 202310849517A CN 117034279 A CN117034279 A CN 117034279A
Authority
CN
China
Prior art keywords
information
computer
computer equipment
bluetooth
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310849517.7A
Other languages
Chinese (zh)
Inventor
粟靖淞
田野
何世伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Anyixun Technology Co ltd
Original Assignee
Chengdu Anyixun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Anyixun Technology Co ltd filed Critical Chengdu Anyixun Technology Co ltd
Priority to CN202310849517.7A priority Critical patent/CN117034279A/en
Publication of CN117034279A publication Critical patent/CN117034279A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3055Monitoring arrangements for monitoring the status of the computing system or of the computing system component, e.g. monitoring if the computing system is on, off, available, not available
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The application discloses a safety protection method and system of computer equipment, a storage medium and the computer equipment, wherein the method comprises the following steps: the method comprises the steps that safety Bluetooth information corresponding to the computer equipment is preset, after the computer equipment is used and a safety protection program is operated, the safety protection program monitors Bluetooth connection conditions of the computer equipment, when the Bluetooth connection between the safety equipment corresponding to the computer equipment and the computer equipment is monitored to be disconnected, screen locking is conducted on the computer equipment, and in addition, unlocking is conducted on the computer equipment when the Bluetooth connection is restored between the safety equipment and the computer equipment. According to the application, in the use process of the computer equipment, according to the Bluetooth connection state of the safety equipment and the computer equipment, the computer equipment is automatically locked and unlocked, the computer is intelligently locked and unlocked, the safety of the computer equipment is improved, the data safety of the equipment is ensured, the unlocking is automatically carried out, and the convenience of using the computer equipment is improved.

Description

Safety protection method and system for computer equipment, storage medium and equipment
Technical Field
The present application relates to the field of computer security technologies, and in particular, to a method and system for protecting security of a computer device, a storage medium, and a computer device.
Background
When using personal computers in office chairs and public places, such scenarios are often encountered: in the case of using a computer, because of the sudden situation, the user needs to leave the personal computer temporarily for a period of time, in order to prevent other people from operating the computer at will, windows shortcut keys win+l or other related software can be used to lock the screen, but in the actual work and life, when people leave the computer, the user forgets to lock the screen, and the situation that the computer is not closed in time occurs. At present, computers are necessary products for communication and office, but compared with the prior computers, the prior computers have lower safety performance protection, cannot intelligently lock screens and intelligently sleep, so that the computers run for a long time and have low safety performance. At this time, it is most easy for computer data to be stolen or destroyed, resulting in leakage of privacy and confidentiality of individuals or companies.
Disclosure of Invention
In view of the above, the application provides a method and a system for protecting safety of computer equipment, a storage medium and the computer equipment, which are used for intelligently locking and unlocking a computer, improving the safety of the computer equipment, guaranteeing the data safety of the equipment, automatically unlocking the equipment and improving the convenience of using the computer equipment.
According to one aspect of the present application, there is provided a method of securing a computer device, the method comprising:
the computer equipment runs a safety protection program, monitors Bluetooth connection information of the computer equipment, and sends Bluetooth information of the first equipment to the server when the Bluetooth connection between the computer equipment and the first equipment is monitored to be disconnected;
the server verifies whether the first device Bluetooth information is the safety Bluetooth information pre-bound with the computer device, and sends a screen locking instruction to the computer device when the first device Bluetooth information is verified to be the safety Bluetooth information;
and responding to the screen locking instruction by the computer equipment, and executing screen locking operation on the computer equipment through the safety protection program.
Optionally, after performing, by the security protection program, a screen locking operation on the computer device, the method further includes:
when the Bluetooth connection between the computer equipment and the second equipment is monitored, the Bluetooth information of the second equipment is sent to the server;
the server verifies whether the Bluetooth information of the second device is the safety Bluetooth information pre-bound with the computer device, and sends a first unlocking instruction to the computer device when the Bluetooth information of the second device is verified to be the safety Bluetooth information;
And the computer equipment responds to the first unlocking instruction and executes unlocking operation on the computer equipment through the safety protection program.
Optionally, after performing, by the security protection program, a screen locking operation on the computer device, the method further includes:
the computer equipment responds to a hardware equipment input signal in a screen locking state, and starts a timer to count time;
if the timing duration of the timer reaches the preset duration and the computer equipment is still in a screen locking state, sending alarm information to the server; after receiving the alarm information, the server pushes an alarm notification to the security equipment and/or the secured account number corresponding to the computer equipment;
if the computer equipment is unlocked before the timing duration of the timer reaches the preset duration, the timer is closed, and shooting information is deleted.
Optionally, the method further comprises:
the computer equipment responds to a hardware equipment input signal in a screen locking state, and a camera of the computer equipment is called to shoot; the alarm information comprises shooting information of the camera;
after the safety equipment and/or the client logging in the safety account receives the alarm notification, responding to a query instruction, and querying shooting information corresponding to the alarm notification through a preset alarm information query channel.
Optionally, after performing, by the security protection program, a screen locking operation on the computer device, the method further includes:
the method comprises the steps that when a remote unlocking instruction aiming at the computer equipment is received, the server verifies first safety verification information corresponding to the remote unlocking instruction, and when verification passing is confirmed, a second unlocking instruction is sent to the computer equipment, wherein the first safety verification information comprises first user information for sending the remote unlocking instruction;
and the computer equipment responds to the second unlocking instruction and performs unlocking operation on the computer equipment through the safety protection program.
Optionally, after performing, by the security protection program, a screen locking operation on the computer device, the method further includes:
when receiving an unlocking password acquisition request aiming at the computer equipment, the server verifies second security verification information corresponding to the unlocking password acquisition request, and when confirming that the verification is passed, generates an unlocking password of the computer equipment and sends the unlocking password to a request terminal corresponding to the unlocking password acquisition request, wherein the second security verification information comprises second user information for sending the unlocking password acquisition request;
The computer equipment sends the received input password to the server;
the server verifies whether the input password is correct or not based on the unlocking password, and when the input password is verified to be correct, a third unlocking instruction is sent to the computer equipment;
and the computer equipment responds to the third unlocking instruction and performs unlocking operation on the computer equipment through the safety protection program.
Optionally, after the computer device runs the security protection program, the method further comprises:
inquiring whether the computer equipment completes the binding of the safety information or not when the protection mode of the safety protection program is started;
if the computer equipment completes the binding of the security information, executing the step of monitoring the Bluetooth connection information of the computer equipment;
if the computer equipment does not complete the binding of the security information, generating an image identification code, wherein the image identification code carries Bluetooth information of the computer equipment;
the mobile device scans the image identification code, displays a security information binding interface pointed by the image identification code, establishes Bluetooth connection between the mobile device and the computer device based on the Bluetooth information of the computer device under the condition of authorizing a Bluetooth function, and responds to a security information binding instruction to send security binding information containing the Bluetooth information of the mobile device, the Bluetooth information of the computer device and login user information to a server;
The server takes the Bluetooth information of the mobile device as the safe Bluetooth information corresponding to the Bluetooth information of the computer device, and stores the Bluetooth information of the computer device, the safe Bluetooth information and the login user information in a correlated mode.
According to another aspect of the present application, there is provided a security protection system for a computer device, the system comprising:
the computer equipment is used for running the safety protection program, monitoring Bluetooth connection information of the computer equipment, and sending the Bluetooth information of the first equipment to the server when the Bluetooth connection between the computer equipment and the first equipment is monitored to be disconnected;
the server is used for verifying whether the Bluetooth information of the first device is the safety Bluetooth information which is bound with the computer device in advance, and sending a screen locking instruction to the computer device when the Bluetooth information of the first device is verified to be the safety Bluetooth information;
and the computer equipment is used for responding to the screen locking instruction and executing screen locking operation on the computer equipment through the safety protection program.
Optionally, the computer device is configured to send, when it is monitored that a bluetooth connection is established between the computer device and the second device, bluetooth information of the second device to the server;
The server is used for verifying whether the Bluetooth information of the second device is the safety Bluetooth information pre-bound with the computer device, and sending a first unlocking instruction to the computer device when the Bluetooth information of the second device is verified to be the safety Bluetooth information;
the computer device is used for responding to the first unlocking instruction and executing unlocking operation on the computer device through the safety protection program.
Optionally, the computer device is used for responding to a hardware device input signal in a screen locking state and starting a timer to count time; if the timing duration of the timer reaches the preset duration and the computer equipment is still in a screen locking state, sending alarm information to the server; after receiving the alarm information, the server pushes an alarm notification to the security equipment and/or the secured account number corresponding to the computer equipment; if the computer equipment is unlocked before the timing duration of the timer reaches the preset duration, the timer is closed, and shooting information is deleted.
Optionally, the computer device is used for responding to a hardware device input signal in a screen locking state and calling a camera of the computer device to shoot; the alarm information comprises shooting information of the camera;
After the safety equipment and/or the client logging in the safety account receives the alarm notification, responding to a query instruction, and querying shooting information corresponding to the alarm notification through a preset alarm information query channel.
Optionally, the server is configured to, when receiving a remote unlocking instruction for the computer device, verify first security verification information corresponding to the remote unlocking instruction, and when confirming that verification passes, send a second unlocking instruction to the computer device, where the first security verification information includes first user information that sends the remote unlocking instruction;
the computer device is used for responding to the second unlocking instruction and executing unlocking operation on the computer device through the safety protection program.
Optionally, the server is configured to, when receiving an unlock password acquisition request for the computer device, verify second security verification information corresponding to the unlock password acquisition request, and when confirming that verification is passed, generate an unlock password of the computer device and send the unlock password to a request terminal corresponding to the unlock password acquisition request, where the second security verification information includes second user information for sending the unlock password acquisition request;
The computer equipment is used for sending the received input password to the server;
the server is used for verifying whether the input password is correct based on the unlocking password, and sending a third unlocking instruction to the computer equipment when the input password is correct;
the computer device is used for responding to the third unlocking instruction and executing unlocking operation on the computer device through the safety protection program.
Optionally, the computer device is configured to:
inquiring whether the computer equipment completes the binding of the safety information or not when the protection mode of the safety protection program is started;
if the computer equipment completes the binding of the security information, executing the step of monitoring the Bluetooth connection information of the computer equipment;
if the computer equipment does not complete the binding of the security information, generating an image identification code, wherein the image identification code carries Bluetooth information of the computer equipment;
the mobile device is used for displaying a security information binding interface pointed by the image identification code by scanning the image identification code, establishing Bluetooth connection between the mobile device and the computer device based on the Bluetooth information of the computer device under the condition of authorizing a Bluetooth function, and responding to a security information binding instruction, and sending security binding information comprising the Bluetooth information of the mobile device, the Bluetooth information of the computer device and login user information to a server;
The server is configured to use the mobile device bluetooth information as secure bluetooth information corresponding to the computer device bluetooth information, and store the computer device bluetooth information, the secure bluetooth information and the login user information in an associated manner.
According to yet another aspect of the present application, there is provided a storage medium having stored thereon a computer program which, when executed by a processor, implements the security protection method of a computer device described above.
According to still another aspect of the present application, there is provided a computer device including a storage medium, a processor, and a computer program stored on the storage medium and executable on the processor, the processor implementing the security protection method of the computer device when executing the program.
By means of the technical scheme, the safety protection method and system for the computer equipment, the storage medium and the computer equipment are provided, safety Bluetooth information corresponding to the computer equipment is preset, after the computer equipment is used and a safety protection program is operated, the safety protection program monitors Bluetooth connection conditions of the computer equipment, when the Bluetooth connection between the safety equipment corresponding to the computer equipment and the computer equipment is monitored to be disconnected, screen locking is carried out on the computer equipment, and in addition, unlocking is carried out on the computer equipment when the Bluetooth connection between the safety equipment and the computer equipment is monitored to be restored. The embodiment of the application realizes automatic screen locking of the computer equipment when the user holds the safety equipment and leaves the computer equipment, and automatic unlocking of the computer equipment locked when the user holds the safety equipment and returns to the computer equipment, intelligently locks and unlocks the computer, improves the safety of the computer equipment, ensures the data safety of the equipment, and automatically unlocks the computer equipment, thereby improving the convenience of using the computer equipment.
The foregoing description is only an overview of the present application, and is intended to be implemented in accordance with the teachings of the present application in order that the same may be more clearly understood and to make the same and other objects, features and advantages of the present application more readily apparent.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
fig. 1 is a schematic flow chart of a method for protecting security of a computer device according to an embodiment of the present application;
FIG. 2 is a flow chart illustrating another method for protecting security of a computer device according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating another method for protecting security of a computer device according to an embodiment of the present application;
FIG. 4 is a flowchart illustrating another method for protecting security of a computer device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a security protection system of a computer device according to an embodiment of the present application;
Fig. 6 shows a schematic device structure of a computer device according to an embodiment of the present application.
Detailed Description
The application will be described in detail hereinafter with reference to the drawings in conjunction with embodiments. It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other.
In this embodiment, a method for protecting safety of a computer device is provided, as shown in fig. 1, and the method includes:
step 101, a computer device runs a security protection program, monitors Bluetooth connection information of the computer device, and sends Bluetooth information of a first device to a server when the Bluetooth connection between the computer device and the first device is monitored to be disconnected.
Step 102, the server verifies whether the first device bluetooth information is the secure bluetooth information pre-bound with the computer device, and sends a screen locking instruction to the computer device when verifying that the first device bluetooth information is the secure bluetooth information.
And step 103, responding to the screen locking instruction by the computer equipment, and executing screen locking operation on the computer equipment through the safety protection program.
In the embodiment of the application, a safety protection program is pre-installed in a computer device, the computer device automatically runs or a user selects to run the safety protection program and starts a safety protection function, the safety protection program monitors the Bluetooth connection condition of the computer device, when the Bluetooth connection between the computer device and a certain device is monitored to be disconnected, the safety protection program sends the Bluetooth information of the device, namely the first device Bluetooth information, to a server, wherein the safety protection program can only monitor the Bluetooth connection information of a specific type of device, so that the Bluetooth information of the device is sent to the server when the Bluetooth connection between the specific type of device and the computer device is monitored to be disconnected, for example, the Bluetooth connection condition of a mobile phone, a tablet and other types of devices is monitored, and the Bluetooth connection information of the Bluetooth earphone, a Bluetooth mouse, a Bluetooth keyboard and other devices is ignored. After receiving the Bluetooth information of the first device, the server verifies whether the Bluetooth information of the first device is the safe Bluetooth information corresponding to the safety device pre-bound with the computer device, if so, the server indicates that the safety device has left the computer device, and then a screen locking instruction is sent to the computer device. The computer device responds to the screen locking instruction, and the safety protection program executes automatic screen locking operation on the computer device.
In a specific application scene, a user can bind a mobile phone and a computer in advance, a server records mobile phone Bluetooth information and computer Bluetooth information of the user, the mobile phone of the user generally does not leave the user, bluetooth connection is kept between the mobile phone and the computer when the computer is used, when the Bluetooth connection between the mobile phone and the computer is disconnected, a computer device can send a signal for disconnecting the Bluetooth of the mobile phone to the server, at the moment, the user can be considered to leave the computer, and the server sends a screen locking instruction to the computer to lock the screen of the computer.
Further, in an embodiment of the present application, optionally, step 103 further includes:
and 104, when the Bluetooth connection between the computer equipment and the second equipment is monitored, sending the Bluetooth information of the second equipment to the server.
Step 105, the server verifies whether the second device bluetooth information is the secure bluetooth information pre-bound to the computer device, and sends a first unlocking instruction to the computer device when verifying that the second device bluetooth information is the secure bluetooth information.
And step 106, the computer equipment responds to the first unlocking instruction and performs unlocking operation on the computer equipment through the safety protection program.
In the above embodiment, after the computer device enters the screen locking state, the security protection program continuously monitors bluetooth connection information of the computer device, and when it is monitored that a certain device and the computer device establish bluetooth connection, bluetooth information of the device, that is, bluetooth information of the second device, is sent to the server, where the security protection program may monitor only bluetooth connection information of a specific type of device, so that when it is monitored that bluetooth connection is established between the specific type of device and the computer device, bluetooth information of the device is sent to the server, for example, bluetooth connection conditions of devices such as a mobile phone, a tablet and the like are monitored, and bluetooth connection information of devices such as a bluetooth earphone, a bluetooth mouse, a bluetooth keyboard and the like is ignored. After receiving the Bluetooth information of the second device, the server verifies whether the Bluetooth information of the second device is the safe Bluetooth information corresponding to the safety device pre-bound with the computer device, if so, the server indicates that the safety device which is separated from the computer device before is close to the computer device, and then an unlocking instruction is sent to the computer device. And the computer equipment responds to the unlocking instruction, the safety protection program executes automatic unlocking operation on the computer equipment, and the usable state of the computer equipment is restored.
In a specific application scenario, after the security protection program locks the screen of the computer device, if the mobile phone and the computer restore the Bluetooth connection, the computer sends a signal of the Bluetooth connection of the mobile phone to the server, and at this time, the user can consider that the mobile phone is held by the user and returns to the side of the computer device, and the server sends an unlocking instruction to the computer to perform automatic unlocking operation on the computer.
By applying the technical scheme of the embodiment, the safety Bluetooth information corresponding to the computer equipment is preset, after the computer equipment is used and the safety protection program is operated, the safety protection program monitors the Bluetooth connection condition of the computer equipment, when the Bluetooth connection between the safety equipment corresponding to the computer equipment and the computer equipment is monitored to be disconnected, the computer equipment is locked, and in addition, when the Bluetooth connection between the safety equipment and the computer equipment is monitored to be restored, the computer equipment is unlocked. The embodiment of the application realizes automatic screen locking of the computer equipment when the user holds the safety equipment and leaves the computer equipment, and automatic unlocking of the computer equipment locked when the user holds the safety equipment and returns to the computer equipment, intelligently locks and unlocks the computer, improves the safety of the computer equipment, ensures the data safety of the equipment, and automatically unlocks the computer equipment, thereby improving the convenience of using the computer equipment.
In an embodiment of the present application, optionally, after the computer device runs the security protection program, the method further includes: inquiring whether the computer equipment completes the binding of the safety information or not when the protection mode of the safety protection program is started; if the computer equipment completes the binding of the security information, continuing to execute the step of monitoring the Bluetooth connection information of the computer equipment; if the computer device does not complete the binding of the security information, the following steps S1-S3 are executed, and then the step of monitoring the Bluetooth connection information of the computer device is continued.
S1, generating an image identification code, wherein the image identification code carries Bluetooth information of computer equipment;
s2, the mobile device scans the image identification code, displays a security information binding interface pointed by the image identification code, establishes Bluetooth connection between the mobile device and the computer device based on the computer device Bluetooth information under the condition of authorizing a Bluetooth function, and responds to a security information binding instruction to send security binding information containing the mobile device Bluetooth information, the computer device Bluetooth information and login user information to a server;
And S3, the server takes the Bluetooth information of the mobile equipment as the safe Bluetooth information corresponding to the Bluetooth information of the computer equipment, and stores the Bluetooth information of the computer equipment, the safe Bluetooth information and the login user information in a correlated mode.
In this embodiment, when the computer device runs the security protection program and starts the protection mode, the program will first determine whether the computer device has completed the security information binding, and if the security information binding has been completed, then directly enter the bluetooth connection information monitoring procedure. If the security information binding has not been completed, the user should be guided to complete the security information binding. Specifically, an image identification code (for example, two-dimensional code) can be generated, a user holds a mobile device with Bluetooth function such as a mobile phone and a tablet, scans the image identification code, enters a security information binding boundary surface, the user can authorize the Bluetooth function on the security information binding boundary surface, the mobile device automatically searches for a computer device and establishes Bluetooth connection with the computer device after authorizing the Bluetooth function, the security information binding boundary surface displays Bluetooth information and device information of the mobile device and the computer device, if the user confirms that the mobile device is bound as the security device of the computer device, the user can submit a security information binding instruction on an interface, and the mobile device packages the information such as the Bluetooth information of the mobile device, the Bluetooth information of the computer device, the login user information of the current login user, the mobile device identifier, the computer device identifier and the like into security binding information and sends the security binding information to a server. After receiving the security binding information, the server takes the mobile device as the security device of the computer device, takes the login user information as the security user account of the computer device, and stores all the information in the security binding information in an associated mode so as to carry out verification such as locking, unlocking and the like.
As shown in fig. 2, the procedure of binding a computer (computer device) to a mobile phone (mobile device) bluetooth can be described as: 1. a security protection program (hereinafter referred to as a client) needs to be installed in the computer. 2. After the installation is successful, a protection mode can be started in a management background (comprising a webpage version and an applet), after the management background is started successfully, if a computer is in an on-line state, a server informs a client through long links, the client requests corresponding parameters to the server, and after the request is successful, an intelligent lock binding popup window can be directly displayed at the client, and the user is required to scan code binding. 3. The WeChat code enters the applet, the login is successful in the applet, and then whether the login computer has authority to bind the security device is judged, if not, the WeChat code enters the unauthorized page of the applet, if so, bluetooth judgment of the computer and the mobile phone is carried out. 4. If the computer does not support Bluetooth, a prompt page for the computer not supporting Bluetooth is entered, and if the computer is supported but not started, bluetooth is automatically started. 5. If the Bluetooth is not started, the mobile phone can enter a prompt page for starting the Bluetooth, and the flow can be continued after the mobile phone is started. 6. When the mobile phone turns on Bluetooth, bluetooth of the computer is automatically tried to be connected, if connection is successful, the next step is to be carried out, if connection is failed, a prompt is given, and the connection can be operated again. 7. And after the Bluetooth connection is successful, the client records corresponding Bluetooth data and is used for automatic connection when the follow-up mobile phone approaches. The server performs the following logic processing: and recording the judgment that the mobile phone is close to the automatic unlocking after the associated information of the equipment, the account and the Bluetooth data.
In an embodiment of the present application, optionally, step 103 further includes: the method comprises the steps that when a remote unlocking instruction aiming at the computer equipment is received, the server verifies first safety verification information corresponding to the remote unlocking instruction, and when verification passing is confirmed, a second unlocking instruction is sent to the computer equipment, wherein the first safety verification information comprises first user information for sending the remote unlocking instruction; and the computer equipment responds to the second unlocking instruction and performs unlocking operation on the computer equipment through the safety protection program.
In this embodiment, after the user holds the security device and leaves the computer device, after the computer automatically locks the screen due to disconnection of the bluetooth connection with the security device, the user may also remotely unlock the computer device when the user is inconvenient to operate himself or wants to help other people operate the computer device, etc. Specifically, the security protection program can perform a remote unlocking function by supporting a small program, a public number, an APP and the like, a user can log in a pre-bound account through the small program, the public number, the APP and the like, a remote unlocking instruction is sent to a server, the remote unlocking instruction carries first user information of a logged-in user and computer equipment information (computer equipment identification or computer equipment Bluetooth information), the server verifies the first user information, whether the first user information is the user information pre-bound with the computer equipment or not is judged, and if verification is passed, the unlocking instruction is sent to the computer equipment to remotely unlock the computer equipment.
In an embodiment of the present application, optionally, step 103 further includes: when receiving an unlocking password acquisition request aiming at the computer equipment, the server verifies second security verification information corresponding to the unlocking password acquisition request, and when confirming that the verification is passed, generates an unlocking password of the computer equipment and sends the unlocking password to a request terminal corresponding to the unlocking password acquisition request, wherein the second security verification information comprises second user information for sending the unlocking password acquisition request; the computer equipment sends the received input password to the server; the server verifies whether the input password is correct or not based on the unlocking password, and when the input password is verified to be correct, a third unlocking instruction is sent to the computer equipment; and the computer equipment responds to the third unlocking instruction and performs unlocking operation on the computer equipment through the safety protection program.
In this embodiment, the user may also remotely obtain the unlock code of the computer device, and after informing other people of the unlock code, the other people input the unlock code on the computer device to unlock. Specifically, the security protection program can support the function of acquiring passwords through the modes of an applet, a public number, an APP and the like, a user can log in a pre-bound account through the applet, the public number, the APP and the like, an unlocking password acquisition request is sent to a server, the unlocking password acquisition request carries second user information of a logged-in user and computer equipment information (computer equipment identification or computer equipment Bluetooth information), the server verifies the second user information, and if the verification is passed, the server judges whether the first user information is the user information pre-bound with the computer equipment, and if the verification is passed, the unlocking password is sent to the applet, the public number, the APP and the like. The user informs other people of the unlocking password, the other people input the unlocking password on the computer equipment, the server verifies whether the input password is correct, and if so, the server sends a receiving instruction to the computer equipment to automatically unlock.
Further, as a refinement and extension of the foregoing embodiment, in order to fully describe the implementation process of this embodiment, another method for protecting safety of a computer device is provided, as shown in fig. 3, where the method includes:
in step 201, the computer device starts a timer to count time in response to an input signal of the hardware device in the screen locking state, and calls a camera of the computer device to shoot.
Step 202, if the time length of the timer reaches a preset time length and the computer equipment is still in a screen locking state, sending alarm information to the server; the alarm information comprises shooting information of the camera.
And 203, after receiving the alarm information, the server pushes an alarm notification to the security device and/or the secured account number corresponding to the computer device.
Step 204, after the security device and/or the client logged in the secured account number receives the alarm notification, the client responds to a query instruction and queries, through a preset alarm information query channel, the shooting information corresponding to the alarm notification.
And step 205, if the computer equipment is unlocked before the timing duration of the timer reaches the preset duration, closing the timer and deleting the shooting information.
In this embodiment, under the condition of screen locking of the computer device, the security protection program also monitors the hardware device input signal of the computer device, and when the hardware device input of a mouse, a keyboard and the like is monitored, a timer is started, and a camera of the computer device is called to shoot an image. If the time reaches the preset time, the computer equipment is still in a screen locking state, and the computer equipment is possibly maliciously operated by other people, the computer equipment sends alarm information to the server, and in addition, in order to avoid the alarm caused by the false touch of the computer equipment, the computer equipment can be set to detect the input signal of the hardware equipment for a plurality of times within the preset time, but the computer equipment is not unlocked yet, and then the alarm is carried out. After receiving the alarm information, the server sends an alarm notice to the security device corresponding to the computer device or the pre-bound security account number, and the alarm notice can be sent in a mode of small program, public number message, APP message and the like. After receiving the alarm notification, the user can inquire the image shot by the camera of the computer equipment through an applet, a public number, an APP and the like. If the computer device is unlocked within the preset time period, the hardware device input signal detected before can be considered that the user inputs an unlocking password, and the computer device is safe, the timer is closed, and the image shot by the camera is deleted.
As shown in fig. 4, the computer alarm process after the computer is locked can be described as follows: when the computer is locked and the mouse moves/clicks or keyboard clicks occur, the client records the starting time and counts the time, and meanwhile, a front camera of the computer is called to take pictures, and one picture is taken every 10 seconds. The client program counts the time according to the start time of step 1. When the condition is met (e.g., within 3 minutes), the data will be submitted to the server, which will generate an alarm message, store a picture, and send a message notification to the public number the user is interested in, which the user can also query the applet for this risk alarm message. Before the condition is met (for example, within 3 minutes), the client computer is successfully unlocked through the password, or the user is successfully unlocked through the background (webpage version and applet), then the client stops timing, and the photo shot by the camera is deleted. So far, when the computer is locked, if someone uses the computer, the software automatically shoots and informs the user through a message.
By applying the technical scheme of the embodiment, when a user uses the safety protection program and the computer is started to be connected with the network, if the user forgets to lock the computer when leaving the computer, the software can automatically lock the computer, and when the user returns to the side of the computer, the software can also automatically unlock the computer. The computer system can prevent other people from using the computer when the user leaves the computer, protect computer data and bring sufficient safety feeling and convenience to the user. When the user leaves the computer and locks the computer, once someone else uses the computer, the software informs the owner through a message, the owner can see the occurrence time and which computer in the alarm message, and the current live photo can be used as evidence if the face before the computer is shot.
Further, as a specific implementation of the method of fig. 1, an embodiment of the present application provides a security protection system for a computer device, as shown in fig. 5, where the system includes:
the computer equipment is used for running the safety protection program, monitoring Bluetooth connection information of the computer equipment, and sending the Bluetooth information of the first equipment to the server when the Bluetooth connection between the computer equipment and the first equipment is monitored to be disconnected;
the server is used for verifying whether the Bluetooth information of the first device is the safety Bluetooth information which is bound with the computer device in advance, and sending a screen locking instruction to the computer device when the Bluetooth information of the first device is verified to be the safety Bluetooth information;
and the computer equipment is used for responding to the screen locking instruction and executing screen locking operation on the computer equipment through the safety protection program.
Optionally, the computer device is configured to send, when it is monitored that a bluetooth connection is established between the computer device and the second device, bluetooth information of the second device to the server;
the server is used for verifying whether the Bluetooth information of the second device is the safety Bluetooth information pre-bound with the computer device, and sending a first unlocking instruction to the computer device when the Bluetooth information of the second device is verified to be the safety Bluetooth information;
The computer device is used for responding to the first unlocking instruction and executing unlocking operation on the computer device through the safety protection program.
Optionally, the computer device is used for responding to a hardware device input signal in a screen locking state and starting a timer to count time; if the timing duration of the timer reaches the preset duration and the computer equipment is still in a screen locking state, sending alarm information to the server; after receiving the alarm information, the server pushes an alarm notification to the security equipment and/or the secured account number corresponding to the computer equipment; if the computer equipment is unlocked before the timing duration of the timer reaches the preset duration, the timer is closed, and shooting information is deleted.
Optionally, the computer device is used for responding to a hardware device input signal in a screen locking state and calling a camera of the computer device to shoot; the alarm information comprises shooting information of the camera;
after the safety equipment and/or the client logging in the safety account receives the alarm notification, responding to a query instruction, and querying shooting information corresponding to the alarm notification through a preset alarm information query channel.
Optionally, the server is configured to, when receiving a remote unlocking instruction for the computer device, verify first security verification information corresponding to the remote unlocking instruction, and when confirming that verification passes, send a second unlocking instruction to the computer device, where the first security verification information includes first user information that sends the remote unlocking instruction;
the computer device is used for responding to the second unlocking instruction and executing unlocking operation on the computer device through the safety protection program.
Optionally, the server is configured to, when receiving an unlock password acquisition request for the computer device, verify second security verification information corresponding to the unlock password acquisition request, and when confirming that verification is passed, generate an unlock password of the computer device and send the unlock password to a request terminal corresponding to the unlock password acquisition request, where the second security verification information includes second user information for sending the unlock password acquisition request;
the computer equipment is used for sending the received input password to the server;
the server is used for verifying whether the input password is correct based on the unlocking password, and sending a third unlocking instruction to the computer equipment when the input password is correct;
The computer device is used for responding to the third unlocking instruction and executing unlocking operation on the computer device through the safety protection program.
Optionally, the computer device is configured to:
inquiring whether the computer equipment completes the binding of the safety information or not when the protection mode of the safety protection program is started;
if the computer equipment completes the binding of the security information, executing the step of monitoring the Bluetooth connection information of the computer equipment;
if the computer equipment does not complete the binding of the security information, generating an image identification code, wherein the image identification code carries Bluetooth information of the computer equipment;
the mobile device is used for displaying a security information binding interface pointed by the image identification code by scanning the image identification code, establishing Bluetooth connection between the mobile device and the computer device based on the Bluetooth information of the computer device under the condition of authorizing a Bluetooth function, and responding to a security information binding instruction, and sending security binding information comprising the Bluetooth information of the mobile device, the Bluetooth information of the computer device and login user information to a server;
the server is configured to use the mobile device bluetooth information as secure bluetooth information corresponding to the computer device bluetooth information, and store the computer device bluetooth information, the secure bluetooth information and the login user information in an associated manner.
The embodiment of the application also provides a computer device, which can be a personal computer, a server, a network device and the like, and as shown in fig. 6, the computer device comprises a bus, a processor, a memory and a communication interface, and can also comprise an input/output interface and a display device. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is for storing location information. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement the steps in the method embodiments.
It will be appreciated by those skilled in the art that the structure shown in FIG. 6 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer readable storage medium is provided, which may be non-volatile or volatile, and on which a computer program is stored, which computer program, when being executed by a processor, carries out the steps of the method embodiments described above.
In an embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the steps of the method embodiments described above.
The user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or sufficiently authorized by each party.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the embodiments provided herein may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processor referred to in the embodiments provided in the present application may be a general-purpose processor, a central processing unit, a graphics processor, a digital signal processor, a programmable logic unit, a data processing logic unit based on quantum computing, or the like, but is not limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.

Claims (10)

1. A method of securing a computer device, the method comprising:
the computer equipment runs a safety protection program, monitors Bluetooth connection information of the computer equipment, and sends Bluetooth information of the first equipment to the server when the Bluetooth connection between the computer equipment and the first equipment is monitored to be disconnected;
the server verifies whether the first device Bluetooth information is the safety Bluetooth information pre-bound with the computer device, and sends a screen locking instruction to the computer device when the first device Bluetooth information is verified to be the safety Bluetooth information;
And responding to the screen locking instruction by the computer equipment, and executing screen locking operation on the computer equipment through the safety protection program.
2. The method of claim 1, wherein after performing a screen lock operation on the computer device by the security guard program, the method further comprises:
when the Bluetooth connection between the computer equipment and the second equipment is monitored, the Bluetooth information of the second equipment is sent to the server;
the server verifies whether the Bluetooth information of the second device is the safety Bluetooth information pre-bound with the computer device, and sends a first unlocking instruction to the computer device when the Bluetooth information of the second device is verified to be the safety Bluetooth information;
and the computer equipment responds to the first unlocking instruction and executes unlocking operation on the computer equipment through the safety protection program.
3. The method of claim 1, wherein after performing a screen lock operation on the computer device by the security guard program, the method further comprises:
the computer equipment responds to a hardware equipment input signal in a screen locking state, and starts a timer to count time;
If the timing duration of the timer reaches the preset duration and the computer equipment is still in a screen locking state, sending alarm information to the server; after receiving the alarm information, the server pushes an alarm notification to the security equipment and/or the secured account number corresponding to the computer equipment;
if the computer equipment is unlocked before the timing duration of the timer reaches the preset duration, the timer is closed, and shooting information is deleted.
4. A method according to claim 3, characterized in that the method further comprises:
the computer equipment responds to a hardware equipment input signal in a screen locking state, and a camera of the computer equipment is called to shoot; the alarm information comprises shooting information of the camera;
after the safety equipment and/or the client logging in the safety account receives the alarm notification, responding to a query instruction, and querying shooting information corresponding to the alarm notification through a preset alarm information query channel.
5. The method of claim 1, wherein after performing a screen lock operation on the computer device by the security guard program, the method further comprises:
The method comprises the steps that when a remote unlocking instruction aiming at the computer equipment is received, the server verifies first safety verification information corresponding to the remote unlocking instruction, and when verification passing is confirmed, a second unlocking instruction is sent to the computer equipment, wherein the first safety verification information comprises first user information for sending the remote unlocking instruction;
and the computer equipment responds to the second unlocking instruction and performs unlocking operation on the computer equipment through the safety protection program.
6. The method of claim 1, wherein after performing a screen lock operation on the computer device by the security guard program, the method further comprises:
when receiving an unlocking password acquisition request aiming at the computer equipment, the server verifies second security verification information corresponding to the unlocking password acquisition request, and when confirming that the verification is passed, generates an unlocking password of the computer equipment and sends the unlocking password to a request terminal corresponding to the unlocking password acquisition request, wherein the second security verification information comprises second user information for sending the unlocking password acquisition request;
the computer equipment sends the received input password to the server;
The server verifies whether the input password is correct or not based on the unlocking password, and when the input password is verified to be correct, a third unlocking instruction is sent to the computer equipment;
and the computer equipment responds to the third unlocking instruction and performs unlocking operation on the computer equipment through the safety protection program.
7. The method of any one of claims 1 to 6, wherein after the computer device runs a security guard, the method further comprises:
inquiring whether the computer equipment completes the binding of the safety information or not when the protection mode of the safety protection program is started;
if the computer equipment completes the binding of the security information, executing the step of monitoring the Bluetooth connection information of the computer equipment;
if the computer equipment does not complete the binding of the security information, generating an image identification code, wherein the image identification code carries Bluetooth information of the computer equipment;
the mobile device scans the image identification code, displays a security information binding interface pointed by the image identification code, establishes Bluetooth connection between the mobile device and the computer device based on the Bluetooth information of the computer device under the condition of authorizing a Bluetooth function, and responds to a security information binding instruction to send security binding information containing the Bluetooth information of the mobile device, the Bluetooth information of the computer device and login user information to a server;
The server takes the Bluetooth information of the mobile device as the safe Bluetooth information corresponding to the Bluetooth information of the computer device, and stores the Bluetooth information of the computer device, the safe Bluetooth information and the login user information in a correlated mode.
8. A security system for a computer device, the system comprising:
the computer equipment is used for running the safety protection program, monitoring Bluetooth connection information of the computer equipment, and sending the Bluetooth information of the first equipment to the server when the Bluetooth connection between the computer equipment and the first equipment is monitored to be disconnected;
the server is used for verifying whether the Bluetooth information of the first device is the safety Bluetooth information which is bound with the computer device in advance, and sending a screen locking instruction to the computer device when the Bluetooth information of the first device is verified to be the safety Bluetooth information;
and the computer equipment is used for responding to the screen locking instruction and executing screen locking operation on the computer equipment through the safety protection program.
9. A storage medium having stored thereon a computer program, which when executed by a processor, implements the method of any of claims 1 to 7.
10. A computer device comprising a storage medium, a processor and a computer program stored on the storage medium and executable on the processor, characterized in that the processor implements the method of any one of claims 1 to 7 when executing the computer program.
CN202310849517.7A 2023-07-11 2023-07-11 Safety protection method and system for computer equipment, storage medium and equipment Pending CN117034279A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310849517.7A CN117034279A (en) 2023-07-11 2023-07-11 Safety protection method and system for computer equipment, storage medium and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310849517.7A CN117034279A (en) 2023-07-11 2023-07-11 Safety protection method and system for computer equipment, storage medium and equipment

Publications (1)

Publication Number Publication Date
CN117034279A true CN117034279A (en) 2023-11-10

Family

ID=88623432

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310849517.7A Pending CN117034279A (en) 2023-07-11 2023-07-11 Safety protection method and system for computer equipment, storage medium and equipment

Country Status (1)

Country Link
CN (1) CN117034279A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105893802A (en) * 2016-03-29 2016-08-24 四川效率源信息安全技术股份有限公司 Method for locking/unlocking computer screen based on Bluetooth
CN111695104A (en) * 2020-06-05 2020-09-22 北京百瑞互联技术有限公司 System and method for automatically locking and unlocking computer screen
CN113449277A (en) * 2021-06-30 2021-09-28 未鲲(上海)科技服务有限公司 Screen locking control method and device, computer equipment and storage medium
CN113535247A (en) * 2021-06-15 2021-10-22 荣耀终端有限公司 Screen locking and unlocking method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105893802A (en) * 2016-03-29 2016-08-24 四川效率源信息安全技术股份有限公司 Method for locking/unlocking computer screen based on Bluetooth
CN111695104A (en) * 2020-06-05 2020-09-22 北京百瑞互联技术有限公司 System and method for automatically locking and unlocking computer screen
CN113535247A (en) * 2021-06-15 2021-10-22 荣耀终端有限公司 Screen locking and unlocking method and system
CN113449277A (en) * 2021-06-30 2021-09-28 未鲲(上海)科技服务有限公司 Screen locking control method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
US20230297394A1 (en) Device Locator Disable Authentication
US11182493B2 (en) Information privacy system and method
AU2010244945B2 (en) Discriminating data protection system
US8176163B1 (en) Dual cookie security system
CN110706379B (en) Access control method and device based on block chain
CN102413456B (en) User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
JP2014533411A (en) How to secure a computing device
CA2751319C (en) Location dependent monitoring for stolen devices
CN111767583A (en) Block chain-based enterprise internal information security guarantee method and system
US20140099923A1 (en) Subscriber device unlock
US8850520B1 (en) Dual cookie security system with interlocking validation requirements and remedial actions to protect personal data
US20210173956A1 (en) User access management from anywhere and prevent intruders by notifying the users after a predetermined time interval
WO2016080963A1 (en) Network backup
CN117034279A (en) Safety protection method and system for computer equipment, storage medium and equipment
CN111050236B (en) Electronic equipment anti-theft method, device and system, electronic equipment and storage medium
CN117034377A (en) Safety protection system
CN110008760B (en) Password data storage method and device, electronic equipment and computer readable medium
CN115220665B (en) Access method and system of distributed storage system
CN117411729B (en) Oracle database login method, device, computer equipment and medium
WO2024021883A1 (en) Information leakage prevention method and apparatus, and storage medium
CN118051923A (en) File intelligent unlocking method and device, computer equipment and storage medium
CN117220977A (en) Single sign-on application page control method, device, equipment and storage medium
CN116366335A (en) Method, device, computer equipment and storage medium for remotely accessing intranet
Faaborg et al. SECURITY SYSTEM WITH AUTHENTICATION CODE AND ADAPTIVE PHOTO LOG
CN115333733A (en) Unlocking method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination