WO2013060102A1 - 基于蓝牙的计算机安全防护方法和系统 - Google Patents

基于蓝牙的计算机安全防护方法和系统 Download PDF

Info

Publication number
WO2013060102A1
WO2013060102A1 PCT/CN2012/070266 CN2012070266W WO2013060102A1 WO 2013060102 A1 WO2013060102 A1 WO 2013060102A1 CN 2012070266 W CN2012070266 W CN 2012070266W WO 2013060102 A1 WO2013060102 A1 WO 2013060102A1
Authority
WO
WIPO (PCT)
Prior art keywords
computer
bluetooth
interface
signal strength
bluetooth device
Prior art date
Application number
PCT/CN2012/070266
Other languages
English (en)
French (fr)
Inventor
袁嘉玲
王琦凡
Original Assignee
Yuan Jialing
Wang Qifan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yuan Jialing, Wang Qifan filed Critical Yuan Jialing
Publication of WO2013060102A1 publication Critical patent/WO2013060102A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the invention belongs to the technical field of security, and relates to a computer security protection method and system, in particular to a method and system based on Bluetooth computer security protection.
  • Bluetooth refers to a radio technology that supports short-range communication of devices. It uses a decentralized network structure, fast frequency hopping and short packet technology, supports point-to-point and point-to-multipoint communication, and implements full-duplex with time-division duplex transmission scheme. Transmission, data transmission rate is 1 Mbps, effective communication distance is 10m. Bluetooth is widely used in mobile phones, wireless headsets, computers and related peripheral devices to achieve wireless connectivity between devices; and devices such as mobile phones and computers can also be connected to the Internet via Bluetooth, enabling mobile phones and computers, etc. The data transmission between these modern communication devices and the Internet has become more rapid and efficient, broadening the path for wireless communication.
  • the computer security problem after the computer is turned off is not the most prominent problem.
  • the more prominent problem is that when the user temporarily leaves the computer, the information on the computer screen is easily sneaked by other people. More serious, When the user temporarily leaves the computer, the contents of the computer are freely downloaded or changed by the criminals, which will cause a large amount of data loss and information leakage, causing huge losses to the user, in order to prevent the criminals from leaving the computer but not closing.
  • the computer is illegally operating the computer.
  • the current method is mainly to lock the computer desktop.
  • the locking computer is automatically completed by the computer.
  • the computer stops the sending of the control command by identifying the computer peripheral.
  • the computer automatically locks the desktop when it does not receive an operation signal from the computer peripheral within the predetermined time.
  • the Chinese patents of the patent application numbers: 200810068490.3, 200910029500.7, 200910057107.9, 201010617293.X, 201110065732.5, 201110075500.8, 200910190053.3 all disclose the method of using the Bluetooth technology to protect the computer, wherein the Chinese patent application with the patent application number: 200910190053.3 is disclosed.
  • a method for locking a computer by locking a computer's I/O interface which solves the problem that when the Bluetooth module connected to the computer disappears after the signal of the Bluetooth module carried by the user who recognizes the computer disappears, the computer is locked by the password. Security issue.
  • the purpose of the present invention is to solve the problems existing in the prior art, and propose a Bluetooth-based computer security protection method and system.
  • the invention provides a Bluetooth-based computer security protection method, the method comprising:
  • a Bluetooth module connected to the computer pages a Bluetooth device representing the legal identity of the user
  • the Bluetooth module does not obtain the response command sent by the Bluetooth device, stop sending data to the outside through the I/O interface of the computer, if the Bluetooth module obtains the The response command sent by the Bluetooth device resumes sending data to the outside through the I/O interface of the computer;
  • the method further includes:
  • the Bluetooth module connected to the computer acquires the Bluetooth signal strength of the Bluetooth device representing the legal identity of the user
  • the Bluetooth signal strength reduction value of the Bluetooth device exceeds the first signal strength threshold, the data transmission to the outside is stopped through the I/O interface of the computer.
  • the method further includes:
  • the computer does not obtain an instruction sent by the computer I/O interface, it is determined that the computer I/O interface is in a sleep state; when the computer acquires an instruction sent by the computer I/O interface, the judgment unit The computer I/O interface is in an active state; when the computer I/O interface is in an active state, the average value of the Bluetooth signal strength of the Bluetooth device representing the legal identity of the user is calculated; the average value is increased by a certain value as the upper limit of the signal strength range The average value is lowered by the same value as the lower limit of the signal strength range, and the signal strength in the range is the signal strength when the computer I/O interface is in an active state;
  • the decrease of the Bluetooth signal strength of the Bluetooth device representing the legal identity of the user is the decrease of the signal strength of the Bluetooth signal of the Bluetooth device to which the computer I/O interface is active; when the I/O is stopped by the computer When the interface sends data to the outside, when the Bluetooth signal strength of the Bluetooth device is restored to the signal strength when the computer I/O interface is in an active state, the data is sent to the outside through the I/O interface of the computer.
  • the first time threshold is greater than the second time threshold, when the computer I/O interface is active,
  • the Bluetooth module connected to the computer stops sending a paging command to the Bluetooth device that represents the user's legal identity.
  • the frequency of the Bluetooth device that adjusts the legal identity of the user is 0s ⁇ 1 s each time.
  • the invention provides a Bluetooth-based computer security protection system, which comprises a Bluetooth module connected to a computer, a Bluetooth device representing a legal identity of the user, and a computer processing module, wherein the Bluetooth module is configured to send a paging instruction to the Bluetooth device
  • the computer processing module is configured to calculate a time interval for the Bluetooth module to obtain a response command sent by the Bluetooth device and make a judgment;
  • the computer processing module stops transmitting data to the outside through the I/O interface of the computer;
  • the computer processing module resumes transmitting data to the outside through the I/O interface of the computer;
  • the Bluetooth module connected to the computer is also used to acquire the Bluetooth signal strength of the Bluetooth device representing the legitimate identity of the user;
  • the computer processing module is further configured to calculate a reduction value of the Bluetooth signal strength of the Bluetooth device representing the legal identity of the user;
  • the computer processing module stops transmitting data to the outside through the computer's I/O interface.
  • the computer processing module is further configured to calculate a time interval for obtaining a command sent by the computer I/O interface, and within a second time threshold, the computer processing module acquires an instruction sent by the computer I/O interface, and determines the computer I/O The interface is in an active state; when the computer I/O interface is in an active state, the average value of the Bluetooth signal strength of the Bluetooth device representing the legal identity of the user is calculated; the average value is increased by a certain value as the upper limit of the signal strength range, and the average value is obtained.
  • the signal strength in this range is the signal strength when the computer I/O interface is active; the Bluetooth signal strength reduction value of the Bluetooth device representing the legal identity of the user belongs to The Bluetooth signal strength of the Bluetooth device is reduced compared to the signal strength of the computer I/O interface when it is active; when the data is sent to the outside through the computer's I/O interface, when the Bluetooth device is Bluetooth The signal strength is restored to the signal strength when the computer I/O interface is active, and the computer processing module resumes transmitting data to the outside through the computer's I/O interface.
  • the first time threshold is greater than the second time threshold.
  • the computer processing module controls the Bluetooth module connected to the computer to stop sending a paging command to the Bluetooth device representing the legitimate identity of the user.
  • the computer processing module adjusts the frequency of the Bluetooth device to page the Bluetooth device representing the legal identity of the user for each time 0s ⁇ 10s.
  • the present invention uses the reduction value of the Bluetooth signal strength of the Bluetooth device representing the legal identity of the user to determine whether the user of the computer actually leaves the seat, thereby being able to solve the existing representative user only by identification.
  • the problem that it is difficult to accurately set the coverage of the Bluetooth signal of the Bluetooth module connected to the computer in the technology of locking the computer with the Bluetooth signal of the legal identity Bluetooth device, by judging that the user of the computer leaves the seat, Lock your computer. It has high accuracy and the characteristics of the method.
  • the invention determines the signal strength of the Bluetooth device when the user operates the computer, and determines whether the user actually goes to the computer according to the difference between the signal strength of the Bluetooth device and the signal strength of the Bluetooth device when the user operates the computer. Unlock the computer, the method is simple, and the accuracy is high.
  • the computer's Bluetooth module is connected to the computer via a USB interface.
  • a USB interface By locking the video signal of the computer monitor, it is possible to avoid the problem that the Bluetooth module connected to the computer cannot work due to locking other interfaces such as USB or PS/2.
  • the video signal is turned off, the power consumption of the display can be greatly reduced, and energy is saved.
  • FIG. 1 is a schematic flow chart of a Bluetooth-based computer security protection method according to the present invention
  • FIG. 2 is a structural block diagram of a Bluetooth-based computer security protection system according to the present invention.
  • the Bluetooth signal strength of a Bluetooth device Since the user who is sitting in front of the computer to operate the computer (does not change the location of the Bluetooth device) is generally not moving, even if it is moving, the amplitude is small, regardless of whether the Bluetooth device carried by the user is mounted on the body ( The signal strength of a Bluetooth device will vary depending on where it is placed, and because of the clothing and climate it is wearing. The Bluetooth signal strength of the Bluetooth device when the user is using the computer is basically the same.
  • the Bluetooth signal of the Bluetooth device carried by the user Only when the user temporarily leaves the computer, the Bluetooth signal of the Bluetooth device carried by the user will change, and the change is very obvious, and when the user returns to the computer, the Bluetooth signal of the Bluetooth device will return to the user when the computer is operated. Strength of.
  • the present invention provides a Bluetooth-based computer security protection method, which includes the following steps:
  • S1 The Bluetooth module connected to the computer pages the Bluetooth device representing the legal identity of the user every 3s; the Bluetooth device representing the legal identity of the user is registered in the computer in advance, and the registration steps are:
  • the Bluetooth module connected to the computer queries the Bluetooth device within the signal range of the Bluetooth module
  • S2 determining whether the Bluetooth module can obtain the response command sent by the Bluetooth device within 3 minutes; S3: if the Bluetooth module does not obtain the response command sent by the Bluetooth device within 3 minutes, the control computer stands by; S4: acquiring, when the computer is in standby, the Bluetooth signal strength of the Bluetooth device, if the Bluetooth module acquires a response command sent by the Bluetooth device;
  • the computer I/O interface When the user operates the computer, the computer I/O interface is active, and the computer's I/O interface can recognize the control commands sent by the mouse, keyboard, and other computer external devices. If the computer can obtain the computer within 2 seconds
  • the Bluetooth signal strength of the Bluetooth device is also always changed, but the change amplitude is not large, and the average value of the Bluetooth signal strength when the computer I/O interface is in an active state is calculated.
  • the upper limit of the average value is increased by a certain value, and the lower limit is lowered by the same fixed value, and the signal strength within the range is the signal strength when the computer I/O interface is in an active state;
  • the normal state is that the computer is in an operable state, and the non-standby is unlocked
  • Bluetooth signal strength reduction value does not exceed the threshold, continue to calculate the reduction value of the Bluetooth signal strength of the Bluetooth device acquired twice consecutively;
  • the Bluetooth module will have difficulty in obtaining Bluetooth.
  • the Bluetooth signal of the device if the Bluetooth module does not obtain the response command sent by the Bluetooth device within 3 minutes, the control computer stands by;
  • S10 determining, when the computer is in a locked state, whether the Bluetooth signal strength of the Bluetooth device is a booster port;
  • the control computer continues to be in a locked state
  • the present invention provides a Bluetooth-based computer security protection system, the system comprising:
  • the steps of registration, registration are: the Bluetooth module connected to the computer queries the Bluetooth device within the signal range of the Bluetooth module; after the user selects a Bluetooth device as the Bluetooth device representing the legal identity of the user, the computer processes the module and records the device of the Bluetooth device
  • the computer processing module determines whether the Bluetooth module can obtain the response command sent by the Bluetooth device within 3 minutes; if the Bluetooth module does not obtain the response command sent by the Bluetooth device within 3 minutes, the computer processing module controls The computer is in standby; when the Bluetooth module acquires the response command sent by the Bluetooth device, the computer processing module obtains the Bluetooth signal strength of the Bluetooth device; and the computer processing module determines whether the Bluetooth signal strength is restored.
  • the computer I/O interface is active (the computer I/O interface is active when the user is operating the computer, and the computer's I/O interface can recognize the control commands sent by the mouse, keyboard, and other computer external devices, in 2s If the computer processing module can obtain the instruction sent by the computer I/O interface, the computer I/O interface is regarded as being active. Otherwise, within 2 seconds, if the computer does not acquire the computer I/O interface, Instruction, then the computer I/O interface is considered to be dormant State; when the computer I/O interface is active, the Bluetooth signal strength of the Bluetooth device also changes, but the variation is not large, and the average value of the Bluetooth signal strength when the computer I/O interface is active is calculated.
  • the upper limit of the average value is increased by a certain value, the lower limit is decreased by the same fixed value, and the signal strength in the range is the signal strength when the computer I/O interface is in an active state); if the Bluetooth signal strength is Recovering the signal strength when the computer I/O interface is active, the computer processing module controls the computer to return to the normal state (the normal state is that the computer is in an operable state, the non-standby non-lock state); if the Bluetooth signal When the strength is not restored to the signal strength when the computer I/O interface is active, the computer processing module continues to acquire the Bluetooth signal strength of the Bluetooth device; when the computer is in a normal state, the computer processing module calculates the Bluetooth signal of the acquired Bluetooth device.
  • the computer processing module determines whether the decrease value of the Bluetooth signal strength exceeds a first threshold; if the Bluetooth signal strength decrease value exceeds the threshold, the computer processing module stops sending a video to the display of the computer.
  • the computer processing module controls the computer to stand by; when the computer is in the locked state, the computer processing module determines whether the Bluetooth signal strength of the Bluetooth device increases; if the Bluetooth signal strength decreases, the computer processing module controls the computer to remain locked State; if the blue When the signal strength increases, the computer processing module determines whether the Bluetooth signal strength is restored to the signal strength when the computer I/O interface is in an active state; if the Bluetooth signal strength increases to a signal strength when the computer I/O interface is in an active state The computer processing module unlocks the computer; if the Bluetooth signal strength is not increased to the signal strength when the computer
  • the computer processing module controls the Bluetooth module connected to the computer to stop sending a paging command to the Bluetooth device representing the legitimate identity of the user.
  • the computer processing module adjusts the frequency of the Bluetooth device to page the Bluetooth device representing the legal identity of the user every 3 s.
  • the setting in time can be arbitrary, and the shorter the time setting, the more accurate the time for the user to leave the computer is determined, but this adds to the burden of processing data by the Bluetooth module, the Bluetooth device, and the computer processing module. .
  • the above embodiments are only used to illustrate the technical solutions of the present invention, and the present invention is not limited thereto.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明涉及一种基于蓝牙的计算机安全防护方法和系统。本发明采用计算代表用户合法身份的蓝牙设备的蓝牙信号强度的减小值,来判断计算机的使用者是否真正的离开座位,通过判断计算机的使用者离开座位后,对计算机进行锁定。具有准确率高,而且方法筒单的特点。本发明通过识别使用者在操作电脑时蓝牙设备的信号强度,并且根据蓝牙设备的信号强度与使用者在操作电脑时蓝牙设备的信号强度的差值来判断使用者是否真正的到计算机旁,从而对计算机进行解锁,方法简单,而且准确率高。

Description

说 明 书
基于蓝牙的计算机安全防护方法和系统
【技术领域】
本发明属于安全技术领域, 涉及一种计算机安全防护方法和系统, 特别涉 及一种基于蓝牙计算机安全防护的方法和系统。
【背景技术】
蓝牙(bluetooth )是指一种支持设备短距离通信的无线电技术, 其采用分 散式网络结构以及快跳频和短包技术, 支持点对点及点对多通信, 并采用时分 双工传输方案实现全双工传输,数据传输速率为 1 Mbps,有效通信距离为 10m。 蓝牙被广泛应用于移动电话、 无线耳机、 电脑以及相关外设设备上, 以实现设 备之间的无线连接; 而且移动电话和电脑等设备也可以通过蓝牙与因特网连 接,从而使移动电话和电脑等这些现代通信设备与因特网之间的数据传输变得 更加迅速高效, 为无线通信拓宽道路。
目前的计算机技术中,为了在使用者关闭计算机并离开计算机后能更好的 保护计算机内的信息, 防止别人随意进入计算机, 现有较普遍的对计算机安全 进行防护的方法主要是通过密码进行防护, 但是密码很容易被破解, 还有一种 是通过 USB-key进行验证的方法, 但是由于 USB-key携带起来不是很方便, 如果忘记携带 USB-key就会导致难以开机的问题。
在现实生活中, 计算机关机后的计算机安全问题并不是最突出的问题, 比 较突出的问题是, 当使用者暂时离开计算机时, 计算机屏幕上面的信息很容易 被其他人偷窥到, 更严重的, 在使用者暂时离开计算机时, 计算机内的内容被 不法分子随意下载或者更改, 会造成大量的数据丟失和信息泄露, 给用户带来 巨大的损失,为了避免不法分子在使用者离开计算机但是没有关闭计算机时非 法操作计算机, 目前的方法主要是通过锁定计算机桌面的方式, 锁定计算机是 计算机自动完成的, 计算机通过识别计算机外设停止发送操控指令的时间, 当 在预定的时间内没有接收到来自计算机外设的操作信号,计算机就会自动锁定 桌面。 由于预定的时间长度 ^艮难准确的把握, 如果定时的时间过长, 不仅不能 再使用者离开时及时、 有效的锁定电脑桌面, 还造成电能不必要的损耗, 如果 定时的时间过短,则有时会影响电脑的正常使用;而采用人工锁定桌面的方式, 使用者每离开一次电脑就要手动的锁定一次电脑桌面, 不仅操作麻烦, 而且使 用者经常会在离开时忘记进行锁定, 出现遗漏。 而通过 USB-key对暂时离开 计算机而对计算机进行锁定来说, 操作更加复杂。
专利申请号为: 200810068490.3、 200910029500.7、 200910057107.9、 201010617293.X, 201110065732.5, 201110075500.8, 200910190053.3 的中国专利均公开了采用蓝牙技术对计算机进行安全防护的方法, 其中专利申 请号为: 200910190053.3的中国发明专利公开了一种通过锁定计算机的 I/O接口 对计算机进行锁定的方法, 解决了连接在计算机的蓝牙模块在识别到计算机的 使用者所携带的蓝牙模块的信号消失后, 对计算机通过密码锁定时所产生的安 全问题。
虽然上述的专利都涉及到通过连接在计算机的蓝牙模块来识别计算机的使 用者所携带的蓝牙模块的信号存在与否来对计算机的锁定与否的技术, 但是由 于蓝牙是非定向的, 蓝牙信号传输会因为环境的变化而发生变化, 而且蓝牙信 号也是不稳定的, 正是因为如此, 才会出现一个问题, 那就是, 蓝牙信号的覆 盖范围很难以设定, 当蓝牙信号范围过大时, 即使计算机的使用者已经离开了 计算机(比如离开了计算机到隔壁房间去, 而蓝牙信号已经覆盖隔壁房间), 但 是连接在计算机的蓝牙模块还是能够识别的计算机的使用者所携带的蓝牙模 块, 所以依然不会对计算机进行锁定, 而当蓝牙信号范围过小时, 在蓝牙模块 的信号受外部环境的影响变小时, 容易出现即使计算机的使用者没有离开计算 机, 而连接计算机的蓝牙模块已经识别不到使用者所携带的蓝牙模块, 会造成 计算机的误锁定的问题。
【发明内容】 本发明的目的就是为了解决现有技术存在的问题,提出了一种基于蓝牙的 计算机安全防护方法和系统。
本发明提供一种基于蓝牙的计算机安全防护方法, 该方法包括:
与计算机连接的蓝牙模块寻呼代表用户合法身份的蓝牙设备;
在第一时间阀值内,若所述的蓝牙模块未获取到所述的蓝牙设备发送的应 答指令, 则停止通过计算机的 I/O接口向外部发送数据, 若所述蓝牙模块获取 到所述的蓝牙设备发送的应答指令, 则恢复通过计算机的 I/O接口向外部发送 数据;
其特征在于, 该方法进一步包括:
与计算机连接的蓝牙模块获取代表用户合法身份的蓝牙设备的蓝牙信号 强度;
计算代表用户合法身份的蓝牙设备的蓝牙信号强度的减小值;
当该蓝牙设备的蓝牙信号强度的减小值超过第一信号强度阀值时,停止通 过计算机的 I/O接口向外部发送数据。
该方法进一步包括:
在第二时间阀值内, 若计算机未获取到计算机 I/O接口发送的指令, 则判 断所述计算机 I/O接口处于休眠状态; 计算机获取到计算机 I/O接口发送的指 令, 则判断所述计算机 I/O接口处于活跃状态; 当计算机 I/O接口处于活跃状 态时, 计算代表用户合法身份的蓝牙设备的蓝牙信号强度的平均值; 将该平均 值提高一定值作为信号强度范围的上限,将该平均值降低同一定值作为信号强 度范围的下限, 在此范围内的信号强度均为计算机 I/O接口处于活跃状态时的 信号强度;
代表用户合法身份的蓝牙设备的蓝牙信号强度的减小值为所属蓝牙设备 的蓝牙信号强度相比计算机 I/O接口处于活跃状态时的信号强度的减小值; 当停止通过计算机的 I/O接口向外部发送数据时, 当所述蓝牙设备的蓝牙 信号强度恢复到计算机 I/O接口处于活跃状态时的信号强度, 恢复通过计算机 的 I/O接口向外部发送数据。
所述第一时间阀值大于第二时间阀值,当计算机 I/O接口处于活跃状态时, 与计算机连接的蓝牙模块停止向代表用户合法身份的蓝牙设备发送寻呼指令。 当所述计算机 I/O接口处于休眠状态时, 调整寻呼代表用户合法身份的蓝 牙设备的频率为每次 0s~1 s。
停止通过计算机的 I/O接口向外部发送的数据为视频信号。
本发明提供一种基于蓝牙的计算机安全防护系统,该系统包括与计算机连 接的蓝牙模块、 代表用户合法身份的蓝牙设备以及计算机处理模块, 所述蓝牙 模块用于向所述蓝牙设备发送寻呼指令,计算机处理模块用于计算蓝牙模块获 取蓝牙设备发送应答指令的时间间隔并作出判断;
在第一时间阀值内,若所述的蓝牙模块未获取到所述的蓝牙设备发送的应 答指令, 计算机处理模块停止通过计算机的 I/O接口向外部发送数据;
若所述蓝牙模块获取到所述的蓝牙设备发送的应答指令时,计算机处理模 块恢复通过计算机的 I/O接口向外部发送数据;
其特征在于:
与计算机连接的蓝牙模块还用于获取代表用户合法身份的蓝牙设备的蓝 牙信号强度;
计算机处理模块还用于计算代表用户合法身份的蓝牙设备的蓝牙信号强 度的减小值;
当该蓝牙设备的蓝牙信号强度的减小值超过第一信号强度阀值时,计算机 处理模块停止通过计算机的 I/O接口向外部发送数据。
计算机处理模块还用于计算获取到计算机 I/O接口发送指令的时间间隔, 在第二时间阀值内, 计算机处理模块获取到计算机 I/O接口发送的指令, 则判 断所述计算机 I/O接口处于活跃状态; 当计算机 I/O接口处于活跃状态时, 计 算代表用户合法身份的蓝牙设备的蓝牙信号强度的平均值;将该平均值提高一 定值作为信号强度范围的上限,将该平均值降低同一定值作为信号强度范围的 下限,在此范围内的信号强度均为计算机 I/O接口处于活跃状态时的信号强度; 代表用户合法身份的蓝牙设备的蓝牙信号强度的减小值为所属蓝牙设备 的蓝牙信号强度相比计算机 I/O接口处于活跃状态时的信号强度的减小值; 当停止通过计算机的 I/O接口向外部发送数据时, 当所述蓝牙设备的蓝牙 信号强度恢复到计算机 I/O接口处于活跃状态时的信号强度, 计算机处理模块 恢复通过计算机的 I/O接口向外部发送数据。
所述第一时间阀值大于第二时间阀值,当计算机 I/O接口处于活跃状态时, 计算机处理模块控制与计算机连接的蓝牙模块停止向代表用户合法身份的蓝 牙设备发送寻呼指令。
当所述计算机 I/O接口处于休眠状态时, 计算机处理模块调整所述蓝牙模 块寻呼代表用户合法身份的蓝牙设备的频率为每次 0s~10s。
停止通过计算机的 I/O接口向外部发送的数据为视频信号。
本发明有益的技术效果在于:
相较于现有技术,本发明采用计算代表用户合法身份的蓝牙设备的蓝牙信 号强度的减小值, 来判断计算机的使用者是否真正的离开座位, 从而能够解决 现有的仅通过识别代表用户合法身份的蓝牙设备的蓝牙信号来对计算机进行 锁定的技术中所存在的难以对与计算机连接的蓝牙模块的蓝牙信号的覆盖范 围进行准确设定的问题, 通过判断计算机的使用者离开座位后, 对计算机进行 锁定。 具有准确率高, 而且方法筒单的特点。
本发明通过识别使用者在操作电脑时蓝牙设备的信号强度,并且根据蓝牙 设备的信号强度与使用者在操作电脑时蓝牙设备的信号强度的差值来判断使 用者是否真正的到计算机旁, 从而对计算机进行解锁, 方法筒单, 而且准确率 高。
通过识别计算机 I/O接口发送的数据信号, 从而判断用户是否在使用计算 机, 如果用户在使用计算机, 则无需对蓝牙设备的蓝牙信号强度进行侦测, 从 而能够节约计算机的耗能, 更能够降低蓝牙设备的耗电量。
有的时候与计算机蓝牙模块通过 USB接口与计算机相连接, 通过锁定计 算机显示器的视频信号后,能够避免因锁定其他的例如 USB或者 PS/2接口而 导致与计算机连接的蓝牙模块无法工作的问题。 同时因为关闭了视频信号后, 能够使显示器耗电量大大降低, 节约了能源。
【附图说明】 图 1为本发明基于蓝牙的计算机安全防护方法流程示意图;
图 2为本发明基于蓝牙的计算机安全防护系统的结构框图。
【具体实施方式】
为了使发明的目的、技术方案及优点更加清楚明白, 以下结合附图及最优 的实施例, 对本发明进行进一步详细说明。 应当理解, 此处所描述的最优的实 施例仅仅用以解释本发明, 并不用来限定本发明。
本发明的原理如下:
由于坐在计算机前操作计算机(不改变蓝牙设备的位置 )的用户一般情况 下是不动的, 即使动的话, 其幅度也很小, 不管用户所携带的蓝牙设备是否装 在身上的何处(蓝牙设备的信号强度会因为其所放置的位置不同, 而且还会因 为其所穿的衣服以及气候有所影响 ), 用户在使用计算机时的蓝牙设备的蓝牙 信号强度也基本上是不变的。
只有当用户暂时离开计算机时,用户所携带的蓝牙设备的蓝牙信号才会变 化, 并且变化非常明显, 而当用户回到计算机旁时, 其蓝牙设备的蓝牙信号又 会回到用户在操作电脑时的强度。
所以根据上述的原理, 可以对计算机进行安全防护。
实施例
依据于上述原理, 如图 1所示, 本发明提出了一种基于蓝牙的计算机安全 防护方法, 该方法包括如下步骤:
S1:与计算机连接的蓝牙模块每隔 3s寻呼代表用户合法身份的蓝牙设备; 代表用户合法身份的蓝牙设备事先在计算机中进行注册, 注册的步骤为:
A. 与计算机连接的蓝牙模块查询该蓝牙模块信号范围内的蓝牙设备;
B. 选择一蓝牙设备作为代表用户合法身份的蓝牙设备, 并且记录下该 蓝牙设备的设备地址;
S2:判断蓝牙模块是否能在 3min内获取到所述蓝牙设备发送的应答指令; S3: 若所述蓝牙模块在 3min内未获取到所述蓝牙设备发送的应答指令, 则控制计算机待机; S4: 在计算机待机时, 若所述蓝牙模块获取到所述蓝牙设备发送的应答 指令, 则获取所述蓝牙设备的蓝牙信号强度;
S5:判断所述蓝牙信号强度是否恢复到计算机 I/O接口处于活跃状态时的 信号强度;
使用者在操作计算机时, 计算机 I/O接口处于活跃状态, 计算机的 I/O接 口能够识别到鼠标、键盘以及其他计算机外接设备发送的控制指令, 在 2s内, 若计算机能够获取到计算机 |/〇接口发送的指令, 则判断所述计算机 I/O接口 处于活跃状态, 否则, 在 2s内, 若计算机未获取到计算机 I/O接口发送的指 令, 则判断所述计算机 I/O接口处于休眠状态;
计算机 I/O接口处于活跃状态时, 所述蓝牙设备的蓝牙信号强度也一直是 变化的, 但是变化幅度不大, 计算计算机 I/O接口处于活跃状态时所述蓝牙信 号强度的平均值, 将该平均值的上限提高一定值, 下限降低同一定值, 在此范 围内的信号强度均为计算机 I/O接口处于活跃状态时的信号强度;
S6:若所述蓝牙信号强度恢复到计算机 I/O接口处于活跃状态时的信号强 度, 则控制计算机恢复到正常状态;
所述正常状态即为计算机处于可操作状态, 非待机非锁定状态;
若所述蓝牙信号强度未恢复到计算机 I/O接口处于活跃状态时的信号强 度, 则继续获取所述蓝牙设备的蓝牙信号强度;
S7: 在计算机处于正常状态时, 计算获取的蓝牙设备的蓝牙信号强度相 比计算机 I/O接口处于活跃状态时的信号强度的减小值;
S8: 判断所述蓝牙信号强度的减小值是否超过第一阀值;
S9: 若所述蓝牙信号强度减小值超过该阀值, 则停止向计算机的显示器 发送视频信号;
向计算机的显示器发送视频信号即将计算机锁定, 使计算机处于锁定状 态。
若所述蓝牙信号强度减小值未超过该阀值,则继续计算连续两次获取的蓝 牙设备的蓝牙信号强度的减小值;
当所述蓝牙设备的蓝牙信号持续减小时, 最后, 蓝牙模块会难以获得蓝牙 设备的蓝牙信号, 若所述蓝牙模块在 3min内未获取到所述蓝牙设备发送的应 答指令, 则控制计算机待机;
S10: 在计算机处于锁定状态时, 判断所述蓝牙设备的蓝牙信号强度的是 否增力口;
若所述蓝牙信号强度减小, 则控制计算机继续处于锁定状态;
S11 : 若所述蓝牙信号强度增加, 则判断所述蓝牙信号强度是否恢复到计 算机 I/O接口处于活跃状态时的信号强度;
S12: 若所述蓝牙信号强度增加到计算机 I/O接口处于活跃状态时的信号 强度, 则解除计算机的锁定;
若所述蓝牙信号强度未增加到计算机 I/O接口处于活跃状态时的信号强 度, 则继续保持计算机的锁定。
同样, 依据于上述原理, 如图 2所示, 本发明提供一种基于蓝牙的计算机 安全防护系统, 该系统包括:
代表用户合法身份的蓝牙设备、与计算机连接的蓝牙模块以及计算机处理 模块,与计算机连接的蓝牙模块每隔 3s寻呼代表用户合法身份的蓝牙设备(代 表用户合法身份的蓝牙设备事先在计算机中进行注册, 注册的步骤为: 与计算 机连接的蓝牙模块查询该蓝牙模块信号范围内的蓝牙设备;用户选择一蓝牙设 备作为代表用户合法身份的蓝牙设备后,计算机处理模块并且记录下该蓝牙设 备的设备地址 );计算机处理模块判断蓝牙模块是否能在 3min内获取到所述蓝 牙设备发送的应答指令; 若所述蓝牙模块在 3min内未获取到所述蓝牙设备发 送的应答指令, 则计算机处理模块控制计算机待机; 在计算机待机时, 若所述 蓝牙模块获取到所述蓝牙设备发送的应答指令,则获计算机处理模块取所述蓝 牙设备的蓝牙信号强度;计算机处理模块判断所述蓝牙信号强度是否恢复到计 算机 I/O接口处于活跃状态 (使用者在操作计算机时, 计算机 I/O接口处于活 跃状态, 计算机的 I/O接口能够识别到鼠标、 键盘以及其他计算机外接设备发 送的控制指令, 在 2s内, 若计算机处理模块能够获取到计算机 I/O接口发送 的指令, 则视作所述计算机 I/O接口处于活跃状态, 否则, 在 2s内, 若计算 机未获取到计算机 I/O接口发送的指令, 则视作所述计算机 I/O接口处于休眠 状态; 计算机 I/O接口处于活跃状态时, 所述蓝牙设备的蓝牙信号强度也一直 是变化的, 但是变化幅度不大, 计算计算机 I/O接口处于活跃状态时所述蓝牙 信号强度的平均值, 将该平均值的上限提高一定值, 下限降低同一定值, 在此 范围内的信号强度均为计算机 I/O接口处于活跃状态时的信号强度)时的信号 强度;若所述蓝牙信号强度恢复到计算机 I/O接口处于活跃状态时的信号强度, 则计算机处理模块控制计算机恢复到正常状态(所述正常状态即为计算机处于 可操作状态, 非待机非锁定状态); 若所述蓝牙信号强度未恢复到计算机 I/O 接口处于活跃状态时的信号强度,则计算机处理模块继续获取所述蓝牙设备的 蓝牙信号强度; 在计算机处于正常状态时, 计算机处理模块计算获取的蓝牙设 备的蓝牙信号强度相比计算机 I/O接口处于活跃状态时的信号强度的减小值; 计算机处理模块判断所述蓝牙信号强度的减小值是否超过第一阀值;若所述蓝 牙信号强度减小值超过该阀值,则计算机处理模块停止向计算机的显示器发送 视频信号(向计算机的显示器发送视频信号即将计算机锁定, 使计算机处于锁 定状态); 若所述蓝牙信号强度减小值未超过该阀值, 则计算机处理模块继续 计算连续两次获取的蓝牙设备的蓝牙信号强度的减小值; 当所述蓝牙设备的蓝 牙信号持续减小时, 最后, 蓝牙模块会难以获得蓝牙设备的蓝牙信号, 若所述 蓝牙模块在 3min内未获取到所述蓝牙设备发送的应答指令, 计算机处理模块 控制计算机待机; 在计算机处于锁定状态时, 计算机处理模块判断所述蓝牙设 备的蓝牙信号强度的是否增加; 若所述蓝牙信号强度减小, 则计算机处理模块 控制计算机继续处于锁定状态; 若所述蓝牙信号强度增加, 则计算机处理模块 判断所述蓝牙信号强度是否恢复到计算机 I/O接口处于活跃状态时的信号强 度; 若所述蓝牙信号强度增加到计算机 I/O接口处于活跃状态时的信号强度, 则计算机处理模块解除计算机的锁定; 若所述蓝牙信号强度未增加到计算机 I/O接口处于活跃状态时的信号强度, 则继续保持计算机的锁定。
当计算机 I/O接口处于活跃状态时, 计算机处理模块控制与计算机连接的 蓝牙模块停止向代表用户合法身份的蓝牙设备发送寻呼指令。 当所述计算机 I/O接口处于休眠状态时, 计算机处理模块调整所述蓝牙模块寻呼代表用户合 法身份的蓝牙设备的频率为每 3s—次。 在上述的实施例中, 时间上的设定可以任意, 时间设置的越短, 则判断出 用户离开计算机的时间越准确, 但是这却加重了蓝牙模块、 蓝牙设备和计算机 处理模块处理数据的负担。 以上实施例仅用以说明本发明的技术方案而非限制,尽管参照较佳实施例 对本发明进行了详细说明, 本领域的普通技术人员应当理解, 可以对本发明的 技术方案进行修改或者等同替换, 而不脱离本发明技术方案的精神和范围, 其 均应涵盖在本发明的权利要求范围当中。

Claims

1 . 一种基于蓝牙的计算机安全防护方法, 该方法包括:
与计算机连接的蓝牙模块寻呼代表用户合法身份的蓝牙设备;
在第一时间阀值内,若所述的蓝牙模块未获取到所述的蓝牙设备发送的应 答指令, 则停止通过计算机的 I/O接口向外部发送数据, 若所述蓝牙模块获取 到所述的蓝牙设备发送的应答指令, 则恢复通过计算机的 I/O接口向外部发送 数据;
其特征在于, 该方法进一步包括:
与计算机连接的蓝牙模块获取代表用户合法身份的蓝牙设备的蓝牙信号 强度;
计算代表用户合法身份的蓝牙设备的蓝牙信号强度的减小值;
当该蓝牙设备的蓝牙信号强度的减小值超过第一信号强度阀值时,停止通 过计算机的 I/O接口向外部发送数据。
2.根据权利要求 1所述的基于蓝牙的计算机安全防护方法, 其特征在于, 该方法进一步包括:
在第二时间阀值内, 计算机获取到计算机 I/O接口发送的指令, 则判断所 述计算机 I/O接口处于活跃状态; 当计算机 I/O接口处于活跃状态时, 计算代 表用户合法身份的蓝牙设备的蓝牙信号强度的平均值;将该平均值提高一定值 作为信号强度范围的上限, 将该平均值降低同一定值作为信号强度范围的下 限, 在此范围内的信号强度均为计算机 I/O接口处于活跃状态时的信号强度; 代表用户合法身份的蓝牙设备的蓝牙信号强度的减小值为所属蓝牙设备 的蓝牙信号强度相比计算机 I/O接口处于活跃状态时的信号强度的减小值; 当停止通过计算机的 I/O接口向外部发送数据时, 当所述蓝牙设备的蓝牙 信号强度恢复到计算机 I/O接口处于活跃状态时的信号强度, 恢复通过计算机 的 I/O接口向外部发送数据。
3.根据权利要求 2所述的基于蓝牙的计算机安全防护方法, 其特征在于, 所述第一时间阀值大于第二时间阀值,当计算机 I/O接口处于活跃状态时, 与计算机连接的蓝牙模块停止向代表用户合法身份的蓝牙设备发送寻呼指令。
4.根据权利要求 2所述的基于蓝牙的计算机安全防护方法, 其特征在于, 当所述计算机 I/O接口处于休眠状态时, 调整寻呼代表用户合法身份的蓝牙设 备的频率为每次 0s~1 s。
5.根据权利要求 1 -4所述的基于蓝牙的计算机安全防护方法,其特征在于, 停止通过计算机的 I/O接口向外部发送的数据为视频信号。
6. —种基于蓝牙的计算机安全防护系统, 该系统包括与计算机连接的蓝 牙模块、 代表用户合法身份的蓝牙设备以及计算机处理模块, 所述蓝牙模块用 于向所述蓝牙设备发送寻呼指令,计算机处理模块用于计算蓝牙模块获取蓝牙 设备发送应答指令的时间间隔并作出判断;
在第一时间阀值内,若所述的蓝牙模块未获取到所述的蓝牙设备发送的应 答指令, 计算机处理模块停止通过计算机的 I/O接口向外部发送数据;
若所述蓝牙模块获取到所述的蓝牙设备发送的应答指令时,计算机处理模 块恢复通过计算机的 I/O接口向外部发送数据;
其特征在于:
与计算机连接的蓝牙模块还用于获取代表用户合法身份的蓝牙设备的蓝 牙信号强度;
计算机处理模块还用于计算代表用户合法身份的蓝牙设备的蓝牙信号强 度的减小值;
当该蓝牙设备的蓝牙信号强度的减小值超过第一信号强度阀值时,计算机 处理模块停止通过计算机的 I/O接口向外部发送数据。
7.根据权利要求 6所述的基于蓝牙的计算机安全防护系统, 其特征在于: 计算机处理模块还用于计算获取到计算机 I/O接口发送指令的时间间隔, 在第二时间阀值内, 计算机处理模块获取到计算机 I/O接口发送的指令, 则判 断所述计算机 I/O接口处于活跃状态; 当计算机 I/O接口处于活跃状态时, 计 算代表用户合法身份的蓝牙设备的蓝牙信号强度的平均值;将该平均值提高一 定值作为信号强度范围的上限,将该平均值降低同一定值作为信号强度范围的 下限,在此范围内的信号强度均为计算机 I/O接口处于活跃状态时的信号强度; 代表用户合法身份的蓝牙设备的蓝牙信号强度的减小值为所属蓝牙设备 的蓝牙信号强度相比计算机 I/O接口处于活跃状态时的信号强度的减小值; 当停止通过计算机的 I/O接口向外部发送数据时, 当所述蓝牙设备的蓝牙 信号强度恢复到计算机 I/O接口处于活跃状态时的信号强度, 计算机处理模块 恢复通过计算机的 I/O接口向外部发送数据。
8.根据权利要求 7所述的基于蓝牙的计算机安全防护系统, 其特征在于, 所述第一时间阀值大于第二时间阀值,当计算机 I/O接口处于活跃状态时, 计算机处理模块控制与计算机连接的蓝牙模块停止向代表用户合法身份的蓝 牙设备发送寻呼指令。
9.根据权利要求 7所述的基于蓝牙的计算机安全防护系统, 其特征在于, 当所述计算机 I/O接口处于休眠状态时, 计算机处理模块调整所述蓝牙模块寻 呼代表用户合法身份的蓝牙设备的频率为每次 0s~10s。
10. 根据权利要求 6-9所述的基于蓝牙的计算机安全防护系统, 其特征在 于, 停止通过计算机的 I/O接口向外部发送的数据为视频信号。
PCT/CN2012/070266 2011-10-25 2012-01-12 基于蓝牙的计算机安全防护方法和系统 WO2013060102A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110327919.8 2011-10-25
CN2011103279198A CN102799802A (zh) 2011-10-25 2011-10-25 基于蓝牙的计算机安全防护方法和系统

Publications (1)

Publication Number Publication Date
WO2013060102A1 true WO2013060102A1 (zh) 2013-05-02

Family

ID=47198909

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/070266 WO2013060102A1 (zh) 2011-10-25 2012-01-12 基于蓝牙的计算机安全防护方法和系统

Country Status (2)

Country Link
CN (1) CN102799802A (zh)
WO (1) WO2013060102A1 (zh)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104079714A (zh) * 2013-09-25 2014-10-01 苏州天鸣信息科技有限公司 一种使用无线讯号的屏蔽装置及其操控方法
CN104978544A (zh) * 2014-04-02 2015-10-14 联想(北京)有限公司 一种切换电子设备状态的方法及装置
CN105468958A (zh) * 2014-09-01 2016-04-06 深圳富泰宏精密工业有限公司 电子装置的解锁方法及系统
CN104992125A (zh) * 2015-06-30 2015-10-21 向岚 一种计算机网络安全防护系统
CN112840340A (zh) * 2018-10-16 2021-05-25 株式会社Act 计算机锁定系统以及计算机锁定系统的工作方法
CN110856109B (zh) * 2019-10-24 2021-08-17 苏州维伟思医疗科技有限公司 一种监护仪的管控方法及系统
CN113556739B (zh) * 2020-04-01 2024-03-22 中国长城科技集团股份有限公司 基于蓝牙的计算机系统解锁/锁定控制方法和装置

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004343350A (ja) * 2003-05-14 2004-12-02 Matsushita Electric Ind Co Ltd 無線データ処理信頼性保証装置
CN1611060A (zh) * 2001-12-28 2005-04-27 超波株式会社 无线鉴别系统
CN101421995A (zh) * 2006-04-14 2009-04-29 高通股份有限公司 基于距离的关联
CN101661541A (zh) * 2009-09-11 2010-03-03 深圳顶海电子有限公司 电脑i/o接口锁定方法及系统
JP2010191552A (ja) * 2009-02-17 2010-09-02 Panasonic Corp 認証対象装置およびキー、並びに無線認証システム
CN101872392A (zh) * 2009-04-23 2010-10-27 陶梦曦 一种计算机动态安全认证方法

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5821854A (en) * 1997-06-16 1998-10-13 Motorola, Inc. Security system for a personal computer
KR100625654B1 (ko) * 2002-08-29 2006-09-20 에스케이 텔레콤주식회사 무선 근거리통신망/이동전화 연동시스템에서 wlan 신호세기에 기반한 접속 시스템 결정 방법 및 이를 위한 이동 단말기
CN102136048B (zh) * 2011-03-28 2012-12-19 东南大学 基于手机蓝牙的计算机环绕智能防护装置及方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1611060A (zh) * 2001-12-28 2005-04-27 超波株式会社 无线鉴别系统
JP2004343350A (ja) * 2003-05-14 2004-12-02 Matsushita Electric Ind Co Ltd 無線データ処理信頼性保証装置
CN101421995A (zh) * 2006-04-14 2009-04-29 高通股份有限公司 基于距离的关联
JP2010191552A (ja) * 2009-02-17 2010-09-02 Panasonic Corp 認証対象装置およびキー、並びに無線認証システム
CN101872392A (zh) * 2009-04-23 2010-10-27 陶梦曦 一种计算机动态安全认证方法
CN101661541A (zh) * 2009-09-11 2010-03-03 深圳顶海电子有限公司 电脑i/o接口锁定方法及系统

Also Published As

Publication number Publication date
CN102799802A (zh) 2012-11-28

Similar Documents

Publication Publication Date Title
WO2013060102A1 (zh) 基于蓝牙的计算机安全防护方法和系统
US9699596B2 (en) Method for achieving short-distance unlocking according to the electrocardiogram and system thereof
CA2985480C (en) Method and apparatus for enabling the touchscreen display of a mobile device
EP3078136B1 (en) A system and method for allowing access to electronic devices using a body area network
CN103488924B (zh) 一种终端的解锁处理方法、装置及设备
US9870663B2 (en) Authentication of a user provided with a mobile device by a vehicle
US20150261946A1 (en) Apparatus and method for authenticating user
EP2731066A1 (en) Electronic device and method for controlling payment function of input means
US20070249288A1 (en) Distance-based security
CA2789216A1 (en) Method, apparatus, and use of presence detection
CN114040331B (zh) 一种车辆的远程操控方法及系统
CN107017991B (zh) 检测一个或多个用户识别设备存在的系统和方法
EP3133519B1 (en) Method for unlocking screen of mobile terminal by means of retina information matching
KR20140085952A (ko) 휴대단말기의 보안모드 변경 방법 및 장치
CN103324881A (zh) 无线锁定与解锁系统及其方法
US9088982B2 (en) Beacon frame data transmission rate adjustment
CN114679916A (zh) 物理访问控制系统和方法
WO2015180258A1 (zh) 通过检测WiFi信号切换AP工作模式的方法和装置
TWI566209B (zh) 可防盜的觸摸型可攜式裝置及防盜方法
WO2016177201A1 (zh) 一种控制隐私数据的方法、终端及穿戴设备
CN103167400B (zh) 便携式电子装置及其追踪方法
CN104363333A (zh) 一种智能灭屏方法、终端及系统
CN110069913B (zh) 人脸解锁方法、移动终端及计算机可读存储介质
KR20220098656A (ko) Ble 및 지문 방식에 기반한 차량 인증 시스템 및 방법
CN107818247B (zh) 一种移动终端解锁方法和移动终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12843868

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC OF 040914

122 Ep: pct application non-entry in european phase

Ref document number: 12843868

Country of ref document: EP

Kind code of ref document: A1