Movatterモバイル変換


[0]ホーム

URL:


CN115174077B - Device security protection method and system - Google Patents

Device security protection method and system
Download PDF

Info

Publication number
CN115174077B
CN115174077BCN202210905659.6ACN202210905659ACN115174077BCN 115174077 BCN115174077 BCN 115174077BCN 202210905659 ACN202210905659 ACN 202210905659ACN 115174077 BCN115174077 BCN 115174077B
Authority
CN
China
Prior art keywords
protected
key
mobile
mobile security
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210905659.6A
Other languages
Chinese (zh)
Other versions
CN115174077A (en
Inventor
李强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Oriental Fortune Information Co ltd
Original Assignee
Oriental Fortune Information Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oriental Fortune Information Co ltdfiledCriticalOriental Fortune Information Co ltd
Priority to CN202210905659.6ApriorityCriticalpatent/CN115174077B/en
Publication of CN115174077ApublicationCriticalpatent/CN115174077A/en
Application grantedgrantedCritical
Publication of CN115174077BpublicationCriticalpatent/CN115174077B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

Translated fromChinese

本发明提供一种设备安全保护方法及系统,待保护设备端和移动安全设备端,在首次初始化时,需要求有线物理链接移动设备,以便于移动安全设备端密钥参数基于所述有线连接,从所述待保护设备获取所述密钥参数,实现安全、可靠的密钥参数初始化。待保护设备端和移动安全设备端各自独立分别计算第一密钥和第二密钥,避免简单密码、长时间不更换密码的问题,可以实现待保护设备的安全、可靠响应。本发明可以实现设备锁、软件硬件锁、看门狗等功能,并可以及时调整待保护设备的锁定状态或解锁状态,防止用户疏忽导致设备未锁定,有效防止软件盗用、非法控制、信息泄露等问题。

The present invention provides a device security protection method and system. When the protected device and the mobile security device are initialized for the first time, a wired physical link to the mobile device is required, so that the key parameters of the mobile security device are obtained from the protected device based on the wired connection, thereby realizing safe and reliable key parameter initialization. The protected device and the mobile security device each independently calculate the first key and the second key, respectively, avoiding the problem of simple passwords and not changing passwords for a long time, and realizing safe and reliable response of the protected device. The present invention can realize functions such as device lock, software hardware lock, watchdog, etc., and can timely adjust the lock state or unlock state of the protected device to prevent the device from being unlocked due to user negligence, and effectively prevent software theft, illegal control, information leakage and other problems.

Description

Equipment safety protection method and system
Technical Field
The present invention relates to the field of computers, and in particular, to a method and a system for protecting equipment security.
Background
With the popularization of personal PCs, intelligent terminals and intelligent machines and the emergence of electronic wallets, electronic banks and intelligent contracts, the problems of personal information safety, equipment safety and industrial equipment safety are increasingly prominent. The traditional security adopts password access, antivirus software and software hardware watchdog to solve part of security problems, but cannot ensure that users carelessly forget to lock, close and pull out security equipment, and information leakage, security accidents, economic losses and the like are caused.
Disclosure of Invention
The invention aims to provide a device safety protection method and system.
According to one aspect of the present invention, there is provided a device security protection method comprising:
The equipment to be protected checks the user information, if the user information passes the check, a key parameter of the user is generated, and a first key effective in a preset time is generated based on the key parameter;
The mobile security device detects the device information of the mobile security device, if the device information passes detection, the mobile security device establishes wired connection with the device to be protected, acquires the key parameter from the device to be protected based on the wired connection, and generates a second key effective in the preset time based on the key parameter;
the equipment to be protected acquires the second secret key from the mobile security equipment based on the wired connection, compares the first secret key with the second secret key, and if the comparison is consistent, the equipment to be protected and the mobile security equipment are successfully paired, the wired connection is disconnected, and a wireless connection is established between the equipment to be protected and the mobile security equipment;
the device to be protected acquires an operation request of a user, judges whether the device to be protected is in a locked state or not, if the device to be protected is in the locked state, does not respond to the operation request of the user, regenerates a first key effective in a preset time based on the key parameter if the device to be protected is in the unlocked state, acquires a second key effective in the preset time regenerated based on the key parameter from the mobile security device through the wireless connection, compares the regenerated first key with the second key, and responds to the operation request of the user if the comparison is consistent.
Further, in the above method, the judging whether the device to be protected is in a locked state includes:
if the mobile security device monitors that the device to be protected is monitored, the device to be protected has network proxy setting or the communication between the device to be protected and the mobile security device is interrupted, the mobile security device sends a locking instruction to the device to be protected, and the device to be protected adjusts itself to be in a locking state based on the received locking instruction.
Further, in the above method, the judging whether the device to be protected is in a locked state includes:
And the equipment to be protected monitors whether the mobile safety equipment is in an inactive state or not through the wireless connection, and if the mobile safety equipment is in the inactive state, the equipment to be protected judges that the equipment to be protected is in a locking state.
Further, in the above method, the judging whether the device to be protected is in a locked state includes:
and the equipment to be protected monitors whether the distance between the equipment to be protected and the mobile safety equipment exceeds a preset distance threshold, and if so, the equipment to be protected judges that the equipment to be protected is in a locking state.
Further, in the above method, the monitoring, by the device to be protected, whether the distance between the device to be protected and the mobile security device exceeds a preset distance threshold includes:
If a wireless network is connected between the equipment to be protected and the mobile safety equipment, the equipment to be protected and the mobile safety equipment form a point-to-point wireless network, the equipment to be protected is based on the point-to-point wireless network, adopts a wireless positioning method, is matched with NFC, bluetooth, GPS or a cellular mobile network, and monitors whether the opposite distance between the equipment to be protected and the mobile safety equipment exceeds a preset distance threshold value.
Further, in the above method, the monitoring, by the device to be protected, whether the distance between the device to be protected and the mobile security device exceeds a preset distance threshold includes:
If the equipment to be protected and the mobile safety equipment are both provided with NFC or Bluetooth devices, the equipment to be protected adopts NFC or Bluetooth and is matched with a GPS or cellular mobile network to monitor whether the opposite distance between the equipment to be protected and the mobile safety equipment exceeds a preset distance threshold value.
Further, in the above method, the monitoring, by the device to be protected, whether the distance between the device to be protected and the mobile security device exceeds a preset distance threshold includes:
If the equipment to be protected and the mobile safety equipment are both provided with gyroscopes and are provided with cellular mobile positioning or GPS positioning devices, the equipment to be protected adopts GPS positioning or cellular mobile networks and is cooperated with the gyroscopes to monitor whether the opposite distance between the equipment to be protected and the mobile safety equipment exceeds a preset distance threshold value.
Further, in the above method, the monitoring, by the device to be protected, whether the distance between the device to be protected and the mobile security device exceeds a preset distance threshold includes:
If the equipment to be protected is provided with a sound receiving device and the mobile safety equipment is provided with a sound source playing device, monitoring whether the distance between the equipment to be protected and the mobile safety equipment exceeds a preset distance threshold or not by monitoring the infrasound wave or the ultrasonic wave with preset frequency sent by the sound source playing device through the sound receiving device.
Further, in the above method, after the device to be protected determines that the device to be protected is in the locked state, the method further includes:
the equipment to be protected locks the screen of the equipment to be protected, disconnects the wireless connection, and/or encrypts the memory information of the equipment to be protected.
According to another aspect of the present invention, there is also provided a device security protection system, wherein the system includes:
The mobile security device is used for detecting self device information, if the self device information passes detection, establishing wired connection with the device to be protected, acquiring the key parameter from the device to be protected based on the wired connection, and generating a second key effective in the preset time based on the key parameter;
The method comprises the steps of obtaining a first key, obtaining a second key, comparing the first key with the second key, if the comparison is consistent, then pairing the first key with the second key successfully, disconnecting the wired connection and establishing wireless connection with a mobile safety device, obtaining an operation request of a user, judging whether the device to be protected is in a locking state or not, if the device to be protected is in the locking state, not responding to the operation request of the user, if the device to be protected is in the unlocking state, regenerating the first key which is valid in the preset time based on the key parameter, obtaining the second key which is valid in the preset time and regenerated based on the key parameter from the mobile safety device through the wireless connection, comparing the regenerated first key with the regenerated second key if the comparison is consistent, and responding to the operation request of the user.
According to another aspect of the present invention there is also provided a computer readable medium having stored thereon computer readable instructions executable by a processor to implement the method of any one of the above.
According to another aspect of the present invention there is also provided an apparatus for information processing at a network device, the apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform the method of any of the preceding claims.
Compared with the prior art, the equipment to be protected and the mobile safety equipment are required to be physically linked with the mobile equipment in a wired mode during the first initialization, so that the key parameters of the mobile safety equipment are acquired from the equipment to be protected based on the wired connection, and safe and reliable key parameter initialization is realized. The equipment end to be protected and the mobile security equipment end respectively and independently calculate a first secret key and a second secret key.
The invention adopts the disposable first key and the second key based on time, the first key and the second key are effective in the preset time, new first key and second key are generated every other preset time period, and the first key and the second key which are effective in the new preset time are generated again by directly cancelling after the first key and the second key are out of date, after the first key and the second key are compared and consistent, the equipment to be protected responds to the operation request of the user, the problems of simple password and long-time password replacement are avoided, and the safe and reliable response of the equipment to be protected can be realized.
The invention can use mobile equipment with high current popularity, such as mobile phones, smart watches, flat plates, smart bracelets and other portable equipment, does not need to purchase hardware equipment, realizes functions of equipment locks, software hardware locks, watchdog and the like, can adjust the locking state or unlocking state of equipment to be protected in time, prevents equipment from being unlocked due to negligence of users, and effectively prevents the problems of software theft, illegal control, information leakage and the like.
Drawings
Other features, objects and advantages of the present invention will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the accompanying drawings in which:
fig. 1 illustrates a schematic diagram of a device security protection method and system in accordance with an aspect of the present invention.
Detailed Description
The invention is described in further detail below with reference to the accompanying drawings.
In one exemplary configuration of the application, the terminal, the device of the service network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer readable media, as defined herein, does not include non-transitory computer readable media (transmission media), such as modulated data signals and carrier waves.
As shown in fig. 1, the present invention provides a device security protection method, which includes:
Step S1, checking user information by equipment to be protected, if the user information passes, generating a key parameter of the user, and generating a first key effective in preset time based on the key parameter;
Step S2, the mobile security device detects the device information of the mobile security device, if the device information of the mobile security device passes detection, the mobile security device establishes wired connection with the device to be protected, acquires the key parameter from the device to be protected based on the wired connection, and generates a second key effective in the preset time based on the key parameter;
The equipment to be protected is equipment to be protected, such as a computer, a mobile phone and the like, which needs to be protected safely;
The mobile security device is a device for protecting the device to be protected, such as a mobile phone, a tablet computer, a smart watch, a smart bracelet and the like.
The wired connection is a physical connection;
Step S3, the equipment to be protected acquires the second secret key from the mobile security equipment based on the wired connection, compares the first secret key with the second secret key, if the comparison is consistent, the equipment to be protected and the mobile security equipment are successfully paired, the wired connection is disconnected, and a wireless connection is established between the equipment to be protected and the mobile security equipment;
And S4, the equipment to be protected acquires an operation request of a user, judges whether the equipment to be protected is in a locking state or not, does not respond to the operation request of the user if the equipment to be protected is in the locking state, regenerates a first key effective in a preset time based on the key parameter if the equipment to be protected is in the unlocking state, acquires a second key effective in the preset time regenerated based on the key parameter from the mobile security equipment through the wireless connection, compares the regenerated first key with the regenerated second key, and responds to the operation request of the user if the comparison is consistent.
In the first initialization, the device to be protected and the mobile safety device need to be physically linked with the mobile device by a wired link so that the key parameter of the mobile safety device can be obtained from the device to be protected based on the wired connection, thereby realizing safe and reliable key parameter initialization. The equipment end to be protected and the mobile security equipment end respectively and independently calculate a first secret key and a second secret key.
The invention adopts the disposable first key and the second key based on time, the first key and the second key are effective in the preset time, new first key and second key are generated every other preset time period, and the first key and the second key which are effective in the new preset time are generated again by directly cancelling after the first key and the second key are out of date, after the first key and the second key are compared and consistent, the equipment to be protected responds to the operation request of the user, the problems of simple password and long-time password replacement are avoided, and the safe and reliable response of the equipment to be protected can be realized.
The invention can use mobile equipment with high current popularity, such as mobile phones, smart watches, flat plates, smart bracelets and other portable equipment, does not need to purchase hardware equipment, realizes functions of equipment locks, software hardware locks, watchdog and the like, can adjust the locking state or unlocking state of equipment to be protected in time, prevents equipment from being unlocked due to negligence of users, and effectively prevents the problems of software theft, illegal control, information leakage and the like.
In an embodiment of the device security protection method of the present invention, the device to be protected judges whether the device is in a locked state, including:
if the mobile security device monitors that the device to be protected is monitored, the device to be protected has network proxy setting or the communication between the device to be protected and the mobile security device is interrupted, the mobile security device sends a locking instruction to the device to be protected, and the device to be protected adjusts itself to be in a locking state based on the received locking instruction.
After the equipment end to be protected and the mobile safety equipment end are paired, the equipment end to be protected and the mobile safety equipment end respectively calculate a first key and a second key independently, and keep communication through a wireless network, bluetooth and other communication modes by adopting an encryption link, so that the first key and the second key are carried out. Once the communication is interrupted, monitored and an intermediate agent exists, the mobile security device sends a locking instruction to the device to be protected, and the device to be protected protects local software or hardware according to the locking instruction so as to enter a locking state, such as screen locking, memory information encryption, exiting and other measures.
In an embodiment of the device security protection method of the present invention, the device to be protected judges whether the device is in a locked state, including:
And the equipment to be protected monitors whether the mobile safety equipment is in an inactive state or not through the wireless connection, and if the mobile safety equipment is in the inactive state, the equipment to be protected judges that the equipment to be protected is in a locking state.
The mobile security device is in an inactive state, for example, may be a screen locking state, a preset application background running state, etc., which indicates that the user may forget the mobile security device in the current position, and may immediately lock the device to be protected
By monitoring whether the mobile safety equipment is in an inactive state, the equipment to be protected can be timely adjusted to a locking state, and the operation safety of the equipment to be protected is guaranteed.
In an embodiment of the device security protection method of the present invention, the device to be protected judges whether the device is in a locked state, including:
and the equipment to be protected monitors whether the distance between the equipment to be protected and the mobile safety equipment exceeds a preset distance threshold, and if so, the equipment to be protected judges that the equipment to be protected is in a locking state.
When the safety distance between the mobile safety device and the equipment to be protected is within the preset distance, the equipment to be protected judges that the equipment to be protected is in an unlocking state, the mobile safety device is in safe wireless connection with the equipment to be protected or software, the mobile safety device transmits offline dynamic generation of a second secret key to the equipment to be protected, and when the safety distance between the mobile safety device and the equipment to be protected is within the preset distance, the equipment to be protected judges that the equipment to be protected is in a locking state. Can ensure that the equipment to be protected is timely adjusted to a locking state or an unlocking state, and ensure the operation safety of the equipment to be protected
In an embodiment of the device security protection method of the present invention, the device to be protected monitors whether a distance between itself and the mobile security device exceeds a preset distance threshold, including:
If a wireless network is connected between the equipment to be protected and the mobile safety equipment, the equipment to be protected and the mobile safety equipment form a point-to-point wireless network, the equipment to be protected is based on the point-to-point wireless network, adopts a wireless positioning method, is matched with NFC, bluetooth, GPS or a cellular mobile network, and monitors whether the opposite distance between the equipment to be protected and the mobile safety equipment exceeds a preset distance threshold value.
When the device to be protected and the mobile security device both have wireless network devices, the device to be protected and the mobile security device can form a peer-to-peer network, determine the distance by using a wireless positioning method, and determine whether to open or close the locking state of the device to be protected in cooperation with near field devices such as NFC, bluetooth, or the like or the accurate distance of positioning modes such as GPS, cellular mobile network, and the like.
In an embodiment of the device security protection method of the present invention, the device to be protected monitors whether a distance between itself and the mobile security device exceeds a preset distance threshold, including:
If the equipment to be protected and the mobile safety equipment are both provided with NFC or Bluetooth devices, the equipment to be protected adopts NFC or Bluetooth and is matched with a GPS or cellular mobile network to monitor whether the opposite distance between the equipment to be protected and the mobile safety equipment exceeds a preset distance threshold value.
Under the condition that the equipment to be protected and the mobile security equipment do not form a non-point-to-point network, the protection equipment and the mobile security equipment can use near field communication equipment such as NFC, bluetooth and the like to judge the distance according to the strength of signals, and judge whether to open or close the locking state of the equipment to be protected according to the accurate distance in cooperation with a positioning mode such as GPS, cellular movement and the like.
In an embodiment of the device security protection method of the present invention, the device to be protected monitors whether a distance between itself and the mobile security device exceeds a preset distance threshold, including:
If the equipment to be protected and the mobile safety equipment are both provided with gyroscopes and are provided with cellular mobile positioning or GPS positioning devices, the equipment to be protected adopts GPS positioning or cellular mobile networks and is cooperated with the gyroscopes to monitor whether the opposite distance between the equipment to be protected and the mobile safety equipment exceeds a preset distance threshold value.
When the near field communication equipment is not available, the equipment to be protected can judge the distance between the equipment to be protected and the mobile safety equipment according to cellular movement, GPS positioning and the like, and judge the step number and the movement distance of a user in cooperation with the motion detection equipment such as a gyroscope and the like, so that the cellular movement and GPS positioning errors are reduced, and whether the locking state of the equipment to be protected is opened or closed is judged.
In an embodiment of the device security protection method of the present invention, the device to be protected monitors whether a distance between itself and the mobile security device exceeds a preset distance threshold, including:
If the equipment to be protected is provided with a sound receiving device and the mobile safety equipment is provided with a sound source playing device, monitoring whether the distance between the equipment to be protected and the mobile safety equipment exceeds a preset distance threshold or not by monitoring the infrasound wave or the ultrasonic wave with preset frequency sent by the sound source playing device through the sound receiving device.
The mobile security device can adopt sound source playing hardware to generate infrasonic wave or ultrasonic wave with preset frequency, the protected device can monitor through the sound receiving device, and when the capacity of the sound source is reduced to a preset lower limit, the locking state of the device to be protected is immediately opened or closed.
In an embodiment of the device security protection method of the present invention, after the device to be protected determines that the device to be protected is in a locked state, the device security protection method further includes:
the equipment to be protected locks the screen of the equipment to be protected, disconnects the wireless connection, and/or encrypts the memory information of the equipment to be protected.
According to another aspect of the present invention, there is also provided a device security protection system, wherein the system includes:
the mobile security device is used for detecting self device information, if the self device information passes detection, establishing wired connection with the device to be protected, acquiring the key parameter from the device to be protected based on the wired connection, and generating a second key effective in the preset time based on the key parameter
The method comprises the steps of obtaining a first key, obtaining a second key, comparing the first key with the second key, if the comparison is consistent, then pairing the first key with the second key successfully, disconnecting the wired connection and establishing wireless connection with a mobile safety device, obtaining an operation request of a user, judging whether the device to be protected is in a locking state or not, if the device to be protected is in the locking state, not responding to the operation request of the user, if the device to be protected is in the unlocking state, regenerating the first key which is valid in the preset time based on the key parameter, obtaining the second key which is valid in the preset time and regenerated based on the key parameter from the mobile safety device through the wireless connection, comparing the regenerated first key with the regenerated second key if the comparison is consistent, and responding to the operation request of the user.
According to another aspect of the present invention, there is also provided a computer readable medium having stored thereon computer readable instructions executable by a processor to implement the method according to any of the above embodiments.
According to another aspect of the present invention there is also provided an apparatus for information processing at a network device, the apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform the method of any of the embodiments described above.
Details of each device and storage medium embodiment of the present invention may refer to corresponding parts of each method embodiment, and are not described herein.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the spirit or scope of the application. Thus, it is intended that the present application also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.
It should be noted that the present invention may be implemented in software and/or a combination of software and hardware, e.g., using Application Specific Integrated Circuits (ASIC), a general purpose computer or any other similar hardware device. In one embodiment, the software program of the present invention may be executed by a processor to perform the steps or functions described above. Likewise, the software programs of the present invention (including associated data structures) may be stored on a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. In addition, some steps or functions of the present invention may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
Furthermore, portions of the present invention may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present invention by way of operation of the computer. Program instructions for invoking the inventive methods may be stored in fixed or removable recording media and/or transmitted via a data stream in a broadcast or other signal bearing medium and/or stored within a working memory of a computer device operating according to the program instructions. An embodiment according to the invention comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to operate a method and/or a solution according to the embodiments of the invention as described above.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is evident that the word "comprising" does not exclude other elements or steps, and that the singular does not exclude a plurality. A plurality of units or means recited in the apparatus claims can also be implemented by means of one unit or means in software or hardware. The terms first, second, etc. are used to denote a name, but not any particular order.

Claims (12)

Translated fromChinese
1.一种设备安全保护方法,其中,1. A device security protection method, wherein:该方法包括:The method includes:待保护设备校验用户信息,若校验用户信息通过,则生成该用户的密钥参数,并基于所述密钥参数生成预设时间内有效的第一密钥;The device to be protected verifies the user information. If the user information is verified, a key parameter of the user is generated, and a first key valid within a preset time is generated based on the key parameter;移动安全设备检测移动安全设备自身的设备信息,若自身的设备信息检测通过,则与所述待保护设备建立有线连接,基于所述有线连接,从所述待保护设备获取所述密钥参数,并基于所述密钥参数生成预设时间内有效的第二密钥;The mobile security device detects the device information of the mobile security device itself, and if the device information detection of the mobile security device itself passes, establishes a wired connection with the device to be protected, obtains the key parameter from the device to be protected based on the wired connection, and generates a second key valid within a preset time based on the key parameter;所述待保护设备基于所述有线连接,从所述移动安全设备获取所述第二密钥,并将所述第一密钥和第二密钥进行比对,若比对一致,则所述待保护设备与所述移动安全设备配对成功,断开所述有线连接,所述待保护设备与移动安全设备建立无线连接;The device to be protected obtains the second key from the mobile security device based on the wired connection, and compares the first key with the second key. If the comparison is consistent, the device to be protected is paired with the mobile security device successfully, the wired connection is disconnected, and the device to be protected establishes a wireless connection with the mobile security device;所述待保护设备获取用户的操作请求,所述待保护设备判断自身是否是锁定状态,若是锁定状态,则不响应用户的操作请求;若是非锁定状态,则基于所述密钥参数重新生成预设时间内有效的第一密钥,并通过所述无线连接,从所述移动安全设备获取基于所述密钥参数重新生成的预设时间内有效的第二密钥,将重新生成的第一密钥和第二密钥进行比对,若比对一致,则所述待保护设备响应用户的操作请求。The protected device obtains an operation request from the user, and determines whether it is in a locked state. If it is in a locked state, it does not respond to the user's operation request; if it is in an unlocked state, it regenerates a first key valid within a preset time based on the key parameters, and obtains a second key valid within a preset time regenerated based on the key parameters from the mobile security device through the wireless connection, compares the regenerated first key and the second key, and if the comparison is consistent, the protected device responds to the user's operation request.2.根据权利要求1所述的方法,其中,2. The method according to claim 1, wherein:所述待保护设备判断自身是否是锁定状态,包括:The device to be protected determines whether it is in a locked state, including:若所述移动安全设备监测到待保护设备被监听、所述待保护设备存在网络代理设置、或待保护设备与移动安全设备通信间断,则所述移动安全设备向所述待保护设备发送锁定指令,所述待保护设备基于接收到的锁定指令,调整自身为锁定状态。If the mobile security device detects that the device to be protected is being monitored, the device to be protected has a network proxy setting, or the communication between the device to be protected and the mobile security device is interrupted, the mobile security device sends a locking instruction to the device to be protected, and the device to be protected adjusts itself to a locked state based on the received locking instruction.3.根据权利要求1所述的方法,其中,3. The method according to claim 1, wherein:所述待保护设备判断自身是否锁定状态,包括:The device to be protected determines whether it is in a locked state, including:所述待保护设备通过所述无线连接,监测所述移动安全设备是否处于非活跃状态,若处于非活跃状态,则所述待保护设备判断自身是锁定状态。The device to be protected monitors whether the mobile security device is in an inactive state through the wireless connection. If the mobile security device is in an inactive state, the device to be protected determines that it is in a locked state.4.根据权利要求1所述的方法,其中,4. The method according to claim 1, wherein:所述待保护设备判断自身是否是锁定状态,包括:The device to be protected determines whether it is in a locked state, including:所述待保护设备监测自身与所述移动安全设备之间的距离是否超过预设距离阈值,若是,所述待保护设备判断自身是锁定状态。The device to be protected monitors whether the distance between itself and the mobile safety device exceeds a preset distance threshold. If so, the device to be protected determines that it is in a locked state.5.根据权利要求4所述的方法,其中,5. The method according to claim 4, wherein:所述待保护设备监测自身与所述移动安全设备之间的距离是否超过预设距离阈值,包括:The device to be protected monitors whether the distance between itself and the mobile safety device exceeds a preset distance threshold, including:若所述待保护设备与所述移动安全设备之间连接有无线网络,则所述待保护设备与所述移动安全设备组成点对点无线网络,所述待保护设备基于点对点无线网络,并采用无线定位方法,并配合NFC、蓝牙、GPS或蜂窝移动网,监测自身与所述移动安全设备之间的距离是否超过预设距离阈值。If a wireless network is connected between the device to be protected and the mobile security device, the device to be protected and the mobile security device form a point-to-point wireless network. The device to be protected is based on the point-to-point wireless network, adopts a wireless positioning method, and cooperates with NFC, Bluetooth, GPS or cellular mobile network to monitor whether the distance between itself and the mobile security device exceeds a preset distance threshold.6.根据权利要求4所述的方法,其中,6. The method according to claim 4, wherein:所述待保护设备监测自身与所述移动安全设备之间的距离是否超过预设距离阈值,包括:The device to be protected monitors whether the distance between itself and the mobile safety device exceeds a preset distance threshold, including:若所述待保护设备与所述移动安全设备均带有NFC或蓝牙装置,则所述待保护设备采用NFC或蓝牙,并配合GPS或蜂窝移动网,监测自身与所述移动安全设备之间的距离是否超过预设距离阈值。If both the device to be protected and the mobile security device are equipped with NFC or Bluetooth devices, the device to be protected uses NFC or Bluetooth, and cooperates with GPS or cellular mobile network to monitor whether the distance between itself and the mobile security device exceeds a preset distance threshold.7.根据权利要求4所述的方法,其中,7. The method according to claim 4, wherein:所述待保护设备监测自身与所述移动安全设备之间的距离是否超过预设距离阈值,包括:The device to be protected monitors whether the distance between itself and the mobile safety device exceeds a preset distance threshold, including:若所述待保护设备与所述移动安全设备均带有陀螺仪,并都带有蜂窝移动定位或GPS定位装置,则所述待保护设备采用GPS定位或蜂窝移动网,并协同陀螺仪,监测自身与所述移动安全设备之间的距离是否超过预设距离阈值。If both the protected device and the mobile safety device are equipped with a gyroscope and a cellular mobile positioning or GPS positioning device, the protected device uses GPS positioning or a cellular mobile network and cooperates with the gyroscope to monitor whether the distance between itself and the mobile safety device exceeds a preset distance threshold.8.根据权利要求4所述的方法,其中,8. The method according to claim 4, wherein:所述待保护设备监测自身与所述移动安全设备之间的距离是否超过预设距离阈值,包括:The device to be protected monitors whether the distance between itself and the mobile safety device exceeds a preset distance threshold, including:若所述待保护设备带有收音装置,所述移动安全设备带有声源播放装置,则所述待保护设备通过收音装置监听声源播放装置发出的预设频率的次声波或超声波的方式,监测自身与所述移动安全设备之间的距离是否超过预设距离阈值。If the device to be protected is equipped with a sound receiving device and the mobile safety device is equipped with a sound source playing device, the device to be protected monitors whether the distance between itself and the mobile safety device exceeds a preset distance threshold by means of the sound receiving device monitoring the infrasound or ultrasonic waves of a preset frequency emitted by the sound source playing device.9.根据权利要求1所述的方法,其中,9. The method according to claim 1, wherein:所述待保护设备判断自身是锁定状态之后,还包括:After the device to be protected determines that it is in a locked state, the method further includes:所述待保护设备锁定自身屏幕、断开所述无线连接、和/或对待保护设备自身的内存信息加密。The device to be protected locks its own screen, disconnects the wireless connection, and/or encrypts the memory information of the device to be protected.10.一种设备安全保护系统,其中,10. A device safety protection system, wherein:该系统包括:The system includes:移动安全设备,用于检测自身的设备信息,若自身的设备信息检测通过,则与待保护设备建立有线连接,基于所述有线连接,从所述待保护设备获取密钥参数,并基于所述密钥参数生成预设时间内有效的第二密钥;The mobile security device is used to detect its own device information, and if the detection of its own device information passes, establish a wired connection with the device to be protected, obtain key parameters from the device to be protected based on the wired connection, and generate a second key valid within a preset time based on the key parameters;待保护设备,用于校验用户信息,若校验用户信息通过,则生成该用户的密钥参数,并基于所述密钥参数生成预设时间内有效的第一密钥;基于所述有线连接,从所述移动安全设备获取所述第二密钥,并将所述第一密钥和第二密钥进行比对,若比对一致,则与所述移动安全设备配对成功,断开所述有线连接,与移动安全设备端建立无线连接;及获取用户的操作请求,所述待保护设备判断自身是否是锁定状态,若是锁定状态,则不响应用户的操作请求;若是非锁定状态,则基于所述密钥参数重新生成预设时间内有效的第一密钥,并通过所述无线连接,从所述移动安全设备获取基于所述密钥参数重新生成的预设时间内有效的第二密钥,将重新生成的第一密钥和第二密钥进行比对,若比对一致,则响应用户的操作请求。The device to be protected is used to verify user information. If the user information is verified, the key parameters of the user are generated, and a first key valid within a preset time is generated based on the key parameters; based on the wired connection, the second key is obtained from the mobile security device, and the first key and the second key are compared. If the comparison is consistent, the pairing with the mobile security device is successful, the wired connection is disconnected, and a wireless connection is established with the mobile security device; and the user's operation request is obtained. The device to be protected determines whether it is in a locked state. If it is in a locked state, it does not respond to the user's operation request; if it is in an unlocked state, the first key valid within a preset time is regenerated based on the key parameters, and the second key valid within the preset time regenerated based on the key parameters is obtained from the mobile security device through the wireless connection, and the regenerated first key and the second key are compared. If the comparison is consistent, the user's operation request is responded to.11.一种计算机可读介质,其上存储有计算机可读指令,所述计算机可读指令可被处理器执行以实现权利要求1至9中任一项所述的方法。11. A computer-readable medium having computer-readable instructions stored thereon, wherein the computer-readable instructions can be executed by a processor to implement the method according to any one of claims 1 to 9.12.一种用于在网络设备端信息处理的设备,该设备包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,12. A device for information processing at a network device end, the device comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein:当该计算机程序指令被该处理器执行时,触发该设备执行权利要求1至9中任一项所述的方法。When the computer program instructions are executed by the processor, the device is triggered to execute the method according to any one of claims 1 to 9.
CN202210905659.6A2022-07-292022-07-29 Device security protection method and systemActiveCN115174077B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202210905659.6ACN115174077B (en)2022-07-292022-07-29 Device security protection method and system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202210905659.6ACN115174077B (en)2022-07-292022-07-29 Device security protection method and system

Publications (2)

Publication NumberPublication Date
CN115174077A CN115174077A (en)2022-10-11
CN115174077Btrue CN115174077B (en)2024-12-27

Family

ID=83476660

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202210905659.6AActiveCN115174077B (en)2022-07-292022-07-29 Device security protection method and system

Country Status (1)

CountryLink
CN (1)CN115174077B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105046137A (en)*2015-07-032015-11-11飞天诚信科技股份有限公司Implementation method and apparatus for intelligent key device to prevent remote hijacking
CN107690030A (en)*2017-08-312018-02-13恒宝股份有限公司A kind of method and Bluetooth intelligent card for unlocking and locking intelligent movable equipment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
SG2013076898A (en)*2013-10-162015-05-28Certis Cisco Security Pte LtdMethod and system for controlling access to wireless apparatuses
KR102399582B1 (en)*2017-03-012022-05-18애플 인크. System access using mobile devices
US11556665B2 (en)*2019-12-082023-01-17Western Digital Technologies, Inc.Unlocking a data storage device
US12245031B2 (en)*2020-01-312025-03-04Lowe's Companies, Inc.Benefit denial system for unlocking an electronic device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105046137A (en)*2015-07-032015-11-11飞天诚信科技股份有限公司Implementation method and apparatus for intelligent key device to prevent remote hijacking
CN107690030A (en)*2017-08-312018-02-13恒宝股份有限公司A kind of method and Bluetooth intelligent card for unlocking and locking intelligent movable equipment

Also Published As

Publication numberPublication date
CN115174077A (en)2022-10-11

Similar Documents

PublicationPublication DateTitle
US10122696B2 (en)Environment-aware security tokens
US8595810B1 (en)Method for automatically updating application access security
US10419226B2 (en)Systems and methods for device authentication
US9264897B2 (en)Pairing and authentication process between a host device and a limited input wireless device
CN109076067B (en)System and method for authenticating a user for secure data access using a multiparty authentication system
CA2877409C (en)Security mode for mobile communications devices
US20150172920A1 (en)System for proximity based encryption and decryption
US20070226778A1 (en)Bluetooth theft protection
US20160381552A1 (en)Handling risk events for a mobile device
US10764059B2 (en)Communications security systems and methods
US20180199202A1 (en)Mobile Device Security Lock
CN115174077B (en) Device security protection method and system
WO2013100899A1 (en)Method and apparatus to use smart phones to securely and conveniently monitor intel pcs remotely
US20150264048A1 (en)Information processing apparatus, information processing method, and recording medium
CN111445603B (en) Bluetooth-based data processing method, device, storage medium and electronic equipment
CN115620426A (en)Vehicle key control device, method, electronic device and readable storage medium
US11217046B2 (en)Secure device operation using transferred code modules
US11803626B2 (en)Wireless kill switch
JP2018026141A (en)Information processing apparatus, information processing method, and computer program
Lima et al.An Introduction to Mobile Device Security
CN120475362A (en)Device processing method, apparatus, device, computer readable medium, and program product
US20200334343A1 (en)Monitoring access
WO2019045914A1 (en) DEVICE AUTHENTICATION SYSTEMS AND METHODS
HK1242437A1 (en)Environment-aware security tokens

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp