Automatic protecting method for computer system based on Bluetooth device authentication

A computer system and bluetooth device technology, applied in the field of information security, can solve the problems of inability to achieve real-time monitoring and high cost, and achieve the effects of low cost, transparent operation, and simplified operation mode.

Inactive Publication Date: 2011-09-14
SOUTHEAST UNIV
View PDF4 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method also has obvious shortcomings: not only is the cost high, but it can only be

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic protecting method for computer system based on Bluetooth device authentication
  • Automatic protecting method for computer system based on Bluetooth device authentication
  • Automatic protecting method for computer system based on Bluetooth device authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The key technologies and specific implementation methods of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0064] Such as figure 1 As shown, the application scenario of the present invention includes a user's mobile phone or PDA, a Bluetooth adapter and a computer, and the Bluetooth adapter can be a general-purpose USB Bluetooth adapter. The computer equipped with protection software automatically executes the BIOS after booting, and then interacts with the Bluetooth of the user's mobile phone or PDA through the Bluetooth adapter connected to it, obtains the Bluetooth address and IMSI number of the user's device, and waits for the user to enter the PIN code. The user enters the PIN code on the mobile phone or PDA, and the computer calculates the authentication key through a specific algorithm to complete the device authentication between the mobile phone Bluetooth and the computer Bluetooth adapter, as well as th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an automatic protecting method for a computer system based on Bluetooth device authentication. In the method, a control program is written in a disk MBR (Master Boot Record), and double authentication of hardware equipment and user identity is realized by combining a Bluetooth wireless transmitting protocol before an operating system is started and using a Bluetooth address, a PIN (Personal Identification Number) code and a mobile terminal IMSI (International Mobile Subscriber Identity) number. In an operation process of the operating system, automatic real-time monitoring is set, the system can be automatically locked and can not be operated once the Bluetooth device of a user deviates from the coverage area of a Bluetooth adapter; and the system can be automatically unlocked and recovered for operation once the Bluetooth device of the user returns to the coverage area.

Description

technical field [0001] The invention is an automatic protection method for a computer system based on bluetooth device authentication, and belongs to the technical field of information security. Before the computer operating system is started and when it is running, through the communication between the Bluetooth device and the mobile terminal, the identity authentication, real-time monitoring and system access control functions are realized to achieve the purpose of protecting the computer system. Background technique [0002] With the increasing degree of informatization, information security is particularly important. Many people think that the security risks mainly come from hacker attacks and virus damage. As long as firewalls and anti-virus software are deployed, it will be safe. However, according to the survey results of the US Federal Bureau of Investigation and computer security agencies, more than 80% of information security risks come from internal rather than ex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G08C17/02G06F21/57G06F21/85
Inventor 宋宇波蒋睿张南胡锡利
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products