TWI632481B - Controlled device and safety management method thereof - Google Patents

Controlled device and safety management method thereof Download PDF

Info

Publication number
TWI632481B
TWI632481B TW106117137A TW106117137A TWI632481B TW I632481 B TWI632481 B TW I632481B TW 106117137 A TW106117137 A TW 106117137A TW 106117137 A TW106117137 A TW 106117137A TW I632481 B TWI632481 B TW I632481B
Authority
TW
Taiwan
Prior art keywords
electronic key
key device
controlled device
predetermined
executed
Prior art date
Application number
TW106117137A
Other languages
Chinese (zh)
Other versions
TW201901509A (en
Inventor
王志高
余家庭
陳一得
Original Assignee
系微股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 系微股份有限公司 filed Critical 系微股份有限公司
Priority to TW106117137A priority Critical patent/TWI632481B/en
Priority to CN201710508496.7A priority patent/CN109246703A/en
Priority to US15/983,845 priority patent/US10706172B2/en
Application granted granted Critical
Publication of TWI632481B publication Critical patent/TWI632481B/en
Publication of TW201901509A publication Critical patent/TW201901509A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Selective Calling Equipment (AREA)
  • Lock And Its Accessories (AREA)

Abstract

本發明係一種受控裝置及其安全管理方法,受控裝置包含有一無線連接模組及一處理模組,處理模組透過無線連接模組與一電子鑰匙裝置進行連線及配對,且當與電子鑰匙裝置配對成功時,處理模組係執行一安全模式。在安全模式下,使用者可直接操作受控裝置。也就是說,受控裝置必須在與該電子鑰匙裝置成功連線且配對的狀況下才能供使用者操作使用,若無法成功連線且配對,受控裝置就無法被使用。因此,對於使用者而言,只要確保該電子鑰匙裝置在身邊,就能確保受控裝置不會被其他人使用。藉此提供使用者方便且安全的資料安全管理方法。The present invention is a controlled device and a security management method thereof. The controlled device includes a wireless connection module and a processing module. The processing module is connected and paired with an electronic key device through a wireless connection module, and When the electronic key device is successfully paired, the processing module executes a security mode. In safe mode, the user can directly operate the controlled device. That is to say, the controlled device must be successfully connected and paired with the electronic key device for use by the user. If the connection cannot be successfully made and paired, the controlled device cannot be used. Therefore, it is possible for the user to ensure that the controlled device is not used by others as long as the electronic key device is secured. Thereby providing a convenient and safe data security management method for the user.

Description

受控裝置及其安全管理方法Controlled device and safety management method thereof

本發明係一種裝置管理方法,尤指一種受控裝置及其安全管理方法。The invention relates to a device management method, in particular to a controlled device and a safety management method thereof.

電腦已是目前最常使用的電子裝置之一,對於使用者而言,電腦常常會儲存有很多的個人資料,如使用者帳號、密碼甚至是使用者的身分證掃描檔,或其他有關於使用者個人隱私的敏感資料。因此,使用者通常會將電腦透過帳號密碼鎖住,當使用者需要使用電腦時,就必須先輸入帳號密碼登入作業系統後,才能正常操作電腦。藉此避免具有使用者個人隱私的敏感資料外洩或產生身分被盜用的情形。The computer is one of the most commonly used electronic devices. For the user, the computer often stores a lot of personal information, such as the user account, password, and even the scanned file of the user ’s ID card, or other information about the use of the device. Sensitive personal information. Therefore, the user usually locks the computer through the account password. When the user needs to use the computer, he must enter the account password to log in to the operating system before operating the computer normally. This is to prevent the leakage of sensitive information with the user ’s personal privacy or identity theft.

因此,當使用者需要使用電腦時,必須先輸入帳號密碼將電腦解鎖後才能操作,對於使用者而言必須多一步動作才能操作電腦,造成使用上的不方便。Therefore, when the user needs to use the computer, the user must first enter the account password to unlock the computer before operation. For the user, an additional step must be taken to operate the computer, causing inconvenience in use.

此外,當使用者需要輸入帳號密碼時,若有其他人在旁邊,則容易被其他人偷看而得知使用者的帳號密碼。若直接要求其他人轉移視線,又容易造成尷尬的情況。故現有技術有必要做進一步之改良。In addition, when the user needs to enter the account password, if there are other people nearby, it is easy for others to peek and know the user's account password. It is easy to cause embarrassing situations if you directly ask others to look away. Therefore, it is necessary to further improve the existing technology.

有鑑於現有的裝置管理方法讓使用者在使用前還需多一步動作才能操作裝置,或當使用者輸入帳號密碼時,因容易被偷看,而發生必須要求他人轉移事件的尷尬情況,本發明提供一種受控裝置及其安全管理方法,方便使用者時直接操作,或避免當使用者輸入密碼時容易遭到偷看的情況。In view of the existing device management method, users need to take one more step to operate the device before using it, or when the user enters the account password, it is easy to be peeked, and the embarrassing situation that requires others to transfer the event occurs, the present invention Provided is a controlled device and a security management method thereof, which are convenient for a user to directly operate or to avoid a situation where a user is easy to be seen when entering a password.

該受控裝置係包含有: 一無線連接模組,係與一電子鑰匙裝置進行連線; 一處理模組,係連接該無線連接模組,且透過該無線連接模組與該電子鑰匙裝置連線以進行配對;當與該電子鑰匙裝置配對成功時,該處理模組係執行一安全模式。The controlled device includes: a wireless connection module for connecting with an electronic key device; a processing module for connecting with the wireless connection module and connecting with the electronic key device through the wireless connection module When the pairing with the electronic key device is successful, the processing module executes a security mode.

此外,該受控裝置的安全管理方法係包含有: 與一電子鑰匙裝置連線以進行配對; 判斷是否與該電子鑰匙裝置配對成功; 當與該電子鑰匙裝置配對成功時,執行一安全模式。In addition, the security management method of the controlled device includes: connecting with an electronic key device for pairing; determining whether the electronic key device is successfully paired with the electronic key device; and performing a security mode when the pairing with the electronic key device is successful.

本發明透過由該受控裝置與電子鑰匙裝置連線進行配對,並於配對成功時執行該安全模式。在安全模式下,該受控裝置的使用者可直接操作使用該受控裝置。也就是說,該受控裝置必須在與該電子鑰匙裝置成功連線且配對的狀況下才能供使用者操作使用,若無法成功連線且配對,該受控裝置就不會執行該安全模式,讓該受控裝置無法被使用。因此,對於使用者而言,只要確保該電子鑰匙裝置在身邊,就能確保該受控裝置不會被其他人使用。The present invention performs pairing by connecting the controlled device and the electronic key device, and executes the security mode when the pairing is successful. In the safe mode, the user of the controlled device can directly operate and use the controlled device. That is to say, the controlled device must be successfully connected and paired with the electronic key device for the user to operate. If the controlled device cannot be successfully connected and paired, the controlled device will not execute the security mode. Make the controlled device unusable. Therefore, for the user, as long as the electronic key device is ensured, it can be ensured that the controlled device will not be used by others.

此外,在安全模式下,該受控裝置能夠自動輸入資料,當使用者需要輸入帳號密碼時,在安全模式下的受控裝置就能自動輸入資料,如此一來,便不需要請其他人轉移視線,即可進行資料的輸入,藉此提供使用者方便且安全的資料輸入方式。In addition, in the safe mode, the controlled device can automatically enter data. When the user needs to enter the account password, the controlled device in the safe mode can automatically enter data. In this way, there is no need to ask others to transfer Sight, you can enter data, which provides users with a convenient and safe way to enter data.

以下配合圖式及本發明較佳實施例,進一步闡述本發明為達成預定目的所採取的技術手段。In the following, the technical means adopted by the present invention to achieve the intended purpose will be further explained in conjunction with the drawings and the preferred embodiments of the present invention.

請參閱圖1所示,本發明係一種受控裝置及其安全管理方法,該受控裝置10係用於與一電子鑰匙裝置20連線,該受控裝置10係包含有一無線連接模組11及一處理模組12。Please refer to FIG. 1, the present invention is a controlled device and a security management method thereof. The controlled device 10 is used to connect with an electronic key device 20. The controlled device 10 includes a wireless connection module 11. And a processing module 12.

該無線連接模組11係與該電子鑰匙裝置20進行連線。該處理模組12係連接該無線連接模組11,且透過該無線連接模組11與該電子鑰匙裝置20連線以進行配對。當該受控裝置10與該電子鑰匙裝置20配對成功時,該處理模組12係執行一安全模式。在本較佳實施例中,當與該電子鑰匙裝置20未配對成功時,該受控裝置10係維持原狀態。舉例來說,若該受控裝置10在執行本發明的安全管理方法前,係處於密碼鎖定狀態等待使用者輸入密碼,則當與該電子鑰匙裝置20未配對成功時,該受控裝置10係維持密碼鎖定狀態。The wireless connection module 11 is connected to the electronic key device 20. The processing module 12 is connected to the wireless connection module 11, and is connected to the electronic key device 20 through the wireless connection module 11 for pairing. When the controlled device 10 and the electronic key device 20 are successfully paired, the processing module 12 executes a security mode. In the preferred embodiment, when the electronic key device 20 is not paired successfully, the controlled device 10 maintains the original state. For example, if the controlled device 10 is in a password locked state and waits for a user to input a password before executing the security management method of the present invention, the controlled device 10 is a device that is not paired with the electronic key device 20 Keep password locked.

此外,請參閱圖2所示,本發明的受控裝置的安全管理方法的一第一較佳實施例係包含有以下步驟: 與一電子鑰匙裝置連線以進行配對(S201); 判斷是否與該電子鑰匙裝置配對成功(S202); 當與該電子鑰匙裝置配對成功時,執行一安全模式(S203); 當與該電子鑰匙裝置未配對成功時,維持原狀態(S204)。In addition, as shown in FIG. 2, a first preferred embodiment of a security management method for a controlled device of the present invention includes the following steps: connecting with an electronic key device for pairing (S201); determining whether to The electronic key device is successfully paired (S202); when the electronic key device is successfully paired, a security mode is performed (S203); when the electronic key device is not paired successfully, the original state is maintained (S204).

本發明透過由該受控裝置10與電子鑰匙裝置20連線進行配對,並於配對成功時執行該安全模式。在安全模式下,該受控裝置10的使用者可直接操作使用該受控裝置10。也就是說,該受控裝置10必須在與該電子鑰匙裝置20成功連線且配對的狀況下才能供使用者操作使用,若無法成功連線且配對失敗,該受控裝置10就維持原狀態不做任何動作。因此,對於使用者而言,只要攜帶該電子鑰匙裝置20在身邊,就能直接使用該受控裝置10,而不需再另外執行其他動作,方便使用者操作該受控裝置10。The present invention performs pairing by connecting the controlled device 10 and the electronic key device 20, and executes the security mode when the pairing is successful. In the safe mode, a user of the controlled device 10 can directly operate and use the controlled device 10. In other words, the controlled device 10 can only be operated by the user under the condition of being successfully connected and paired with the electronic key device 20. If the controlled device 10 cannot be successfully connected and the pairing fails, the controlled device 10 maintains the original state Do nothing. Therefore, for the user, as long as the electronic key device 20 is carried around, the controlled device 10 can be directly used without performing other actions, which is convenient for the user to operate the controlled device 10.

此外,當使用者需要輸入帳號密碼時,若有其他人在旁邊,則容易被其他人偷看而得知使用者的帳號密碼。若直接要求其他人轉移視線,又容易造成尷尬的情況。因此,在安全模式下,該受控裝置10能夠自動輸入資料,當使用者需要輸入帳號密碼時,在安全模式下的受控裝置10就能自動輸入資料,如此一來,便不需要請其他人轉移視線,即可進行資料的輸入,藉此提供使用者方便且安全的資料輸入方式。In addition, when the user needs to enter the account password, if there are other people nearby, it is easy for others to peek and know the user's account password. It is easy to cause embarrassing situations if you directly ask others to look away. Therefore, in the safe mode, the controlled device 10 can automatically input data. When a user needs to enter an account password, the controlled device 10 in the safe mode can automatically input data. In this way, there is no need to ask other When people look away, they can enter data, thereby providing users with a convenient and safe way to enter data.

請參閱圖1所示,進一步而言,當該處理模組12執行該安全模式時,係登入該受控裝置10的作業系統。舉例來說,當該受控裝置10與該電子鑰匙裝置20連線且配對成功時,該受控裝置10便可自動登入作業系統,供使用者操作該受控裝置10。反之,當受控裝置10與該電子鑰匙裝置20並未連線或配對成功時,該受控裝置10就不登入作業系統,並繼續維持原狀態,不執行其他動作。藉此達到保護該受控裝置10中儲存的敏感資料的目的。Please refer to FIG. 1. Further, when the processing module 12 executes the security mode, it is logged into the operating system of the controlled device 10. For example, when the controlled device 10 and the electronic key device 20 are connected and paired successfully, the controlled device 10 can automatically log in to the operating system for a user to operate the controlled device 10. Conversely, when the controlled device 10 and the electronic key device 20 are not connected or paired successfully, the controlled device 10 does not log in to the operating system, and continues to maintain the original state without performing other actions. In this way, the purpose of protecting sensitive data stored in the controlled device 10 is achieved.

此外,當該處理模組12執行該安全模式時,係執行一預定的應用程式、或執行一預定的瀏覽器並開啟一預定的網頁。舉例來說,該預定的應用程式可為一個人電子郵件應用程式,而該預定瀏覽器開啟的預定網頁可為一網頁瀏覽器開啟的電子郵件登入網頁。當該受控裝置10與該電子鑰匙裝置20連線且配對成功時,該受控裝置10可自動執行該個人電子郵件應用程式。或者,該受控裝置10可自動執行該網頁瀏覽器並開啟電子郵件登入網頁。藉此提供使用者方便的使用環境。In addition, when the processing module 12 executes the security mode, it executes a predetermined application program, or executes a predetermined browser and opens a predetermined web page. For example, the predetermined application may be a personal email application, and the predetermined webpage opened by the predetermined browser may be an email login webpage opened by a web browser. When the controlled device 10 and the electronic key device 20 are connected and paired successfully, the controlled device 10 can automatically execute the personal email application. Alternatively, the controlled device 10 may automatically execute the web browser and open an email login webpage. This provides a convenient user environment.

進一步而言,當該處理模組12執行該安全模式,並執行一預定的應用程式、或執行一預定的瀏覽器並開啟一預定的網頁時,該處理模組12係進一步在執行的預定應用程式中自動輸入資料、或在執行的預定瀏覽器開啟的預定網頁中自動輸入資料。舉例來說,當該受控裝置10自動執行個人電子郵件應用程式時,係進一步自動輸入登入該電子郵件應用程式所需的帳號密碼。或者,當該受控裝置10自動執行網頁瀏覽器並開啟電子郵件登入網頁時,係進一步自動輸入登入該網頁瀏覽器開啟的電子郵件登入網頁所需的帳號密碼。藉此提供使用者方便的使用環境。Further, when the processing module 12 executes the security mode and executes a predetermined application program, or executes a predetermined browser and opens a predetermined web page, the processing module 12 is a predetermined application that is further executed. Automatically enter data in the program, or in a predetermined web page opened by a scheduled browser that is running. For example, when the controlled device 10 automatically executes a personal email application, it further automatically enters an account password required to log in to the email application. Alternatively, when the controlled device 10 automatically executes a web browser and opens an email login webpage, it further automatically enters an account password required to log in to the email login webpage opened by the web browser. This provides a convenient user environment.

此外,該受控裝置10可自動輸入的資料亦可為在購物網站結帳網頁中所要填的購買人姓名、電話、地址等資料、或結帳用的***卡號等,視使用狀況而定。In addition, the data that can be automatically entered by the controlled device 10 can also be the name, phone number, address, etc. of the purchaser to be filled in the checkout page of the shopping website, or the credit card number used for checkout, etc., depending on the use status.

在其他較佳實施例中,當該處理模組12執行該安全模式時,且當使用者透過該受控裝置10開啟一資料檔時,該處理模組12執行一預定的應用程式以開啟該資料檔,且進一步自動輸入一開啟密碼資料。舉例來說,當使用者欲開啟加密過的文字資料檔時,係透過一文字編輯應用程式來開啟,而當該文字編輯應用程式在開啟該文字資料檔時,會先要求使用者輸入開啟密碼。此時,若該受控裝置10係與該電子鑰匙裝置20配對成功且執行該安全模式的情況下,該受控裝置10會自動輸入該開啟密碼資料,讓使用者無須另外輸入密碼,即可開啟加密過後的資料檔。In other preferred embodiments, when the processing module 12 executes the security mode, and when a user opens a data file through the controlled device 10, the processing module 12 executes a predetermined application program to open the Data file, and further automatically enter an opening password data. For example, when the user wants to open the encrypted text data file, it is opened by a text editing application, and when the text editing application opens the text data file, the user is required to enter the opening password first. At this time, if the controlled device 10 is successfully paired with the electronic key device 20 and the security mode is executed, the controlled device 10 will automatically enter the opening password data, so that the user does not need to enter another password. Open the encrypted data file.

請參閱圖3所示,該受控裝置10係進一步包含有一儲存模組13。該儲存模組13中儲存有上述該處理模組12在該預定應用程式中自動輸入的資料、或在該預定瀏覽器開啟的預定網頁中自動輸入的資料。因此當執行該處理模組12執行該安全模式時,由於該受控裝置10與該電子鑰匙裝置20已連線且配對成功,代表使用者在受控裝置10旁,能直接使用該受控裝置10,或能知道該受控裝置10正在被誰使用。故當該處理模組12在執行的預定應用程式中自動輸入資料、或在執行的預定瀏覽器開啟的預定網頁中自動輸入資料時,便可直接將儲存在該儲存模組13中的資料自動輸入至對應的應用程式或對應的網頁中。藉此提供使用者方便的使用環境。Please refer to FIG. 3, the controlled device 10 further includes a storage module 13. The storage module 13 stores data automatically input by the processing module 12 in the predetermined application program or data automatically input in a predetermined web page opened by the predetermined browser. Therefore, when the processing module 12 is executed in the security mode, since the controlled device 10 and the electronic key device 20 are connected and successfully paired, the user can directly use the controlled device beside the controlled device 10 10, or know who is using the controlled device 10. Therefore, when the processing module 12 automatically enters data in the execution of the predetermined application program or in the predetermined web page opened by the execution of the predetermined browser, the data stored in the storage module 13 can be automatically automatically entered. Enter the corresponding application or corresponding web page. This provides a convenient user environment.

舉例來說,該電子鑰匙裝置20可為一佩戴在使用者身上的手環,因此當使用者正在使用該受控裝置10或在該受控裝置10附近時,該受控裝置10才能與該電子鑰匙裝置20連線與配對,讓該受控裝置10能被使用,且能夠自動輸入資料。For example, the electronic key device 20 may be a bracelet worn on the user, so the controlled device 10 can communicate with the controlled device 10 only when the user is using the controlled device 10 or near the controlled device 10. The electronic key device 20 is connected and paired, so that the controlled device 10 can be used and data can be input automatically.

此外,上述當該處理模組12在執行的預定應用程式中自動輸入資料、或在執行的預定瀏覽器開啟的預定網頁中自動輸入資料時,亦可由該處理模組12透過該無線傳輸模組11接收來自該電子鑰匙裝置20中儲存的資料,並自動輸入資料。也就是說,該受控裝置10中並不會儲存在登入作業系統所需的資料、在應用程式中所需的資料、或在網頁中所需的資料。由於該些資料並未儲存在該受控裝置10中,而是儲存在該電子鑰匙裝置20中,而該電子鑰匙裝置20對於使用者而言,較不容易丟失,因此具有較高的安全性。In addition, when the processing module 12 automatically enters data in a predetermined application program that is executed or automatically enters data in a predetermined web page that is opened by the executed predetermined browser, the processing module 12 may also use the wireless transmission module. 11 receives data stored in the electronic key device 20 and automatically enters the data. That is, the controlled device 10 does not store data required for logging in to the operating system, data required in applications, or data required in web pages. Since the data is not stored in the controlled device 10, but is stored in the electronic key device 20, and the electronic key device 20 is less likely to be lost to the user, and therefore has higher security .

在另一較佳實施例中,當該處理模組12執行該安全模式時,係允許執行特定應用程式、允許執行執行一預定的瀏覽器並開啟一預定的網頁、或允許執行一預定的應用程式以開啟一預定的資料檔。舉例來說,該預定的應用程式可為一個人電子郵件應用程式,該預定瀏覽器開啟的預定網頁可為一網頁瀏覽器開啟的電子郵件登入網頁,而該預定的應用程式開啟的預定資料檔可為一文字編輯應用程式開啟一文字資料檔。In another preferred embodiment, when the processing module 12 executes the security mode, it allows execution of a specific application program, execution of a predetermined browser and opening of a predetermined webpage, or execution of a predetermined application. Program to open a predetermined data file. For example, the predetermined application may be a personal email application, the predetermined webpage opened by the predetermined browser may be an email login webpage opened by a web browser, and the predetermined data file opened by the predetermined application may be Open a text data file for a text editing application.

當該受控裝置10與該電子鑰匙裝置20連線且配對成功時,該處理模組12才允許該個人電子郵件應用程式被執行、允許該網頁瀏覽器開啟電子郵件登入網頁、或允許該文字編輯應用程式開啟該文字資料檔。換句話說,當該受控裝置10與該電子鑰匙裝置20未連線或未配對成功時,該個人電子郵件應用程式無法被執行、該網頁瀏覽器無法開啟電子郵件登入網頁、或該文字編輯應用程式無法開啟該文字資料檔。藉此提供該受控裝置10更高的安全性。When the controlled device 10 and the electronic key device 20 are connected and paired successfully, the processing module 12 allows the personal email application to be executed, allows the web browser to open the email login page, or allows the text The editing application opens the text data file. In other words, when the controlled device 10 and the electronic key device 20 are not connected or paired successfully, the personal email application cannot be executed, the web browser cannot open the email login page, or the text editing The application cannot open the text data file. This provides higher security of the controlled device 10.

在該受控裝置10的再一較佳實施例中,當該受控裝置10與該電子鑰匙裝置20配對成功時,該處理模組12係進一步判斷與該電子鑰匙裝置20的連線信號強度是否超過一預設閥值且持續超過一預設時間。當與該電子鑰匙裝置20的連線信號強度超過該預設閥值且持續超過該預設時間時,該處理模組12才執行該安全模式。而當與該電子鑰匙裝置20的連線信號強度未超過該預設閥值或未持續超過該預設時間時,該受控裝置20則維持原狀態。In yet another preferred embodiment of the controlled device 10, when the controlled device 10 is successfully paired with the electronic key device 20, the processing module 12 further determines the strength of the connection signal with the electronic key device 20. Whether it exceeds a preset threshold and continues for more than a preset time. The processing module 12 executes the security mode only when the strength of the connection signal with the electronic key device 20 exceeds the preset threshold and continues to exceed the preset time. When the strength of the connection signal with the electronic key device 20 does not exceed the preset threshold or does not exceed the preset time, the controlled device 20 maintains the original state.

此外,請參閱圖4所示,本發明的受控裝置的安全管理方法的一第二較佳實施例係包含有以下步驟: 與一電子鑰匙裝置連線以進行配對(S401); 判斷是否與該電子鑰匙裝置配對成功(S402); 當與該電子鑰匙裝置配對成功時,判斷與該電子鑰匙裝置的連線信號強度是否超過一預設閥值且持續超過一預設時間(S403); 當與該電子鑰匙裝置的連線信號強度超過一預設閥值且持續超過一預設時間時,執行一安全模式(S404); 當與該電子鑰匙裝置未配對成功時,或當與該電子鑰匙裝置的連線信號強度未超過該預設閥值或未持續超過該預設時間時,維持原狀態(S405)。In addition, please refer to FIG. 4, a second preferred embodiment of the security management method of the controlled device of the present invention includes the following steps: connecting with an electronic key device for pairing (S401); The electronic key device is successfully paired (S402); when the electronic key device is successfully paired, it is determined whether the strength of the connection signal with the electronic key device exceeds a preset threshold and continues for more than a preset time (S403); When the strength of the connection signal with the electronic key device exceeds a preset threshold and continues for more than a preset time, a security mode is performed (S404); when the pairing with the electronic key device is not successful, or when the electronic key device is not paired successfully, When the connection signal strength of the device does not exceed the preset threshold or does not continue to exceed the preset time, the original state is maintained (S405).

請參閱圖1所示,進一步而言,該處理模組12係透過該無線連接模組11接收該電子鑰匙裝置20感測並回傳的連線信號強度,並根據該電子鑰匙裝置20感測並回傳的連線信號強度,由該受控裝置10計算接收到該電子鑰匙裝置20感測並回傳的連線信號強度的持續時間,並判斷該連線信號強度是否超過該預設閥值且持續超過該預設時間。Please refer to FIG. 1. Further, the processing module 12 receives the connection signal strength sensed and returned by the electronic key device 20 through the wireless connection module 11 and senses the signal strength according to the electronic key device 20. And the strength of the connection signal returned, the controlled device 10 calculates the duration of the connection signal strength received by the electronic key device 20 and returns, and determines whether the strength of the connection signal exceeds the preset valve Value and continues to exceed the preset time.

此外,該處理模組12係先判斷使否與一鑰匙裝置30電連接。當與該鑰匙裝置30電連接時,該處理模組12可直接執行該安全模式。當未與該鑰匙裝置30電連接時,該處理模組12才透過該無線連接模組12與該電子鑰匙裝置20連線以進行配對。藉此提供使用者兩種可讓該處理模組12執行該安全模式的方式,提供更彈性化的安全管理方法。在本較佳實施例中,該受控裝置10可為一桌上型電腦、一筆記型電腦、或一智慧型手機等,但並不以此為限。該電子鑰匙裝置20可為一智慧型手環、一智慧型手機、或一智慧型穿戴裝置,但並不以此為限。該鑰匙裝置30則可為一隨身碟、或為一智慧卡裝置(etoken)等,但並不以此為限。In addition, the processing module 12 first determines whether to be electrically connected to a key device 30. When electrically connected to the key device 30, the processing module 12 can directly execute the security mode. When the key device 30 is not electrically connected, the processing module 12 is connected to the electronic key device 20 through the wireless connection module 12 for pairing. This provides the user with two ways that the processing module 12 can execute the security mode, and provides a more flexible security management method. In the preferred embodiment, the controlled device 10 may be a desktop computer, a notebook computer, or a smart phone, but is not limited thereto. The electronic key device 20 may be a smart bracelet, a smart phone, or a smart wearable device, but is not limited thereto. The key device 30 may be a USB flash drive, or a smart card device, but it is not limited to this.

請參閱圖5所示,本發明的受控裝置的安全管理方法的一第三較佳實施例係包含有以下步驟: 判斷是否與一鑰匙裝置電連接(S501); 當與該鑰匙裝置電連接時,執行一安全模式(S502); 當未與該鑰匙裝置電連接時,與一電子鑰匙裝置連線以進行配對(S503); 判斷是否與該電子鑰匙裝置配對成功(S504); 當與該電子鑰匙裝置配對成功時,判斷與該電子鑰匙裝置的連線信號強度是否超過一預設閥值且持續超過一預設時間(S505); 當與該電子鑰匙裝置的連線信號強度超過一預設閥值且持續超過一預設時間時,執行該安全模式(S502); 當未與該鑰匙裝置電連接時、當與該電子鑰匙裝置未配對成功時、或當與該電子鑰匙裝置的連線信號強度未超過該預設閥值或未持續超過該預設時間時,維持原狀態(S506)。Please refer to FIG. 5, a third preferred embodiment of a security management method for a controlled device according to the present invention includes the following steps: determining whether it is electrically connected to a key device (S501); when electrically connected to the key device When it is not electrically connected to the key device, connect with an electronic key device for pairing (S503); determine whether the pairing with the electronic key device is successful (S504); When the electronic key device is successfully paired, it is determined whether the strength of the connection signal with the electronic key device exceeds a preset threshold and continues for more than a preset time (S505); when the strength of the connection signal with the electronic key device exceeds a pre-set value When a threshold value is set and lasts for more than a preset time, the security mode is executed (S502); when it is not electrically connected to the key device, when it is not paired with the electronic key device successfully, or when it is connected to the electronic key device When the line signal strength does not exceed the preset threshold or does not continue to exceed the preset time, the original state is maintained (S506).

以上所述僅是本發明的較佳實施例而已,並非對本發明做任何形式上的限制,雖然本發明已以較佳實施例揭露如上,然而並非用以限定本發明,任何熟悉本專業的技術人員,在不脫離本發明技術方案的範圍內,當可利用上述揭示的技術內容做出些許更動或修飾為等同變化的等效實施例,但凡是未脫離本發明技術方案的內容,依據本發明的技術實質對以上實施例所作的任何簡單修改、等同變化與修飾,均仍屬於本發明技術方案的範圍內。The above are only the preferred embodiments of the present invention, and are not intended to limit the present invention in any form. Although the present invention has been disclosed as above with the preferred embodiments, they are not intended to limit the present invention, and any technology familiar with the profession Personnel, without departing from the scope of the technical solution of the present invention, can use the disclosed technical content to make a few changes or modify the equivalent embodiment of equivalent changes, but as long as it does not depart from the technical solution of the present invention, according to the present invention Any simple modifications, equivalent changes, and modifications made to the above embodiments by the technical essence of the invention still fall within the scope of the technical solution of the present invention.

10‧‧‧受控裝置10‧‧‧ controlled device

11‧‧‧無線連接模組11‧‧‧Wireless connection module

12‧‧‧處理模組12‧‧‧Processing Module

13‧‧‧儲存模組13‧‧‧Storage Module

20‧‧‧電子鑰匙裝置20‧‧‧Electronic key device

30‧‧‧鑰匙裝置30‧‧‧ key device

圖1係本發明受控裝置配合電子鑰匙裝置的較佳實施方式的方塊圖。 圖2係本發明受控裝置的安全管理方法第一較佳實施例的流程圖。 圖3係本發明受控裝置配合電子鑰匙裝置的另一較佳實施方式的方塊圖。 圖4係本發明受控裝置的安全管理方法第二較佳實施例的流程圖。 圖5係本發明受控裝置的安全管理方法第二較佳實施例的流程圖。FIG. 1 is a block diagram of a preferred embodiment of an electronic key device controlled by a controlled device according to the present invention. FIG. 2 is a flowchart of a first preferred embodiment of a security management method for a controlled device according to the present invention. FIG. 3 is a block diagram of another preferred embodiment of the controlled device and the electronic key device of the present invention. FIG. 4 is a flowchart of a second preferred embodiment of a security management method for a controlled device according to the present invention. 5 is a flowchart of a second preferred embodiment of a security management method for a controlled device according to the present invention.

Claims (16)

一種受控裝置的安全管理方法,係於一受控裝置執行,該方法包含有:與一電子鑰匙裝置連線以進行配對;判斷是否與該電子鑰匙裝置配對成功;當與該電子鑰匙裝置配對成功時,執行一安全模式;其中:當與該電子鑰匙裝置配對成功時,係進一步判斷與該電子鑰匙裝置的連線信號強度是否超過一預設閥值且持續超過一預設時間;且當與該電子鑰匙裝置的連線信號強度超過一預設閥值且持續超過一預設時間時,執行該安全模式;當判斷與該電子鑰匙裝置的連線信號強度是否超過該預設閥值且持續超過該預設時間時,係接收該電子鑰匙裝置感測並回傳的連線信號強度及持續時間,並根據該電子鑰匙裝置感測並回傳的連線信號強度及持續時間,判斷連線信號強度是否超過該預設閥值且持續超過該預設時間。A security management method for a controlled device is executed by a controlled device. The method includes: connecting with an electronic key device for pairing; judging whether the pairing with the electronic key device is successful; when pairing with the electronic key device When successful, a security mode is executed; where: when pairing with the electronic key device is successful, it is further determined whether the strength of the connection signal with the electronic key device exceeds a preset threshold and continues for more than a preset time; and when When the strength of the connection signal with the electronic key device exceeds a preset threshold and continues for more than a preset time, the security mode is executed; when it is determined whether the strength of the connection signal with the electronic key device exceeds the preset threshold and When the duration exceeds the preset time, the connection signal strength and duration detected and returned by the electronic key device are received, and the connection signal strength and duration detected and returned by the electronic key device are used to determine the connection. Whether the line signal strength exceeds the preset threshold and continues to exceed the preset time. 如請求項1所述之受控裝置的安全管理方法,其中:在與一電子鑰匙裝置連線以進行配對前,係先判斷是否與一鑰匙裝置電連接;且當與該鑰匙裝置電連接時,執行一安全模式;而當未與該鑰匙裝置電連接時,與一電子鑰匙裝置連線以進行配對。The security management method for a controlled device according to claim 1, wherein: before connecting with an electronic key device for pairing, it is determined whether it is electrically connected with a key device; and when it is electrically connected with the key device , Execute a security mode; and when not electrically connected with the key device, connect with an electronic key device for pairing. 如請求項1或2所述之受控裝置的安全管理方法,其中當執行該安全模式時,係登入一作業系統。The security management method for a controlled device according to claim 1 or 2, wherein when the security mode is executed, an operating system is logged in. 如請求項1或2所述之受控裝置的安全管理方法,其中當執行該安全模式時,係執行一預定的應用程式、或執行一預定的瀏覽器並開啟一預定的網頁。The security management method for a controlled device according to claim 1 or 2, wherein when the security mode is executed, a predetermined application program is executed, or a predetermined browser is executed and a predetermined web page is opened. 如請求項4所述之受控裝置的安全管理方法,其中當執行該安全模式,並執行一預定的應用程式、或執行一預定的瀏覽器並開啟一預定的網頁時,係進一步在執行的預定應用程式中自動輸入資料、或在執行的預定瀏覽器開啟的預定網頁中自動輸入資料。The security management method for a controlled device according to claim 4, wherein when the security mode is executed and a predetermined application is executed, or when a predetermined browser is executed and a predetermined web page is opened, it is further executed. Enter data automatically in a booking application, or in a booking webpage opened by a running booking browser. 如請求項1或2所述之受控裝置的安全管理方法,其中當執行該安全模式時,係執行一預定的應用程式以開啟一資料檔,且進一步自動輸入一開啟密碼資料。The security management method for a controlled device according to claim 1 or 2, wherein when the security mode is executed, a predetermined application program is executed to open a data file, and an opening password data is further automatically inputted. 如請求項1或2所述之受控裝置的安全管理方法,其中當執行該安全模式時,係允許執行特定應用程式、允許執行執行一預定的瀏覽器並開啟一預定的網頁、或允許執行一預定的應用程式以開啟一預定的資料檔。The security management method for a controlled device according to claim 1 or 2, wherein when the security mode is executed, a specific application is allowed to execute, a predetermined browser is allowed to execute and a predetermined web page is opened, or an execution is allowed. A scheduled application to open a scheduled data file. 一種受控裝置,係包含有:一無線連接模組,係與一電子鑰匙裝置進行連線;一處理模組,係連接該無線連接模組,且透過該無線連接模組與該電子鑰匙裝置連線以進行配對;當與該電子鑰匙裝置配對成功時,該處理模組係執行一安全模式;其中:當該受控裝置與該電子鑰匙裝置配對成功時,該處理模組係進一步判斷與該電子鑰匙裝置的連線信號強度是否超過一預設閥值且持續超過一預設時間;當與該電子鑰匙裝置的連線信號強度超過該預設閥值且持續超過該預設時間時,該處理模組執行該安全模式;該處理模組係透過該無線連接模組接收該電子鑰匙裝置感測並回傳的連線信號強度及持續時間,並根據該電子鑰匙裝置感測並回傳的連線信號強度及持續時間,判斷連線信號強度是否超過該預設閥值且持續超過該預設時間。A controlled device includes: a wireless connection module for connecting with an electronic key device; and a processing module for connecting with the wireless connection module and communicates with the electronic key device through the wireless connection module. Connect for pairing; when paired with the electronic key device, the processing module executes a security mode; where: when the controlled device and the electronic key device are successfully paired, the processing module further determines Whether the strength of the connection signal of the electronic key device exceeds a preset threshold and continues for more than a preset time; when the strength of the connection signal with the electronic key device exceeds the preset threshold and continues to exceed the preset time, The processing module executes the security mode; the processing module receives the strength and duration of the connection signal sensed and returned by the electronic key device through the wireless connection module, and senses and returns the signal according to the electronic key device. The strength and duration of the connection signal determine whether the strength of the connection signal exceeds the preset threshold and continues to exceed the preset time. 如請求項8所述之受控裝置,其中:該處理模組係先判斷使否與一鑰匙裝置電連接;當與該鑰匙裝置電連接時,該處理模組直接執行該安全模式;當未與該鑰匙裝置電連接時,該處理模組透過該無線連接模組與該電子鑰匙裝置連線以進行配對。The controlled device according to claim 8, wherein: the processing module first determines whether to electrically connect with a key device; when electrically connected with the key device, the processing module directly executes the security mode; when not When electrically connected with the key device, the processing module is connected to the electronic key device through the wireless connection module for pairing. 如請求項8或9所述之受控裝置,其中當該處理模組執行該安全模式時,係登入該受控裝置的作業系統。The controlled device according to claim 8 or 9, wherein when the processing module executes the security mode, it is logged into the operating system of the controlled device. 如請求項8或9所述之受控裝置,其中當該處理模組執行該安全模式時,係執行一預定的應用程式、或執行一預定的瀏覽器並開啟一預定的網頁。The controlled device according to claim 8 or 9, wherein when the processing module executes the security mode, a predetermined application program is executed, or a predetermined browser is executed and a predetermined web page is opened. 如請求項11所述之受控裝置,其中當該處理模組執行該安全模式,並執行一預定的應用程式、或執行一預定的瀏覽器並開啟一預定的網頁時,該處理模組係進一步在執行的預定應用程式中自動輸入資料、或在執行的預定瀏覽器開啟的預定網頁中自動輸入資料。The controlled device according to claim 11, wherein when the processing module executes the security mode and executes a predetermined application program, or executes a predetermined browser and opens a predetermined web page, the processing module is Further, the data is automatically entered in the executed scheduled application, or the scheduled web page opened by the executed scheduled browser. 如請求項12所述之受控裝置,係進一步包含有:一儲存模組,儲存有上述該處理模組在該預定應用程式中自動輸入的資料、或在該預定瀏覽器開啟的預定網頁中自動輸入的資料;其中當該處理模組在執行的預定應用程式中自動輸入資料、或在執行的預定瀏覽器開啟的預定網頁中自動輸入資料時,係自該儲存模組讀取在該預定應用程式中自動輸入的資料、或在該預定瀏覽器開啟的預定網頁中自動輸入的資料,並自動輸入資料。The controlled device according to claim 12, further comprising: a storage module storing the data automatically entered by the processing module in the predetermined application program, or in a predetermined web page opened by the predetermined browser. Automatically entered data; when the processing module automatically enters data in a predetermined application that is executed, or automatically enters data in a predetermined web page opened by the executed predetermined browser, the data is read from the storage module in the predetermined Automatically entered data in the application, or automatically entered in a predetermined web page opened by the predetermined browser, and automatically entered the data. 如請求項12所述之受控裝置,其中:當該處理模組在執行的預定應用程式中自動輸入資料、或在執行的預定瀏覽器開啟的預定網頁中自動輸入資料時,係由該處理模組透過該無線傳輸模組接收來自該電子鑰匙裝置中儲存的資料,並自動輸入資料。The controlled device according to claim 12, wherein when the processing module automatically enters data in a predetermined application program that is executed or automatically enters data in a predetermined web page opened by the executed predetermined browser, the processing is performed by the processing module. The module receives data stored in the electronic key device through the wireless transmission module, and automatically inputs the data. 如請求項8或9所述之受控裝置,其中當該處理模組執行該安全模式時,該處理模組執行一預定的應用程式以開啟該資料檔,且進一步自動輸入一開啟密碼資料。The controlled device according to claim 8 or 9, wherein when the processing module executes the security mode, the processing module executes a predetermined application program to open the data file, and further automatically enters an opening password data. 如請求項8或9所述之受控裝置,其中當該處理模組執行該安全模式時,係允許執行特定應用程式、允許執行執行一預定的瀏覽器並開啟一預定的網頁、或允許執行一預定的應用程式以開啟一預定的資料檔。The controlled device according to claim 8 or 9, wherein when the processing module executes the security mode, it allows execution of a specific application, execution of a predetermined browser and opening of a predetermined webpage, or execution of A scheduled application to open a scheduled data file.
TW106117137A 2017-05-24 2017-05-24 Controlled device and safety management method thereof TWI632481B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
TW106117137A TWI632481B (en) 2017-05-24 2017-05-24 Controlled device and safety management method thereof
CN201710508496.7A CN109246703A (en) 2017-05-24 2017-06-28 Controlled device and safety management method thereof
US15/983,845 US10706172B2 (en) 2017-05-24 2018-05-18 Controlled device, security management method, and security management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW106117137A TWI632481B (en) 2017-05-24 2017-05-24 Controlled device and safety management method thereof

Publications (2)

Publication Number Publication Date
TWI632481B true TWI632481B (en) 2018-08-11
TW201901509A TW201901509A (en) 2019-01-01

Family

ID=63959686

Family Applications (1)

Application Number Title Priority Date Filing Date
TW106117137A TWI632481B (en) 2017-05-24 2017-05-24 Controlled device and safety management method thereof

Country Status (2)

Country Link
CN (1) CN109246703A (en)
TW (1) TWI632481B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200425697A (en) * 2003-04-25 2004-11-16 American Express Travel Relate Secure messaging center
US20110210830A1 (en) * 2010-02-26 2011-09-01 Gm Global Technology Operations, Inc. Simplified vehicle bluetooth pairing employing near field communication tags
CN102722668A (en) * 2012-05-28 2012-10-10 东南大学 Wireless safety computer lock and using method thereof
CN103795582A (en) * 2012-10-30 2014-05-14 上海今日在线科技发展有限公司 Test method realized based on cloud service platform
CN106600794A (en) * 2016-12-28 2017-04-26 深圳市正拓盛世精密设备有限公司 Intelligent Bluetooth electronic lock

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102314352A (en) * 2010-06-30 2012-01-11 英业达股份有限公司 Computer system and login and logout method thereof
CN101968843A (en) * 2010-09-21 2011-02-09 东南大学 Computer operation locking device
CN102685090B (en) * 2011-11-16 2014-11-26 北京酷云互动科技有限公司 System login method
CN103124214A (en) * 2011-11-18 2013-05-29 英业达股份有限公司 Identity recognition method and handheld electronic device and communication system using same
CN103324881A (en) * 2012-03-22 2013-09-25 英华达(上海)科技有限公司 System and method for wireless locking and unlocking
JP2014011759A (en) * 2012-07-03 2014-01-20 Sharp Corp Mobile communication system, home base station device, position management device, communication method, and mobile station device
US9445220B2 (en) * 2013-09-06 2016-09-13 Paypal, Inc. Systems and methods for enabling additional devices to check in to bluetooth low energy (BLE) beacons
CN103514392A (en) * 2013-09-24 2014-01-15 亚太宝龙科技(湖南)有限公司 Login authentication device and method of computer operation system
US9619993B2 (en) * 2015-07-27 2017-04-11 Honeywell International Inc. Logging into a system with a bluetooth device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200425697A (en) * 2003-04-25 2004-11-16 American Express Travel Relate Secure messaging center
US20110210830A1 (en) * 2010-02-26 2011-09-01 Gm Global Technology Operations, Inc. Simplified vehicle bluetooth pairing employing near field communication tags
CN102722668A (en) * 2012-05-28 2012-10-10 东南大学 Wireless safety computer lock and using method thereof
CN103795582A (en) * 2012-10-30 2014-05-14 上海今日在线科技发展有限公司 Test method realized based on cloud service platform
CN106600794A (en) * 2016-12-28 2017-04-26 深圳市正拓盛世精密设备有限公司 Intelligent Bluetooth electronic lock

Also Published As

Publication number Publication date
TW201901509A (en) 2019-01-01
CN109246703A (en) 2019-01-18

Similar Documents

Publication Publication Date Title
CN105519038B (en) User input data protection method and system
US10102362B2 (en) Method and system of silent biometric security privacy protection for smart devices
US20170046507A1 (en) Continuous facial recognition for adaptive data restriction
US20230394175A1 (en) Tagging and auditing sensitive information in a database environment
US11455424B2 (en) Tagging and auditing sensitive information in a database environment
US20150332038A1 (en) Secure entry of secrets
US9996682B2 (en) Detecting and preventing illicit use of device
US9292691B1 (en) Systems and methods for protecting users from website security risks using templates
CN109274582A (en) Methods of exhibiting, device, equipment and the storage medium of instant communication information
JP7105495B2 (en) Segmented key authenticator
US9043931B2 (en) USB drive with multiple printed circuit board layers for storing data in a memory
CN106030527A (en) Systems and methods for informing users about applications available for download
US10037518B2 (en) Interception of touch pad events for handling in a secure environment
CN105659247B (en) The proactive Threat Management system of context-aware
US10380377B2 (en) Prevention of shoulder surfing
CN107241328A (en) Electronic equipment method for opening and closing and system
TWI632481B (en) Controlled device and safety management method thereof
US10706172B2 (en) Controlled device, security management method, and security management system
Adra Facing the facts on biometric phone locks: your face and thumb not secure
KR101662944B1 (en) Laptop locking control method
CN111464294B (en) Block chain data extraction method, device and storage medium
Dubey et al. A hybrid authentication system for websites on mobile browsers
Stone Google Glass and Wearable Technology: A New Generation of Security Concerns
Capko Tech Threats to Your Practice.
Perlroth Making the Lives of Cybercriminals and Spies Harder Online.