CN101345622B - Information safety device capable of defining authority of apparatus holder - Google Patents

Information safety device capable of defining authority of apparatus holder Download PDF

Info

Publication number
CN101345622B
CN101345622B CN2007101185787A CN200710118578A CN101345622B CN 101345622 B CN101345622 B CN 101345622B CN 2007101185787 A CN2007101185787 A CN 2007101185787A CN 200710118578 A CN200710118578 A CN 200710118578A CN 101345622 B CN101345622 B CN 101345622B
Authority
CN
China
Prior art keywords
password
user
dynamic password
information safety
static
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2007101185787A
Other languages
Chinese (zh)
Other versions
CN101345622A (en
Inventor
李代甫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING ZEBANON SCIENCE & TECHNOLOGY, INC.
Original Assignee
Beijing Zebanon Science & Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zebanon Science & Technology Co Ltd filed Critical Beijing Zebanon Science & Technology Co Ltd
Priority to CN2007101185787A priority Critical patent/CN101345622B/en
Publication of CN101345622A publication Critical patent/CN101345622A/en
Application granted granted Critical
Publication of CN101345622B publication Critical patent/CN101345622B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

A information safety device capable of defining right of device owner comprising at least a protection area, dynamic cipher generation, display and test unit, static cipher recording and using unit. The device owner can login in device by mode of verifying dynamic cipher and set static cipher which is a credential of following access of user for protection area of the device. The dynamic cipher can be read only by adjacent device owner. The dynamic cipher is prior to static cipher and usage mechanism of dynamic cipher is ever open, which ensure priority of the device owner for accessing the protection area of the device. The device which can be widely used in information safety field can serve as access controller for protecting hard disk and channel controller of network, accomplish routine USBKEY function which is superior in multi-protection for private key of user compared to routine USBKEY.

Description

Information safety device that can defining authority of apparatus holder
Technical field
The present invention relates to field of information security technology, particularly a kind of information safety device that can defining authority of apparatus holder, this device has a wide range of applications in field of information security technology; For example; Can be used as the access controller that hard disk is protected and use, the channel controller that can be used as on the network uses, and also can realize the function of conventional USBKEY; Compare with conventional USBKEY, its advantage is the multiple protective that can realize private key for user.
Background technology
The 19 time " China Internet network state of development statistical report " according to CNNIC (CNNIC) issue shows; By the end of the year 2006, Chinese netizen's up 1.37 hundred million, latest data shows; By in by the end of June, 2007; China netizen up 1.44 hundred million, short 6 months, Chinese netizen's quantity has increased by 7,000,000.Be accompanied by the flourish of network, network information security problem is serious day by day, and miscellaneous virus is walked crosswise on the internet, and a lot of netizens once had the stolen experience of virtual assets.
Do not receive to encroach in order to guard one's interest, the user often selects to use some information safety devices, like USBKEY, and dongle etc.But said in any case safety all is comparatively speaking; When the defence capability of information safety device is strengthened on the hard scheming of Information Security Engineers ground; Hackers are also improving constantly their attacking ability; As through some means, forge user instruction, intercepting user profile, distort user cipher etc., even this with regard to caused information safety device also through regular meeting because Malware invasion and by the situation of Long-distance Control.And general information safety device all need be provided with password, after password is set; Device is carried out the password that subsequent access must be inputed setting; In case the user forgets the password of setting, perhaps device is because by Long-distance Control, and the password of setting is distorted; The user will lose the access control power to device, and be difficult to operate this access control power that regains easily through certain.
Summary of the invention
The purpose of this invention is to provide a kind of information safety device that can defining authority of apparatus holder; Device holder access means has priority; When effectively having solved device and being forgotten Password by Malware Long-distance Control or user, the user loses the problem that the access control of device is not easy to give for change this access control power for the time being.
Information safety device that can defining authority of apparatus holder provided by the present invention comprises: communication interface, and dynamic password generation, demonstration and authentication unit, static password record and use the unit also has at least one protection zone, and non-protection area can be arranged.Device receives after the request unit that imports into from the outside generates the instruction of dynamic password, generate dynamic password and be presented on the device with certain form, for be in device nearby and the device holder that can observe the dynamic password display unit on the device read.The dynamic password that device receives and the demo plant holder imports.Also comprise a static password in the packet of the said dynamic password of transmission that device receives, device is in case said dynamic password is passed through in checking, and this static password of immediate record, this static password promptly become the user carries out subsequent access to the unit protection district authority.
Said static password can be confirmed and memory by the user, imports this static password by the user during each operative installations; Also can produce and encrypt storage by an outside credible program of device, this credible Automatic Program is called this static password during each operative installations, does not need the user to import.
Said dynamic password is more preferential than said static password; Said static password is divulged a secret even is distorted when causing device by Long-distance Control; When perhaps the user forgets said static password; The device holder can be through verifying dynamic password again the mode entering device and reset static password; Old static password became invalid, new static password and became the user unit protection district is carried out the authority of subsequent access this moment, and this is provided with and has guaranteed that the device holder has the power in priority access unit protection district.
In user and the device daily conversation process, the user uses said static password access means protection zone, does not need the simultaneous verification dynamic password; This execution mode is compared with other dynamic password execution mode, has both had the high advantage of dynamic password coefficient of safety concurrently, has overcome dynamic password again and need import, use inconvenient shortcoming repeatedly.
The possessory power of device that the invention has the beneficial effects as follows refinement is installed the possessory portion of the power and can not be adopted technological means protection, and when losing like device, the people who finds device can damage device, can occluding device and the contact in the external world etc.Under these circumstances, we no longer attempt to protect this part power, but allow this part power to exercise separately as device holder's power.Saying further, the present invention has utilized the true power of the intrinsic extraneous access means of blocking-up of device holder, with the priority access power of implement device holder to the unit protection district, promptly clear and definite device holder's power.Be exactly specifically: device is because when being caused device by Long-distance Control by Malware invasion; When perhaps the user forgets Password; The device holder can be through verifying dynamic password again the mode entering device and reset static password, regain access control power to device.
Description of drawings
Fig. 1 is that device assembly connects and the information flow direction sketch map;
Fig. 2 is two permanent logical channel sketch mapes between device and user;
Fig. 3 is that information security mechanism is set up flow chart;
Fig. 4 is when to be device as conventional USBKEY use, and the unit protection district forms sketch map.
Embodiment
Below in conjunction with accompanying drawing information safety device that can defining authority of apparatus holder provided by the present invention is further specified.
As shown in Figure 1, information safety device 1 that can defining authority of apparatus holder provided by the present invention comprises: communication interface 2, device place of safety 3, unit protection district 4.Wherein, device place of safety 3 comprises: dynamic password generation, demonstration and authentication unit 5, static password record and use unit 6; Unit protection district 4 comprises: the key storing unit 7 of rivest, shamir, adelman, other protected storage zone of setting as required can also be arranged, and these memory blocks are provided with access rights, and the talent who only possesses access rights can visit.
It is following that information security mechanism is set up process prescription: device receives after the request unit that imports into from communication interface 2 generates the instruction of dynamic password; Be presented on the device by dynamic password generation, demonstration and authentication unit 5 generation dynamic passwords and with certain form; The device holder reads and imports this dynamic password; The dynamic password of input and a static password are formed a complete packet; This packet is transferred in the device through communication interface 2 after in the outside credible program of device, being sent to the public key encryption of key of the rivest, shamir, adelman in the credible program in device outside with the key storing unit 7 of rivest, shamir, adelman; After dynamic password generation, demonstration and authentication unit 5 receive this encrypted packets; At first use the private key decrypted data packet of the key of the rivest, shamir, adelman that the key storing unit 7 of rivest, shamir, adelman provides, whether the dynamic password that solves of checking is consistent with the dynamic password that device generates then, if the unanimity of checking; The static password that solves in static password record and the use unit 6 immediate record packets, this static password promptly becomes the user carries out subsequent access to the unit protection district authority.
Said static password can be confirmed and memory by the user, imports this static password by the user during each operative installations; Also can produce and encrypt storage by an outside credible program of device, this credible Automatic Program is called this static password during each operative installations, does not need the user to import.
Said dynamic password is more preferential than said static password; Said static password is divulged a secret even is distorted when causing device by Long-distance Control; When perhaps the user forgets said static password; The device holder can be through verifying dynamic password again the mode entering device and reset static password; Old static password became invalid, new static password and became the user unit protection district is carried out the authority of subsequent access this moment, and this is provided with and has guaranteed that the device holder has the power in priority access unit protection district.
In user and the device daily conversation process, the user uses said static password access means protection zone, does not need the simultaneous verification dynamic password; This execution mode is compared with other dynamic password execution mode, has both had the high advantage of dynamic password coefficient of safety concurrently, has overcome dynamic password again and need import, use inconvenient shortcoming repeatedly.
Said dynamic password generation unit can also can pass through the software interface transmitting control commands through button or the switch on the device, controls it and generates dynamic password; Said dynamic password display unit; Can be the device that shows dynamic password by the character string one whole, can be the device that shows dynamic password by character string several times, also can be the device that step-by-step shows dynamic password several times; As showing by turn with indicator light; At this moment install the holder and need read dynamic password by turn, import dynamic password by turn, device is verified dynamic password by turn.
If said dynamic password shows several times; Then the user needs several times dynamic password to be sent to device, and the user sends every part of this dynamic password must add same static password, before complete dynamic password sends and accomplishes; This static password does not allow change; If change is arranged, install that the dynamic password of empirical tests partly cancels, need restart checking.
Said static password can be a password; During the each access means of user protection zone, device at first relatively from install the password that imports into the outside and device the password of record whether consistent, the comparative result unanimity is installed and is just allowed user capture unit protection district.
Said static password can be the key of symmetric encipherment algorithm, like the key of DES algorithm, 3DES algorithm; In the process of user and the daily bi-directional session of device, the data that transmit leg sends are at first used the secret key encryption of symmetric encipherment algorithm, and the recipient receives the secret key decryption of at first using this symmetric encipherment algorithm after the enciphered data.
Said static password can be the PKI and the private key of rivest, shamir, adelman, like the PKI and the private key of RSA Algorithm, ECC algorithm; What write down in the device is the PKI of rivest, shamir, adelman, user memory or what install outside credible program encryption storage is the private key of rivest, shamir, adelman.In the process of user and the daily bi-directional session of device, the data that the user sends to device are at first used the private key signature of said rivest, shamir, adelman, and device at first uses the public key verifications of said rivest, shamir, adelman to sign after receiving signed data; Device sends the public key encryption that data are at first used said rivest, shamir, adelman to the user, and the user at first uses the private key of said rivest, shamir, adelman to decipher after receiving enciphered data.
Said three types of static passwords can make up use as required.
Said communication interface is used for the operational order of transmission user to give device and the operation result of device is transferred to the device outside; Import the instruction of request unit generation dynamic password into, import the transmitted in both directions of data complete data packet, user and the device daily conversation process of dynamic password and static password composition into from installing the outside, all will pass through this communication interface from installing the outside.
Said device place of safety is a static mini system; It does not provide program dynamic updating; The technology that its design and manufacture process even its adopt all receives strict control, because it is made up of a relatively little system, is difficult to embed malicious code; Also be easy to come to light even embed, we think that it is safe.Dynamic password generates and shows all and installing in the place of safety, and the network attack person is difficult to intercept and capture, and only being in device device holder nearby can read; And the generation of dynamic password is at random, and a lot of positions are generally arranged, and the network attack person is difficult to decode through the dictionary attack conjecture, and this has just guaranteed the absolute control of device holder to dynamic password.
Said unit protection district can have a plurality of, and can there be different static passwords each protection zone.
In addition, device can also comprise non-protection area, is used for depositing public documents, and access rights are not set, and anyone can visit these files.
Described credible program is the program of a users to trust, and through close inspection, this program structure is simple before using, and malicious code is difficult to embed, even embed, also is easy to come to light.
The key of the rivest, shamir, adelman of storage can be the device characteristic key in the key storing unit 7 of described rivest, shamir, adelman, the pair of secret keys that enough said device and other device is distinguished that promptly exists in the device; It also can be the pair of secret keys that device generates in addition.The PKI of this key is sent to the device outside, by credible procedure stores.
As shown in Figure 2; For the employment mechanism that guarantees dynamic password is never closed; Have two logical channels that can not close in the device, the data flow in one of them logical channel 8 is from installing the user, and this logical channel is used for sending the PKI of the key of said rivest, shamir, adelman; Data flow in another logical channel 9 is from user's auto levelizer, and this logical channel is used for sending the complete data packet of forming with the dynamic key and the static keys of the public key encryption of the key of the rivest, shamir, adelman of transmission in the logical channel 8.
Wherein, not encrypted, the direct transmission of PKI of the key of the said rivest, shamir, adelman of transmission in the logical channel 8, the recipient need verify the sender; The mode of checking adopts technological means exactly; Through a trust chain; Assurance sends to the corresponding private key of the PKI of key of the outside said rivest, shamir, adelman of device in device, and in other local not backup, guarantees to have only device to decipher with the data of the public key encryption of the key of said rivest, shamir, adelman; Concrete verification mode has a lot; For example: if the corresponding digital certificate of the key of this rivest, shamir, adelman, the user is before the public key encryption data of the key that uses said rivest, shamir, adelman, and whether the digital certificate that the key of the said rivest, shamir, adelman of inspection is corresponding earlier is effective; Device sequence number through checking that this digital certificate comprises confirms whether the corresponding device of key of said rivest, shamir, adelman is the device that we will control then.
Data in the logical channel 9 in the encrypted packets of transmission do not allow change in transmission course; If change is arranged; Decrypting process can not normally carry out, and whole packet is invalid, and this is provided with and can prevents that static password is stolen or is replaced in transmission course.
As shown in Figure 3, be that the angle of device is set out, with the inner mode of describing respectively with the device outside of device, further describe the process that information security mechanism is set up:
A. install the holder and send the instruction (device is outside) that request unit generates dynamic password;
B. device receives the instruction (device is inner) that request unit generates dynamic password;
C. device generates dynamic password and shows (device is inner);
D. install that the holder reads and input unit on the dynamic password that shows, install simultaneously that the holder confirms and memory or credible program generate and store static password (device is outside);
E. dynamic password and static password composition packet is encrypted and is passed to device (device is outside);
F. device receives and decrypted data packet (device is inner);
G. the dynamic password (device is inner) that draws is deciphered in the device checking;
H. dynamic password is through checking, and device recording is deciphered the static password (device is inner) that draws.
Said device has a wide range of applications in field of information security technology, for example:
Said device can be used as the access controller that hard disk is protected and uses; When carrying out this function; The said protected storage zone of setting as required is used for depositing the authority list that all types of user conducts interviews to hard disk; According to this authority list, device can allow the validated user access hard disk, stops disabled user's access hard disk.
The channel controller (being fire compartment wall) that said device can be used as on the network uses; The said protected storage zone of setting as required is used for depositing the access rule tabulation of each network channel break-make of decision when carrying out this function, and according to this access rule tabulation, device scans the all-network communication of inflow and outflow; Forbid the inflow communication of special website; Filtering is attacked, and forbids the outgoing communication of particular port, prevents that internal information from leaking.
As shown in Figure 4, when said device used as conventional USBKEY, the said protected storage zone of setting as required comprised, the arithmetic element that pin sign indicating number memory block, private key memory block, use private key are deciphered or signed.After the user obtains the power of access means protection zone, could verify the pin sign indicating number; The pin sign indicating number is through after verifying, the user could visit the private key memory block; Unit protection pin sign indicating number and private key for user, pin sign indicating number protection private key for user, the advantage of this structure is the multiple protective of having realized private key for user.In some particular application, do not establish the pin sign indicating number, then device is directly protected private key for user.
Purport of the present invention is: through the access right of a static password control to the unit protection district, and this static password can be reseted through dynamic password at any time.Can cooperate a lot of other measures during concrete the realization; As realizing multiple protective to the unit protection district; As long as but implemented measures first mentioned; Promptly control access right, and this static password can be reseted at any time through dynamic password, promptly belong to the protection range of our application the unit protection district through a static password.
In addition, be not made as the information that can not destroy by the device owner, like the device owner and third-party enciphered message, the device holder has the power of whole these information of deletion; When the device owner did not set any information that can not destroy, device the holder can format whole device; This is provided with and has guaranteed the device owner because of losing some crucial row power voucher, as forgets the pin sign indicating number that the unit protection district is provided with, and when lowering one's standard or status to the device holder, still enjoys the power of reuse device, has protected to greatest extent and has installed possessory rights and interests.

Claims (20)

  1. One kind can defining authority of apparatus holder information safety device, it is characterized in that: this device comprises communication interface, dynamic password generation, demonstration and authentication unit, static password record and use the unit also has at least one protection zone; Device receives after the request unit that imports into from the outside generates the instruction of dynamic password; Generate dynamic password and be presented on the device with certain form; For be in device nearby and the device holder that can observe the dynamic password display unit on the device read, device receives and the dynamic password of demo plant holder input, also comprises a static password in the packet of the said dynamic password of transmission that device receives; Device is in case said dynamic password is passed through in checking; This static password of immediate record, this static password promptly become the user unit protection district are carried out the authority of subsequent access, wherein; The user uses said static password access means protection zone, does not need the simultaneous verification dynamic password.
  2. 2. according to claim 1ly can clearly install the information safety device of holder's right, it is characterized in that: said dynamic password is more preferential than said static password; Said static password is divulged a secret even is distorted when causing device by Long-distance Control; When perhaps the user forgets said static password; The device holder through verifying dynamic password again the mode entering device and reset static password, regain the power of access means protection zone; This is provided with and has guaranteed that the device holder has the power in priority access unit protection district.
  3. 3. information safety device that can defining authority of apparatus holder according to claim 1 is characterized in that: said communication interface is used for the operational order of transmission user to give device and the operation result of device is transferred to the device outside; Import the instruction of request unit generation dynamic password into, import the transmitted in both directions of data complete data packet, user and the device daily conversation process of dynamic password and static password composition into from installing the outside, all will pass through this communication interface from installing the outside.
  4. 4. information safety device that can defining authority of apparatus holder according to claim 1, it is characterized in that: said protection zone has a plurality of, and there is different static passwords each protection zone.
  5. 5. information safety device that can defining authority of apparatus holder according to claim 1; It is characterized in that: said static password; A credible program outside by device produces and encrypts storage, and this credible Automatic Program is called this static password during each operative installations, does not need the user to import.
  6. 6. information safety device that can defining authority of apparatus holder according to claim 5; It is characterized in that: said dynamic password display unit; It can be the device that shows dynamic password by the character string one whole; Can be the device that shows dynamic password by character string several times, also can be the device that step-by-step shows dynamic password several times.
  7. 7. information safety device that can defining authority of apparatus holder according to claim 6 is characterized in that: if said dynamic password shows that several times then the user needs several times dynamic password is sent to device; The user sends every part of this dynamic password must add same static password; Before complete dynamic password sent and accomplishes, this static password did not allow change, if change is arranged; Install that the dynamic password of empirical tests partly cancels, need restart checking.
  8. 8. information safety device that can defining authority of apparatus holder according to claim 1, it is characterized in that: also have the key of a pair of rivest, shamir, adelman, the PKI of this key is sent to the device outside, and the private key of this key is stored in device inside; The complete data packet that dynamic password that said device receives and static password are formed is used said public key encryption in the device outside, and it is inner with said private key deciphering to be transferred to device; Data in the packet do not allow change in transmission course, if change is arranged, decrypting process can not normally carry out, and whole packet is invalid, and this is provided with and can prevents that static password is stolen or is replaced in transmission course.
  9. 9. based on the described information safety device that can defining authority of apparatus holder of claim 8; It is characterized in that: the key of said a pair of rivest, shamir, adelman can be the device characteristic key, the pair of secret keys that enough said device and other devices is distinguished that promptly exists in the device; It also can be the pair of secret keys that device generates in addition.
  10. 10. information safety device that can defining authority of apparatus holder according to claim 9; It is characterized in that: for the employment mechanism that guarantees dynamic password is never closed; Have two logical channels that can not close in the device, the data flow in one of them logical channel is from installing the user, and this logical channel is used for sending the PKI of the key of said a pair of rivest, shamir, adelman; Not encrypted, the direct transmission of this PKI, the recipient need verify the sender; Data flow in another logical channel is from user's auto levelizer, and this logical channel is used for sending the complete data packet of forming with the dynamic key of the public key encryption of the password of said a pair of rivest, shamir, adelman and static keys.
  11. 11. information safety device that can defining authority of apparatus holder according to claim 10; It is characterized in that: said " recipient need verify the sender "; Promptly through a trust chain; The private key of PKI pairing of key that guarantees the said a pair of rivest, shamir, adelman outside with sending to device is inner at device, and this private key is in other local not backups, thereby guarantees to have only this device to decipher with the data of the public key encryption of the key of said a pair of rivest, shamir, adelman.
  12. 12. information safety device that can defining authority of apparatus holder according to claim 1, it is characterized in that: said static password can be a password; During the each access means of user protection zone, device at first relatively from install the password that imports into the outside and device the password of record whether consistent, the comparative result unanimity is installed and is just allowed user capture unit protection district.
  13. 13. information safety device that can defining authority of apparatus holder according to claim 1, it is characterized in that: said static password can be the key of symmetric encipherment algorithm, comprises the key of DES algorithm, 3DES algorithm; Also can be the PKI and the private key of rivest, shamir, adelman, comprise the PKI and the private key of RSA Algorithm, ECC algorithm; Said static password can be used for device the user is carried out authentication, also can in the process of device and user conversation, be used for data are carried out encryption and decryption.
  14. 14. according to claim 12 or 13 described information safety devices that can defining authority of apparatus holder, it is characterized in that: said static password makes up use as required.
  15. 15. information safety device that can defining authority of apparatus holder according to claim 1; It is characterized in that: when said device used as the access controller that hard disk is protected, said unit protection district comprised the authority list that all types of user conducts interviews to hard disk.
  16. 16. information safety device that can defining authority of apparatus holder according to claim 1; It is characterized in that: when said device used as the channel controller on the network, said unit protection district comprised the access rule tabulation that determines each network channel break-make.
  17. 17. information safety device that can defining authority of apparatus holder according to claim 1; It is characterized in that: when said device used as conventional USBKEY, said unit protection district comprised the arithmetic element that pin sign indicating number memory block, private key memory block, use private key are deciphered or signed.
  18. 18. information safety device that can defining authority of apparatus holder according to claim 17 is characterized in that: after the user obtains the power of access means protection zone, could verify the pin sign indicating number; The pin sign indicating number is through after verifying, the user could visit the private key memory block; Unit protection pin sign indicating number and private key for user, pin sign indicating number protection private key for user, the advantage of this structure is the multiple protective of having realized private key for user.
  19. 19. information safety device that can defining authority of apparatus holder according to claim 17; It is characterized in that: when said device uses as conventional USBKEY; In some particular application; Do not establish the pin sign indicating number, said unit protection district comprises private key memory block, the arithmetic element of using private key to decipher or sign.
  20. 20. information safety device that can defining authority of apparatus holder according to claim 1 is characterized in that: be not made as the information that can not destroy by the device owner, the device holder has the power of whole these information of deletion; When the device owner did not set any information that can not destroy, device the holder can format whole device.
CN2007101185787A 2007-07-10 2007-07-10 Information safety device capable of defining authority of apparatus holder Expired - Fee Related CN101345622B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007101185787A CN101345622B (en) 2007-07-10 2007-07-10 Information safety device capable of defining authority of apparatus holder

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007101185787A CN101345622B (en) 2007-07-10 2007-07-10 Information safety device capable of defining authority of apparatus holder

Publications (2)

Publication Number Publication Date
CN101345622A CN101345622A (en) 2009-01-14
CN101345622B true CN101345622B (en) 2012-07-25

Family

ID=40247519

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007101185787A Expired - Fee Related CN101345622B (en) 2007-07-10 2007-07-10 Information safety device capable of defining authority of apparatus holder

Country Status (1)

Country Link
CN (1) CN101345622B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103428000A (en) * 2013-08-27 2013-12-04 深圳市文鼎创数据科技有限公司 Information authentication method and system
US10666642B2 (en) * 2016-02-26 2020-05-26 Ca, Inc. System and method for service assisted mobile pairing of password-less computer login

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1359487A (en) * 1998-09-17 2002-07-17 英戴克系统公司 Apparatus and methods for unlocking password protected software systems to recover master password
CN1650568A (en) * 2002-05-06 2005-08-03 汤姆森特许公司 Hand-held device forgotten password notification

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1359487A (en) * 1998-09-17 2002-07-17 英戴克系统公司 Apparatus and methods for unlocking password protected software systems to recover master password
CN1650568A (en) * 2002-05-06 2005-08-03 汤姆森特许公司 Hand-held device forgotten password notification

Also Published As

Publication number Publication date
CN101345622A (en) 2009-01-14

Similar Documents

Publication Publication Date Title
Ye et al. Security analysis of Internet-of-Things: A case study of august smart lock
Landman Managing smart phone security risks
Mohamed et al. Android vs iOS security: A comparative study
US20100275265A1 (en) System for securing transactions across insecure networks
CN108418691A (en) Dynamic network identity identifying method based on SGX
US9177165B2 (en) System and method for a secure environment that authenticates secure data handling to the user
CN102063592A (en) Credible platform and method for controlling hardware equipment by using same
Lee et al. Reverse‐safe authentication protocol for secure USB memories
CN103930899A (en) A method for managing public and private data input at a device
US11677546B2 (en) Methods and systems of securely transferring data
WO2008053279A1 (en) Logging on a user device to a server
CN117040741A (en) Method and device for safely transmitting data based on FTTR networking mode
KR101042234B1 (en) Method for protecting from unauthorized reading a classified digital document using location authentication in client document protection program
CN101345622B (en) Information safety device capable of defining authority of apparatus holder
CN103164661A (en) Device and method used for managing data in terminal
KR101262844B1 (en) Apparatus for relaying remote meter data for controlling network access and method thereof
KR101318668B1 (en) Portable memory card having information security function
CN109600397A (en) A kind of network security monitoring and managing method
Dictionary Cybersecurity
Shahbazov NAVIGATING THE 5G SECURITY LANDSCAPE: REGULATIONS, TECHNOLOGIES, AND FUTURE CHALLENGES
KR100782695B1 (en) Device of security and authentication for remote access to process control system and method of the same
KR20080042582A (en) System and method for protecting a user device using a token device
Bwalya et al. A Security Framework for Mobile Application Systems: Case of Android Applications.
CN109818738A (en) A kind of terminal safe logging method
CN202177903U (en) Trusted platform with control function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: BEIJING ZEBANON SCIENCE + TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: LI DAIFU

Effective date: 20110512

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100096 BEIJING ZEBANON S + T LTD., TOWER B, NO. 31, JIANCAILU WEST ROAD, XISANQI, HAIDIAN DISTRICT, BEIJING TO: 100096 TOWER B, NO. 31, JIANCAICHENG WEST ROAD, XISANQI, HAIDIAN DISTRICT, BEIJING

TA01 Transfer of patent application right

Effective date of registration: 20110512

Address after: 100096, B, building 31, Chengxi Road, Xisanqi, Haidian District, Beijing

Applicant after: Beijing Zebanon Science & Technology Co., Ltd.

Address before: 100096, Beijing, Xisanqi, Haidian District building materials Road West No. 31 B block, Beijing Purple Dragon technology limited liability company

Applicant before: Li Daifu

C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: BEIJING ZEBANON SCIENCE + TECHNOLOGY, INC.

Free format text: FORMER NAME: BEIJING ZEBANON SCIENCE + TECHNOLOGY CO., LTD.

CP01 Change in the name or title of a patent holder

Address after: 100096, B, building 31, Chengxi Road, Xisanqi, Haidian District, Beijing

Patentee after: BEIJING ZEBANON SCIENCE & TECHNOLOGY, INC.

Address before: 100096, B, building 31, Chengxi Road, Xisanqi, Haidian District, Beijing

Patentee before: Beijing Zebanon Science & Technology Co., Ltd.

CP01 Change in the name or title of a patent holder
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120725

Termination date: 20180710

CF01 Termination of patent right due to non-payment of annual fee