CN107801146A - A kind of information security control method - Google Patents

A kind of information security control method Download PDF

Info

Publication number
CN107801146A
CN107801146A CN201710349906.8A CN201710349906A CN107801146A CN 107801146 A CN107801146 A CN 107801146A CN 201710349906 A CN201710349906 A CN 201710349906A CN 107801146 A CN107801146 A CN 107801146A
Authority
CN
China
Prior art keywords
security control
control
location
information
attribute
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710349906.8A
Other languages
Chinese (zh)
Other versions
CN107801146B (en
Inventor
胡志成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201710349906.8A priority Critical patent/CN107801146B/en
Publication of CN107801146A publication Critical patent/CN107801146A/en
Application granted granted Critical
Publication of CN107801146B publication Critical patent/CN107801146B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location

Abstract

A kind of information security control method passes through geospatial location attribute and its setting and the safety control standed of building up an information system, realize to mobile network information system and its software of carrying because safety problem caused by its geographical position dynamic change carries out effective risk prevention or actual time safety controls, and realized by shared effective removable communication intelligent terminal real-time geographic locus attribute mode and actual time safety control is carried out to non mobility intelligent communication terminal or the intelligent communication terminal for not possessing wireless position alignment system.This method effectively solves the problems, such as that current internet network information exchanges existing geospatial location real time information missing during response and movable termination change in location or hiding causes social safety cost too high, it can be widely used in intelligent terminal information system, bank card and other means of payment, the security control of Email, automatic driving vehicle mobile security controls, machine finish control etc..

Description

A kind of information security control method
Technical field
The present invention relates to a kind of information security control method.
Background technology
Mobile communication network operator is responsible for the virtual cyberspace of the non-geographic such as SIM card number and chip string number at present Location status management, removable intelligent terminal production firm are responsible for built-in IMEI codes, the ICCID code administrations of equipment, Either router vendors are responsible for virtual network IP address or IPV4 addresses, WLAN MAC LAWN local area wireless networks to Virtual network operator The management of network space address, the digital coding shape of the various equipment of self-test status display after removable communicating terminal is started shooting at present State, real-time geographical locations information is not shown, for example WLAN MAC local area wireless networks address is wireless router manufacturer The unique identification code fired before dispatching from the factory, the cyberspace IP or IPV4 addresses of display are the networks of Virtual network operator distribution Code address, the SIM card number of display and string number etc. are the communication numbers of telecom operators' distribution, do not represent geographical space position Put.Respective production and fortune due to telecom operators, Virtual network operator and intelligent terminal and wireless router manufacturer The independence of battalion, by live collaboration and association relevant hardware devices uniqueness and position place uniqueness can not be traced, caused Removable intelligent communication terminal and its software of carrying can not be residing for automatic identification geospatial location, itself detection and in real time Judge that the method for position safe condition is in blind area, geographical location information be present and be hidden, information is exchanged and related in answering And real-time geographic locus attribute information there is also missing.Due to the event of any objective reality and the safety problem of things With locus attribute and time attribute, therefore current information system can not be by setting geospatial location safe in advance Control condition carrys out Monitoring and forecasting system in real-time change in location and brings potential safety hazard, can not also take necessary geographical position real-time in time Control measure solve the problems, such as the real time position attribute missing of corresponding system safety.
The geographical space of removable intelligent communication terminal is generally traced by externally hung software progress complicated calculations mode at present Position details, substantial amounts of intelligent communication terminal running memory physical space is occupied, the use that may move intelligent communication terminal is used The program and software that family and intelligent terminal carry(Containing APP)Experiencer resources untilization be present with configuring unfair problem.Software Shop examines that not in place or no standard can follow to the software security that correlation is carried, and deliberately hiding online transaction be present and relates to And transaction agent or commodity geospatial location, do not do binding to network participant or related resource and participate in business Related unique device, also verification geospatial location is not moved and changed in locational space condition caused by information security in real time The safety problem of change, the program carried using user and intelligent terminal and software to may move intelligent communication terminal(Contain APP)Experiencer for, major safety risks be present.
The content of the invention
In order to solve the above-mentioned technical problem, the present invention seeks to:There is provided it is a kind of based on the real-time location tracking in geographical position and A kind of information security control of the removable communicating terminal system security controls extremely application software of geographical location information safety check Method processed.
The technical solution adopted in the present invention is:The geospatial location that builds up an information system attribute and its security control mark It is accurate:Comprising be not only limited to intelligent communication terminal information system software in itself with its carrying application software and software elements The involved characteristic attribute related to geospatial location.The geospatial location attribute definition of information system is included simultaneously It is not limited to:Space coordinates type(Including being not limited merely to plane coordinates, WGS-84 geodetic coordinates or other relative seats Mark), locus, non-space critical data, temporal signatures, to system or software and its key element(Including physical material or Person's event, virtual substance or event)Implement control safety condition and control measure, allow measurement error etc..
Build up an information system geographical space position attribution special physical store and data exchange and computing formulate it is special The method of the standard of door, including be not limited merely to:It is related to and geographical space bit is set in information system hardware core IC levels chip Put the special physical storage location of attribute and be related to storage, computing and data clearing house and set up standard convention;It can pass through Software directly reads the position attribution data of the physical bottom geographical space of system hardware IC levels, solves Current GIS Software amount of calculation is heavy and the method and standard of memory data output;By the position tracking physical module to wireless location system with Information system hardcore IC level modules take the physical system integration, or carry out related hardware the encapsulation of IC level assemblies, real Now to the method for geospatial location attribute real-time physical verification;It is integrated in unrealized IC levels geospatial location attribute function Before, geospatial location attribute is stored by loading specialized security control software outside system data layer and computing and The method of control.
After removable communication intelligent terminal acquisition real-time geographic locus attribute can be first passed through, then pass through wired connection Or allow site error near radio to read and share the CPU strings number and cyberspace IP of binding non mobility communicating terminal (IPV4 etc.)The non-space key element data such as address, obtain in real time and share bound removable communication intelligent terminal geographic The method of locus attribute, realize to non mobility intelligent communication terminal or do not possess the intelligence of wireless position alignment system The system of communicating terminal carries out the position attribution security control of geographical space.
A kind of information security control method, including:Concrete operation step is as follows:
1)Uniqueness non-space key element is bound and set.Start and carry wireless position alignment system(Comprising being not only limited to Satellite fix, laser, radar, infrared ray and other network active locations)Removable communicating terminal geospatial location category Property control program or special safety software, by associate the unique identification sequence number of removable communicating terminal, SIM card number and its ICCID strings number and wireless network address coding(MAC codes or IPV4 codes), automatically generate(Communication card, intelligent terminal and network are set Standby identification code)Uniqueness non-space key element, and preserve setting;
2)The position attribution data, control locality condition and home control measure for reading the geographical space of control object are set Put.The position attribution data of current geographic position are automatically imported by wireless location system and GIS-Geographic Information System, control is set Object can normal operation geographical space position attribution security control locality condition, geographical temporal signatures are set, peace is set Measurement error is allowed in all positon control measure, setting, and can implement electronic map location encryption so that subsequent amendments initially belong to Property set;
3)It is again started up or after equipment is moved, position attribution control program or special safety control software automatic detection Wireless location system whether normal operation, in real time read uniqueness non-space key element simultaneously verify setting data, to current position The position attribution data for managing space carry out the locality condition of positional attribute security control, and monitor current geographic locus Whether attribute data, which is in, is allowed in the range of measurement error, is determined whether to start home control measure according to the result;
4)After geospatial location attribute and its security control locality condition are proved to be successful, may move communicating terminal system or its The application software of carrying can be run according to the condition of setting.Deviation position attribute security control occurs for authentication failed, current location Locality condition, just start home control measure according to home control measure, according to different skew numerical quantities or The requirement of person's temporal signatures, position attribution security control program corresponding to startup(Special safety control software)To other safety of system Control program or the execution security control program to other application software, implement system automatic early-warning or take other safety Control measure;
5)It after authentication failed, can be decrypted by electronic map location, import geospatial location attribute data and again again The locality condition and home control measure of set location attribute security control;
6)After removable communication intelligent terminal acquisition real-time geographic locus property location data can be first passed through, then by having Line connect or closely(Allow in the range of errors in position measurement)It is wireless to read and share binding non mobility communicating terminal CPU strings number and cyberspace IP(IPV4 etc.)The non-space critical data such as address, realize that mobile intelligent terminal and non mobility lead to Terminal synchronization shuangping san control program is interrogated, the removable communication intelligent terminal bound in non-moving intelligent terminal Real-Time Sharing Reason locus attribute data simultaneously binds the cyberspace IP of non-moving intelligent communication terminal(IPV4)Address and host CPU string Number, carry out ground to the system of non mobility intelligent communication terminal or the intelligent communication terminal for not possessing wireless position alignment system Manage the position attribution security control in space.
Further, described location positioning system includes satellite positioning information system(GPS, GLONASS, the Big Dipper, Jia Li Slightly etc.), the positioning of mobile operator base station location, the MAC network address position positioning of WLAN, laser, microwave radar Either wireless location or the trace mode such as infrared ray positioning, the positioning of magnetic nail, magnetic stripe positioning or hybrid wireless location technology.
Further, uniqueness non-space key element refers to that mobile communication card number and its chip string number, communicating terminal lead to The neck number of news and CPU ICCID strings number, and(It is mobile)Network address encodes or device coding, that is, communicating terminal Three kinds of fuselage, wireless communication card and the network equipment key features have the key mark code of uniqueness.
Further, described geospatial location attribute is verified as to uniqueness non-space key element and geographical space Position attribution data and its temporal signatures carry out real-time school with the locality condition content of position attribution security control set Test judgement.According to change in location condition, the logic decision of safe condition be made whether.
Further, a kind of described home control measure refer to ensure control object because caused by change in location The home control measure that potential safety hazard is taken, according to position offset and temporal signatures requirement, preferential perform ensures position Put the information security control method of security control program, it is characterised in that and described automatic early-warning is not limited only to, or terminate The system program operation of control object, or concurrently delivered newspaper alarm to parties concerned's automatic early-warning as desired by internet Text, either start control program and realize physical destruction specified database or preferentially start the software of other security controls, or Other control programs of person.
Further, described GIS-Geographic Information System is retrospective electronic map version and is labeled with drawing version date Electronic map and its temporal signatures database.
Further, it is described can normal operation position attribution security control locality condition can with and be not only included as The geospatial location of initial alignment or the manual selected finger on the loading electronic map of the GIS-Geographic Information System of association Position fixing point or the set for selecting 1-N locus coordinate points manually.
Further, the encryption of described implementation electronic map location refers to any geography information for clicking on association as needed 1-N cryptographic element spatial coordinate location of the electronic map of system loads, and set and reasonably allow measurement error scope, lead to Cross electronic map coordinates point position and implement encryption.Implementing electronic position encryption can select to be identified through sequence type or combined Mode click coordinate point is encrypted, that is, sorts or be combined the data for clicking on electronic map any 1-N by priority The mode of coordinate points implements encryption work(to the locality condition for importing initial geospatial location attribute and position attribution security control Energy.Sortord should take order to click on correct coordinates point position and be encrypted, and combination encryption can in no particular order sequentially Click coordinate point is encrypted.Implement electronic position decryption to be taken sequence or combination to click on electronic map during corresponding encrypt The mode of the data coordinates point of 1-N is to the initial geospatial location attribute data of setting and the position of position attribution security control Condition implements decryption, and decrypting the locus of the coordinate points of click should allow in the range of measurement error.Sortord should be taken Order is clicked on correct coordinates point position and is unlocked, and combination encryption order click coordinate point can unlock in no particular order.
The real geographical location information of communicating terminal may move by real-time tracing and verify the safe operation with pre-setting Condition, Real time identification may move the environment of communicating terminal system and software security operation and bind communication terminal IMEI strings number And address card SIM card number and verify advance information, removable communicating terminal can be widely used in and its carry application program Dynamic position security context control, especially through carry out geographical position encryption technology, establish communication terminal take precautions against information The geographical position control condition of leakage, greatly improved with general geographical static encryption and verification mode level of security, by right IMEI strings number and the binding of SIM communication cards uniqueness are communicated, can further improve the authenticity and uniqueness of verification.The controlling party Method can be widely used in including bank card, Third-party payment instrument, important degree of secrecy document files or extended formatting file, APP websites account management etc. can take geography information security context to set.
Brief description of the drawings
Fig. 1 is block diagram of the present invention.
Fig. 2 is fundamental diagram of the present invention.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, the present invention is entered below in conjunction with accompanying drawing Row is further described.It should be appreciated that embodiment described herein is not used to only to explain the present invention Limit the present invention.
A kind of information security control method:By the unique identification string code IMEI for associating removable communication apparatus in advance (International Mobile Equipment Identity)String number and SIM card number, communication terminal system is set (Containing system from tape program)Can normal operation geographical position condition(The coordinate points or delineation point on electronic map specified Range of convergence or three-dimensional map)With set with the range of allowable error condition of specified coordinate point relative position, through reality When read the unique IMEI strings number and SIM card number of the communication terminal, and verify and whether meet the uniqueness that associates in advance and set Put condition, automatic detection may move communication apparatus position location tracking system whether normal operation, real-time location tracking monitoring Removable communicating terminal current geographic position result is in be set in the range of safety value in advance(Containing admissible error), movable termination Its own system program and the application software that carries of movable termination can normal operations.Otherwise, according to needs are pre-set, carry out To system(Or carry application software)Automatic early-warning, or the system for terminating movable termination(Or application software and electronics Document)Operation, either concurrently deliver newspaper and warning message or carry out automatic to parties concerned's automatic early-warning as desired by internet Thoroughly destroy communication terminal system or application software(Database).
The map encryption method that control function is set:1-N cryptographic element of the electronic map of association can arbitrarily be clicked on Coordinate position simultaneously sets rational position range of allowable error, can be identified through 1-N by sequence type or combined mode Control function encryption is implemented in individual electronic map coordinates point encryption.
Release the map encryption method that control function is set:1-N coordinate points position of associated electronic map is clicked on, In the range of allowable error of Ying Yu cryptographic element coordinate points relative positions, sequence type should take order to click on correct coordinates and click through Row unblock, combination encryption can sequentially click on unblock in no particular order.
Automatic early-warning mode:Carry loudspeaker broadcast, send automatically to specified mailbox early warning either alarm mail or to Assigning remote terminal sends early warning or alarm criteria message.
Location tracking system includes the satellite positioning information systems such as GPS, GLONASS, the Big Dipper, Galileo and mobile communication is public Take charge of base station location location information and wifi position location information trace modes.
Geographical position refer to can retroactively plate sheet and be labeled with draw version date digital map library.
Application software of the present invention include bank card payment software, Third-party payment tool software, document files or Extended formatting file, APP websites account can be set geographical security context and set.Can be plug-in outside software by extraordinary software Loading Control program mode (PM) implements control.The master chip that the method can also be fabricated to removable communication apparatus by the present invention adds Function, solid-state implantation communication terminal hardware realize real-time geographic state tracking to may move communicating terminal and verification and right Information security environment automatic tracing and the verification of position safety condition of application software are carried, realizes the work(of information position security control Energy;Binding currently removable communication apparatus can also be selected by certain programmed software, to selected mobile system APP with soft The part either e-file of allocation position attribute or the control of Email actual time safety.
Specific embodiment 1:
Zhang Xiaojun classmates set Alipay software only to limit place of operation inside the setting of geography information control function in advance(Point map Hit the students' dormitory of Xiamen University lotus 1)Run in the range of 500 meters of Select Error scope, it is hiding that setting, which controls geography information,.Knot Fruit Zhang Xiaojun mobile phones are lost in Xiamen railway station, and the Alipay small amount on its mobile phone is without under the payable setting situation of password, Ren Ran The stolen brush of Alipay account can be prevented.
Specific embodiment 2:
In mobile phone, my personal photos folder has privacy photo to Liu, and he is set inside geography information control is set in advance My photos folder only limits place of operation(Map clicks on the ring East Sea, Xiamen domain medium line somewhere)200 meters of error range, set It is hiding to control geography information, and Liu's mobile phone imprudence screen crushes, and can trust to send mobile phone and repair, not fear photographic intelligence and let out Dew.
Specific embodiment 3:
Certain company's core business building development plan secret storage is in the laptop computer with mobile communication function, in the hand-held electric Brain system geography information control function is set:System operation place only limits(Click on the warp of three-dimensional map Xiamen City lakeside North Road 72 Latitude, 67 meters of height above sea level)10 meters of error range, doomsday laptop computer is stolen, and certain company does not have to concern that the computerized information is revealed.
Specific embodiment 4:
The advance geography information control function of Zhang sets the inside to set and releases set-up site(It is big to click on map Xiamen railway police section Door)30 meters of error precision, without reality in place), Alipay place of operation is changed, inside the setting of geography information control function Set and release control(Click on map Xiamen railway police section gate), reset:Alipay running environment, not by real-time geographic Position controls.So Zhang can use Alipay software whenever and wherever possible.
Specific embodiment 5:
A kind of e-mail system with the checking of geographical position postmark and the security control of Email locus.Email Sender, addressee is both needed to by position attribution certification:Shift to an earlier date associated configuration by position attribution security control program to defend Unique identification string code IMEI strings number, the SIM wireless communication cards ICCID strings of the removable intelligent communication equipment of star position system function Number and mobile communication card number, realize that intelligent communication terminal associates with mobile communication module global uniqueness, formed there is uniqueness Non-space key element;The initial WGS84 for reading the communication terminal automatically by program startup global position system is sat Mark, selection all temporal characteristics of temporal signatures are constant, and initial position attribute definition is by APP softwares:WGS84 coordinates, coordinate value, Non-space key element(IMEI string ICCID string mobile communication numbers), all temporal signatures values are consistent;Initial position is special Levying attribute, setting completed, and initial characteristicses attribute is stored in the integrated CPU of communication terminal specified bottom by system automatically Physical storage locations(It is stored in externally hung software database).Sender selects e-mail sending formula:According to position attribution Verification in real time sends, receives reading and receipt.Sender sets recipient email's system normally to read in mailing system The space-time condition of the corresponding position attribution of transmitted mail.Sender clicks on consignee location's attribute and confirms mail can be read Position:A coordinate points are selected on specified electronic map(Or the range of convergence or three-dimensional map of delineation point), Setting allows measurement error range of condition with specified coordinate point relative position:30 meters(Citing), the selection of control time condition:Postal After part is sent in the stipulated time.
E-mail system position attribution control measure:Mailing system detect sender's global position system normal operation or Person's non-space key element is normal, and sender can send mail, and mailing system is capped ELECTRONIC POSTMARK and indicates hair automatically after transmission Date and time is sent, Email sends position place and allows measurement error scope.
Recipient email's system detectio is abnormal less than global position system normal operation or non-space key element Or position attribution does not meet the addressee that sender is set and allows to open the temporal signatures of mail, the mail can not be opened, together When e-mail system send receipt the self-test reason of mail can not be opened to sender addressee.Eligible, addressee beats While opening mail, e-mail system sends capping ELECTRONIC POSTMARK and indicates date and time and the place that addressee reads automatically And allow errors in position measurement scope, realize the mail security transmission between directional space.The mailing system can be by can Mobility intelligent terminal sends and receives, and can not also possess by non mobility communicating terminal or wireless position alignment system Intelligent communication terminal send or receive.Mail user send or receive by non mobility communicating terminal mail it Before, after removable communication intelligent terminal acquisition real-time geographic locus attribute can be first passed through, permitted in defined temporal characteristics Can under the conditions of(Such as 60 seconds), by the removable wired reading of communication intelligent terminal or allowing errors in position measurement to allow model Interior near radio is enclosed to read and bind non mobility communicating terminal non-space key element(IP the or IPV4 nets of communicating terminal Network space address, communicating terminal mail mainboard CPU strings number etc.), realize removable communication intelligent terminal geographic space shared in time Position attribution, e-mail system can be by sharing under geospatial location attribute status to non mobility intelligent communication terminal E-mail sender and addressee carry out geospatial location attribute security control, and realize the mail transmission between directional space.
The high precision machine tool that the present invention can be applied in laser positioning further improves control accuracy, can also be applied to Position virtual transponder and the traffic safety control of control vehicle are realized in unmanned security control.
The above embodiments merely illustrate the technical concept and features of the present invention, and its object is to allow person skilled in the art Scholar can understand present disclosure and implement according to this, and it is not intended to limit the scope of the present invention.It is all according to the present invention The equivalent change or modification that Spirit Essence is made, it should all be included within the scope of the present invention.

Claims (6)

1. a kind of information security control method, it is characterised in that including step:
1)Start mobile device:Uniqueness non-space key element is bound and set, and startup is equipped with wireless position alignment system (Comprising being not only limited to satellite fix, laser, radar, infrared ray and other network active locations)Removable communicating terminal Geospatial location property control program or special safety software, by the unique identification sequence for associating removable communicating terminal Number, SIM card number and its ICCID string number and wireless network address coding(MAC codes or IPV4 codes), automatically generate(Communication card, intelligence The identification code of energy terminal and the network equipment)Uniqueness non-space key element, and preserve the setting;
2)Operation equipment:Control program reads the position attribution data, control locality condition and peace of the geographical space of control object All positon control measure;The position attribution number of current geographic position is automatically imported by wireless location system and GIS-Geographic Information System According to, set control object can normal operation geographical space position attribution security control locality condition, geographical time domain is set Feature, home control measure are set, measurement error is allowed in setting, and can implement electronic map location encryption so as to follow-up Initial attribute is revised to set;
3)Be again started up or equipment occur position movement after, position attribution control program or special safety control software are automatic Detect wireless location system whether normal operation, read uniqueness non-space key element in real time and simultaneously verify setting data, to working as The position attribution data of preceding geographical space carry out the locality condition of positional attribute security control, and monitor current geographic space Whether position attribution data, which are in, is allowed in the range of measurement error, determines whether that starting home control arranges according to the result Apply;
4)Operation equipment, input access permission specified coordinate and verified, geospatial location attribute and its security control position After condition Verification success, may move communicating terminal system or its application software carried can run according to the condition of setting;
5)It is proved to be successful equipment operation;The locality condition of deviation position attribute security control occurs for authentication failed, current location, just Start home control measure according to home control measure, will according to different skew numerical quantities or temporal signatures Ask, position attribution security control program corresponding to startup(Special safety control software)To other security control programs of system or Execution security control program to other application software, implement system automatic early-warning or take other safety control measures.
2. a kind of information security control method according to claim 1, it is characterised in that determine tracing system in described position Including the satellite positioning information such as GPS, GLONASS, the Big Dipper, Galileo system and mobile operator base station location location information with And other wireless position location information trace modes.
3. a kind of information security control method according to claim 1, it is characterised in that described uniqueness non-space closes Key key element refers to mobile communication card number and its chip string number, the neck number of communicating terminal communication and CPU ICCID strings number, and (It is mobile)Network address encodes or device coding, that is, three kinds of communicating terminal fuselage, wireless communication card and the network equipment passes Key functional part has the key mark code of uniqueness.
A kind of 4. information security control method according to claim 1, it is characterised in that described geospatial location category Property be verified as to the position attribution data and its temporal signatures of uniqueness non-space key element and geographical space with set position The locality condition content for putting attribute security control carries out verification judgement in real time;According to change in location condition, safety be made whether The logic decision of state.
A kind of 5. information security control method according to claim 1, it is characterised in that it is described can normal operation position Put attribute security control locality condition can with and be not only included as the geospatial location of initial alignment or associating GIS-Geographic Information System loading electronic map on selected specified coordinate point or select 1-N locus coordinate manually manually The set of point.
6. a kind of information security control method according to claim 1, it is characterised in that described automatic early-warning is termination The system operation of movable termination or as desired by internet to parties concerned's automatic early-warning concurrently deliver newspaper warning message, Automatic thoroughly destruction communication terminal system or application software and its database or other security controls are either carried out to arrange Apply.
CN201710349906.8A 2017-05-17 2017-05-17 Information security control method Active CN107801146B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710349906.8A CN107801146B (en) 2017-05-17 2017-05-17 Information security control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710349906.8A CN107801146B (en) 2017-05-17 2017-05-17 Information security control method

Publications (2)

Publication Number Publication Date
CN107801146A true CN107801146A (en) 2018-03-13
CN107801146B CN107801146B (en) 2021-04-20

Family

ID=61531109

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710349906.8A Active CN107801146B (en) 2017-05-17 2017-05-17 Information security control method

Country Status (1)

Country Link
CN (1) CN107801146B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110086952A (en) * 2019-04-21 2019-08-02 林淑云 A kind of security system
CN113382405A (en) * 2021-04-24 2021-09-10 胡志成 Network space information security control method and application
CN113810591A (en) * 2020-06-15 2021-12-17 蘑菇车联信息科技有限公司 High-precision map operating system and cloud platform
CN114158042A (en) * 2021-10-22 2022-03-08 北京连山科技股份有限公司 Method for binding SIM card information and IP address
CN114726592A (en) * 2022-03-21 2022-07-08 中国电信股份有限公司广州分公司 Method, device and equipment for detecting broadband attribute and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120157049A1 (en) * 2010-12-17 2012-06-21 Nichola Eliovits Creating a restricted zone within an operating system
CN104125223A (en) * 2014-07-22 2014-10-29 浪潮电子信息产业股份有限公司 Security defending system for private data of mobile device
CN104717063A (en) * 2013-12-16 2015-06-17 毛秀允 Software security protection method of mobile terminal
CN105989280A (en) * 2015-02-10 2016-10-05 富泰华工业(深圳)有限公司 Application program authority management system, device and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120157049A1 (en) * 2010-12-17 2012-06-21 Nichola Eliovits Creating a restricted zone within an operating system
CN104717063A (en) * 2013-12-16 2015-06-17 毛秀允 Software security protection method of mobile terminal
CN104125223A (en) * 2014-07-22 2014-10-29 浪潮电子信息产业股份有限公司 Security defending system for private data of mobile device
CN105989280A (en) * 2015-02-10 2016-10-05 富泰华工业(深圳)有限公司 Application program authority management system, device and method

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110086952A (en) * 2019-04-21 2019-08-02 林淑云 A kind of security system
CN113810591A (en) * 2020-06-15 2021-12-17 蘑菇车联信息科技有限公司 High-precision map operating system and cloud platform
CN113810591B (en) * 2020-06-15 2023-11-21 蘑菇车联信息科技有限公司 High-precision map operation system and cloud platform
CN113382405A (en) * 2021-04-24 2021-09-10 胡志成 Network space information security control method and application
CN114158042A (en) * 2021-10-22 2022-03-08 北京连山科技股份有限公司 Method for binding SIM card information and IP address
CN114158042B (en) * 2021-10-22 2022-08-26 北京连山科技股份有限公司 Method for binding SIM card information and IP address
CN114726592A (en) * 2022-03-21 2022-07-08 中国电信股份有限公司广州分公司 Method, device and equipment for detecting broadband attribute and storage medium
CN114726592B (en) * 2022-03-21 2024-04-05 中国电信股份有限公司广州分公司 Broadband attribute detection method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN107801146B (en) 2021-04-20

Similar Documents

Publication Publication Date Title
CN107801146A (en) A kind of information security control method
US11741461B2 (en) Method for performing non-repudiation, and payment managing server and user device therefor
KR101509043B1 (en) Implementing method, system of universal card system and smart card
CN106302381A (en) Device authentication
CN109565640A (en) The service based on privately owned position of safety
US9058482B2 (en) Controlling user access to electronic resources without password
DE212015000154U1 (en) System for authenticating a user based on a computing device
CN107154919B (en) Safe login method and device
CN101978675A (en) System and method for securely issuing subscription credentials to communication devices
CN103795798A (en) Mobile phone checking-in method
CN102143492B (en) Method for establishing virtual private network (VPN) connection, mobile terminal and server
CN113168627A (en) Communication network node, method and mobile terminal
CN106102062A (en) A kind of public wireless network cut-in method and device
CN106506161A (en) Method for secret protection and privacy protection device in vehicle communication
CN106796708A (en) Electronic voting system and method
CN106254366A (en) For the identification processing method patrolled and examined, Apparatus and system
CN103152425A (en) Safety management system for mobile device based on cloud technology
CN107528712A (en) The determination of access rights, the access method of the page and device
CN102882682B (en) Based on identity identifying method and the system of GPS
CN102202057A (en) System and method for safely dumping data of mobile memory
CN109559267A (en) Land investigation internet+the means of proof, device, equipment and storage medium
Dang et al. Large-scale invisible attack on AFC systems with NFC-equipped smartphones
CN112478966A (en) Elevator, debugging method, debugging platform and debugging terminal thereof
CN109756469A (en) A kind of public account management method, device and computer readable storage medium
US20210037381A1 (en) Method and System for Authorizing the Communication of a Network Node

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant