CN1976279B - Automatic monitoring and cleaning intelligent key system and working method thereof - Google Patents
Automatic monitoring and cleaning intelligent key system and working method thereof Download PDFInfo
- Publication number
- CN1976279B CN1976279B CN2006101443356A CN200610144335A CN1976279B CN 1976279 B CN1976279 B CN 1976279B CN 2006101443356 A CN2006101443356 A CN 2006101443356A CN 200610144335 A CN200610144335 A CN 200610144335A CN 1976279 B CN1976279 B CN 1976279B
- Authority
- CN
- China
- Prior art keywords
- cipher key
- intelligent cipher
- key equipment
- program
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Storage Device Security (AREA)
- Stored Programmes (AREA)
Abstract
An intelligent key system with automatic-monitoring and automatic-clearing up comprises intelligent cipher key functional module, monitoring module, clearing up module and automatic operation module. The operating method of said intelligent cipher key system is also disclosed.
Description
Technical field
The present invention relates to information security field, the intelligent key system and the method for work thereof of particularly a kind of automatic monitoring and cleaning.
Background technology
Intelligent cipher key equipment is a kind of small hardware device that has processor and memory, and it can be connected with computer by the data communication interface of computer.It has the key systematic function, but and the safe storage key, can preset the cryptographic algorithm function.The computing that intelligent cipher key equipment is relevant with key is carried out in device inside fully.Generally speaking, intelligent cipher key equipment links to each other with computer by USB interface.
Intelligent cipher key equipment is mainly used in network ID authentication, and can digital signature supporting and PKI system, thereby has greatly improved the fail safe and the reliability of authentication.In addition, owing to this type of hardware is difficult to be replicated, so the fail safe of account number just is guaranteed.Simultaneously, the user need not to remember and input account number and password, has simplified user's operation, and is convenient for users to use.
By input PIN (Personal Identity Number) sign indicating number or personal biology characteristics (as fingerprint, palmmprint, vocal print, retina, iris, the shape of face etc.), can verify whether the user is the legal holder of intelligent cipher key equipment.PIN code is stored in the unreadable memory space of intelligent cipher key equipment, so anyone can not read the value of PIN code from this equipment, and the user has only the input correct PIN code could prove its legal identity.Equally, the personal biology characteristics value also is stored in the unreadable memory space of intelligent cipher key equipment, after intelligent cipher key equipment is gathered user's biological information by the physical characteristics collecting unit, itself and the biological characteristic value that prestores are compared, judge with this whether the user has legal identity.
Identity authorization system based on intelligent cipher key equipment mainly contains two kinds of application models: one is based on the certification mode of PKI system, and two are based on the certification mode of impact/response.Asymmetric key mechanisms is present most widely used a kind of Authentication mechanism, and in this mechanism, encryption key and decruption key have nothing in common with each other, and can only decipher with corresponding with it private key with the data of public key encryption.The digital signature of PKI mechanism had both guaranteed the confidentiality of information, guaranteed that again information has non repudiation, its principle is: at first will obtain digital signature expressly with the side's of being verified private key signature, then digital signature is sent to authentication, authentication is verified with the PKI of the side of being verified.
Compare with the certification mode of traditional " usemame/password ", the certification mode of this double factor can be guaranteed the fail safe and the reliability of whole authentication process more effectively.
At present, the CD ROM of USB interface possesses the function of automatic operation on the market, and is very easy to use.Recently, the intelligent cipher key equipment that possesses AutoPlay function also emerges.But the user can keep some relevant informations on the computer after using intelligent cipher key equipment, be unfavorable for protecting user's privacy and information security, and taken unnecessary system space.
Summary of the invention
The present invention provides the intelligent key system and the method for work thereof of a kind of automatic monitoring and cleaning in order to solve privacy of user and the incomplete problem of information safety protection of using intelligent cipher key equipment to bring in the prior art.Described technical scheme is as follows:
The system of a kind of automatic monitoring and cleaning intelligent cipher key equipment relevant information, described system comprises:
Device A: be used to make intelligent cipher key equipment and computer to connect;
Device B: be used to make described intelligent cipher key equipment to start automatic running program;
Device C: be used for making described automatic running program to install or load monitoring program and liquidation procedures to described computer:
Device D: be used to make the described automatic running program described monitoring program of operation automatically;
Device E: be used to make described monitoring program to check whether described intelligent cipher key equipment is connected with described computer disconnection; If call liquidation procedures automatically and clear up the information of leaving over after the described intelligent cipher key equipment operation and from computer, unload described liquidation procedures self; Otherwise, continue to check.
The described information of leaving over comprises install software, load software, cookie record, browser access record or file access information.
The present invention provides the method for work of the intelligent key system of a kind of automatic monitoring and cleaning simultaneously, said method comprising the steps of:
Steps A: intelligent cipher key equipment and computer connect;
Step B: described intelligent cipher key equipment starts automatic running program;
Step C: described automatic running program installation or loading monitoring program and liquidation procedures are in described computer;
Step D: move described monitoring program;
Step e: described monitoring program checks whether described intelligent cipher key equipment is connected with described computer disconnection; If call liquidation procedures automatically and clear up the information of leaving over after the described intelligent cipher key equipment operation and from computer, unload described monitoring program and described liquidation procedures self; Otherwise, continue to check.
The described information of leaving over comprises the install software relevant with intelligent cipher key equipment, load software, cookie record, browser access record or file access information.
The beneficial effect that technical scheme of the present invention is brought is:
The automatic monitoring that the application of the invention provides and the intelligent key system of cleaning and method of work thereof; not only can be greatly user-friendly; also can remove file and the private information left over after the user uses a computer, thus protection user's individual privacy and information security.
Description of drawings
Fig. 1 is a kind of automatic monitoring that provides of the embodiment of the invention 1 and the intelligent key system functional structure chart of cleaning;
Fig. 2 is the method flow diagram of the realization AutoPlay function that provides of the embodiment of the invention 1;
Fig. 3 is the realization that provides of the embodiment of the invention 2 method flow diagram of monitoring and clearing function automatically;
Fig. 4 is the realization that provides of the embodiment of the invention 3 method flow diagram of monitoring and clearing function automatically.
Embodiment
The invention will be further described below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
The invention provides the intelligent key system of a kind of automatic monitoring and cleaning, this system not only has AutoPlay function, can also be connected the follow-up cleaning work of back execution at intelligent cipher key equipment and computer disconnection.Simultaneously, the present invention also provides the method for work of the intelligent key system of a kind of automatic monitoring and cleaning.
Embodiment 1
Referring to Fig. 1, the intelligent key system 10 of a kind of automatic monitoring and cleaning is provided, this system also comprises automatic operation module 101, monitoring module 102 and cleaning module 103 except comprising intelligent key functional module 100.The intelligent key functional module mainly comprises control submodule and sub module stored.
Wherein, after moving module 101 automatically and being used for intelligent cipher key equipment and computer and connecting, carry out AutoPlay function, automatic running program, install software etc.
Monitoring module 102 be used for the monitoring intelligent key whether remove with computer be connected monitoring program of this module stores.
Cleaning module 103 is used for intelligent cipher key equipment and machine solution remove annexation after, remove store on computers with this intelligent cipher key equipment relevant information.The relevant information here refers to the accessing operation information and the installed software that produce in the use process.This module can be stored a liquidation procedures.
Present embodiment is realized AutoPlay function by operation autorun.inf file, and the principle of this AutoPlay function is that a part of storage area with intelligent cipher key equipment marks, and is used for depositing the autorun.inf file.This autorun.inf file has carried out corresponding setting in advance, makes it point to specific program or file.After connecting devices to computer, computer is identified as CD ROM with this part storage area.Wherein, this part zone of depositing the autorun.inf file can't write data to this part for read-only memory block.At first device descriptor is reported as CD ROM when initialization is enumerated, system just can carry out the autorun.inf file like this.After finishing, system need enumerate equipment again, and device descriptor is reported as intelligent cipher key equipment, thereby realizes AutoPlay function.
Referring to Fig. 2, be operation and the method that the intelligent cipher key equipment realization AutoPlay function among the embodiment 1 is set, this method may further comprise the steps:
Step 201: a part of storage area that marks off intelligent cipher key equipment;
Step 202: in above-mentioned zone, deposit the autorun.inf file;
Step 203: the autorun.inf file is set, makes it point to specific program or file;
Step 204: intelligent cipher key equipment is connected with main frame;
Step 205: when initialization is enumerated, above-mentioned zone is reported as CD ROM;
Step 206: carry out the autorun.inf file, realize operation automatically.
For fear of the user after using a computer on computers face leave over unnecessary information and protection individual subscriber privacy, finish the function of follow-up cleaning work after intelligent key system of the present invention can also be implemented in intelligent cipher key equipment and the computer disconnection is connected automatically.So-called cleaning automatically is exactly after hardware device is pulled out, automatically to unload the process of (or deletion) before by this equipment installed software.Realize automatic clearing function, can adopt multiple distinct methods.
Embodiment 2
Referring to Fig. 3, the intelligent key system that Application Example 1 provides is realized the method for automatic clearing function.This method may further comprise the steps:
Step 301: intelligent cipher key equipment and computer connect;
Step 302: start automatic running program A;
Step 303: program A installs (as carrying out operations such as xcopy and modification registration table), comprises that program B and the program C that will be stored on the intelligent cipher key equipment are installed on the computer;
Step 304: whether working procedure B, program B monitoring intelligent key devices disconnect and being connected of computer; If no, then program B continues monitoring; Otherwise, execution in step 305; Program A is out of service;
Step 305: start-up routine C carries out cleaning operation, and program B is out of service, and program C will installed software program (comprising program B) unload in step 303;
Step 306: program C is out of service.At last, before program C was out of service fully, it also will also clean out himself.
In said process, program B and program C are installed in the temp directory on the hard disc of computer, and program A is an automatic running program, moves on intelligent cipher key equipment, and program B is a monitoring program, and program C is a liquidation procedures.
Embodiment 3
Referring to Fig. 4, the intelligent key system that Application Example 1 provides is realized the method for automatic clearing function.This method may further comprise the steps;
Step 401: intelligent cipher key equipment and computer connect;
Step 402: start automatic running program A;
Step 403: program A installs (as carrying out operation or loading monitoring programs such as xcopy and modification registration table), comprises by the computer network connection from long-range program B and program C being installed on the computer;
Step 404: start working procedure B, program A is out of service;
Step 405: whether program B monitoring intelligent key devices is connected with the computer disconnection; If no, then program B continues monitoring; Otherwise, execution in step 406;
Step 406: start working procedure C, program B is out of service;
Step 407: program C carries out cleaning operation, will installed software program (comprising program B) unloading in step 403.
Step 408: program C withdraws from and is out of service.At last, before program C was out of service fully, it also will also clean out himself.
In said process, program B and program C are installed in the temp directory on the hard disc of computer, and program A is an automatic running program, moves on intelligent cipher key equipment, and program B is a monitoring program, and program C is a liquidation procedures.In addition, above-mentioned cleaning operation can also comprise deletion cookie, remove browser access record and file access information.
Monitoring program and liquidation procedures can also be after intelligent cipher key equipment and computer connect (comprising wireless connections), connect from long-range load operating respectively by computer network, after monitoring program monitored intelligent cipher key equipment and the computer disconnection is connected, liquidation procedures was carried out corresponding cleaning operation.
More than the intelligent key system and the method for work thereof of a kind of automatic monitoring provided by the present invention and cleaning is described in detail, used specific case herein principle of the present invention and execution mode are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, the change of being carried out in specific embodiments and applications is all in protection scope of the present invention.In sum, to should not be construed as be limitation of the present invention to this description.
Claims (4)
1. automatic system of monitoring and cleaning intelligent cipher key equipment relevant information is characterized in that system comprises as lower device:
Device A: be used to make intelligent cipher key equipment and computer to connect;
Device B: be used to make described intelligent cipher key equipment to start automatic running program;
Device C: be used for making described automatic running program installation or loading monitoring program and liquidation procedures to described computer;
Device D: be used to make the described automatic running program described monitoring program of operation automatically;
Device E: be used to make described monitoring program to check whether described intelligent cipher key equipment is connected with described computer disconnection; If call liquidation procedures automatically and clear up the information of leaving over after the described intelligent cipher key equipment operation and from computer, unload described liquidation procedures self; Otherwise, continue to check.
2. the system of automatic monitoring as claimed in claim 1 and cleaning intelligent cipher key equipment relevant information is characterized in that, the described information of leaving over comprises install software, load software, cookie record, browser access record or file access information.
3. a method of monitoring and clearing up the intelligent cipher key equipment relevant information automatically is characterized in that, said method comprising the steps of:
Steps A: intelligent cipher key equipment and computer connect;
Step B: described intelligent cipher key equipment starts automatic running program;
Step C: described automatic running program installation or loading monitoring program and liquidation procedures are in described computer;
Step D: move described monitoring program;
Step e: described monitoring program checks whether described intelligent cipher key equipment is connected with described computer disconnection; If call liquidation procedures automatically and clear up the information of leaving over after the described intelligent cipher key equipment operation and from computer, unload described monitoring program and described liquidation procedures self; Otherwise, continue to check.
4. the method for automatic monitoring as claimed in claim 3 and cleaning intelligent cipher key equipment relevant information, it is characterized in that the described information of leaving over comprises the install software relevant with intelligent cipher key equipment, load software, cookie record, browser access record or file access information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006101443356A CN1976279B (en) | 2006-12-04 | 2006-12-04 | Automatic monitoring and cleaning intelligent key system and working method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006101443356A CN1976279B (en) | 2006-12-04 | 2006-12-04 | Automatic monitoring and cleaning intelligent key system and working method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1976279A CN1976279A (en) | 2007-06-06 |
CN1976279B true CN1976279B (en) | 2010-10-06 |
Family
ID=38126096
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2006101443356A Active CN1976279B (en) | 2006-12-04 | 2006-12-04 | Automatic monitoring and cleaning intelligent key system and working method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1976279B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102014015B (en) * | 2010-06-29 | 2012-10-03 | 飞天诚信科技股份有限公司 | Self-checking method of intelligent secret key equipment |
CN104331488B (en) * | 2014-11-13 | 2018-04-10 | 北京奇虎科技有限公司 | File clean-up method, apparatus and equipment based on suspended window |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2524296Y (en) * | 2002-01-31 | 2002-12-04 | 广州理想资讯科技有限公司 | Digital sign identifying devices |
CN1609829A (en) * | 2003-10-24 | 2005-04-27 | 英业达股份有限公司 | Plug-and-play method for USB equipment under linux operation system |
CN1801122A (en) * | 2004-12-31 | 2006-07-12 | 联想(北京)有限公司 | Method for controlling automatic running program in USB memory and USB memory thereof |
CN1838142A (en) * | 2006-04-29 | 2006-09-27 | 北京飞天诚信科技有限公司 | USB device with data memory and intelligent secret key and control method thereof |
CN1851679A (en) * | 2006-05-30 | 2006-10-25 | 北京飞天诚信科技有限公司 | USB device automatic initialization method and device |
-
2006
- 2006-12-04 CN CN2006101443356A patent/CN1976279B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2524296Y (en) * | 2002-01-31 | 2002-12-04 | 广州理想资讯科技有限公司 | Digital sign identifying devices |
CN1609829A (en) * | 2003-10-24 | 2005-04-27 | 英业达股份有限公司 | Plug-and-play method for USB equipment under linux operation system |
CN1801122A (en) * | 2004-12-31 | 2006-07-12 | 联想(北京)有限公司 | Method for controlling automatic running program in USB memory and USB memory thereof |
CN1838142A (en) * | 2006-04-29 | 2006-09-27 | 北京飞天诚信科技有限公司 | USB device with data memory and intelligent secret key and control method thereof |
CN1851679A (en) * | 2006-05-30 | 2006-10-25 | 北京飞天诚信科技有限公司 | USB device automatic initialization method and device |
Also Published As
Publication number | Publication date |
---|---|
CN1976279A (en) | 2007-06-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8122172B2 (en) | Portable information security device | |
CN101436233B (en) | Hard disk multi-user partition switch control method, system and computer terminal | |
EP2159727B1 (en) | Securing a device based on atypical user behavior | |
CN101568119A (en) | Mobile terminal with antitheft function and antitheft method thereof | |
CN103559455A (en) | Android device personal information protection method based on user identification | |
EP2350862B1 (en) | Method and apparatus for access to a computer unit | |
US7788717B2 (en) | Apparatus, system, and method for selectively enabling a power-on password | |
US20080092217A1 (en) | Environment migration system, terminal apparatus, information processing apparatus, management server, and portable storage medium | |
WO2008003175A1 (en) | One time password access to portable credential entry and memory storage devices | |
WO2007007397A1 (en) | Sharing management program, sharing management method, terminal, and sharing management system | |
CN101673330A (en) | BIOS-based computer security protection method and system | |
CN107403152A (en) | High-pass platform TrustZone fingerprint recognition realization method and systems | |
US10796027B2 (en) | Methods and a system for secure data storage | |
CN1976279B (en) | Automatic monitoring and cleaning intelligent key system and working method thereof | |
CN101217399B (en) | A data card background system and the corresponding operating method | |
CN101025769B (en) | Multi-user safety chip resource allocation method and muiti-user safety system | |
CN110569075B (en) | Switching method of multiple operating systems | |
CN110673863B (en) | Intelligent lock system supporting pluggable external storage and intelligent upgrading method | |
TWM356972U (en) | Portable storage device with local and remote identity recognition function | |
JP4561213B2 (en) | Hard disk security management system and method thereof | |
CN111914311B (en) | Hard disk password management method and device, electronic equipment and storage medium | |
CN2896370Y (en) | Intelligent key device | |
CN100383695C (en) | Safety turn-on method in visual range | |
JP2002304231A (en) | Computer system | |
CN101640595B (en) | Method, device and system for controlling switching of isolation card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C56 | Change in the name or address of the patentee |
Owner name: FEITIAN CHENGXIN TECHNOLOGIES CO., LTD. Free format text: FORMER NAME: BEIJING FEITIAN CHENGXIN SCIENCE + TECHNOLOGY CO. LTD. |
|
CP03 | Change of name, title or address |
Address after: 100085 Beijing city Haidian District Xueqing Road No. 9 Ebizal building B block 17 layer Patentee after: Feitian Technologies Co., Ltd. Address before: 100083, Haidian District, Xueyuan Road, No. 40 research, 7 floor, 5 floor, Beijing Patentee before: Beijing Feitian Chengxin Science & Technology Co., Ltd. |