CN100511255C - Non-contact digital safety system - Google Patents
Non-contact digital safety system Download PDFInfo
- Publication number
- CN100511255C CN100511255C CNB2006101402962A CN200610140296A CN100511255C CN 100511255 C CN100511255 C CN 100511255C CN B2006101402962 A CNB2006101402962 A CN B2006101402962A CN 200610140296 A CN200610140296 A CN 200610140296A CN 100511255 C CN100511255 C CN 100511255C
- Authority
- CN
- China
- Prior art keywords
- key
- safety system
- password
- identification code
- electronic installation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Abstract
The invention relates to a non-contact digital safety system, in which an electronic device automatically release lock state only when a legal digital key held by a legal user approaches to an authentication device. During the authentication procedure, the authentication device, the digital key authenticate with each other, so as to prevent a false authentication device acquiring data in the digital key and prevent a false digital key fooling the authentication device, therefore, achieving the digital safety conveniently and effectively under the conditions thata legal user needs not to input code or identification fingerprint, iris and other secondary identification mechanisms.
Description
Technical field
The invention relates to a kind of digital safety system, refer in particular to non-contact digital safety system.
Background technology
General computer operating system is all with the mode of verifying number of the account/password, as the means of data protection.Though the number of the account/password of some operating system is easy crack not,, as the data processing equipment of hard drives, in case from computing machine, separated, just can utilize another computing machine to read the data that are stored in wherein easily.
In order to overcome this problem, TaiWan, China the 550459th notification number patent provides a kind of computer data protective device, and expectation can solve this type of problem.Simple; the technological means that it used is, between main frame (or CPU of computing machine) and hard drives, additionally sets up the computer data protective device; and when writing/reading the hard drives data, reach the purpose of data protection by encrypt/decrypt.
Yet; when if the person who is ambitious or tenacious of purpose is separated hard drives in the lump together with this computer data protective device from computing machine; still can will be stored in data decryption wherein by the decryption mechanisms of The built-in smoothly, thereby still can't effectively reach the purpose of data protection really.
The data protecting device and the data encryption method of TaiWan, China patent the 591630th notification number patent Storage Media are to rely on the password inspection unit to overcome the problem of the 550459th notification number patent.Data protecting device and the disclosed technology of data encryption method from Storage Media; though can whether correct according to the examination password; just whether decision allows decryption mechanisms to begin to carry out the program of data decryption; then can avoid taking away the purpose that can't reach data protection together because of the related hard disk of protective device itself; but still may there be the problem that is cracked in the artificial password setting of this kind.
Be taken together for fear of protective device itself, existing manufacturer adopts the idea that is similar to key, and promptly TaiWan, China M276397 notification number patent is used for the radio-frequency discriminating safety feature that electronic data is maintained secrecy.In this prior art; the user can carry the device as key and leave; and when the device of need protections such as needs use a computer; only need the radio-frequency (RF) signal scope that bring this electron key into safety feature; safety feature is its inner stored data of access automatically just, and automatically remove the locking to computing machine.
Yet; because the radio-frequency (RF) signal between electron key, the safety feature; be easy to be captured by illegal safety feature; and then copy living electron key; though this causes that quite safe protection mechanism is arranged; still need the user additionally to input password, to avoid the generation of above-mentioned illegal act.
Summary of the invention
Fundamental purpose of the present invention provides a kind of non-contact digital safety system, and the legal digital key of only holding at validated user in this system is during near demo plant, and electronic installation just can automatically terminate lock-out state.
Based on above-mentioned purpose, the invention provides a kind of non-contact digital safety system, it can ensure an electronic installation only by a validated user access, this digital safety system comprises:
One administration module is to be performed in this electronic installation, and determines whether locking the control of this electronic installation according to a safe condition;
One digital key, this numeral key comprises first storage element and a control module, wherein,
Described first storage element is whether store an identification code and be enough to be used for identification be a verification msg of this validated user;
Described control module is to see through a key wireless module to transmit this identification code, and when confirming that a password that this key wireless module is received is legal, transmits this verification msg;
One demo plant is to be electrically connected to this electronic installation, and this demo plant comprises second storage element and an authentication unit, wherein,
Described second storage element is to store many recognition data, and each recognition data is all with the corresponding password of this identification code;
Described authentication unit, be when to see through checking this identification code that wireless module received be legal, see through this checking wireless module and transmit this password, and when this verification msg from this numeral key is passed through in checking, this administration module is sent this safe condition that unlocks to digital key.
This verification msg can be iris, DNA, the facial contour of this validated user, the individual biological data or the personal identification data of fingerprint.
This administration module that sees through this electronic installation can increase, delete, revise the recognition data in this demo plant newly.
Can adopt bluetooth, ultrared wireless bus or PCI, USB, 1394 wired bus between this electronic installation, this demo plant.
This electronic installation can be computing machine, PDA, mobile phone or other has the device of arithmetic capability.
This authentication unit is discovered this identification code from this numeral key when being illegal, see through this checking wireless module and transmit this false password to this numeral key, and this verification msg of being transmitted of this numeral key that refuses inspection of books, and this administration module is sent this safe condition of locking.
This authentication unit is discovered this identification code from this numeral key when being legal, see through this checking wireless module and transmit this password to this numeral key, and can't verify at this password and to pass through, in the time of can't obtaining this verification msg from this numeral key, this administration module is sent this safe condition of locking.
This authentication unit is discovered this identification code from this numeral key when being legal, see through this checking wireless module and transmit this password to this numeral key, and in checking when obtaining this verification msg from this numeral key, if discover this verification msg for illegal, then this administration module sent this safe condition of locking.
The invention has the beneficial effects as follows in above-mentioned proving program, adopt the means of checking mutually between demo plant, the digital key, avoid false demo plant to obtain data in the digital key, also avoid the false digital key demo plant of out-tricking, legal user need not be inputed under password or the second identifier systems such as identification fingerprint, iris again, make things convenient for and reach effectively the purpose of numeric security.
Description of drawings
Fig. 1 is the synoptic diagram of non-contact digital safety system of the present invention.
Fig. 2 is the running synoptic diagram of non-contact digital safety system.
The symbol description of primary clustering shown in the figure
10 electronic installations
12 administration modules
14 demo plants
14a, 16a wireless module
16 digital keys
20 control device
22 first storage elements
26 second storage elements
24 authentication units
Embodiment
Please refer to Fig. 1, Fig. 1 is the synoptic diagram of non-contact digital safety system of the present invention.As shown in Figure 1, non-contact digital safety system of the present invention mainly comprises the administration module of digital key 16, demo plant 14, execution in electronic installation 10.Utilize the wireless module 16a, the 14a that all have each other to see through magnetic coupling between numeral key 16, the demo plant 14 or microwave mode carries out communication, demo plant 14, then can adopt bluetooth, ultrared wireless bus or PCI, USB, 1394 wired bus asking of electronic installation 10.Electronic installation 10 can be computing machine, PDA, mobile phone or other has the device of arithmetic capability.
Please refer to Fig. 2, Fig. 2 is the running synoptic diagram of non-contact digital safety system.Shown in Figure 2, digital key 16 additionally has first storage element 22, control module 20, and demo plant 14 additionally has authentication unit 24, second storage element 26.Whether first storage element 22 of numeral key 16 stores identification code, be enough to be used for identification is wasteful the fearnesss mouth of verification msg of validated user: the individual biological data of the iris of validated user, DNA, facial contour, fingerprint or personal status's data).26 of second storage elements of demo plant 14 store many recognition data and personal data (for example number of the account/the password of name, online etc.), and each recognition data is all with the corresponding password of identification code of digital key 16.
Simple, in non-contact digital safety system of the present invention, the legal digital key 16 that validated user is held is during near demo plant 14, and through after the proving program, electronic installation 10 is just understood be automatically terminated lock-out state.But, in above-mentioned proving program, adopt the means of checking mutually between demo plant 14, the digital key 16, avoid false demo plant to obtain data in the digital key, also avoid the false digital key demo plant of out-tricking, legal user need not be inputed under password or the second identifier systems such as identification fingerprint, iris again, make things convenient for and reach effectively the purpose of numeric security.
The means of the mutual checking of being adopted between demo plant 14, the digital key 16 were mainly for two stages.At first, numeral key 16 can see through key wireless module 16a transmission identification code earlier and give demo plant 14, demo plant 14 then can see through checking wireless module 14a and receive this identification code, and carries out the authentication of phase one based on many recognition data in second storage device 26.Specifically,, therefore, represent that then the identification code that it received is legal, just launch the authentication of subordinate phase then if can find relative password smoothly the time because these Identification Data are all with the corresponding password of the identification code of digital key 16.
When if identification code is legal, demo plant 14 just can see through checking wireless module 14a and transmit password to digital key 16.Numeral key 16 is after receiving this password, and its control module 20 can be when confirming that password that the key wireless module be received is legal, transmits verification msg in first storage element 22 to demo plant 14.If demo plant 14 by from the verification msg of digital key 16 time, will send the safe condition that unlocks in checking to administration module 12, administration module 12 just can decide the control of releasing electronic installation 10 according to this safe condition then.
For administrative purposes, administration module 12 can see through demo plant 14 and carry out following several work when unlock:
1. read or write the interior personal data of first storage element of digital key 16;
2. record uses the time of electronic installation 10;
3. control figure key 16 uses the time range or the time span of this electronic installation 10;
4. read user's number of the account/password of the online of digital key 16 internal memories, so that after seeing through administration module 12 and reading, login the website automatically.
In order to safeguard data such as above-mentioned recognition data, identification code in demo plant 14, the administration module 12 that the supvr can see through electronic installation 10 increases, deletes, revises these recognition data in the demo plant 14 newly.Concerning digital key 16, then can additionally install the Identification Data that fingerprint identifier is obtained fingerprint, so that carry out above-mentioned identification program.
In addition, authentication unit 24 is discovered identification code from digital key 16 when being illegal (digital key 16 is forged), see through checking wireless module 14a and transmit false password to digital key 16, and the verification msg transmitted of the digital key 16 that refuses inspection of books, and administration module 12 is sent the safe condition of locking.
When if authentication unit 24 is legal at identification code, see through checking wireless module 14a and transmit password to digital key 16, but can't verify by (being that digital key 16 duplicates at password, but lack complete authentication mechanism), and can't obtain verification msg from digital key 16 time, administration module 12 is sent the safe condition of locking.
When if authentication unit 24 is legal at identification code, see through checking wireless module 14a and transmit password to digital key 16, and in checking when obtaining the verification msg from digital key 16, when to discover verification msg be illegal when fingerprint (non-legal user), administration module 12 is sent the safe condition of locking.
Below will cooperate the graphic embodiments of the present invention that further specify; following cited embodiment is used for illustrating the present invention; be not to be used for limiting scope of the present invention; anyly be familiar with the person skilled in art; without departing from the spirit and scope of the present invention; revise and improve when making some, so protection scope of the present invention is when being as the criterion according to the accompanying claim that defines.
Claims (8)
1, a kind of non-contact digital safety system, it can ensure that an electronic installation only by a validated user access, is characterized in that this digital safety system comprises:
One administration module is to be performed in this electronic installation, and determines whether locking the control of this electronic installation according to a safe condition;
One digital key, this numeral key comprises first storage element and a control module, wherein,
Described first storage element is whether store an identification code and be enough to be used for identification be a verification msg of this validated user;
Described control module is to see through a key wireless module to transmit this identification code, and when confirming that a password that this key wireless module is received is legal, transmits this verification msg;
One demo plant is to be electrically connected to this electronic installation, and this demo plant comprises second storage element and an authentication unit, wherein,
Described second storage element is to store many recognition data, and each recognition data is all with the corresponding password of this identification code;
Described authentication unit, be when to see through checking this identification code that wireless module received be legal, see through this checking wireless module and transmit this password, and when this verification msg from this numeral key is passed through in checking, this administration module is sent this safe condition that unlocks to digital key.
2, non-contact digital safety system according to claim 1 is characterized in that, this verification msg is iris, DNA, the facial contour of this validated user, the individual biological data or the personal identification data of fingerprint.
3, non-contact digital safety system according to claim 1 is characterized in that, the administration module that sees through this electronic installation increases, deletes, revises the recognition data in this demo plant newly.
4, non-contact digital safety system according to claim 1 is characterized in that, adopts bluetooth, ultrared wireless bus or PCI, USB, 1394 wired bus between this electronic installation, this demo plant.
5, non-contact digital safety system according to claim 1 is characterized in that, this electronic installation is that computing machine, PDA, mobile phone or other have the device of arithmetic capability.
6, non-contact digital safety system according to claim 1, it is characterized in that, this authentication unit is discovered this identification code from this numeral key when being illegal, see through this checking wireless module and transmit this false password to this numeral key, and this verification msg of being transmitted of this numeral key that refuses inspection of books, and this administration module is sent this safe condition of locking.
7, non-contact digital safety system according to claim 1, it is characterized in that, this authentication unit is when to discover this identification code from this numeral key be legal, see through this checking wireless module and transmit this password to this numeral key, and can't verify at this password and to pass through, in the time of can't obtaining this verification msg from this numeral key, this administration module is sent this safe condition of locking.
8, non-contact digital safety system according to claim 1, it is characterized in that, this authentication unit is when to discover this identification code from this numeral key be legal, see through this checking wireless module and transmit this password to this numeral key, and in checking when obtaining this verification msg from this numeral key, if discover this verification msg for illegal, then this administration module sent this safe condition of locking.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006101402962A CN100511255C (en) | 2006-10-23 | 2006-10-23 | Non-contact digital safety system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006101402962A CN100511255C (en) | 2006-10-23 | 2006-10-23 | Non-contact digital safety system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101169811A CN101169811A (en) | 2008-04-30 |
CN100511255C true CN100511255C (en) | 2009-07-08 |
Family
ID=39390434
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2006101402962A Expired - Fee Related CN100511255C (en) | 2006-10-23 | 2006-10-23 | Non-contact digital safety system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100511255C (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI421777B (en) | 2010-06-30 | 2014-01-01 | Mstar Semiconductor Inc | Identification processing apparatus and mobile apparatus thereof |
CN102315936A (en) * | 2010-07-08 | 2012-01-11 | 晨星软件研发(深圳)有限公司 | Authentication processing device and relevant movement device thereof |
US8335921B2 (en) * | 2010-12-17 | 2012-12-18 | Google, Inc. | Writing application data to a secure element |
US9407636B2 (en) | 2014-05-19 | 2016-08-02 | Intel Corporation | Method and apparatus for securely saving and restoring the state of a computing platform |
CN114670779A (en) * | 2022-04-07 | 2022-06-28 | 浙江极氪智能科技有限公司 | Digital key sharing method and system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1441556A (en) * | 2002-02-28 | 2003-09-10 | 张其善 | Hand-held mobile radio phonetic data communication with IC card read/wirte function |
CN1516062A (en) * | 2003-01-09 | 2004-07-28 | 北京握奇数据系统有限公司 | Double-interface electronic key |
-
2006
- 2006-10-23 CN CNB2006101402962A patent/CN100511255C/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1441556A (en) * | 2002-02-28 | 2003-09-10 | 张其善 | Hand-held mobile radio phonetic data communication with IC card read/wirte function |
CN1516062A (en) * | 2003-01-09 | 2004-07-28 | 北京握奇数据系统有限公司 | Double-interface electronic key |
Also Published As
Publication number | Publication date |
---|---|
CN101169811A (en) | 2008-04-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103177223B (en) | The method and system of protected data access between stream oriented device | |
EP1755061B1 (en) | Protection of non-promiscuous data in an RFID transponder | |
CN1913427B (en) | System and method for encrypted smart card PIN entry | |
CN103886234B (en) | A kind of fail-safe computer based on encryption hard disk and data security control method thereof | |
CN101345619B (en) | Electronic data protection method and device based on biological characteristic and mobile cryptographic key | |
CN100590639C (en) | System and method for managing multiple smart card sessions | |
CN101072100B (en) | Authenticating system and method utilizing reliable platform module | |
CN102316449B (en) | Security terminal system and authentication and interruption method thereof | |
CN100533459C (en) | Data safety reading method and safety storage apparatus thereof | |
US20100138667A1 (en) | Authentication using stored biometric data | |
CN101010677A (en) | Portable storage device and method for exchanging data | |
CN203746071U (en) | Security computer based on encrypted hard disc | |
CN100511255C (en) | Non-contact digital safety system | |
CN102523338B (en) | Handheld terminal with unlocking function and unlocking method thereof | |
CN102436685A (en) | Biometric Key | |
US20110280400A1 (en) | Cloud storage system and method | |
CN101655814A (en) | Method for authenticating smart battery and terminal | |
EP2192513A1 (en) | Authentication using stored biometric data | |
CN103368736B (en) | Business information encryption, decryption method and device | |
CN101645124B (en) | Method for unlocking PIN code and intelligent secret key device | |
CN101765821B (en) | Fingerprint reader resetting system and method | |
US20220027487A1 (en) | System and method for securing and managing data in storage device by using secure terminal | |
CN101883357A (en) | Method, device and system for mutual authentication between terminal and intelligent card | |
CN101562523B (en) | Security certification method applied on mobile storage device | |
US20080126808A1 (en) | Encrypted dataset access by custodians |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20090708 Termination date: 20111023 |