CN102368230A - Mobile memory and access control method thereof as well as system - Google Patents

Mobile memory and access control method thereof as well as system Download PDF

Info

Publication number
CN102368230A
CN102368230A CN2011103372002A CN201110337200A CN102368230A CN 102368230 A CN102368230 A CN 102368230A CN 2011103372002 A CN2011103372002 A CN 2011103372002A CN 201110337200 A CN201110337200 A CN 201110337200A CN 102368230 A CN102368230 A CN 102368230A
Authority
CN
China
Prior art keywords
dynamic password
authentication
mobile memory
parameters
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011103372002A
Other languages
Chinese (zh)
Inventor
李东声
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Tendyron Technology Co Ltd
Original Assignee
Beijing Tendyron Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Tendyron Technology Co Ltd filed Critical Beijing Tendyron Technology Co Ltd
Priority to CN2011103372002A priority Critical patent/CN102368230A/en
Publication of CN102368230A publication Critical patent/CN102368230A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a mobile memory and an access control method thereof as well as a system, belonging to the field of information safety. The method comprises the following steps: after being connected with a terminal, the mobile memory receives an authentication parameter at least containing a dynamic password and being input by a user through the terminal; the mobile memory compares the dynamic password contained in the authentication parameter with a dynamic password generated locally by the mobile memory and authenticates the dynamic password; after the authentication succeeds, the mobile memory carries out access control on a reading-writing operation launched by the use through the terminal. An access control mechanism based on the dynamic password is adopted, therefore, the safety of the mobile memory cannot be seriously threatened even if a certain password is leaked carelessly, and the safety of the mobile memory is improved.

Description

The access control method of mobile memory, mobile memory and system
Technical field
The present invention relates to information security field, relate in particular to a kind of access control method, mobile memory and system of mobile memory.
Background technology
Along with mobile memory, especially be that the rapid of mobile memory (being designated hereinafter simply as USB flash disk) of interface popularized with USB, the safety of files problem that is stored in the USB flash disk receives publicity day by day.
In order to strengthen the security of USB flash disk, can be applied to fields such as military affairs, finance, commerce gradually to the safe U disc that the file access operation of USB flash disk is controlled.Safe U disc conduct interviews control ultimate principle be: the user is before conducting interviews to the file in the safe U disc; Need send authenticate password (being designated hereinafter simply as password) to safe U disc through terminal; Safe U disc carries out authentication to password, authentication through after just allow safe U disc carried out operations such as file read-write.
Existing safe U disc adopts the static password control that conducts interviews; There is following shortcoming in this mode: when the user need conduct interviews to the file in the safe U disc; Or when the static password of safe U disc is provided with and revises; This static password (being password) is in case quilt is spied on or intercepted and captured by trojan horse program, and files stored can't be protected in this USB flash disk.
Summary of the invention
The purpose of embodiment of the present invention provides a kind of access control method, mobile memory and system of mobile memory; Can solve present safe U disc and adopt the static password control that conducts interviews, and static password is prone to spied on or caused the problem that files stored can't be protected in the safe U disc by intercepting and capturing.
The objective of the invention is to realize through following technical scheme:
Embodiment of the present invention provides a kind of access control method of mobile memory, and this method comprises:
Embodiment of the present invention provides a kind of access control method of mobile memory, and this method comprises:
Mobile memory is with after the terminal is connected, and mobile memory receives the parameters for authentication that at least comprise dynamic password of user through the input of said terminal;
Mobile memory compares authentication with said dynamic password that comprises in the said parameters for authentication and the local dynamic password that generates of said mobile memory;
Behind the authentication success, the read-write operation that said mobile memory is initiated through the terminal the user control that conducts interviews.
In the said method, said dynamic password is: based on the dynamic password of time generation, and the dynamic password that perhaps generates based on challenge code.
In the said method, said dynamic password is the dynamic password that generates based on challenge code;
The dynamic password that comprises in the said parameters for authentication adopts following mode to generate:
After said mobile memory generates challenge code, send it to said terminal and show or play; After receiving the said challenge code of user's input, dynamic password apparatus generates the dynamic password that comprises in the said parameters for authentication with the seed key of said challenge code and storage as parameter.
In the said method, also comprise ID in the said parameters for authentication;
Said mobile memory adopts following mode to generate dynamic password: mobile memory obtains the seed key corresponding with said ID in this locality storage according to the ID that comprises in the said parameters for authentication, calculates dynamic password according to the said seed key that gets access to.
In the said method, said mobile memory adopts following mode to generate dynamic password: all seed keys according to this locality storage generate dynamic password respectively;
Adopt following mode that the local dynamic password that generates of the said dynamic password in the said parameters for authentication and said mobile memory is compared authentication: said dynamic password that comprises in the said parameters for authentication and the dynamic password of said mobile memory based on all seed keys generations of its storage are contrasted successively; If identical dynamic password is arranged, then authentication result is an authentication success; If there is not identical dynamic password, then authentication result is an authentification failure.
In the said method, said mobile memory carries out said access control according to the user's of this locality storage access authority information.
In the said method, said mobile memory obtains its corresponding said user's access authority information according to the ID that comprises in the said parameters for authentication; Perhaps
Said mobile memory obtains its corresponding said user's access authority information according to said dynamic password.
Embodiment of the present invention further provides a kind of mobile memory, comprising: memory module and data transmission module, and this storer also comprises: the dynamic password generation module, main control module, wherein,
Said data transmission module is used for the read-write operation request of receiving terminal input and the parameters for authentication that comprises dynamic password at least, and exports it to said main control module;
Said dynamic password generation module is used to generate dynamic password, and exports it to said main control module;
Said main control module; Be used to receive the said parameters for authentication of said data transmission module output and the dynamic password of said dynamic password generation module output; And the dynamic password of the dynamic password that comprises in the said parameters for authentication and said dynamic password generation module output compared authentication, behind the authentication success to the control that conducts interviews of the read-write operation request of the said data transmission module output that receives.
Above-mentioned mobile memory also comprises: the challenge code generation module is used to generate challenge code and sends to said terminal through said data transmission module and shows or play.
In the above-mentioned mobile memory, also comprise ID in the said parameters for authentication that said data transmission module receives;
Said main control module also is used for exporting the ID that the said parameters for authentication that receives comprises to said dynamic password generation module;
Said dynamic password generation module also is used for obtaining the seed key corresponding with said ID that said memory module is stored according to the ID that said parameters for authentication comprises, and calculates dynamic password according to the said seed key that obtains.
In the above-mentioned mobile memory, said memory module also is used to store said dynamic password generation module and generates a plurality of seed keys that dynamic password is used;
Said dynamic password generation module also is used for generating dynamic password respectively according to all seed keys of said memory module storage;
Said main control module, the dynamic password of said dynamic password that also is used for said parameters for authentication is comprised and the output of said dynamic password generation module contrasts successively, if identical dynamic password is arranged, then authentication result is an authentication success; If there is not identical dynamic password, then authentication result is an authentification failure.
In the above-mentioned mobile memory, said memory module also is used to store user's access authority information;
Said main control module also is used for according to the user's of said memory module storage pairing access rights of access authority information the control that conducts interviews of the read-write operation request of the said data transmission module output that receives.
Embodiment of the present invention also provides a kind of access control system of mobile memory, and this system comprises: dynamic password apparatus, terminal, and above-mentioned mobile memory; Wherein,
Said dynamic password apparatus is used to generate dynamic password;
Said terminal is used for comprising the parameters for authentication by the dynamic password of said dynamic password apparatus generation at least to said mobile memory input.
Can find out from the technical scheme that the invention described above embodiment provides; The access control method of the mobile memory that embodiment of the present invention provides; The parameters for authentication that can comprise dynamic password by user's input through the terminal that mobile memory connected; The local dynamic password that generates of dynamic password that in parameters for authentication, comprises and mobile memory compares authentication; After authentication was passed through, mobile memory was according to the user's of this locality storage access authority information, to the read-write operation control that conducts interviews.Owing to adopt dynamic password authentication mechanism to realize access control; Therefore, even a certain dynamic password is spied on by the disabled user accidentally or trojan horse program is intercepted and captured, also can't obtain access control right to mobile memory; Therefore, can effectively protect the safety of storage file in the mobile memory.
Description of drawings
In order to be illustrated more clearly in the technical scheme of the embodiment of the invention; The accompanying drawing of required use is done to introduce simply in will describing embodiment below; Obviously, the accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skill in the art; Under the prerequisite of not paying creative work, can also obtain other accompanying drawings according to these accompanying drawings.
Fig. 1 is the access control method first embodiment process flow diagram of mobile memory provided by the invention;
The structural representation of the mobile memory that Fig. 2 provides for the embodiment of the invention;
The structural representation of second embodiment of the mobile memory that Fig. 3 provides for the embodiment of the invention;
The synoptic diagram of the access control system of the mobile memory that Fig. 4 provides for the embodiment of the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is carried out clear, intactly description, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on embodiments of the invention, those of ordinary skills belong to protection scope of the present invention not making the every other embodiment that is obtained under the creative work prerequisite.
Core of the present invention is: when mobile memory with after the terminal is connected; Need conduct interviews when control to read-write operation, the user who receives is obtained and dynamic password through the terminal input and mobile memory compare authentication according to the dynamic password of the token seed key generation of this locality storage from token;
After the dynamic password authentication success, mobile memory is according to the access authority information of the respective user of this locality storage, to the read-write operation control that conducts interviews.
Promptly adopt the dynamic password technology to carry out the access control of safe U disc.
The dynamic password technology is called one-time password (One Time Password is called for short OTP) technology again, according to the difference of password generating mode, can be divided into time-based dynamic password technology and technological based on the dynamic password of challenging/replying.
When adopting time-based dynamic password technological, dynamic password apparatus and dynamic password server (being designated hereinafter simply as server) are synchronous in time, and store identical seed key; Dynamic password apparatus and server use this seed key dynamic password of (for example, 60 seconds) generation at set intervals; In the time of need carrying out authentification of user, after the user was known the present dynamic password through the display screen of dynamic password apparatus, at this dynamic password of terminal input, the terminal sent to server with information such as this dynamic password and user name, static passwords and carries out authentication.
Employing is during based on the dynamic password of challenge code technology, and dynamic password apparatus stores identical seed key with dynamic password server (being designated hereinafter simply as server); In the time of need carrying out authentification of user, server sends terminal from a challenge code to user or mobile phone, after the user obtains challenge code, challenge code is imported dynamic password apparatus; Dynamic password apparatus uses the challenge code of seed key and user's input to generate answer back code (being dynamic password); After the user is known the present dynamic password through the display screen of dynamic password apparatus; At this dynamic password of terminal input, the terminal sends to server with information such as this dynamic password and user name, static passwords and carries out authentication.
To combine accompanying drawing and specific embodiment that the present invention is done to describe in detail further below.
The first method embodiment
Fig. 1 is the process flow diagram of access control method first embodiment of mobile memory of the present invention.In the present embodiment, based on time generation dynamic password.As shown in Figure 1, this method comprises the steps:
Step 101, dynamic password apparatus (being designated hereinafter simply as token) is with the pre-set time interval generation and show time-based dynamic password;
In this step, token can generate dynamic password as parameter with the seed key of time, token.
Step 102, after the user inserted terminal (hereinafter to be referred as the terminal) with mobile memory, mobile memory sent authentication request to the terminal, imported corresponding parameters for authentication with the prompting user and carried out authentication;
Step 103, the dynamic password that the user generates token, ID, static password (optional) are as the parameters for authentication entry terminal; The terminal sends to coupled mobile memory with above-mentioned parameters for authentication;
Step 104, receive the parameters for authentication of sending at the terminal after, mobile memory (being equivalent to the dynamic password server) carries out authentication to the user;
User authentication process mainly is that the dynamic password that receives is carried out authentication;
The dynamic password that mobile memory can adopt following mode that the terminal is sent carries out authentication:
Step 104a, mobile memory obtains corresponding seed key according to the ID that comprises in the parameters for authentication;
Above-mentioned seed key can be stored in the secure storage areas of mobile memory with ID in the lump;
Step 104b, mobile memory with time, seed key as the calculation of parameter dynamic password;
Step 104c, mobile memory compares dynamic password that receives and the dynamic password that calculates, if both are consistent, then dynamic password authentication success, if inconsistent, then dynamic password authentication failure.
Alternatively, user authentication process can also comprise the static password in the parameters for authentication is carried out authentication.User's static password also can be stored in the secure storage areas of mobile memory.
After the step 105, authentification of user success, mobile memory obtains this according to ID and identifies pairing access rights (being the corresponding access rights of user), and with it as current access rights;
Access rights can be divided into a plurality of grades, different access permission level can corresponding different files and/or catalogue and/or subregion and/or different files operation (for example, read file; Revised file; Deleted file is created file, the browser document folder; Create file, deleted file folder etc.).
For example, can access rights be divided into three grades: senior, middle rank and rudimentary;
For access rights is senior user, can carry out all accessing operations to the All Files in all catalogues (file) of all subregions;
For access rights is the user of middle rank, can the part or all of file in particular zones/catalogue (file) be read, retouching operation, and can create accessing operations such as file, browser document folder; But do not allow to carry out operations such as deleted file, deleted file folder;
For access rights is rudimentary user, can only carry out read operation to the partial document in particular zones/catalogue (file).
Step 106 is when the user carries out a certain accessing operation (for example, reading a certain file) through the terminal; Be that mobile memory is when receiving the accessing operation instruction of sending at the terminal; Mobile memory is analyzed this operational order, judges whether current access rights allow to carry out this accessing operation, if allow; Then carry out corresponding the processing, and return corresponding data to the terminal; If do not allow to carry out this accessing operation, then return the response message of forbidding carrying out accessing operation to the terminal.
The second method embodiment
Unique difference of the present embodiment and first embodiment is to generate dynamic password based on challenge code in the present embodiment.
That is, in the time of need carrying out authentication, mobile memory generates challenge code, and sends it to the terminal and show or play; The user imports token with challenge code, and token generates dynamic password with the seed key of challenge code, token as parameter.
In the various embodiments of the present invention; When initial with the binding of mobile memory and token: mobile memory (as the dynamic password server) is bound with a token (can be called keeper's token) at first at least, promptly stores the pairing seed key of this token; The keeper can use this keeper's token that mobile memory (dynamic password server) is provided with, and adds the seed key of new token, and itself and user name and authority information are bound.
According to ultimate principle of the present invention, the foregoing description can also have multiple mapping mode, for example:
(1) in the foregoing description, when mobile memory was connected with the terminal, mobile memory sent authentication request to the terminal;
In other embodiments of the invention, mobile memory also can send authentication request to the terminal after receiving the specific accessing operation instruction of sending at the terminal.For example, mobile memory does not limit browser document folder, and promptly therefore the file name of Any user in can the browser document folder need not to carry out authentication operation when mobile memory insertion terminal; When the user reads or revises a certain file or operation such as deletion; When mobile memory receives the corresponding operating instruction of sending at the terminal; Send authentication request to the terminal, and whether successful according to authentication, and the pairing access rights of user are carried out follow-up processing.
(2) in the foregoing description; After mobile memory receives the ID and dynamic password of sending at the terminal; Obtain corresponding seed key according to ID; Use this seed key to calculate dynamic password, and through itself and the dynamic password that receives are compared the authentication of carrying out dynamic password;
In other embodiments of the invention; Mobile memory can calculate the pairing dynamic password of all seed keys of good local storage in advance; After receiving the dynamic password that sends at the terminal; Itself and precalculated dynamic password are contrasted successively,, then represent the dynamic password mistake that receives if there is not identical dynamic password; If identical dynamic password is arranged, then can find and pairing ID of this dynamic password and corresponding authority information.Therefore, the terminal need not that ID is sent to mobile memory and carries out authentication.
The first device embodiment
Fig. 2 is the structural representation of the mobile memory that provides of the embodiment of the invention.As shown in Figure 2, this mobile memory can be used as safe U disc, comprising: memory module, data transmission module, dynamic password generation module and main control module, wherein,
Data transmission module is used for the read-write operation request of receiving terminal input and the parameters for authentication that comprises dynamic password at least, and exports it to said main control module;
The dynamic password generation module is used to generate dynamic password, and exports it to said main control module;
Main control module; Be used to receive the said parameters for authentication of said data transmission module output and the dynamic password of said dynamic password generation module output; And the dynamic password of the dynamic password that comprises in the said parameters for authentication and said dynamic password generation module output compared authentication, behind the authentication success to the control (promptly to the read-write operation request to memory module of user through the terminal initiation conduct interviews control) that conducts interviews of the read-write operation request of the said data transmission module output that receives.
Above-mentioned mobile memory also comprises ID in the said parameters for authentication that data transmission module receives;
Main control module also is used for exporting the ID that the said parameters for authentication that receives comprises to said dynamic password generation module;
The dynamic password generation module also is used for obtaining the seed key corresponding with said ID that said memory module is stored according to the ID that said parameters for authentication comprises, and calculates dynamic password according to the said seed key that obtains.
The memory module of above-mentioned mobile memory also is used to store said dynamic password generation module and generates a plurality of seed keys that dynamic password is used;
The dynamic password generation module of above-mentioned mobile memory also is used for generating dynamic password respectively according to all seed keys of said memory module storage;
The main control module of above-mentioned mobile memory, the dynamic password of said dynamic password that also is used for said parameters for authentication is comprised and the output of said dynamic password generation module contrasts successively, if identical dynamic password is arranged, then authentication result is an authentication success; If there is not identical dynamic password, then authentication result is an authentification failure.
The memory module of above-mentioned mobile memory also is used to store user's access authority information,
Said main control module also is used for according to the user's of said memory module storage pairing access rights of access authority information the control that conducts interviews of the read-write operation request of the said data transmission module output that receives.
The second device embodiment
Fig. 3 is the structural representation of second embodiment of mobile memory provided by the invention.As shown in Figure 3; The difference of mobile memory that present embodiment provides and the above-mentioned first device embodiment is; This mobile memory also comprises: the challenge code generation module is used to generate challenge code and sends to said terminal through said data transmission module and shows or play; After receiving the said challenge code of user's input, dynamic password apparatus generates dynamic password with the seed key of said challenge code and storage as parameter.
The mobile memory of other structure of present embodiment mobile memory and the first device embodiment is basic identical, no longer repeats at this.
First system embodiment
Fig. 4 is the synoptic diagram of the access control system of the mobile memory that provides of the embodiment of the invention.As shown in Figure 4, the access control system of the mobile memory of present embodiment comprises: dynamic password apparatus, mobile memory and terminal (being generally terminal); Wherein,
Said dynamic password apparatus is used to utilize the seed key of its stored to generate dynamic password;
Said terminal is used for comprising at least to the input of said mobile memory the parameters for authentication of the dynamic password that said dynamic password apparatus generates;
Said mobile memory is connected with said terminal, adopt in the foregoing description can be to the conduct interviews mobile memory of control of read-write operation.
In sum; Because the access control method and the system of mobile memory of the present invention, mobile memory have adopted the access control mechanisms based on dynamic password; Even therefore some passwords leak accidentally also and can not constitute significant threat, the security that has improved mobile memory to the security of mobile memory.
In addition; The user who mobile memory is had access rights also can inform the user who does not have access rights with the present dynamic password; So that this user (being called the casual user) is carried out interim mandate the in the certain limit, the interim mandate finished back (after for example, the casual user extracts the terminal with mobile memory); This casual user can't reuse the dynamic password before known gain access once more, the operation of the password that therefore need not to make amendment.
In addition, because the present invention binds the seed key of user's (ID), token and user's access rights, can carry out different access control to different user'ss (being the different dynamic passwords that seed key generated).Like this, same mobile memory can be held by a plurality of users that have the different access authority, and the user with different access authority can carry out the operation of different level of securitys to this mobile memory.
The above; Be merely the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, any technician who is familiar with the present technique field is in the technical scope that the present invention discloses; The variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection domain of claims.

Claims (13)

1. the access control method of a mobile memory is characterized in that, this method comprises:
Mobile memory is with after the terminal is connected, and mobile memory receives the parameters for authentication that at least comprise dynamic password of user through the input of said terminal;
Mobile memory compares authentication with said dynamic password that comprises in the said parameters for authentication and the local dynamic password that generates of said mobile memory;
Behind the authentication success, the read-write operation that said mobile memory is initiated through the terminal the user control that conducts interviews.
2. the access control method of mobile memory according to claim 1 is characterized in that,
Said dynamic password is:
Based on the dynamic password of time generation, perhaps
Dynamic password based on the challenge code generation.
3. the access control method of mobile memory according to claim 2 is characterized in that,
Said dynamic password is the dynamic password that generates based on challenge code;
The dynamic password that comprises in the said parameters for authentication adopts following mode to generate:
After said mobile memory generates challenge code, send it to said terminal and show or play; After receiving the said challenge code of user's input, dynamic password apparatus generates the dynamic password that comprises in the said parameters for authentication with the seed key of said challenge code and storage as parameter.
4. the access control method of mobile memory according to claim 1 is characterized in that,
Also comprise ID in the said parameters for authentication;
Said mobile memory adopts following mode to generate dynamic password: mobile memory obtains the seed key corresponding with said ID in this locality storage according to the ID that comprises in the said parameters for authentication, calculates dynamic password according to the said seed key that gets access to.
5. the access control method of mobile memory according to claim 1 is characterized in that,
Said mobile memory adopts following mode to generate dynamic password: all seed keys according to this locality storage generate dynamic password respectively;
Adopt following mode that the local dynamic password that generates of the said dynamic password in the said parameters for authentication and said mobile memory is compared authentication: said dynamic password that comprises in the said parameters for authentication and the dynamic password of said mobile memory based on all seed keys generations of its storage are contrasted successively; If identical dynamic password is arranged, then authentication result is an authentication success; If there is not identical dynamic password, then authentication result is an authentification failure.
6. the access control method of mobile memory according to claim 1 is characterized in that, said mobile memory carries out said access control according to the user's of this locality storage access authority information.
7. the access control method of mobile memory according to claim 6 is characterized in that,
Said mobile memory obtains its corresponding said user's access authority information according to the ID that comprises in the said parameters for authentication; Perhaps
Said mobile memory obtains its corresponding said user's access authority information according to said dynamic password.
8. mobile memory, comprising: memory module and data transmission module is characterized in that this storer also comprises: the dynamic password generation module, main control module, wherein,
Said data transmission module is used for the read-write operation request of receiving terminal input and the parameters for authentication that comprises dynamic password at least, and exports it to said main control module;
Said dynamic password generation module is used to generate dynamic password, and exports it to said main control module;
Said main control module; Be used to receive the said parameters for authentication of said data transmission module output and the dynamic password of said dynamic password generation module output; And the dynamic password of the dynamic password that comprises in the said parameters for authentication and said dynamic password generation module output compared authentication, behind the authentication success to the control that conducts interviews of the read-write operation request of the said data transmission module output that receives.
9. mobile memory according to claim 8 is characterized in that, also comprises:
The challenge code generation module is used to generate challenge code and sends to said terminal through said data transmission module and shows or play.
10. according to Claim 8 or 9 described mobile memories, it is characterized in that,
Also comprise ID in the said parameters for authentication that said data transmission module receives;
Said main control module also is used for exporting the ID that the said parameters for authentication that receives comprises to said dynamic password generation module;
Said dynamic password generation module also is used for obtaining the seed key corresponding with said ID that said memory module is stored according to the ID that said parameters for authentication comprises, and calculates dynamic password according to the said seed key that obtains.
11. according to Claim 8 or 9 described mobile memories, it is characterized in that,
Said memory module also is used to store said dynamic password generation module and generates a plurality of seed keys that dynamic password is used;
Said dynamic password generation module also is used for generating dynamic password respectively according to all seed keys of said memory module storage;
Said main control module, the dynamic password of said dynamic password that also is used for said parameters for authentication is comprised and the output of said dynamic password generation module contrasts successively, if identical dynamic password is arranged, then authentication result is an authentication success; If there is not identical dynamic password, then authentication result is an authentification failure.
12. according to Claim 8 or 9 described mobile memories, it is characterized in that,
Said memory module also is used to store user's access authority information;
Said main control module also is used for according to the user's of said memory module storage pairing access rights of access authority information the control that conducts interviews of the read-write operation request of the said data transmission module output that receives.
13. the access control system of a mobile memory is characterized in that, this system comprises: dynamic password apparatus, terminal, and like each described mobile memory of claim 8~12; Wherein,
Said dynamic password apparatus is used to generate dynamic password;
Said terminal is used for comprising the parameters for authentication by the dynamic password of said dynamic password apparatus generation at least to said mobile memory input.
CN2011103372002A 2011-10-31 2011-10-31 Mobile memory and access control method thereof as well as system Pending CN102368230A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011103372002A CN102368230A (en) 2011-10-31 2011-10-31 Mobile memory and access control method thereof as well as system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011103372002A CN102368230A (en) 2011-10-31 2011-10-31 Mobile memory and access control method thereof as well as system

Publications (1)

Publication Number Publication Date
CN102368230A true CN102368230A (en) 2012-03-07

Family

ID=45760795

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011103372002A Pending CN102368230A (en) 2011-10-31 2011-10-31 Mobile memory and access control method thereof as well as system

Country Status (1)

Country Link
CN (1) CN102368230A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102799539A (en) * 2012-06-08 2012-11-28 长沙文盾信息技术有限公司 Safe USB flash disk and data active protection method thereof
CN102868530A (en) * 2012-08-31 2013-01-09 天地融科技股份有限公司 Dynamic password generating method and device
CN104573559A (en) * 2015-01-24 2015-04-29 浙江远望软件有限公司 File storage and access method capable of supporting password authentication and operation log
CN104769602A (en) * 2012-09-06 2015-07-08 Visa欧洲有限公司 Method and system for verifying an access request
CN105468552A (en) * 2014-09-12 2016-04-06 中兴通讯股份有限公司 USB equipment driving method, host and USB equipment
CN105656862A (en) * 2014-11-21 2016-06-08 航天恒星科技有限公司 Authentication method and device
CN107633176A (en) * 2017-09-16 2018-01-26 杭州弼木建筑科技有限公司 The loading system and its method of structural strengthening model based on BIM
CN108173661A (en) * 2018-02-09 2018-06-15 上海林果实业股份有限公司 A kind of dynamic password formation method, device and E-token dynamic password card
CN112087424A (en) * 2020-07-30 2020-12-15 陈碎海 Security authentication system based on enterprise security computer
CN113537638A (en) * 2021-08-13 2021-10-22 重庆大学 Short-term wind pressure prediction method and abnormal data completion method and device for high-rise building

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2746689Y (en) * 2004-06-29 2005-12-14 陈太庚 Module for generating dynamic password in mobile phone and mobile equipment
CN101258507A (en) * 2005-07-08 2008-09-03 桑迪士克股份有限公司 Mass storage device with automated credentials loading
CN201130947Y (en) * 2007-08-28 2008-10-08 上海盛大网络发展有限公司 Hardware token
CN101349998A (en) * 2008-07-25 2009-01-21 杜桦葳 USB memory apparatus
CN201408424Y (en) * 2009-04-02 2010-02-17 同方股份有限公司 Authentication device used for mobile storage device
CN101931530A (en) * 2009-12-14 2010-12-29 北京神州付电子支付科技有限公司 Generation method, authentication method and device for dynamic password and network system
US20110073640A1 (en) * 2009-03-30 2011-03-31 Patrick Faith Emf signature device
CN102075547A (en) * 2011-02-18 2011-05-25 北京天地融科技有限公司 Dynamic password generating method and device and authentication method and system
CN102129294A (en) * 2011-03-02 2011-07-20 北京天地融科技有限公司 Information input method and device thereof

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2746689Y (en) * 2004-06-29 2005-12-14 陈太庚 Module for generating dynamic password in mobile phone and mobile equipment
CN101258507A (en) * 2005-07-08 2008-09-03 桑迪士克股份有限公司 Mass storage device with automated credentials loading
CN201130947Y (en) * 2007-08-28 2008-10-08 上海盛大网络发展有限公司 Hardware token
CN101349998A (en) * 2008-07-25 2009-01-21 杜桦葳 USB memory apparatus
US20110073640A1 (en) * 2009-03-30 2011-03-31 Patrick Faith Emf signature device
CN201408424Y (en) * 2009-04-02 2010-02-17 同方股份有限公司 Authentication device used for mobile storage device
CN101931530A (en) * 2009-12-14 2010-12-29 北京神州付电子支付科技有限公司 Generation method, authentication method and device for dynamic password and network system
CN102075547A (en) * 2011-02-18 2011-05-25 北京天地融科技有限公司 Dynamic password generating method and device and authentication method and system
CN102129294A (en) * 2011-03-02 2011-07-20 北京天地融科技有限公司 Information input method and device thereof

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102799539A (en) * 2012-06-08 2012-11-28 长沙文盾信息技术有限公司 Safe USB flash disk and data active protection method thereof
CN102799539B (en) * 2012-06-08 2016-12-21 湖南文盾信息技术有限公司 A kind of safe USB disk and data active protection method thereof
CN102868530A (en) * 2012-08-31 2013-01-09 天地融科技股份有限公司 Dynamic password generating method and device
CN102868530B (en) * 2012-08-31 2016-01-20 天地融科技股份有限公司 A kind of dynamic password formation method and device
US10282541B2 (en) 2012-09-06 2019-05-07 Visa Europe Limited Method and system for verifying an access request
US10929524B2 (en) 2012-09-06 2021-02-23 Visa Europe Limited Method and system for verifying an access request
CN104769602A (en) * 2012-09-06 2015-07-08 Visa欧洲有限公司 Method and system for verifying an access request
CN105468552A (en) * 2014-09-12 2016-04-06 中兴通讯股份有限公司 USB equipment driving method, host and USB equipment
CN105656862B (en) * 2014-11-21 2019-09-03 航天恒星科技有限公司 Authentication method and device
CN105656862A (en) * 2014-11-21 2016-06-08 航天恒星科技有限公司 Authentication method and device
CN104573559B (en) * 2015-01-24 2018-05-04 浙江远望软件有限公司 It is a kind of to support the storage of the file of password authorization and operation log and access method
CN104573559A (en) * 2015-01-24 2015-04-29 浙江远望软件有限公司 File storage and access method capable of supporting password authentication and operation log
CN107633176A (en) * 2017-09-16 2018-01-26 杭州弼木建筑科技有限公司 The loading system and its method of structural strengthening model based on BIM
CN108173661A (en) * 2018-02-09 2018-06-15 上海林果实业股份有限公司 A kind of dynamic password formation method, device and E-token dynamic password card
CN108173661B (en) * 2018-02-09 2021-02-05 上海林果实业股份有限公司 Dynamic password generation method and device and dynamic password token
CN112087424A (en) * 2020-07-30 2020-12-15 陈碎海 Security authentication system based on enterprise security computer
CN112087424B (en) * 2020-07-30 2022-08-26 陈碎海 Security authentication system based on enterprise security computer
CN113537638A (en) * 2021-08-13 2021-10-22 重庆大学 Short-term wind pressure prediction method and abnormal data completion method and device for high-rise building

Similar Documents

Publication Publication Date Title
CN102368230A (en) Mobile memory and access control method thereof as well as system
US7743409B2 (en) Methods used in a mass storage device with automated credentials loading
EP2442601B1 (en) Method and system for automatically logging in client
Farke et al. {“You} still use the password after {all”}–Exploring {FIDO2} Security Keys in a Small Company
EP1920380B1 (en) Mass storage device with automated credentials loading
KR20080095866A (en) Computer session management device and system
US9858407B2 (en) Secure automatic authorized access to any application through a third party
CN103944877A (en) Method and system for safely logging on bank website based on two-dimension code
Hayashi et al. WebTicket: Account management using printable tokens
KR20020059764A (en) Computerized device for accrediting data application to a software or a service
CN102822835B (en) Portable personal secure network access system
CN106100851A (en) Password management system, intelligent wristwatch and cipher management method thereof
CN109617703B (en) Key management method and device, electronic equipment and storage medium
CN102368773B (en) Access control method of mobile memory, mobile memory and system
CN102387150B (en) Access control method and system of mobile memory and mobile memory
Taylor et al. A comprehensive forensic preservation methodology for crypto wallets
CN107147617A (en) A kind of single-point logging method and device
CN102521164B (en) Access control method of mobile memory, mobile memory and system
JP2008003962A (en) Terminal device authentication system and authentication method and its program using portable telephone
Wilder et al. Multi-factor stateful authentication using nfc, and mobile phones
Eskandari Real-world deployability and usability of Bitcoin
CN113051532A (en) Software authorization method and device, computer equipment and storage medium
JP6844673B2 (en) Electronic devices and access control programs
Redmond Lawlor The Ace Manager: Technical Report
CN108334787B (en) Safety document management system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: 102211 Beijing city Changping District Baishan town 100 Ge Road No. 9 Building No. 2 hospital

Applicant after: Tendyron Technology Co., Ltd.

Address before: 100083, B, block 17, golden building, No. 1810 Qinghua East Road, Beijing, Haidian District

Applicant before: Beijing Tendyron Technology Co., Ltd.

C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120307