CN102654014A - Anti-disclosure method used after losing financial data safe - Google Patents

Anti-disclosure method used after losing financial data safe Download PDF

Info

Publication number
CN102654014A
CN102654014A CN201110048354XA CN201110048354A CN102654014A CN 102654014 A CN102654014 A CN 102654014A CN 201110048354X A CN201110048354X A CN 201110048354XA CN 201110048354 A CN201110048354 A CN 201110048354A CN 102654014 A CN102654014 A CN 102654014A
Authority
CN
China
Prior art keywords
safety cabinet
safe
finance data
owner
financial data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201110048354XA
Other languages
Chinese (zh)
Inventor
陆东昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201110048354XA priority Critical patent/CN102654014A/en
Publication of CN102654014A publication Critical patent/CN102654014A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a financial data safe and discloses an anti-disclosure method used after losing the financial data safe. The anti-disclosure method used after losing the financial data safe provided by the invention comprises the following steps of: when a system is initialized, initializing a built-in wireless communication module and an infrared detecting device, and detecting an electric quantity of a lithium battery; when a user opens the safe, carrying out permission verification, and judging whether the safe is illegally opened or not through the infrared detecting device after the permission verification is failed; if the safe is illegally opened, turning on a positioning module to calculate a current approximate position of the financial data safe, and sending a message to an owner of the safe; after the financial data safe is lost, continuously receiving the message; after judging a received message sent by the owner to request to destroy financial data, turning on a paper shredder arranged inside the safe to entirely destroy the financial data, and noticing the owner that the data is successfully destroyed through the message, so that the purpose of preventing against disclosure is achieved after the financial data safe is lost.

Description

A kind of finance data safety cabinet is lost the method that rear defence is divulged a secret
Technical field
The present invention relates to a kind of finance data safety cabinet and lose the method that rear defence is divulged a secret, relate in particular to the method that to locate and can destroy finance data in the safety cabinet after a kind of the losing.
Background technology
Modern society, the raising of Along with people's investment awareness and domestic economy are followed the development of international finance relation to a certain extent, and it is extremely important that the confidentiality of business finance data just becomes.On the one hand being people causes producing very many finance datas to the enthusiasm of international finance; On the other hand, because the leakage of a state or party secret happens occasionally, the illegal probability that uses of finance data quilt is also than greatly improving before.
At present, because the electronic banking data receive hacker or the attack of virus and the imperfection property of electronic signature, causing the business finance data is main carrier with traditional paper still.For these papery finance datas of safety of data are placed in the safety cabinet usually, to a certain extent, can prevent that through cryptographic check the business finance data are by illegal use.Present realization flow figure is as shown in Figure 1:
Step 101, the finance data safety cabinet of packing into.
Step 102, the user locks to safety cabinet.
Step 103, the user in the needs data, the opening safety cabinet.
Step 104 is opened authorization check.If electronic password lock then carries out cryptographic check by single-chip microcomputer according to pre-set programs.
Step 105 judges whether to have the authority of opening.If the authority of opening, then execution in step 106; Otherwise, return step 104 and allow user's retry.
Step 106, authorization check passes through, and the finance data safety cabinet is opened automatically.
Step 107, the user accomplishes the operation of opening safety cabinet, obtains the finance data that needs.
Yet there is following problem in said method:
(1) when the user attempts opening safety cabinet and carries out authorization check, when the continuous retry password of disabled user, the finance data safety cabinet is not informed the owner of safety cabinet.
When (2) illegally opening safety cabinet after the user right authentication failed, there is not judges whether to adopt illegal means to open safety cabinet.
(3) after the finance data safety cabinet is lost, prior art does not provide the general location information of safety cabinet, and the safety cabinet owner can't find.
(4) when confirming can't recover after safety cabinet is lost, prior art can't prevent divulging a secret of finance data.
Summary of the invention
The object of the present invention is to provide a kind of finance data safety cabinet to lose the method that rear defence is divulged a secret, the finance data safety cabinet in this method is made up of wireless communication module, infra-red ray detection device and shredder.This method is initialization system in finance data safety cabinet start back; In authorization check, the owner can be informed, and illegal opening safety cabinet can be judged whether; Locating information is provided after safety cabinet is lost and can destroys the significant data in the safety cabinet.
For solving the problems of the technologies described above, embodiment of the present invention provides a kind of finance data safety cabinet to lose the method that rear defence is divulged a secret, and comprises following steps:
After the safety cabinet start, intiating radio communication network and infrared scanner;
After above-mentioned system initialization finishes; The finance data safety cabinet gets into standby; Wait for that the user inputs password and carries out authorization check, can send preset SMS when appearance is unusual in the process of authorization check and inform the safety cabinet owner, and judge whether safety cabinet is illegally opened;
After judging that safety cabinet is illegally opened, obtain the general location of current safety cabinet through wireless communications network base station information, and send short messages and inform the owner;
After safety cabinet was lost, system started built-in shredder and thoroughly destroys the finance data in the safety cabinet after receiving the possessory note order of safety cabinet.
Embodiment of the present invention is judged in authorization check whether safety cabinet is illegally opened, and is informed the owner in terms of existing technologies; After safety cabinet is lost, calculate the current location of finance data safety cabinet automatically and inform the owner through wireless network; Under the situation that safety cabinet can't be recovered, can thoroughly destroy built-in finance data, realized that finance data no longer divulges a secret after losing.
Description of drawings
Fig. 1 is the flow chart of prior art;
Fig. 2 is the system block diagram in the embodiment of the present invention;
Fig. 3 is the flow chart of system initialization module in the embodiment of the present invention;
Fig. 4 is the flow chart of authorization check module in the embodiment of the present invention;
Fig. 5 is a flow chart of losing the back locating module in the embodiment of the present invention;
Fig. 6 is the flow chart of the anti-data self-destruction module of divulging a secret in the embodiment of the present invention.
The specific embodiment
Embodiment of the present invention relates to a kind of finance data safety cabinet and loses the method that rear defence is divulged a secret.Idiographic flow is as shown in Figure 2.
In step 202, accomplish initialization, in this step, need intiating radio communication network and the built-in infra-red ray detection device of finance data safety cabinet, wherein also need detect the electric weight of lithium battery, guarantee that lithium battery power supply is lasting system.
Specifically, as shown in Figure 3, in step 301, the finance data safety cabinet is prepared initialization.
In step 302, the wireless network of intiating radio communication module.Here adopt the network (access of Time Division-Synchronous CDMA Time Division-Synchronous Code Division Multiple Access) of the TD-SCDMA standard in 3G (the 3rd-generation 3G (Third Generation) Moblie technology) network to carry data communication.
In step 303, judge whether netinit is successful.Can judge through network signal.If success, execution in step 304; Otherwise return step 302 and continue to attempt the intiating radio network.
In step 304, the initialization infra-red ray detection device.Whether this device is used to detect the hatch door of finance data safety cabinet and opens.
In step 305, judge whether the infrared facility initialization is successful.The initialization success is execution in step 306 then; Otherwise return step 304.
In step 306, detect the electric weight of lithium battery.
In step 307, judge that whether whether normally, can supply power to safety cabinet electric weight under alternating current cuts off the power supply the situation of a period of time.Electric weight is execution in step 308 then normally; Otherwise execution in step 309.
In step 308, the finance data safety cabinet gets into standby.
In step 309, judge when battery electric quantity is not enough, through alternating current to lithium cell charging.
Step 310 is accomplished the initialization of system.
After the initial work of having accomplished whole system and network, get into step 203, the user carries out authorization check earlier after hoping to open safety cabinet; After finding that safety cabinet is lost, position and inform the owner; When safety cabinet can't be recovered, receive and thoroughly destroy finance data when possessory note is ordered.
Specifically, in the flow process of authorization check module, judge through infra-red ray detection device whether safety cabinet is illegally opened, and the owner of SMS notification safety cabinet.
Particular flow sheet is as shown in Figure 4, and step 401 is in the standby of finance data safety cabinet.
In step 402, the user prepares to open safety cabinet.
In step 403, the input password carries out authorization check.
In step 404, judge whether authorization check is successful.Success, then execution in step 405; Otherwise, execution in step 406.
In step 405, think that validated user normally opens the banking and insurance business cabinet.
In step 406, judge whether the frequency of failure reaches the upper limit.If reach the upper limit, then execution in step 407; Otherwise return step 403.
Step 407, the SMS notification owner authorization check frequency of failure reaches the upper limit.
In step 408, the built-in infrared facility of opening safety cabinet.
In step 409, the noctovisor scan hatch door is opened distance.
In step 410, judge whether safety cabinet is opened by force.Distance value through judging the hatch door unlatching that infra-red ray detection device is obtained is judged.Be that then execution in step 411; Otherwise, execution in step 409.
In step 411, SMS notification owner finance data safety cabinet is opened by force.
In step 412, get into and lose the back locating module.
Step 401 is that the finance data safety cabinet is opened authorization check to 412, the possessory flow process of SMS notification when noting abnormalities.After accomplishing this flow process, the back locating module is lost in follow-up entering.
The flow process of losing the back locating module in this embodiment is as shown in Figure 5.
Step 501, the finance data safety cabinet is lost.
In step 502, after safety cabinet was lost, the wireless network of intiating radio communication module guaranteed that network successfully connects once more.
In step 503, judge whether the wireless network initialization is successful.Signal strength signal intensity through network is judged.Success, then execution in step 504; Otherwise, return step 502.
In step 504, obtain the MCC and the MNC of current operator.
In step 505, obtain the LAC and the CELLID of current Access Network.
In step 506, calculate the geographical position of finance data safety cabinet according to base station location.
In step 507, will in a last step, obtain network and geographical location information group bag.
In step 508, send the owner that locating information is given the finance data safety cabinet.
Step 501 to step 508 has promptly been accomplished the Primary Location work after the finance data safety cabinet is lost, the locating information that obtains is sent to the safety cabinet owner after, follow-up entering step 206.
The flow process of the anti-data self-destruction module of divulging a secret in this embodiment is as shown in Figure 6.
Step 601 is in the standby of finance data safety cabinet.
In step 602, the wireless network of intiating radio communication module.Under material circumstance, must guarantee cordless communication network initialization success.
In step 603, judge whether the wireless network initialization is successful.Signal strength signal intensity through network is judged.Success, then execution in step 604, otherwise, return step 602.
In step 604, messaging engine receives note.
In step 605, judge whether to be the anti-self-destruction note of divulging a secret.Conclude through judging number of sender and self-defining peculiar short message content.If then execution in step 606; Otherwise, return step 604 and continue to receive note.
In step 606, the built-in shredder of opening safety cabinet.
In step 607, input tray begins paper feeding.
In step 608, judge whether shredded paper is complete.Be that then execution in step 609; Otherwise, return step 607 and continue paper feeding, shredded paper.
Step 609 is sent note and is informed safety cabinet owner data self-destruction success.
Step 610, the self-destruction of finance data safety cabinet data finishes.
Be not difficult to find that in this embodiment, first intiating radio communication network and infrared scanner have also detected the electric weight of lithium battery in initialized process.After accomplishing system initialization, the finance data safety cabinet gets into standby.When carrying out authorization check, the password input surpasses certain number of times can inform the owner through note; Judge through the unlatching of infrared detection hatch door and the input of password whether safety cabinet is illegally opened; After assert that safety cabinet is lost,, and inform the owner through note through the effect an insurance current general location of cabinet of cordless communication network; After the finance data safety cabinet receives that the owner sends the note of destroying data, starts the thoroughly important finance data of destruction of built-in shredder, and inform that through note owner's finance data destroys successfully.
Step in the said method is divided, and is just clear in order to describe, and can merge into a step during realization and perhaps some step split, and is decomposed into a plurality of steps, as long as comprise identical logical relation, all in the protection domain of this patent; To adding inessential modification in the algorithm or in the flow process or introduce inessential design, but the core design that does not change its algorithm and flow process is all in the protection domain of this patent.
What deserves to be mentioned is that each involved in this embodiment module is logic module, in practical application, a logical block can be a physical location, also can be the part of a physical location, can also realize with the combination of a plurality of physical locations.In addition, for outstanding innovation part of the present invention, will not introduce in this embodiment, but this does not show the unit that does not have other in this embodiment with solving the not too close unit of technical problem relation proposed by the invention.Above-mentioned embodiment is to realize specific embodiment of the present invention, and in practical application, can be in form with on the details it is done various changes, and without departing from the spirit and scope of the present invention.

Claims (4)

1. a finance data safety cabinet is characterized in that losing the method that rear defence is divulged a secret, and comprises following steps:
After the system initialization success, get into standby, prepare to carry out authorization check;
After the authorization check failure, the general location that the cabinet that effects an insurance is current is also informed the owner;
, safety cabinet thoroughly destroys the data in the safety cabinet when can't recovering according to possessory order.
2. a kind of finance data safety cabinet according to claim 1 is characterized in that losing the method that rear defence is divulged a secret, in authorization check, may further comprise the steps:
After the input of password mistake reaches certain number of times, inform the owner through note;
After the password input error reaches certain number of times, start infra-red ray detection device detection hatch door and whether illegally opened.
3. a kind of finance data safety cabinet according to claim 1 and 2 is characterized in that losing the method that rear defence is divulged a secret, and after the finance data safety cabinet is lost, carries out Primary Location through the position of calculating base station in the cordless communication network, and informs the owner.
According to claim 1 or 2 or 3 described a kind of finance data safety cabinets losing the method that rear defence is divulged a secret, it is characterized in that, after the finance data safety cabinet is lost,, thoroughly destroy finance data through built-in shredder according to the order of owner's note.
CN201110048354XA 2011-03-01 2011-03-01 Anti-disclosure method used after losing financial data safe Pending CN102654014A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110048354XA CN102654014A (en) 2011-03-01 2011-03-01 Anti-disclosure method used after losing financial data safe

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110048354XA CN102654014A (en) 2011-03-01 2011-03-01 Anti-disclosure method used after losing financial data safe

Publications (1)

Publication Number Publication Date
CN102654014A true CN102654014A (en) 2012-09-05

Family

ID=46729732

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110048354XA Pending CN102654014A (en) 2011-03-01 2011-03-01 Anti-disclosure method used after losing financial data safe

Country Status (1)

Country Link
CN (1) CN102654014A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104863452A (en) * 2015-05-22 2015-08-26 苏州帅马金属制品有限公司 Secure filebox for office
CN105512524A (en) * 2014-09-24 2016-04-20 中兴通讯股份有限公司 Method and device for controlling access right on terminal device
CN106837057A (en) * 2017-03-30 2017-06-13 天津立言科技有限公司 A kind of safe system with paper shredding function
CN115162892A (en) * 2022-07-14 2022-10-11 重庆昕晟环保科技有限公司 Anti-disclosure control device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105512524A (en) * 2014-09-24 2016-04-20 中兴通讯股份有限公司 Method and device for controlling access right on terminal device
CN104863452A (en) * 2015-05-22 2015-08-26 苏州帅马金属制品有限公司 Secure filebox for office
CN106837057A (en) * 2017-03-30 2017-06-13 天津立言科技有限公司 A kind of safe system with paper shredding function
CN115162892A (en) * 2022-07-14 2022-10-11 重庆昕晟环保科技有限公司 Anti-disclosure control device
CN115162892B (en) * 2022-07-14 2023-09-12 重庆昕晟环保科技有限公司 Anti-disclosure control device

Similar Documents

Publication Publication Date Title
CN100365641C (en) Method for protecting computer login using disposable password
CN102624699B (en) Method and system for protecting data
CN103370717B (en) Always-available embedded theft reaction subsystem
CN102984115B (en) A kind of network security method and client-server
Jansen et al. Guidelines on cell phone and PDA security
CN105144670A (en) Wireless networking-enabled personal identification system
US20200322790A1 (en) Method for unlocking sim card and mobile terminal
CN101511083B (en) Authentication method and terminal for telecom smart card
CN102215221A (en) Methods and systems for secure remote wake, boot, and login to a computer from a mobile device
CN101237353B (en) A method and system for monitoring mobile storage device based on USBKEY
CN103793960A (en) Method for mobile key service
CN103530559A (en) Integrity protection system of Android system
CN104519479A (en) Methods for terminal to lock net and unlock net
CN101593550A (en) High strength encrypting USB flash disk for police
CN102654014A (en) Anti-disclosure method used after losing financial data safe
CN1713756A (en) Security guarantee for memory data information of mobile terminal
CN109460648B (en) Computer data defense method
CN108388810A (en) A kind of mobile encrypted hard disk and encryption method of having electronic fence function
CN103391195B (en) A kind of method of work of dynamic token
CN106911744A (en) The management method and managing device of a kind of image file
CN111490973A (en) Network account security protection method and device
CN111600701B (en) Private key storage method, device and storage medium based on blockchain
CN104182667B (en) Data guard method and device based on screen locking
CN104852904B (en) A kind of Server remote method for restarting applied based on cell phone application and Encrypted short message ceases
CN102541766A (en) Classified memory with security information protecting function based on WSN (wireless sensor network) base station control

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
DD01 Delivery of document by public notice

Addressee: Lu Donghao

Document name: Notification of Publication of the Application for Invention

DD01 Delivery of document by public notice

Addressee: Lu Donghao

Document name: Notification of before Expiration of Request of Examination as to Substance

DD01 Delivery of document by public notice

Addressee: Lu Donghao

Document name: Notification that Application Deemed to be Withdrawn

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120905