CN104125068A - Portable ring-shaped electronic device for information security, and control method - Google Patents

Portable ring-shaped electronic device for information security, and control method Download PDF

Info

Publication number
CN104125068A
CN104125068A CN201410316993.3A CN201410316993A CN104125068A CN 104125068 A CN104125068 A CN 104125068A CN 201410316993 A CN201410316993 A CN 201410316993A CN 104125068 A CN104125068 A CN 104125068A
Authority
CN
China
Prior art keywords
mobile terminal
secret key
finger ring
ring shape
electronic installation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410316993.3A
Other languages
Chinese (zh)
Inventor
刘立
樊镕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN201410316993.3A priority Critical patent/CN104125068A/en
Publication of CN104125068A publication Critical patent/CN104125068A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a portable ring-shaped electronic device for information security, and a control method. The device is provided with a ring-shaped shell, a circuit structure communicating with an external mobile terminal in a wireless manner is arranged in the ring-shaped shell, and the circuit structure is provided with a data storage module, a data processing module and a communication module which are sequentially connected, and a power supply for providing power is further provided. The method comprises the following steps that: corresponding communication and data processing programs are set on the mobile terminal; the mobile terminal displays the information of a request key; a ring handshakes with the mobile terminal through the communication module to establish connection; an encryption working state is entered; a decryption working state is entered. According to the device disclosed by the invention, sensitive information on the mobile terminal can be only decrypted by the intelligent ring when the ring and the mobile terminal are close, therefore, data leakage when the mobile terminal is lost can be effectively avoided; due to the ring shape, the device is convenient to carry by a user at any time, and good in looking, and moreover, the ring is not liable to lose and convenient to use; the device can be used for various information encryption modes.

Description

A kind of portable finger ring shape electronic installation and control method for information security
Technical field
The present invention relates to a kind of electronic installation for information security.Particularly relate to a kind of portable finger ring shape electronic installation and control method for information security.
Background technology
1, the information encryption aspect of mobile intelligent terminal:
At present, the function of mobile intelligent terminal (as mobile phone, panel computer etc.) is not only confined to call and note, and is widely used in the application very high to information security demand such as mobile office, financial payment.Due to volume and power consumption constraints, the safe practice that is applied to desktop computer is not easy for portable terminal device as the U of bank shield etc.Even if add security mechanism (as mobile phone power-on password) in mobile terminal, also may be revealed because intelligent terminal loss makes to be stored in interior information.And due to portable characteristic, mobile terminal is often in the more unsafe applied environment of relative desktop computer, thereby a kind of method or technology that can effectively solve intelligent terminal information encryption just seems particularly urgent.
2, portable electric appts, intelligent finger ring aspect:
Current existing intelligent finger ring (ring) product occurs with design.Existing product can be classified as three classes:
The first kind is mainly with storage and exchange of personal information or mobile phone is carried out to release, as GalaRing, Tuit, Sesame Ring etc. at ring the inside integrated NFC (or RFID) chip.These products and invention and principle thereof can be illustrated by Chinese patent 201310296545.7 " a kind of intelligent ring with short distance authentication ability ".These inventions are stored in personally identifiable information in ring, and the intelligent ring of binding, allows user to continue to operate mobile device in this way; If not being the intelligent ring of binding, refuse user and continue to operate mobile device.
The second is the information indicating device as mobile phone, and the effect of similar and current intelligent bracelet, as Smarty Ring.This class integrated design LED screen, the prompting message on mobile phone can be transferred to ring the inside, also have the functions such as displaying time, bluetooth be anti-lost.
The 3rd class is as intelligent sensor, as Fin.Ring built-in sensors can be followed the tracks of the action of user's thumb.
Summary of the invention
Technical problem to be solved by this invention is; provide a kind of as portable information safety device, realize portable finger ring shape electronic installation and the control method for information security of the E-Payments such as data encryption, authentication, electronic signature and secret protection information needed safety function.
The technical solution adopted in the present invention is: a kind of portable finger ring shape electronic installation for information security, comprise finger circular shell, in described finger circular shell, be provided with the circuit structure communicating with wireless mode and outside mobile terminal, described circuit structure includes:
Data processing module, inside is provided with randomizer, for carrying out information interaction with outside mobile terminal;
Data memory module, with described two-way connection of data processing module, for the information of safe storage encryption and decryption;
Communication module, with described two-way connection of data processing module, for realizing the wireless telecommunications with mobile terminal;
Power supply, is connected with described data processing module, data memory module and communication module respectively, for power supply is provided.
The circulus that described finger circular shell is hollow, is respectively arranged with the shift knob that is electrically connected to inner circuit structure, indicator light and for the mounting groove of power supply is installed in the outside that refers to circular shell.
Described communication module adopts NFC chip or BLK-MD-BC04 series bluetooth module.
Button cell or flexible battery for described power acquisition.
A control method for the portable finger ring shape electronic installation of information security, comprises the steps:
1) initialization: user can carry out setting corresponding communication and data processor on the mobile terminal of communication with finger ring shape electronic installation in advance before use;
2) mobile terminal shows the information of the secret key of request, user opens finger ring shape electronic installation close mobile terminal, by the information of the secret key of communication module mobile terminal receive request, mobile terminal and finger ring are shaken hands and are connected by communication module, enter operating state;
3) enter encrypted work state, the information that secret key is encrypted in the request of the include file id that finger ring shape electronic installation sends by communication module mobile terminal receive, received information is passed to data processing module, randomizer in data processing module produces a secret key, produced secret key is sent to communication module, by communication module, produced secret key is sent to mobile terminal, for mobile terminal encrypt file, mobile terminal is destroyed described secret key after having encrypted, simultaneously, data processing module sends to data memory module preservation by described secret key and corresponding file id, so far, ciphering process finishes,
4) enter decryption work state, the information that secret key is deciphered in the request of the include file id that finger ring shape electronic installation mobile terminal receive sends, received information is passed to data processing module, data processing module is according to file id, the secret key of correspondence in calling data memory module, more secret key is sent to communication module, finally by communication module, secret key is sent to mobile terminal, mobile terminal completes file decryption, and decrypting process completes.
The described communication of setting on mobile terminal and data processor comprise encipheror and decrypted program, wherein, described encipheror comprises, to the request of sending of finger ring shape electronic installation, encrypt the information of secret key, receive the secret key of encryption that finger ring shape electronic installation sends, with the secret key encrypt file of described encryption and encryption, complete after by the secret key destruction of described encryption; Described decrypted program comprises, to finger ring shape electronic installation, sends the information of the secret key of request deciphering, receive the secret key of deciphering that finger ring shape electronic installation sends and with the secret key declassified document of described deciphering.
In described information of encrypting secret key to the request of sending of finger ring shape electronic installation, include the file id that requires encrypt file; In described information from the secret key of request deciphering to finger ring shape electronic installation that send, include the file id that requires declassified document.
When described encrypt file and declassified document are same file, described file id is corresponding with described file with described secret key.
A kind of portable finger ring shape electronic installation and control method for information security of the present invention, have following features:
1, be an independently intelligent finger ring, it is completely separated with in mobile terminal physical as safety device, only have when the two near time can be with the sensitive information on intelligent finger ring decrypting mobile terminal, thereby can effectively avoid when mobile terminal is lost, data are above revealed.
2, finger ring shape, facilitates user to carry at any time, and does not lose attractive in appearancely, and finger ring be difficult for to lose, and is easy to use
3, can be for much information cipher mode.
Accompanying drawing explanation
Fig. 1 is the formation block diagram of the portable finger ring shape electronic installation for information security of the present invention.
In figure
1: data processing module 2: data memory module
3: communication module 4: power supply
Embodiment
Below in conjunction with embodiment and accompanying drawing, a kind of portable finger ring shape electronic installation and control method for information security of the present invention is described in detail.
A kind of portable finger ring shape electronic installation and control method for information security of the present invention, adopt the security mechanism of separate type to deal with.Be stored in sensitive information in mobile terminal and protect by encryption mechanism with application, for the key message encrypted, be stored in an independent separated device as key etc., we are referred to as safety device.Under normal circumstances, mobile terminal and safety device are separated.The two just close contact connecting while only having work, authorization information.The present invention require will meet between safety device and mobile terminal following some:
1, the two is physically separated;
When 2, only the two physical distance approaches, the two just can be mutual;
While 3, needing, the two can quick and conveniently connect;
4, the mobile terminal only allowing can connect with safety device;
5, safety device should be convenient for carrying and be difficult for losing;
6, property easy to use, the two is without physical connection;
7, in addition, from security consideration, the two should be that user is controlled alternately.
A kind of portable finger ring shape electronic installation for information security of the present invention, comprises finger circular shell, is provided with the circuit structure communicating with wireless mode and outside mobile terminal in described finger circular shell.The circulus that described finger circular shell is hollow, is respectively arranged with the shift knob that is electrically connected to inner circuit structure, for the indicator light of display power supply state and for the mounting groove of power supply 4 is installed in the outside that refers to circular shell.
As shown in Figure 1, described circuit structure includes:
Data processing module 1, inside is provided with randomizer, for carrying out information interaction with outside mobile terminal, can adopt chips W NG6 or chip SSX26 etc.
Data memory module 2, the two-way connection of data processing module 1 with described, for the information of safe storage encryption and decryption, can adopt chip PM25LV512A-100SCE.
Communication module 3, with described two-way connection of data processing module 1, for realizing the wireless telecommunications with mobile terminal, described communication module 3 adopts NFC chips or BLK-MD-BC04 series bluetooth module.
Power supply 4, is connected with described data processing module 1, data memory module 2 and communication module 3 respectively, and for power supply is provided, described power supply 4 adopts button cell or flexible battery.
The control method of a kind of portable finger ring shape electronic installation for information security of the present invention, comprises the steps:
1) initialization: user can carry out setting corresponding communication and data processor on the mobile terminal of communication with finger ring shape electronic installation in advance before use;
The described communication of setting on mobile terminal and data processor comprise encipheror and decrypted program, wherein, described encipheror comprises, to the request of sending of finger ring shape electronic installation, encrypt the information of secret key, receive the secret key of encryption that finger ring shape electronic installation sends, with the secret key encrypt file of described encryption and encryption, complete after by the secret key destruction of described encryption; Described decrypted program comprises, to finger ring shape electronic installation, sends the information of the secret key of request deciphering, receive the secret key of deciphering that finger ring shape electronic installation sends and with the secret key declassified document of described deciphering.
In described information of encrypting secret key to the request of sending of finger ring shape electronic installation, include the file id that requires encrypt file; In described information from the secret key of request deciphering to finger ring shape electronic installation that send, include the file id that requires declassified document.When described encrypt file and declassified document are same file, described file id is corresponding with described file with described secret key.
2) mobile terminal shows the information of the secret key of request, user opens finger ring shape electronic installation close mobile terminal by shift knob, by the information of the secret key of communication module mobile terminal receive request, mobile terminal and finger ring are shaken hands and are connected by communication module, enter operating state;
3) enter encrypted work state, the information that secret key is encrypted in the request of the include file id that finger ring shape electronic installation sends by communication module mobile terminal receive, received information is passed to data processing module, randomizer in data processing module produces a secret key, produced secret key is sent to communication module, by communication module, produced secret key is sent to mobile terminal, for mobile terminal encrypt file, mobile terminal is destroyed described secret key after having encrypted, simultaneously, data processing module sends to data memory module preservation by described secret key and corresponding file id, so far, ciphering process finishes,
4) enter decryption work state, the information that secret key is deciphered in the request of the include file id that finger ring shape electronic installation mobile terminal receive sends, received information is passed to data processing module, data processing module is according to file id, the secret key of correspondence in calling data memory module, more secret key is sent to communication module, finally by communication module, secret key is sent to mobile terminal, mobile terminal completes file decryption, and decrypting process completes.
After having worked, at mobile terminal, select to disconnect.Afterwards, close the shift knob on finger ring shape electronic installation.
The control method of a kind of portable finger ring shape electronic installation for information security of the present invention can adopt two kinds of cipher modes when encrypting:
(1) asymmetric encryption
This user's of used for mobile terminal PKI is encrypted file, in terminal, there is no private key, private key is only stored on portable finger ring shape electronic installation, when user need to decipher the file of encrypted mistake, only have finger ring near terminal, carry out corresponding traffic operation, the file with in the private key deciphering terminal of storing on finger ring, just can open file.
(2) symmetric cryptography
First the related circuit by portable finger ring shape electronic installation produces symmetric key, portable finger ring shape electronic installation is near mobile terminal afterwards, symmetric key is passed to mobile terminal by the communication modes between the two, this symmetric key encryption file of used for mobile terminal, after encrypting destroys symmetric key.Afterwards, when needs open file, i.e. in deciphering time,, only having can declassified document with the symmetric key of storing on portable finger ring shape electronic installation, thereby has guaranteed the safety of file.

Claims (8)

1. for a portable finger ring shape electronic installation for information security, comprise finger circular shell, it is characterized in that, in described finger circular shell, be provided with the circuit structure communicating with wireless mode and outside mobile terminal, described circuit structure includes:
Data processing module (1), inside is provided with randomizer, for carrying out information interaction with outside mobile terminal;
Data memory module (2), with described two-way connection of data processing module (1), for the information of safe storage encryption and decryption;
Communication module (3), with described two-way connection of data processing module (1), for realizing the wireless telecommunications with mobile terminal;
Power supply (4), is connected with described data processing module (1), data memory module (2) and communication module (3) respectively, for power supply is provided.
2. a kind of portable finger ring shape electronic installation for information security according to claim 1, it is characterized in that, the circulus that described finger circular shell is hollow, is respectively arranged with the shift knob that is electrically connected to inner circuit structure, indicator light and for the mounting groove of power supply (4) is installed in the outside that refers to circular shell.
3. a kind of portable finger ring shape electronic installation for information security according to claim 1, is characterized in that, described communication module (3) adopts NFC chip or BLK-MD-BC04 series bluetooth module.
4. a kind of portable finger ring shape electronic installation for information security according to claim 1, is characterized in that, described power supply (4) adopts button cell or flexible battery.
5. a control method for the portable finger ring shape electronic installation for information security claimed in claim 1, is characterized in that, comprises the steps:
1) initialization: user can carry out setting corresponding communication and data processor on the mobile terminal of communication with finger ring shape electronic installation in advance before use;
2) mobile terminal shows the information of the secret key of request, user opens finger ring shape electronic installation close mobile terminal, by the information of the secret key of communication module mobile terminal receive request, mobile terminal and finger ring are shaken hands and are connected by communication module, enter operating state;
3) enter encrypted work state, the information that secret key is encrypted in the request of the include file id that finger ring shape electronic installation sends by communication module mobile terminal receive, received information is passed to data processing module, randomizer in data processing module produces a secret key, produced secret key is sent to communication module, by communication module, produced secret key is sent to mobile terminal, for mobile terminal encrypt file, mobile terminal is destroyed described secret key after having encrypted, simultaneously, data processing module sends to data memory module preservation by described secret key and corresponding file id, so far, ciphering process finishes,
4) enter decryption work state, the information that secret key is deciphered in the request of the include file id that finger ring shape electronic installation mobile terminal receive sends, received information is passed to data processing module, data processing module is according to file id, the secret key of correspondence in calling data memory module, more secret key is sent to communication module, finally by communication module, secret key is sent to mobile terminal, mobile terminal completes file decryption, and decrypting process completes.
6. the control method of a kind of portable finger ring shape electronic installation for information security according to claim 5, it is characterized in that, the described communication of setting on mobile terminal and data processor comprise encipheror and decrypted program, wherein, described encipheror comprises, to the request of sending of finger ring shape electronic installation, encrypt the information of secret key, receive the secret key of encryption that finger ring shape electronic installation sends, with the secret key encrypt file of described encryption and encryption, complete after by the secret key destruction of described encryption; Described decrypted program comprises, to finger ring shape electronic installation, sends the information of the secret key of request deciphering, receive the secret key of deciphering that finger ring shape electronic installation sends and with the secret key declassified document of described deciphering.
7. the control method of a kind of portable finger ring shape electronic installation for information security according to claim 5, is characterized in that, in described information of encrypting secret key to the request of sending of finger ring shape electronic installation, includes the file id that requires encrypt file; In described information from the secret key of request deciphering to finger ring shape electronic installation that send, include the file id that requires declassified document.
8. the control method of a kind of portable finger ring shape electronic installation for information security according to claim 7, it is characterized in that, when described encrypt file and declassified document are same file, described file id is corresponding with described file with described secret key.
CN201410316993.3A 2014-07-04 2014-07-04 Portable ring-shaped electronic device for information security, and control method Pending CN104125068A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410316993.3A CN104125068A (en) 2014-07-04 2014-07-04 Portable ring-shaped electronic device for information security, and control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410316993.3A CN104125068A (en) 2014-07-04 2014-07-04 Portable ring-shaped electronic device for information security, and control method

Publications (1)

Publication Number Publication Date
CN104125068A true CN104125068A (en) 2014-10-29

Family

ID=51770340

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410316993.3A Pending CN104125068A (en) 2014-07-04 2014-07-04 Portable ring-shaped electronic device for information security, and control method

Country Status (1)

Country Link
CN (1) CN104125068A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104331672A (en) * 2014-11-24 2015-02-04 小米科技有限责任公司 Method and device for performing confidential treatment on pictures upon bracelet
CN104331796A (en) * 2014-11-04 2015-02-04 北京握奇智能科技有限公司 Wearable device and working method thereof
CN105207779A (en) * 2015-08-13 2015-12-30 北京豪络科技有限公司 Safety hand ring and information encryption and verification system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080022089A1 (en) * 2006-06-26 2008-01-24 Leedom Charles M Security system for handheld wireless devices using-time variable encryption keys
US20100030695A1 (en) * 2008-02-08 2010-02-04 Microsoft Corporation Mobile device security using wearable security tokens
US20100091995A1 (en) * 2008-10-13 2010-04-15 Microsoft Corporation Simple protocol for tangible security
CN102163178A (en) * 2010-02-24 2011-08-24 上海果壳电子有限公司 Secure storage method of data
CN103840942A (en) * 2014-02-19 2014-06-04 宇龙计算机通信科技(深圳)有限公司 Data protection system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080022089A1 (en) * 2006-06-26 2008-01-24 Leedom Charles M Security system for handheld wireless devices using-time variable encryption keys
US20100030695A1 (en) * 2008-02-08 2010-02-04 Microsoft Corporation Mobile device security using wearable security tokens
US20100091995A1 (en) * 2008-10-13 2010-04-15 Microsoft Corporation Simple protocol for tangible security
CN102163178A (en) * 2010-02-24 2011-08-24 上海果壳电子有限公司 Secure storage method of data
CN103840942A (en) * 2014-02-19 2014-06-04 宇龙计算机通信科技(深圳)有限公司 Data protection system and method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104331796A (en) * 2014-11-04 2015-02-04 北京握奇智能科技有限公司 Wearable device and working method thereof
CN104331672A (en) * 2014-11-24 2015-02-04 小米科技有限责任公司 Method and device for performing confidential treatment on pictures upon bracelet
CN105207779A (en) * 2015-08-13 2015-12-30 北京豪络科技有限公司 Safety hand ring and information encryption and verification system and method

Similar Documents

Publication Publication Date Title
KR102340616B1 (en) Apparatus and method for authenticating
CN106534570B (en) A kind of method for secret protection and device
CN205140035U (en) Mobile terminal and intelligent communication system who locks
CN102419805B (en) Terminal equipment and method for encrypting user information
CA2713787C (en) Protocol for protecting content protection data
CN103763091B (en) A kind of application program encryption and decryption method and encryption, decryption device
WO2014083335A4 (en) A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
CN106611310B (en) Data processing method, wearable electronic device and system
CN104182676A (en) Intelligent terminal data encryption method and device
US20190036689A1 (en) Establishing shared key data for wireless pairing
CN103826221A (en) Bluetooth based encryption communication method, and correlation systems and methods
CN103714299A (en) Method and system for encryption and decryption of file of mobile terminal
CN101360142A (en) Method and terminal for information exchange
CN109639702A (en) A kind of data communications method, system and electronic equipment and storage medium
CN103929312A (en) Mobile terminal and method and system for protecting individual information of mobile terminal
IL274593B2 (en) Cellular phone security pack method and apparatus
CN105631298B (en) A kind of ciphering and deciphering device and method
CN104915583A (en) Interface decryption processing method and mobile terminal
CN104125068A (en) Portable ring-shaped electronic device for information security, and control method
CN102332077A (en) Hand-held equipment data encryption and decryption method and hand-held equipment peripheral equipment thereof
CN103702323B (en) A kind of wireless messages security equipment system and method
CN104346586B (en) The method of the storage device and type self-destroyed protection data of type self-destroyed protection data
ES2716887T3 (en) Encryption coding module
CN101853220A (en) Mobile storage device with key removal and storage mechanism
CN101281496A (en) Ciphering type mobile storage apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20141029