CN104125068A - Portable ring-shaped electronic device for information security, and control method - Google Patents
Portable ring-shaped electronic device for information security, and control method Download PDFInfo
- Publication number
- CN104125068A CN104125068A CN201410316993.3A CN201410316993A CN104125068A CN 104125068 A CN104125068 A CN 104125068A CN 201410316993 A CN201410316993 A CN 201410316993A CN 104125068 A CN104125068 A CN 104125068A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- secret key
- finger ring
- ring shape
- electronic installation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention discloses a portable ring-shaped electronic device for information security, and a control method. The device is provided with a ring-shaped shell, a circuit structure communicating with an external mobile terminal in a wireless manner is arranged in the ring-shaped shell, and the circuit structure is provided with a data storage module, a data processing module and a communication module which are sequentially connected, and a power supply for providing power is further provided. The method comprises the following steps that: corresponding communication and data processing programs are set on the mobile terminal; the mobile terminal displays the information of a request key; a ring handshakes with the mobile terminal through the communication module to establish connection; an encryption working state is entered; a decryption working state is entered. According to the device disclosed by the invention, sensitive information on the mobile terminal can be only decrypted by the intelligent ring when the ring and the mobile terminal are close, therefore, data leakage when the mobile terminal is lost can be effectively avoided; due to the ring shape, the device is convenient to carry by a user at any time, and good in looking, and moreover, the ring is not liable to lose and convenient to use; the device can be used for various information encryption modes.
Description
Technical field
The present invention relates to a kind of electronic installation for information security.Particularly relate to a kind of portable finger ring shape electronic installation and control method for information security.
Background technology
1, the information encryption aspect of mobile intelligent terminal:
At present, the function of mobile intelligent terminal (as mobile phone, panel computer etc.) is not only confined to call and note, and is widely used in the application very high to information security demand such as mobile office, financial payment.Due to volume and power consumption constraints, the safe practice that is applied to desktop computer is not easy for portable terminal device as the U of bank shield etc.Even if add security mechanism (as mobile phone power-on password) in mobile terminal, also may be revealed because intelligent terminal loss makes to be stored in interior information.And due to portable characteristic, mobile terminal is often in the more unsafe applied environment of relative desktop computer, thereby a kind of method or technology that can effectively solve intelligent terminal information encryption just seems particularly urgent.
2, portable electric appts, intelligent finger ring aspect:
Current existing intelligent finger ring (ring) product occurs with design.Existing product can be classified as three classes:
The first kind is mainly with storage and exchange of personal information or mobile phone is carried out to release, as GalaRing, Tuit, Sesame Ring etc. at ring the inside integrated NFC (or RFID) chip.These products and invention and principle thereof can be illustrated by Chinese patent 201310296545.7 " a kind of intelligent ring with short distance authentication ability ".These inventions are stored in personally identifiable information in ring, and the intelligent ring of binding, allows user to continue to operate mobile device in this way; If not being the intelligent ring of binding, refuse user and continue to operate mobile device.
The second is the information indicating device as mobile phone, and the effect of similar and current intelligent bracelet, as Smarty Ring.This class integrated design LED screen, the prompting message on mobile phone can be transferred to ring the inside, also have the functions such as displaying time, bluetooth be anti-lost.
The 3rd class is as intelligent sensor, as Fin.Ring built-in sensors can be followed the tracks of the action of user's thumb.
Summary of the invention
Technical problem to be solved by this invention is; provide a kind of as portable information safety device, realize portable finger ring shape electronic installation and the control method for information security of the E-Payments such as data encryption, authentication, electronic signature and secret protection information needed safety function.
The technical solution adopted in the present invention is: a kind of portable finger ring shape electronic installation for information security, comprise finger circular shell, in described finger circular shell, be provided with the circuit structure communicating with wireless mode and outside mobile terminal, described circuit structure includes:
Data processing module, inside is provided with randomizer, for carrying out information interaction with outside mobile terminal;
Data memory module, with described two-way connection of data processing module, for the information of safe storage encryption and decryption;
Communication module, with described two-way connection of data processing module, for realizing the wireless telecommunications with mobile terminal;
Power supply, is connected with described data processing module, data memory module and communication module respectively, for power supply is provided.
The circulus that described finger circular shell is hollow, is respectively arranged with the shift knob that is electrically connected to inner circuit structure, indicator light and for the mounting groove of power supply is installed in the outside that refers to circular shell.
Described communication module adopts NFC chip or BLK-MD-BC04 series bluetooth module.
Button cell or flexible battery for described power acquisition.
A control method for the portable finger ring shape electronic installation of information security, comprises the steps:
1) initialization: user can carry out setting corresponding communication and data processor on the mobile terminal of communication with finger ring shape electronic installation in advance before use;
2) mobile terminal shows the information of the secret key of request, user opens finger ring shape electronic installation close mobile terminal, by the information of the secret key of communication module mobile terminal receive request, mobile terminal and finger ring are shaken hands and are connected by communication module, enter operating state;
3) enter encrypted work state, the information that secret key is encrypted in the request of the include file id that finger ring shape electronic installation sends by communication module mobile terminal receive, received information is passed to data processing module, randomizer in data processing module produces a secret key, produced secret key is sent to communication module, by communication module, produced secret key is sent to mobile terminal, for mobile terminal encrypt file, mobile terminal is destroyed described secret key after having encrypted, simultaneously, data processing module sends to data memory module preservation by described secret key and corresponding file id, so far, ciphering process finishes,
4) enter decryption work state, the information that secret key is deciphered in the request of the include file id that finger ring shape electronic installation mobile terminal receive sends, received information is passed to data processing module, data processing module is according to file id, the secret key of correspondence in calling data memory module, more secret key is sent to communication module, finally by communication module, secret key is sent to mobile terminal, mobile terminal completes file decryption, and decrypting process completes.
The described communication of setting on mobile terminal and data processor comprise encipheror and decrypted program, wherein, described encipheror comprises, to the request of sending of finger ring shape electronic installation, encrypt the information of secret key, receive the secret key of encryption that finger ring shape electronic installation sends, with the secret key encrypt file of described encryption and encryption, complete after by the secret key destruction of described encryption; Described decrypted program comprises, to finger ring shape electronic installation, sends the information of the secret key of request deciphering, receive the secret key of deciphering that finger ring shape electronic installation sends and with the secret key declassified document of described deciphering.
In described information of encrypting secret key to the request of sending of finger ring shape electronic installation, include the file id that requires encrypt file; In described information from the secret key of request deciphering to finger ring shape electronic installation that send, include the file id that requires declassified document.
When described encrypt file and declassified document are same file, described file id is corresponding with described file with described secret key.
A kind of portable finger ring shape electronic installation and control method for information security of the present invention, have following features:
1, be an independently intelligent finger ring, it is completely separated with in mobile terminal physical as safety device, only have when the two near time can be with the sensitive information on intelligent finger ring decrypting mobile terminal, thereby can effectively avoid when mobile terminal is lost, data are above revealed.
2, finger ring shape, facilitates user to carry at any time, and does not lose attractive in appearancely, and finger ring be difficult for to lose, and is easy to use
3, can be for much information cipher mode.
Accompanying drawing explanation
Fig. 1 is the formation block diagram of the portable finger ring shape electronic installation for information security of the present invention.
In figure
1: data processing module 2: data memory module
3: communication module 4: power supply
Embodiment
Below in conjunction with embodiment and accompanying drawing, a kind of portable finger ring shape electronic installation and control method for information security of the present invention is described in detail.
A kind of portable finger ring shape electronic installation and control method for information security of the present invention, adopt the security mechanism of separate type to deal with.Be stored in sensitive information in mobile terminal and protect by encryption mechanism with application, for the key message encrypted, be stored in an independent separated device as key etc., we are referred to as safety device.Under normal circumstances, mobile terminal and safety device are separated.The two just close contact connecting while only having work, authorization information.The present invention require will meet between safety device and mobile terminal following some:
1, the two is physically separated;
When 2, only the two physical distance approaches, the two just can be mutual;
While 3, needing, the two can quick and conveniently connect;
4, the mobile terminal only allowing can connect with safety device;
5, safety device should be convenient for carrying and be difficult for losing;
6, property easy to use, the two is without physical connection;
7, in addition, from security consideration, the two should be that user is controlled alternately.
A kind of portable finger ring shape electronic installation for information security of the present invention, comprises finger circular shell, is provided with the circuit structure communicating with wireless mode and outside mobile terminal in described finger circular shell.The circulus that described finger circular shell is hollow, is respectively arranged with the shift knob that is electrically connected to inner circuit structure, for the indicator light of display power supply state and for the mounting groove of power supply 4 is installed in the outside that refers to circular shell.
As shown in Figure 1, described circuit structure includes:
Data processing module 1, inside is provided with randomizer, for carrying out information interaction with outside mobile terminal, can adopt chips W NG6 or chip SSX26 etc.
Data memory module 2, the two-way connection of data processing module 1 with described, for the information of safe storage encryption and decryption, can adopt chip PM25LV512A-100SCE.
Communication module 3, with described two-way connection of data processing module 1, for realizing the wireless telecommunications with mobile terminal, described communication module 3 adopts NFC chips or BLK-MD-BC04 series bluetooth module.
Power supply 4, is connected with described data processing module 1, data memory module 2 and communication module 3 respectively, and for power supply is provided, described power supply 4 adopts button cell or flexible battery.
The control method of a kind of portable finger ring shape electronic installation for information security of the present invention, comprises the steps:
1) initialization: user can carry out setting corresponding communication and data processor on the mobile terminal of communication with finger ring shape electronic installation in advance before use;
The described communication of setting on mobile terminal and data processor comprise encipheror and decrypted program, wherein, described encipheror comprises, to the request of sending of finger ring shape electronic installation, encrypt the information of secret key, receive the secret key of encryption that finger ring shape electronic installation sends, with the secret key encrypt file of described encryption and encryption, complete after by the secret key destruction of described encryption; Described decrypted program comprises, to finger ring shape electronic installation, sends the information of the secret key of request deciphering, receive the secret key of deciphering that finger ring shape electronic installation sends and with the secret key declassified document of described deciphering.
In described information of encrypting secret key to the request of sending of finger ring shape electronic installation, include the file id that requires encrypt file; In described information from the secret key of request deciphering to finger ring shape electronic installation that send, include the file id that requires declassified document.When described encrypt file and declassified document are same file, described file id is corresponding with described file with described secret key.
2) mobile terminal shows the information of the secret key of request, user opens finger ring shape electronic installation close mobile terminal by shift knob, by the information of the secret key of communication module mobile terminal receive request, mobile terminal and finger ring are shaken hands and are connected by communication module, enter operating state;
3) enter encrypted work state, the information that secret key is encrypted in the request of the include file id that finger ring shape electronic installation sends by communication module mobile terminal receive, received information is passed to data processing module, randomizer in data processing module produces a secret key, produced secret key is sent to communication module, by communication module, produced secret key is sent to mobile terminal, for mobile terminal encrypt file, mobile terminal is destroyed described secret key after having encrypted, simultaneously, data processing module sends to data memory module preservation by described secret key and corresponding file id, so far, ciphering process finishes,
4) enter decryption work state, the information that secret key is deciphered in the request of the include file id that finger ring shape electronic installation mobile terminal receive sends, received information is passed to data processing module, data processing module is according to file id, the secret key of correspondence in calling data memory module, more secret key is sent to communication module, finally by communication module, secret key is sent to mobile terminal, mobile terminal completes file decryption, and decrypting process completes.
After having worked, at mobile terminal, select to disconnect.Afterwards, close the shift knob on finger ring shape electronic installation.
The control method of a kind of portable finger ring shape electronic installation for information security of the present invention can adopt two kinds of cipher modes when encrypting:
(1) asymmetric encryption
This user's of used for mobile terminal PKI is encrypted file, in terminal, there is no private key, private key is only stored on portable finger ring shape electronic installation, when user need to decipher the file of encrypted mistake, only have finger ring near terminal, carry out corresponding traffic operation, the file with in the private key deciphering terminal of storing on finger ring, just can open file.
(2) symmetric cryptography
First the related circuit by portable finger ring shape electronic installation produces symmetric key, portable finger ring shape electronic installation is near mobile terminal afterwards, symmetric key is passed to mobile terminal by the communication modes between the two, this symmetric key encryption file of used for mobile terminal, after encrypting destroys symmetric key.Afterwards, when needs open file, i.e. in deciphering time,, only having can declassified document with the symmetric key of storing on portable finger ring shape electronic installation, thereby has guaranteed the safety of file.
Claims (8)
1. for a portable finger ring shape electronic installation for information security, comprise finger circular shell, it is characterized in that, in described finger circular shell, be provided with the circuit structure communicating with wireless mode and outside mobile terminal, described circuit structure includes:
Data processing module (1), inside is provided with randomizer, for carrying out information interaction with outside mobile terminal;
Data memory module (2), with described two-way connection of data processing module (1), for the information of safe storage encryption and decryption;
Communication module (3), with described two-way connection of data processing module (1), for realizing the wireless telecommunications with mobile terminal;
Power supply (4), is connected with described data processing module (1), data memory module (2) and communication module (3) respectively, for power supply is provided.
2. a kind of portable finger ring shape electronic installation for information security according to claim 1, it is characterized in that, the circulus that described finger circular shell is hollow, is respectively arranged with the shift knob that is electrically connected to inner circuit structure, indicator light and for the mounting groove of power supply (4) is installed in the outside that refers to circular shell.
3. a kind of portable finger ring shape electronic installation for information security according to claim 1, is characterized in that, described communication module (3) adopts NFC chip or BLK-MD-BC04 series bluetooth module.
4. a kind of portable finger ring shape electronic installation for information security according to claim 1, is characterized in that, described power supply (4) adopts button cell or flexible battery.
5. a control method for the portable finger ring shape electronic installation for information security claimed in claim 1, is characterized in that, comprises the steps:
1) initialization: user can carry out setting corresponding communication and data processor on the mobile terminal of communication with finger ring shape electronic installation in advance before use;
2) mobile terminal shows the information of the secret key of request, user opens finger ring shape electronic installation close mobile terminal, by the information of the secret key of communication module mobile terminal receive request, mobile terminal and finger ring are shaken hands and are connected by communication module, enter operating state;
3) enter encrypted work state, the information that secret key is encrypted in the request of the include file id that finger ring shape electronic installation sends by communication module mobile terminal receive, received information is passed to data processing module, randomizer in data processing module produces a secret key, produced secret key is sent to communication module, by communication module, produced secret key is sent to mobile terminal, for mobile terminal encrypt file, mobile terminal is destroyed described secret key after having encrypted, simultaneously, data processing module sends to data memory module preservation by described secret key and corresponding file id, so far, ciphering process finishes,
4) enter decryption work state, the information that secret key is deciphered in the request of the include file id that finger ring shape electronic installation mobile terminal receive sends, received information is passed to data processing module, data processing module is according to file id, the secret key of correspondence in calling data memory module, more secret key is sent to communication module, finally by communication module, secret key is sent to mobile terminal, mobile terminal completes file decryption, and decrypting process completes.
6. the control method of a kind of portable finger ring shape electronic installation for information security according to claim 5, it is characterized in that, the described communication of setting on mobile terminal and data processor comprise encipheror and decrypted program, wherein, described encipheror comprises, to the request of sending of finger ring shape electronic installation, encrypt the information of secret key, receive the secret key of encryption that finger ring shape electronic installation sends, with the secret key encrypt file of described encryption and encryption, complete after by the secret key destruction of described encryption; Described decrypted program comprises, to finger ring shape electronic installation, sends the information of the secret key of request deciphering, receive the secret key of deciphering that finger ring shape electronic installation sends and with the secret key declassified document of described deciphering.
7. the control method of a kind of portable finger ring shape electronic installation for information security according to claim 5, is characterized in that, in described information of encrypting secret key to the request of sending of finger ring shape electronic installation, includes the file id that requires encrypt file; In described information from the secret key of request deciphering to finger ring shape electronic installation that send, include the file id that requires declassified document.
8. the control method of a kind of portable finger ring shape electronic installation for information security according to claim 7, it is characterized in that, when described encrypt file and declassified document are same file, described file id is corresponding with described file with described secret key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410316993.3A CN104125068A (en) | 2014-07-04 | 2014-07-04 | Portable ring-shaped electronic device for information security, and control method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410316993.3A CN104125068A (en) | 2014-07-04 | 2014-07-04 | Portable ring-shaped electronic device for information security, and control method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104125068A true CN104125068A (en) | 2014-10-29 |
Family
ID=51770340
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410316993.3A Pending CN104125068A (en) | 2014-07-04 | 2014-07-04 | Portable ring-shaped electronic device for information security, and control method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104125068A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104331672A (en) * | 2014-11-24 | 2015-02-04 | 小米科技有限责任公司 | Method and device for performing confidential treatment on pictures upon bracelet |
CN104331796A (en) * | 2014-11-04 | 2015-02-04 | 北京握奇智能科技有限公司 | Wearable device and working method thereof |
CN105207779A (en) * | 2015-08-13 | 2015-12-30 | 北京豪络科技有限公司 | Safety hand ring and information encryption and verification system and method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080022089A1 (en) * | 2006-06-26 | 2008-01-24 | Leedom Charles M | Security system for handheld wireless devices using-time variable encryption keys |
US20100030695A1 (en) * | 2008-02-08 | 2010-02-04 | Microsoft Corporation | Mobile device security using wearable security tokens |
US20100091995A1 (en) * | 2008-10-13 | 2010-04-15 | Microsoft Corporation | Simple protocol for tangible security |
CN102163178A (en) * | 2010-02-24 | 2011-08-24 | 上海果壳电子有限公司 | Secure storage method of data |
CN103840942A (en) * | 2014-02-19 | 2014-06-04 | 宇龙计算机通信科技(深圳)有限公司 | Data protection system and method |
-
2014
- 2014-07-04 CN CN201410316993.3A patent/CN104125068A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080022089A1 (en) * | 2006-06-26 | 2008-01-24 | Leedom Charles M | Security system for handheld wireless devices using-time variable encryption keys |
US20100030695A1 (en) * | 2008-02-08 | 2010-02-04 | Microsoft Corporation | Mobile device security using wearable security tokens |
US20100091995A1 (en) * | 2008-10-13 | 2010-04-15 | Microsoft Corporation | Simple protocol for tangible security |
CN102163178A (en) * | 2010-02-24 | 2011-08-24 | 上海果壳电子有限公司 | Secure storage method of data |
CN103840942A (en) * | 2014-02-19 | 2014-06-04 | 宇龙计算机通信科技(深圳)有限公司 | Data protection system and method |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104331796A (en) * | 2014-11-04 | 2015-02-04 | 北京握奇智能科技有限公司 | Wearable device and working method thereof |
CN104331672A (en) * | 2014-11-24 | 2015-02-04 | 小米科技有限责任公司 | Method and device for performing confidential treatment on pictures upon bracelet |
CN105207779A (en) * | 2015-08-13 | 2015-12-30 | 北京豪络科技有限公司 | Safety hand ring and information encryption and verification system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102340616B1 (en) | Apparatus and method for authenticating | |
CN106534570B (en) | A kind of method for secret protection and device | |
CN205140035U (en) | Mobile terminal and intelligent communication system who locks | |
CN102419805B (en) | Terminal equipment and method for encrypting user information | |
CA2713787C (en) | Protocol for protecting content protection data | |
CN103763091B (en) | A kind of application program encryption and decryption method and encryption, decryption device | |
WO2014083335A4 (en) | A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors | |
CN106611310B (en) | Data processing method, wearable electronic device and system | |
CN104182676A (en) | Intelligent terminal data encryption method and device | |
US20190036689A1 (en) | Establishing shared key data for wireless pairing | |
CN103826221A (en) | Bluetooth based encryption communication method, and correlation systems and methods | |
CN103714299A (en) | Method and system for encryption and decryption of file of mobile terminal | |
CN101360142A (en) | Method and terminal for information exchange | |
CN109639702A (en) | A kind of data communications method, system and electronic equipment and storage medium | |
CN103929312A (en) | Mobile terminal and method and system for protecting individual information of mobile terminal | |
IL274593B2 (en) | Cellular phone security pack method and apparatus | |
CN105631298B (en) | A kind of ciphering and deciphering device and method | |
CN104915583A (en) | Interface decryption processing method and mobile terminal | |
CN104125068A (en) | Portable ring-shaped electronic device for information security, and control method | |
CN102332077A (en) | Hand-held equipment data encryption and decryption method and hand-held equipment peripheral equipment thereof | |
CN103702323B (en) | A kind of wireless messages security equipment system and method | |
CN104346586B (en) | The method of the storage device and type self-destroyed protection data of type self-destroyed protection data | |
ES2716887T3 (en) | Encryption coding module | |
CN101853220A (en) | Mobile storage device with key removal and storage mechanism | |
CN101281496A (en) | Ciphering type mobile storage apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20141029 |