CN104732134A - Information safety device with software protection function and authentication method thereof - Google Patents

Information safety device with software protection function and authentication method thereof Download PDF

Info

Publication number
CN104732134A
CN104732134A CN201510171236.6A CN201510171236A CN104732134A CN 104732134 A CN104732134 A CN 104732134A CN 201510171236 A CN201510171236 A CN 201510171236A CN 104732134 A CN104732134 A CN 104732134A
Authority
CN
China
Prior art keywords
information safety
user
safety devices
key
carry out
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510171236.6A
Other languages
Chinese (zh)
Other versions
CN104732134B (en
Inventor
孙吉平
韩勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
Beijing Senseshield Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senseshield Technology Co Ltd filed Critical Beijing Senseshield Technology Co Ltd
Priority to CN201510171236.6A priority Critical patent/CN104732134B/en
Publication of CN104732134A publication Critical patent/CN104732134A/en
Application granted granted Critical
Publication of CN104732134B publication Critical patent/CN104732134B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an information safety device with a software protection function. The information safety device with the software protection function comprises a storage unit, an authentication unit and a NFC communication unit, wherein the storage unit stores a first secret key corresponding to a predetermined privilege level, the authentication unit performs authentication on an operation to be conducted by a user according to the first secret key, the NFC communication unit is configured to receive a second secret key corresponding to a higher privilege level from a specific NFC device or send a privilege request to the specific NFC device according to a request of the user when the privilege level required by the operation to be conducted by the user is higher than the predetermined privilege level, and the authentication unit is further configured to perform the authentication on the operation required by the higher privilege level according to the second secret key or the first secret key after the privilege level is adjusted. The invention further discloses a corresponding authentication method. The information safety device with the software protection function and the authentication method thereof can achieve that administrators conduct authorized control on the operation of the information safety device used by personnel of different privilege levels while the software protection function is achieved.

Description

There is information safety devices and the authentication method thereof of software protection function
Technical field
The present invention relates to information safety devices, particularly a kind of information safety devices with software protection function and the authentication method performed by the information safety devices with software protection function.
Background technology
Nowadays in a lot of production management, research and development, test link, all can relate to data file protection, divulge a secret to prevent vital document.Wherein, encryption device such as USBKey, the encryption lock etc. of type of hardware is used to become common guard method.
In the use procedure of hardware encipher equipment, the rights of using that various level user of service has different stage may be related to.Rights of using are higher, and encrypt file browses that scope is wider or the operable function of hardware device is more.Such as, when using hardware encipher equipment, the functions of the equipments of low level rights of using librarian use are that some single function maybe can only be used for reading the lower file of security classification, when they need the more functions of the equipments of of short duration use or read the encrypt file of higher security classification in the test of software, system or device, exploitation, management and process, input the key of corresponding authority or input Personal Unlocking Key to untie restriction with regard to needing the managerial personnel of high-level rights of using.
Although security can be made like this to improve, but cause a problem: when needing when there being the lower staff of multiple authority in certain operating process frequently to use high-level authority simultaneously, corresponding high-level personnel carry out key input and mandate with regard to needing waste a large amount of time, and low level staff also can waste a lot of time and wait for mandate simultaneously.
Summary of the invention
In view of this, the present invention aims to provide a kind of information safety devices that can obtain the authorization quickly and authentication method thereof, is convenient to the control of managerial personnel to user of service's operating right while realizing the software protection function of information safety devices.
The information safety devices with software protection function provided by the invention comprises: storage unit, and it stores the first key corresponding to predetermined right grade; Authentication ' unit, it is configured to, according to the first key in storage unit, carry out certification to the operation that user will carry out; NFC communication unit, it is configured to when the Permission Levels required by the operation that user will carry out are higher than described predetermined right grade, according to the instruction of user, receive corresponding to the second key of this higher-rights grade or to the request of specific NFC device sending permission from specific NFC device.Wherein, described authentication ' unit is also configured to: according to described second key, carries out certification to the operation of this higher-rights grade of requirement that user will carry out; Or according to be have adjusted described first key of Permission Levels in response to described authority request by this specific NFC device side, certification is carried out to the operation of this higher-rights grade of requirement that the user of described information safety devices will carry out.
In the authentication method that the information safety devices by having software protection function provided by the invention performs, NFC communication unit is provided with in described information safety devices, described authentication method comprises: carry out certification by described information safety devices to the operation that user will carry out, and stores the first key corresponding to predetermined right grade in described information safety devices; When the Permission Levels required by the operation that user will carry out are higher than described predetermined right grade, according to the instruction of user, receive corresponding to the second key of this higher-rights grade or to the request of specific NFC device sending permission by described NFC communication unit from specific NFC device; Utilize described second key, carry out certification by the operation of described information safety devices to this higher-rights grade of requirement that user will carry out, or according to be have adjusted described first key of Permission Levels in response to described authority request by this specific NFC device side, carry out certification by the operation of described information safety devices to this higher-rights grade of requirement that user will carry out.
Information safety devices of the present invention and authentication method thereof; can realize information safety devices to the defencive function of software while; transmitted by the data of card-scanning type, realize managerial personnel quickly and easily and use user of service the management of the operating right of information safety devices to control.
Accompanying drawing explanation
Fig. 1 is the structural representation with an embodiment of the information safety devices of software protection function of the present invention;
Fig. 2 is the process flow diagram of an embodiment of the authentication method that the information safety devices by having software protection function of the present invention performs.
Embodiment
Below in conjunction with accompanying drawing, specific embodiments of the invention are described in detail.
Information safety devices of the present invention can be the hardware encipher equipment of such as USBKey.User can decipher the encrypt file of some corresponding authority grades to carry out browsing, being encrypted operation etc. to specific file with this information safety devices.The authority of user determines how many functions that he can use this information safety devices, may can only use the simple function of information safety devices when authority is lower.
Fig. 1 is the structural representation with an embodiment of the information safety devices of software protection function of the present invention.
As shown in Figure 1, the information safety devices of the present embodiment has storage unit, authentication ' unit and NFC communication unit, wherein, has prestored the first key corresponding to predetermined right grade in storage unit.
Authentication ' unit according to this first key stored in storage unit, can carry out certification to the operation that user will carry out.If the operation that user carries out meets the Permission Levels of himself, then can pass through certification smoothly.
If the Permission Levels required by operation that user will carry out are higher than the predetermined right grade of himself, then NFC communication unit can receive from specific NFC device the second key corresponding to this higher-rights grade under the instruction of user, so that certification is carried out in the operation of this higher-rights grade of requirement that authentication ' unit will be able to be carried out according to this second double secret key user.
Optionally, when the predetermined right grade of the Permission Levels required by the operation that user will carry out higher than himself, NFC communication unit can also to the request of above-mentioned specific NFC device sending permission under the instruction of user.This specific NFC device side (can be this NFC device subsequently, also can be the managerial personnel using this NFC device) after receiving authority request, in key management system, the Permission Levels of first key of user are distributed in adjustment, make the first key through adjustment have the Permission Levels corresponding with the operation that user will carry out.After authority adjustment process, the information safety devices of user namely can according to this first key through adjustment Permission Levels, certification is carried out to the operation of the above-mentioned higher-rights grade of requirement that user will carry out, carries out to allow user the operation that this requires higher-rights grade.
By information safety devices of the present invention; can realize information safety devices to the defencive function of software while; transmitted by the data of card-scanning type, realize managerial personnel quickly and easily and use user of service the management of the operating right of information safety devices to control.
Such as, in one embodiment of the invention, when the user of this information safety devices will browse encrypt file, certification is carried out in the operation that then authentication ' unit can browse this encrypt file according to the first double secret key user, be specially authentication ' unit the first key to be decrypted this encrypt file, if the Permission Levels of Permission Levels and user required by the encrypt file that user will browse self conform to, then authentication ' unit can be deciphered smoothly to this encrypt file, thus user can browse this encrypt file; And if Permission Levels required by this encrypt file are higher than the Permission Levels of user self, then authentication ' unit cannot decipher this encrypt file with the first key, thus user cannot browse this encrypt file.
When the browser document that user will carry out operation required by the Permission Levels of Permission Levels higher than user self time, user can propose the application browsing the encrypt file of higher level of security to the managerial personnel having super-ordinate right, when managerial personnel agree to authorize, the NFC communication unit of user's log-on message safety equipment, these managerial personnel also start oneself NFC device, by NFC communication between the two, the second key corresponding to higher-rights grade is transferred to the information safety devices of user from the NFC device of managerial personnel.
After obtaining the second key, user can carry out the operation of the encrypt file browsing above-mentioned requirements super-ordinate right again.Authentication ' unit can be browsed this operation requiring the encrypt file of super-ordinate right according to the second double secret key user and carry out certification, be specially authentication ' unit the second key and be decrypted this encrypt file, thus user can browse this encrypt file.
Optionally, when the Permission Levels of the Permission Levels required by the encrypt file that user will browse higher than user self, user can also utilize the NFC communication unit in information safety devices to the above-mentioned specific NFC device sending permission request of managerial personnel, can comprise the first key stored in the storage unit of information safety devices in authority request.After this specific NFC device receives authority request, by this specific NFC device or use the managerial personnel of this specific NFC device to adjust the Permission Levels of the first key distributing to user in key management system, the first key through adjustment is made to have the Permission Levels corresponding with the encrypt file that user will browse.Afterwards, authentication ' unit in the information safety devices of user namely can according to this first key through adjustment Permission Levels, certification is carried out in operation user being browsed to the encrypt file of above-mentioned requirements higher-rights grade, be specially authentication ' unit the first key to be decrypted this encrypt file, thus user can browse this encrypt file.
In another embodiment of the present invention, when the user of this information safety devices will use the specific function of information safety devices, authentication ' unit can use the operation of information safety devices specific function to carry out certification according to the first double secret key user, is specially this specific function whether Permission Levels (namely the Permission Levels of user self) that authentication ' unit confirms that the first double secret key is answered allow to use information safety devices.If the Permission Levels of the Permission Levels required by this specific function and user that user will use self conform to, then authentication ' unit makes this specific function open to user, thus user can use this specific function of information safety devices; And if Permission Levels required by this specific function are higher than the Permission Levels of user self, then authentication ' unit locks this specific function, thus user cannot use this specific function of information safety devices.
When the Permission Levels of the Permission Levels required by the operation that user uses information safety devices specific function higher than user self, user can propose to the managerial personnel having super-ordinate right to use this to have the application of the specific function that higher Permission Levels require, when managerial personnel agree to authorize, the NFC communication unit of user's log-on message safety equipment, these managerial personnel also start oneself NFC device, by NFC communication between the two, the second key corresponding to higher-rights grade is transferred to the information safety devices of user from the NFC device of managerial personnel.
After obtaining the second key, user can attempt the specific function of the above-mentioned requirements super-ordinate right of log-on message safety equipment again.Authentication ' unit can start this operation requiring the specific function of super-ordinate right according to the second double secret key user and carry out certification, be specially this specific function that authentication ' unit confirms the Permission Levels permission use information safety devices that the second double secret key is answered, therefore authentication ' unit makes this specific function open to user, thus user can use this specific function of information safety devices.
In one embodiment of the invention, the portable mobile communication apparatus that this NFC device of managerial personnel can be rfid card, NFC bracelet or mobile phone and so on have NFC function, so that realize the authorization control of card-scanning type.
In another embodiment, supvr is transferred to the second key of the information safety devices of user by NFC device can be the temporary key with certain effective time limit.This temporary key can be stored in the storage unit of information safety devices.This effective time limit can be such as 1 hour, 3 hours or 1 day etc.When user browses the specific function of the high-level authority of requirement of high-level encrypt file or log-on message safety equipment after acquisition second key at every turn, authentication ' unit can carry out certification according to the operation of the second double secret key user, if the second key is also within effective time limit, then user is allowed to browse the specific function of this encrypt file or log-on message safety equipment; If authentication ' unit confirms that the second key lost efficacy, person is not then prohibitted the use to browse the specific function of this encrypt file or log-on message safety equipment.By the present embodiment, managerial personnel can carry out elastic management to the operating right of user, and eliminate user and operate at every turn and all need to seek that managerial personnel authorize is loaded down with trivial details.
In addition, information safety devices is when realizing software protection function, if main frame is PC, information safety devices can be connected with main-machine communication by USB interface, and instruction or the data of Receiving Host process, and complete software protection function; If main frame is the portable handheld terminal equipment with NFC module, information safety devices can start the Passive Mode of NFC communication unit, completes software protection process between hand-held terminal device and information safety devices by NFC communication.
Fig. 2 is the process flow diagram of an embodiment of the authentication method that the information safety devices by having software protection function of the present invention performs.
As shown in Figure 2, the authentication method of the present embodiment comprises: utilize the first key corresponding to predetermined right grade be stored in information safety devices, carry out certification by information safety devices to the operation that user will carry out.If the operation that user carries out meets the Permission Levels of himself, then can pass through certification smoothly.If the Permission Levels required by operation that user will carry out are higher than the predetermined right grade of himself, then under the instruction of user, correspond to this higher-rights grade the second key can be received or to this specific NFC device sending permission request by being arranged in information safety devices NFC communication unit from specific NFC device, so as can to utilize this second key or through these specific NFC device side adjustment Permission Levels the first key, carry out certification by the operation of information safety devices to this higher-rights grade of requirement that user will carry out.
Such as, in one embodiment of the invention, when the user of information safety devices will browse encrypt file, user browses this encrypt file by information safety devices based on the first double secret key user stored and is decrypted, if the Permission Levels of Permission Levels and user required by the encrypt file that user will browse self conform to, then can decipher smoothly this encrypt file, thus user can browse this encrypt file; And if the Permission Levels required by this encrypt file are higher than the Permission Levels of user self, then cannot decipher this encrypt file with the first key, thus user cannot browse this encrypt file.
When the browser document that user will carry out operation required by the Permission Levels of Permission Levels higher than user self time, user can propose the application browsing the encrypt file of higher level of security to the managerial personnel having super-ordinate right, when managerial personnel agree to authorize, by the NFC communication between the NFC communication unit of information safety devices and the NFC device of managerial personnel, the second key corresponding to higher-rights grade is transferred to the information safety devices of user from the NFC device of managerial personnel.
After obtaining the second key, user utilizes the encrypt file of the second key to above-mentioned requirements super-ordinate right to be decrypted by information safety devices, thus user can browse this encrypt file.
Optionally, when the Permission Levels of the Permission Levels required by the encrypt file that user will browse higher than user self, user can also utilize the NFC communication unit in information safety devices to the above-mentioned specific NFC device sending permission request of managerial personnel, can comprise the first key stored in the information safety devices of user in authority request.After this specific NFC device receives authority request, or can use the managerial personnel of this specific NFC device in key management system, adjust the Permission Levels of the first key distributing to user by this specific NFC device, make the first key through adjustment have the Permission Levels corresponding with the encrypt file that user will browse.Afterwards, user is namely according to the first key of this process adjustment Permission Levels, be decrypted this encrypt file by information safety devices, thus user can browse this encrypt file.In another embodiment of the present invention, when the user of this information safety devices will use the specific function of information safety devices, if information safety devices confirms this specific function of Permission Levels (namely the Permission Levels of user self) the permission use information safety devices that the first double secret key is answered, then make this specific function open to user; And if the Permission Levels required by this specific function are higher than the Permission Levels of user self, then lock this specific function, thus user cannot use this specific function of information safety devices.
At this moment, user can propose to the managerial personnel having super-ordinate right to use this to have the application of the specific function that higher Permission Levels require, when managerial personnel agree to authorize, by the NFC communication between the NFC communication unit of information safety devices and the NFC device of managerial personnel, the second key corresponding to higher-rights grade is transferred to the information safety devices of user from the NFC device of managerial personnel.
After obtaining the second key, information safety devices confirms this specific function of the Permission Levels permission use information safety devices that the second double secret key is answered, therefore make this specific function open to user, thus user can use this specific function of information safety devices.
In one embodiment of the invention, the portable mobile communication apparatus that this NFC device of managerial personnel can be rfid card, NFC bracelet or mobile phone and so on have NFC function, so that realize the authorization control of card-scanning type.
In another embodiment, managerial personnel are transferred to the second key of the information safety devices of user by NFC device can be the temporary key with certain effective time limit.This temporary key can be stored in the storage unit of information safety devices.This effective time limit can be such as 1 hour, 3 hours or 1 day etc.When user browses the specific function of the high-level authority of requirement of high-level encrypt file or log-on message safety equipment after acquisition second key at every turn, information safety devices can carry out certification according to the operation of the second double secret key user, if the second key is also within effective time limit, then user is allowed to browse the specific function of this encrypt file or log-on message safety equipment; If the second key lost efficacy, person was not then prohibitted the use to browse the specific function of this encrypt file or log-on message safety equipment.By the present embodiment, managerial personnel can carry out elastic management to the operating right of user, and eliminate user and operate at every turn and all need to seek that managerial personnel authorize is loaded down with trivial details.
In addition, information safety devices is when realizing software protection function, if main frame is PC, information safety devices can be connected with main-machine communication by USB interface, and instruction or the data of Receiving Host process, and complete software protection function; If main frame is the portable handheld terminal equipment with NFC module, information safety devices can start the Passive Mode of NFC communication unit, completes software protection process between hand-held terminal device and information safety devices by NFC communication.
The foregoing is only preferred embodiment of the present invention, be not intended to limit protection scope of the present invention.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.

Claims (12)

1. have an information safety devices for software protection function, it is characterized in that, this information safety devices comprises:
Storage unit, it stores the first key corresponding to predetermined right grade;
Authentication ' unit, it is configured to according to the first key in storage unit, carries out certification to the operation that the user of described information safety devices will carry out;
NFC communication unit, it is configured to when the Permission Levels required by the operation that user will carry out are higher than described predetermined right grade, according to the instruction of user, receive corresponding to the second key of this higher-rights grade or to the request of specific NFC device sending permission from specific NFC device
Wherein, described authentication ' unit is also configured to: according to described second key, carries out certification to the operation of this higher-rights grade of requirement that user will carry out; Or according to be have adjusted described first key of Permission Levels in response to described authority request by this specific NFC device side, certification is carried out to the operation of this higher-rights grade of requirement that the user of described information safety devices will carry out.
2. information safety devices according to claim 1, is characterized in that,
Described operation comprises the specific function of enabling described information safety devices, then
Described NFC communication cell location, for when the Permission Levels required by the described specific function that will enable are higher than described predetermined right grade, according to the instruction of user, receives the second key corresponding to this higher-rights grade from specific NFC device, and
Described authentication ' unit is configured to, according to described second key, carry out certification to the operation of enabling described specific function.
3. information safety devices according to claim 1, is characterized in that, described operation comprises browses encrypt file.
4. information safety devices according to any one of claim 1 to 3, is characterized in that, described second key is the temporary key with certain effective time limit.
5. information safety devices according to any one of claim 1 to 3, is characterized in that, described specific NFC device is rfid card, NFC bracelet or have the portable mobile communication apparatus of NFC function.
6. information safety devices according to any one of claim 1 to 3, is characterized in that, it carries out communicating to realize software protection function with the main frame of operating software by USB interface or described NFC communication unit.
7., by the authentication method that the information safety devices with software protection function performs, it is characterized in that, in described information safety devices, be provided with NFC communication unit, described authentication method comprises:
By described information safety devices, certification is carried out to the operation that user will carry out, in described information safety devices, store the first key corresponding to predetermined right grade;
When the Permission Levels required by the operation that user will carry out are higher than described predetermined right grade, according to the instruction of user, receive corresponding to the second key of this higher-rights grade or to the request of specific NFC device sending permission by described NFC communication unit from specific NFC device;
Utilize described second key, carry out certification by the operation of described information safety devices to this higher-rights grade of requirement that user will carry out, or according to be have adjusted described first key of Permission Levels in response to described authority request by this specific NFC device side, carry out certification by the operation of described information safety devices to this higher-rights grade of requirement that user will carry out.
8. authentication method according to claim 7, is characterized in that,
Described operation comprises the specific function of enabling described information safety devices, then
When the Permission Levels required by the described specific function that will enable are higher than described predetermined right grade, according to the instruction of user, received the second key corresponding to this higher-rights grade from specific NFC device by described NFC communication unit, and
Utilize described second key, by described information safety devices, certification carried out to the operation of enabling described specific function.
9. authentication method according to claim 7, is characterized in that, described operation comprises browses encrypt file.
10. the authentication method according to any one of claim 7 to 9, is characterized in that, described second key is the temporary key with certain effective time limit.
11. authentication methods according to any one of claim 7 to 9, is characterized in that, described specific NFC device is rfid card, NFC bracelet or have the portable mobile communication apparatus of NFC function.
12. authentication methods according to any one of claim 7 to 9, it is characterized in that, described information safety devices carries out communicating to realize software protection function with the main frame of operating software by USB interface or described NFC communication unit.
CN201510171236.6A 2015-04-10 2015-04-10 Information safety devices and its authentication method with software protection function Active CN104732134B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510171236.6A CN104732134B (en) 2015-04-10 2015-04-10 Information safety devices and its authentication method with software protection function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510171236.6A CN104732134B (en) 2015-04-10 2015-04-10 Information safety devices and its authentication method with software protection function

Publications (2)

Publication Number Publication Date
CN104732134A true CN104732134A (en) 2015-06-24
CN104732134B CN104732134B (en) 2017-09-12

Family

ID=53456014

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510171236.6A Active CN104732134B (en) 2015-04-10 2015-04-10 Information safety devices and its authentication method with software protection function

Country Status (1)

Country Link
CN (1) CN104732134B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411885A (en) * 2016-09-29 2017-02-15 广州鹤互联网科技有限公司 Safety management method and system for electronic endorsement
CN109831442A (en) * 2019-02-25 2019-05-31 中云信安(深圳)科技有限公司 A kind of safe electronic official document packet system
CN117201148A (en) * 2023-09-19 2023-12-08 广东维信智联科技有限公司 Enterprise document encryption protection system based on computer

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101504743A (en) * 2009-03-20 2009-08-12 宇龙计算机通信科技(深圳)有限公司 Mobile terminal payment method and split type mobile terminal
CN102255967A (en) * 2011-07-11 2011-11-23 宇龙计算机通信科技(深圳)有限公司 Synchronizing method, device, server and synchronizing system
CN102457377A (en) * 2011-08-08 2012-05-16 中标软件有限公司 Role-based web remote authentication and authorization method and system thereof
US20140067682A1 (en) * 2012-08-15 2014-03-06 Tencent Technology (Shenzhen) Company Limited. Nfc-based information exchange method and device
CN104392165A (en) * 2014-11-10 2015-03-04 广州日滨科技发展有限公司 Identity authorization controlling method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101504743A (en) * 2009-03-20 2009-08-12 宇龙计算机通信科技(深圳)有限公司 Mobile terminal payment method and split type mobile terminal
CN102255967A (en) * 2011-07-11 2011-11-23 宇龙计算机通信科技(深圳)有限公司 Synchronizing method, device, server and synchronizing system
CN102457377A (en) * 2011-08-08 2012-05-16 中标软件有限公司 Role-based web remote authentication and authorization method and system thereof
US20140067682A1 (en) * 2012-08-15 2014-03-06 Tencent Technology (Shenzhen) Company Limited. Nfc-based information exchange method and device
CN104392165A (en) * 2014-11-10 2015-03-04 广州日滨科技发展有限公司 Identity authorization controlling method and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411885A (en) * 2016-09-29 2017-02-15 广州鹤互联网科技有限公司 Safety management method and system for electronic endorsement
CN109831442A (en) * 2019-02-25 2019-05-31 中云信安(深圳)科技有限公司 A kind of safe electronic official document packet system
CN117201148A (en) * 2023-09-19 2023-12-08 广东维信智联科技有限公司 Enterprise document encryption protection system based on computer
CN117201148B (en) * 2023-09-19 2024-05-14 广东维信智联科技有限公司 Enterprise document encryption protection system based on computer

Also Published As

Publication number Publication date
CN104732134B (en) 2017-09-12

Similar Documents

Publication Publication Date Title
US8923514B2 (en) Apparatus and method for authentication for motor vehicles
CN100517354C (en) Computer implemented method for securely acquiring a binding key and securely binding system
CN105205898A (en) Electronic code permission management system for intelligent lock
CN102065148A (en) Memory system access authorizing method based on communication network
WO2014083335A4 (en) A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
CN102638568A (en) Cloud storage system and data management method thereof
EP2937806A1 (en) Method and system for securing electronic data exchange between an industrial programmable device and a portable programmable device
CN106911476B (en) Encryption and decryption device and method
CN106162537B (en) A kind of method, wireless telecom equipment and the terminal of safety certification connection
WO2013123453A1 (en) Data storage devices, systems, and methods
CN106330442A (en) Identity authentication method, device and system
CN102947836A (en) Storage device, host device, and method for communicating a password between first and second storage devices using a double-encryption scheme
JP2013515301A (en) Method, system and smart card for realizing general-purpose card system
CN105064805A (en) Intelligent door lock control system
CN103929312A (en) Mobile terminal and method and system for protecting individual information of mobile terminal
CN105631298B (en) A kind of ciphering and deciphering device and method
CN104915583A (en) Interface decryption processing method and mobile terminal
CN102938762B (en) A kind of file safety management system based on mobile terminal
CN104333452A (en) Multi-account encryption method for file data
CN104732134A (en) Information safety device with software protection function and authentication method thereof
CN103596175A (en) Mobile intelligent terminal certification system and method based on near field communication technology
CN105787319A (en) Iris recognition-based portable terminal and method for same
CN103164661A (en) Device and method used for managing data in terminal
CN101415185A (en) Mobile terminal, method and system for keeping secret of platform-striding information
KR101680536B1 (en) Method for Service Security of Mobile Business Data for Enterprise and System thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Applicant after: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

Address before: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Applicant before: BEIJING SHENSI SHUDUN TECHNOLOGY Co.,Ltd.

COR Change of bibliographic data
CB02 Change of applicant information

Address after: 100193 Beijing, Haidian District, East West Road, No. 10, East Hospital, building No. 5, floor 5, layer 510

Applicant after: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

Address before: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Applicant before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

COR Change of bibliographic data
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee after: Beijing Shendun Technology Co.,Ltd.

Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.