CN105207779A - Safety hand ring and information encryption and verification system and method - Google Patents
Safety hand ring and information encryption and verification system and method Download PDFInfo
- Publication number
- CN105207779A CN105207779A CN201510498534.6A CN201510498534A CN105207779A CN 105207779 A CN105207779 A CN 105207779A CN 201510498534 A CN201510498534 A CN 201510498534A CN 105207779 A CN105207779 A CN 105207779A
- Authority
- CN
- China
- Prior art keywords
- safety
- mobile phone
- bluetooth
- secret key
- smart mobile
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention relates to a safety hand ring and information encryption and verification system and a method and belongs to the wearable electronic equipment field and the information safety technology field. According to the system, a main control is used for controlling and deploying other modules, a vibration control module is used for making a hand ring generate a vibration prompt based on demands, an aluminum cell is used for storing electric energy, a power source management module is used for managing charging and discharging of the hand ring, a USB interface is used for charging the hand ring, a Bluetooth module is used for sending and receiving the Bluetooth signal, and a key storage module is used for generating and storing the key. Physical separation of the key and information is not only realized, sensitive information is further protected from being leaked, an asymmetric encryption algorithm is further utilized to identify identity of a user, so cost is reduced, and safety and certainty of the information are guaranteed through a convenient wearable carrying mode.
Description
Technical field
The present invention relates to a kind of safe bracelet and information encryption and verification system and method, belong to Wearable electronic equipment field and field of information security technology.
Background technology
In recent years, sensitive data is protected not leaked the hot issue becoming people gradually and pay close attention to; Invader directly can not only steal physical storage device, can also be attacked usurp file data by network mobile network; And due to the needs shared, part sensitive data can be accessed by many people, this also increases the possibility of leakage; Therefore, file is encrypted becomes a kind of generally acknowledged information protection and verification method; Although password and many outstanding cryptographic algorithm have been used by people and developed, user has needed to remember mass data, and needs the manual work completing encrypt and decrypt; Thus for the protection of user's important information and checking bring inconvenience.
Summary of the invention
The present invention is by providing a kind of safe bracelet and information encryption and verification system and method, and information encryption and the service for checking credentials being integrated into hardware unit and this aspect of software APP for user provides convenience.
A kind of safe bracelet and information encryption and verification system, comprise main control module, vibration control module, aluminum cell, power management module, USB interface, bluetooth transceiver module, secret key memory module;
Main control module is responsible for carrying out controlling to other modules and allocating;
Vibration control module in charge is waited where necessary and is made bracelet send vibration prompt;
Aluminum cell is responsible for store electrical energy;
Power management module is responsible for the management of charging and discharging of bracelet;
USB interface is responsible for charging to bracelet;
Bluetooth transceiver module is responsible for transmission to Bluetooth signal and reception;
Secret key memory module is responsible for generating and storing secret key.
A kind of safe bracelet and information encryption and verification method, containing following steps,
Smart mobile phone is connected by bluetooth with the excellent shield of safety, carries out file encryption, and password obtains and identification;
When carrying out file encryption, secret key is stored in the excellent shield of safety;
Smart mobile phone and the excellent shield of intelligence carry out bluetooth and to be connected and smart mobile phone obtains secret key by software APP;
The specified file be stored in mobile phone is encrypted according to respective algorithms after obtaining the secret key of safety by software APP;
When carrying out file decryption, smart mobile phone needs to carry out bluetooth with the excellent shield of safety and is connected, and obtains secret key by software APP;
After software APP obtains the secret key of safety, then according to respective algorithms, the specified file be stored in mobile phone is decrypted.
A kind of safe bracelet and information encryption and verification method, functional realiey relates to the excellent shield of safety and software APP, and the excellent shield of the embedded safety of safe bracelet, software APP can download and be installed on smart mobile phone.
Advantage of the present invention is that smart mobile phone is connected by bluetooth with the excellent shield of safety, and can carry out file encryption, password obtains and identification;
When carrying out file encryption, secret key is stored in the excellent shield of safety; Smart mobile phone and the excellent shield of intelligence carry out bluetooth and to be connected and smart mobile phone obtains secret key by software APP; The specified file be stored in mobile phone is encrypted according to respective algorithms after obtaining the secret key of safety by software APP;
When carrying out file decryption, smart mobile phone needs to carry out bluetooth with the excellent shield of safety and is connected and obtains secret key by software APP; After software APP obtains the secret key of safety, then according to respective algorithms, the specified file be stored in mobile phone is decrypted;
By described encrypt and decrypt mode, make secret key and encrypt file physical isolation; If obtain wherein one separately, still cannot crack encrypt file, thus improve confidentiality and the fail safe of file;
Smart mobile phone and the excellent shield of intelligence carry out bluetooth and to be connected and can by password backup in the excellent shield of safety by software APP; When user forgets Password, can be connected by bluetooth again and obtain password with software APP, improve the information security experience of user;
By the excellent shield of safety with rivest, shamir, adelman, high-precision identity authentication can be carried out to user;
The excellent shield of safety generates a pair secret key, comprises private key and PKI; User is connected by bluetooth and software APP can obtain PKI, and PKI is open to its other party (as: Mobile banking); When carrying out identification, software APP is encrypted authorization information by the private key be kept on the excellent shield of safety; Its other party can only use corresponding PKI carry out identifying to authorization information and decipher, thus carries out identification to user;
Although assailant obtains the PKI that user is applied to its other party (as: Mobile banking), owing to there is no private key, identity or the account of user also cannot be usurped.
The present invention is not by means of only the secret key of physical isolation and information, and further protection sensitive information is not leaked; Also by rivest, shamir, adelman, the identity of user is identified, thus under the prerequisite reduced costs, Wearable carrying mode easy to use, ensure that fail safe and the certainty of information.
Accompanying drawing explanation
When considered in conjunction with the accompanying drawings, by referring to detailed description below, more completely can understand the present invention better and easily learn wherein many adjoint advantages, but accompanying drawing described herein is used to provide a further understanding of the present invention, form a part of the present invention, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention, as schemed wherein:
Fig. 1 is the excellent shield structured flowchart of safety of the present invention;
Fig. 2 is smart mobile phone of the present invention and the excellent shield connection diagram of safety;
Fig. 3 is file encryption of the present invention and deciphering flow chart;
Fig. 4 is identification flow chart of the present invention.
Embodiment
A kind of safe bracelet and information encryption and verification method, functional realiey relates to the excellent shield of safety and software APP, wherein, the excellent shield of the embedded safety of safe bracelet.
As shown in Figure 1, a kind of safe bracelet and information encryption and verification system (safe excellent shield 21), comprise main control module 11, vibration control module 12, aluminum cell 13, power management module 14, usb 15, bluetooth transceiver module 16, secret key memory module 17;
Main control module 11 is responsible for carrying out controlling to other modules and allocating;
Vibration control module 12 is responsible for waiting where necessary making bracelet send vibration prompt;
Aluminum cell 13 is responsible for store electrical energy;
Power management module 14 is responsible for the management of charging and discharging of bracelet;
Usb 15 is responsible for charging to bracelet;
The responsible transmission to Bluetooth signal of bluetooth transceiver module 16 and reception;
Secret key memory module 17 is responsible for generating and storing secret key.
A kind of safe bracelet and information encryption and verification method, functional realiey relates to the excellent shield of safety and software APP;
As shown in Figure 2, software APP23 can download and be installed on smart mobile phone 22; Smart mobile phone 22 is connected by bluetooth with the excellent shield 21 of safety, can carry out file encryption, and password obtains and identification;
As shown in Figure 3, the ciphering process of file comprises following steps:
Step 301: smart mobile phone is connected by bluetooth with the excellent shield of safety, thus ensuing Bluetooth communication can be ensured;
Step 302: open software APP, obtains the secret key of safety by Bluetooth communication from the excellent shield of safety;
Step 303: select the source file be stored on smart mobile phone;
Step 304: by obtaining secret key, software APP calculates accordingly and encodes, thus is encrypted source file;
Step 305: the encrypt file of generation is stored.
The decrypting process of file comprises following steps:
Step 306: smart mobile phone is connected by bluetooth with the excellent shield of safety, thus ensuing Bluetooth communication can be ensured;
Step 307: open software APP, obtains the secret key of safety by Bluetooth communication from the excellent shield of safety;
Step 308: select the encrypt file be stored on smart mobile phone;
Step 309: by obtaining secret key, software APP carries out corresponding inverse operation and inverse coding, thus is decrypted source file;
Step 310: the source file of generation is stored.
By the excellent shield of safety with rivest, shamir, adelman, identification can be carried out to user; The excellent shield of safety generates a pair secret key, comprises private key and PKI; User is connected by bluetooth and software APP can obtain PKI, and PKI is open to its other party (as: Mobile banking); When carrying out identification, software APP is encrypted authorization information by the private key be kept on the excellent shield of safety; Its other party can only use corresponding PKI carry out identifying to authorization information and decipher, thus carries out identification to user.
As shown in Figure 4, carry out identification to user, concrete steps are:
Step 401: the excellent shield of safety generates the secret key of a pile, comprises private key and PKI;
Step 402: by Bluetooth transmission and software APP, PKI is sent to smart mobile phone by the excellent shield of safety;
Step 403: smart mobile phone obtains PKI, and give its other party application (as: Mobile banking) by public key publication
Step 404: the application of its other party obtains user's PKI, and stores PKI;
Step 405: its other party is applied in special screne to be needed to carry out identification checking to user;
Step 406: the application of its other party sends authorization information to smart mobile phone;
Step 407: smart mobile phone obtains authorization information;
Step 408: intelligence is actual to be connected to safety excellent shield acquisition request private key by bluetooth;
Step 409: the excellent shield of safety is agreed to request and sends private key;
Step 410: by obtaining private key, software APP calculates accordingly and encodes, thus is encrypted authorization information;
Step 411: smart mobile phone sends the authorization information after encryption to the application of its other party;
Step 412: its other party is applied the authorization information used public-key to encryption and is decrypted;
Step 413: judge that whether deciphering is successful; If be judged as "Yes", turn to step 414, if be judged as "No", then turn to step 415.
Step 414: user identity identification success, user has the right to carry out next step operation;
Step 415: user identity identification failure, user cannot carry out next step operation.
As mentioned above, embodiments of the invention are explained, but as long as do not depart from inventive point of the present invention in fact and effect can have a lot of distortion, this will be readily apparent to persons skilled in the art; Therefore, such variation is also all included within protection scope of the present invention.
Claims (6)
1. safe bracelet and information encryption and a verification system, is characterized in that comprising main control module, vibration control module, aluminum cell, power management module, USB interface, bluetooth transceiver module, secret key memory module;
Main control module is responsible for carrying out controlling to other modules and allocating;
Vibration control module in charge is waited where necessary and is made bracelet send vibration prompt;
Aluminum cell is responsible for store electrical energy;
Power management module is responsible for the management of charging and discharging of bracelet;
USB interface is responsible for charging to bracelet;
Bluetooth transceiver module is responsible for transmission to Bluetooth signal and reception;
Secret key memory module is responsible for generating and storing secret key.
2. safe bracelet and information encryption and a verification method, is characterized in that containing following steps,
Smart mobile phone is connected by bluetooth with the excellent shield of safety, carries out file encryption, and password obtains and identification;
When carrying out file encryption, secret key is stored in the excellent shield of safety;
Smart mobile phone and the excellent shield of intelligence carry out bluetooth and to be connected and smart mobile phone obtains secret key by software APP;
The specified file be stored in mobile phone is encrypted according to respective algorithms after obtaining the secret key of safety by software APP;
When carrying out file decryption, smart mobile phone needs to carry out bluetooth with the excellent shield of safety and is connected, and obtains secret key by software APP;
After software APP obtains the secret key of safety, then according to respective algorithms, the specified file be stored in mobile phone is decrypted.
3. a kind of safe bracelet according to claim 2 and information encryption and verification method, is characterized in that the ciphering process of file comprises following steps:
Step 301: smart mobile phone is connected by bluetooth with the excellent shield of safety, thus ensuing Bluetooth communication can be ensured;
Step 302: open software APP, obtains the secret key of safety by Bluetooth communication from the excellent shield of safety;
Step 303: select the source file be stored on smart mobile phone;
Step 304: by obtaining secret key, software APP calculates accordingly and encodes, thus is encrypted source file;
Step 305: the encrypt file of generation is stored.
4. a kind of safe bracelet according to claim 2 and information encryption and verification method, is characterized in that the decrypting process of file comprises following steps:
Step 306: smart mobile phone is connected by bluetooth with the excellent shield of safety, thus ensuing Bluetooth communication can be ensured;
Step 307: open software APP, obtains the secret key of safety by Bluetooth communication from the excellent shield of safety;
Step 308: select the encrypt file be stored on smart mobile phone;
Step 309: by obtaining secret key, software APP carries out corresponding inverse operation and inverse coding, thus is decrypted source file;
Step 310: the source file of generation is stored.
5. a kind of safe bracelet according to claim 2 and information encryption and verification method, it is characterized in that by the excellent shield of safety with rivest, shamir, adelman, identification is carried out to user; The excellent shield of safety generates a pair secret key, comprises private key and PKI; User is connected by bluetooth and software APP can obtain PKI, and PKI is open to its other party (as: Mobile banking); When carrying out identification, software APP is encrypted authorization information by the private key be kept on the excellent shield of safety; Its other party can only use corresponding PKI carry out identifying to authorization information and decipher, thus carries out identification to user.
6. a kind of safe bracelet according to claim 5 and information encryption and verification method, it is characterized in that carrying out identification to user, concrete steps are:
Step 401: the excellent shield of safety generates the secret key of a pile, comprises private key and PKI;
Step 402: by Bluetooth transmission and software APP, PKI is sent to smart mobile phone by the excellent shield of safety;
Step 403: smart mobile phone obtains PKI, and give its other party application (Mobile banking) by public key publication;
Step 404: the application of its other party obtains user's PKI, and stores PKI;
Step 405: its other party is applied in special screne to be needed to carry out identification checking to user;
Step 406: the application of its other party sends authorization information to smart mobile phone;
Step 407: smart mobile phone obtains authorization information;
Step 408: intelligence is actual to be connected to safety excellent shield acquisition request private key by bluetooth;
Step 409: the excellent shield of safety is agreed to request and sends private key;
Step 410: by obtaining private key, software APP calculates accordingly and encodes, thus is encrypted authorization information;
Step 411: smart mobile phone sends the authorization information after encryption to the application of its other party;
Step 412: its other party is applied the authorization information used public-key to encryption and is decrypted;
Step 413: judge that whether deciphering is successful; If be judged as "Yes", turn to step 414, if be judged as "No", then turn to step 415;
Step 414: user identity identification success, user has the right to carry out next step operation;
Step 415: user identity identification failure, user cannot carry out next step operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510498534.6A CN105207779A (en) | 2015-08-13 | 2015-08-13 | Safety hand ring and information encryption and verification system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510498534.6A CN105207779A (en) | 2015-08-13 | 2015-08-13 | Safety hand ring and information encryption and verification system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105207779A true CN105207779A (en) | 2015-12-30 |
Family
ID=54955235
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510498534.6A Pending CN105207779A (en) | 2015-08-13 | 2015-08-13 | Safety hand ring and information encryption and verification system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105207779A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106255045A (en) * | 2016-09-06 | 2016-12-21 | 广州市香港科大霍英东研究院 | A kind of device pairing method and device |
CN106651374A (en) * | 2016-12-23 | 2017-05-10 | 上海成业智能科技股份有限公司 | Mobile security settlement network construction system and use method thereof |
CN111970670A (en) * | 2020-08-18 | 2020-11-20 | 中国银行股份有限公司 | APP key management method, device and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103445409A (en) * | 2013-09-05 | 2013-12-18 | 青岛歌尔声学科技有限公司 | Intelligent bracelet |
CN104125068A (en) * | 2014-07-04 | 2014-10-29 | 天津大学 | Portable ring-shaped electronic device for information security, and control method |
CN104240077A (en) * | 2014-09-03 | 2014-12-24 | 萧东 | Code encryption device based on short-distance wireless communication technology |
-
2015
- 2015-08-13 CN CN201510498534.6A patent/CN105207779A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103445409A (en) * | 2013-09-05 | 2013-12-18 | 青岛歌尔声学科技有限公司 | Intelligent bracelet |
CN104125068A (en) * | 2014-07-04 | 2014-10-29 | 天津大学 | Portable ring-shaped electronic device for information security, and control method |
CN104240077A (en) * | 2014-09-03 | 2014-12-24 | 萧东 | Code encryption device based on short-distance wireless communication technology |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106255045A (en) * | 2016-09-06 | 2016-12-21 | 广州市香港科大霍英东研究院 | A kind of device pairing method and device |
CN106651374A (en) * | 2016-12-23 | 2017-05-10 | 上海成业智能科技股份有限公司 | Mobile security settlement network construction system and use method thereof |
CN111970670A (en) * | 2020-08-18 | 2020-11-20 | 中国银行股份有限公司 | APP key management method, device and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6938702B2 (en) | Hearing devices with communication protection and related methods | |
CN109495274B (en) | Decentralized intelligent lock electronic key distribution method and system | |
KR101894232B1 (en) | Method and apparatus for cloud-assisted cryptography | |
CN107358441B (en) | Payment verification method and system, mobile device and security authentication device | |
CN107896147B (en) | Method and system for negotiating temporary session key based on national cryptographic algorithm | |
KR101239297B1 (en) | System for protecting information and method thereof | |
CN102572817B (en) | Method and intelligent memory card for realizing mobile communication confidentiality | |
CN107317677B (en) | Secret key storage and equipment identity authentication method and device | |
CN105704709B (en) | Apparatus for secure hearing device communication and related methods | |
CN105282179A (en) | Family Internet of things security control method based on CPK | |
CN107104795B (en) | Method, framework and system for injecting RSA key pair and certificate | |
CN111970114B (en) | File encryption method, system, server and storage medium | |
CN101296086A (en) | Method, system and device for access authentication | |
CN102236756A (en) | File encryption method based on TCM (trusted cryptography module) and USBkey | |
CN109600725A (en) | A kind of message encryption method based on SM9 algorithm | |
KR20120051344A (en) | Portable integrated security memory device and service processing apparatus and method using the same | |
CN111540093A (en) | Access control system and control method thereof | |
US20120124378A1 (en) | Method for personal identity authentication utilizing a personal cryptographic device | |
CN103414564A (en) | Secrete key card, secrete key device and method for protecting private key | |
KR102135710B1 (en) | Hardware secure module | |
CN114629639A (en) | Key management method and device based on trusted execution environment and electronic equipment | |
KR20180015667A (en) | Method and system for secure SMS communication | |
CN111583482A (en) | Access control system based on two-dimensional code and control method thereof | |
CN202818612U (en) | System capable of blocking unauthorized SMS text messages or bulk SMS text messages | |
CN110519238B (en) | Internet of things security system and communication method based on cryptographic technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151230 |