CN105207779A - Safety hand ring and information encryption and verification system and method - Google Patents

Safety hand ring and information encryption and verification system and method Download PDF

Info

Publication number
CN105207779A
CN105207779A CN201510498534.6A CN201510498534A CN105207779A CN 105207779 A CN105207779 A CN 105207779A CN 201510498534 A CN201510498534 A CN 201510498534A CN 105207779 A CN105207779 A CN 105207779A
Authority
CN
China
Prior art keywords
safety
mobile phone
bluetooth
secret key
smart mobile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510498534.6A
Other languages
Chinese (zh)
Inventor
常永利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING HAOLUO TECHNOLOGY Co Ltd
Original Assignee
BEIJING HAOLUO TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING HAOLUO TECHNOLOGY Co Ltd filed Critical BEIJING HAOLUO TECHNOLOGY Co Ltd
Priority to CN201510498534.6A priority Critical patent/CN105207779A/en
Publication of CN105207779A publication Critical patent/CN105207779A/en
Pending legal-status Critical Current

Links

Abstract

The invention relates to a safety hand ring and information encryption and verification system and a method and belongs to the wearable electronic equipment field and the information safety technology field. According to the system, a main control is used for controlling and deploying other modules, a vibration control module is used for making a hand ring generate a vibration prompt based on demands, an aluminum cell is used for storing electric energy, a power source management module is used for managing charging and discharging of the hand ring, a USB interface is used for charging the hand ring, a Bluetooth module is used for sending and receiving the Bluetooth signal, and a key storage module is used for generating and storing the key. Physical separation of the key and information is not only realized, sensitive information is further protected from being leaked, an asymmetric encryption algorithm is further utilized to identify identity of a user, so cost is reduced, and safety and certainty of the information are guaranteed through a convenient wearable carrying mode.

Description

A kind of safe bracelet and information encryption and verification system and method
Technical field
The present invention relates to a kind of safe bracelet and information encryption and verification system and method, belong to Wearable electronic equipment field and field of information security technology.
Background technology
In recent years, sensitive data is protected not leaked the hot issue becoming people gradually and pay close attention to; Invader directly can not only steal physical storage device, can also be attacked usurp file data by network mobile network; And due to the needs shared, part sensitive data can be accessed by many people, this also increases the possibility of leakage; Therefore, file is encrypted becomes a kind of generally acknowledged information protection and verification method; Although password and many outstanding cryptographic algorithm have been used by people and developed, user has needed to remember mass data, and needs the manual work completing encrypt and decrypt; Thus for the protection of user's important information and checking bring inconvenience.
Summary of the invention
The present invention is by providing a kind of safe bracelet and information encryption and verification system and method, and information encryption and the service for checking credentials being integrated into hardware unit and this aspect of software APP for user provides convenience.
A kind of safe bracelet and information encryption and verification system, comprise main control module, vibration control module, aluminum cell, power management module, USB interface, bluetooth transceiver module, secret key memory module;
Main control module is responsible for carrying out controlling to other modules and allocating;
Vibration control module in charge is waited where necessary and is made bracelet send vibration prompt;
Aluminum cell is responsible for store electrical energy;
Power management module is responsible for the management of charging and discharging of bracelet;
USB interface is responsible for charging to bracelet;
Bluetooth transceiver module is responsible for transmission to Bluetooth signal and reception;
Secret key memory module is responsible for generating and storing secret key.
A kind of safe bracelet and information encryption and verification method, containing following steps,
Smart mobile phone is connected by bluetooth with the excellent shield of safety, carries out file encryption, and password obtains and identification;
When carrying out file encryption, secret key is stored in the excellent shield of safety;
Smart mobile phone and the excellent shield of intelligence carry out bluetooth and to be connected and smart mobile phone obtains secret key by software APP;
The specified file be stored in mobile phone is encrypted according to respective algorithms after obtaining the secret key of safety by software APP;
When carrying out file decryption, smart mobile phone needs to carry out bluetooth with the excellent shield of safety and is connected, and obtains secret key by software APP;
After software APP obtains the secret key of safety, then according to respective algorithms, the specified file be stored in mobile phone is decrypted.
A kind of safe bracelet and information encryption and verification method, functional realiey relates to the excellent shield of safety and software APP, and the excellent shield of the embedded safety of safe bracelet, software APP can download and be installed on smart mobile phone.
Advantage of the present invention is that smart mobile phone is connected by bluetooth with the excellent shield of safety, and can carry out file encryption, password obtains and identification;
When carrying out file encryption, secret key is stored in the excellent shield of safety; Smart mobile phone and the excellent shield of intelligence carry out bluetooth and to be connected and smart mobile phone obtains secret key by software APP; The specified file be stored in mobile phone is encrypted according to respective algorithms after obtaining the secret key of safety by software APP;
When carrying out file decryption, smart mobile phone needs to carry out bluetooth with the excellent shield of safety and is connected and obtains secret key by software APP; After software APP obtains the secret key of safety, then according to respective algorithms, the specified file be stored in mobile phone is decrypted;
By described encrypt and decrypt mode, make secret key and encrypt file physical isolation; If obtain wherein one separately, still cannot crack encrypt file, thus improve confidentiality and the fail safe of file;
Smart mobile phone and the excellent shield of intelligence carry out bluetooth and to be connected and can by password backup in the excellent shield of safety by software APP; When user forgets Password, can be connected by bluetooth again and obtain password with software APP, improve the information security experience of user;
By the excellent shield of safety with rivest, shamir, adelman, high-precision identity authentication can be carried out to user;
The excellent shield of safety generates a pair secret key, comprises private key and PKI; User is connected by bluetooth and software APP can obtain PKI, and PKI is open to its other party (as: Mobile banking); When carrying out identification, software APP is encrypted authorization information by the private key be kept on the excellent shield of safety; Its other party can only use corresponding PKI carry out identifying to authorization information and decipher, thus carries out identification to user;
Although assailant obtains the PKI that user is applied to its other party (as: Mobile banking), owing to there is no private key, identity or the account of user also cannot be usurped.
The present invention is not by means of only the secret key of physical isolation and information, and further protection sensitive information is not leaked; Also by rivest, shamir, adelman, the identity of user is identified, thus under the prerequisite reduced costs, Wearable carrying mode easy to use, ensure that fail safe and the certainty of information.
Accompanying drawing explanation
When considered in conjunction with the accompanying drawings, by referring to detailed description below, more completely can understand the present invention better and easily learn wherein many adjoint advantages, but accompanying drawing described herein is used to provide a further understanding of the present invention, form a part of the present invention, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention, as schemed wherein:
Fig. 1 is the excellent shield structured flowchart of safety of the present invention;
Fig. 2 is smart mobile phone of the present invention and the excellent shield connection diagram of safety;
Fig. 3 is file encryption of the present invention and deciphering flow chart;
Fig. 4 is identification flow chart of the present invention.
Embodiment
A kind of safe bracelet and information encryption and verification method, functional realiey relates to the excellent shield of safety and software APP, wherein, the excellent shield of the embedded safety of safe bracelet.
As shown in Figure 1, a kind of safe bracelet and information encryption and verification system (safe excellent shield 21), comprise main control module 11, vibration control module 12, aluminum cell 13, power management module 14, usb 15, bluetooth transceiver module 16, secret key memory module 17;
Main control module 11 is responsible for carrying out controlling to other modules and allocating;
Vibration control module 12 is responsible for waiting where necessary making bracelet send vibration prompt;
Aluminum cell 13 is responsible for store electrical energy;
Power management module 14 is responsible for the management of charging and discharging of bracelet;
Usb 15 is responsible for charging to bracelet;
The responsible transmission to Bluetooth signal of bluetooth transceiver module 16 and reception;
Secret key memory module 17 is responsible for generating and storing secret key.
A kind of safe bracelet and information encryption and verification method, functional realiey relates to the excellent shield of safety and software APP;
As shown in Figure 2, software APP23 can download and be installed on smart mobile phone 22; Smart mobile phone 22 is connected by bluetooth with the excellent shield 21 of safety, can carry out file encryption, and password obtains and identification;
As shown in Figure 3, the ciphering process of file comprises following steps:
Step 301: smart mobile phone is connected by bluetooth with the excellent shield of safety, thus ensuing Bluetooth communication can be ensured;
Step 302: open software APP, obtains the secret key of safety by Bluetooth communication from the excellent shield of safety;
Step 303: select the source file be stored on smart mobile phone;
Step 304: by obtaining secret key, software APP calculates accordingly and encodes, thus is encrypted source file;
Step 305: the encrypt file of generation is stored.
The decrypting process of file comprises following steps:
Step 306: smart mobile phone is connected by bluetooth with the excellent shield of safety, thus ensuing Bluetooth communication can be ensured;
Step 307: open software APP, obtains the secret key of safety by Bluetooth communication from the excellent shield of safety;
Step 308: select the encrypt file be stored on smart mobile phone;
Step 309: by obtaining secret key, software APP carries out corresponding inverse operation and inverse coding, thus is decrypted source file;
Step 310: the source file of generation is stored.
By the excellent shield of safety with rivest, shamir, adelman, identification can be carried out to user; The excellent shield of safety generates a pair secret key, comprises private key and PKI; User is connected by bluetooth and software APP can obtain PKI, and PKI is open to its other party (as: Mobile banking); When carrying out identification, software APP is encrypted authorization information by the private key be kept on the excellent shield of safety; Its other party can only use corresponding PKI carry out identifying to authorization information and decipher, thus carries out identification to user.
As shown in Figure 4, carry out identification to user, concrete steps are:
Step 401: the excellent shield of safety generates the secret key of a pile, comprises private key and PKI;
Step 402: by Bluetooth transmission and software APP, PKI is sent to smart mobile phone by the excellent shield of safety;
Step 403: smart mobile phone obtains PKI, and give its other party application (as: Mobile banking) by public key publication
Step 404: the application of its other party obtains user's PKI, and stores PKI;
Step 405: its other party is applied in special screne to be needed to carry out identification checking to user;
Step 406: the application of its other party sends authorization information to smart mobile phone;
Step 407: smart mobile phone obtains authorization information;
Step 408: intelligence is actual to be connected to safety excellent shield acquisition request private key by bluetooth;
Step 409: the excellent shield of safety is agreed to request and sends private key;
Step 410: by obtaining private key, software APP calculates accordingly and encodes, thus is encrypted authorization information;
Step 411: smart mobile phone sends the authorization information after encryption to the application of its other party;
Step 412: its other party is applied the authorization information used public-key to encryption and is decrypted;
Step 413: judge that whether deciphering is successful; If be judged as "Yes", turn to step 414, if be judged as "No", then turn to step 415.
Step 414: user identity identification success, user has the right to carry out next step operation;
Step 415: user identity identification failure, user cannot carry out next step operation.
As mentioned above, embodiments of the invention are explained, but as long as do not depart from inventive point of the present invention in fact and effect can have a lot of distortion, this will be readily apparent to persons skilled in the art; Therefore, such variation is also all included within protection scope of the present invention.

Claims (6)

1. safe bracelet and information encryption and a verification system, is characterized in that comprising main control module, vibration control module, aluminum cell, power management module, USB interface, bluetooth transceiver module, secret key memory module;
Main control module is responsible for carrying out controlling to other modules and allocating;
Vibration control module in charge is waited where necessary and is made bracelet send vibration prompt;
Aluminum cell is responsible for store electrical energy;
Power management module is responsible for the management of charging and discharging of bracelet;
USB interface is responsible for charging to bracelet;
Bluetooth transceiver module is responsible for transmission to Bluetooth signal and reception;
Secret key memory module is responsible for generating and storing secret key.
2. safe bracelet and information encryption and a verification method, is characterized in that containing following steps,
Smart mobile phone is connected by bluetooth with the excellent shield of safety, carries out file encryption, and password obtains and identification;
When carrying out file encryption, secret key is stored in the excellent shield of safety;
Smart mobile phone and the excellent shield of intelligence carry out bluetooth and to be connected and smart mobile phone obtains secret key by software APP;
The specified file be stored in mobile phone is encrypted according to respective algorithms after obtaining the secret key of safety by software APP;
When carrying out file decryption, smart mobile phone needs to carry out bluetooth with the excellent shield of safety and is connected, and obtains secret key by software APP;
After software APP obtains the secret key of safety, then according to respective algorithms, the specified file be stored in mobile phone is decrypted.
3. a kind of safe bracelet according to claim 2 and information encryption and verification method, is characterized in that the ciphering process of file comprises following steps:
Step 301: smart mobile phone is connected by bluetooth with the excellent shield of safety, thus ensuing Bluetooth communication can be ensured;
Step 302: open software APP, obtains the secret key of safety by Bluetooth communication from the excellent shield of safety;
Step 303: select the source file be stored on smart mobile phone;
Step 304: by obtaining secret key, software APP calculates accordingly and encodes, thus is encrypted source file;
Step 305: the encrypt file of generation is stored.
4. a kind of safe bracelet according to claim 2 and information encryption and verification method, is characterized in that the decrypting process of file comprises following steps:
Step 306: smart mobile phone is connected by bluetooth with the excellent shield of safety, thus ensuing Bluetooth communication can be ensured;
Step 307: open software APP, obtains the secret key of safety by Bluetooth communication from the excellent shield of safety;
Step 308: select the encrypt file be stored on smart mobile phone;
Step 309: by obtaining secret key, software APP carries out corresponding inverse operation and inverse coding, thus is decrypted source file;
Step 310: the source file of generation is stored.
5. a kind of safe bracelet according to claim 2 and information encryption and verification method, it is characterized in that by the excellent shield of safety with rivest, shamir, adelman, identification is carried out to user; The excellent shield of safety generates a pair secret key, comprises private key and PKI; User is connected by bluetooth and software APP can obtain PKI, and PKI is open to its other party (as: Mobile banking); When carrying out identification, software APP is encrypted authorization information by the private key be kept on the excellent shield of safety; Its other party can only use corresponding PKI carry out identifying to authorization information and decipher, thus carries out identification to user.
6. a kind of safe bracelet according to claim 5 and information encryption and verification method, it is characterized in that carrying out identification to user, concrete steps are:
Step 401: the excellent shield of safety generates the secret key of a pile, comprises private key and PKI;
Step 402: by Bluetooth transmission and software APP, PKI is sent to smart mobile phone by the excellent shield of safety;
Step 403: smart mobile phone obtains PKI, and give its other party application (Mobile banking) by public key publication;
Step 404: the application of its other party obtains user's PKI, and stores PKI;
Step 405: its other party is applied in special screne to be needed to carry out identification checking to user;
Step 406: the application of its other party sends authorization information to smart mobile phone;
Step 407: smart mobile phone obtains authorization information;
Step 408: intelligence is actual to be connected to safety excellent shield acquisition request private key by bluetooth;
Step 409: the excellent shield of safety is agreed to request and sends private key;
Step 410: by obtaining private key, software APP calculates accordingly and encodes, thus is encrypted authorization information;
Step 411: smart mobile phone sends the authorization information after encryption to the application of its other party;
Step 412: its other party is applied the authorization information used public-key to encryption and is decrypted;
Step 413: judge that whether deciphering is successful; If be judged as "Yes", turn to step 414, if be judged as "No", then turn to step 415;
Step 414: user identity identification success, user has the right to carry out next step operation;
Step 415: user identity identification failure, user cannot carry out next step operation.
CN201510498534.6A 2015-08-13 2015-08-13 Safety hand ring and information encryption and verification system and method Pending CN105207779A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510498534.6A CN105207779A (en) 2015-08-13 2015-08-13 Safety hand ring and information encryption and verification system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510498534.6A CN105207779A (en) 2015-08-13 2015-08-13 Safety hand ring and information encryption and verification system and method

Publications (1)

Publication Number Publication Date
CN105207779A true CN105207779A (en) 2015-12-30

Family

ID=54955235

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510498534.6A Pending CN105207779A (en) 2015-08-13 2015-08-13 Safety hand ring and information encryption and verification system and method

Country Status (1)

Country Link
CN (1) CN105207779A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106255045A (en) * 2016-09-06 2016-12-21 广州市香港科大霍英东研究院 A kind of device pairing method and device
CN106651374A (en) * 2016-12-23 2017-05-10 上海成业智能科技股份有限公司 Mobile security settlement network construction system and use method thereof
CN111970670A (en) * 2020-08-18 2020-11-20 中国银行股份有限公司 APP key management method, device and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103445409A (en) * 2013-09-05 2013-12-18 青岛歌尔声学科技有限公司 Intelligent bracelet
CN104125068A (en) * 2014-07-04 2014-10-29 天津大学 Portable ring-shaped electronic device for information security, and control method
CN104240077A (en) * 2014-09-03 2014-12-24 萧东 Code encryption device based on short-distance wireless communication technology

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103445409A (en) * 2013-09-05 2013-12-18 青岛歌尔声学科技有限公司 Intelligent bracelet
CN104125068A (en) * 2014-07-04 2014-10-29 天津大学 Portable ring-shaped electronic device for information security, and control method
CN104240077A (en) * 2014-09-03 2014-12-24 萧东 Code encryption device based on short-distance wireless communication technology

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106255045A (en) * 2016-09-06 2016-12-21 广州市香港科大霍英东研究院 A kind of device pairing method and device
CN106651374A (en) * 2016-12-23 2017-05-10 上海成业智能科技股份有限公司 Mobile security settlement network construction system and use method thereof
CN111970670A (en) * 2020-08-18 2020-11-20 中国银行股份有限公司 APP key management method, device and system

Similar Documents

Publication Publication Date Title
JP6938702B2 (en) Hearing devices with communication protection and related methods
CN109495274B (en) Decentralized intelligent lock electronic key distribution method and system
KR101894232B1 (en) Method and apparatus for cloud-assisted cryptography
CN107358441B (en) Payment verification method and system, mobile device and security authentication device
CN107896147B (en) Method and system for negotiating temporary session key based on national cryptographic algorithm
KR101239297B1 (en) System for protecting information and method thereof
CN102572817B (en) Method and intelligent memory card for realizing mobile communication confidentiality
CN107317677B (en) Secret key storage and equipment identity authentication method and device
CN105704709B (en) Apparatus for secure hearing device communication and related methods
CN105282179A (en) Family Internet of things security control method based on CPK
CN107104795B (en) Method, framework and system for injecting RSA key pair and certificate
CN111970114B (en) File encryption method, system, server and storage medium
CN101296086A (en) Method, system and device for access authentication
CN102236756A (en) File encryption method based on TCM (trusted cryptography module) and USBkey
CN109600725A (en) A kind of message encryption method based on SM9 algorithm
KR20120051344A (en) Portable integrated security memory device and service processing apparatus and method using the same
CN111540093A (en) Access control system and control method thereof
US20120124378A1 (en) Method for personal identity authentication utilizing a personal cryptographic device
CN103414564A (en) Secrete key card, secrete key device and method for protecting private key
KR102135710B1 (en) Hardware secure module
CN114629639A (en) Key management method and device based on trusted execution environment and electronic equipment
KR20180015667A (en) Method and system for secure SMS communication
CN111583482A (en) Access control system based on two-dimensional code and control method thereof
CN202818612U (en) System capable of blocking unauthorized SMS text messages or bulk SMS text messages
CN110519238B (en) Internet of things security system and communication method based on cryptographic technology

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20151230