CN106295307A - A kind of method realizing encrypted U disk data based on image password - Google Patents

A kind of method realizing encrypted U disk data based on image password Download PDF

Info

Publication number
CN106295307A
CN106295307A CN201610687348.1A CN201610687348A CN106295307A CN 106295307 A CN106295307 A CN 106295307A CN 201610687348 A CN201610687348 A CN 201610687348A CN 106295307 A CN106295307 A CN 106295307A
Authority
CN
China
Prior art keywords
module
graphical passwords
password
dish
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610687348.1A
Other languages
Chinese (zh)
Inventor
徐超
谭守标
李正平
黄林生
许耀华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhu Zhenhua Rongke Intelligent Technology Co Ltd
Original Assignee
Wuhu Zhenhua Rongke Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhu Zhenhua Rongke Intelligent Technology Co Ltd filed Critical Wuhu Zhenhua Rongke Intelligent Technology Co Ltd
Priority to CN201610687348.1A priority Critical patent/CN106295307A/en
Publication of CN106295307A publication Critical patent/CN106295307A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A kind of method realizing encrypted U disk data based on image password, comprises the following steps: (1) is respectively provided with graphical passwords input area on U dish, graphical passwords stores module, supply module, on & off switch, graphical passwords arrange module, graphical passwords acquisition module, graphical passwords detection module;Described Password Input district includes that four summits that matts, matts include on matts, the midpoint of four sideline sections, 1 central point amount to nine points, and any adjacent point can form pattern password by line;Arranging virus killing module, wireless communication module in described U dish, wireless communication module is connected with the Wi-Fi in environment;Virus killing module realizes virus base by wireless communication module and upgrades;(2) image password is arranged;(3) image password input;(4) image password detection.Image password as checking means, is increased virus killing module so that the safety of USB flash disk is greatly promoted by the present invention simultaneously, it addition, make the operation of U dish more simply, uses more convenient.

Description

A kind of method realizing encrypted U disk data based on image password
Technical field
The present invention relates to a kind of USB flash disk, be specifically related to a kind of method realizing encrypted U disk data based on image password, belong to Electronic storage device technical field.
Background technology
Along with progress and the development of science and technology of society, U dish is simple to operate with it, and the advantage being convenient for carrying has become as to be worked as The important selection mode of lower people's data copy, but during using U dish, still can there is a lot of problem, such as: If U dish is stolen, if the inside stores again the most important data, then consequence is hardly imaginable, and using Journey all can cause owing to having suffered virus etc. other reasons the loss of vital data of U dish, the most any situation, all can The place of a lot of inconvenience is easily lost and safety currently for the data in U dish in correlation technique to our work strip The highest problem, the most not yet proposes effective solution.
Notification number is 101196967, Chinese invention patent disclosed in 11 days June in 2008 of publication date disclose a kind of based on Image password realizes the method for encrypted U disk data, and management process is as follows: 1) utilize WatchKEY Pro smart card as management Key, carries out trusted medium registed authorization to U dish, first checks for whether U dish is that WatchKEY Pro authorizes during registed authorization The U dish that factory produces, and judge U dish the most registed authorization according to the authorization message in U dish private area, register and awarded That weighs is considered safe U dish, if not registered mandate, then allows U dish is carried out registed authorization;2) peace of registered mandate When formality for public use handled by full U dish, setting different security domains according to the U dish that is not all of security requirements, security domain information is with close Literary composition form writes safe U dish private area, and according to the security domain information set, limiting U dish can only make in the security domain specified With;3) by capture Windows bottom message, computer port change information is read, it is ensured that computer port is not illegally made With;4) by Windows SDK file input and output technology is extended, the change that file is occurred is captured, by U dish Place of safety is as monitored path, the file operation in monitoring U dish;5) by Windows Shell technology is expanded Exhibition, expands in system right button menu by place of safety closing function, and user only need to click on right mouse button and realize the closedown of place of safety. Use technique scheme, need WatchKEY Pro smart card as management key, operation complexity, use inconvenience.
Notification number is 105740719A, the Chinese invention patent in publication date on July 6th, 2016 discloses a kind of wireless security The implementation method of U dish, including: binding step: by this wireless security U dish and a mobile terminal binding;Connection Step: by this nothing Wireless connections relation is set up between line safe U dish and this mobile terminal;Judge step: judge whether this wireless security U dish connects Enter to an electronic third-party equipment;Credit step: when this wireless security U dish accesses to an electronic third-party equipment, this is wireless Safe U dish sends credit solicited message to this mobile terminal;Response of step: this mobile terminal receives this wireless security U dish After the credit solicited message sent, it is judged that whether this credit solicited message meets credit condition, meets in this credit solicited message During credit condition, transmit credit by information to this wireless security U dish;Clearance step: this wireless security U dish is receiving this When credit is by information, the access limit of this wireless security U dish of letting pass;Read-write step: electronic third-party equipment is in this wireless peace After full U dish clearance access limit, read and write the data file in this wireless security U dish.Use technique scheme, operating time Long, serviceability is not good enough.
Accordingly, it would be desirable to a kind of new U dish method for managing security.
Summary of the invention
It is an object of the invention to provide a kind of method realizing encrypted U disk data based on image password, image password is made For checking means, increase virus killing module so that the safety of USB flash disk is greatly promoted simultaneously, it addition, make the operation of U dish more simply, Use more convenient.
It is an object of the invention to be achieved through the following technical solutions, a kind of realize encrypted U disk data based on image password Method, described implementation method comprises the following steps:
(1) be respectively provided with graphical passwords input area on U dish, graphical passwords stores module, supply module, on & off switch, figure are close Code arranges module, graphical passwords acquisition module, graphical passwords detection module;Described Password Input district includes matts, matts Including that on matts four summits, the midpoint of four sideline sections, 1 central point amount to nine points, any adjacent point can connect Line forms pattern password;Virus killing module, wireless communication module are set in described U dish, wireless with environment of wireless communication module Networking is connected;Virus killing module realizes virus base by wireless communication module and upgrades;
(2) user arranges module by the graphical passwords on U dish and carries out graphical passwords setting, and user passes through Password Input district pair Nine points carry out line and form graphical passwords, and graphical passwords is saved in graphical passwords storage module;
(3) open described USB flash disk when user by & off switch, trigger graphical passwords input area, graphical passwords by starting module Input area shows " please input " word;
(4) user is by the figure answer of graphical passwords input area input user, and graphical passwords acquisition module will get User figure answer send to graphical passwords detection module, graphical passwords detection module compare the figure answer of user with Being set in advance in graphical passwords and store the figure answer in module the most unanimously, if both are consistent, graphical passwords input area shows Show " welcoming to use " word;If inconsistent, graphical passwords input area will send " code error please re-enter " password.
Preferably, described wireless communication module is bluetooth communication module.
Preferably, described wireless communication module is wifi communication module.
Preferably, described user in 24 hours the chance of input picture password be 2-8 time.
Preferably, described user in 24 hours the chance of input picture password be 3-5 time.
Compared with prior art, the method have the advantages that the present invention using image password as checking means, with Shi Zengjia kills virus module so that the safety of USB flash disk is greatly promoted, it addition, make the operation of U dish simpler, uses more convenient.
Detailed description of the invention
A kind of method realizing encrypted U disk data based on image password, comprises the following steps:
(1) be respectively provided with graphical passwords input area on U dish, graphical passwords stores module, supply module, on & off switch, figure are close Code arranges module, graphical passwords acquisition module, graphical passwords detection module;Described Password Input district includes matts, matts Including that on matts four summits, the midpoint of four sideline sections, 1 central point amount to nine points, any adjacent point can connect Line forms pattern password;Virus killing module, wireless communication module are set in described U dish, wireless with environment of wireless communication module Networking is connected;Virus killing module realizes virus base by wireless communication module and upgrades;
(2) user arranges module by the graphical passwords on U dish and carries out graphical passwords setting, and user passes through Password Input district pair Nine points carry out line and form graphical passwords, and graphical passwords is saved in graphical passwords storage module;
(3) open described USB flash disk when user by & off switch, trigger graphical passwords input area, graphical passwords by starting module Input area shows " please input " word;
(4) user is by the figure answer of graphical passwords input area input user, and graphical passwords acquisition module will get User figure answer send to graphical passwords detection module, graphical passwords detection module compare the figure answer of user with Being set in advance in graphical passwords and store the figure answer in module the most unanimously, if both are consistent, graphical passwords input area shows Show " welcoming to use " word;If inconsistent, graphical passwords input area will send " code error please re-enter " password.
Preferably, described wireless communication module is bluetooth communication module.
Preferably, described wireless communication module is wifi communication module.
Preferably, described user in 24 hours the chance of input picture password be 2-8 time.
Preferably, described user in 24 hours the chance of input picture password be 3-5 time.
Image password as checking means, is increased virus killing module so that the safety of USB flash disk carries significantly by the present invention simultaneously Rise, it addition, make the operation of U dish more simply, use more convenient.

Claims (5)

1. the method realizing encrypted U disk data based on image password, is characterized in that, described implementation method includes following step Rapid:
(1) be respectively provided with graphical passwords input area on U dish, graphical passwords stores module, supply module, on & off switch, figure are close Code arranges module, graphical passwords acquisition module, graphical passwords detection module;Described Password Input district includes matts, matts Including that on matts four summits, the midpoint of four sideline sections, 1 central point amount to nine points, any adjacent point can connect Line forms pattern password;Virus killing module, wireless communication module are set in described U dish, wireless with environment of wireless communication module Networking is connected;Virus killing module realizes virus base by wireless communication module and upgrades;
(2) user arranges module by the graphical passwords on U dish and carries out graphical passwords setting, and user passes through Password Input district pair Nine points carry out line and form graphical passwords, and graphical passwords is saved in graphical passwords storage module;
(3) open described USB flash disk when user by & off switch, trigger graphical passwords input area, graphical passwords by starting module Input area shows " please input " word;
(4) user is by the figure answer of graphical passwords input area input user, and graphical passwords acquisition module will get User figure answer send to graphical passwords detection module, graphical passwords detection module compare the figure answer of user with Being set in advance in graphical passwords and store the figure answer in module the most unanimously, if both are consistent, graphical passwords input area shows Show " welcoming to use " word;If inconsistent, graphical passwords input area will send " code error please re-enter " password.
The method realizing encrypted U disk data based on image password the most according to claim 1, it is characterised in that described nothing Line communication module is bluetooth communication module.
The method realizing encrypted U disk data based on image password the most according to claim 1, it is characterised in that described nothing Line communication module is wifi communication module.
The method realizing encrypted U disk data based on image password the most according to claim 1, it is characterised in that described in make User in 24 hours the chance of input picture password be 2-8 time.
The method realizing encrypted U disk data based on image password the most according to claim 1, it is characterised in that described in make User in 24 hours the chance of input picture password be 3-5 time.
CN201610687348.1A 2016-08-19 2016-08-19 A kind of method realizing encrypted U disk data based on image password Pending CN106295307A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610687348.1A CN106295307A (en) 2016-08-19 2016-08-19 A kind of method realizing encrypted U disk data based on image password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610687348.1A CN106295307A (en) 2016-08-19 2016-08-19 A kind of method realizing encrypted U disk data based on image password

Publications (1)

Publication Number Publication Date
CN106295307A true CN106295307A (en) 2017-01-04

Family

ID=57661425

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610687348.1A Pending CN106295307A (en) 2016-08-19 2016-08-19 A kind of method realizing encrypted U disk data based on image password

Country Status (1)

Country Link
CN (1) CN106295307A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050210271A1 (en) * 2003-11-28 2005-09-22 Lightuning Tech. Inc. Electronic identification key with portable application programs and identified by biometrics authentication
CN200953248Y (en) * 2006-09-20 2007-09-26 北京中乐华建科技有限公司 Fingerprint ciphering virus-killing U disc
CN101676926A (en) * 2008-09-16 2010-03-24 深圳富泰宏精密工业有限公司 Touch type electronic equipment and its authority control method
CN101968841A (en) * 2010-11-09 2011-02-09 北京安天电子设备有限公司 Anti-virus and decryption method and device for USB mobile storage apparatus
CN203206256U (en) * 2013-01-21 2013-09-18 普天信息技术研究院有限公司 A mobile storage device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050210271A1 (en) * 2003-11-28 2005-09-22 Lightuning Tech. Inc. Electronic identification key with portable application programs and identified by biometrics authentication
CN200953248Y (en) * 2006-09-20 2007-09-26 北京中乐华建科技有限公司 Fingerprint ciphering virus-killing U disc
CN101676926A (en) * 2008-09-16 2010-03-24 深圳富泰宏精密工业有限公司 Touch type electronic equipment and its authority control method
CN101968841A (en) * 2010-11-09 2011-02-09 北京安天电子设备有限公司 Anti-virus and decryption method and device for USB mobile storage apparatus
CN203206256U (en) * 2013-01-21 2013-09-18 普天信息技术研究院有限公司 A mobile storage device

Similar Documents

Publication Publication Date Title
CN104134253B (en) A kind of gate control system and gate inhibition's deployment method
CN204833393U (en) Bluetooth and NFC integrated access control management system with image transmission
CN104318647A (en) Access control system based on intelligent terminal and control method of access control system
TWI384855B (en) Anti-theft system of a mobile device
WO2017075952A1 (en) Method and device for controlling intelligent door lock, and intelligent door control system
Hung et al. Design and implementation of a door lock control based on a near field communication of a smartphone
CN101521662B (en) Confidential U-disk remote monitoring system and method thereof
CN101667934A (en) Centralized supervisory device and supervisory method for networked USB interface equipment
CN105006045B (en) NFC mobile phone dynamic password gate control system and its control method
WO2016209370A1 (en) Handling risk events for a mobile device
CN105006046A (en) Cell phone NFC short-message warning and video monitoring entrance guard system and control method thereof
CN107516215A (en) The intelligent POS terminal and method of PIN code can be inputted safely
CN107492162A (en) Intelligent access control system based on ciphering type Quick Response Code and WiFi technology
CN204833403U (en) Access control system based on bluetooth
Bindroo et al. A wearable NFC wristband for remote home automation system
CN106303371A (en) Take pictures monitoring system, method and mobile terminal
CN102387494A (en) Android-mobile-platform-based remote automatic information exchange and control solution
CN104836794A (en) Method and system for achieving private protection of electronic devices based on WIFI hotspot
CN106295411A (en) A kind of U dish method for managing security
JP2020508533A (en) Segmented key authentication system
CN103916471A (en) Information display method and device
CN108280375A (en) A kind of mobile terminal that can prevent illegal brush machine
WO2015158046A1 (en) Information processing method, electronic devices, and computer storage medium
CN106295307A (en) A kind of method realizing encrypted U disk data based on image password
WO2017156931A1 (en) Locking method and system for mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170104

RJ01 Rejection of invention patent application after publication