CN106326707A - Safe U disk handling method - Google Patents

Safe U disk handling method Download PDF

Info

Publication number
CN106326707A
CN106326707A CN201610687352.8A CN201610687352A CN106326707A CN 106326707 A CN106326707 A CN 106326707A CN 201610687352 A CN201610687352 A CN 201610687352A CN 106326707 A CN106326707 A CN 106326707A
Authority
CN
China
Prior art keywords
module
voice
user
dish
usb flash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610687352.8A
Other languages
Chinese (zh)
Inventor
徐超
谭守标
李正平
黄林生
许耀华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhu Zhenhua Rongke Intelligent Technology Co Ltd
Original Assignee
Wuhu Zhenhua Rongke Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhu Zhenhua Rongke Intelligent Technology Co Ltd filed Critical Wuhu Zhenhua Rongke Intelligent Technology Co Ltd
Priority to CN201610687352.8A priority Critical patent/CN106326707A/en
Publication of CN106326707A publication Critical patent/CN106326707A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a U disk, in particular to a safe U disk handling method, belonging to the technical field of electronic storage equipment. The safe U disk handling method comprises the following steps: (1) respectively arranging a power supply module, a voice acquisition module, a voice playing module, a voice storage module, a voice password setting module, a voice password acquisition module, a voice password detection module and a starting module on a U disk, wherein the power supply module is used for supplying power for the U disk; (2) setting a voice password by a user; (3) when the U disk is opened by the user through an on-off key, triggering the voice playing module by means of the starting module so as to enable the voice playing module to make a sound of please get ready for answers; (4) detecting the voice password. According the safe U disk handling method, the voice password is taken as a means of verification, so that the safety of the U disk is greatly improved; furthermore, the U disk is simpler to operate and more convenient to use.

Description

A kind of security processing of USB flash disk
Technical field
The present invention relates to a kind of USB flash disk, be specifically related to the security processing of a kind of USB flash disk, belong to electronic storage device technology Field.
Background technology
Along with progress and the development of science and technology of society, U dish is simple to operate with it, and the advantage being convenient for carrying has become as to be worked as The important selection mode of lower people's data copy, but during using U dish, still can there is a lot of problem, such as: If U dish is stolen, if the inside stores again the most important data, then consequence is hardly imaginable, and using Journey all can cause owing to having suffered virus etc. other reasons the loss of vital data of U dish, the most any situation, all can The place of a lot of inconvenience is easily lost and safety currently for the data in U dish in correlation technique to our work strip The highest problem, the most not yet proposes effective solution.
Notification number is 101196967, Chinese invention patent disclosed in 11 days June in 2008 of publication date discloses a kind of USB flash disk Security processing, management process is as follows: 1) utilize WatchKEY Pro smart card as management key, carrying out U dish can Letter medium registration mandate, whether be U dish that WatchKEY Pro authorize factory produce, and root if first checking for U dish during registed authorization Judge U dish the most registed authorization according to the authorization message in U dish private area, registed authorization be considered safe U Dish, if not registered mandate, then allows U dish is carried out registed authorization;2) hands for public use handled by the safe U dish of registered mandate Time continuous, setting different security domains according to the U dish that is not all of security requirements, security domain information writes safe U with ciphertext form Dish private area, according to the security domain information set, limiting U dish can only use in the security domain specified;3) by capture Windows bottom message, reads computer port change information, it is ensured that computer port is not illegally used;4) by right Windows SDK file input and output technology is extended, and captures the change that file is occurred, using U dish place of safety as Monitored path, the file operation in monitoring U dish;5) by Windows Shell technology is extended, by place of safety Closing function expands in system right button menu, and user only need to click on right mouse button and realize the closedown of place of safety.Use above-mentioned skill Art scheme, needs WatchKEY Pro smart card as management key, operation complexity, uses inconvenience.
Notification number is 105740719A, the Chinese invention patent in publication date on July 6th, 2016 discloses a kind of wireless security The implementation method of U dish, including: binding step: by this wireless security U dish and a mobile terminal binding;Connection Step: by this nothing Wireless connections relation is set up between line safe U dish and this mobile terminal;Judge step: judge whether this wireless security U dish connects Enter to an electronic third-party equipment;Credit step: when this wireless security U dish accesses to an electronic third-party equipment, this is wireless Safe U dish sends credit solicited message to this mobile terminal;Response of step: this mobile terminal receives this wireless security U dish After the credit solicited message sent, it is judged that whether this credit solicited message meets credit condition, meets in this credit solicited message During credit condition, transmit credit by information to this wireless security U dish;Clearance step: this wireless security U dish is receiving this When credit is by information, the access limit of this wireless security U dish of letting pass;Read-write step: electronic third-party equipment is in this wireless peace After full U dish clearance access limit, read and write the data file in this wireless security U dish.Use technique scheme, operating time Long, serviceability is not good enough.
Accordingly, it would be desirable to a kind of new U dish method for managing security.
Summary of the invention
It is an object of the invention to provide the security processing of a kind of USB flash disk, using speech cipher as checking means so that U The safety of dish is greatly promoted, it addition, make the operation of U dish more simply, uses more convenient.
It is an object of the invention to be achieved through the following technical solutions, the security processing of a kind of USB flash disk, described process side Method comprises the following steps:
(1) be respectively provided with supply module, voice acquisition module, voice playing module on U dish, that voice stores module, voice is close Code arranges module, speech cipher acquisition module, speech cipher detection module, starts module;Supply module is for the electric power of U dish Supply;
(2) user arranges module by the speech cipher arranged on U dish, voice acquisition module carries out speech cipher setting, passes through User speech proposes problem and answers, and vocal answer is saved in voice storage module;
(3) open described USB flash disk when user by & off switch, trigger voice playing module, speech play mould by starting module Block sends " please carry out answer to prepare ";
(4) voice playing module proposes problem, after user is answered, and the user voice that speech cipher acquisition module will get Answer sends to speech cipher detection module, and speech cipher detection module compares the vocal answer of user and is set in advance in language It is the most consistent that sound stores the vocal answer in module, if both are consistent, voice playing module will send " please use USB flash disk " mouth Order;If inconsistent, voice playing module will send " erroneous answers is answered the most again " password.
Preferably, described startup module is button structure.
Preferably, described voice acquisition module is sound pick-up outfit.
Preferably, in step (2), user proposes the number of problem is 3-8.
Preferably, in step (2), user proposes the number of problem is 4-5.
Compared with prior art, the method have the advantages that the present invention using speech cipher as checking means, make The safety obtaining USB flash disk is greatly promoted, it addition, make the operation of U dish more simply, uses more convenient.
Detailed description of the invention
The security processing of a kind of USB flash disk, comprises the following steps:
(1) be respectively provided with supply module, voice acquisition module, voice playing module on U dish, that voice stores module, voice is close Code arranges module, speech cipher acquisition module, speech cipher detection module, starts module;Supply module is for the electric power of U dish Supply;
(2) user arranges module by the speech cipher arranged on U dish, voice acquisition module carries out speech cipher setting, passes through User speech proposes problem and answers, and vocal answer is saved in voice storage module;
(3) open described USB flash disk when user by & off switch, trigger voice playing module, speech play mould by starting module Block sends " please carry out answer to prepare ";
(4) voice playing module proposes problem, after user is answered, and the user voice that speech cipher acquisition module will get Answer sends to speech cipher detection module, and speech cipher detection module compares the vocal answer of user and is set in advance in language It is the most consistent that sound stores the vocal answer in module, if both are consistent, voice playing module will send " please use USB flash disk " mouth Order;If inconsistent, voice playing module will send " erroneous answers is answered the most again " password.
Preferably, described startup module is button structure.
Preferably, described voice acquisition module is sound pick-up outfit.
Preferably, in step (2), user proposes the number of problem is 3-8.
Preferably, in step (2), user proposes the number of problem is 4-5.
The present invention using speech cipher as checking means so that the safety of USB flash disk is greatly promoted, it addition, make the behaviour of U dish Make simpler, use more convenient.

Claims (5)

1. the security processing of a USB flash disk, it is characterised in that the treating method comprises following steps:
(1) be respectively provided with supply module, voice acquisition module, voice playing module on U dish, that voice stores module, voice is close Code arranges module, speech cipher acquisition module, speech cipher detection module, starts module;Supply module is for the electric power of U dish Supply;
(2) user arranges module by the speech cipher arranged on U dish, voice acquisition module carries out speech cipher setting, passes through User speech proposes problem and answers, and vocal answer is saved in voice storage module;
(3) open described USB flash disk when user by & off switch, trigger voice playing module, speech play mould by starting module Block sends " please carry out answer to prepare ";
(4) voice playing module proposes problem, after user is answered, and the user voice that speech cipher acquisition module will get Answer sends to speech cipher detection module, and speech cipher detection module compares the vocal answer of user and is set in advance in language It is the most consistent that sound stores the vocal answer in module, if both are consistent, voice playing module will send " please use USB flash disk " mouth Order;If inconsistent, voice playing module will send " erroneous answers is answered the most again " password.
The security processing of USB flash disk the most according to claim 1, it is characterised in that described startup module is button knot Structure.
The security processing method of USB flash disk the most according to claim 1, it is characterised in that described voice acquisition module is record Sound equipment.
The security processing of USB flash disk the most according to claim 1, it is characterised in that in step (2), user proposes problem Number is 3-8.
The security processing of USB flash disk the most according to claim 1, it is characterised in that in step (2), user proposes problem Number is 4-5.
CN201610687352.8A 2016-08-19 2016-08-19 Safe U disk handling method Pending CN106326707A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610687352.8A CN106326707A (en) 2016-08-19 2016-08-19 Safe U disk handling method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610687352.8A CN106326707A (en) 2016-08-19 2016-08-19 Safe U disk handling method

Publications (1)

Publication Number Publication Date
CN106326707A true CN106326707A (en) 2017-01-11

Family

ID=57744395

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610687352.8A Pending CN106326707A (en) 2016-08-19 2016-08-19 Safe U disk handling method

Country Status (1)

Country Link
CN (1) CN106326707A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202713823U (en) * 2012-02-12 2013-01-30 杨维新 Visual U disk
US20140380061A1 (en) * 2013-06-20 2014-12-25 Golden Vast Macao Commercial Offshore Limited Implementation Method of a Multifunctional MCU and such Multifunctional MCU
CN105138882A (en) * 2015-07-30 2015-12-09 广东欧珀移动通信有限公司 Terminal unlocking method and apparatus
CN105575385A (en) * 2015-12-16 2016-05-11 中国建设银行股份有限公司 Voice cipher setting system and method, and sound cipher verification system and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202713823U (en) * 2012-02-12 2013-01-30 杨维新 Visual U disk
US20140380061A1 (en) * 2013-06-20 2014-12-25 Golden Vast Macao Commercial Offshore Limited Implementation Method of a Multifunctional MCU and such Multifunctional MCU
CN105138882A (en) * 2015-07-30 2015-12-09 广东欧珀移动通信有限公司 Terminal unlocking method and apparatus
CN105575385A (en) * 2015-12-16 2016-05-11 中国建设银行股份有限公司 Voice cipher setting system and method, and sound cipher verification system and method

Similar Documents

Publication Publication Date Title
CN104765552B (en) Right management method and device
CN107743626A (en) For the method and apparatus for the touch-screen display for enabling mobile device
CN102883049A (en) Hidden alarm unlocking method for mobile terminal, and mobile terminal
CN104992092A (en) Method, device and system for fingerprint information verification
CN106503523B (en) A kind of method and mobile terminal of mobile terminal login
CN104850827A (en) Fingerprint identification method and apparatus
WO2018010343A1 (en) Method, device and system for controlling opening of ab doors
CN105590355A (en) Bluetooth entrance guard system and control method thereof
CN110347862A (en) Recording processing method, device, equipment, system and audio frequency apparatus
WO2016131362A1 (en) Voiceprint-recognition-based security protection method and device
CN204189213U (en) A kind of phone number and fingerprint recognition entrance guard device
CN103870759A (en) NFC encryption method, NFC encryption system and terminal
CN105488372B (en) Verification method and device
CN205788194U (en) A kind of high in the clouds and local secure storage data and the device of file
CN107558821A (en) A kind of intelligent door lock and its method for unlocking
CN109801065A (en) Virtual card opens chucking method, apparatus and system, storage medium
CN106295411A (en) A kind of U dish method for managing security
CN107911380A (en) Auth method and device
CN106326707A (en) Safe U disk handling method
CN114839891B (en) Intelligent bedside table control method based on Internet of things, computer and storage medium
CN107622393A (en) The card system of the identity information sign of near field identification
WO2015070800A1 (en) Method and device for transmitting and receiving instruction information
TW201800652A (en) Door access control system with automatic unlocking function and unlocking method thereof that comprises a door lock controller and an electronic device carried by a user such that when the electronic device is approaching the door lock controller, the door lock controller, upon identifying the user, automatically unlock the door lock
CN103971046A (en) Decryption method and device
CN106599745A (en) System and method capable of checking and substitution of smart card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170111