CN106339619B - Information security management method and its device - Google Patents
Information security management method and its device Download PDFInfo
- Publication number
- CN106339619B CN106339619B CN201610729473.4A CN201610729473A CN106339619B CN 106339619 B CN106339619 B CN 106339619B CN 201610729473 A CN201610729473 A CN 201610729473A CN 106339619 B CN106339619 B CN 106339619B
- Authority
- CN
- China
- Prior art keywords
- iris
- storing unit
- key
- key storing
- capturing device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
- Storage Device Security (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention provides information security management method and its device, belongs to information security field, information security management device includes iris capturing device, switch, disposable channel, key storing unit and data storage cell.Characteristic value is transmitted to key storing unit for acquiring iris and generating characteristic value by iris capturing device.Switch the registration mode for opening key storing unit.Disposable channel is used for transmission switching signal, and switching signal is transmitted to key storing unit.Key storing unit opens registration mode for receiving switching signal, receives the incoming iris registration feature value of iris capturing device and completes registration;It is matched for receiving the incoming iris feature value of iris capturing device, and the opening and closing of complete paired data memory unit access permission.Data storage cell is used to store the data that user needs to store.
Description
Technical field
The present invention relates to information security fields, are specifically to be related to information security management method and its device.
Background technique
Currently, convenient practical with smart phone, it is powerful the features such as demonstration, mobile phone is also gradually in various users
It popularizes and comes in group, thus cause a series of mobile phone safe problem.Mobile phone safe is primarily referred to as being linked up using mobile phone
The safety of generated information in the process, this category information may be revealed in the case where intentionally or accidentally, once leakage
It can cause damages to cellie.Therefore, numerous terminal quotient, software business man etc. propose the solution of mobile phone message security in succession
Scheme.
At present relatively conventional a solution be that cryptoguard is arranged in the information of need for confidentiality in mobile phone, and
It goes to hide this password entrance using a switch;When the switch is in the open state, password entrance is shown, at this point, user
Password can be inputted and carry out checking for confidential information;When the switch is in close state, which is hidden, from
And above-mentioned confidential information can not be viewed.
But above scheme has a problem that, is exactly how this switch is hidden, if this switch cannot be hidden
Hiding, then the illegal still can decode the switch to intercept password to steal information.Therefore, the reliability of the program
Lower, there are still the risks of leakage for the information in mobile phone.
Summary of the invention
In view of the deficiency of the prior art, the present invention provides information security management method and its device.
The present invention solves the above problems by the following technical programs:
Information security management method, wherein the following steps are included:
Step 1: user sends registration signal to key storing unit by disposable channel using switch;
Step 2: after the key storing unit receives the registration signal, opening own key stored memory;
Step 3: iris capturing device will carry out iris capturing, the iris capturing device handle as the eyes of key to user
The iris feature value of acquisition is transmitted to the key storing unit;
Step 4: after the key storing unit receives the incoming iris feature value of the iris capturing device, the key is deposited
Iris feature value is stored in the key storage memory by storage unit;
Step 5: triggering the disposable channel certainly when the key storing unit receives after iris feature value completes registration
Dynamic circuit breaker expense is ruined;
Step 6: when user needs to access data memory cell data, iris being acquired by the iris capturing device
Acquisition iris feature value is transmitted to the key storing unit by characteristic value, the iris capturing device;
Step 7: the key storing unit receives the iris capturing device and is passed to iris feature value and the key storage
The key storage memory log-on data of unit is matched, and after successful match, user counts the data storage cell
According to access;Unsuccessful when matching, user can not access data memory cell data.
In above scheme, preferably iris capturing device described in step 3 acquisition iris process are as follows: the iris
Collector calculates corresponding characteristic value by laser scanning eyes 3-9 times, the data of each scanning collection, from all of generation
The characteristic value in a characteristic value selected by analogue method, this characteristic value is exactly to acquire eye as the iris capturing device
The characteristic value of eyeball iris is simultaneously transmitted to the key storing unit.
In above scheme, preferably analogue method are as follows: characteristic identical in characteristic value is compared one by one, and is led to
The optimal solution principle for crossing algorithm obtains a characteristic value.
In above scheme, preferably step 5 triggers the process that the disposable channel disconnects destruction automatically are as follows: described close
Key storage unit generates a pulse signal after completing registration, and pulse signal sends a triggering on disposable channel to and opens
It closes, the pulse signal triggers the channel that the trigger switch is closed on the disposable channel.
Information security management device, including iris capturing device, switch, disposable channel, key storing unit and data are deposited
Storage unit;
The output end of the iris capturing device is connect with the key storing unit;For acquiring iris and generating spy
Characteristic value is transmitted to key storing unit by value indicative;
The output end of the switch is connect with the disposable channel;For opening the registration mode of key storing unit;
The disposable channel is connect with the key storing unit;It is used for transmission switching signal, and switching signal is passed
To key storing unit;
The key storing unit is connect with the data storage cell, opens registration mode for receiving switching signal,
It receives the incoming iris registration feature value of iris capturing device and completes registration;For receiving the incoming iris feature value of iris capturing device
It is matched, and the opening and closing of complete paired data memory unit access permission;
The data storage cell is connect with the key storing unit, the data for needing to store for storing user.
The advantages and effects of the present invention are:
1, the present invention uses iris as key, ensures that the uniqueness of key, and iris is also not easy to be imitated, from
Ensure the safety of data;
2, the disposable channel in the present invention has just been carried out after the registration is finished from destruction, closing passage, thus effectively
It prevents the illegal to start with from the switch of starting to be cracked, from the safety for improving data;
3, further, it is that the channel of physical layer on hardware a kind of is closed that the switch on disposable channel, which is closed, is destroyed
Person can not be cracked using software or virus etc.;
4, when needing to access data memory cell data in the present invention must by the key authentication of key storing unit, into
One step, it ensure that the safety of userspersonal information.
Detailed description of the invention
Fig. 1 is the structural block diagram of apparatus of the present invention.
Specific embodiment
The invention will be further described with reference to embodiments.
Information security management method, wherein the following steps are included:
Step 1: user sends registration signal to key storing unit by disposable channel by using registration switch.Its
In, registration switch is a software switch on mobile phone, and it is disposable that hardware corridor is connected between software switch and key storing unit
Channel, disposable channel are a dedicated hardware corridors for being communicated for registration switch with key storing unit.Once
Property channel on be additionally provided with trigger switch, trigger switch can carry out disposable channel to close blocking after being triggered, opposite user
For trigger switch close after can not just be opened, opening just only can be carried out by hardware maintenance by equipment manufacturer.
Step 2: after key storing unit receives registration signal, opening own key stored memory.Key storing unit packet
Key storage memory, cipher key match device and switch are included, key storage memory is specially with the initial key of storage registration, key
Orchestration is used to receive extraneous key and is matched with the initial key in key storage memory.Wherein, switch is extraneous visit
Ask that the valve of data storage cell, only switch can just access after opening.
Step 3: iris capturing device will carry out iris capturing as the eyes of key to user, and iris capturing device is acquisition
Iris feature value be transmitted to key storing unit.The process of iris capturing device acquisition iris are as follows: iris capturing device is by swashing
The data of each scanning collection are calculated corresponding characteristic value, led to from all characteristic values of generation by optical scanning eyes 3-9 times
It crosses analogue method and selects a characteristic value, this characteristic value is exactly the characteristic value as iris capturing device acquisition iris and is transmitted to
Key storing unit.Analogue method is to be compared characteristic identical in characteristic value one by one, and pass through algorithm most
Excellent solution principle obtains a characteristic value.Wherein, analogue method already belongs to a kind of common optimal resolving Algorithm of those skilled in the art, so
No longer explanation in detail herein.The Stability and veracity of login key can be improved very well by Multiple-Scan.
Step 4: after key storing unit receives the incoming iris feature value of iris capturing device, key storing unit is iris
Characteristic value is stored in key storage memory, completes registration.The received iris feature value conduct of key storing unit received first time
The storing data of key stored memory in key storing unit, and the key of registration, as the standard value for matching comparison backward.
Step 5: triggering disposable channel after key storing unit receives the completion registration of iris feature value and disconnect pin automatically
It ruins.Key storage memory in key storing unit can generate signal pulse after receiving storing data, and signal pulse is transferred to
On disposable channel.Key storing unit generates a pulse signal after completing registration, and pulse signal sends disposable channel to
On a trigger switch on, pulse signal triggering trigger switch close the channel on disposable channel.On disposable channel
It is that the channel of physical layer on hardware a kind of is closed that switch, which is closed, and saboteur can not be cracked using software or virus etc..
Step 6: when user needs to access data memory cell data, iris feature being acquired by iris capturing device
Acquisition iris feature value is transmitted to key storing unit by value, iris capturing device.After user completes registration, need to store data
Cell data, which carries out data, to be accessed, and only can just be accessed by key authentication.It is special that iris capturing device acquires iris
Value indicative is the equal of input key, since everyone iris is uniquely, so that key is unique, and to destroy
What person can not be simulated with machine.
Step 7: key storing unit receives the incoming iris feature value of iris capturing device and the key of key storing unit is deposited
Storage memory log-on data is matched.After successful match, the switch in key storing unit is opened, and user can deposit data
Storage unit carries out data access.Unsuccessful when matching, the switch in key storing unit does not operate, and user can not access data
Memory cell data.
Information security management device, as shown in Figure 1, including iris capturing device, switch, disposable channel, key storage list
Member and data storage cell.
The output end of iris capturing device is connect with key storing unit, and Password Input area quite usually carries out artificial defeated
Enter password.Switch is connect through disposable channel with key storing unit.Data storage cell is connect with key storing unit.
Characteristic value is transmitted to key storing unit for acquiring iris and generating characteristic value by iris capturing device.Switch
For opening the registration mode of key storing unit, switch is a software switch on user instrument.Disposable channel is used for
Transmitting switch signal, and switching signal is transmitted to key storing unit, disposable channel is a hardware corridor, disposable channel
On be additionally provided with trigger switch, after trigger switch is triggered, entire channel will be blocked, and can not be carried out data transmission.Key
Storage unit opens registration mode for receiving switching signal, receives the incoming iris registration feature value of iris capturing device and completes note
Volume;It is matched for receiving the incoming iris feature value of iris capturing device, and complete paired data memory unit access permission
It opens and closes.Key storing unit includes key storage memory, cipher key match device and switch, and key storage memory is specially used
In the initial key of storage registration, cipher key match device be used to receive extraneous key and with the initial key in key storage memory
It is matched.Wherein, switch is the valve of extraneous access data storage cell, and only switch can just access after opening.Number
It is used to store the data that user needs to store according to storage unit, can be generally mobile phone EMS memory, storage card or hard disk etc..
The appropriate embodiment of the invention is illustrated above, but the present invention is not limited to implement
Example, those skilled in the art can also make various equivalent changes on the premise of not violating the inventive spirit of the present invention
Type or replacement, these equivalent variation or replacement are all contained in scope of the present application.
Claims (5)
1. information security management method, it is characterised in that: the following steps are included:
Step 1: user sends registration signal to key storing unit by disposable channel using switch;
Step 2: after the key storing unit receives the registration signal, opening own key stored memory;
Step 3: iris capturing device will carry out iris capturing as the eyes of key to user, and the iris capturing device is acquisition
Iris feature value be transmitted to the key storing unit;
Step 4: after the key storing unit receives the incoming iris feature value of the iris capturing device, the key storage list
Iris feature value is stored in the key storage memory by member;
Step 5: triggering the disposable channel from dynamic circuit breaker when the key storing unit receives after iris feature value completes registration
Expense is ruined;
Step 6: when user needs to access data memory cell data, iris feature being acquired by the iris capturing device
Acquisition iris feature value is transmitted to the key storing unit by value, the iris capturing device;
Step 7: the key storing unit receives the incoming iris feature value of the iris capturing device, and by the iris feature
Value is matched with the key storage memory log-on data of the key storing unit, and after successful match, user is to the number
Data access is carried out according to storage unit;Unsuccessful when matching, user can not access data memory cell data.
2. information security management method according to claim 1, it is characterised in that: iris capturing device described in step 3 is adopted
Collect the process of iris are as follows: the iris capturing device calculates the data of each scanning collection by laser scanning eyes 3-9 times
Corresponding characteristic value out selects a characteristic value, this characteristic value by analogue method from all characteristic values of generation
The characteristic value of iris will be acquired as the iris capturing device and is transmitted to the key storing unit.
3. information security management method according to claim 2, it is characterised in that: the analogue method is by phase in characteristic value
Same characteristic is compared one by one, and obtains a characteristic value by the optimal solution principle of algorithm.
4. information security management method according to claim 1, it is characterised in that: step 5 triggers the disposable channel
The automatic process destroyed that disconnects is that the key storing unit generates a pulse signal, the pulse signal after completing registration
Send a trigger switch on the disposable channel to, it is described primary that the pulse signal triggers the trigger switch closing
Channel on property channel.
5. a kind of information security management device for information security management method described in claim 1-4 any one,
It is characterized in that: including iris capturing device, switch, disposable channel, key storing unit and data storage cell;
The output end of the iris capturing device is connect with the key storing unit;For acquiring iris and generating feature
Characteristic value, is transmitted to key storing unit by value;
The output end of the switch is connect with the disposable channel;For opening the registration mode of key storing unit;
The disposable channel is connect with the key storing unit;It is used for transmission switching signal, and switching signal is transmitted to close
Key storage unit;
The key storing unit is connect with the data storage cell;Registration mode is opened for receiving switching signal, is received
The incoming iris registration feature value of iris capturing device completes registration;It is carried out for receiving the incoming iris feature value of iris capturing device
Matching, and the opening and closing of complete paired data memory unit access permission;
The data storage cell and the key storing unit;The data for needing to store for storing user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610729473.4A CN106339619B (en) | 2016-08-26 | 2016-08-26 | Information security management method and its device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610729473.4A CN106339619B (en) | 2016-08-26 | 2016-08-26 | Information security management method and its device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106339619A CN106339619A (en) | 2017-01-18 |
CN106339619B true CN106339619B (en) | 2019-01-18 |
Family
ID=57822177
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610729473.4A Active CN106339619B (en) | 2016-08-26 | 2016-08-26 | Information security management method and its device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106339619B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN200976141Y (en) * | 2006-10-23 | 2007-11-14 | 北京飞天诚信科技有限公司 | Plug-and-play intelligent cipher key device |
CN101493866A (en) * | 2008-01-23 | 2009-07-29 | 杨筑平 | Controlled storage apparatus and access operation software |
-
2016
- 2016-08-26 CN CN201610729473.4A patent/CN106339619B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN200976141Y (en) * | 2006-10-23 | 2007-11-14 | 北京飞天诚信科技有限公司 | Plug-and-play intelligent cipher key device |
CN101493866A (en) * | 2008-01-23 | 2009-07-29 | 杨筑平 | Controlled storage apparatus and access operation software |
Also Published As
Publication number | Publication date |
---|---|
CN106339619A (en) | 2017-01-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104735065B (en) | A kind of data processing method, electronic equipment and server | |
CN105279832A (en) | Intelligent door lock system and control method thereof | |
Ahvanooey et al. | Modern authentication schemes in smartphones and IoT devices: An empirical survey | |
CN109767534A (en) | Gate inhibition's access method, system, management terminal and door control terminal based on block chain | |
CN104700015B (en) | Based on the dynamic password formation method of iris information | |
CN102769531A (en) | Identity authentication device and method thereof | |
CN103985036A (en) | Two-dimension code payment method with biological characteristics | |
CN105574963B (en) | A kind of gate inhibition's verification method and door control terminal | |
CN102316112A (en) | Password authentication method in network application and system | |
CN109905374A (en) | A kind of identity identifying method with secret protection characteristic towards wired home | |
CN111131202A (en) | Identity authentication method and system based on multiple information authentication | |
CN107733636A (en) | Authentication method and Verification System | |
CN105635075A (en) | Method of registering cloud terminal, cloud terminal, cloud server and cloud system | |
CN106059764A (en) | Password and fingerprint third-party authentication method based on halting key derivation function | |
CN107358084A (en) | The cloud storage method and apparatus of data | |
CN112260820A (en) | Mobile payment password keyboard based on key splitting protection in Android system and implementation method thereof | |
CN101345625B (en) | Remote authentication method based on biological characteristic | |
CN106339619B (en) | Information security management method and its device | |
CN109961542A (en) | A kind of entrance guard device, verifying device, verifying system and its verification method | |
CN105516168A (en) | Off-line iris authentication device and method | |
Liu et al. | Secure pairing with wearable devices by using ambient sound and light | |
Kardaş et al. | k‐strong privacy for radio frequency identification authentication protocols based on physically unclonable functions | |
CN111915290A (en) | Mobile payment password keyboard based on key splitting protection under iOS system and implementation method thereof | |
CN106710033A (en) | Door control opening method and device | |
CN107249006A (en) | The authentication method and device of password use environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20181129 Address after: Room 1301, Building 430-1, Xujiahui Road, Huangpu District, Shanghai 200025 Applicant after: Shanghai Hengnengtai Enterprise Management Co., Ltd. Address before: 510000 No. 4 Lane seven, Luogang District, Guangzhou, Guangdong. Applicant before: He Ying |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |