CN106339619B - Information security management method and its device - Google Patents

Information security management method and its device Download PDF

Info

Publication number
CN106339619B
CN106339619B CN201610729473.4A CN201610729473A CN106339619B CN 106339619 B CN106339619 B CN 106339619B CN 201610729473 A CN201610729473 A CN 201610729473A CN 106339619 B CN106339619 B CN 106339619B
Authority
CN
China
Prior art keywords
iris
storing unit
key
key storing
capturing device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610729473.4A
Other languages
Chinese (zh)
Other versions
CN106339619A (en
Inventor
何颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Hengnengtai Enterprise Management Co., Ltd.
Original Assignee
Shanghai Hengnengtai Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Hengnengtai Enterprise Management Co Ltd filed Critical Shanghai Hengnengtai Enterprise Management Co Ltd
Priority to CN201610729473.4A priority Critical patent/CN106339619B/en
Publication of CN106339619A publication Critical patent/CN106339619A/en
Application granted granted Critical
Publication of CN106339619B publication Critical patent/CN106339619B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)
  • Storage Device Security (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention provides information security management method and its device, belongs to information security field, information security management device includes iris capturing device, switch, disposable channel, key storing unit and data storage cell.Characteristic value is transmitted to key storing unit for acquiring iris and generating characteristic value by iris capturing device.Switch the registration mode for opening key storing unit.Disposable channel is used for transmission switching signal, and switching signal is transmitted to key storing unit.Key storing unit opens registration mode for receiving switching signal, receives the incoming iris registration feature value of iris capturing device and completes registration;It is matched for receiving the incoming iris feature value of iris capturing device, and the opening and closing of complete paired data memory unit access permission.Data storage cell is used to store the data that user needs to store.

Description

Information security management method and its device
Technical field
The present invention relates to information security fields, are specifically to be related to information security management method and its device.
Background technique
Currently, convenient practical with smart phone, it is powerful the features such as demonstration, mobile phone is also gradually in various users It popularizes and comes in group, thus cause a series of mobile phone safe problem.Mobile phone safe is primarily referred to as being linked up using mobile phone The safety of generated information in the process, this category information may be revealed in the case where intentionally or accidentally, once leakage It can cause damages to cellie.Therefore, numerous terminal quotient, software business man etc. propose the solution of mobile phone message security in succession Scheme.
At present relatively conventional a solution be that cryptoguard is arranged in the information of need for confidentiality in mobile phone, and It goes to hide this password entrance using a switch;When the switch is in the open state, password entrance is shown, at this point, user Password can be inputted and carry out checking for confidential information;When the switch is in close state, which is hidden, from And above-mentioned confidential information can not be viewed.
But above scheme has a problem that, is exactly how this switch is hidden, if this switch cannot be hidden Hiding, then the illegal still can decode the switch to intercept password to steal information.Therefore, the reliability of the program Lower, there are still the risks of leakage for the information in mobile phone.
Summary of the invention
In view of the deficiency of the prior art, the present invention provides information security management method and its device.
The present invention solves the above problems by the following technical programs:
Information security management method, wherein the following steps are included:
Step 1: user sends registration signal to key storing unit by disposable channel using switch;
Step 2: after the key storing unit receives the registration signal, opening own key stored memory;
Step 3: iris capturing device will carry out iris capturing, the iris capturing device handle as the eyes of key to user The iris feature value of acquisition is transmitted to the key storing unit;
Step 4: after the key storing unit receives the incoming iris feature value of the iris capturing device, the key is deposited Iris feature value is stored in the key storage memory by storage unit;
Step 5: triggering the disposable channel certainly when the key storing unit receives after iris feature value completes registration Dynamic circuit breaker expense is ruined;
Step 6: when user needs to access data memory cell data, iris being acquired by the iris capturing device Acquisition iris feature value is transmitted to the key storing unit by characteristic value, the iris capturing device;
Step 7: the key storing unit receives the iris capturing device and is passed to iris feature value and the key storage The key storage memory log-on data of unit is matched, and after successful match, user counts the data storage cell According to access;Unsuccessful when matching, user can not access data memory cell data.
In above scheme, preferably iris capturing device described in step 3 acquisition iris process are as follows: the iris Collector calculates corresponding characteristic value by laser scanning eyes 3-9 times, the data of each scanning collection, from all of generation The characteristic value in a characteristic value selected by analogue method, this characteristic value is exactly to acquire eye as the iris capturing device The characteristic value of eyeball iris is simultaneously transmitted to the key storing unit.
In above scheme, preferably analogue method are as follows: characteristic identical in characteristic value is compared one by one, and is led to The optimal solution principle for crossing algorithm obtains a characteristic value.
In above scheme, preferably step 5 triggers the process that the disposable channel disconnects destruction automatically are as follows: described close Key storage unit generates a pulse signal after completing registration, and pulse signal sends a triggering on disposable channel to and opens It closes, the pulse signal triggers the channel that the trigger switch is closed on the disposable channel.
Information security management device, including iris capturing device, switch, disposable channel, key storing unit and data are deposited Storage unit;
The output end of the iris capturing device is connect with the key storing unit;For acquiring iris and generating spy Characteristic value is transmitted to key storing unit by value indicative;
The output end of the switch is connect with the disposable channel;For opening the registration mode of key storing unit;
The disposable channel is connect with the key storing unit;It is used for transmission switching signal, and switching signal is passed To key storing unit;
The key storing unit is connect with the data storage cell, opens registration mode for receiving switching signal, It receives the incoming iris registration feature value of iris capturing device and completes registration;For receiving the incoming iris feature value of iris capturing device It is matched, and the opening and closing of complete paired data memory unit access permission;
The data storage cell is connect with the key storing unit, the data for needing to store for storing user.
The advantages and effects of the present invention are:
1, the present invention uses iris as key, ensures that the uniqueness of key, and iris is also not easy to be imitated, from Ensure the safety of data;
2, the disposable channel in the present invention has just been carried out after the registration is finished from destruction, closing passage, thus effectively It prevents the illegal to start with from the switch of starting to be cracked, from the safety for improving data;
3, further, it is that the channel of physical layer on hardware a kind of is closed that the switch on disposable channel, which is closed, is destroyed Person can not be cracked using software or virus etc.;
4, when needing to access data memory cell data in the present invention must by the key authentication of key storing unit, into One step, it ensure that the safety of userspersonal information.
Detailed description of the invention
Fig. 1 is the structural block diagram of apparatus of the present invention.
Specific embodiment
The invention will be further described with reference to embodiments.
Information security management method, wherein the following steps are included:
Step 1: user sends registration signal to key storing unit by disposable channel by using registration switch.Its In, registration switch is a software switch on mobile phone, and it is disposable that hardware corridor is connected between software switch and key storing unit Channel, disposable channel are a dedicated hardware corridors for being communicated for registration switch with key storing unit.Once Property channel on be additionally provided with trigger switch, trigger switch can carry out disposable channel to close blocking after being triggered, opposite user For trigger switch close after can not just be opened, opening just only can be carried out by hardware maintenance by equipment manufacturer.
Step 2: after key storing unit receives registration signal, opening own key stored memory.Key storing unit packet Key storage memory, cipher key match device and switch are included, key storage memory is specially with the initial key of storage registration, key Orchestration is used to receive extraneous key and is matched with the initial key in key storage memory.Wherein, switch is extraneous visit Ask that the valve of data storage cell, only switch can just access after opening.
Step 3: iris capturing device will carry out iris capturing as the eyes of key to user, and iris capturing device is acquisition Iris feature value be transmitted to key storing unit.The process of iris capturing device acquisition iris are as follows: iris capturing device is by swashing The data of each scanning collection are calculated corresponding characteristic value, led to from all characteristic values of generation by optical scanning eyes 3-9 times It crosses analogue method and selects a characteristic value, this characteristic value is exactly the characteristic value as iris capturing device acquisition iris and is transmitted to Key storing unit.Analogue method is to be compared characteristic identical in characteristic value one by one, and pass through algorithm most Excellent solution principle obtains a characteristic value.Wherein, analogue method already belongs to a kind of common optimal resolving Algorithm of those skilled in the art, so No longer explanation in detail herein.The Stability and veracity of login key can be improved very well by Multiple-Scan.
Step 4: after key storing unit receives the incoming iris feature value of iris capturing device, key storing unit is iris Characteristic value is stored in key storage memory, completes registration.The received iris feature value conduct of key storing unit received first time The storing data of key stored memory in key storing unit, and the key of registration, as the standard value for matching comparison backward.
Step 5: triggering disposable channel after key storing unit receives the completion registration of iris feature value and disconnect pin automatically It ruins.Key storage memory in key storing unit can generate signal pulse after receiving storing data, and signal pulse is transferred to On disposable channel.Key storing unit generates a pulse signal after completing registration, and pulse signal sends disposable channel to On a trigger switch on, pulse signal triggering trigger switch close the channel on disposable channel.On disposable channel It is that the channel of physical layer on hardware a kind of is closed that switch, which is closed, and saboteur can not be cracked using software or virus etc..
Step 6: when user needs to access data memory cell data, iris feature being acquired by iris capturing device Acquisition iris feature value is transmitted to key storing unit by value, iris capturing device.After user completes registration, need to store data Cell data, which carries out data, to be accessed, and only can just be accessed by key authentication.It is special that iris capturing device acquires iris Value indicative is the equal of input key, since everyone iris is uniquely, so that key is unique, and to destroy What person can not be simulated with machine.
Step 7: key storing unit receives the incoming iris feature value of iris capturing device and the key of key storing unit is deposited Storage memory log-on data is matched.After successful match, the switch in key storing unit is opened, and user can deposit data Storage unit carries out data access.Unsuccessful when matching, the switch in key storing unit does not operate, and user can not access data Memory cell data.
Information security management device, as shown in Figure 1, including iris capturing device, switch, disposable channel, key storage list Member and data storage cell.
The output end of iris capturing device is connect with key storing unit, and Password Input area quite usually carries out artificial defeated Enter password.Switch is connect through disposable channel with key storing unit.Data storage cell is connect with key storing unit.
Characteristic value is transmitted to key storing unit for acquiring iris and generating characteristic value by iris capturing device.Switch For opening the registration mode of key storing unit, switch is a software switch on user instrument.Disposable channel is used for Transmitting switch signal, and switching signal is transmitted to key storing unit, disposable channel is a hardware corridor, disposable channel On be additionally provided with trigger switch, after trigger switch is triggered, entire channel will be blocked, and can not be carried out data transmission.Key Storage unit opens registration mode for receiving switching signal, receives the incoming iris registration feature value of iris capturing device and completes note Volume;It is matched for receiving the incoming iris feature value of iris capturing device, and complete paired data memory unit access permission It opens and closes.Key storing unit includes key storage memory, cipher key match device and switch, and key storage memory is specially used In the initial key of storage registration, cipher key match device be used to receive extraneous key and with the initial key in key storage memory It is matched.Wherein, switch is the valve of extraneous access data storage cell, and only switch can just access after opening.Number It is used to store the data that user needs to store according to storage unit, can be generally mobile phone EMS memory, storage card or hard disk etc..
The appropriate embodiment of the invention is illustrated above, but the present invention is not limited to implement Example, those skilled in the art can also make various equivalent changes on the premise of not violating the inventive spirit of the present invention Type or replacement, these equivalent variation or replacement are all contained in scope of the present application.

Claims (5)

1. information security management method, it is characterised in that: the following steps are included:
Step 1: user sends registration signal to key storing unit by disposable channel using switch;
Step 2: after the key storing unit receives the registration signal, opening own key stored memory;
Step 3: iris capturing device will carry out iris capturing as the eyes of key to user, and the iris capturing device is acquisition Iris feature value be transmitted to the key storing unit;
Step 4: after the key storing unit receives the incoming iris feature value of the iris capturing device, the key storage list Iris feature value is stored in the key storage memory by member;
Step 5: triggering the disposable channel from dynamic circuit breaker when the key storing unit receives after iris feature value completes registration Expense is ruined;
Step 6: when user needs to access data memory cell data, iris feature being acquired by the iris capturing device Acquisition iris feature value is transmitted to the key storing unit by value, the iris capturing device;
Step 7: the key storing unit receives the incoming iris feature value of the iris capturing device, and by the iris feature Value is matched with the key storage memory log-on data of the key storing unit, and after successful match, user is to the number Data access is carried out according to storage unit;Unsuccessful when matching, user can not access data memory cell data.
2. information security management method according to claim 1, it is characterised in that: iris capturing device described in step 3 is adopted Collect the process of iris are as follows: the iris capturing device calculates the data of each scanning collection by laser scanning eyes 3-9 times Corresponding characteristic value out selects a characteristic value, this characteristic value by analogue method from all characteristic values of generation The characteristic value of iris will be acquired as the iris capturing device and is transmitted to the key storing unit.
3. information security management method according to claim 2, it is characterised in that: the analogue method is by phase in characteristic value Same characteristic is compared one by one, and obtains a characteristic value by the optimal solution principle of algorithm.
4. information security management method according to claim 1, it is characterised in that: step 5 triggers the disposable channel The automatic process destroyed that disconnects is that the key storing unit generates a pulse signal, the pulse signal after completing registration Send a trigger switch on the disposable channel to, it is described primary that the pulse signal triggers the trigger switch closing Channel on property channel.
5. a kind of information security management device for information security management method described in claim 1-4 any one, It is characterized in that: including iris capturing device, switch, disposable channel, key storing unit and data storage cell;
The output end of the iris capturing device is connect with the key storing unit;For acquiring iris and generating feature Characteristic value, is transmitted to key storing unit by value;
The output end of the switch is connect with the disposable channel;For opening the registration mode of key storing unit;
The disposable channel is connect with the key storing unit;It is used for transmission switching signal, and switching signal is transmitted to close Key storage unit;
The key storing unit is connect with the data storage cell;Registration mode is opened for receiving switching signal, is received The incoming iris registration feature value of iris capturing device completes registration;It is carried out for receiving the incoming iris feature value of iris capturing device Matching, and the opening and closing of complete paired data memory unit access permission;
The data storage cell and the key storing unit;The data for needing to store for storing user.
CN201610729473.4A 2016-08-26 2016-08-26 Information security management method and its device Active CN106339619B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610729473.4A CN106339619B (en) 2016-08-26 2016-08-26 Information security management method and its device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610729473.4A CN106339619B (en) 2016-08-26 2016-08-26 Information security management method and its device

Publications (2)

Publication Number Publication Date
CN106339619A CN106339619A (en) 2017-01-18
CN106339619B true CN106339619B (en) 2019-01-18

Family

ID=57822177

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610729473.4A Active CN106339619B (en) 2016-08-26 2016-08-26 Information security management method and its device

Country Status (1)

Country Link
CN (1) CN106339619B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN200976141Y (en) * 2006-10-23 2007-11-14 北京飞天诚信科技有限公司 Plug-and-play intelligent cipher key device
CN101493866A (en) * 2008-01-23 2009-07-29 杨筑平 Controlled storage apparatus and access operation software

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN200976141Y (en) * 2006-10-23 2007-11-14 北京飞天诚信科技有限公司 Plug-and-play intelligent cipher key device
CN101493866A (en) * 2008-01-23 2009-07-29 杨筑平 Controlled storage apparatus and access operation software

Also Published As

Publication number Publication date
CN106339619A (en) 2017-01-18

Similar Documents

Publication Publication Date Title
CN104735065B (en) A kind of data processing method, electronic equipment and server
CN105279832A (en) Intelligent door lock system and control method thereof
Ahvanooey et al. Modern authentication schemes in smartphones and IoT devices: An empirical survey
CN109767534A (en) Gate inhibition's access method, system, management terminal and door control terminal based on block chain
CN104700015B (en) Based on the dynamic password formation method of iris information
CN102769531A (en) Identity authentication device and method thereof
CN103985036A (en) Two-dimension code payment method with biological characteristics
CN105574963B (en) A kind of gate inhibition's verification method and door control terminal
CN102316112A (en) Password authentication method in network application and system
CN109905374A (en) A kind of identity identifying method with secret protection characteristic towards wired home
CN111131202A (en) Identity authentication method and system based on multiple information authentication
CN107733636A (en) Authentication method and Verification System
CN105635075A (en) Method of registering cloud terminal, cloud terminal, cloud server and cloud system
CN106059764A (en) Password and fingerprint third-party authentication method based on halting key derivation function
CN107358084A (en) The cloud storage method and apparatus of data
CN112260820A (en) Mobile payment password keyboard based on key splitting protection in Android system and implementation method thereof
CN101345625B (en) Remote authentication method based on biological characteristic
CN106339619B (en) Information security management method and its device
CN109961542A (en) A kind of entrance guard device, verifying device, verifying system and its verification method
CN105516168A (en) Off-line iris authentication device and method
Liu et al. Secure pairing with wearable devices by using ambient sound and light
Kardaş et al. k‐strong privacy for radio frequency identification authentication protocols based on physically unclonable functions
CN111915290A (en) Mobile payment password keyboard based on key splitting protection under iOS system and implementation method thereof
CN106710033A (en) Door control opening method and device
CN107249006A (en) The authentication method and device of password use environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20181129

Address after: Room 1301, Building 430-1, Xujiahui Road, Huangpu District, Shanghai 200025

Applicant after: Shanghai Hengnengtai Enterprise Management Co., Ltd.

Address before: 510000 No. 4 Lane seven, Luogang District, Guangzhou, Guangdong.

Applicant before: He Ying

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant