CN106485128A - A kind of system based on removable storage device fingerprint - Google Patents
A kind of system based on removable storage device fingerprint Download PDFInfo
- Publication number
- CN106485128A CN106485128A CN201610967317.1A CN201610967317A CN106485128A CN 106485128 A CN106485128 A CN 106485128A CN 201610967317 A CN201610967317 A CN 201610967317A CN 106485128 A CN106485128 A CN 106485128A
- Authority
- CN
- China
- Prior art keywords
- password
- module
- storage device
- user name
- removable storage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Abstract
The present invention discloses a kind of system based on removable storage device fingerprint, include mobile phone, server, computer and removable storage device, mobile phone includes mobile phone radio frequency module and the first near-field communication module, removable storage device includes USB interface, the second near-field communication module and fingerprint module, and computer includes fingerprint and device password initialization module, correction verification module, user name crypto module data memory module.It is different from prior art, technique scheme improves the safety of data storage, and is easy to the storage of data.
Description
Technical field
The present invention relates to data security arts, more particularly, to a kind of system based on removable storage device fingerprint.
Background technology
Existing data storage method has various ways, but all there is the problem of information leakage.As using movement
The storage device of formula, directly stores data on movable storage device, then there is the problem of storage device loss, after loss
Will result in the leakage of information.Or the mode using the network storage, the network storage needs on computers every time using user
Name password login, is so easy to software or photographic head records user name password, causes user name password to reveal, thus making
Become leaking data.I.e. existing data storage method is still very dangerous.
Content of the invention
For this reason, it may be necessary to provide a kind of system based on removable storage device fingerprint, solve available data storage dangerous
Problem.
For achieving the above object, inventor provide a kind of system based on removable storage device fingerprint, include handss
Machine, server, computer and removable storage device, mobile phone includes mobile phone radio frequency module and the first near-field communication module, mobile
Formula storage device includes USB interface, the second near-field communication module and fingerprint module, and computer includes fingerprint and device password is initial
Change module, correction verification module, user name crypto module data memory module, wherein:
Computer is used for detecting whether removable storage device inserts the USB interface of computer, judges to move after insertion is detected
Whether formula storage device is stored with finger print data;Without storage finger print data, then enable fingerprint and device password initialization
Module, fingerprint and device password initialization module are used for initializing fingerprint and device password and enabling calibration mode after initialization
Block;If being stored with finger print data, directly enable correction verification module;
Correction verification module is used for obtaining user input device code data and being dealt into removable storage device, and portable storage sets
It is ready for use on after getting finger print data and device password data, and be compared with the data in removable storage device, if
All pass through then to enable user name crypto module, otherwise user name crypto module;
User name crypto module is used for judging whether removable storage device has username and password information;Movable type is deposited
Storage equipment does not have username and password information, carries out username and password initialization, treats that user name and cryptographic initialization complete
Afterwards, server is corresponding with the first encryption rule for generation first encryption rule related to user name, the second encryption rule
First deciphering rule, second deciphering rule corresponding with the second encryption rule, returns the first encryption rule and the second deciphering rule
To removable storage device, enable data memory module;Removable storage device has username and password information, enables data
Memory module;
Data memory module is used for sending file reading instruction;Removable storage device is used for receiving file reading instruction
Afterwards, using the first encryption rule, password is encrypted, file is read by instruction and user name by near-field communication module and adds
Password after close is sent to mobile phone;Mobile phone is used for the password after mobile phone radio frequency module sends user name, encrypts and file is read
Instruction fetch is to server;Server is used for obtaining the first deciphering rule decrypted user name and password according to user name and being verified
Afterwards, the fileinfo reading is encrypted using the second encryption rule, and returns the fileinfo after encryption to mobile phone;Mobile phone
For sending the information after encryption by near-field communication module to removable storage device, removable storage device is used for file
Information is decrypted and is sent to computer, and computer is used for the fileinfo that display is read;
After data memory module is additionally operable to files passe operation is detected, send the fileinfo uploading to portable storage
Equipment;Removable storage device is used for generating random number, and random number and fileinfo are encrypted, and using the first encryption
Rule is encrypted to password, by near-field communication module, the password after user name and encryption, fileinfo is sent to mobile phone;
Mobile phone is used for the password after mobile phone radio frequency module sends user name, encrypts and fileinfo to server;Server is used for
After deciphering and verify that username and password passes through, deciphering obtains random number and fileinfo, and storage file information is to user name pair
Under the file answered.
Further, fingerprint and device password initialization module are used for sending acquisition fingerprint prompting, wait fingerprint module to obtain
Get finger print data, send acquisition device password prompting after getting finger print data, wait the keyboard of computer to get equipment close
After code data, storage finger print data and device password data are in removable storage device, and enable correction verification module.
Further, user name crypto module carry out username and password initialized when, user name crypto module use
Point out user input username and password in pop-up dialogue box, after computer gets user name password, by near-field communication module
User name, password and finger print data are sent to mobile phone, mobile phone is used for sending user name, close by the mobile phone radio frequency module of mobile phone
Code and finger print data to server, server is used for whether detecting user name, password and finger print data by checking, server is used
Corresponding with the first encryption rule in first encryption rule related to user name of generation after being verified, the second encryption rule
The first deciphering rule second deciphering rule corresponding with the second encryption rule, and by the result, the first encryption rule and the
Two deciphering rules are dealt into mobile phone, and mobile phone is used for being forwarded to removable storage device by near-field communication module, and portable storage sets
It is ready for use on storage the first encryption rule and the second deciphering rule and the result is forwarded to computer, computer is used for testing receiving
Card result after result is judged, judged result by then user name password storage in removable storage device,
And enabling data memory module, judged result does not pass through the username and password mistake of then its input of prompting user, does not enable number
According to memory module.
It is different from prior art, technique scheme 1. is associated with username and password by fingerprint, and user is not required to
To input user name password again, it is to avoid the problem that user name password is revealed.2. pass through username and password in server
Associate with fileinfo, and do not associate finger print data, it is to avoid the file that the finger print data that finger print data causes repeats and occurs
The problem of information leakage.3. what the communication of computer and server was walked is the passage of mobile phone radio frequency, reduce network monitored can
Can, it is to avoid leaking data.4. pair fileinfo adopts each user name cryptographic check, fileinfo and user name password simultaneously
In the case of being all encryption.5. use the cipher mode of random number so that the file after encryption has more confusion, it is to avoid data
It is coated decrypted problem after intercepting and capturing.
Brief description
Fig. 1 is the flow chart of the inventive method;
Fig. 2 is the structure chart of present system.
Specific embodiment
By the technology contents of detailed description technical scheme, structural features, realized purpose and effect, below in conjunction with concrete reality
Apply example and coordinate accompanying drawing to be explained in detail.
Refer to Fig. 1 to Fig. 2, the present embodiment provides a kind of system based on removable storage device fingerprint, including mobile phone
205th, server 207, computer 201 and removable storage device 203, specifically, system architecture diagram can be as the system 200 of Fig. 2.
Mobile phone includes mobile phone radio frequency module and the first near-field communication module, and mobile phone can be carried out even with base station by mobile phone radio frequency module
Connect, be connected such that it is able to surf the Net and with server.Portable storage includes the second near-field communication module and fingerprint module, specifically
Ground, removable storage device also includes processing module and memory module, processing module respectively with fingerprint module, memory module, the
Two near-field communication module and USB interface connect, and removable storage device is connected with computer by USB interface, and processing module is permissible
Encrypt to realizing the hardware to memory module data, it is to avoid directly read the data of memory module.Removable storage device
Little, without power supply, its power supply has USB interface to power, and can carry with, easy to carry.Process below by the system
Flow process illustrates to the system.
This flow process comprises the steps:Whether step S101 computer detection removable storage device inserts USB interface, S102
Judge after insertion is detected whether removable storage device is stored with finger print data;Here judgement can be that computer sends an inquiry
Ask instruction to removable storage device, removable storage device reads memory module, judges whether the finger print data that is stored with, then
By result feedback to the computer, it is to avoid computer directly reads this finger print data and causes the problem that data may reveal.
Without storage finger print data, enter S103 fingerprint and device password initialization step, step to be initiated is complete
Become laggard checking procedure S104;If being stored with finger print data, it is directly entered checking procedure S104.Fingerprint and device password are all
It is used to the essential condition of removable storage device.Fingerprint and device password initialization step are exactly by fingerprint and device password
It is placed in the memory module of removable storage device.
When having fingerprint inside memory module, need to use removable storage device, then will be verified.Verification step
Suddenly comprise the steps:S104 computer obtains user input device code data and is dealt into removable storage device, and movable type is deposited
After storage equipment gets finger print data and device password data, and it is compared with the data in removable storage device, that is, walk
Rapid S105, if passed through, continues below step.Otherwise enter step S106 this method to terminate.Here checking will be received simultaneously
To after verified, rather than verified one by one, thus be avoided that disabled user is cracked one by one.Checking simultaneously is only
There is a mistake to be exactly not all right, and disabled user does not know that error, increased and cracks difficulty, simultaneously because authenticated
Journey is carried out inside removable storage device, and this equipment does not have autgmentability, for computer, this equipment be difficult to into
Invade and crack.
It is verified, represents user and there is right using this removable storage device, then enter step S107,
Step S107 computer judges whether removable storage device has username and password information;Here computer why is needed to sentence
Disconnected, it is because computer could be interacted with people, but computer is only to obtain a result, the process of judgement also needs to moving
In dynamic formula storage device.
Removable storage device does not have username and password information, enters step S108 username and password initialization step
Suddenly, after the completion for the treatment of user name and cryptographic initialization step, server generates first encryption rule related to user name, second adds
Close rule corresponding with the first encryption rule first deciphers rule second deciphering rule corresponding with the second encryption rule, returns
First encryption rule and the second deciphering rule arrive removable storage device, enter data storing steps S109 and S110;Portable
Storage device has username and password information, is directly put into data storing steps S109 and step S110.User name and close
Code is logged on the key of server, because user name password can be unique, but finger print data is according to sampled point not
With it is likely that not being unique.If sampled point is little, then the finger print data of different fingerprints is possible to occur identical.As
Fruit is directly logged in using finger print data, then it is likely that there being one or two finger print data when user radix is very big
It is the same, so can cause data obfuscation.This is absolutely not permission in data security arts.User name cryptographic initialization
Afterwards, be just stored with removable storage device username and password.But during use below, avoid the need for again
Input username and password, it is to avoid the leakage of username and password.
Data storing steps comprise the steps:Including the step of reading service device file with upload files to server
Step.Before upload should first reading service device file file directory, so file can be stored under the catalogue specified, that is,
The fileinfo of the application can be file directory information it is also possible to be directly file, be so equal to and download from a server literary composition
Part.Wherein, the step of reading service device file includes:Computer sends file and reads instruction, and removable storage device receives literary composition
Part read instruction after, using the first encryption rule, password is encrypted, by near-field communication module by file read instruction and
User name and encryption after password be sent to mobile phone, mobile phone by mobile phone radio frequency module send user name, encrypt after password and
File reads instruction and arrives server, and server is used for obtaining the first deciphering rule decrypted user name and password according to user name and testing
After card passes through, the fileinfo reading is encrypted using the second encryption rule, and it is in one's hands to return the fileinfo after encryption
Machine, to removable storage device, removable storage device is to file for information after near-field communication module sends encryption for the mobile phone
Information is decrypted and is sent to computer, the fileinfo that computer display is read.
Here the encryption to password encrypts rule using first related to user name generating random when initialized
Then, this first encryption rule is stored in removable storage device, and is associated with user name, then corresponding first solution
Close rule storage is on the server.The encryption of the fileinfo of server adopts the second encryption rule, same and user name
Association, then corresponding second deciphering is stored in removable storage device and fileinfo can be decrypted.Movable type is deposited
The data that storage equipment is gone out can be encrypted using the first encryption rule except user name, and the data that server returns all may be used
To be encrypted using the second encryption rule, that is, these information are not transmission in plain text, thus considerably increase safety.
Simultaneously because using user name association, the user name of each removable storage device is different, even if user name is identical, by
Different in generation random only when initialized, the removable storage device of such the past will lose efficacy, and so exists
It is only necessary to be updated by a new removable storage device again when removable storage device is lost.So i.e.
Disabled user is made to have cracked the encryption and decryption rule of some removable storage device, also will not be to other removable storage devices
Produce and threaten, substantially increase the Information Security between different removable storage devices.
The step uploading files to server includes:Computer detection is to after files passe operation.Upload operation can be inspection
The file surveying user drags to upload frame operation, and the fileinfo of the file that detection user drags, as the fileinfo uploading.
Then computer sends the fileinfo uploading to removable storage device, and removable storage device generates random number, and to random
Number and fileinfo are encrypted.The encryption of file can adopt and user name password identical the first encryption rule, and adopts
First encryption rule is encrypted to password.By the second near-field communication module, the password after user name and encryption, file are believed
Breath is sent to mobile phone, and mobile phone sends user name, the password after encryption and fileinfo to server by mobile phone radio frequency module, clothes
After business device is deciphered and verified that username and password passes through, deciphering obtains random number and fileinfo, and storage file information is to user
Under the corresponding file of name.
Here carry out the transmission of data using random number, the fileinfo after encrypting can be allowed more chaotic, because with
Machine number is unique, and is to change always.Accordingly even when being identical file, the data after its encryption is also different
, it is to avoid disabled user, by constantly reversely decrypting encryption rule using the file of variable quantity very little, increases and cracks difficulty
Degree is it is ensured that safety.Simultaneously because the passage of this programme data transfer is not through computer, so, computer does not need to network,
On the computer of some concerning security matters, just do not exist be cracked and shoot may be it is ensured that the safety of computer data.By mobile phone radio frequency
Module is directly connected with base station, also there is not the possibility of monitoring.Mobile phone does not have data storage, removable storage device yet
There is no data storage, this both lost, do not result in the problem of loss of data yet.Even if removable storage device is lost
, there is no fingerprint and corresponding device password, have no idea to use removable storage device yet.And even with movable type
Storage device, is also the username and password that cannot get inside, because username and password to be used, portable storage
Equipment will be encrypted to it.The user discover that removable storage device lost it is only necessary to change user on server
The password of name just because removable storage device will be cracked certainly will need for a period of time, even and if having cracked movement
Formula storage device, because username and password cannot be also otiose by checking.So substantially increase data safety
Property, the problem lost without concern of data.
The change of password can also be like above step carry out, user first goes to buy a blank portable storage and sets
Standby, then initialization finger print data and device password, then initialising subscriber name and password, then can be carried out more to password
Change, computer sends the password after a change directive, user name before, password and change, issues removable storage device,
Removable storage device, to being sent to server after these encryptions, after the user name before server verification, password pass through, will take
After the password modification of business device storage, then the password after changing is returned to removable storage device, removable storage device by mobile phone
More new password.Certainly, in order to prevent Brute Force password, the intensity of password can require, and such as wants upper and lower case letter to add
Upper numeral, digit can be more than 10 etc..And if default number of times is not passed through in username and password checking in one day,
Just no longer pass through the checking of this user name, it is to avoid Brute Force.
Specifically, described fingerprint and device password initialization step include:Computer sends acquisition fingerprint prompting, and movable type is deposited
Storage equipment waits fingerprint module to get finger print data, and after getting finger print data, removable storage device informs computer, computer
Send acquisition device password prompting, after waiting the keyboard of computer to get device password data, computer sends device password to shifting
Dynamic formula storage device, such removable storage device just store finger print data and device password data in, and enter verification step
Suddenly.
User name cryptographic initialization and stricture of vagina and device password initialize similar, username and password initialization step include as
Lower step:Computer pop-up dialogue box points out user input username and password, after computer gets user name password, by near field
User name, password and finger print data are sent to mobile phone by communication module, then are sent to server by the mobile phone radio frequency module of mobile phone,
Whether, by checking, server generates and user famous prime minister after being verified for server detection user name, password and finger print data
The first encryption rule, the second encryption rule first deciphering rule corresponding with the first encryption rule and the second encryption rule closing
Corresponding second deciphering rule, and the result, the first encryption rule and the second deciphering rule are dealt into mobile phone, mobile phone passes through near
Field communication module is forwarded to removable storage device, and removable storage device is used for storage the first encryption rule and the second deciphering rule
Then and by the result it is forwarded to computer, computer judges to result after receiving the result, judged result is to pass through
Then user name password storage in removable storage device, and enter data storing steps, judged result is not passed through then to carry
Show the username and password mistake of its input of user, this method terminates.
Further, data storing steps include following delete step:Computer detection is deleted after instruction to file, portable
After storage device receives file deletion instruction, using the first encryption rule, password is encrypted, by near-field communication module
The password that file is deleted after instruction and user name and encryption is sent to mobile phone, and mobile phone sends user by mobile phone radio frequency module
Password after name, encryption and file are deleted instruction and are arrived server, and server is used for obtaining the first deciphering rule solution according to user name
Close username and password after being verified, deletes file and deletes and instruct corresponding file.It is achieved thereby that under the browsing of file
Carry, upload and delete.
Similar with said method embodiment, the invention provides a kind of based on removable storage device fingerprint be
System, includes mobile phone, server, computer and removable storage device, and mobile phone includes mobile phone radio frequency module and the first near field leads to
Letter module, removable storage device includes USB interface, the second near-field communication module and fingerprint module, computer include fingerprint and
Device password initialization module, correction verification module, user name crypto module data memory module, wherein:
Computer is used for detecting whether removable storage device inserts the USB interface of computer, judges to move after insertion is detected
Whether formula storage device is stored with finger print data;Without storage finger print data, then enable fingerprint and device password initialization
Module, fingerprint and device password initialization module are used for initializing fingerprint and device password and enabling calibration mode after initialization
Block;If being stored with finger print data, directly enable correction verification module;
Correction verification module is used for obtaining user input device code data and being dealt into removable storage device, and portable storage sets
It is ready for use on after getting finger print data and device password data, and be compared with the data in removable storage device, if
All pass through then to enable user name crypto module, otherwise user name crypto module;
User name crypto module is used for judging whether removable storage device has username and password information;Movable type is deposited
Storage equipment does not have username and password information, carries out username and password initialization, treats that user name and cryptographic initialization complete
Afterwards, server is corresponding with the first encryption rule for generation first encryption rule related to user name, the second encryption rule
First deciphering rule, second deciphering rule corresponding with the second encryption rule, returns the first encryption rule and the second deciphering rule
To removable storage device, enable data memory module;Removable storage device has username and password information, enables data
Memory module;
Data memory module is used for sending file reading instruction;Removable storage device is used for receiving file reading instruction
Afterwards, using the first encryption rule, password is encrypted, file is read by instruction and user name by near-field communication module and adds
Password after close is sent to mobile phone;Mobile phone is used for the password after mobile phone radio frequency module sends user name, encrypts and file is read
Instruction fetch is to server;Server is used for obtaining the first deciphering rule decrypted user name and password according to user name and being verified
Afterwards, the fileinfo reading is encrypted using the second encryption rule, and returns the fileinfo after encryption to mobile phone;Mobile phone
For sending the information after encryption by near-field communication module to removable storage device, removable storage device is used for file
Information is decrypted and is sent to computer, and computer is used for the fileinfo that display is read;
After data memory module is additionally operable to files passe operation is detected, send the fileinfo uploading to portable storage
Equipment;Removable storage device is used for generating random number, and random number and fileinfo are encrypted, and using the first encryption
Rule is encrypted to password, by near-field communication module, the password after user name and encryption, fileinfo is sent to mobile phone;
Mobile phone is used for the password after mobile phone radio frequency module sends user name, encrypts and fileinfo to server;Server is used for
After deciphering and verify that username and password passes through, deciphering obtains random number and fileinfo, and storage file information is to user name pair
Under the file answered.
Further, fingerprint and device password initialization module are used for sending acquisition fingerprint prompting, wait fingerprint module to obtain
Get finger print data, send acquisition device password prompting after getting finger print data, wait the keyboard of computer to get equipment close
After code data, storage finger print data and device password data are in removable storage device, and enable correction verification module.
Further, user name crypto module carry out username and password initialized when, user name crypto module use
Point out user input username and password in pop-up dialogue box, after computer gets user name password, by near-field communication module
User name, password and finger print data are sent to mobile phone, mobile phone is used for sending user name, close by the mobile phone radio frequency module of mobile phone
Code and finger print data to server, server is used for whether detecting user name, password and finger print data by checking, server is used
Corresponding with the first encryption rule in first encryption rule related to user name of generation after being verified, the second encryption rule
The first deciphering rule second deciphering rule corresponding with the second encryption rule, and by the result, the first encryption rule and the
Two deciphering rules are dealt into mobile phone, and mobile phone is used for being forwarded to removable storage device by near-field communication module, and portable storage sets
It is ready for use on storage the first encryption rule and the second deciphering rule and the result is forwarded to computer, computer is used for testing receiving
Card result after result is judged, judged result by then user name password storage in removable storage device,
And enabling data memory module, judged result does not pass through the username and password mistake of then its input of prompting user, does not enable number
According to memory module.
Although being described to the various embodiments described above, those skilled in the art once know basic wound
The property made concept, then can make other change and modification to these embodiments, so the foregoing is only embodiments of the invention,
Not thereby the equivalent structure that the scope of patent protection of the restriction present invention, every utilization description of the invention and accompanying drawing content are made
Or equivalent flow conversion, or directly or indirectly it is used in other related technical fields, all include the patent in the present invention in the same manner
Within protection domain.
Claims (3)
1. a kind of system based on removable storage device fingerprint is it is characterised in that include mobile phone, server, computer and shifting
Dynamic formula storage device, mobile phone includes mobile phone radio frequency module and the first near-field communication module, and removable storage device includes USB
Interface, the second near-field communication module and fingerprint module, computer includes fingerprint and device password initialization module, correction verification module, use
Name in an account book crypto module data memory module, wherein:
Computer is used for detecting whether removable storage device inserts the USB interface of computer, judges that movable type is deposited after insertion is detected
Whether storage equipment is stored with finger print data;Without storage finger print data, then enable fingerprint and device password initialization module,
Fingerprint and device password initialization module are used for initializing fingerprint and device password and enabling correction verification module after initialization;If
Be stored with finger print data, then directly enable correction verification module;
Correction verification module is used for obtaining user input device code data and being dealt into removable storage device, and removable storage device is used
After getting finger print data and device password data, and it is compared with the data in removable storage device, if all logical
Cross then enable user name crypto module, otherwise user name crypto module;
User name crypto module is used for judging whether removable storage device has username and password information;Portable storage sets
Standby do not have username and password information, carries out username and password initialization, after the completion for the treatment of user name and cryptographic initialization, clothes
Business device is used for generating first encryption rule related to user name, the second encryption rule corresponding with the first encryption rule first
Second deciphering corresponding with the second encryption rule of deciphering rule is regular, returns the first encryption rule and the second deciphering rule to shifting
Dynamic formula storage device, enables data memory module;Removable storage device has username and password information, enables data storage
Module;
Data memory module is used for sending file reading instruction;After removable storage device is used for receiving file reading instruction,
Using the first encryption rule, password is encrypted, after file is read instruction and user name and encryption by near-field communication module
Password be sent to mobile phone;Mobile phone is used for the password after mobile phone radio frequency module sends user name, encrypts and file reads and refers to
Make server;After server is used for obtaining the first deciphering rule decrypted user name and password and being verified according to user name,
The fileinfo reading is encrypted using the second encryption rule, and returns the fileinfo after encryption to mobile phone;Mobile phone is used
, to removable storage device, removable storage device is for believing to file for information after sending encryption by near-field communication module
Breath is decrypted and is sent to computer, and computer is used for the fileinfo that display is read;
After data memory module is additionally operable to files passe operation is detected, sends the fileinfo uploading and set to portable storage
Standby;Removable storage device is used for generating random number, and random number and fileinfo are encrypted, and using the first encryption rule
Then password is encrypted, the password after user name and encryption, fileinfo are sent to by mobile phone by near-field communication module;Handss
Machine is used for the password after mobile phone radio frequency module sends user name, encrypts and fileinfo to server;Server is used for solving
Close and after verifying that username and password passes through, deciphering obtains random number and fileinfo, and storage file information arrives user name correspondence
File under.
2. a kind of system based on removable storage device fingerprint according to claim 1 it is characterised in that:Fingerprint and setting
Standby cryptographic initialization module is used for sending acquisition fingerprint prompting, waits fingerprint module to get finger print data, gets fingerprint number
According to after send acquisition device password prompting, after waiting the keyboard of computer to get device password data, storage finger print data and setting
Standby code data is in removable storage device, and enables correction verification module.
3. a kind of system based on removable storage device fingerprint according to claim 1 it is characterised in that:User name is close
Code module carry out username and password initialized when, user name crypto module be used for pop-up dialogue box prompting user input use
User name, password and finger print data, after computer gets user name password, are sent by name in an account book and password by near-field communication module
To mobile phone, mobile phone is for sending user name, password and finger print data to server, server by the mobile phone radio frequency module of mobile phone
For whether detecting user name, password and finger print data by checking, server is used for generating and user name after being verified
The first related encryption rule, the second encryption rule first deciphering rule corresponding with the first encryption rule and second encrypt rule
Then corresponding second deciphering rule, and the result, the first encryption rule and the second deciphering rule are dealt into mobile phone, mobile phone is used for
Removable storage device is forwarded to by near-field communication module, removable storage device is used for storage the first encryption rule and second
The result is simultaneously forwarded to computer by deciphering rule, and computer is used for after receiving the result, result being judged, judges
Result by then user name password storage in removable storage device, and enable data memory module, judged result
Do not pass through the username and password mistake of then its input of prompting user, do not enable data memory module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610967317.1A CN106485128A (en) | 2016-10-28 | 2016-10-28 | A kind of system based on removable storage device fingerprint |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610967317.1A CN106485128A (en) | 2016-10-28 | 2016-10-28 | A kind of system based on removable storage device fingerprint |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106485128A true CN106485128A (en) | 2017-03-08 |
Family
ID=58271685
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610967317.1A Withdrawn CN106485128A (en) | 2016-10-28 | 2016-10-28 | A kind of system based on removable storage device fingerprint |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106485128A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107517213A (en) * | 2017-09-01 | 2017-12-26 | 郑州云海信息技术有限公司 | The method and its device of fingerprint recognition |
CN107517212A (en) * | 2017-09-01 | 2017-12-26 | 郑州云海信息技术有限公司 | The method and its device of fingerprint recognition |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101010677A (en) * | 2004-09-06 | 2007-08-01 | 皇家飞利浦电子股份有限公司 | Portable storage device and method for exchanging data |
CN103051664A (en) * | 2012-08-14 | 2013-04-17 | 深圳市朗科科技股份有限公司 | File management method and device for cloud storage system as well as cloud storage system |
CN103595730A (en) * | 2013-11-28 | 2014-02-19 | 中国科学院信息工程研究所 | Ciphertext cloud storage method and system |
CN104615929A (en) * | 2013-11-04 | 2015-05-13 | 安全地带株式会社 | Security key device for secure cloud services, and system and method of providing security cloud services |
CN104733008A (en) * | 2015-04-07 | 2015-06-24 | 俞晓东 | Mobile storage equipment capable of realizing cloud storage based on fingerprint identification |
CN205104233U (en) * | 2015-10-09 | 2016-03-23 | 北京智博联科技股份有限公司 | USB removes magnetic disc with bluetooth transmit system |
CN105847305A (en) * | 2016-06-21 | 2016-08-10 | 新昌县七星街道明盛模具厂 | Safe processing and accessing method of cloud resource |
CN106022157A (en) * | 2015-05-04 | 2016-10-12 | 深圳市魔力信息技术有限公司 | Cloud and local secure storage method and device |
-
2016
- 2016-10-28 CN CN201610967317.1A patent/CN106485128A/en not_active Withdrawn
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101010677A (en) * | 2004-09-06 | 2007-08-01 | 皇家飞利浦电子股份有限公司 | Portable storage device and method for exchanging data |
CN103051664A (en) * | 2012-08-14 | 2013-04-17 | 深圳市朗科科技股份有限公司 | File management method and device for cloud storage system as well as cloud storage system |
CN104615929A (en) * | 2013-11-04 | 2015-05-13 | 安全地带株式会社 | Security key device for secure cloud services, and system and method of providing security cloud services |
CN103595730A (en) * | 2013-11-28 | 2014-02-19 | 中国科学院信息工程研究所 | Ciphertext cloud storage method and system |
CN104733008A (en) * | 2015-04-07 | 2015-06-24 | 俞晓东 | Mobile storage equipment capable of realizing cloud storage based on fingerprint identification |
CN106022157A (en) * | 2015-05-04 | 2016-10-12 | 深圳市魔力信息技术有限公司 | Cloud and local secure storage method and device |
CN205104233U (en) * | 2015-10-09 | 2016-03-23 | 北京智博联科技股份有限公司 | USB removes magnetic disc with bluetooth transmit system |
CN105847305A (en) * | 2016-06-21 | 2016-08-10 | 新昌县七星街道明盛模具厂 | Safe processing and accessing method of cloud resource |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107517213A (en) * | 2017-09-01 | 2017-12-26 | 郑州云海信息技术有限公司 | The method and its device of fingerprint recognition |
CN107517212A (en) * | 2017-09-01 | 2017-12-26 | 郑州云海信息技术有限公司 | The method and its device of fingerprint recognition |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104731612B (en) | Mobile equipment safety component software is tied to SIM | |
CN104469767B (en) | The implementation method of integrated form security protection subsystem in a set of mobile office system | |
CN106304074B (en) | Auth method and system towards mobile subscriber | |
CN102223364B (en) | Method and system for accessing e-book data | |
CN102685110B (en) | Universal method and system for user registration authentication based on fingerprint characteristics | |
Cheng | Security attack safe mobile and cloud-based one-time password tokens using rubbing encryption algorithm | |
CA2964458A1 (en) | Securing host card emulation credentials | |
CN104662870A (en) | Data security management system | |
CN101621794A (en) | Method for realizing safe authentication of wireless application service system | |
CN109618341A (en) | A kind of digital signature authentication method, system, device and storage medium | |
CN103237305A (en) | Password protection method for smart card on mobile terminals | |
CN107332666A (en) | Terminal document encryption method | |
Liang et al. | Secureweb: Protecting sensitive information through the web browser extension with a security token | |
CN109740319B (en) | Digital identity verification method and server | |
CN106503529A (en) | A kind of cloud storage system based on fingerprint | |
CN106485128A (en) | A kind of system based on removable storage device fingerprint | |
CN110022207A (en) | Key management and the method and apparatus for handling data | |
CN108701200B (en) | Improved memory system | |
CN104901967A (en) | Registration method for trusted device | |
CN106570416A (en) | Fingerprint-based cloud storage method | |
CN106570417A (en) | Data security storage method | |
CN106506635A (en) | A kind of portable method for cloud storage | |
CN107612691A (en) | Authentication information transmission method and device and user information authentication system | |
CN106570377A (en) | Mobile cloud data storage system | |
CN106503531A (en) | A kind of server data storage system for improving security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Minhou County of Fuzhou City, Fujian province 350100 Hou Guan Lu No. 98 building 10 102 Spring Garden Applicant after: Yan Bizhu Address before: Gulou District of Fuzhou City, Fujian province 350001 Yangqiao road Fuk Lantau garden 5 building 301 Applicant before: Yan Bizhu |
|
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20170308 |