CN106656982A - Authentication module and method for double-computer switching device - Google Patents

Authentication module and method for double-computer switching device Download PDF

Info

Publication number
CN106656982A
CN106656982A CN201610921463.0A CN201610921463A CN106656982A CN 106656982 A CN106656982 A CN 106656982A CN 201610921463 A CN201610921463 A CN 201610921463A CN 106656982 A CN106656982 A CN 106656982A
Authority
CN
China
Prior art keywords
access right
user
authority
computer
switch
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610921463.0A
Other languages
Chinese (zh)
Inventor
赵威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Information and Telecommunication Branch of State Grid Heilongjiang Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Information and Telecommunication Branch of State Grid Heilongjiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Information and Telecommunication Branch of State Grid Heilongjiang Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201610921463.0A priority Critical patent/CN106656982A/en
Publication of CN106656982A publication Critical patent/CN106656982A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/382Information transfer, e.g. on bus using universal interface adapter
    • G06F13/385Information transfer, e.g. on bus using universal interface adapter for adaptation of a particular data processing system to different peripheral devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security

Abstract

The invention provides an authentication module and method for a double-computer switching device, and aims at satisfying requirements for development of an intranet and extranet computer switching device. Both the authentication module and method are realized on the basis of an ARM, and the ARM is connected with an intranet and extranet switching button and an NFC card reader or a fingerprint identification device. According to the authentication module and method, whether a trigger signal emitted by the intranet and extranet switching button is received is determined, if YES, NFC card information or fingerprint information is read, a utilization authority of a user is determined according to the information, and corresponding authorities are opened for the user according to the utilization authority. Thus, different using authorities are opened for different users, the information safety is ensured, and the module and method are suitable for intranet and extranet computer switching of a power system.

Description

For the authentication module and method for authenticating of duplex computer switch
Technical field
The present invention relates to the authentication techniques in duplex computer switching.
Background technology
At present the existing information system of large enterprise is divided into physics between independent Intranet and outer net, and Intranet and outer net Isolation, requires, staff needs individually to be equipped with two computers, connects respectively in order to meet Intranet and outer net working environment simultaneously Intranet and outer net are connected to, and need that keyboard and mouse and display is separately configured to two computers, calculated by per platform respectively The keyboard and mouse and display of machine is operated to computer.According further to different operating demand, in addition it is also necessary to be separately configured USB flash disk, The computer peripheral equipments such as USB printer, USB scanners, USB handwriting pads, due to physical isolation characteristic between Intranet and outer net, calculate Machine peripheral hardware cannot use network share, and frequently transfer plug is substantial amounts of between Intranet and outer net computer for staff's needs USB peripheral, and the cable winds for thus bringing, bring the inconvenience in terms of the waste and work of great manpower.Therefore, need badly A kind of device for adopting a display to switch between intranet and extranet main frame, then user is using the device in two calculating When switching between machine, the device needs to examine the identity of user, in order to avoid information security is threatened.
The content of the invention
The invention aims to meet the development need of intranet and extranet computer switching device, there is provided two kinds based on double The authentication module of calculation machine switch and two kinds of method for authenticating.
The first authentication module for being used for duplex computer switch is embedded in ARM, and the ARM is connected with intranet and extranet switching Button and NFC reader:
The authentication module is included with lower unit:
Switching judging unit:Judge whether to receive the trigger that intranet and extranet switching key sends, and be in judged result Start card reading unit when being, switching judging unit is restarted when judged result is no;
Card reading unit:Read the nfc card information that NFC reader is sent;
Authority open cell:The access right of user is judged according to nfc card information, and according to the access right to user The corresponding authority of opening, then restarts switching judging unit.
The first method for authenticating for being used for duplex computer switch realizes that the ARM is connected with intranet and extranet switching based on ARM Button and NFC reader:
The method for authenticating is comprised the following steps:
Switching judging step:Judge whether to receive the trigger that intranet and extranet switching key sends, and be in judged result Card Reader step is performed when being, when judged result is no switching judging step is re-executed;
Card Reader step:The nfc card information that NFC reader is sent is read, and authority is performed after the step terminates and opened Step;
Authority opens step:The access right of user is judged according to nfc card information, and according to the access right to user The corresponding authority of opening, is then back to perform switching judging step.
The authentication module for being used for duplex computer switch second is embedded in ARM, and the ARM is connected with intranet and extranet switching Button and fingerprint identification device:
The authentication module is included with lower unit:
Switching judging unit:Judge whether to receive the trigger that intranet and extranet switching key sends, and be in judged result Start fingerprint identification unit when being, switching judging unit is restarted when judged result is no;
Fingerprint identification unit:Read the finger print information that fingerprint identification device is sent;
Authority open cell:The access right of user is judged according to finger print information, and according to the access right to user The corresponding authority of opening, then restarts switching judging unit.
The method for authenticating for being used for duplex computer switch for second realizes that the ARM is connected with intranet and extranet switching based on ARM Button and fingerprint identification device:
The method for authenticating is comprised the following steps:
Switching judging step:Judge whether to receive the trigger that intranet and extranet switching key sends, and be in judged result Fingerprinting step is performed when being, when judged result is no switching judging step is re-executed;
Fingerprinting step:Read the finger print information that fingerprint identification device is sent, and the right of execution after the step terminates The open step of limit;
Authority opens step:The access right of user is judged according to finger print information, and according to the access right to user The corresponding authority of opening, is then back to perform switching judging step.
Two kinds of authentication modules and two kinds of method for authenticating for duplex computer switch that the present invention is provided, can be to difference User open different access rights, it is ensured that information security, it is adaptable to the switching of power system intranet and extranet computer.
Description of the drawings
Fig. 1 is the flow chart of the method for authenticating described in embodiment four;
Fig. 2 is the flow chart that the authority in embodiment five opens step.
Specific embodiment
Specific embodiment one:The authentication module for duplex computer switch described in present embodiment, the authentication In ARM, the ARM is connected with intranet and extranet switching key and NFC reader to Module-embedding:
The authentication module is included with lower unit:
Switching judging unit:Judge whether to receive the trigger that intranet and extranet switching key sends, and be in judged result Start card reading unit when being, switching judging unit is restarted when judged result is no;
Card reading unit:Read the nfc card information that NFC reader is sent;
Authority open cell:The access right of user is judged according to nfc card information, and according to the access right to user The corresponding authority of opening, then restarts switching judging unit.
Authentication module described in present embodiment employs the authority that intranet and extranet switching key and NFC reader combine and sentences Mould-fixed, is realized by the software being embedded in the core component ARM of switching.The switch is used in using same display Switch between outer net computer.Intranet and extranet switching key is mechanical key, when user has switching to need, is first clicked interior Outer net switching key, intranet and extranet switching key to ARM sends trigger, and ARM is connected to after the trigger, and prompting user will Nfc card is placed on the Card Reader region of switch, then reads the information of nfc card.Different user has different access rights, for example Some users only allow to use outer net computer, and the access right of these users is also variant, and only allowing of having browses webpage, has Can then check some files, some permissions print these files etc..The high user of Permission Levels can then use Intranet Computer, equally, these users are also incomplete same to the access right of inner net computer.The all users' of ARM memory storages Access right, NFC reader is read after the information of nfc card, and ARM is by the use of nfc card information and all users of storage inside Authority information is compared, and finds the corresponding access right of the nfc card, then opens corresponding authority.
Specific embodiment two:Present embodiment is to the authentication for duplex computer switch described in embodiment one The further restriction of module, in present embodiment, authority open cell includes following subelement:
Access right determining unit:Nfc card information is compared with the authority information of all users of ARM memory storages, Determine the access right of the corresponding user of the nfc card;
If the corresponding user of the nfc card does not have any access right, user is pointed out not have any access right, and to The user closes all permissions;
If the corresponding user of the nfc card only has the access right of outer net computer, by switch from inner net computer Switch to outer net computer, and open corresponding authority;
If the corresponding user of the nfc card has the access right of inner net computer, user is pointed out to select Intranet to calculate Machine or outer net computer, and according to the selection result of user, switch is switched into corresponding computer, and open corresponding power Limit.
In present embodiment, if user only has using the authority of outer net computer, and the current state of switch For outer net computer, then only need to open the access right of outer net computer corresponding function to the user, if switch Current state be inner net computer, then ARM controls switch switches to outer net computer, and open corresponding authority.If with Family has the access right of inner net computer, then switch is switched into corresponding computer and open phase according to the selection of user Answer authority.
Specific embodiment three:Present embodiment be to described in embodiment one and two for duplex computer switch The further restriction of authentication module, in present embodiment, the access right includes that the access right of USB port, USB inputs are defeated Go out the use of access right, the access right of printer, the access right of scanner and the audio input-output device of equipment Authority.
Authentication module in present embodiment can control the connection or disconnection of peripheral hardware hardware device, such as cut off printer or The equipment such as audio amplifier, user can print out file, but cannot connect to printer.User can play music, but cannot be even Connect audio amplifier, voiceless sound output.The authentication module is refined to the access right of user, and the user of different stage is to same Computer has different access rights, further ensures information security.
Specific embodiment four:With reference to Fig. 1 explanation present embodiments, switching for duplex computer described in present embodiment The method for authenticating of device realizes that the ARM is connected with intranet and extranet switching key and NFC reader based on ARM:
The method for authenticating is comprised the following steps:
Switching judging step:Judge whether to receive the trigger that intranet and extranet switching key sends, and be in judged result Card Reader step is performed when being, when judged result is no switching judging step is re-executed;
Card Reader step:The nfc card information that NFC reader is sent is read, and authority is performed after the step terminates and opened Step;
Authority opens step:The access right of user is judged according to nfc card information, and according to the access right to user The corresponding authority of opening, is then back to perform switching judging step.
Method for authenticating described in present embodiment employs the authority that intranet and extranet switching key and NFC reader combine and sentences Mould-fixed, is realized by the software being embedded in the core component ARM of switching.The switch is used in using same display Switch between outer net computer.Intranet and extranet switching key is mechanical key, when user has switching to need, is first clicked interior Outer net switching key, intranet and extranet switching key to ARM sends trigger, and ARM is connected to after the trigger, and prompting user will Nfc card is placed on the Card Reader region of switch, then reads the information of nfc card.Different user has different access rights, for example Some users only allow to use outer net computer, and the access right of these users is also variant, and only allowing of having browses webpage, has Can then check some files, some permissions print these files etc..The high user of Permission Levels can then use Intranet Computer, equally, these users are also incomplete same to the access right of inner net computer.The all users' of ARM memory storages Access right, NFC reader is read after the information of nfc card, and ARM is by the use of nfc card information and all users of storage inside Authority information is compared, and finds the corresponding access right of the nfc card, then opens corresponding authority.
Specific embodiment five:Present embodiment is illustrated with reference to Fig. 2, present embodiment is to the use described in embodiment four In the further restriction of the method for authenticating of duplex computer switch, in present embodiment, authority opens step includes following sub-step Suddenly:
Access right determines step:Nfc card information is compared with the authority information of all users of ARM memory storages, Determine the access right of the corresponding user of the nfc card;
If the corresponding user of the nfc card does not have any access right, user is pointed out not have any access right, and to The user closes all permissions;
If the corresponding user of the nfc card only has the access right of outer net computer, by switch from inner net computer Switch to outer net computer, and open corresponding authority;
If the corresponding user of the nfc card has the access right of inner net computer, user is pointed out to select Intranet to calculate Machine or outer net computer, and according to the selection result of user, switch is switched into corresponding computer, and open corresponding power Limit.
In present embodiment, if user only has using the authority of outer net computer, and the current state of switch For outer net computer, then only need to open the access right of outer net computer corresponding function to the user, if switch Current state be inner net computer, then ARM controls switch switches to outer net computer, and open corresponding authority.If with Family has the access right of inner net computer, then switch is switched into corresponding computer and open phase according to the selection of user Answer authority.
Specific embodiment six:Present embodiment be to described in embodiment four and five for duplex computer switch The further restriction of method for authenticating, in present embodiment, the access right includes that the access right of USB port, USB inputs are defeated Go out the use of access right, the access right of printer, the access right of scanner and the audio input-output device of equipment Authority.
Method for authenticating in present embodiment can control the connection or disconnection of peripheral hardware hardware device, such as cut off printer or The equipment such as audio amplifier, user can print out file, but cannot connect to printer.User can play music, but cannot be even Connect audio amplifier, voiceless sound output.The method for authenticating is refined to the access right of user, and the user of different stage is to same Computer has different access rights, further ensures information security.
Specific embodiment seven:The authentication module for duplex computer switch described in present embodiment, the authentication In ARM, the ARM is connected with intranet and extranet switching key and fingerprint identification device to Module-embedding:
The authentication module is included with lower unit:
Switching judging unit:Judge whether to receive the trigger that intranet and extranet switching key sends, and be in judged result Start fingerprint identification unit when being, switching judging unit is restarted when judged result is no;
Fingerprint identification unit:Read the finger print information that fingerprint identification device is sent;
Authority open cell:The access right of user is judged according to finger print information, and according to the access right to user The corresponding authority of opening, then restarts switching judging unit.
Present embodiment is that NFC reader is replaced with into fingerprint identification device with the difference of embodiment one, accordingly, When user uses switch, intranet and extranet switching key is first clicked, then according to prompting carries out fingerprint reading.
Specific embodiment eight:Present embodiment is to the authentication for duplex computer switch described in embodiment seven The further restriction of module, in present embodiment, authority open cell includes following subelement:
Access right determining unit:Finger print information is compared with the authority information of all users of ARM memory storages, really The access right of the corresponding user of the fixed fingerprint;
If the corresponding user of the fingerprint does not have any access right, user is pointed out not have any access right, and to The user closes all permissions;
If the corresponding user of the fingerprint only has the access right of outer net computer, switch is cut from inner net computer Shift to outer net computer, and open corresponding authority;
If the corresponding user of the fingerprint has the access right of inner net computer, user is pointed out to select inner net computer Or outer net computer, and according to the selection result of user, switch is switched into corresponding computer, and open corresponding power Limit.
Specific embodiment nine:Present embodiment be to described in embodiment seven and eight for duplex computer switch The further restriction of authentication module, in present embodiment, the access right includes that the access right of USB port, USB inputs are defeated Go out the use of access right, the access right of printer, the access right of scanner and the audio input-output device of equipment Authority.
Authentication module in present embodiment can control the connection or disconnection of peripheral hardware hardware device, such as cut off printer or The equipment such as audio amplifier, user can print out file, but cannot connect to printer.User can play music, but cannot be even Connect audio amplifier, voiceless sound output.The authentication module is refined to the access right of user, and the user of different stage is to same Computer has different access rights, further ensures information security.
Specific embodiment ten:The method for authenticating for duplex computer switch described in present embodiment is based on ARM realities Existing, the ARM is connected with intranet and extranet switching key and fingerprint identification device:
The method for authenticating is comprised the following steps:
Switching judging step:Judge whether to receive the trigger that intranet and extranet switching key sends, and be in judged result Fingerprinting step is performed when being, when judged result is no switching judging step is re-executed;
Fingerprinting step:Read the finger print information that fingerprint identification device is sent, and the right of execution after the step terminates The open step of limit;
Authority opens step:The access right of user is judged according to finger print information, and according to the access right to user The corresponding authority of opening, is then back to perform switching judging step.
Specific embodiment 11:Present embodiment is to the mirror for duplex computer switch described in embodiment ten The further restriction of power method, in present embodiment, authority opens step includes following sub-step:
Access right determines step:Finger print information is compared with the authority information of all users of ARM memory storages, really The access right of the corresponding user of the fixed fingerprint;
If the corresponding user of the fingerprint does not have any access right, user is pointed out not have any access right, and to The user closes all permissions;
If the corresponding user of the fingerprint only has the access right of outer net computer, switch is cut from inner net computer Shift to outer net computer, and open corresponding authority;
If the corresponding user of the fingerprint has the access right of inner net computer, user is pointed out to select inner net computer Or outer net computer, and according to the selection result of user, switch is switched into corresponding computer, and open corresponding power Limit.
Specific embodiment 12:Present embodiment is to switching for duplex computer described in embodiment ten and 11 The further restriction of the method for authenticating of device, in present embodiment, the access right includes that the access right of USB port, USB are defeated Enter access right, the access right of printer, the access right of scanner and the audio input-output device of output equipment Access right.
Method for authenticating in present embodiment can control the connection or disconnection of peripheral hardware hardware device, such as cut off printer or The equipment such as audio amplifier, user can print out file, but cannot connect to printer.User can play music, but cannot be even Connect audio amplifier, voiceless sound output.The method for authenticating is refined to the access right of user, and the user of different stage is to same Computer has different access rights, further ensures information security.

Claims (10)

1. the authentication module of duplex computer switch is used for, it is characterised in that the authentication module is embedded in ARM, the ARM It is connected with intranet and extranet switching key and NFC reader:
The authentication module is included with lower unit:
Switching judging unit:Judge whether to receive the trigger that intranet and extranet switching key sends, and when judged result is to be Start card reading unit, switching judging unit is restarted when judged result is no;
Card reading unit:Read the nfc card information that NFC reader is sent;
Authority open cell:The access right of user is judged according to nfc card information, and is opened to user according to the access right Corresponding authority, then restarts switching judging unit.
2. the authentication module for duplex computer switch according to claim 1, it is characterised in that authority open cell Including following subelement:
Access right determining unit:Nfc card information is compared with the authority information of all users of ARM memory storages, it is determined that The access right of the corresponding user of the nfc card;
If the corresponding user of the nfc card does not have any access right, user is pointed out not have any access right, and to the use All permissions are closed at family;
If the corresponding user of the nfc card only has the access right of outer net computer, switch is switched from inner net computer To outer net computer, and open corresponding authority;
If the corresponding user of the nfc card has the access right of inner net computer, user is pointed out to select inner net computer also It is outer net computer, and according to the selection result of user, switch is switched into corresponding computer, and open corresponding authority.
3. the authentication module for duplex computer switch according to claim 1 and 2, it is characterised in that described to use The access right of authority including USB port, the access right of USB input-output equipment, the access right of printer, scanner The access right of access right and audio input-output device.
4. the method for authenticating of duplex computer switch is used for, it is characterised in that the method realizes that the ARM is connected with based on ARM Intranet and extranet switching key and NFC reader:
The method for authenticating is comprised the following steps:
Switching judging step:Judge whether to receive the trigger that intranet and extranet switching key sends, and when judged result is to be Card Reader step is performed, when judged result is no switching judging step is re-executed;
Card Reader step:The nfc card information that NFC reader is sent is read, and it is rapid that authority open step is performed after the step terminates;
Authority opens step:The access right of user is judged according to nfc card information, and is opened to user according to the access right Corresponding authority, is then back to perform switching judging step.
5. the method for authenticating for duplex computer switch according to claim 4, it is characterised in that authority opens step Including following sub-step:
Access right determines step:Nfc card information is compared with the authority information of all users of ARM memory storages, it is determined that The access right of the corresponding user of the nfc card;
If the corresponding user of the nfc card does not have any access right, user is pointed out not have any access right, and to the use All permissions are closed at family;
If the corresponding user of the nfc card only has the access right of outer net computer, switch is switched from inner net computer To outer net computer, and open corresponding authority;
If the corresponding user of the nfc card has the access right of inner net computer, user is pointed out to select inner net computer also It is outer net computer, and according to the selection result of user, switch is switched into corresponding computer, and open corresponding authority.
6. the method for authenticating for duplex computer switch according to claim 4 or 5, it is characterised in that described to use The access right of authority including USB port, the access right of USB input-output equipment, the access right of printer, scanner The access right of access right and audio input-output device.
7. the authentication module of duplex computer switch is used for, it is characterised in that the authentication module is embedded in ARM, the ARM It is connected with intranet and extranet switching key and fingerprint identification device:
The authentication module is included with lower unit:
Switching judging unit:Judge whether to receive the trigger that intranet and extranet switching key sends, and when judged result is to be Start fingerprint identification unit, switching judging unit is restarted when judged result is no;
Fingerprint identification unit:Read the finger print information that fingerprint identification device is sent;
Authority open cell:The access right of user is judged according to finger print information, and is opened to user according to the access right Corresponding authority, then restarts switching judging unit.
8. the authentication module for duplex computer switch according to claim 7, it is characterised in that authority open cell Including following subelement:
Access right determining unit:Finger print information is compared with the authority information of all users of ARM memory storages, it is determined that should The access right of the corresponding user of fingerprint;
If the corresponding user of the fingerprint does not have any access right, user is pointed out not have any access right, and to the use All permissions are closed at family;
If the corresponding user of the fingerprint only has the access right of outer net computer, switch is switched to from inner net computer Outer net computer, and open corresponding authority;
If the corresponding user of the fingerprint has the access right of inner net computer, user is pointed out to select inner net computer still Outer net computer, and according to the selection result of user, switch is switched into corresponding computer, and open corresponding authority.
9. the method for authenticating of duplex computer switch is used for, it is characterised in that the method realizes that the ARM is connected with based on ARM Intranet and extranet switching key and fingerprint identification device:
The method for authenticating is comprised the following steps:
Switching judging step:Judge whether to receive the trigger that intranet and extranet switching key sends, and when judged result is to be Fingerprinting step is performed, when judged result is no switching judging step is re-executed;
Fingerprinting step:The finger print information that fingerprint identification device is sent is read, and authority is performed after the step terminates and opened Stride rapid;
Authority opens step:The access right of user is judged according to finger print information, and is opened to user according to the access right Corresponding authority, is then back to perform switching judging step.
10. the method for authenticating for duplex computer switch according to claim 9, it is characterised in that authority open step Suddenly following sub-step is included:
Access right determines step:Finger print information is compared with the authority information of all users of ARM memory storages, it is determined that should The access right of the corresponding user of fingerprint;
If the corresponding user of the fingerprint does not have any access right, user is pointed out not have any access right, and to the use All permissions are closed at family;
If the corresponding user of the fingerprint only has the access right of outer net computer, switch is switched to from inner net computer Outer net computer, and open corresponding authority;
If the corresponding user of the fingerprint has the access right of inner net computer, user is pointed out to select inner net computer still Outer net computer, and according to the selection result of user, switch is switched into corresponding computer, and open corresponding authority.
CN201610921463.0A 2016-10-21 2016-10-21 Authentication module and method for double-computer switching device Pending CN106656982A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610921463.0A CN106656982A (en) 2016-10-21 2016-10-21 Authentication module and method for double-computer switching device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610921463.0A CN106656982A (en) 2016-10-21 2016-10-21 Authentication module and method for double-computer switching device

Publications (1)

Publication Number Publication Date
CN106656982A true CN106656982A (en) 2017-05-10

Family

ID=58856956

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610921463.0A Pending CN106656982A (en) 2016-10-21 2016-10-21 Authentication module and method for double-computer switching device

Country Status (1)

Country Link
CN (1) CN106656982A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101083669A (en) * 2007-07-10 2007-12-05 梁雁文 Computer network isolated system and its control and switch method
CN202887163U (en) * 2012-09-24 2013-04-17 甘肃省电力公司信息通信公司 Switching device of internal and external network physical isolation computer
CN202995741U (en) * 2012-09-24 2013-06-12 甘肃省电力公司信息通信公司 Internal and external network physical isolation computer
CN103546478A (en) * 2013-10-30 2014-01-29 国家信息中心 Internal and external network secure access method and system
CN103853987A (en) * 2012-11-29 2014-06-11 中晟国计科技有限公司 Dual-network integrated type computer terminal
CN104469762A (en) * 2013-09-12 2015-03-25 西安龙飞网络科技有限公司 User grading control system of 3G/WIFI wireless router

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101083669A (en) * 2007-07-10 2007-12-05 梁雁文 Computer network isolated system and its control and switch method
CN202887163U (en) * 2012-09-24 2013-04-17 甘肃省电力公司信息通信公司 Switching device of internal and external network physical isolation computer
CN202995741U (en) * 2012-09-24 2013-06-12 甘肃省电力公司信息通信公司 Internal and external network physical isolation computer
CN103853987A (en) * 2012-11-29 2014-06-11 中晟国计科技有限公司 Dual-network integrated type computer terminal
CN104469762A (en) * 2013-09-12 2015-03-25 西安龙飞网络科技有限公司 User grading control system of 3G/WIFI wireless router
CN103546478A (en) * 2013-10-30 2014-01-29 国家信息中心 Internal and external network secure access method and system

Similar Documents

Publication Publication Date Title
KR101280050B1 (en) Location-based security system for portable electronic device
KR101382222B1 (en) System and method for mobile data loss prevention which uses file system virtualization
CN104679387B (en) A kind of method for protecting privacy and terminal
TWI417732B (en) Memory device with near field communications, method of communicating wireless network settings between devices, and universal serial bus flash drive related therewith
EP1857954A1 (en) Portable electronic apparatus and recording medium for changing the access permission of an application or file upon user biometric identification
CN105279449A (en) Context based data access control
CN105493054A (en) Fast data protection using dual file systems
CN107622203A (en) Guard method, device, storage medium and the electronic equipment of sensitive information
CN105809000A (en) Information processing method and electronic device
JP2007149101A (en) Work system with automatic operating system login function and method for using the same
CN101772761A (en) Electronic device interface control system
US11196557B2 (en) Token device for conducting cryptography key backup or restoration operation
CN102819700A (en) Device and method for identifying a plurality of biological characteristics in isolation environment
CN106951757A (en) A kind of method and apparatus for operating application program
CN102118503B (en) Data protection method, device and terminal
JP2007241371A (en) Authentication system
CN1234130C (en) System guiding device base on core and method for realizing said guide
CN205788194U (en) A kind of high in the clouds and local secure storage data and the device of file
CN107092834A (en) A kind of finger print data management method and terminal
CN104955043B (en) A kind of intelligent terminal security protection system
CN106778160A (en) Data item display methods and device
CN203250317U (en) Mobile memorizer capable of identifying fingerprints
Schaffer Expanding continuous authentication with mobile devices
CN101419577A (en) Mobile memory apparatus with handwriting identification identity confirming function and implementing method thereof
CN106656982A (en) Authentication module and method for double-computer switching device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170510