CN108197452A - A kind of more level of confidentiality integrated form information security exchange methods - Google Patents
A kind of more level of confidentiality integrated form information security exchange methods Download PDFInfo
- Publication number
- CN108197452A CN108197452A CN201711472246.9A CN201711472246A CN108197452A CN 108197452 A CN108197452 A CN 108197452A CN 201711472246 A CN201711472246 A CN 201711472246A CN 108197452 A CN108197452 A CN 108197452A
- Authority
- CN
- China
- Prior art keywords
- level
- confidentiality
- employee
- high security
- pupil
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of more level of confidentiality integrated form information security exchange methods, employee certification's module is used for certification worker, and employee is allowed to enter the physics compartment;Setting computer in the physics compartment, to start the computer needs further certification level of confidentiality equipment, and the level of confidentiality equipment is consistent with worker could to be started computer and enter the system to match with employee's level of confidentiality;The computer is connected with High Security Level input equipment, the further certification worker of the High Security Level input equipment so that employee can enter the High Security Level system of more High Security Level.The present invention can realize the integrated of more level of confidentiality equipment, and standby management is installed convenient for letter, improve system safety.
Description
Technical field
The present invention relates to a kind of information securities to interact field, is interacted more particularly to a kind of more level of confidentiality integrated form information securities
Method.
Background technology
Information security, referred to as letter peace, mean protection information and information system from unwarranted entrance, use, disclosure,
It destroys, change, inspect, record and destroys.Government, army, company, financial institution, hospital, individual enterprise has accumulated largely has
Close they employee, customer, product, research, finance data confidential information.Most such information are collected now,
It generates, be stored in electronic computer, and pass through transmission of network to other computer.
Since level of confidentiality is different (such as top-secret, secret), usually used computer equipment is also different, using different encryption sides
Formula.The cipher mode of computer is often confined to the encryption of software and hardware, and concerning security matters personnel is needed to remember password or carry specific
Information safety devices.Although by the way of LAN, using cracking outside software or physical isolation, due to concerning security matters
Computer equipment is numerous, and concerning security matters rank is different, installs to be difficult to manage there are letter, realizes the problem of cost is larger.
Invention content
The purpose of the present invention is to provide a kind of more level of confidentiality integrated form information security exchange methods, and standby pipe is installed convenient for letter
Reason improves system safety, and the present invention also is able to complete secure interactive of the High Security Level such as top-secret information, further improves information
Safety, to solve the problems, such as above-mentioned background technology.
A kind of more level of confidentiality integrated form information security exchange methods, include the following steps:
Step a, fingerprint or face recognition are carried out, confirms worker, if by verification, b is entered step, if not
C is then entered step by verification;
Step b, open physics compartment gate, employee by it is rear closing only hold a people by the gate, enter step
d;
Step c, it reminds illegal identity and secrecy is notified to do and security department;
Step d, opening computer needs to verify the level of confidentiality equipment of the employee, and whether the computer level of confidentiality equipment
It is consistent with the worker, if the worker unanimously if enter step e, otherwise, enter step c;
Step e, the dedicated system that computer starting and level of confidentiality equipment match is used for employee, is if desired started highly denser
The High Security Level system of grade then starts highly dense collecting system verification, enters step f in a computer;
Step f, if desired start High Security Level system, then wear pupil identification device, the pupil identification device identification person
If work pupil information by certification, starts High Security Level system, and the figure of High Security Level system is shown in pupil identification device
Shape interface carries out information exchange, pupil identification device real-time authentication employee's pupil information, if inspection in pupil identification device
Pupil is measured then to interrupt the access of High Security Level system immediately far from pupil identification device and preserve access record so that next time accesses
Shi Jixu system interactions.
A kind of more level of confidentiality integrated form information safety interaction devices in more level of confidentiality integrated form information security exchange methods,
The information safety interaction device has physics compartment, and the physics compartment sets employee certification's module, the employee certification
Module is used for certification worker, and employee is allowed to enter the physics compartment;
Employee certification's module has fingerprint recognition or facial recognition modules, and the physics compartment has automatic opening
Gate, only hold a people and pass through, pass through and rear close the gate.The physics compartment is difficult to destroy to break by physics from outside
Badly to enter inside it, and have alarm modules, when detecting that physical vibration exceeds predetermined threshold, then open camera record
Surrounding enviroment simultaneously send out alarm signal;
Setting computer in physics compartment, to start the computer needs further certification level of confidentiality equipment, the level of confidentiality
Equipment is consistent with worker could to be started computer and enter the system to match with employee's level of confidentiality;It can prevent in this way
More level of confidentiality or access the different level of confidentiality system of employee's scope of authority.
The level of confidentiality equipment can be U-key or IC card etc., and the computer starts object according to the different of employee's level of confidentiality
Manage the dedicated system to match with employee's level of confidentiality of isolation.The dedicated system of the physical isolation refers to system from different
BIOS and hard disk are started, and the memory and local area network of access install standby progress physical isolation by dedicated letter.It is high
The level of confidentiality equipment of level of confidentiality employee can start the dedicated system of Low Security Level by way of mandate, and the mode of the mandate can be by list
Position secure office room is authorized using dedicated authorisation device, and the U-key or IC card can be used DES, AES, RSA etc. and add
Close algorithm.
The computer is also associated with High Security Level input equipment, the further certification employee body of the High Security Level input equipment
Part so that employee can enter more High Security Level High Security Level system, the High Security Level system be it is physically-isolated, the physics every
From referring to from different BIOS and hard disk startup.The High Security Level input equipment has pupil identification device, is identified by pupil
Certification simultaneously automatically turns on High Security Level system, and the High Security Level system can only check the height after opening by the pupil identification equipment
The graphical interfaces of level of confidentiality system carries out information exchange in pupil identification device.The pupil identification device detects employee in real time
Pupil is to confirm worker, if find that worker is suspicious interrupts the access of High Security Level system, and automatically save visit immediately
Ask record and employee's pupil information, when reaffirm identity by after can also continue interrupt before operation.
The High Security Level input equipment may be face recognition device, while the shape of the High Security Level input equipment is only held
One human face passes through, and the interaction of High Security Level system is carried out while identification is facial in real time and passes through certification.The pupil is known
Other device is further included for the input unit of High Security Level system, which further comprises gesture identifying device or adopt
It is inputted with touch screen into row information.
The invention also includes a kind of more level of confidentiality integrated form information security exchange methods,
The present invention can realize the integrated of more level of confidentiality equipment, and standby management is installed convenient for letter, improve system safety, Er Qieben
Invention also is able to complete secure interactive of the High Security Level such as top-secret information, further improves information security.
Description of the drawings
The present invention is described in further detail with specific embodiment below in conjunction with the accompanying drawings:
Fig. 1 is more level of confidentiality integrated form information safety interaction device schematic diagrames of the present invention.
Fig. 2 is the flow chart of the more level of confidentiality integrated form information security exchange methods of the present invention.
Reference sign
1st, physics compartment;2nd, employee certification's module;3rd, gate;4th, computer;5th, High Security Level input equipment;6th, pupil identifies
Device.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other without making creative work
Embodiment shall fall within the protection scope of the present invention.
Referring to attached drawing 1-2, the present invention provides a kind of more level of confidentiality integrated form information security exchange methods:The information peace
Full exchange method includes the following steps:
Step a, fingerprint or face recognition are carried out, confirms worker, if by verification, b is entered step, if not
C is then entered step by verification;
Step b, open physics compartment gate, employee by it is rear closing only hold a people by the gate;
Step c, it reminds illegal identity and secrecy is notified to do and security department;
Step d, opening computer needs to verify the level of confidentiality equipment of the employee, and whether the computer level of confidentiality equipment
It is consistent with the worker, if the worker unanimously if enter step e, otherwise, enter step c;
Step e, the dedicated system that computer starting and level of confidentiality equipment match is used for employee, is if desired started highly denser
The High Security Level system of grade then starts highly dense collecting system verification in a computer;
Step f, if desired start High Security Level system, then wear pupil identification device, the pupil identification device identification person
If work pupil information by certification, starts High Security Level system, and the figure of High Security Level system is shown in pupil identification device
Shape interface carries out information exchange, pupil identification device real-time authentication employee's pupil information, if inspection in pupil identification device
Pupil is measured then to interrupt the access of High Security Level system immediately far from pupil identification device and preserve access record so that next time accesses
Shi Jixu system interactions.
A kind of more level of confidentiality integrated form information safety interaction devices in more level of confidentiality integrated form information security exchange methods,
The information safety interaction device has physics compartment 1, and the physics compartment 1 sets employee certification's module 2, and the employee recognizes
Module 2 is demonstrate,proved for certification worker, and employee is allowed to enter the physics compartment 1;
Employee certification's module 2 has fingerprint recognition or facial recognition modules, and the physics compartment 1 has to be opened automatically
The gate 3 opened only holds a people and passes through, and the gate 3 is closed by rear.The physics compartment 1 is difficult to destroy to pass through from outside
Physical damage has alarm modules to enter inside it, when detecting that physical vibration exceeds predetermined threshold, then opens camera shooting
Head record surrounding enviroment simultaneously send out alarm signal;
Setting computer 4 in physics compartment 1, to start the computer 4 needs further certification level of confidentiality equipment, described close
Grade equipment is consistent with worker could to be started computer 4 and enter the system to match with employee's level of confidentiality;In this way can
Prevent more level of confidentiality or access the different level of confidentiality system of employee's scope of authority.
The level of confidentiality equipment can be U-key or IC card etc., and the computer 4 starts object according to the different of employee's level of confidentiality
Manage the dedicated system to match with employee's level of confidentiality of isolation.The dedicated system of the physical isolation refers to system from different
BIOS and hard disk are started, and the memory and local area network of access install standby progress physical isolation by dedicated letter.It is high
The level of confidentiality equipment of level of confidentiality employee can start the dedicated system of Low Security Level by way of mandate, and the mode of the mandate can be by list
Position secure office room is authorized using dedicated authorisation device, and the U-key or IC card can be used DES, AES, RSA etc. and add
Close algorithm.
The computer 4 is also associated with High Security Level input equipment 5, the 5 further certification employee of High Security Level input equipment
Identity so that employee can enter the High Security Level system of more High Security Level, and the High Security Level system is physically-isolated, the physics
Isolation refers to from different BIOS and hard disk startup.The High Security Level input equipment 5 has pupil identification device 6, passes through pupil
Identification certification simultaneously automatically turns on High Security Level system, and the High Security Level system can only check institute after opening by the pupil identification equipment
The graphical interfaces of High Security Level system is stated, information exchange is carried out in pupil identification device 6.The pupil identification device 6 is examined in real time
Employee's pupil is surveyed to confirm worker, if finding the suspicious access for interrupting High Security Level system immediately of worker, and automatic
Preserve access record and employee's pupil information, when reaffirm identity by after can also continue interrupt before operation.
The present invention is described in detail above by specific embodiment and embodiment, but these are not composition pair
The limitation of the present invention.Without departing from the principles of the present invention, those skilled in the art can also make many deformations and change
Into these also should be regarded as protection scope of the present invention.
Claims (7)
1. a kind of more level of confidentiality integrated form information security exchange methods, which is characterized in that the information security exchange method includes
Following steps:
Step a, fingerprint or face recognition are carried out, confirms worker, if by verification, b is entered step, if do not passed through
Verification then enters step c;
Step b, open physics compartment gate, employee by it is rear closing only hold a people by the gate;
Step c, it reminds illegal identity and secrecy is notified to do and security department;
Step d, opening computer needs to verify the level of confidentiality equipment of the employee, the computer level of confidentiality equipment whether with institute
It is consistent to state worker, if the worker unanimously if enter step e, otherwise, enter step c;
Step e, the dedicated system that computer starting and level of confidentiality equipment match is used for employee, if desired starts more High Security Level
High Security Level system then starts highly dense collecting system verification in a computer.
2. a kind of more level of confidentiality integrated form information security exchange methods as described in claim 1, which is characterized in that in the step
There is step f after rapid e:If desired start High Security Level system, then wear pupil identification device, the pupil identification device identification
If employee's pupil information by certification, starts High Security Level system, and High Security Level system is shown in pupil identification device
Graphical interfaces, carries out information exchange in pupil identification device, pupil identification device real-time authentication employee's pupil information, if
Detect that pupil then interrupts the access of High Security Level system far from pupil identification device and preserves access record so that next time visits immediately
Continue system interaction when asking.
3. such as a kind of more level of confidentiality integrated form information security exchange methods in claim any one of 1-2, the information security
Exchange method includes a kind of more level of confidentiality integrated form information safety interaction devices, and the secure interactive device has physics compartment,
The physics compartment sets employee certification's module, and employee certification's module is used for certification worker, and employee is allowed to enter
The physics compartment;It is characterized in that, employee certification's module has fingerprint recognition or facial recognition modules, the physics
Compartment have automatically turn on only hold a people by gate, pass through and rear close the gate;
Setting computer in the physics compartment, to start the computer needs further certification level of confidentiality equipment, the level of confidentiality
Equipment is consistent with worker could to be started computer and enter the system to match with employee's level of confidentiality;
The computer is connected with High Security Level input equipment, the further certification worker of the High Security Level input equipment so that
Employee can enter the High Security Level system of more High Security Level, and the High Security Level input equipment has pupil identification device, passes through pupil
Identification certification simultaneously automatically turns on High Security Level system.
4. a kind of more level of confidentiality integrated form information security exchange methods as claimed in claim 3, it is characterised in that:It is described close
Grade equipment can be U-key or IC card.
5. such as a kind of more level of confidentiality integrated form information security exchange methods of 3 or 4 any one of them of claim, it is characterised in that:
The computer starts the dedicated system to match with employee's level of confidentiality of physical isolations according to the difference of employee's level of confidentiality.
6. such as a kind of more level of confidentiality integrated form information security exchange methods of claim 1-5 any one of them, it is characterised in that:Institute
The graphical interfaces of the High Security Level system can only be checked by the pupil identification equipment by stating after High Security Level system is opened, be known in pupil
Information exchange, pupil identification device real-time authentication employee's pupil information, if detecting pupil far from pupil are carried out in other device
Hole identification device then interrupts the access of High Security Level system and preserves access record to continue system interaction when next time accesses immediately.
7. a kind of more level of confidentiality integrated form information security exchange methods as claimed in claim 6, the High Security Level system is physics
Isolation, the physical isolation refers to from different BIOS and hard disk startup.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711472246.9A CN108197452A (en) | 2017-12-29 | 2017-12-29 | A kind of more level of confidentiality integrated form information security exchange methods |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711472246.9A CN108197452A (en) | 2017-12-29 | 2017-12-29 | A kind of more level of confidentiality integrated form information security exchange methods |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108197452A true CN108197452A (en) | 2018-06-22 |
Family
ID=62586458
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711472246.9A Pending CN108197452A (en) | 2017-12-29 | 2017-12-29 | A kind of more level of confidentiality integrated form information security exchange methods |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108197452A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105354475A (en) * | 2015-11-30 | 2016-02-24 | 贵州大学 | Pupil identification based man-machine interaction identification method and system |
CN106228049A (en) * | 2016-07-25 | 2016-12-14 | 苏州乐创空间孵化管理有限公司 | A kind of security system based on pupil identification |
CN106327642A (en) * | 2016-08-26 | 2017-01-11 | 合肥若涵信智能工程有限公司 | Human face and fingerprint access control machine |
CN106557762A (en) * | 2016-12-13 | 2017-04-05 | 天津灵隆科技有限公司 | A kind of personal identification device with recognition of face and fingerprint identification function |
CN107316358A (en) * | 2017-06-21 | 2017-11-03 | 合肥市旺友门窗有限公司 | A kind of intelligent access control system |
CN108198301A (en) * | 2017-12-28 | 2018-06-22 | 郑州琼佩电子技术有限公司 | A kind of more level of confidentiality integrated form information safety interaction devices |
-
2017
- 2017-12-29 CN CN201711472246.9A patent/CN108197452A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105354475A (en) * | 2015-11-30 | 2016-02-24 | 贵州大学 | Pupil identification based man-machine interaction identification method and system |
CN106228049A (en) * | 2016-07-25 | 2016-12-14 | 苏州乐创空间孵化管理有限公司 | A kind of security system based on pupil identification |
CN106327642A (en) * | 2016-08-26 | 2017-01-11 | 合肥若涵信智能工程有限公司 | Human face and fingerprint access control machine |
CN106557762A (en) * | 2016-12-13 | 2017-04-05 | 天津灵隆科技有限公司 | A kind of personal identification device with recognition of face and fingerprint identification function |
CN107316358A (en) * | 2017-06-21 | 2017-11-03 | 合肥市旺友门窗有限公司 | A kind of intelligent access control system |
CN108198301A (en) * | 2017-12-28 | 2018-06-22 | 郑州琼佩电子技术有限公司 | A kind of more level of confidentiality integrated form information safety interaction devices |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105261105B (en) | Safety door inhibition method | |
CN106339679B (en) | A kind of face identification system | |
GB2600577A (en) | System providing self-service access to locked merchandise | |
CN107992739A (en) | User authentication method, apparatus and system | |
CN107004074A (en) | The technology of enhanced user certification is carried out using advanced sensors monitoring | |
JP2011048547A (en) | Abnormal-behavior detecting device, monitoring system, and abnormal-behavior detecting method | |
CN105900114B (en) | For executing the safety card of finger print identifying and based on this safe card processing system and its processing method | |
CN103473844A (en) | Intelligent control method and intelligent control system for public rental housing | |
WO2015099607A1 (en) | An integrated access control and identity management system | |
CN104680670A (en) | Re-encryption/encryption technique solution for key control points during bank card operation on ATM (automatic teller machine) | |
CN107533624A (en) | Detect and prevent the illegal use of equipment | |
CN109960917A (en) | A kind of time slot scrambling and device of document | |
CN112100662A (en) | Regional data safety monitoring system | |
CN111698215A (en) | Security prevention and control method, device and system based on biological feature recognition | |
CN105931327A (en) | Access control monitoring method and system | |
CN108198301A (en) | A kind of more level of confidentiality integrated form information safety interaction devices | |
CN107273725A (en) | A kind of data back up method and system for classified information | |
Lee et al. | New approach for detecting leakage of internal information; using emotional recognition technology | |
CN108197452A (en) | A kind of more level of confidentiality integrated form information security exchange methods | |
CN111311863A (en) | Unattended financial indoor safety early warning method | |
CN107480485A (en) | The factory reset system and method for information safety devices | |
JP5524250B2 (en) | Abnormal behavior detection device, monitoring system, abnormal behavior detection method and program | |
Joy | A systematic review comparing different security measures adopted in automated teller machine | |
CN112507313A (en) | Fingerprint verification method, chip and intelligent door lock | |
More et al. | Design and implementation of anti-theft module for ATM machine |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180622 |
|
WD01 | Invention patent application deemed withdrawn after publication |