CN108416222A - A kind of control method of information security - Google Patents

A kind of control method of information security Download PDF

Info

Publication number
CN108416222A
CN108416222A CN201810079988.3A CN201810079988A CN108416222A CN 108416222 A CN108416222 A CN 108416222A CN 201810079988 A CN201810079988 A CN 201810079988A CN 108416222 A CN108416222 A CN 108416222A
Authority
CN
China
Prior art keywords
move media
module
read
machine
mobile phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810079988.3A
Other languages
Chinese (zh)
Inventor
马勇
武峰林
李佩
张龙
洪亮
常岚军
殷安国
张建军
李文华
尹海龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Haibo Safety Engineering Technology Equipment Co Ltd
Original Assignee
Shaanxi Haibo Safety Engineering Technology Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Haibo Safety Engineering Technology Equipment Co Ltd filed Critical Shaanxi Haibo Safety Engineering Technology Equipment Co Ltd
Priority to CN201810079988.3A priority Critical patent/CN108416222A/en
Publication of CN108416222A publication Critical patent/CN108416222A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C7/00Arrangements for writing information into, or reading information out from, a digital store
    • G11C7/24Memory cell safety or protection circuits, e.g. arrangements for preventing inadvertent reading or writing; Status cells; Test cells

Abstract

The present invention relates to information security field more particularly to a kind of control methods of information security.Including move media, which is USB flash disk either mobile hard disk;Include memory module, power module, encrypting module and communication module inside the mobile hard disk;I.e. when the reading PC machine of move media can be read in move media insertion, power module, which is powered to powering, supplies modules work, encrypting module obtains read requests, communication module sends out instruction at this time, is controlled in cloud and judges the instruction, if PC machine belongs to safe range, then instruction is sent out to mobile phone, the instruction is after confirming phone, mobile phone and communication module communication, then encrypting module allows the reading PC machine that move media can be read to read the storage information inside USB flash disk.

Description

A kind of control method of information security
Technical field
The present invention relates to information security field more particularly to a kind of control methods of information security.
Background technology
Information security includes mainly the content of following five aspect, i.e., need to ensure the confidentiality of information, authenticity, integrality, The safety of unauthorised copies and institute's parasitic system.The range that information security itself includes is very big, including how taking precautions against quotient Leakage etc. of the teenager to the browsing, personal information of flame is taken precautions against in the secret leakage of industry enterprise.Information peace under network environment Entirety system is the key that ensure information security, including computer security operating system, various security protocols, security mechanism are (digital Signature, message authentication, data encryption etc.), until security system, such as UniNAC, DLP, it can simply by the presence of security breaches Threaten global safety.Information security refers to information system (including hardware, software, data, people, physical environment and its infrastructure) It is protected, not by the reason of accidental or malice and by destroying, changing, revealing, system is continuously reliably normally run, Information service is not interrupted, and finally realizes business continuance.
However, the non intelligent USB flash disk of current USB flash disk, additional properties are bad, and many move medias can not fundamentally ensure Safety.
Invention content
The purpose of invention:In order to provide a kind of control method of effect better information safety, specific purposes are shown in specific reality Apply multiple substantial technological effects of part.
In order to reach purpose as above, the present invention adopts the following technical scheme that:
A kind of control method of information security, which is characterized in that
Including move media, which is USB flash disk either mobile hard disk;Include storage mould inside the mobile hard disk Block, power module, encrypting module and communication module;
The memory module can store information;The power module enables to move media connection on computers When move media is powered using computer, which communicates to connect encrypting module and communication module;
The encrypting module can be encrypted USB flash disk and by way of receiving to instruct come to USB flash disk storage inside mould The information of block, which is read out, either to be changed;
The communication module can realize the information exchange controlled in USB flash disk and extraneous mobile phone and cloud;Communication module is logical Letter connection encrypting module;
I.e. when the reading PC machine of move media can be read in move media insertion, power module is powered power supply supply respectively A module work, encrypting module obtain read requests, and communication module sends out instruction at this time, is controlled in cloud and judges the instruction, if PC machine Belong to safe range, then send out instruction to mobile phone, after confirming phone, mould is then encrypted in mobile phone and communication module communication for the instruction Block allows the reading PC machine that move media can be read to read the storage information inside USB flash disk.
The further technical solution of the present invention is, is also inserted into the reading that move media can be read for the first time included in move media The step of initial identification when PC machine, the initial identification refer to that power module is powered power supply supply modules work Make, encrypting module obtains read requests, and communication module sends out instruction at this time, is controlled in cloud and judges the instruction and judge that the movement is situated between Matter be use for the first time, if PC machine belongs to safe range, instruction is sent out to mobile phone, the instruction after confirming phone, mobile phone and lead to Believe module communication, then encrypting module allow to can be read the storage information inside the readings PC machine reading USB flash disk of move media and It is the machine that encryption part, which identifies that the reading PC machine of move media can be read in this,;And the number of move media and mobile phone correspondence is deposited Storage pairing does not have to control and mobile phone in cloud and verifies again when move media is again insertable into the machine;The USB flash disk or mobile hard disk Can refer to that mutual kiss is formed to USB flash disk and the machine by initial identification, the initial identification when inserting such as the machine, that is, ends PC The secret key of conjunction.
The further technical solution of the present invention is, also includes that move media is inserted into and non-security move media can be read Subsequent step when PC machine is read, the subsequent step refers to,
In cloud control identification judge to can be read the reading PC machine of move media as the non-security i.e. unauthorized ends PC when, to hand Machine sends out instruction build move media and is read by illegal request;
Control identification judges to can be read the reading PC machine of move media in cloud when be the non-security i.e. unauthorized ends PC, gives shifting Dynamic medium sends out the information that storage is damaged in instruction;I.e. there are command-destruct in move media.
The further technical solution of the present invention is, also includes to return the information of move media by communication module before self-destruction To the instruction for the storage center controlled in cloud.
The further technical solution of the present invention is that the command-destruct refers to formatting commands.
The further technical solution of the present invention is, be also included in be identified as reading this when the unauthorized ends PC it is unauthorized The IP address at the ends PC and return in cloud control part the step of.
The further technical solution of the present invention is that the move media also includes locating module, which can lead to The step of crossing in mobile phone or cloud and control positioning in real time, also including physical geographical address of return when being accessed by illegal request.
The further technical solution of the present invention is, also include it is super away from identification the step of, set safe distance as S, i.e. mobile phone The location information of positioning and move media positioning the two is judged, when distance is more than safe distance S, mobile phone alarm Step.
Using the present invention of technical solution as above, have the advantages that compared with the existing technology:
A. when utilizing USB connection move medias, USB can be utilized to in-line power;B. initiative to give move media Communications portion and security request is added, move media can be interactive with control in PC machine and mobile phone and cloud, intelligent stronger, mobile phone Verification can effectively be subject to further preferably the safety of move media, and the technology at this place can refer to the communication technology of U-shield.
Description of the drawings
In order to further illustrate the present invention, it is further illustrated below in conjunction with the accompanying drawings:
Fig. 1 is operation schematic diagram of the present invention;
Fig. 2 is move media functional diagram.
Specific implementation mode
With reference to the accompanying drawings and detailed description.
This patent provides a variety of concomitant regimens, in place of different expression, belong to modified scheme based on basic scheme or It is parallel type scheme.Each scheme has the unique features of oneself.
A kind of control method of information security, which is characterized in that
Including move media, which is USB flash disk either mobile hard disk;Include storage mould inside the mobile hard disk Block, power module, encrypting module and communication module;
The memory module can store information;The power module enables to move media connection on computers When move media is powered using computer, which communicates to connect encrypting module and communication module;
The encrypting module can be encrypted USB flash disk and by way of receiving to instruct come to USB flash disk storage inside mould The information of block, which is read out, either to be changed;
The communication module can realize the information exchange controlled in USB flash disk and extraneous mobile phone and cloud;Communication module is logical Letter connection encrypting module;
I.e. when the reading PC machine of move media can be read in move media insertion, power module is powered power supply supply respectively A module work, encrypting module obtain read requests, and communication module sends out instruction at this time, is controlled in cloud and judges the instruction, if PC machine Belong to safe range, then send out instruction to mobile phone, after confirming phone, mould is then encrypted in mobile phone and communication module communication for the instruction Block allows the reading PC machine that move media can be read to read the storage information inside USB flash disk.
The technique effect and its realization process for the essence that the technical solution at this place is played are one of arbitrary as follows:A. it utilizes When USB connection move medias, USB can be utilized to in-line power;B. it is initiative to move media be added communications portion and Security request, move media can be interactive with control in PC machine and mobile phone and cloud, and intelligent stronger, mobile phone verification can be effectively right The safety of move media is subject to further preferably, and the technology at this place can refer to the communication technology of U-shield.
The step of initial identification when being also inserted into the reading PC machine that move media can be read for the first time included in move media Suddenly, the initial identification refers to power module energization power supply supply modules work, and encrypting module obtains read requests, this When communication module send out instruction, in cloud control judge the instruction and judge the move media to use for the first time, if PC machine belongs to peace Gamut then sends out instruction to mobile phone, and the instruction is after confirming phone, mobile phone and communication module communication, then encrypting module allows The reading PC machine that move media can be read reads the storage information inside USB flash disk and identifies that mobile Jie can be read in this in encryption part The reading PC machine of matter is the machine;And the number of move media and mobile phone is corresponded into storage pairing, move media is again insertable into this Do not have to control and mobile phone in cloud when the machine to verify again;The USB flash disk or mobile hard disk energy when inserting such as the machine, that is, ends PC Enough by initial identification, the initial identification refers to that mutually identical secret key is formed to USB flash disk and the machine.The technical solution institute at this place The technique effect and its realization process of the essence played are as follows:The technology at this place can be identified the machine, therefore The machine and other PC machine are distinguished, the stolen safety problem brought of move media is avoided.
Also include subsequent step when move media is inserted into the non-security reading PC machine that move media can be read, The subsequent step refers to,
In cloud control identification judge to can be read the reading PC machine of move media as the non-security i.e. unauthorized ends PC when, to hand Machine sends out instruction build move media and is read by illegal request;
Control identification judges to can be read the reading PC machine of move media in cloud when be the non-security i.e. unauthorized ends PC, gives shifting Dynamic medium sends out the information that storage is damaged in instruction;I.e. there are command-destruct in move media.
The technique effect and its realization process for the essence that the technical solution at this place is played are as follows:This place exists in a creative way Data is returned using communications portion before self-destruction, avoids the loss of data, communications portion is powerful, in addition to safety Interaction outside, this place can also carry out telecommunication.
It also include the instruction that the information of move media is returned to the storage center controlled in cloud by communication module before self-destruction.
The command-destruct refers to formatting commands.It can certainly be the instruction of automatic physical damnification.
It is also included in and is identified as reading the IP address at the unauthorized ends PC when the unauthorized ends PC and returns to cloud The step of middle control part.
The move media also includes locating module, which can be by controlling positioning in real time, also in mobile phone or cloud Including the step of physical geographical address of return when being accessed by illegal request.The essence that the technical solution at this place is played Technique effect and its realize process be as follows:This patent is other than preventative technology, additionally it is possible to pursue the position of move media It sets and trace location, effectively tracks move media by the address of unauthorized access.
Also comprising surpassing away from identification the step of, sets safe distance as S, i.e., mobile phone positioning and move media position determining for the two Position information is judged, when distance is more than safe distance S, the step of mobile phone alarm.The technical solution at this place is played Essence technique effect and its realize process be as follows:The scheme at this place can carry out again move media far from mobile phone when It waits, alarms at once.
In a creative way, above each effect is individually present, moreover it is possible to the combination of the above results is completed with a nested structure.
It is clear that the technique effect that the above structure is realized is realized, if the additional technical solution is not taken into account, this patent title is also It can be a kind of new type of safe move media.It is not shown in figure part details.
It should be noted that multiple schemes that this patent provides include the basic scheme of itself, independently of each other, not mutually It restricts, but it can also be combined with each other in the absence of conflict, reach multiple effects and realize jointly.
The basic principles, main features and advantages of the present invention have been shown and described above.The technology of this field Personnel should be recognized that the present invention is not limited to the above embodiments, and the above embodiments and description only describe this hairs Bright principle, without departing from the spirit and scope of the present invention, various changes and improvements may be made to the invention, these variations It is both fallen in claimed range with improving.

Claims (8)

1. a kind of control method of information security, which is characterized in that
Including move media, which is USB flash disk either mobile hard disk;Include memory module, electricity inside the mobile hard disk Source module, encrypting module and communication module;
The memory module can store information;The power module enable to move media connection on computers when Time is powered move media using computer, which communicates to connect encrypting module and communication module;
The encrypting module can be encrypted USB flash disk and by way of receiving to instruct come to USB flash disk storage inside module Information, which is read out, either to be changed;
The communication module can realize the information exchange controlled in USB flash disk and extraneous mobile phone and cloud;Communication module communication link Connect encrypting module;
I.e. when the reading PC machine of move media can be read in move media insertion, power module, which is powered to powering, supplies each mould Block works, and encrypting module obtains read requests, and communication module sends out instruction at this time, is controlled in cloud and judges the instruction, if PC machine belongs to Safe range then sends out instruction to mobile phone, and the instruction is after confirming phone, mobile phone and communication module communication, then encrypting module permits The storage information inside the reading PC machine reading USB flash disk of move media is read in license.
2. a kind of control method of information security as described in claim 1, which is characterized in that be also included in move media for the first time The step of initial identification being inserted into when the reading PC machine of move media can be read, the initial identification refers to power module Be powered power supply supply modules work, and encrypting module obtains read requests, and communication module sends out instruction at this time, controls and judges in cloud The instruction and the move media is judged to use for the first time, if PC machine belongs to safe range, send out instruction to mobile phone, the instruction After confirming phone, mobile phone and communication module communicate, then encrypting module allows the reading PC machine that move media can be read to read USB flash disk Internal storage information and identify that the reading PC machine of move media can be read as the machine in this in encryption part;And it is situated between mobile The number of matter and mobile phone corresponds to storage pairing, and control and mobile phone in cloud are not had to when move media is again insertable into the machine and is tested again Card;The USB flash disk or mobile hard disk can refer to pair by initial identification, the initial identification when inserting such as the machine, that is, ends PC USB flash disk and the machine form mutually identical secret key.
3. a kind of control method of information security as described in claim 1, which is characterized in that be also inserted into comprising move media Subsequent step when the non-security reading PC machine that move media can be read, the subsequent step refer to,
In cloud control identification judge to can be read the reading PC machine of move media as the non-security i.e. unauthorized ends PC when, give mobile phone hair Go out to instruct build move media to be read by illegal request;
Control identification judges to can be read the reading PC machine of move media in cloud when be the non-security i.e. unauthorized ends PC, gives movement Jie Matter sends out the information that storage is damaged in instruction;I.e. there are command-destruct in move media.
4. a kind of control method of information security as claimed in claim 3, which is characterized in that also include that will move Jie before self-destruction The information of matter returns to the instruction for the storage center controlled in cloud by communication module.
5. a kind of control method of information security as claimed in claim 3, which is characterized in that the command-destruct refers to lattice Formulaization instructs.
6. a kind of control method of information security as claimed in claim 3, which is characterized in that be also included in and be identified as non-award The IP address at the unauthorized ends PC is read when weighing the ends PC and returns to the step of part is controlled in cloud.
7. a kind of control method of information security as claimed in claim 3, which is characterized in that the move media also includes fixed Position module, the locating module can by mobile phone or cloud control in real time positioning, also include return by illegal request access when The step of physical geographical address of time.
8. a kind of control method of information security as claimed in claim 7, which is characterized in that also include the super step away from identification Suddenly, safe distance is set as S, i.e. the location information of both mobile phone positioning and move media positioning is judged, when distance is more than When safe distance S, the step of mobile phone alarm.
CN201810079988.3A 2018-01-27 2018-01-27 A kind of control method of information security Pending CN108416222A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810079988.3A CN108416222A (en) 2018-01-27 2018-01-27 A kind of control method of information security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810079988.3A CN108416222A (en) 2018-01-27 2018-01-27 A kind of control method of information security

Publications (1)

Publication Number Publication Date
CN108416222A true CN108416222A (en) 2018-08-17

Family

ID=63126438

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810079988.3A Pending CN108416222A (en) 2018-01-27 2018-01-27 A kind of control method of information security

Country Status (1)

Country Link
CN (1) CN108416222A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102427449A (en) * 2011-11-04 2012-04-25 北京工业大学 Trusted mobile storage method based on security chips
CN104281813A (en) * 2014-10-24 2015-01-14 深圳市车宝汇科技有限公司 Wireless remote control memory system and control method thereof
CN104378205A (en) * 2013-07-15 2015-02-25 众智科技有限公司 Wireless two-factor authentication, authorization and audit system with close proximity between mass storage device and communication device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102427449A (en) * 2011-11-04 2012-04-25 北京工业大学 Trusted mobile storage method based on security chips
CN104378205A (en) * 2013-07-15 2015-02-25 众智科技有限公司 Wireless two-factor authentication, authorization and audit system with close proximity between mass storage device and communication device
CN104281813A (en) * 2014-10-24 2015-01-14 深圳市车宝汇科技有限公司 Wireless remote control memory system and control method thereof

Similar Documents

Publication Publication Date Title
US20190165947A1 (en) Signatures for near field communications
CN102843669B (en) Data access method and device
CN105989386B (en) A kind of method and apparatus for reading and writing radio frequency identification card
CN110417750A (en) File based on block chain technology is read and method, terminal device and the storage medium of storage
CN102930435A (en) Authentication method and system for mobile payment
JP2014059855A (en) Settlement method, settlement server executing the same, program for executing the same and system executing the same
CN101017525A (en) Divulging secrets prevention system of USB storage device date based on certificate and transparent encryption technology
CN104380652A (en) Multi-issuer secure element partition architecture for NFC enabled devices
CN102468961A (en) Distributive enterprise identification authentication method, system and embedded terminal
CN103812649A (en) Method and system for safety access control of machine-card interface, and handset terminal
CN106296177A (en) Data processing method based on bank's Mobile solution and equipment
CN105933886A (en) ESIM number writing method, security system, ESIM number server and terminal
CN102333072A (en) Network banking trusted transaction system and method based on intelligent terminal
CN110460581A (en) Sharing files method, equipment, SE device, is shared end and medium at system
CN113610528A (en) Block chain-based management system, method, device and storage medium
CN113450092A (en) Block chain network-based article safe and efficient transaction method, system and storage medium
Alshehri et al. Formal security analysis of NFC M-coupon protocols using Casper/FDR
CN112507296A (en) User login verification method and system based on block chain
CN116226289A (en) Electronic certificate management method, device, equipment and storage medium based on blockchain
CN103218633A (en) Radio frequency identification (RFID) safety authentication method
Mantoro et al. Smart card authentication for Internet applications using NFC enabled phone
CN103905197B (en) A kind of method that SIM card and external equipment are bound and verified
CN110098925A (en) Based on unsymmetrical key pond to and random number quantum communications service station cryptographic key negotiation method and system
CN111259455B (en) Block chain private key escrow method and system
CN106712952B (en) Radio frequency tag security identification method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180817