CN108416222A - A kind of control method of information security - Google Patents
A kind of control method of information security Download PDFInfo
- Publication number
- CN108416222A CN108416222A CN201810079988.3A CN201810079988A CN108416222A CN 108416222 A CN108416222 A CN 108416222A CN 201810079988 A CN201810079988 A CN 201810079988A CN 108416222 A CN108416222 A CN 108416222A
- Authority
- CN
- China
- Prior art keywords
- move media
- module
- read
- machine
- mobile phone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/073—Special arrangements for circuits, e.g. for protecting identification code in memory
- G06K19/07309—Means for preventing undesired reading or writing from or onto record carriers
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C7/00—Arrangements for writing information into, or reading information out from, a digital store
- G11C7/24—Memory cell safety or protection circuits, e.g. arrangements for preventing inadvertent reading or writing; Status cells; Test cells
Abstract
The present invention relates to information security field more particularly to a kind of control methods of information security.Including move media, which is USB flash disk either mobile hard disk;Include memory module, power module, encrypting module and communication module inside the mobile hard disk;I.e. when the reading PC machine of move media can be read in move media insertion, power module, which is powered to powering, supplies modules work, encrypting module obtains read requests, communication module sends out instruction at this time, is controlled in cloud and judges the instruction, if PC machine belongs to safe range, then instruction is sent out to mobile phone, the instruction is after confirming phone, mobile phone and communication module communication, then encrypting module allows the reading PC machine that move media can be read to read the storage information inside USB flash disk.
Description
Technical field
The present invention relates to information security field more particularly to a kind of control methods of information security.
Background technology
Information security includes mainly the content of following five aspect, i.e., need to ensure the confidentiality of information, authenticity, integrality,
The safety of unauthorised copies and institute's parasitic system.The range that information security itself includes is very big, including how taking precautions against quotient
Leakage etc. of the teenager to the browsing, personal information of flame is taken precautions against in the secret leakage of industry enterprise.Information peace under network environment
Entirety system is the key that ensure information security, including computer security operating system, various security protocols, security mechanism are (digital
Signature, message authentication, data encryption etc.), until security system, such as UniNAC, DLP, it can simply by the presence of security breaches
Threaten global safety.Information security refers to information system (including hardware, software, data, people, physical environment and its infrastructure)
It is protected, not by the reason of accidental or malice and by destroying, changing, revealing, system is continuously reliably normally run,
Information service is not interrupted, and finally realizes business continuance.
However, the non intelligent USB flash disk of current USB flash disk, additional properties are bad, and many move medias can not fundamentally ensure
Safety.
Invention content
The purpose of invention:In order to provide a kind of control method of effect better information safety, specific purposes are shown in specific reality
Apply multiple substantial technological effects of part.
In order to reach purpose as above, the present invention adopts the following technical scheme that:
A kind of control method of information security, which is characterized in that
Including move media, which is USB flash disk either mobile hard disk;Include storage mould inside the mobile hard disk
Block, power module, encrypting module and communication module;
The memory module can store information;The power module enables to move media connection on computers
When move media is powered using computer, which communicates to connect encrypting module and communication module;
The encrypting module can be encrypted USB flash disk and by way of receiving to instruct come to USB flash disk storage inside mould
The information of block, which is read out, either to be changed;
The communication module can realize the information exchange controlled in USB flash disk and extraneous mobile phone and cloud;Communication module is logical
Letter connection encrypting module;
I.e. when the reading PC machine of move media can be read in move media insertion, power module is powered power supply supply respectively
A module work, encrypting module obtain read requests, and communication module sends out instruction at this time, is controlled in cloud and judges the instruction, if PC machine
Belong to safe range, then send out instruction to mobile phone, after confirming phone, mould is then encrypted in mobile phone and communication module communication for the instruction
Block allows the reading PC machine that move media can be read to read the storage information inside USB flash disk.
The further technical solution of the present invention is, is also inserted into the reading that move media can be read for the first time included in move media
The step of initial identification when PC machine, the initial identification refer to that power module is powered power supply supply modules work
Make, encrypting module obtains read requests, and communication module sends out instruction at this time, is controlled in cloud and judges the instruction and judge that the movement is situated between
Matter be use for the first time, if PC machine belongs to safe range, instruction is sent out to mobile phone, the instruction after confirming phone, mobile phone and lead to
Believe module communication, then encrypting module allow to can be read the storage information inside the readings PC machine reading USB flash disk of move media and
It is the machine that encryption part, which identifies that the reading PC machine of move media can be read in this,;And the number of move media and mobile phone correspondence is deposited
Storage pairing does not have to control and mobile phone in cloud and verifies again when move media is again insertable into the machine;The USB flash disk or mobile hard disk
Can refer to that mutual kiss is formed to USB flash disk and the machine by initial identification, the initial identification when inserting such as the machine, that is, ends PC
The secret key of conjunction.
The further technical solution of the present invention is, also includes that move media is inserted into and non-security move media can be read
Subsequent step when PC machine is read, the subsequent step refers to,
In cloud control identification judge to can be read the reading PC machine of move media as the non-security i.e. unauthorized ends PC when, to hand
Machine sends out instruction build move media and is read by illegal request;
Control identification judges to can be read the reading PC machine of move media in cloud when be the non-security i.e. unauthorized ends PC, gives shifting
Dynamic medium sends out the information that storage is damaged in instruction;I.e. there are command-destruct in move media.
The further technical solution of the present invention is, also includes to return the information of move media by communication module before self-destruction
To the instruction for the storage center controlled in cloud.
The further technical solution of the present invention is that the command-destruct refers to formatting commands.
The further technical solution of the present invention is, be also included in be identified as reading this when the unauthorized ends PC it is unauthorized
The IP address at the ends PC and return in cloud control part the step of.
The further technical solution of the present invention is that the move media also includes locating module, which can lead to
The step of crossing in mobile phone or cloud and control positioning in real time, also including physical geographical address of return when being accessed by illegal request.
The further technical solution of the present invention is, also include it is super away from identification the step of, set safe distance as S, i.e. mobile phone
The location information of positioning and move media positioning the two is judged, when distance is more than safe distance S, mobile phone alarm
Step.
Using the present invention of technical solution as above, have the advantages that compared with the existing technology:
A. when utilizing USB connection move medias, USB can be utilized to in-line power;B. initiative to give move media
Communications portion and security request is added, move media can be interactive with control in PC machine and mobile phone and cloud, intelligent stronger, mobile phone
Verification can effectively be subject to further preferably the safety of move media, and the technology at this place can refer to the communication technology of U-shield.
Description of the drawings
In order to further illustrate the present invention, it is further illustrated below in conjunction with the accompanying drawings:
Fig. 1 is operation schematic diagram of the present invention;
Fig. 2 is move media functional diagram.
Specific implementation mode
With reference to the accompanying drawings and detailed description.
This patent provides a variety of concomitant regimens, in place of different expression, belong to modified scheme based on basic scheme or
It is parallel type scheme.Each scheme has the unique features of oneself.
A kind of control method of information security, which is characterized in that
Including move media, which is USB flash disk either mobile hard disk;Include storage mould inside the mobile hard disk
Block, power module, encrypting module and communication module;
The memory module can store information;The power module enables to move media connection on computers
When move media is powered using computer, which communicates to connect encrypting module and communication module;
The encrypting module can be encrypted USB flash disk and by way of receiving to instruct come to USB flash disk storage inside mould
The information of block, which is read out, either to be changed;
The communication module can realize the information exchange controlled in USB flash disk and extraneous mobile phone and cloud;Communication module is logical
Letter connection encrypting module;
I.e. when the reading PC machine of move media can be read in move media insertion, power module is powered power supply supply respectively
A module work, encrypting module obtain read requests, and communication module sends out instruction at this time, is controlled in cloud and judges the instruction, if PC machine
Belong to safe range, then send out instruction to mobile phone, after confirming phone, mould is then encrypted in mobile phone and communication module communication for the instruction
Block allows the reading PC machine that move media can be read to read the storage information inside USB flash disk.
The technique effect and its realization process for the essence that the technical solution at this place is played are one of arbitrary as follows:A. it utilizes
When USB connection move medias, USB can be utilized to in-line power;B. it is initiative to move media be added communications portion and
Security request, move media can be interactive with control in PC machine and mobile phone and cloud, and intelligent stronger, mobile phone verification can be effectively right
The safety of move media is subject to further preferably, and the technology at this place can refer to the communication technology of U-shield.
The step of initial identification when being also inserted into the reading PC machine that move media can be read for the first time included in move media
Suddenly, the initial identification refers to power module energization power supply supply modules work, and encrypting module obtains read requests, this
When communication module send out instruction, in cloud control judge the instruction and judge the move media to use for the first time, if PC machine belongs to peace
Gamut then sends out instruction to mobile phone, and the instruction is after confirming phone, mobile phone and communication module communication, then encrypting module allows
The reading PC machine that move media can be read reads the storage information inside USB flash disk and identifies that mobile Jie can be read in this in encryption part
The reading PC machine of matter is the machine;And the number of move media and mobile phone is corresponded into storage pairing, move media is again insertable into this
Do not have to control and mobile phone in cloud when the machine to verify again;The USB flash disk or mobile hard disk energy when inserting such as the machine, that is, ends PC
Enough by initial identification, the initial identification refers to that mutually identical secret key is formed to USB flash disk and the machine.The technical solution institute at this place
The technique effect and its realization process of the essence played are as follows:The technology at this place can be identified the machine, therefore
The machine and other PC machine are distinguished, the stolen safety problem brought of move media is avoided.
Also include subsequent step when move media is inserted into the non-security reading PC machine that move media can be read,
The subsequent step refers to,
In cloud control identification judge to can be read the reading PC machine of move media as the non-security i.e. unauthorized ends PC when, to hand
Machine sends out instruction build move media and is read by illegal request;
Control identification judges to can be read the reading PC machine of move media in cloud when be the non-security i.e. unauthorized ends PC, gives shifting
Dynamic medium sends out the information that storage is damaged in instruction;I.e. there are command-destruct in move media.
The technique effect and its realization process for the essence that the technical solution at this place is played are as follows:This place exists in a creative way
Data is returned using communications portion before self-destruction, avoids the loss of data, communications portion is powerful, in addition to safety
Interaction outside, this place can also carry out telecommunication.
It also include the instruction that the information of move media is returned to the storage center controlled in cloud by communication module before self-destruction.
The command-destruct refers to formatting commands.It can certainly be the instruction of automatic physical damnification.
It is also included in and is identified as reading the IP address at the unauthorized ends PC when the unauthorized ends PC and returns to cloud
The step of middle control part.
The move media also includes locating module, which can be by controlling positioning in real time, also in mobile phone or cloud
Including the step of physical geographical address of return when being accessed by illegal request.The essence that the technical solution at this place is played
Technique effect and its realize process be as follows:This patent is other than preventative technology, additionally it is possible to pursue the position of move media
It sets and trace location, effectively tracks move media by the address of unauthorized access.
Also comprising surpassing away from identification the step of, sets safe distance as S, i.e., mobile phone positioning and move media position determining for the two
Position information is judged, when distance is more than safe distance S, the step of mobile phone alarm.The technical solution at this place is played
Essence technique effect and its realize process be as follows:The scheme at this place can carry out again move media far from mobile phone when
It waits, alarms at once.
In a creative way, above each effect is individually present, moreover it is possible to the combination of the above results is completed with a nested structure.
It is clear that the technique effect that the above structure is realized is realized, if the additional technical solution is not taken into account, this patent title is also
It can be a kind of new type of safe move media.It is not shown in figure part details.
It should be noted that multiple schemes that this patent provides include the basic scheme of itself, independently of each other, not mutually
It restricts, but it can also be combined with each other in the absence of conflict, reach multiple effects and realize jointly.
The basic principles, main features and advantages of the present invention have been shown and described above.The technology of this field
Personnel should be recognized that the present invention is not limited to the above embodiments, and the above embodiments and description only describe this hairs
Bright principle, without departing from the spirit and scope of the present invention, various changes and improvements may be made to the invention, these variations
It is both fallen in claimed range with improving.
Claims (8)
1. a kind of control method of information security, which is characterized in that
Including move media, which is USB flash disk either mobile hard disk;Include memory module, electricity inside the mobile hard disk
Source module, encrypting module and communication module;
The memory module can store information;The power module enable to move media connection on computers when
Time is powered move media using computer, which communicates to connect encrypting module and communication module;
The encrypting module can be encrypted USB flash disk and by way of receiving to instruct come to USB flash disk storage inside module
Information, which is read out, either to be changed;
The communication module can realize the information exchange controlled in USB flash disk and extraneous mobile phone and cloud;Communication module communication link
Connect encrypting module;
I.e. when the reading PC machine of move media can be read in move media insertion, power module, which is powered to powering, supplies each mould
Block works, and encrypting module obtains read requests, and communication module sends out instruction at this time, is controlled in cloud and judges the instruction, if PC machine belongs to
Safe range then sends out instruction to mobile phone, and the instruction is after confirming phone, mobile phone and communication module communication, then encrypting module permits
The storage information inside the reading PC machine reading USB flash disk of move media is read in license.
2. a kind of control method of information security as described in claim 1, which is characterized in that be also included in move media for the first time
The step of initial identification being inserted into when the reading PC machine of move media can be read, the initial identification refers to power module
Be powered power supply supply modules work, and encrypting module obtains read requests, and communication module sends out instruction at this time, controls and judges in cloud
The instruction and the move media is judged to use for the first time, if PC machine belongs to safe range, send out instruction to mobile phone, the instruction
After confirming phone, mobile phone and communication module communicate, then encrypting module allows the reading PC machine that move media can be read to read USB flash disk
Internal storage information and identify that the reading PC machine of move media can be read as the machine in this in encryption part;And it is situated between mobile
The number of matter and mobile phone corresponds to storage pairing, and control and mobile phone in cloud are not had to when move media is again insertable into the machine and is tested again
Card;The USB flash disk or mobile hard disk can refer to pair by initial identification, the initial identification when inserting such as the machine, that is, ends PC
USB flash disk and the machine form mutually identical secret key.
3. a kind of control method of information security as described in claim 1, which is characterized in that be also inserted into comprising move media
Subsequent step when the non-security reading PC machine that move media can be read, the subsequent step refer to,
In cloud control identification judge to can be read the reading PC machine of move media as the non-security i.e. unauthorized ends PC when, give mobile phone hair
Go out to instruct build move media to be read by illegal request;
Control identification judges to can be read the reading PC machine of move media in cloud when be the non-security i.e. unauthorized ends PC, gives movement Jie
Matter sends out the information that storage is damaged in instruction;I.e. there are command-destruct in move media.
4. a kind of control method of information security as claimed in claim 3, which is characterized in that also include that will move Jie before self-destruction
The information of matter returns to the instruction for the storage center controlled in cloud by communication module.
5. a kind of control method of information security as claimed in claim 3, which is characterized in that the command-destruct refers to lattice
Formulaization instructs.
6. a kind of control method of information security as claimed in claim 3, which is characterized in that be also included in and be identified as non-award
The IP address at the unauthorized ends PC is read when weighing the ends PC and returns to the step of part is controlled in cloud.
7. a kind of control method of information security as claimed in claim 3, which is characterized in that the move media also includes fixed
Position module, the locating module can by mobile phone or cloud control in real time positioning, also include return by illegal request access when
The step of physical geographical address of time.
8. a kind of control method of information security as claimed in claim 7, which is characterized in that also include the super step away from identification
Suddenly, safe distance is set as S, i.e. the location information of both mobile phone positioning and move media positioning is judged, when distance is more than
When safe distance S, the step of mobile phone alarm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810079988.3A CN108416222A (en) | 2018-01-27 | 2018-01-27 | A kind of control method of information security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810079988.3A CN108416222A (en) | 2018-01-27 | 2018-01-27 | A kind of control method of information security |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108416222A true CN108416222A (en) | 2018-08-17 |
Family
ID=63126438
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810079988.3A Pending CN108416222A (en) | 2018-01-27 | 2018-01-27 | A kind of control method of information security |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108416222A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102427449A (en) * | 2011-11-04 | 2012-04-25 | 北京工业大学 | Trusted mobile storage method based on security chips |
CN104281813A (en) * | 2014-10-24 | 2015-01-14 | 深圳市车宝汇科技有限公司 | Wireless remote control memory system and control method thereof |
CN104378205A (en) * | 2013-07-15 | 2015-02-25 | 众智科技有限公司 | Wireless two-factor authentication, authorization and audit system with close proximity between mass storage device and communication device |
-
2018
- 2018-01-27 CN CN201810079988.3A patent/CN108416222A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102427449A (en) * | 2011-11-04 | 2012-04-25 | 北京工业大学 | Trusted mobile storage method based on security chips |
CN104378205A (en) * | 2013-07-15 | 2015-02-25 | 众智科技有限公司 | Wireless two-factor authentication, authorization and audit system with close proximity between mass storage device and communication device |
CN104281813A (en) * | 2014-10-24 | 2015-01-14 | 深圳市车宝汇科技有限公司 | Wireless remote control memory system and control method thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20190165947A1 (en) | Signatures for near field communications | |
CN102843669B (en) | Data access method and device | |
CN105989386B (en) | A kind of method and apparatus for reading and writing radio frequency identification card | |
CN110417750A (en) | File based on block chain technology is read and method, terminal device and the storage medium of storage | |
CN102930435A (en) | Authentication method and system for mobile payment | |
JP2014059855A (en) | Settlement method, settlement server executing the same, program for executing the same and system executing the same | |
CN101017525A (en) | Divulging secrets prevention system of USB storage device date based on certificate and transparent encryption technology | |
CN104380652A (en) | Multi-issuer secure element partition architecture for NFC enabled devices | |
CN102468961A (en) | Distributive enterprise identification authentication method, system and embedded terminal | |
CN103812649A (en) | Method and system for safety access control of machine-card interface, and handset terminal | |
CN106296177A (en) | Data processing method based on bank's Mobile solution and equipment | |
CN105933886A (en) | ESIM number writing method, security system, ESIM number server and terminal | |
CN102333072A (en) | Network banking trusted transaction system and method based on intelligent terminal | |
CN110460581A (en) | Sharing files method, equipment, SE device, is shared end and medium at system | |
CN113610528A (en) | Block chain-based management system, method, device and storage medium | |
CN113450092A (en) | Block chain network-based article safe and efficient transaction method, system and storage medium | |
Alshehri et al. | Formal security analysis of NFC M-coupon protocols using Casper/FDR | |
CN112507296A (en) | User login verification method and system based on block chain | |
CN116226289A (en) | Electronic certificate management method, device, equipment and storage medium based on blockchain | |
CN103218633A (en) | Radio frequency identification (RFID) safety authentication method | |
Mantoro et al. | Smart card authentication for Internet applications using NFC enabled phone | |
CN103905197B (en) | A kind of method that SIM card and external equipment are bound and verified | |
CN110098925A (en) | Based on unsymmetrical key pond to and random number quantum communications service station cryptographic key negotiation method and system | |
CN111259455B (en) | Block chain private key escrow method and system | |
CN106712952B (en) | Radio frequency tag security identification method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180817 |