CN109299589A - Crypto terminal, system and control method based on cryptography - Google Patents
Crypto terminal, system and control method based on cryptography Download PDFInfo
- Publication number
- CN109299589A CN109299589A CN201811028189.XA CN201811028189A CN109299589A CN 109299589 A CN109299589 A CN 109299589A CN 201811028189 A CN201811028189 A CN 201811028189A CN 109299589 A CN109299589 A CN 109299589A
- Authority
- CN
- China
- Prior art keywords
- information
- module
- terminal
- normal
- crypto terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
Abstract
Crypto terminal, system and control method based on cryptography, to two or more in crypto terminal configuration numerical ciphers library, facial database, fingerprint database or acoustic control database;Recalls information determination module determines that encrypted message type when user uses crypto terminal is located in normal password unit or urgent password unit, determines that crypto terminal is used in normal condition or emergency;When use when crypto terminal is judged as normal condition, normal information feedback module is called to send Normal Feedback information to crypto terminal, when use when crypto terminal is judged as emergency, it calls normal information feedback module to send Normal Feedback information to crypto terminal, while emergence message feedback module being called to send urgent feedback information to information receiving terminal.The present invention can carry out emergence message feedback while passing through password normal use terminal device, guarantee that user can timely be succoured.
Description
Technical field
The present invention relates to field of information security technology, and in particular to a kind of crypto terminal based on cryptography, system and control
Method processed.
Background technique
Currently, being needed in many cases through password in life come the use of controlling terminal equipment, such as passing through input number
Word password utilizes ATM automated teller machine withdrawal;POS terminal consumption is carried out by input numerical ciphers;Pass through sound, numerical ciphers, sound
Wave or face carry out mobile phone unlock;E-payment is carried out using numerical ciphers or fingerprint;Pass through electronic access using sound, face
System etc..
In the case where burst, user, which may be subjected to stress and carry out the use of terminal device, completes certain damage in turn
E-payment is carried out in the case of the situation of password holder's interests, such as stress or is transferred accounts or opening gate etc., for another example some use
Family is called a taxi by taxi-hailing software, is met with criminal and is caused the person and the case where economic damage also commonplace, due to
Control of the family by illegal person is difficult timely to be alarmed and sought help, to cause economic loss, What is more life by
It threatens.Need a kind of new technical solution solution prior art problem encountered.
Summary of the invention
The embodiment of the present invention is designed to provide a kind of crypto terminal based on cryptography, system and control method, when
When user meets with unlawful infringement, emergence message feedback can be carried out while passing through password normal use terminal device, guaranteed
User can timely be succoured.
To achieve the above object, the embodiment of the present invention provides a kind of crypto terminal based on cryptography, the crypto terminal
Include:
Normal password unit, by obtaining the one or more of numerical ciphers, face data, finger print data or acoustic control data
Mode carries out the control of the crypto terminal under normal condition;
Urgent password unit, by obtaining the one or more of numerical ciphers, face data, finger print data or acoustic control data
Mode carries out the control of the crypto terminal under emergency;
Information acquisition unit, for acquiring specific additional information, when user is close by the number under urgent cipher mode
Code, face data, finger print data or acoustic control data one or more modes carry out additional information acquisition when controlling crypto terminal;
Mode presetting module, for matching numerical ciphers, face data, finger print data or the one or more of acoustic control data
It is set to normal cipher mode or urgent cipher mode;
Wireless transmission unit, the additional information for acquiring information acquisition unit carry out wireless data transmission;
The crypto terminal is configured with two in numerical ciphers library, facial database, fingerprint database or acoustic control database
Or it is multiple, it is configured with numerical ciphers information gathered in advance in the numerical ciphers library, is configured in described facial data library pre-
The face data information first acquired is configured with finger print data information gathered in advance, the acoustic control number in the fingerprint database
According in library be configured with sonic data information gathered in advance.
As the preferred embodiment of the crypto terminal based on cryptography, the crypto terminal further includes that password is keyed in module, referred to
Line obtains module, expression acquisition module or sound acquisition module, and the password keys in module and the normal password unit or tight
Anxious password unit establishes a connection, and password keys in module and is used for user to crypto terminal input numerical ciphers information;The finger
Line obtain module establish a connection with the normal password unit or urgent password unit, fingerprint obtain module be used for user to
Crypto terminal inputs finger print data information;The expression acquisition module and the normal password unit or urgent password unit are established
Connection relationship, expression acquisition module input expression data information to crypto terminal for user;The sound acquisition module and institute
It states normal password unit or urgent password unit establishes a connection, sound acquisition module inputs table to crypto terminal for user
Feelings data information.
As the preferred embodiment of the crypto terminal based on cryptography, the information acquisition unit includes locating module, recording
Module or picture recording module, the crypto terminal position when locating module is used to obtain under emergency using crypto terminal are believed
Breath, the environmental voice information when recording module is used to obtain under emergency using crypto terminal, the picture recording module are used
Ambient image information when obtaining under emergency using crypto terminal.
In addition the embodiment of the present invention provides a kind of cryptographic system based on cryptography, the cryptographic system includes password end
End, cipher server and information receiving terminal, the crypto terminal include that normal password unit, urgent password unit, information are adopted
Collect unit and wireless transmission unit;The cipher server includes information judging module, normal information feedback module and urgent letter
Cease feedback module;
The normal password unit establishes a connection with the information judging module, and normal password unit is by normal condition
The numerical ciphers of the crypto terminal of lower acquisition, face data, finger print data or acoustic control data one or more information pass to
The information judging module;
The urgent password unit establishes a connection with the information judging module, and urgent password unit is by emergency
The numerical ciphers of the crypto terminal of lower acquisition, face data, finger print data or acoustic control data one or more information pass to
The information judging module;
The information acquisition unit establishes a connection with the emergence message feedback module, and information acquisition unit is in user
It is controlled by one or more modes of numerical ciphers under urgent cipher mode, face data, finger print data or acoustic control data
Additional information acquisition is carried out when crypto terminal;
The wireless transmission unit establishes a connection with the emergence message feedback module or information receiving terminal, wirelessly
The additional information that information acquisition unit acquires is transferred to the emergence message feedback module of cipher server by transmission unit;
The information judging module is for determining that encrypted message type of the user using crypto terminal when determines crypto terminal
It is used in normal condition or emergency;
The normal information feedback module is whole using password using normal cipher mode or urgent cipher mode for user
Normal Feedback information is sent to crypto terminal when end;
It is received when the emergence message feedback module uses crypto terminal using urgent cipher mode for user to information
Terminal sends urgent feedback information.
As the preferred embodiment of the cryptographic system based on cryptography, the crypto terminal further includes mode presetting module, institute
Mode presetting module is stated for one or more configurations of numerical ciphers, face data, finger print data or acoustic control data to be positive
Normal cipher mode or urgent cipher mode.
As the preferred embodiment of the cryptographic system based on cryptography, the crypto terminal is configured with numerical ciphers library, face
It is two or more in database, fingerprint database or acoustic control database, number gathered in advance is configured in the numerical ciphers library
Word encrypted message is configured with face data information gathered in advance in described facial data library, configures in the fingerprint database
There is finger print data information gathered in advance, is configured with sonic data information gathered in advance in the acoustic control database.
As the preferred embodiment of the cryptographic system based on cryptography, the crypto terminal further includes that password is keyed in module, referred to
Line obtains module, expression acquisition module or sound acquisition module, and the password keys in module and the normal password unit or tight
Anxious password unit establishes a connection, and password keys in module and is used for user to crypto terminal input numerical ciphers information;The finger
Line obtain module establish a connection with the normal password unit or urgent password unit, fingerprint obtain module be used for user to
Crypto terminal inputs finger print data information;The expression acquisition module and the normal password unit or urgent password unit are established
Connection relationship, expression acquisition module input expression data information to crypto terminal for user;The sound acquisition module and institute
It states normal password unit or urgent password unit establishes a connection, sound acquisition module inputs table to crypto terminal for user
Feelings data information.
As the preferred embodiment of the cryptographic system based on cryptography, the information acquisition unit includes locating module, recording
Module or picture recording module, the crypto terminal position when locating module is used to obtain under emergency using crypto terminal are believed
Breath, the environmental voice information when recording module is used to obtain under emergency using crypto terminal, the picture recording module are used
Ambient image information when obtaining under emergency using crypto terminal.
The embodiment of the present invention also provides a kind of cipher control method based on cryptography, and the cipher control method is using upper
The crypto terminal stated realized by above-mentioned cryptographic system, the cipher control method the following steps are included:
To two or more in crypto terminal configuration numerical ciphers library, facial database, fingerprint database or acoustic control database
It is a, and corresponding numerical ciphers library configuration password keys in module, the corresponding surface data library configures expression acquisition module, corresponding fingerprint number
Module is obtained according to library configuration fingerprint, corresponding acoustic control database configures sound acquisition module;
Invocation pattern presetting module matches numerical ciphers, face data, finger print data or the one or more of acoustic control data
It sets in normal password unit, the pin mode for being not configured as normal cipher mode is configured in urgent password unit;
Recalls information determination module determines that encrypted message type when user uses crypto terminal is located at normal password unit
Or in urgent password unit, determine that crypto terminal is used in normal condition or emergency;
When use when crypto terminal is judged as normal condition, normal information feedback module is called to send to crypto terminal
Normal Feedback information when the use when crypto terminal is judged as emergency, calls normal information feedback module to password end
End sends Normal Feedback information, while emergence message feedback module being called to send urgent feedback information to information receiving terminal.
As the preferred embodiment of the cipher control method based on cryptography, when the use of crypto terminal is judged as urgent shape
When condition, the emergence message for calling wireless transmission unit that the additional information that information acquisition unit acquires is transferred to cipher server is anti-
Present module;Crypto terminal location information when locating module being called to obtain using crypto terminal, or recording module acquisition is called to make
Environmental voice information when with crypto terminal, or picture recording module is called to obtain ambient image information when using crypto terminal.
As the preferred embodiment of the cipher control method based on cryptography, by the crypto terminal location information, ambient sound
The urgent feedback information of message breath or ambient image information as emergence message feedback module.
The embodiment of the present invention, which has the advantages that, carries out normal condition and emergency by the password that uses terminal
It distinguishes, carrys out using terminal equipment when user meets with the pin mode being able to use under emergency when unlawful infringement, and at the same time
It is able to carry out the acquisition of use environment information and timely carries out emergence message feedback, be not easy to be found by criminal, make user
It can timely be succoured, protect the person used and property safety to the greatest extent.
Detailed description of the invention
Fig. 1 is the crypto terminal schematic diagram provided in an embodiment of the present invention based on cryptography;
Fig. 2 is the cryptographic system schematic diagram provided in an embodiment of the present invention based on cryptography;
Fig. 3 is the cipher control method schematic diagram provided in an embodiment of the present invention based on cryptography.
Specific embodiment
The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention..
What is used in the embodiment of the present invention carries out terminal by numerical ciphers, face data, finger print data or acoustic control data
Equipment uses existing algorithm using related algorithm.It is released using numerical ciphers, face data, finger print data or acoustic control data
Restriction is technological means well-known to those skilled in the art, such as Tong Weiming, and Zhang Xidong, Li Zhongwei, woods scape wave is based on oval bent
Data concentrator communication message mixed cipher algorithm [J] Automation of Electric Systems of line password, 2014,38 (04): 86-91;Wu
Poplar, Wang Tao, Xing Meng, block cipher identifying schemes [J] of the lijin east based on ciphertext randomness metrics Distribution value feature are logical
Believe journal, 2015,36 (04): 150-159;The status and developmental research [J] computer application of Qin Zhi light cryptographic algorithm, 2004
(02): the technical information disclosed in 1-4.
For another example method of password authentication and password based on fingerprint disclosed in the Chinese patent of Publication No. CN105069332A
Verify device;It is a kind of disclosed in the Chinese patent of Publication No. CN105577681A to utilize fingerprint, face, eyeball identification progress
The method of people's information filling.
Referring to Fig. 1, the crypto terminal based on cryptography, the crypto terminal includes normal password unit 1, urgent password list
Member 2, information acquisition unit 3, mode presetting module 4 and wireless transmission unit 16, normal password unit 1 are close by obtaining number
Code, face data, finger print data or acoustic control data one or more modes carry out the control of the crypto terminal under normal condition;Just
The normal condition of normal password unit 1 refers to passing through password using terminal equipment in the case that user is not on the hazard.
Urgent password unit 2 is by obtaining the one or more of numerical ciphers, face data, finger print data or acoustic control data
Mode carries out the control of the crypto terminal under emergency;Emergency refers to that user is faced with the situation of threat, such as by not
Molecule stress is withdrawn the money, paid or is transferred accounts in accordance with the law.
Information acquisition unit 3 includes locating module 5, recording module 6 or picture recording module 7, and the locating module 5 is for obtaining
Crypto terminal location information when crypto terminal is used under emergency, the recording module 6 makes under emergency for obtaining
Environmental voice information when with crypto terminal, the ring when picture recording module 7 is used to obtain under emergency using crypto terminal
Border image information.Information acquisition unit 3 acquires specific additional information, when user is close by the number under urgent cipher mode
Code, face data, finger print data or acoustic control data one or more modes carry out additional information acquisition when controlling crypto terminal;
Mode presetting module 4, for one or more configurations of numerical ciphers, face data, finger print data or acoustic control data to be positive
Normal cipher mode or urgent cipher mode.
Crypto terminal is configured in numerical ciphers library 8, facial database 9, fingerprint database 10 or acoustic control database 11 two
It is a or multiple, it is configured with numerical ciphers information gathered in advance in the numerical ciphers library 8, is configured in described facial data library 9
There is face data information gathered in advance, finger print data information gathered in advance is configured in the fingerprint database 10, it is described
Sonic data information gathered in advance is configured in acoustic control database 11.Crypto terminal further includes that password keys in module 12, fingerprint
Module 13, expression acquisition module 14 or sound acquisition module 15 are obtained, the password keys in module 12 and the normal password list
Member 1 or urgent password unit 2 establish a connection, and password is keyed in module 12 and believed for user to crypto terminal input numerical ciphers
Breath;The fingerprint obtains module 13 and establishes a connection with the normal password unit 1 or urgent password unit 2, and fingerprint obtains
Module 13 inputs finger print data information to crypto terminal for user;The expression acquisition module 14 and the normal password unit
1 or urgent password unit 2 establish a connection, expression acquisition module 14 is for user to crypto terminal input expression data letter
Breath;The sound acquisition module 15 establishes a connection with the normal password unit 1 or urgent password unit 2, sound collection
Module 15 inputs expression data information to crypto terminal for user.
Referring to fig. 2, in addition the embodiment of the present invention provides a kind of cryptographic system based on cryptography, and the cryptographic system includes
Crypto terminal, cipher server and information receiving terminal 20, the crypto terminal include normal password unit 1, urgent password list
Member 2 and information acquisition unit 3;The cipher server includes information judging module 17, normal information feedback module 18 and urgent
Information feedback module 19;
The normal password unit 1 establishes a connection with the information judging module 17, and normal password unit 1 will be normal
The numerical ciphers of the crypto terminal obtained under situation, face data, finger print data or acoustic control data one or more information pass
Pass the information judging module 17;
The urgent password unit 2 establishes a connection with the information judging module 17, and urgent password unit 2 will be urgent
The numerical ciphers of the crypto terminal obtained under situation, face data, finger print data or acoustic control data one or more information pass
Pass the information judging module 17;
The information acquisition unit 3 establishes a connection with the emergence message feedback module 19, and information acquisition unit 3 exists
One or more modes that user passes through numerical ciphers under urgent cipher mode, face data, finger print data or acoustic control data
Additional information acquisition is carried out when controlling crypto terminal;
The information judging module 17 is for determining that encrypted message type of the user using crypto terminal when determines password end
End is used in normal condition or emergency;
The normal information feedback module 18 uses password using normal cipher mode or urgent cipher mode for user
Normal Feedback information is sent to crypto terminal when terminal;
The emergence message feedback module 19 is connect using when crypto terminal to information for user using urgent cipher mode
It receives terminal 20 and sends urgent feedback information.
In one embodiment of cryptographic system based on cryptography, the crypto terminal further includes mode presetting module 4, institute
Mode presetting module 4 is stated for one or more configurations of numerical ciphers, face data, finger print data or acoustic control data to be positive
Normal cipher mode or urgent cipher mode.Crypto terminal configured with numerical ciphers library 8, facial database 9, fingerprint database 10 or
It is two or more in acoustic control database 11, numerical ciphers information gathered in advance, the face are configured in the numerical ciphers library 8
It is configured with face data information gathered in advance in portion's database 9, is configured with finger gathered in advance in the fingerprint database 10
Line data information is configured with sonic data information gathered in advance in the acoustic control database 11.
In one embodiment of cryptographic system based on cryptography, the crypto terminal further include password key in module 12,
Fingerprint obtains module 13, expression acquisition module 14 or sound acquisition module 15, and the password keys in module 12 and described normally close
Code unit 1 or urgent password unit 2 establish a connection, and it is close to crypto terminal input number for user that password keys in module 12
Code information;The fingerprint obtains module 13 and establishes a connection with the normal password unit 1 or urgent password unit 2, fingerprint
It obtains module 13 and inputs finger print data information to crypto terminal for user;The expression acquisition module 14 and the normal password
Unit 1 or urgent password unit 2 establish a connection, and expression acquisition module 14 inputs expression data to crypto terminal for user
Information;The sound acquisition module 15 establishes a connection with the normal password unit 1 or urgent password unit 2, and sound is adopted
Collect module 15 and inputs expression data information to crypto terminal for user.
In one embodiment of cryptographic system based on cryptography, the information acquisition unit 3 includes locating module 5, record
Sound module 6 or picture recording module 7, the crypto terminal position when locating module 5 is used to obtain under emergency using crypto terminal
Confidence breath, the environmental voice information when recording module 6 is used to obtain under emergency using crypto terminal, the video recording mould
Ambient image information when block 7 is used to obtain under emergency using crypto terminal.
Referring to figure 1, figure 2 and figure 3, the embodiment of the present invention also provides a kind of cipher control method based on cryptography, described
Cipher control method uses above-mentioned crypto terminal, is realized by above-mentioned cryptographic system, the cipher control method include with
Lower step:
S1: in crypto terminal configuration numerical ciphers library 8, facial database 9, fingerprint database 10 or acoustic control database 11
It is two or more, and corresponding numerical ciphers library 8 configures password and keys in module 12, the corresponding surface data library 9 configures expression and acquires mould
Block 14, corresponding fingerprint database 10 configure fingerprint and obtain module, and corresponding acoustic control database 11 configures sound acquisition module 15;
S2: invocation pattern presetting module 4 is by one kind of numerical ciphers, face data, finger print data or acoustic control data or more
Kind is configured in normal password unit 1, and the pin mode for being not configured as normal cipher mode is configured to urgent password unit 2
In;
S3: recalls information determination module 17 determines that encrypted message type when user uses crypto terminal is located at normal password
In unit 1 or urgent password unit 2, determine that crypto terminal is used in normal condition or emergency;
S4: when the use when crypto terminal is judged as normal condition, call normal information feedback module 18 to password end
End sends Normal Feedback information, when the use when crypto terminal is judged as emergency, calls normal information feedback module 18
Normal Feedback information is sent to crypto terminal, while emergence message feedback module 19 being called to send promptly to information receiving terminal 20
Feedback information.
In one embodiment of cipher control method based on cryptography, when the use of crypto terminal is judged as urgent shape
When condition, locating module 5 is called to obtain crypto terminal location information when using crypto terminal, or the acquisition of recording module 6 is called to make
Environmental voice information when with crypto terminal, or picture recording module 7 is called to obtain ambient image information when using crypto terminal.It obtains
Crypto terminal location information, environmental voice information or the ambient image information taken is as the urgent anti-of emergence message feedback module 19
Feedforward information is fed back to information receiving terminal 20, and information receiving terminal 20 is held by the household of user, friend or specific mechanism
Have, timely the emergence message received is judged, so that it is determined that whether user faces the emergencies such as threat, when necessary
Public security organ is timely contacted, guarantees the personal safety as well as the property safety of user to the greatest extent.
Although above having used general explanation and specific embodiment, the present invention is described in detail, at this
On the basis of invention, it can be made some modifications or improvements, this will be apparent to those skilled in the art.Therefore,
These modifications or improvements without departing from theon the basis of the spirit of the present invention are fallen within the scope of the claimed invention.
Claims (10)
1. the crypto terminal based on cryptography, which is characterized in that the crypto terminal includes:
Normal password unit (1), by obtaining the one or more of numerical ciphers, face data, finger print data or acoustic control data
Mode carries out the control of the crypto terminal under normal condition;
Urgent password unit (2), by obtaining the one or more of numerical ciphers, face data, finger print data or acoustic control data
Mode carries out the control of the crypto terminal under emergency;
Information acquisition unit (3), for acquiring specific additional information, when user is close by the number under urgent cipher mode
Code, face data, finger print data or acoustic control data one or more modes carry out additional information acquisition when controlling crypto terminal;
Mode presetting module (4), for matching numerical ciphers, face data, finger print data or the one or more of acoustic control data
It is set to normal cipher mode or urgent cipher mode;
Wireless transmission unit (16), the additional information for acquiring information acquisition unit (3) carry out wireless data transmission;
The crypto terminal is configured with numerical ciphers library (8), facial database (9), fingerprint database (10) or acoustic control database
(11) two or more in, numerical ciphers information gathered in advance, described facial data are configured in the numerical ciphers library (8)
It is configured with face data information gathered in advance in library (9), is configured with fingerprint gathered in advance in the fingerprint database (10)
Data information is configured with sonic data information gathered in advance in the acoustic control database (11).
2. the crypto terminal according to claim 1 based on cryptography, which is characterized in that the crypto terminal further includes close
Code key enters module (12), fingerprint obtains module (13), expression acquisition module (14) or sound acquisition module (15), the cryptographic key
Enter module (12) to establish a connection with the normal password unit (1) or urgent password unit (2), password keys in module (12)
For user to crypto terminal input numerical ciphers information;The fingerprint obtains module (13) and the normal password unit (1)
Or urgent password unit (2) establishes a connection, fingerprint obtains module (13) and inputs finger print data to crypto terminal for user
Information;The expression acquisition module (14) establishes a connection with the normal password unit (1) or urgent password unit (2),
Expression acquisition module (14) inputs expression data information to crypto terminal for user;The sound acquisition module (15) with it is described
Normal password unit (1) or urgent password unit (2) establish a connection, and sound acquisition module (15) is whole to password for user
End input expression data information.
3. the crypto terminal according to claim 1 based on cryptography, which is characterized in that the information acquisition unit (3)
Including locating module (5), recording module (6) or picture recording module (7), the locating module (5) makes under emergency for obtaining
Crypto terminal location information when with crypto terminal, the recording module (6) use crypto terminal for obtaining under emergency
When environmental voice information, the picture recording module (7) is used for ambient image when obtaining under emergency using crypto terminal and believes
Breath.
4. the cryptographic system based on cryptography, which is characterized in that the cryptographic system includes crypto terminal, cipher server and letter
Breath receives terminal (20), and the crypto terminal includes normal password unit (1), urgent password unit (2), information acquisition unit
(3) and wireless transmission unit (16);The cipher server includes information judging module (17), normal information feedback module (18)
With emergence message feedback module (19);
The normal password unit (1) establishes a connection with the information judging module (17), and normal password unit (1) will just
The numerical ciphers of the crypto terminal obtained under normal situation, face data, finger print data or acoustic control data one or more information
Pass to the information judging module (17);
The urgent password unit (2) establishes a connection with the information judging module (17), and urgent password unit (2) will be tight
The numerical ciphers of the crypto terminal obtained under anxious situation, face data, finger print data or acoustic control data one or more information
Pass to the information judging module (17);
The information acquisition unit (3) establishes a connection with the emergence message feedback module (19), information acquisition unit (3)
Pass through one or more sides of numerical ciphers under urgent cipher mode, face data, finger print data or acoustic control data in user
Formula carries out additional information acquisition when controlling crypto terminal;
The wireless transmission unit (16) and the emergence message feedback module (19) or information receiving terminal (20) establish connection
The additional information that information acquisition unit (3) acquires is transferred to the urgent letter of cipher server by relationship, wireless transmission unit (16)
It ceases feedback module (19);
The information judging module (17) is for determining that encrypted message type of the user using crypto terminal when determines crypto terminal
It is used in normal condition or emergency;
The normal information feedback module (18) is whole using password using normal cipher mode or urgent cipher mode for user
Normal Feedback information is sent to crypto terminal when end;
It is received when the emergence message feedback module (19) uses crypto terminal using urgent cipher mode for user to information
Terminal (20) sends urgent feedback information.
5. the cryptographic system according to claim 4 based on cryptography, which is characterized in that the crypto terminal further includes mould
Formula presetting module (4), the mode presetting module (4) are used for numerical ciphers, face data, finger print data or acoustic control data
It is one or more to be configured to normal cipher mode or urgent cipher mode.
6. the cryptographic system according to claim 4 based on cryptography, which is characterized in that the crypto terminal is configured with number
Two or more, the number in word cryptographic libraries (8), facial database (9), fingerprint database (10) or acoustic control database (11)
It is configured with numerical ciphers information gathered in advance in cryptographic libraries (8), face gathered in advance is configured in described facial data library (9)
Portion's data information is configured with finger print data information gathered in advance, the acoustic control database in the fingerprint database (10)
(11) sonic data information gathered in advance is configured in.
7. the cryptographic system according to claim 4 based on cryptography, which is characterized in that the crypto terminal further includes close
Code key enters module (12), fingerprint obtains module (13), expression acquisition module (14) or sound acquisition module (15), the cryptographic key
Enter module (12) to establish a connection with the normal password unit (1) or urgent password unit (2), password keys in module (12)
For user to crypto terminal input numerical ciphers information;The fingerprint obtains module (13) and the normal password unit (1)
Or urgent password unit (2) establishes a connection, fingerprint obtains module (13) and inputs finger print data to crypto terminal for user
Information;The expression acquisition module (14) establishes a connection with the normal password unit (1) or urgent password unit (2),
Expression acquisition module (14) inputs expression data information to crypto terminal for user;The sound acquisition module (15) with it is described
Normal password unit (1) or urgent password unit (2) establish a connection, and sound acquisition module (15) is whole to password for user
End input expression data information.
8. the cryptographic system according to claim 4 based on cryptography, which is characterized in that the information acquisition unit (3)
Including locating module (5), recording module (6) or picture recording module (7), the locating module (5) makes under emergency for obtaining
Crypto terminal location information when with crypto terminal, the recording module (6) use crypto terminal for obtaining under emergency
When environmental voice information, the picture recording module (7) is used for ambient image when obtaining under emergency using crypto terminal and believes
Breath.
9. the cipher control method based on cryptography, the cipher control method is used as described in claims 1 to 3 any one
Crypto terminal, realized by cryptographic system as described in claim 4 to 8 any one, which is characterized in that the password control
Method processed the following steps are included:
To crypto terminal configuration numerical ciphers library (8), facial database (9), fingerprint database (10) or acoustic control database (11)
In it is two or more, and corresponding numerical ciphers library (8) configuration password keys in module (12), the corresponding surface data library (9) allocation list
Feelings acquisition module (14), corresponding fingerprint database (10) configuration fingerprint obtain module, and corresponding acoustic control database (11) configure sound
Acquisition module (15);
Invocation pattern presetting module (4) is by one or more configurations of numerical ciphers, face data, finger print data or acoustic control data
To in normal password unit (1), the pin mode for being not configured as normal cipher mode is configured to urgent password unit (2)
In;
Recalls information determination module (17) determines that encrypted message type when user uses crypto terminal is located at normal password unit
(1) or in urgent password unit (2), determine that crypto terminal is used in normal condition or emergency;
When use when crypto terminal is judged as normal condition, normal information feedback module (18) is called to send to crypto terminal
Normal Feedback information when the use when crypto terminal is judged as emergency, calls normal information feedback module (18) to close
Code terminal sends Normal Feedback information, while it is urgent to call emergence message feedback module (19) to send to information receiving terminal (20)
Feedback information.
10. the cipher control method according to claim 9 based on cryptography, which is characterized in that when making for crypto terminal
When with being judged as emergency, the additional information for calling wireless transmission unit (16) to acquire information acquisition unit (3) is transmitted
To the emergence message feedback module (19) of cipher server;Password when locating module (5) being called to obtain using crypto terminal is whole
End position information, or call recording module (6) to obtain environmental voice information when using crypto terminal, or call picture recording module
(7) ambient image information when obtaining using crypto terminal;
Using the crypto terminal location information, environmental voice information or ambient image information as emergence message feedback module (19)
Urgent feedback information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811028189.XA CN109299589A (en) | 2018-09-04 | 2018-09-04 | Crypto terminal, system and control method based on cryptography |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811028189.XA CN109299589A (en) | 2018-09-04 | 2018-09-04 | Crypto terminal, system and control method based on cryptography |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109299589A true CN109299589A (en) | 2019-02-01 |
Family
ID=65166359
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811028189.XA Pending CN109299589A (en) | 2018-09-04 | 2018-09-04 | Crypto terminal, system and control method based on cryptography |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109299589A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1612518A (en) * | 2003-10-31 | 2005-05-04 | 三星电子株式会社 | User authentication system and method for controlling same |
CN101965281A (en) * | 2008-05-15 | 2011-02-02 | 三菱重工业株式会社 | Vehicle for cargo handling |
CN103455737A (en) * | 2012-05-28 | 2013-12-18 | 百度在线网络技术(北京)有限公司 | User information protection method and device |
CN104766393A (en) * | 2014-01-06 | 2015-07-08 | 叶志锋 | Intelligent access control system |
US9953158B1 (en) * | 2015-04-21 | 2018-04-24 | Symantec Corporation | Systems and methods for enforcing secure software execution |
CN107992739A (en) * | 2017-11-30 | 2018-05-04 | 北京旷视科技有限公司 | User authentication method, apparatus and system |
-
2018
- 2018-09-04 CN CN201811028189.XA patent/CN109299589A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1612518A (en) * | 2003-10-31 | 2005-05-04 | 三星电子株式会社 | User authentication system and method for controlling same |
CN101965281A (en) * | 2008-05-15 | 2011-02-02 | 三菱重工业株式会社 | Vehicle for cargo handling |
CN103455737A (en) * | 2012-05-28 | 2013-12-18 | 百度在线网络技术(北京)有限公司 | User information protection method and device |
CN104766393A (en) * | 2014-01-06 | 2015-07-08 | 叶志锋 | Intelligent access control system |
US9953158B1 (en) * | 2015-04-21 | 2018-04-24 | Symantec Corporation | Systems and methods for enforcing secure software execution |
CN107992739A (en) * | 2017-11-30 | 2018-05-04 | 北京旷视科技有限公司 | User authentication method, apparatus and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10681025B2 (en) | Systems and methods for securely managing biometric data | |
US9531710B2 (en) | Behavioral authentication system using a biometric fingerprint sensor and user behavior for authentication | |
US20160378961A1 (en) | Security system, apparatus and method using additional code | |
CN100500091C (en) | Identity recognition system and method based on intelligent physical characteristics collecting and processing terminal | |
CN109600519B (en) | Mobile phone control method and system | |
US20150082390A1 (en) | Method and a system for secure login to a computer, computer network, and computer website using biometrics and a mobile computing wireless electronic communication device | |
JP2017504137A (en) | Management authority unlocking method, authentication device, program, and recording medium | |
CN105260669B (en) | The transmission method and Transmission system of photo | |
CN104967511A (en) | Processing method for enciphered data, and apparatus thereof | |
CN109409057A (en) | Security system and its control method, control device and storage medium | |
CN207938065U (en) | A kind of offline entrance guard device based on Quick Response Code, three-dimension code identification technology | |
CN105281907A (en) | Encrypted data processing method and apparatus | |
CN102156826A (en) | Provider management method and system | |
JP2009211381A (en) | User authentication system, user authentication method and user authentication program | |
CN106161481B (en) | A kind of device of mobile terminal physical button isolation safe module prevention security risk | |
CN107431714B (en) | Control is via user equipment to the access of resource function at the control point of resource | |
CN109299589A (en) | Crypto terminal, system and control method based on cryptography | |
KR101996217B1 (en) | The self automatic register for registering Bio-signal | |
CN110363892A (en) | The protection system and method for intelligent fingerprint lock | |
Clarke et al. | A composite user authentication architecture for mobile devices | |
KR20150102668A (en) | Security system, apparatus, and method using add-on code | |
CN109493493A (en) | A kind of safety intelligent type hotel door access control system and method based on NFC | |
WO2022270114A1 (en) | Method for preventing unauthorized access to information device or communication device | |
CN109086614A (en) | It is a kind of that the method and system of data are safely provided | |
CN213518502U (en) | Financial data processing and transaction terminal equipment based on internet of things technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190201 |