CN110309639A - A kind of secrecy system based on Library management - Google Patents
A kind of secrecy system based on Library management Download PDFInfo
- Publication number
- CN110309639A CN110309639A CN201910572025.1A CN201910572025A CN110309639A CN 110309639 A CN110309639 A CN 110309639A CN 201910572025 A CN201910572025 A CN 201910572025A CN 110309639 A CN110309639 A CN 110309639A
- Authority
- CN
- China
- Prior art keywords
- module
- data
- electrically connected
- system based
- secrecy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012545 processing Methods 0.000 claims abstract description 4
- 230000001755 vocal effect Effects 0.000 claims abstract description 4
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 238000000034 method Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013332 literature search Methods 0.000 description 1
- 239000012925 reference material Substances 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to information privacy technical fields, especially a kind of secrecy system based on Library management, including processor, processor is electrically connected with information acquisition module, processor is also electrically connected with memory, security module, data encryption module and data access interface module, data access interface module is electrically connected with authority recognition module, authority recognition module network connects input terminal module, security module includes single-chip microcontroller, single-chip microcontroller is electrically connected with database, single-chip microcontroller is also electrically connected with recording module, crypto module, removing module, unlocked state and contrast module, contrast module includes vocal print module and digital contrast module, after data encryption, secrecy processing is carried out to file, pass through speech cipher and numerical ciphers duplicate protection, when reading data, it needs to input speech cipher and numerical ciphers simultaneously, When two kinds of passwords are correct simultaneously, unlocked state opens the privacy lock on file.The configuration of the present invention is simple is worthy to be popularized.
Description
Technical field
The present invention relates to information privacy technical field more particularly to a kind of secrecy systems based on Library management.
Background technique
Library science is research and development document information content, and how main study grasps books and reference materials and information
Collection, classification, cataloguing, circulation, reference consultation, literature search, information service etc. knowledge and skills.Library Information Science is made
For the combination of the two, higher level's subject for both being both while the characteristics of cover two subjects, the as collection of data or information,
It arranges, classify and analyzes, the safety of information is particularly important.
Industry has very deep understanding to the importance of information security, takes a large amount of active and effective measures, but all partially
The protection for overweighting network and operating system, it is that the information implementation in database is directly protected and few.Existing data confidentiality
Mode is simple, and data is easy to cause to be stolen.
Summary of the invention
The purpose of the present invention is to solve a kind of bases for existing in the prior art the simple disadvantage of secure fashion, and proposing
In the secrecy system of Library management.
To achieve the goals above, present invention employs following technical solutions:
A kind of secrecy system based on Library management, including processor are designed, the processor is electrically connected with information and adopts
Collecting module, the processor is also electrically connected with memory, security module, data encryption module and data access interface module,
The data access interface module is electrically connected with authority recognition module, and the authority recognition module network is connected with input terminal
Module, forms network channel between the authority recognition module and the input terminal module, the security module includes monolithic
Machine, the single-chip microcontroller are electrically connected with database, and the single-chip microcontroller is also electrically connected with recording module, crypto module, Xie Suomo
Block and contrast module, the contrast module includes vocal print module and digital contrast module, after data encryption, is carried out to file
Secrecy processing needs to input speech cipher sum number simultaneously by speech cipher and numerical ciphers duplicate protection when reading data
Word password, when two kinds of passwords are correct simultaneously, unlocked state opens the privacy lock on file.
Preferably, the contrast module further includes sound wire module, and the sound ray module is the sound in the voice to input
Line is analyzed, then is compared with the sound ray stored in memory, and identical sound ray is voice of the same race, and sound ray module is to defeated
The voice entered is judged.
Preferably, the single-chip microcontroller is electrically connected with removing module, and the removing module is the password and voice to input
It is deleted, after file opening, removing module removes the password and voice of input automatically, effective to improve number in file
According to safety.
Preferably, the processor is electrically connected with data decryption module, and the data decryption module is by the data of encryption
Normal data are converted into, the data decryption module is translated encrypted symbols by cipher leaf one by one.
Preferably, the network channel is that input terminal module issues connection signal, connection signal and data access interface
Module is attached, in connection signal with connection key, with network connection port in data access interface module in company
When connecing cipher key match, between input terminal and data access interface module establish network connection channel, carry out information transmitting and
Data information is downloaded.
Preferably, multiple network connection ports, each connectivity port are provided in the data access interface module
It is inside provided with network connection key, the network connection key is all different, and the connection weight of different network connection keys
Limit is all different, and different network connection key setting limitations is determined by the capacity of water that data are extracted.
Preferably, the processor is electrically connected with administrative unit, and the administrative unit, which is electrically connected with, logins module, pipe
Reason personnel enter administrative unit by logining module, need specifically to login password when logining, and the validity period of password is a star
Phase, a week replace password automatically, login the safety that cipher change effectively raises system, and administrative staff are single by management
Member is encrypted and is maintained secrecy to the data in system operation, the data in protection system.
Preferably, the data encryption module includes microprocessor, and the microprocessor is electrically connected with memory module, whole
Reason module and code module, the code module are electrically connected with coding module, and sorting module arranges the data of input,
Extra and useless information is removed, after finish message receives, microprocessor passes through coding by message code page in code module
Module carries out coding encrypting to data and is encrypted data information one by one according to the code on code page.
A kind of secrecy system based on Library management proposed by the present invention, beneficial effect are:
1, by recording module and crypto module, double code protection improves the safety of information, after input password is correct,
File is opened, information is obtained.
2, by encrypting to information, the safety of information is further increased.
Detailed description of the invention
Fig. 1 is a kind of system block diagram of the secrecy system based on Library management proposed by the present invention;
Fig. 2 is the system block diagram of data encryption in the present invention;
Fig. 3 is the system block diagram of security module in the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.
Referring to Fig.1-3, a kind of secrecy system based on Library management, including processor, processor are electrically connected with
Information acquisition module, information acquisition module are to input voice and password figure, opened file folder, place when decrypting to file
Reason device is also electrically connected with memory, security module, data encryption module and data access interface module, and security module includes single
Piece machine, single-chip microcontroller are electrically connected with database, and single-chip microcontroller is also electrically connected with recording module, crypto module, unlocked state and right
Than module, recording module is to input voice in opened file folder, is unlocked for file, and the effect of crypto module is to open text
Part inputs password when pressing from both sides, double code protection improves the safety of information, and the effect of unlocked state is correct in input password
Afterwards, file is opened, information is obtained.
Contrast module includes vocal print module and digital contrast module, and contrast module further includes sound wire module, sound ray module
It is that sound ray in the voice to input is analyzed, then is compared with the sound ray stored in memory, identical sound ray is same
Kind voice, sound ray module is judged the voice of input, after data encryption, is carried out secrecy processing to file, is passed through
Speech cipher and numerical ciphers duplicate protection need to input speech cipher and numerical ciphers simultaneously, at two kinds when reading data
When password is correct simultaneously, unlocked state opens the privacy lock on file.
Single-chip microcontroller is electrically connected with removing module, and removing module is deleted the password and voice of input, in file
After folder is opened, removing module removes the password and voice of input automatically, the effective safety for improving data in file.
Data encryption module includes microprocessor, and microprocessor is electrically connected with memory module, sorting module and code mould
Block, code module are electrically connected with coding module, and sorting module arranges the data of input, remove extra and useless letter
Breath, coding module is to translate the information into code, and after protecting information security, finish message to receive, microprocessor passes through code mould
Message code page in block carries out coding encrypting to data by coding module, according to the code on code page, by data information by
It is a to be encrypted.
Processor is electrically connected with data decryption module, and the data of encryption are converted normal number by data decryption module
According to data decryption module is translated encrypted symbols by cipher leaf one by one, and processor is electrically connected with administrative unit, management
Unit, which is electrically connected with, logins module, and administrative staff enter administrative unit by logining module, needs specifically to step on when logining
Enter password, the validity period of password is a week, replaces password automatically in a week, logins cipher change and effectively raise system
Safety, administrative staff are encrypted and are maintained secrecy to the data in system operation by administrative unit, the data in protection system,
Multiple network connection ports are provided in data access interface module, network connection port is connect with external input terminal, each
Network connection key is provided in connectivity port, network connection key is all different, and the company of different network connection keys
It connects permission to be all different, different network connection key setting limitations is determined by the capacity of water that data are extracted.
Data access interface module is electrically connected with authority recognition module, and authority recognition module is the signal to input terminal
Identification authorization is carried out, allows to connect, authority recognition module network is connected with input terminal module, and authority recognition module and input are eventually
Network channel is formed between end module, network channel is that input terminal module issues connection signal, connection signal and data access
Interface module is attached, in connection signal with connection key, with network connection port in data access interface module in
Connection cipher key match when, between input terminal and data access interface module establish network connection channel, carry out the biography of information
It passs and data information is downloaded.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its
Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.
Claims (8)
1. a kind of secrecy system based on Library management, including processor, which is characterized in that the processor is electrically connected
There is information acquisition module, the processor is also electrically connected with memory, security module, data encryption module and data access and connects
Mouth mold block, the data access interface module are electrically connected with authority recognition module, and the authority recognition module network is connected with
Input terminal module forms network channel, the security module between the authority recognition module and the input terminal module
Including single-chip microcontroller, the single-chip microcontroller is electrically connected with database, and the single-chip microcontroller is also electrically connected with recording module, password mould
Block, unlocked state and contrast module, the contrast module include vocal print module and digital contrast module, right after data encryption
File carries out secrecy processing, needs to input language simultaneously when reading data by speech cipher and numerical ciphers duplicate protection
Sound password and numerical ciphers, when two kinds of passwords are correct simultaneously, unlocked state opens the privacy lock on file.
2. a kind of secrecy system based on Library management according to claim 1, which is characterized in that the comparison mould
Block further includes sound wire module, and the sound ray module is that the sound ray in the voice to input is analyzed, then with memory memory
The sound ray of storage is compared, and identical sound ray is voice of the same race, and sound ray module is judged the voice of input.
3. a kind of secrecy system based on Library management according to claim 1, which is characterized in that the single-chip microcontroller
It is electrically connected with removing module, the removing module is deleted the password and voice of input, after file opening, is deleted
Except module removes the password and voice of input automatically, the effective safety for improving data in file.
4. a kind of secrecy system based on Library management according to claim 1, which is characterized in that the processor
It is electrically connected with data decryption module, the data of encryption are converted normal data, the data by the data decryption module
Deciphering module is translated encrypted symbols by cipher leaf one by one.
5. a kind of secrecy system based on Library management according to claim 1, which is characterized in that the network is logical
Road is that input terminal module issues connection signal, and connection signal is attached with data access interface module, band in connection signal
Have connection key, with network connection port in data access interface module in connection cipher key match when, input terminal and number
According to network connection channel is established between access interface module, carries out the transmitting of information and data information is downloaded.
6. a kind of secrecy system based on Library management according to claim 1, which is characterized in that the data are visited
It asks and is provided with multiple network connection ports in interface module, network connection key, institute are provided in each connectivity port
It states network connection key to be all different, and the connection permission of different network connection keys is all different, different network connections
Key setting limitation is determined by the capacity of water that data are extracted.
7. a kind of secrecy system based on Library management according to claim 1, which is characterized in that the processor
It is electrically connected with administrative unit, the administrative unit, which is electrically connected with, logins module, and administrative staff enter pipe by logining module
Unit is managed, needs specifically to login password when logining, the validity period of password is a week, a week replaces password automatically, steps on
Enter the safety that cipher change effectively raises system, administrative staff encrypt the data in system by administrative unit
It is operated with secrecy, the data in protection system.
8. a kind of secrecy system based on Library management according to claim 1, which is characterized in that the data add
Close module includes microprocessor, and the microprocessor is electrically connected with memory module, sorting module and code module, the code
Module is electrically connected with coding module, and sorting module arranges the data of input, removes extra and useless information, information
It arranges after receiving, microprocessor carries out coding encrypting, root to data by message code page in code module, by coding module
According to the code on code page, data information is encrypted one by one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910572025.1A CN110309639A (en) | 2019-06-28 | 2019-06-28 | A kind of secrecy system based on Library management |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910572025.1A CN110309639A (en) | 2019-06-28 | 2019-06-28 | A kind of secrecy system based on Library management |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110309639A true CN110309639A (en) | 2019-10-08 |
Family
ID=68078340
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910572025.1A Pending CN110309639A (en) | 2019-06-28 | 2019-06-28 | A kind of secrecy system based on Library management |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110309639A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104517066A (en) * | 2014-12-16 | 2015-04-15 | 上海师范大学 | Folder encrypting method |
CN105160261A (en) * | 2015-04-30 | 2015-12-16 | 北京车音网科技有限公司 | File encryption and decryption method and device |
CN105162757A (en) * | 2015-07-03 | 2015-12-16 | 成都怡云科技有限公司 | External network log-in method for multi-authentication government virtual office platform |
CN105635097A (en) * | 2015-06-29 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Wi-Fi connection method, terminal, Wi-Fi device, Wi-Fi connection control method and server |
CN107071772A (en) * | 2016-07-29 | 2017-08-18 | 腾讯科技(深圳)有限公司 | WLAN connection method and mobile terminal |
CN107169374A (en) * | 2017-05-11 | 2017-09-15 | 四川长虹电器股份有限公司 | Encryption and decryption system and method based on vocal print and speech recognition technology |
-
2019
- 2019-06-28 CN CN201910572025.1A patent/CN110309639A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104517066A (en) * | 2014-12-16 | 2015-04-15 | 上海师范大学 | Folder encrypting method |
CN105160261A (en) * | 2015-04-30 | 2015-12-16 | 北京车音网科技有限公司 | File encryption and decryption method and device |
CN105635097A (en) * | 2015-06-29 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Wi-Fi connection method, terminal, Wi-Fi device, Wi-Fi connection control method and server |
CN105162757A (en) * | 2015-07-03 | 2015-12-16 | 成都怡云科技有限公司 | External network log-in method for multi-authentication government virtual office platform |
CN107071772A (en) * | 2016-07-29 | 2017-08-18 | 腾讯科技(深圳)有限公司 | WLAN connection method and mobile terminal |
CN107169374A (en) * | 2017-05-11 | 2017-09-15 | 四川长虹电器股份有限公司 | Encryption and decryption system and method based on vocal print and speech recognition technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107169374B (en) | Encryption and decryption system and method based on voiceprint and voice recognition technology | |
WO2017215504A1 (en) | Identity recognition and social information recording method and system based on biological information | |
CN109145540B (en) | Intelligent terminal identity authentication method and device based on block chain | |
US6845453B2 (en) | Multiple factor-based user identification and authentication | |
CN101350724B (en) | Encrypting method base on biology characteristic information | |
CN108600213B (en) | Composite identity authentication method and composite identity authentication system applying same | |
KR20140054118A (en) | Identity authentication device and method thereof | |
JP5305289B2 (en) | User authentication method, user authentication system, user terminal, user authentication device, user terminal program, and user authentication device program | |
US20200272759A1 (en) | Systems and methods for secure high speed data generation and access | |
CN117951746B (en) | Medical data encryption system for multi-mode large language model | |
CN106921489B (en) | Data encryption method and device | |
US20070106903A1 (en) | Multiple Factor-Based User Identification and Authentication | |
CN111698253A (en) | Computer network safety system | |
CN108667801A (en) | A kind of Internet of Things access identity safety certifying method and system | |
WO2015196642A1 (en) | Data encryption method, decryption method and device | |
CN110309639A (en) | A kind of secrecy system based on Library management | |
CN114697043B (en) | Identity authentication unified management platform based on blockchain technology and authentication method thereof | |
Butt et al. | Towards e-passport duplicate enrollment check in the European Union | |
CN112507355B (en) | Personal health data storage system based on block chain | |
JP2900869B2 (en) | Database search system and database protection method | |
CN106682531A (en) | Method for confidential data encryption based on biological information authorization | |
KR101624394B1 (en) | Device for authenticating password and operating method thereof | |
JP2003134107A (en) | System, method and program for individual authentication | |
CN205540742U (en) | Multi -functional electronic fingerprint and integration machine of punching card | |
CN110335373A (en) | Intelligent door lock and intelligent access control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191008 |