CN110309639A - A kind of secrecy system based on Library management - Google Patents

A kind of secrecy system based on Library management Download PDF

Info

Publication number
CN110309639A
CN110309639A CN201910572025.1A CN201910572025A CN110309639A CN 110309639 A CN110309639 A CN 110309639A CN 201910572025 A CN201910572025 A CN 201910572025A CN 110309639 A CN110309639 A CN 110309639A
Authority
CN
China
Prior art keywords
module
data
electrically connected
system based
secrecy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910572025.1A
Other languages
Chinese (zh)
Inventor
丰玮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wenzhou Polytechnic
Original Assignee
Wenzhou Polytechnic
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wenzhou Polytechnic filed Critical Wenzhou Polytechnic
Priority to CN201910572025.1A priority Critical patent/CN110309639A/en
Publication of CN110309639A publication Critical patent/CN110309639A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to information privacy technical fields, especially a kind of secrecy system based on Library management, including processor, processor is electrically connected with information acquisition module, processor is also electrically connected with memory, security module, data encryption module and data access interface module, data access interface module is electrically connected with authority recognition module, authority recognition module network connects input terminal module, security module includes single-chip microcontroller, single-chip microcontroller is electrically connected with database, single-chip microcontroller is also electrically connected with recording module, crypto module, removing module, unlocked state and contrast module, contrast module includes vocal print module and digital contrast module, after data encryption, secrecy processing is carried out to file, pass through speech cipher and numerical ciphers duplicate protection, when reading data, it needs to input speech cipher and numerical ciphers simultaneously, When two kinds of passwords are correct simultaneously, unlocked state opens the privacy lock on file.The configuration of the present invention is simple is worthy to be popularized.

Description

A kind of secrecy system based on Library management
Technical field
The present invention relates to information privacy technical field more particularly to a kind of secrecy systems based on Library management.
Background technique
Library science is research and development document information content, and how main study grasps books and reference materials and information Collection, classification, cataloguing, circulation, reference consultation, literature search, information service etc. knowledge and skills.Library Information Science is made For the combination of the two, higher level's subject for both being both while the characteristics of cover two subjects, the as collection of data or information, It arranges, classify and analyzes, the safety of information is particularly important.
Industry has very deep understanding to the importance of information security, takes a large amount of active and effective measures, but all partially The protection for overweighting network and operating system, it is that the information implementation in database is directly protected and few.Existing data confidentiality Mode is simple, and data is easy to cause to be stolen.
Summary of the invention
The purpose of the present invention is to solve a kind of bases for existing in the prior art the simple disadvantage of secure fashion, and proposing In the secrecy system of Library management.
To achieve the goals above, present invention employs following technical solutions:
A kind of secrecy system based on Library management, including processor are designed, the processor is electrically connected with information and adopts Collecting module, the processor is also electrically connected with memory, security module, data encryption module and data access interface module, The data access interface module is electrically connected with authority recognition module, and the authority recognition module network is connected with input terminal Module, forms network channel between the authority recognition module and the input terminal module, the security module includes monolithic Machine, the single-chip microcontroller are electrically connected with database, and the single-chip microcontroller is also electrically connected with recording module, crypto module, Xie Suomo Block and contrast module, the contrast module includes vocal print module and digital contrast module, after data encryption, is carried out to file Secrecy processing needs to input speech cipher sum number simultaneously by speech cipher and numerical ciphers duplicate protection when reading data Word password, when two kinds of passwords are correct simultaneously, unlocked state opens the privacy lock on file.
Preferably, the contrast module further includes sound wire module, and the sound ray module is the sound in the voice to input Line is analyzed, then is compared with the sound ray stored in memory, and identical sound ray is voice of the same race, and sound ray module is to defeated The voice entered is judged.
Preferably, the single-chip microcontroller is electrically connected with removing module, and the removing module is the password and voice to input It is deleted, after file opening, removing module removes the password and voice of input automatically, effective to improve number in file According to safety.
Preferably, the processor is electrically connected with data decryption module, and the data decryption module is by the data of encryption Normal data are converted into, the data decryption module is translated encrypted symbols by cipher leaf one by one.
Preferably, the network channel is that input terminal module issues connection signal, connection signal and data access interface Module is attached, in connection signal with connection key, with network connection port in data access interface module in company When connecing cipher key match, between input terminal and data access interface module establish network connection channel, carry out information transmitting and Data information is downloaded.
Preferably, multiple network connection ports, each connectivity port are provided in the data access interface module It is inside provided with network connection key, the network connection key is all different, and the connection weight of different network connection keys Limit is all different, and different network connection key setting limitations is determined by the capacity of water that data are extracted.
Preferably, the processor is electrically connected with administrative unit, and the administrative unit, which is electrically connected with, logins module, pipe Reason personnel enter administrative unit by logining module, need specifically to login password when logining, and the validity period of password is a star Phase, a week replace password automatically, login the safety that cipher change effectively raises system, and administrative staff are single by management Member is encrypted and is maintained secrecy to the data in system operation, the data in protection system.
Preferably, the data encryption module includes microprocessor, and the microprocessor is electrically connected with memory module, whole Reason module and code module, the code module are electrically connected with coding module, and sorting module arranges the data of input, Extra and useless information is removed, after finish message receives, microprocessor passes through coding by message code page in code module Module carries out coding encrypting to data and is encrypted data information one by one according to the code on code page.
A kind of secrecy system based on Library management proposed by the present invention, beneficial effect are:
1, by recording module and crypto module, double code protection improves the safety of information, after input password is correct, File is opened, information is obtained.
2, by encrypting to information, the safety of information is further increased.
Detailed description of the invention
Fig. 1 is a kind of system block diagram of the secrecy system based on Library management proposed by the present invention;
Fig. 2 is the system block diagram of data encryption in the present invention;
Fig. 3 is the system block diagram of security module in the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.
Referring to Fig.1-3, a kind of secrecy system based on Library management, including processor, processor are electrically connected with Information acquisition module, information acquisition module are to input voice and password figure, opened file folder, place when decrypting to file Reason device is also electrically connected with memory, security module, data encryption module and data access interface module, and security module includes single Piece machine, single-chip microcontroller are electrically connected with database, and single-chip microcontroller is also electrically connected with recording module, crypto module, unlocked state and right Than module, recording module is to input voice in opened file folder, is unlocked for file, and the effect of crypto module is to open text Part inputs password when pressing from both sides, double code protection improves the safety of information, and the effect of unlocked state is correct in input password Afterwards, file is opened, information is obtained.
Contrast module includes vocal print module and digital contrast module, and contrast module further includes sound wire module, sound ray module It is that sound ray in the voice to input is analyzed, then is compared with the sound ray stored in memory, identical sound ray is same Kind voice, sound ray module is judged the voice of input, after data encryption, is carried out secrecy processing to file, is passed through Speech cipher and numerical ciphers duplicate protection need to input speech cipher and numerical ciphers simultaneously, at two kinds when reading data When password is correct simultaneously, unlocked state opens the privacy lock on file.
Single-chip microcontroller is electrically connected with removing module, and removing module is deleted the password and voice of input, in file After folder is opened, removing module removes the password and voice of input automatically, the effective safety for improving data in file.
Data encryption module includes microprocessor, and microprocessor is electrically connected with memory module, sorting module and code mould Block, code module are electrically connected with coding module, and sorting module arranges the data of input, remove extra and useless letter Breath, coding module is to translate the information into code, and after protecting information security, finish message to receive, microprocessor passes through code mould Message code page in block carries out coding encrypting to data by coding module, according to the code on code page, by data information by It is a to be encrypted.
Processor is electrically connected with data decryption module, and the data of encryption are converted normal number by data decryption module According to data decryption module is translated encrypted symbols by cipher leaf one by one, and processor is electrically connected with administrative unit, management Unit, which is electrically connected with, logins module, and administrative staff enter administrative unit by logining module, needs specifically to step on when logining Enter password, the validity period of password is a week, replaces password automatically in a week, logins cipher change and effectively raise system Safety, administrative staff are encrypted and are maintained secrecy to the data in system operation by administrative unit, the data in protection system, Multiple network connection ports are provided in data access interface module, network connection port is connect with external input terminal, each Network connection key is provided in connectivity port, network connection key is all different, and the company of different network connection keys It connects permission to be all different, different network connection key setting limitations is determined by the capacity of water that data are extracted.
Data access interface module is electrically connected with authority recognition module, and authority recognition module is the signal to input terminal Identification authorization is carried out, allows to connect, authority recognition module network is connected with input terminal module, and authority recognition module and input are eventually Network channel is formed between end module, network channel is that input terminal module issues connection signal, connection signal and data access Interface module is attached, in connection signal with connection key, with network connection port in data access interface module in Connection cipher key match when, between input terminal and data access interface module establish network connection channel, carry out the biography of information It passs and data information is downloaded.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (8)

1. a kind of secrecy system based on Library management, including processor, which is characterized in that the processor is electrically connected There is information acquisition module, the processor is also electrically connected with memory, security module, data encryption module and data access and connects Mouth mold block, the data access interface module are electrically connected with authority recognition module, and the authority recognition module network is connected with Input terminal module forms network channel, the security module between the authority recognition module and the input terminal module Including single-chip microcontroller, the single-chip microcontroller is electrically connected with database, and the single-chip microcontroller is also electrically connected with recording module, password mould Block, unlocked state and contrast module, the contrast module include vocal print module and digital contrast module, right after data encryption File carries out secrecy processing, needs to input language simultaneously when reading data by speech cipher and numerical ciphers duplicate protection Sound password and numerical ciphers, when two kinds of passwords are correct simultaneously, unlocked state opens the privacy lock on file.
2. a kind of secrecy system based on Library management according to claim 1, which is characterized in that the comparison mould Block further includes sound wire module, and the sound ray module is that the sound ray in the voice to input is analyzed, then with memory memory The sound ray of storage is compared, and identical sound ray is voice of the same race, and sound ray module is judged the voice of input.
3. a kind of secrecy system based on Library management according to claim 1, which is characterized in that the single-chip microcontroller It is electrically connected with removing module, the removing module is deleted the password and voice of input, after file opening, is deleted Except module removes the password and voice of input automatically, the effective safety for improving data in file.
4. a kind of secrecy system based on Library management according to claim 1, which is characterized in that the processor It is electrically connected with data decryption module, the data of encryption are converted normal data, the data by the data decryption module Deciphering module is translated encrypted symbols by cipher leaf one by one.
5. a kind of secrecy system based on Library management according to claim 1, which is characterized in that the network is logical Road is that input terminal module issues connection signal, and connection signal is attached with data access interface module, band in connection signal Have connection key, with network connection port in data access interface module in connection cipher key match when, input terminal and number According to network connection channel is established between access interface module, carries out the transmitting of information and data information is downloaded.
6. a kind of secrecy system based on Library management according to claim 1, which is characterized in that the data are visited It asks and is provided with multiple network connection ports in interface module, network connection key, institute are provided in each connectivity port It states network connection key to be all different, and the connection permission of different network connection keys is all different, different network connections Key setting limitation is determined by the capacity of water that data are extracted.
7. a kind of secrecy system based on Library management according to claim 1, which is characterized in that the processor It is electrically connected with administrative unit, the administrative unit, which is electrically connected with, logins module, and administrative staff enter pipe by logining module Unit is managed, needs specifically to login password when logining, the validity period of password is a week, a week replaces password automatically, steps on Enter the safety that cipher change effectively raises system, administrative staff encrypt the data in system by administrative unit It is operated with secrecy, the data in protection system.
8. a kind of secrecy system based on Library management according to claim 1, which is characterized in that the data add Close module includes microprocessor, and the microprocessor is electrically connected with memory module, sorting module and code module, the code Module is electrically connected with coding module, and sorting module arranges the data of input, removes extra and useless information, information It arranges after receiving, microprocessor carries out coding encrypting, root to data by message code page in code module, by coding module According to the code on code page, data information is encrypted one by one.
CN201910572025.1A 2019-06-28 2019-06-28 A kind of secrecy system based on Library management Pending CN110309639A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910572025.1A CN110309639A (en) 2019-06-28 2019-06-28 A kind of secrecy system based on Library management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910572025.1A CN110309639A (en) 2019-06-28 2019-06-28 A kind of secrecy system based on Library management

Publications (1)

Publication Number Publication Date
CN110309639A true CN110309639A (en) 2019-10-08

Family

ID=68078340

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910572025.1A Pending CN110309639A (en) 2019-06-28 2019-06-28 A kind of secrecy system based on Library management

Country Status (1)

Country Link
CN (1) CN110309639A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104517066A (en) * 2014-12-16 2015-04-15 上海师范大学 Folder encrypting method
CN105160261A (en) * 2015-04-30 2015-12-16 北京车音网科技有限公司 File encryption and decryption method and device
CN105162757A (en) * 2015-07-03 2015-12-16 成都怡云科技有限公司 External network log-in method for multi-authentication government virtual office platform
CN105635097A (en) * 2015-06-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Wi-Fi connection method, terminal, Wi-Fi device, Wi-Fi connection control method and server
CN107071772A (en) * 2016-07-29 2017-08-18 腾讯科技(深圳)有限公司 WLAN connection method and mobile terminal
CN107169374A (en) * 2017-05-11 2017-09-15 四川长虹电器股份有限公司 Encryption and decryption system and method based on vocal print and speech recognition technology

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104517066A (en) * 2014-12-16 2015-04-15 上海师范大学 Folder encrypting method
CN105160261A (en) * 2015-04-30 2015-12-16 北京车音网科技有限公司 File encryption and decryption method and device
CN105635097A (en) * 2015-06-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Wi-Fi connection method, terminal, Wi-Fi device, Wi-Fi connection control method and server
CN105162757A (en) * 2015-07-03 2015-12-16 成都怡云科技有限公司 External network log-in method for multi-authentication government virtual office platform
CN107071772A (en) * 2016-07-29 2017-08-18 腾讯科技(深圳)有限公司 WLAN connection method and mobile terminal
CN107169374A (en) * 2017-05-11 2017-09-15 四川长虹电器股份有限公司 Encryption and decryption system and method based on vocal print and speech recognition technology

Similar Documents

Publication Publication Date Title
CN107169374B (en) Encryption and decryption system and method based on voiceprint and voice recognition technology
WO2017215504A1 (en) Identity recognition and social information recording method and system based on biological information
CN109145540B (en) Intelligent terminal identity authentication method and device based on block chain
US6845453B2 (en) Multiple factor-based user identification and authentication
CN101350724B (en) Encrypting method base on biology characteristic information
CN108600213B (en) Composite identity authentication method and composite identity authentication system applying same
KR20140054118A (en) Identity authentication device and method thereof
JP5305289B2 (en) User authentication method, user authentication system, user terminal, user authentication device, user terminal program, and user authentication device program
US20200272759A1 (en) Systems and methods for secure high speed data generation and access
CN117951746B (en) Medical data encryption system for multi-mode large language model
CN106921489B (en) Data encryption method and device
US20070106903A1 (en) Multiple Factor-Based User Identification and Authentication
CN111698253A (en) Computer network safety system
CN108667801A (en) A kind of Internet of Things access identity safety certifying method and system
WO2015196642A1 (en) Data encryption method, decryption method and device
CN110309639A (en) A kind of secrecy system based on Library management
CN114697043B (en) Identity authentication unified management platform based on blockchain technology and authentication method thereof
Butt et al. Towards e-passport duplicate enrollment check in the European Union
CN112507355B (en) Personal health data storage system based on block chain
JP2900869B2 (en) Database search system and database protection method
CN106682531A (en) Method for confidential data encryption based on biological information authorization
KR101624394B1 (en) Device for authenticating password and operating method thereof
JP2003134107A (en) System, method and program for individual authentication
CN205540742U (en) Multi -functional electronic fingerprint and integration machine of punching card
CN110335373A (en) Intelligent door lock and intelligent access control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191008