CN114547708A - Information security protection method, device, equipment and computer readable storage medium - Google Patents

Information security protection method, device, equipment and computer readable storage medium Download PDF

Info

Publication number
CN114547708A
CN114547708A CN202210044112.1A CN202210044112A CN114547708A CN 114547708 A CN114547708 A CN 114547708A CN 202210044112 A CN202210044112 A CN 202210044112A CN 114547708 A CN114547708 A CN 114547708A
Authority
CN
China
Prior art keywords
information
key
usb flash
flash disk
matching
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210044112.1A
Other languages
Chinese (zh)
Inventor
李文竹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yuannian Technology Co ltd
Original Assignee
Beijing Yuannian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yuannian Technology Co ltd filed Critical Beijing Yuannian Technology Co ltd
Priority to CN202210044112.1A priority Critical patent/CN114547708A/en
Publication of CN114547708A publication Critical patent/CN114547708A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides an information security protection method and device, electronic equipment and a computer readable storage medium. The information security protection method is applied to the USB flash disk and comprises the following steps: under the condition that the USB flash disk is in communication connection with the user side, a public key request is sent to the user side; the USB flash disk has a private key automatically generated when target information is stored; receiving a public key to be paired sent by a user end; matching the private key with the public key to be paired; and if the key matching fails, displaying the virtual information corresponding to the target information and hiding the real information of the target information. According to the embodiment of the application, the information leakage prevention of the USB flash disk can be realized.

Description

Information security protection method, device, equipment and computer readable storage medium
Technical Field
The present application belongs to the field of information security protection, and in particular, to an information security protection method and apparatus, an electronic device, and a computer-readable storage medium.
Background
With the development of company products and related services, security protection of information is more and more important. For example, security during storage and transfer of corporate financial data is important.
The usb disk is an abbreviation of usb (universal serial bus) disk, and is a commonly used information carrier in daily life. With the development, the volume of the USB flash disk is smaller and smaller, so that the probability of losing the USB flash disk is increased. When important information is carried in the usb disk, the information may be leaked due to the loss or theft of the usb disk, thereby causing some unnecessary loss.
Therefore, how to achieve the leakage prevention of the usb flash disk information is a technical problem that needs to be solved urgently by those skilled in the art.
Disclosure of Invention
The embodiment of the application provides an information security protection method and device, electronic equipment and a computer readable storage medium, and can prevent leakage of USB flash disk information.
In a first aspect, an embodiment of the present application provides an information security protection method, which is applied to a usb disk, and the method includes:
under the condition that the USB flash disk is in communication connection with the user side, a public key request is sent to the user side; the USB flash disk has a private key automatically generated when target information is stored;
receiving a public key to be paired sent by a user end;
matching the private key with the public key to be paired;
and if the key matching fails, displaying the virtual information corresponding to the target information and hiding the real information of the target information.
Optionally, after matching the private key with the public key to be paired, the method further includes:
and if the secret key is successfully matched, displaying the real information of the target information and hiding the virtual information corresponding to the target information.
Optionally, the method further includes:
and if the key matching fails, determining the memory occupied by the virtual information as all the information memory of the U disk.
Optionally, before displaying the virtual information corresponding to the target information and hiding the real information of the target information if the key matching fails, the method further includes:
randomly generating virtual information corresponding to the target information; wherein the virtual information has the same format and name as the real information of the target information.
Optionally, matching the private key with the public key to be paired includes:
and matching the private key with the public key to be paired in a preset time period.
Optionally, after matching the private key with the public key to be paired, the method further includes:
and if the key matching fails, sending alarm information to the set terminal.
Optionally, if the key matching fails, sending alarm information to the setting terminal, including:
if the secret key matching fails, acquiring the positioning information of the USB flash disk;
and sending the positioning information to the mobile phone terminal of the user.
In a second aspect, an embodiment of the present application provides an information security protection device, which is applied to a usb disk, and the device includes:
the request sending module is used for sending a public key request to the user side under the condition that the USB flash disk is in communication connection with the user side; the USB flash disk has a private key automatically generated when target information is stored;
the receiving module is used for receiving the public key to be paired sent by the using end;
the secret key matching module is used for matching the private key with the public key to be paired;
and the first information display module is used for displaying the virtual information corresponding to the target information and hiding the real information of the target information if the key matching fails.
Optionally, the apparatus further comprises:
and the second information display module is used for displaying the real information of the target information and hiding the virtual information corresponding to the target information if the secret key is successfully matched.
Optionally, the apparatus further comprises:
and the memory determining module is used for determining the memory occupied by the virtual information as all information memories of the USB flash disk if the key matching fails.
Optionally, the apparatus further comprises:
the virtual information generation module is used for randomly generating virtual information corresponding to the target information; wherein the virtual information has the same format and name as the real information of the target information.
Optionally, the key matching module is configured to match the private key with the public key to be paired in a preset time period.
Optionally, the apparatus further comprises:
and the alarm information sending module is used for sending alarm information to the set terminal if the key matching fails.
Optionally, the alarm information sending module is configured to obtain the location information of the usb disk if the key matching fails; and sending the positioning information to the mobile phone terminal of the user.
In a third aspect, an embodiment of the present application provides an electronic device, where the electronic device includes: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements the information security protection method as shown in the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium, on which computer program instructions are stored, and when executed by a processor, the computer program instructions implement the information security protection method according to the first aspect.
The information security protection method, the information security protection device, the electronic equipment and the computer readable storage medium can achieve leakage prevention of the USB flash disk information.
The information security protection method is applied to the U disk, and under the condition that the U disk is in communication connection with a user terminal, a public key request is sent to the user terminal; the USB flash disk has a private key automatically generated when target information is stored; receiving a public key to be paired sent by a user end; matching the private key with the public key to be paired; if the secret key matching fails, virtual information corresponding to the target information is displayed, real information of the target information is hidden, and leakage prevention of the USB flash disk information can be achieved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the embodiments or the technical solutions in the prior art are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained according to these drawings by those skilled in the art without creative efforts.
Fig. 1 is a schematic flowchart of an information security protection method according to an embodiment of the present application;
FIG. 2 is a schematic structural diagram of an information security protection apparatus according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Features of various aspects and exemplary embodiments of the present application will be described in detail below, and in order to make objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail below with reference to the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described herein are merely illustrative of, and not restrictive on, the present application. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by illustrating examples thereof.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
With the development of company products and related services, security protection of information is more and more important. For example, security during storage and transfer of corporate financial data is important.
The U disk is a common information carrier in daily life. With the development, the volume of the USB flash disk is smaller and smaller, so that the probability of losing the USB flash disk is increased. When important information is carried in the usb disk, the information may be leaked due to the loss or theft of the usb disk, thereby causing some unnecessary loss.
In order to solve the prior art problems, embodiments of the present application provide an information security protection method and apparatus, an electronic device, and a computer-readable storage medium. First, a method for protecting information security provided in the embodiment of the present application is described below.
Fig. 1 shows a flowchart of an information security protection method according to an embodiment of the present application. The information security protection method is applied to a U disk, as shown in fig. 1, and includes:
s101, sending a public key request to a user side under the condition that the U disk is in communication connection with the user side; the USB flash disk has a private key automatically generated when target information is stored.
And S102, receiving the public key to be paired sent by the using end.
S103, matching the private key with the public key to be paired.
In one embodiment, after matching the private key with the public key to be paired, the method further comprises:
and if the secret key is successfully matched, displaying the real information of the target information and hiding the virtual information corresponding to the target information.
And S104, if the key matching fails, displaying the virtual information corresponding to the target information, and hiding the real information of the target information.
When the USB flash disk is used for the first time, the USB flash disk needs to be initially set, and the purpose of initial setting is to provide a secret key for the USB flash disk. Meanwhile, the secret key can be sent to a user end needing to be used.
Wherein, the initial setting process may be: and installing an application program (APP) on the computer, and storing the APP into the USB flash disk by the user when the USB flash disk is inserted into the computer for the first time. Then set up initial key through the APP of storage in the USB flash disk, APP on the computer and the APP communication in the USB flash disk, storage USB flash disk information, for example: the name of the U disk, the initial key corresponding to the U disk, and the like.
When the USB flash disk is used for the second time, the USB flash disk is inserted into the computer, the APP stored in the USB flash disk is automatically started, the secret key is required for the computer, the APP on the computer automatically sends the stored secret key to the USB flash disk, the pairing is successful, and then the real information is displayed. If no feedback exists or the fed-back key is wrong, displaying the virtual information.
The user end can be a mobile phone, other computers and the like, for example, a conference computer and other devices capable of reading and writing a USB flash disk; the secret key can be sent through networks such as WeChat and mail, and can also be sent through a second USB flash disk, namely, a verification USB flash disk is added. The communication connection between the USB disk and the user side is through Universal Serial Bus (USB).
When the USB flash disk is used again, the USB flash disk asks for a key from a user end; when the secret key is successfully paired, the USB flash disk displays real information and hides virtual information, so that information query interference is reduced, and bystander personnel are prevented from knowing that the virtual information exists in the USB flash disk. When the key pairing fails, the U disk displays the virtual content and hides the real information.
In one embodiment, the method further comprises: and if the key matching fails, determining the memory occupied by the virtual information as all the information memory of the U disk.
According to the embodiment, under the condition that key matching fails, the memory occupied by the virtual information is determined to be all information memories of the USB flash disk, so that the condition that personnel can calculate the USB flash disk and hidden information through the space size can be avoided, and the information safety is further improved.
And when the pairing of the USB flash disk key fails, the memory occupied by the virtual content in the USB flash disk is all the information memory. For example, the total storage space of the usb disk is 16G, and after information is stored, the remaining space is 8G, and when key pairing fails, the storage space occupied by the virtual information display is 8G, so that it is possible to avoid that a person calculates the usb disk and hidden information through the size of the space.
The virtual information is the same as the real information only in format and form, the specific content can be none or little, and the real occupied space is generally controlled within 100M; specifically, the difference between the real capacity of the usb flash disk and the nominal capacity can be determined, and generally, the difference is not more than half of the difference between the nominal capacity and the real capacity.
In one embodiment, before displaying virtual information corresponding to the target information and hiding real information of the target information if the key matching fails, the method further includes:
randomly generating virtual information corresponding to the target information; wherein the virtual information has the same format and name as the real information of the target information.
The embodiment randomly generates the virtual information corresponding to the target information, has the same format and name as the real information of the target information, has confusability, and can further improve the safety of the information.
The virtual information in the U disk is randomly generated information. The format of the virtual information is consistent with that of the real information. The U disk is preset with an APP for virtualizing a virtual document corresponding to the real document.
The USB flash disk is stored with common important information virtual data, the virtual data has the same format, name and the like as real data, a user can edit the virtual data, and when the USB flash disk key pairing fails, the virtual file displayed by the USB flash disk corresponds to the real file. Specifically, for example, the real information stored in the usb disk is an excel table, and the table contains data, when the pairing of the usb disk keys fails, a virtual excel table with the same name as the real excel table is also displayed in the virtual information, and the virtual excel table has the same format as the real excel table, but the data in the specific table is different.
In one embodiment, matching the private key with the public key to be paired includes: and matching the private key with the public key to be paired in a preset time period.
The key is time-efficient, and for example, the real content in the usb flash disk can be viewed only for a specific time period by using the key.
According to the embodiment, timeliness is limited for the secret key, the secret key can be used for checking the real content in the USB flash disk only in a preset time period, and the information safety can be further improved.
In one embodiment, after matching the private key with the public key to be paired, the method further comprises:
and if the key matching fails, sending alarm information to the set terminal.
In the embodiment, the alarm information is sent to the setting terminal under the condition that the key matching fails, so that the safety of the information can be further improved.
In one embodiment, if the key matching fails, sending alarm information to the setting terminal includes:
if the secret key matching fails, acquiring the positioning information of the USB flash disk;
and sending the positioning information to the mobile phone terminal of the user.
According to the embodiment, the positioning information is sent to the mobile phone terminal of the user under the condition that the key matching fails, so that the information in the subsequent U disk can be conveniently recovered, and the safety of the information is further improved.
The USB flash disk is provided with a module for sending alarm information, and when the pairing of the USB flash disk secret key fails, the USB flash disk sends the positioning information to the setting terminal. For example, the location information is sent to the user's handset terminal.
In one embodiment, the information security protection method may be: when the user A stores information in the USB flash disk, the USB flash disk automatically generates a private key; when a user A needs to look up information on different devices, a public key needs to be sent to the device, after a USB flash disk is inserted into the device, identity information verification is firstly carried out on the device, if the verification fails, virtual information is displayed, and alarm information is sent to the user A; and when the identity verification is successful, displaying the real information and hiding the virtual information. Of course, in the present application, when the user a sends the public key to a different device, the validity period of the public key may be set.
In the application, the special identification code is added to the U disk, so that the information safety can be protected even if the U disk is lost or stolen; meanwhile, false information can be provided to ensure that real information is hidden, so that the safety of information in the USB flash disk is ensured.
Fig. 2 shows a schematic structural diagram of an information security protection apparatus provided in an embodiment of the present application. The information security protection device is applied to a U disk, and as shown in fig. 2, the information security protection device includes:
a request sending module 201, configured to send a public key request to a user side when the usb disk is in communication connection with the user side; the USB flash disk has a private key automatically generated when target information is stored;
a receiving module 202, configured to receive a public key to be paired sent by a user;
the secret key matching module 203 is used for matching the private key with the public key to be paired;
the first information displaying module 204 is configured to display virtual information corresponding to the target information and hide real information of the target information if the key matching fails.
In one embodiment, the apparatus further comprises:
and the second information display module is used for displaying the real information of the target information and hiding the virtual information corresponding to the target information if the secret key is successfully matched.
In one embodiment, the apparatus further comprises:
and the memory determining module is used for determining the memory occupied by the virtual information as all information memories of the USB flash disk if the key matching fails.
In one embodiment, the apparatus further comprises:
the virtual information generation module is used for randomly generating virtual information corresponding to the target information; wherein the virtual information has the same format and name as the real information of the target information.
In an embodiment, the key matching module 203 is configured to match the private key with the public key to be paired in a preset time period.
In one embodiment, the apparatus further comprises:
and the alarm information sending module is used for sending alarm information to the set terminal if the key matching fails.
In one embodiment, the alarm information sending module is configured to obtain the location information of the usb disk if the key matching fails; and sending the positioning information to the mobile phone terminal of the user.
Each module/unit in the apparatus shown in fig. 2 has a function of implementing each step in fig. 1, and can achieve the corresponding technical effect, and for brevity, the description is not repeated here.
Fig. 3 shows a schematic structural diagram of an electronic device provided in an embodiment of the present application.
The electronic device may comprise a processor 301 and a memory 302 in which computer program instructions are stored.
Specifically, the processor 301 may include a Central Processing Unit (CPU), or an Application Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
Memory 302 may include mass storage for data or instructions. By way of example, and not limitation, memory 302 may include a Hard Disk Drive (HDD), floppy Disk Drive, flash memory, optical Disk, magneto-optical Disk, tape, or Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 302 may include removable or non-removable (or fixed) media, where appropriate. The memory 302 may be internal or external to the electronic device, where appropriate. In particular embodiments, memory 302 may be non-volatile solid-state memory.
In one embodiment, the Memory 302 may be a Read Only Memory (ROM). In one embodiment, the ROM may be mask-programmed ROM, Programmable ROM (PROM), Erasable PROM (EPROM), Electrically Erasable PROM (EEPROM), Electrically Alterable ROM (EAROM), or flash memory, or a combination of two or more of these.
The processor 301 reads and executes the computer program instructions stored in the memory 302 to implement any one of the information security protection methods in the above embodiments.
In one example, the electronic device may also include a communication interface 303 and a bus 310. As shown in fig. 3, the processor 301, the memory 302, and the communication interface 303 are connected via a bus 310 to complete communication therebetween.
The communication interface 303 is mainly used for implementing communication between modules, apparatuses, units and/or devices in the embodiment of the present application.
Bus 310 includes hardware, software, or both to couple the components of the electronic device to each other. By way of example, and not limitation, a bus may include an Accelerated Graphics Port (AGP) or other graphics bus, an Enhanced Industry Standard Architecture (EISA) bus, a Front Side Bus (FSB), a Hypertransport (HT) interconnect, an Industry Standard Architecture (ISA) bus, an infiniband interconnect, a Low Pin Count (LPC) bus, a memory bus, a Micro Channel Architecture (MCA) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express (PCI-X) bus, a Serial Advanced Technology Attachment (SATA) bus, a video electronics standards association local (VLB) bus, or other suitable bus or a combination of two or more of these. Bus 310 may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the application, any suitable buses or interconnects are contemplated by the application.
In addition, in combination with the information security protection method in the foregoing embodiments, the embodiments of the present application may provide a computer-readable storage medium to implement. The computer readable storage medium having stored thereon computer program instructions; the computer program instructions, when executed by a processor, implement any of the information security methods of the above embodiments.
It is to be understood that the present application is not limited to the particular arrangements and instrumentality described above and shown in the attached drawings. A detailed description of known methods is omitted herein for the sake of brevity. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present application are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications, and additions or change the order between the steps after comprehending the spirit of the present application.
The functional blocks shown in the above-described structural block diagrams may be implemented as hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, plug-in, function card, or the like. When implemented in software, the elements of the present application are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine-readable medium or transmitted by a data signal carried in a carrier wave over a transmission medium or a communication link. A "machine-readable medium" may include any medium that can store or transfer information. Examples of a machine-readable medium include electronic circuits, semiconductor memory devices, ROM, flash memory, Erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, Radio Frequency (RF) links, and so forth. The code segments may be downloaded via computer networks such as the internet, intranet, etc.
It should also be noted that the exemplary embodiments mentioned in this application describe some methods or systems based on a series of steps or devices. However, the present application is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be performed in an order different from the order in the embodiments, or may be performed simultaneously.
Aspects of the present application are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, enable the implementation of the functions/acts specified in the flowchart and/or block diagram block or blocks. Such a processor may be, but is not limited to, a general purpose processor, a special purpose processor, an application specific processor, or a field programmable logic circuit. It will also be understood that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware for performing the specified functions or acts, or combinations of special purpose hardware and computer instructions.
As described above, only the specific embodiments of the present application are provided, and it can be clearly understood by those skilled in the art that, for convenience and simplicity of description, the specific working processes of the system, the module and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. It should be understood that the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present application, and these modifications or substitutions should be covered within the scope of the present application.

Claims (10)

1. An information security protection method is applied to a USB flash disk, and the method comprises the following steps:
under the condition that the USB flash disk is in communication connection with a user side, a public key request is sent to the user side; the USB flash disk is provided with a private key automatically generated when target information is stored;
receiving a public key to be paired sent by the using end;
matching the private key with the public key to be paired;
and if the key matching fails, displaying the virtual information corresponding to the target information, and hiding the real information of the target information.
2. The information security protection method according to claim 1, wherein after the matching the private key with the public key to be paired, the method further comprises:
and if the secret key is successfully matched, displaying the real information of the target information, and hiding the virtual information corresponding to the target information.
3. The information security protection method according to claim 1, further comprising:
and if the key matching fails, determining the memory occupied by the virtual information as all the information memory of the U disk.
4. The information security protection method according to claim 1, wherein before displaying the virtual information corresponding to the target information and hiding the real information of the target information if the key matching fails, the method further comprises:
randomly generating virtual information corresponding to the target information; wherein the virtual information has the same format and name as the real information of the target information.
5. The information security protection method according to any one of claims 1 to 4, wherein the matching the private key and the public key to be paired includes:
and matching the private key with the public key to be paired in a preset time period.
6. The information security protection method according to any one of claims 1 to 4, wherein after the matching the private key with the public key to be paired, the method further comprises:
and if the key matching fails, sending alarm information to the set terminal.
7. The information security protection method according to claim 6, wherein the sending alarm information to the setting terminal if the key matching fails comprises:
if the secret key matching fails, acquiring the positioning information of the USB flash disk;
and sending the positioning information to a mobile phone terminal of the user.
8. An information safety protection device is characterized in that the device is applied to a USB flash disk, and the device comprises:
the request sending module is used for sending a public key request to the user terminal under the condition that the USB flash disk is in communication connection with the user terminal; the USB flash disk is provided with a private key automatically generated when target information is stored;
the receiving module is used for receiving the public key to be paired sent by the using end;
the secret key matching module is used for matching the private key with the public key to be paired;
and the first information display module is used for displaying the virtual information corresponding to the target information and hiding the real information of the target information if the key matching fails.
9. An electronic device, characterized in that the electronic device comprises: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements the information security method of any one of claims 1-7.
10. A computer-readable storage medium, having computer program instructions stored thereon, which, when executed by a processor, implement the method of information security protection according to any one of claims 1 to 7.
CN202210044112.1A 2022-01-14 2022-01-14 Information security protection method, device, equipment and computer readable storage medium Pending CN114547708A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210044112.1A CN114547708A (en) 2022-01-14 2022-01-14 Information security protection method, device, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210044112.1A CN114547708A (en) 2022-01-14 2022-01-14 Information security protection method, device, equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN114547708A true CN114547708A (en) 2022-05-27

Family

ID=81672152

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210044112.1A Pending CN114547708A (en) 2022-01-14 2022-01-14 Information security protection method, device, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN114547708A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102427449A (en) * 2011-11-04 2012-04-25 北京工业大学 Trusted mobile storage method based on security chips
CN103037370A (en) * 2012-11-05 2013-04-10 李明 Portable storage device and identity authentication method
CN105574382A (en) * 2015-03-30 2016-05-11 深圳酷派技术有限公司 Information protection method and terminal
US20160182499A1 (en) * 2014-12-22 2016-06-23 Mcafee, Inc. Trust establishment between a trusted execution environment and peripheral devices
CN107154848A (en) * 2017-03-10 2017-09-12 深圳市盾盘科技有限公司 A kind of data encryption based on CPK certifications and storage method and device
CN108090385A (en) * 2018-01-10 2018-05-29 绵阳鑫阳知识产权运营有限公司 Lose the anti-loss alarm USB flash disk that can be given for change
CN109361669A (en) * 2018-10-19 2019-02-19 铂有限公司 Identity identifying method, device and the equipment of communication equipment
CN110519215A (en) * 2019-07-02 2019-11-29 珠海格力电器股份有限公司 A kind of data communications method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102427449A (en) * 2011-11-04 2012-04-25 北京工业大学 Trusted mobile storage method based on security chips
CN103037370A (en) * 2012-11-05 2013-04-10 李明 Portable storage device and identity authentication method
US20160182499A1 (en) * 2014-12-22 2016-06-23 Mcafee, Inc. Trust establishment between a trusted execution environment and peripheral devices
CN105574382A (en) * 2015-03-30 2016-05-11 深圳酷派技术有限公司 Information protection method and terminal
CN107154848A (en) * 2017-03-10 2017-09-12 深圳市盾盘科技有限公司 A kind of data encryption based on CPK certifications and storage method and device
CN108090385A (en) * 2018-01-10 2018-05-29 绵阳鑫阳知识产权运营有限公司 Lose the anti-loss alarm USB flash disk that can be given for change
CN109361669A (en) * 2018-10-19 2019-02-19 铂有限公司 Identity identifying method, device and the equipment of communication equipment
CN110519215A (en) * 2019-07-02 2019-11-29 珠海格力电器股份有限公司 A kind of data communications method and device

Similar Documents

Publication Publication Date Title
CN112771826B (en) Application program login method, application program login device and mobile terminal
CN1550115B (en) Method of verifying downloaded software and corresponding device
CN109564598B (en) Terminal detection method and terminal
CN108683667B (en) Account protection method, device, system and storage medium
CN106101451A (en) SMS processing method, mobile terminal
JP2002516445A (en) How to authenticate an IC card user's personal code
CN111800273B (en) Information processing method, electronic device, and storage medium
CN109496443B (en) Mobile authentication method and system therefor
US7437563B2 (en) Software integrity test
CN111414605B (en) Unlocking method and device of embedded security unit, electronic equipment and storage medium
CN107835162B (en) Software digital permit server gives the method and software digital permit server that permission is signed and issued in the license of software developer's software digital
US20090106845A1 (en) Systems and methods for securing data in an electronic apparatus
CN107437997B (en) Radio frequency communication device and method
CN113709740A (en) Method and system for displaying account information on authorized login page
CN111093190B (en) Method, device, system, electronic equipment and storage medium for writing key data
CN114547708A (en) Information security protection method, device, equipment and computer readable storage medium
CN115767552A (en) Vehicle unlocking method and device, computer equipment and storage medium
CN115344848A (en) Identification obtaining method, device, equipment and computer readable storage medium
KR100917417B1 (en) Method of determining effectiveness of universal subsciber identity module card and mobile terminal and mobile terminal using thereof
CN105405010B (en) Transaction device, transaction system using the same and transaction method
CN110399714B (en) Method for verifying authenticity of trusted user interface of terminal and system thereof
CN107343276A (en) A kind of guard method of the SIM card lock data of terminal and system
CN118301592A (en) Data transmission method and device based on smart card, equipment and product
KR20200054147A (en) Method for Processing Payment by using Differentiating True Message
CN117215621A (en) Method, device and system for updating firmware of electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220527