Background technology
Intelligent cipher key equipment is a kind of small hardware device that has processor and memory, and it can be connected with computer by the data communication interface of computer.It has the key systematic function, but and the safe storage key, can preset the cryptographic algorithm function.The computing that intelligent cipher key equipment is relevant with key is carried out in device inside fully.Generally speaking, intelligent cipher key equipment links to each other with computer by USB interface.
Intelligent cipher key equipment is mainly used in network ID authentication, and can digital signature supporting and PKI system, thereby has greatly improved the fail safe and the reliability of authentication.In addition, owing to this type of hardware is difficult to be replicated, so the fail safe of account number just is guaranteed.Simultaneously, the user need not to remember and input account number and password, has simplified user's operation, and is convenient for users to use.
By input PIN (Personal Identity Number) sign indicating number or personal biology characteristics (as fingerprint, palmmprint, vocal print, retina, iris, the shape of face etc.), can verify whether the user is the legal holder of intelligent cipher key equipment.PIN code is stored in the unreadable memory space of intelligent cipher key equipment, so anyone can not read the value of PIN code from this equipment, and the user has only the input correct PIN code could prove its legal identity.Equally, the personal biology characteristics value also is stored in the unreadable memory space of intelligent cipher key equipment, after intelligent cipher key equipment is gathered user's biological information by the physical characteristics collecting unit, itself and the biological characteristic value that prestores are compared, judge with this whether the user has legal identity.
Identity authorization system based on intelligent cipher key equipment mainly contains two kinds of application models: one is based on the certification mode of PKI system, and two are based on the certification mode of impact/response.Asymmetric key mechanisms is present most widely used a kind of Authentication mechanism, and in this mechanism, encryption key and decruption key have nothing in common with each other, and can only decipher with corresponding with it private key with the data of public key encryption.The digital signature of PKI mechanism had both guaranteed the confidentiality of information, guaranteed that again information has non repudiation, its principle is: at first will obtain digital signature expressly with the side's of being verified private key signature, then digital signature is sent to authentication, authentication is verified with the PKI of the side of being verified.
Compare with the certification mode of traditional " usemame/password ", the certification mode of this double factor can be guaranteed the fail safe and the reliability of whole authentication process more effectively.
At present, the CD ROM of USB interface possesses the function of automatic operation on the market, and is very easy to use.Recently, the intelligent cipher key equipment that possesses AutoPlay function also emerges.But the user can keep some relevant informations on the computer after using intelligent cipher key equipment, be unfavorable for protecting user's privacy and information security, and taken unnecessary system space.
Summary of the invention
The present invention provides the intelligent key system and the method for work thereof of a kind of automatic monitoring and cleaning in order to solve privacy of user and the incomplete problem of information safety protection of using intelligent cipher key equipment to bring in the prior art.Described technical scheme is as follows:
The intelligent key system of a kind of automatic monitoring and cleaning, described intelligent key system comprises the intelligent key functional module, described intelligent key system also comprises:
Whether monitoring module is used for the monitoring intelligent key devices and removes and being connected of computer;
The cleaning module is used for intelligent cipher key equipment and machine solution except that after the annexation, removes the information of leaving on computers relevant with this intelligent cipher key equipment;
Automatically the operation module is used to store automatic operating file, after intelligent cipher key equipment and computer connect, and automatic running program or install software.
Described relevant information comprises install software, load software, cookie record, browser access record or file access information.
The memory block at described automatic operation module place is read-only memory block.
The function of described monitoring module and cleaning module realizes by computer program.
Described computer program is stored on the intelligent cipher key equipment.
Described computer program connects from long-range loading or installation by network.
The present invention provides the method for work of the intelligent key system of a kind of automatic monitoring and cleaning simultaneously, said method comprising the steps of:
Steps A: intelligent cipher key equipment and computer connect;
Step B: start automatic running program;
Step C: monitoring program and liquidation procedures are installed or loaded to automatic running program;
Step D: operation monitoring program;
Step e: monitoring program checks whether described intelligent cipher key equipment is connected with the computer disconnection; If call liquidation procedures and clear up the information of leaving over after the described intelligent cipher key equipment operation; Otherwise, continue to check.
The described information of leaving over comprises the install software relevant with intelligent cipher key equipment, load software, Cookie record, browser access record or file access information.
The cleaning of described liquidation procedures leave over information comprise cleaning himself.
The beneficial effect that technical scheme of the present invention is brought is:
The automatic monitoring that the application of the invention provides and the intelligent key system of cleaning and method of work thereof; not only can be greatly user-friendly; also can remove file and the private information left over after the user uses a computer, thus protection user's individual privacy and information security.
Embodiment
The invention will be further described below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
The invention provides the intelligent key system of a kind of automatic monitoring and cleaning, this system not only has AutoPlay function, can also be connected the follow-up cleaning work of back execution at intelligent cipher key equipment and computer disconnection.Simultaneously, the present invention also provides the method for work of the intelligent key system of a kind of automatic monitoring and cleaning.
Embodiment 1
Referring to Fig. 1, the intelligent key system 10 of a kind of automatic monitoring and cleaning is provided, this system also comprises automatic operation module 101, monitoring module 102 and cleaning module 103 except comprising intelligent key functional module 100.The intelligent key functional module mainly comprises control submodule and sub module stored.
Wherein, after moving module 101 automatically and being used for intelligent cipher key equipment and computer and connecting, carry out AutoPlay function, automatic running program, install software etc.
Monitoring module 102 be used for the monitoring intelligent key whether remove with computer be connected monitoring program of this module stores.
Cleaning module 103 is used for intelligent cipher key equipment and machine solution remove annexation after, remove store on computers with this intelligent cipher key equipment relevant information.The relevant information here refers to the accessing operation information and the installed software that produce in the use process.This module can be stored a liquidation procedures.
Present embodiment is realized AutoPlay function by operation autorun.inf file, and the principle of this AutoPlay function is that a part of storage area with intelligent cipher key equipment marks, and is used for depositing the autorun.inf file.This autorun.inf file has carried out corresponding setting in advance, makes it point to specific program or file.After connecting devices to computer, computer is identified as CD ROM with this part storage area.Wherein, this part zone of depositing the autorun.inf file can't write data to this part for read-only memory block.At first device descriptor is reported as CD ROM when initialization is enumerated, system just can carry out the autorun.inf file like this.After finishing, system need enumerate equipment again, and device descriptor is reported as intelligent cipher key equipment, thereby realizes AutoPlay function.
Referring to Fig. 2, be operation and the method that the intelligent cipher key equipment realization AutoPlay function among the embodiment 1 is set, this method may further comprise the steps:
Step 201: a part of storage area that marks off intelligent cipher key equipment;
Step 202: in above-mentioned zone, deposit the autorun.inf file;
Step 203: the autorun.inf file is set, makes it point to specific program or file;
Step 204: intelligent cipher key equipment is connected with main frame;
Step 205: when initialization is enumerated, above-mentioned zone is reported as CD ROM;
Step 206: carry out the autorun.inf file, realize operation automatically.
For fear of the user after using a computer on computers face leave over unnecessary information and protection individual subscriber privacy, finish the function of follow-up cleaning work after intelligent key system of the present invention can also be implemented in intelligent cipher key equipment and the computer disconnection is connected automatically.So-called cleaning automatically is exactly after hardware device is pulled out, automatically to unload the process of (or deletion) before by this equipment installed software.Realize automatic clearing function, can adopt multiple distinct methods.
Embodiment 2
Referring to Fig. 3, the intelligent key system that Application Example 1 provides is realized the method for automatic clearing function.This method may further comprise the steps:
Step 301: intelligent cipher key equipment and computer connect;
Step 302: start automatic running program A;
Step 303: program A installs (as carrying out operations such as xcopy and modification registration table), comprises that program B and the program C that will be stored on the intelligent cipher key equipment are installed on the computer;
Step 304: whether working procedure B, program B monitoring intelligent key devices disconnect and being connected of computer; If no, then program B continues monitoring; Otherwise, execution in step 305; Program A is out of service;
Step 305: start-up routine C carries out cleaning operation, and program B is out of service, and program C will installed software program (comprising program B) unload in step 303;
Step 306: program C is out of service.At last, before program C was out of service fully, it also will also clean out himself.
In said process, program B and program C are installed in the temp directory on the hard disc of computer, and program A is an automatic running program, moves on intelligent cipher key equipment, and program B is a monitoring program, and program C is a liquidation procedures.
Embodiment 3
Referring to Fig. 4, the intelligent key system that Application Example 1 provides is realized the method for automatic clearing function.This method may further comprise the steps;
Step 401: intelligent cipher key equipment and computer connect;
Step 402: start automatic running program A;
Step 403: program A installs (as carrying out operation or loading monitoring programs such as xcopy and modification registration table), comprises by the computer network connection from long-range program B and program C being installed on the computer;
Step 404: start working procedure B, program A is out of service;
Step 405: whether program B monitoring intelligent key devices is connected with the computer disconnection; If no, then program B continues monitoring; Otherwise, execution in step 406;
Step 406: start working procedure C, program B is out of service;
Step 407: program C carries out cleaning operation, will installed software program (comprising program B) unloading in step 403.
Step 408: program C withdraws from and is out of service.At last, before program C was out of service fully, it also will also clean out himself.
In said process, program B and program C are installed in the temp directory on the hard disc of computer, and program A is an automatic running program, moves on intelligent cipher key equipment, and program B is a monitoring program, and program C is a liquidation procedures.In addition, above-mentioned cleaning operation can also comprise deletion cookie, remove browser access record and file access information.
Monitoring program and liquidation procedures can also be after intelligent cipher key equipment and computer connect (comprising wireless connections), connect from long-range load operating respectively by computer network, after monitoring program monitored intelligent cipher key equipment and the computer disconnection is connected, liquidation procedures was carried out corresponding cleaning operation.
More than the intelligent key system and the method for work thereof of a kind of automatic monitoring provided by the present invention and cleaning is described in detail, used specific case herein principle of the present invention and execution mode are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, the change of being carried out in specific embodiments and applications is all in protection scope of the present invention.In sum, to should not be construed as be limitation of the present invention to this description.