CN1976279A - Automatic monitoring and cleaning intelligent key system and working method thereof - Google Patents

Automatic monitoring and cleaning intelligent key system and working method thereof Download PDF

Info

Publication number
CN1976279A
CN1976279A CN 200610144335 CN200610144335A CN1976279A CN 1976279 A CN1976279 A CN 1976279A CN 200610144335 CN200610144335 CN 200610144335 CN 200610144335 A CN200610144335 A CN 200610144335A CN 1976279 A CN1976279 A CN 1976279A
Authority
CN
China
Prior art keywords
monitoring
intelligent
cleaning
automatic
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200610144335
Other languages
Chinese (zh)
Other versions
CN1976279B (en
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Original Assignee
Beijing Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Feitian Technologies Co Ltd filed Critical Beijing Feitian Technologies Co Ltd
Priority to CN2006101443356A priority Critical patent/CN1976279B/en
Publication of CN1976279A publication Critical patent/CN1976279A/en
Application granted granted Critical
Publication of CN1976279B publication Critical patent/CN1976279B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

An intelligent key system with automatic-monitoring and automatic-clearing up comprises intelligent cipher key functional module, monitoring module, clearing up module and automatic operation module. The operating method of said intelligent cipher key system is also disclosed.

Description

The intelligent key system and the method for work thereof of a kind of automatic monitoring and cleaning
Technical field
The present invention relates to information security field, the intelligent key system and the method for work thereof of particularly a kind of automatic monitoring and cleaning.
Background technology
Intelligent cipher key equipment is a kind of small hardware device that has processor and memory, and it can be connected with computer by the data communication interface of computer.It has the key systematic function, but and the safe storage key, can preset the cryptographic algorithm function.The computing that intelligent cipher key equipment is relevant with key is carried out in device inside fully.Generally speaking, intelligent cipher key equipment links to each other with computer by USB interface.
Intelligent cipher key equipment is mainly used in network ID authentication, and can digital signature supporting and PKI system, thereby has greatly improved the fail safe and the reliability of authentication.In addition, owing to this type of hardware is difficult to be replicated, so the fail safe of account number just is guaranteed.Simultaneously, the user need not to remember and input account number and password, has simplified user's operation, and is convenient for users to use.
By input PIN (Personal Identity Number) sign indicating number or personal biology characteristics (as fingerprint, palmmprint, vocal print, retina, iris, the shape of face etc.), can verify whether the user is the legal holder of intelligent cipher key equipment.PIN code is stored in the unreadable memory space of intelligent cipher key equipment, so anyone can not read the value of PIN code from this equipment, and the user has only the input correct PIN code could prove its legal identity.Equally, the personal biology characteristics value also is stored in the unreadable memory space of intelligent cipher key equipment, after intelligent cipher key equipment is gathered user's biological information by the physical characteristics collecting unit, itself and the biological characteristic value that prestores are compared, judge with this whether the user has legal identity.
Identity authorization system based on intelligent cipher key equipment mainly contains two kinds of application models: one is based on the certification mode of PKI system, and two are based on the certification mode of impact/response.Asymmetric key mechanisms is present most widely used a kind of Authentication mechanism, and in this mechanism, encryption key and decruption key have nothing in common with each other, and can only decipher with corresponding with it private key with the data of public key encryption.The digital signature of PKI mechanism had both guaranteed the confidentiality of information, guaranteed that again information has non repudiation, its principle is: at first will obtain digital signature expressly with the side's of being verified private key signature, then digital signature is sent to authentication, authentication is verified with the PKI of the side of being verified.
Compare with the certification mode of traditional " usemame/password ", the certification mode of this double factor can be guaranteed the fail safe and the reliability of whole authentication process more effectively.
At present, the CD ROM of USB interface possesses the function of automatic operation on the market, and is very easy to use.Recently, the intelligent cipher key equipment that possesses AutoPlay function also emerges.But the user can keep some relevant informations on the computer after using intelligent cipher key equipment, be unfavorable for protecting user's privacy and information security, and taken unnecessary system space.
Summary of the invention
The present invention provides the intelligent key system and the method for work thereof of a kind of automatic monitoring and cleaning in order to solve privacy of user and the incomplete problem of information safety protection of using intelligent cipher key equipment to bring in the prior art.Described technical scheme is as follows:
The intelligent key system of a kind of automatic monitoring and cleaning, described intelligent key system comprises the intelligent key functional module, described intelligent key system also comprises:
Whether monitoring module is used for the monitoring intelligent key devices and removes and being connected of computer;
The cleaning module is used for intelligent cipher key equipment and machine solution except that after the annexation, removes the information of leaving on computers relevant with this intelligent cipher key equipment;
Automatically the operation module is used to store automatic operating file, after intelligent cipher key equipment and computer connect, and automatic running program or install software.
Described relevant information comprises install software, load software, cookie record, browser access record or file access information.
The memory block at described automatic operation module place is read-only memory block.
The function of described monitoring module and cleaning module realizes by computer program.
Described computer program is stored on the intelligent cipher key equipment.
Described computer program connects from long-range loading or installation by network.
The present invention provides the method for work of the intelligent key system of a kind of automatic monitoring and cleaning simultaneously, said method comprising the steps of:
Steps A: intelligent cipher key equipment and computer connect;
Step B: start automatic running program;
Step C: monitoring program and liquidation procedures are installed or loaded to automatic running program;
Step D: operation monitoring program;
Step e: monitoring program checks whether described intelligent cipher key equipment is connected with the computer disconnection; If call liquidation procedures and clear up the information of leaving over after the described intelligent cipher key equipment operation; Otherwise, continue to check.
The described information of leaving over comprises the install software relevant with intelligent cipher key equipment, load software, Cookie record, browser access record or file access information.
The cleaning of described liquidation procedures leave over information comprise cleaning himself.
The beneficial effect that technical scheme of the present invention is brought is:
The automatic monitoring that the application of the invention provides and the intelligent key system of cleaning and method of work thereof; not only can be greatly user-friendly; also can remove file and the private information left over after the user uses a computer, thus protection user's individual privacy and information security.
Description of drawings
Fig. 1 is a kind of automatic monitoring that provides of the embodiment of the invention 1 and the intelligent key system functional structure chart of cleaning;
Fig. 2 is the method flow diagram of the realization AutoPlay function that provides of the embodiment of the invention 1;
Fig. 3 is the realization that provides of the embodiment of the invention 2 method flow diagram of monitoring and clearing function automatically;
Fig. 4 is the realization that provides of the embodiment of the invention 3 method flow diagram of monitoring and clearing function automatically.
Embodiment
The invention will be further described below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
The invention provides the intelligent key system of a kind of automatic monitoring and cleaning, this system not only has AutoPlay function, can also be connected the follow-up cleaning work of back execution at intelligent cipher key equipment and computer disconnection.Simultaneously, the present invention also provides the method for work of the intelligent key system of a kind of automatic monitoring and cleaning.
Embodiment 1
Referring to Fig. 1, the intelligent key system 10 of a kind of automatic monitoring and cleaning is provided, this system also comprises automatic operation module 101, monitoring module 102 and cleaning module 103 except comprising intelligent key functional module 100.The intelligent key functional module mainly comprises control submodule and sub module stored.
Wherein, after moving module 101 automatically and being used for intelligent cipher key equipment and computer and connecting, carry out AutoPlay function, automatic running program, install software etc.
Monitoring module 102 be used for the monitoring intelligent key whether remove with computer be connected monitoring program of this module stores.
Cleaning module 103 is used for intelligent cipher key equipment and machine solution remove annexation after, remove store on computers with this intelligent cipher key equipment relevant information.The relevant information here refers to the accessing operation information and the installed software that produce in the use process.This module can be stored a liquidation procedures.
Present embodiment is realized AutoPlay function by operation autorun.inf file, and the principle of this AutoPlay function is that a part of storage area with intelligent cipher key equipment marks, and is used for depositing the autorun.inf file.This autorun.inf file has carried out corresponding setting in advance, makes it point to specific program or file.After connecting devices to computer, computer is identified as CD ROM with this part storage area.Wherein, this part zone of depositing the autorun.inf file can't write data to this part for read-only memory block.At first device descriptor is reported as CD ROM when initialization is enumerated, system just can carry out the autorun.inf file like this.After finishing, system need enumerate equipment again, and device descriptor is reported as intelligent cipher key equipment, thereby realizes AutoPlay function.
Referring to Fig. 2, be operation and the method that the intelligent cipher key equipment realization AutoPlay function among the embodiment 1 is set, this method may further comprise the steps:
Step 201: a part of storage area that marks off intelligent cipher key equipment;
Step 202: in above-mentioned zone, deposit the autorun.inf file;
Step 203: the autorun.inf file is set, makes it point to specific program or file;
Step 204: intelligent cipher key equipment is connected with main frame;
Step 205: when initialization is enumerated, above-mentioned zone is reported as CD ROM;
Step 206: carry out the autorun.inf file, realize operation automatically.
For fear of the user after using a computer on computers face leave over unnecessary information and protection individual subscriber privacy, finish the function of follow-up cleaning work after intelligent key system of the present invention can also be implemented in intelligent cipher key equipment and the computer disconnection is connected automatically.So-called cleaning automatically is exactly after hardware device is pulled out, automatically to unload the process of (or deletion) before by this equipment installed software.Realize automatic clearing function, can adopt multiple distinct methods.
Embodiment 2
Referring to Fig. 3, the intelligent key system that Application Example 1 provides is realized the method for automatic clearing function.This method may further comprise the steps:
Step 301: intelligent cipher key equipment and computer connect;
Step 302: start automatic running program A;
Step 303: program A installs (as carrying out operations such as xcopy and modification registration table), comprises that program B and the program C that will be stored on the intelligent cipher key equipment are installed on the computer;
Step 304: whether working procedure B, program B monitoring intelligent key devices disconnect and being connected of computer; If no, then program B continues monitoring; Otherwise, execution in step 305; Program A is out of service;
Step 305: start-up routine C carries out cleaning operation, and program B is out of service, and program C will installed software program (comprising program B) unload in step 303;
Step 306: program C is out of service.At last, before program C was out of service fully, it also will also clean out himself.
In said process, program B and program C are installed in the temp directory on the hard disc of computer, and program A is an automatic running program, moves on intelligent cipher key equipment, and program B is a monitoring program, and program C is a liquidation procedures.
Embodiment 3
Referring to Fig. 4, the intelligent key system that Application Example 1 provides is realized the method for automatic clearing function.This method may further comprise the steps;
Step 401: intelligent cipher key equipment and computer connect;
Step 402: start automatic running program A;
Step 403: program A installs (as carrying out operation or loading monitoring programs such as xcopy and modification registration table), comprises by the computer network connection from long-range program B and program C being installed on the computer;
Step 404: start working procedure B, program A is out of service;
Step 405: whether program B monitoring intelligent key devices is connected with the computer disconnection; If no, then program B continues monitoring; Otherwise, execution in step 406;
Step 406: start working procedure C, program B is out of service;
Step 407: program C carries out cleaning operation, will installed software program (comprising program B) unloading in step 403.
Step 408: program C withdraws from and is out of service.At last, before program C was out of service fully, it also will also clean out himself.
In said process, program B and program C are installed in the temp directory on the hard disc of computer, and program A is an automatic running program, moves on intelligent cipher key equipment, and program B is a monitoring program, and program C is a liquidation procedures.In addition, above-mentioned cleaning operation can also comprise deletion cookie, remove browser access record and file access information.
Monitoring program and liquidation procedures can also be after intelligent cipher key equipment and computer connect (comprising wireless connections), connect from long-range load operating respectively by computer network, after monitoring program monitored intelligent cipher key equipment and the computer disconnection is connected, liquidation procedures was carried out corresponding cleaning operation.
More than the intelligent key system and the method for work thereof of a kind of automatic monitoring provided by the present invention and cleaning is described in detail, used specific case herein principle of the present invention and execution mode are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, the change of being carried out in specific embodiments and applications is all in protection scope of the present invention.In sum, to should not be construed as be limitation of the present invention to this description.

Claims (9)

1. automatic intelligent key system of monitoring and cleaning, described intelligent key system comprises the intelligent key functional module, it is characterized in that, described intelligent key system also comprises:
Whether monitoring module is used for the monitoring intelligent key devices and removes and being connected of computer;
The cleaning module is used for intelligent cipher key equipment and machine solution except that after the annexation, removes the information of leaving on computers relevant with this intelligent cipher key equipment;
Automatically the operation module is used to store automatic operating file, after intelligent cipher key equipment and computer connect, and automatic running program or install software.
2. the intelligent key system of automatic monitoring as claimed in claim 1 and cleaning is characterized in that, described relevant information comprises install software, load software, cookie record, browser access record or file access information.
3. the intelligent key system of automatic monitoring as claimed in claim 1 and cleaning is characterized in that, the memory block at described automatic operation module place is read-only memory block.
4. the intelligent key system of automatic monitoring as claimed in claim 1 and cleaning is characterized in that, the function of described monitoring module and cleaning module realizes by computer program.
5. the intelligent key system of automatic monitoring as claimed in claim 4 and cleaning is characterized in that described computer program is stored on the intelligent cipher key equipment.
6. the intelligent key system of automatic monitoring as claimed in claim 4 and cleaning is characterized in that, described computer program connects from long-range loading or installation by network.
7. the method for work of an intelligent key system of monitoring automatically and clearing up is characterized in that, said method comprising the steps of:
Steps A: intelligent cipher key equipment and computer connect;
Step B: start automatic running program;
Step C: monitoring program and liquidation procedures are installed or loaded to automatic running program;
Step D: operation monitoring program;
Step e: monitoring program checks whether described intelligent cipher key equipment is connected with the computer disconnection; If call liquidation procedures and clear up the information of leaving over after the described intelligent cipher key equipment operation; Otherwise, continue to check.
8. the method for work of the intelligent key system of automatic monitoring as claimed in claim 7 and cleaning, it is characterized in that the described information of leaving over comprises the install software relevant with intelligent cipher key equipment, load software, cookie record, browser access record or file access information.
9. the method for work of the intelligent key system of automatic monitoring as claimed in claim 7 and cleaning is characterized in that, the cleaning of described liquidation procedures leave over information comprise cleaning himself.
CN2006101443356A 2006-12-04 2006-12-04 Automatic monitoring and cleaning intelligent key system and working method thereof Expired - Fee Related CN1976279B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2006101443356A CN1976279B (en) 2006-12-04 2006-12-04 Automatic monitoring and cleaning intelligent key system and working method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2006101443356A CN1976279B (en) 2006-12-04 2006-12-04 Automatic monitoring and cleaning intelligent key system and working method thereof

Publications (2)

Publication Number Publication Date
CN1976279A true CN1976279A (en) 2007-06-06
CN1976279B CN1976279B (en) 2010-10-06

Family

ID=38126096

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006101443356A Expired - Fee Related CN1976279B (en) 2006-12-04 2006-12-04 Automatic monitoring and cleaning intelligent key system and working method thereof

Country Status (1)

Country Link
CN (1) CN1976279B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014015A (en) * 2010-06-29 2011-04-13 北京飞天诚信科技有限公司 Self-checking method of intelligent secret key equipment
CN104331488A (en) * 2014-11-13 2015-02-04 北京奇虎科技有限公司 Method, device and equipment for cleaning files based on floating windows

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2524296Y (en) * 2002-01-31 2002-12-04 广州理想资讯科技有限公司 Digital sign identifying devices
CN1303542C (en) * 2003-10-24 2007-03-07 英业达股份有限公司 Plug-and-play method for USB equipment under linux operation system
CN100357921C (en) * 2004-12-31 2007-12-26 联想(北京)有限公司 Method for controlling automatic running program in USB memory and USB memory thereof
CN100454321C (en) * 2006-04-29 2009-01-21 北京飞天诚信科技有限公司 USB device with data memory and intelligent secret key and control method thereof
CN100386751C (en) * 2006-05-30 2008-05-07 北京飞天诚信科技有限公司 USB device automatic initialization method and device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014015A (en) * 2010-06-29 2011-04-13 北京飞天诚信科技有限公司 Self-checking method of intelligent secret key equipment
CN102014015B (en) * 2010-06-29 2012-10-03 飞天诚信科技股份有限公司 Self-checking method of intelligent secret key equipment
CN104331488A (en) * 2014-11-13 2015-02-04 北京奇虎科技有限公司 Method, device and equipment for cleaning files based on floating windows
CN104331488B (en) * 2014-11-13 2018-04-10 北京奇虎科技有限公司 File clean-up method, apparatus and equipment based on suspended window

Also Published As

Publication number Publication date
CN1976279B (en) 2010-10-06

Similar Documents

Publication Publication Date Title
CN1288527C (en) Computer security control module and safeguard control method thereof
US8856534B2 (en) Method and apparatus for secure scan of data storage device from remote server
CN1681240A (en) Credential roaming
CN1881924A (en) Group communication safety distribution media recording and retaking method and device
TW201019110A (en) Managing cache data and metadata
CN1967460A (en) Apparatus and method to configure one or more storage arrays
CN1758177A (en) Method and system for realizing storage distributing and management using at least one data storage
CN1889426A (en) Method and system for realizing network safety storaging and accessing
CN1976281A (en) Information processing device and authentication method
CN1853173A (en) Electronic data management device, control program, and data management method
CN1991800A (en) Fingerprint identification storage device and fingerprint identification method
CN1877594A (en) Electronic file automatic protection method and system
CN1877549A (en) Method for automatic protection of U disc by using filtering driver and intelligent key device
CN1577206A (en) Portable computer
CN1976279A (en) Automatic monitoring and cleaning intelligent key system and working method thereof
CN1317846C (en) Method of realizing internal external network physical partition and its device
CN1916860A (en) Method and device for saving and restoring application environment of personal information in computer
TWM356972U (en) Portable storage device with local and remote identity recognition function
CN2896370Y (en) Intelligent key device
CN1667637A (en) Method and apparatus for integrating fingerprint identification during computer booting on computer motherboard
CN110134546A (en) Batch restarts windows systems approach, electronic device and storage medium
CN2771917Y (en) Computer safety control module
CN1889431A (en) Multifunction intelligent key equipment and safety controlling method thereof
CN1661572A (en) Method in use for managing data access between storing devices and equipment of host computer
CN1516503A (en) Method for limiting illegal mobile telephone

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: FEITIAN CHENGXIN TECHNOLOGIES CO., LTD.

Free format text: FORMER NAME: BEIJING FEITIAN CHENGXIN SCIENCE + TECHNOLOGY CO. LTD.

CP03 Change of name, title or address

Address after: 100085 Beijing city Haidian District Xueqing Road No. 9 Ebizal building B block 17 layer

Patentee after: Feitian Technologies Co.,Ltd.

Address before: 100083, Haidian District, Xueyuan Road, No. 40 research, 7 floor, 5 floor, Beijing

Patentee before: FEITIAN TECHNOLOGIES Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20101006