CN1976279B - Automatic monitoring and cleaning intelligent key system and working method thereof - Google Patents

Automatic monitoring and cleaning intelligent key system and working method thereof Download PDF

Info

Publication number
CN1976279B
CN1976279B CN2006101443356A CN200610144335A CN1976279B CN 1976279 B CN1976279 B CN 1976279B CN 2006101443356 A CN2006101443356 A CN 2006101443356A CN 200610144335 A CN200610144335 A CN 200610144335A CN 1976279 B CN1976279 B CN 1976279B
Authority
CN
China
Prior art keywords
cipher key
intelligent cipher
key equipment
program
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2006101443356A
Other languages
Chinese (zh)
Other versions
CN1976279A (en
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Original Assignee
Beijing Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Feitian Technologies Co Ltd filed Critical Beijing Feitian Technologies Co Ltd
Priority to CN2006101443356A priority Critical patent/CN1976279B/en
Publication of CN1976279A publication Critical patent/CN1976279A/en
Application granted granted Critical
Publication of CN1976279B publication Critical patent/CN1976279B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

An intelligent key system with automatic-monitoring and automatic-clearing up comprises intelligent cipher key functional module, monitoring module, clearing up module and automatic operation module. The operating method of said intelligent cipher key system is also disclosed.

Description

The intelligent key system and the method for work thereof of a kind of automatic monitoring and cleaning
Technical field
The present invention relates to information security field, the intelligent key system and the method for work thereof of particularly a kind of automatic monitoring and cleaning.
Background technology
Intelligent cipher key equipment is a kind of small hardware device that has processor and memory, and it can be connected with computer by the data communication interface of computer.It has the key systematic function, but and the safe storage key, can preset the cryptographic algorithm function.The computing that intelligent cipher key equipment is relevant with key is carried out in device inside fully.Generally speaking, intelligent cipher key equipment links to each other with computer by USB interface.
Intelligent cipher key equipment is mainly used in network ID authentication, and can digital signature supporting and PKI system, thereby has greatly improved the fail safe and the reliability of authentication.In addition, owing to this type of hardware is difficult to be replicated, so the fail safe of account number just is guaranteed.Simultaneously, the user need not to remember and input account number and password, has simplified user's operation, and is convenient for users to use.
By input PIN (Personal Identity Number) sign indicating number or personal biology characteristics (as fingerprint, palmmprint, vocal print, retina, iris, the shape of face etc.), can verify whether the user is the legal holder of intelligent cipher key equipment.PIN code is stored in the unreadable memory space of intelligent cipher key equipment, so anyone can not read the value of PIN code from this equipment, and the user has only the input correct PIN code could prove its legal identity.Equally, the personal biology characteristics value also is stored in the unreadable memory space of intelligent cipher key equipment, after intelligent cipher key equipment is gathered user's biological information by the physical characteristics collecting unit, itself and the biological characteristic value that prestores are compared, judge with this whether the user has legal identity.
Identity authorization system based on intelligent cipher key equipment mainly contains two kinds of application models: one is based on the certification mode of PKI system, and two are based on the certification mode of impact/response.Asymmetric key mechanisms is present most widely used a kind of Authentication mechanism, and in this mechanism, encryption key and decruption key have nothing in common with each other, and can only decipher with corresponding with it private key with the data of public key encryption.The digital signature of PKI mechanism had both guaranteed the confidentiality of information, guaranteed that again information has non repudiation, its principle is: at first will obtain digital signature expressly with the side's of being verified private key signature, then digital signature is sent to authentication, authentication is verified with the PKI of the side of being verified.
Compare with the certification mode of traditional " usemame/password ", the certification mode of this double factor can be guaranteed the fail safe and the reliability of whole authentication process more effectively.
At present, the CD ROM of USB interface possesses the function of automatic operation on the market, and is very easy to use.Recently, the intelligent cipher key equipment that possesses AutoPlay function also emerges.But the user can keep some relevant informations on the computer after using intelligent cipher key equipment, be unfavorable for protecting user's privacy and information security, and taken unnecessary system space.
Summary of the invention
The present invention provides the intelligent key system and the method for work thereof of a kind of automatic monitoring and cleaning in order to solve privacy of user and the incomplete problem of information safety protection of using intelligent cipher key equipment to bring in the prior art.Described technical scheme is as follows:
The system of a kind of automatic monitoring and cleaning intelligent cipher key equipment relevant information, described system comprises:
Device A: be used to make intelligent cipher key equipment and computer to connect;
Device B: be used to make described intelligent cipher key equipment to start automatic running program;
Device C: be used for making described automatic running program to install or load monitoring program and liquidation procedures to described computer:
Device D: be used to make the described automatic running program described monitoring program of operation automatically;
Device E: be used to make described monitoring program to check whether described intelligent cipher key equipment is connected with described computer disconnection; If call liquidation procedures automatically and clear up the information of leaving over after the described intelligent cipher key equipment operation and from computer, unload described liquidation procedures self; Otherwise, continue to check.
The described information of leaving over comprises install software, load software, cookie record, browser access record or file access information.
The present invention provides the method for work of the intelligent key system of a kind of automatic monitoring and cleaning simultaneously, said method comprising the steps of:
Steps A: intelligent cipher key equipment and computer connect;
Step B: described intelligent cipher key equipment starts automatic running program;
Step C: described automatic running program installation or loading monitoring program and liquidation procedures are in described computer;
Step D: move described monitoring program;
Step e: described monitoring program checks whether described intelligent cipher key equipment is connected with described computer disconnection; If call liquidation procedures automatically and clear up the information of leaving over after the described intelligent cipher key equipment operation and from computer, unload described monitoring program and described liquidation procedures self; Otherwise, continue to check.
The described information of leaving over comprises the install software relevant with intelligent cipher key equipment, load software, cookie record, browser access record or file access information.
The beneficial effect that technical scheme of the present invention is brought is:
The automatic monitoring that the application of the invention provides and the intelligent key system of cleaning and method of work thereof; not only can be greatly user-friendly; also can remove file and the private information left over after the user uses a computer, thus protection user's individual privacy and information security.
Description of drawings
Fig. 1 is a kind of automatic monitoring that provides of the embodiment of the invention 1 and the intelligent key system functional structure chart of cleaning;
Fig. 2 is the method flow diagram of the realization AutoPlay function that provides of the embodiment of the invention 1;
Fig. 3 is the realization that provides of the embodiment of the invention 2 method flow diagram of monitoring and clearing function automatically;
Fig. 4 is the realization that provides of the embodiment of the invention 3 method flow diagram of monitoring and clearing function automatically.
Embodiment
The invention will be further described below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
The invention provides the intelligent key system of a kind of automatic monitoring and cleaning, this system not only has AutoPlay function, can also be connected the follow-up cleaning work of back execution at intelligent cipher key equipment and computer disconnection.Simultaneously, the present invention also provides the method for work of the intelligent key system of a kind of automatic monitoring and cleaning.
Embodiment 1
Referring to Fig. 1, the intelligent key system 10 of a kind of automatic monitoring and cleaning is provided, this system also comprises automatic operation module 101, monitoring module 102 and cleaning module 103 except comprising intelligent key functional module 100.The intelligent key functional module mainly comprises control submodule and sub module stored.
Wherein, after moving module 101 automatically and being used for intelligent cipher key equipment and computer and connecting, carry out AutoPlay function, automatic running program, install software etc.
Monitoring module 102 be used for the monitoring intelligent key whether remove with computer be connected monitoring program of this module stores.
Cleaning module 103 is used for intelligent cipher key equipment and machine solution remove annexation after, remove store on computers with this intelligent cipher key equipment relevant information.The relevant information here refers to the accessing operation information and the installed software that produce in the use process.This module can be stored a liquidation procedures.
Present embodiment is realized AutoPlay function by operation autorun.inf file, and the principle of this AutoPlay function is that a part of storage area with intelligent cipher key equipment marks, and is used for depositing the autorun.inf file.This autorun.inf file has carried out corresponding setting in advance, makes it point to specific program or file.After connecting devices to computer, computer is identified as CD ROM with this part storage area.Wherein, this part zone of depositing the autorun.inf file can't write data to this part for read-only memory block.At first device descriptor is reported as CD ROM when initialization is enumerated, system just can carry out the autorun.inf file like this.After finishing, system need enumerate equipment again, and device descriptor is reported as intelligent cipher key equipment, thereby realizes AutoPlay function.
Referring to Fig. 2, be operation and the method that the intelligent cipher key equipment realization AutoPlay function among the embodiment 1 is set, this method may further comprise the steps:
Step 201: a part of storage area that marks off intelligent cipher key equipment;
Step 202: in above-mentioned zone, deposit the autorun.inf file;
Step 203: the autorun.inf file is set, makes it point to specific program or file;
Step 204: intelligent cipher key equipment is connected with main frame;
Step 205: when initialization is enumerated, above-mentioned zone is reported as CD ROM;
Step 206: carry out the autorun.inf file, realize operation automatically.
For fear of the user after using a computer on computers face leave over unnecessary information and protection individual subscriber privacy, finish the function of follow-up cleaning work after intelligent key system of the present invention can also be implemented in intelligent cipher key equipment and the computer disconnection is connected automatically.So-called cleaning automatically is exactly after hardware device is pulled out, automatically to unload the process of (or deletion) before by this equipment installed software.Realize automatic clearing function, can adopt multiple distinct methods.
Embodiment 2
Referring to Fig. 3, the intelligent key system that Application Example 1 provides is realized the method for automatic clearing function.This method may further comprise the steps:
Step 301: intelligent cipher key equipment and computer connect;
Step 302: start automatic running program A;
Step 303: program A installs (as carrying out operations such as xcopy and modification registration table), comprises that program B and the program C that will be stored on the intelligent cipher key equipment are installed on the computer;
Step 304: whether working procedure B, program B monitoring intelligent key devices disconnect and being connected of computer; If no, then program B continues monitoring; Otherwise, execution in step 305; Program A is out of service;
Step 305: start-up routine C carries out cleaning operation, and program B is out of service, and program C will installed software program (comprising program B) unload in step 303;
Step 306: program C is out of service.At last, before program C was out of service fully, it also will also clean out himself.
In said process, program B and program C are installed in the temp directory on the hard disc of computer, and program A is an automatic running program, moves on intelligent cipher key equipment, and program B is a monitoring program, and program C is a liquidation procedures.
Embodiment 3
Referring to Fig. 4, the intelligent key system that Application Example 1 provides is realized the method for automatic clearing function.This method may further comprise the steps;
Step 401: intelligent cipher key equipment and computer connect;
Step 402: start automatic running program A;
Step 403: program A installs (as carrying out operation or loading monitoring programs such as xcopy and modification registration table), comprises by the computer network connection from long-range program B and program C being installed on the computer;
Step 404: start working procedure B, program A is out of service;
Step 405: whether program B monitoring intelligent key devices is connected with the computer disconnection; If no, then program B continues monitoring; Otherwise, execution in step 406;
Step 406: start working procedure C, program B is out of service;
Step 407: program C carries out cleaning operation, will installed software program (comprising program B) unloading in step 403.
Step 408: program C withdraws from and is out of service.At last, before program C was out of service fully, it also will also clean out himself.
In said process, program B and program C are installed in the temp directory on the hard disc of computer, and program A is an automatic running program, moves on intelligent cipher key equipment, and program B is a monitoring program, and program C is a liquidation procedures.In addition, above-mentioned cleaning operation can also comprise deletion cookie, remove browser access record and file access information.
Monitoring program and liquidation procedures can also be after intelligent cipher key equipment and computer connect (comprising wireless connections), connect from long-range load operating respectively by computer network, after monitoring program monitored intelligent cipher key equipment and the computer disconnection is connected, liquidation procedures was carried out corresponding cleaning operation.
More than the intelligent key system and the method for work thereof of a kind of automatic monitoring provided by the present invention and cleaning is described in detail, used specific case herein principle of the present invention and execution mode are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, the change of being carried out in specific embodiments and applications is all in protection scope of the present invention.In sum, to should not be construed as be limitation of the present invention to this description.

Claims (4)

1. automatic system of monitoring and cleaning intelligent cipher key equipment relevant information is characterized in that system comprises as lower device:
Device A: be used to make intelligent cipher key equipment and computer to connect;
Device B: be used to make described intelligent cipher key equipment to start automatic running program;
Device C: be used for making described automatic running program installation or loading monitoring program and liquidation procedures to described computer;
Device D: be used to make the described automatic running program described monitoring program of operation automatically;
Device E: be used to make described monitoring program to check whether described intelligent cipher key equipment is connected with described computer disconnection; If call liquidation procedures automatically and clear up the information of leaving over after the described intelligent cipher key equipment operation and from computer, unload described liquidation procedures self; Otherwise, continue to check.
2. the system of automatic monitoring as claimed in claim 1 and cleaning intelligent cipher key equipment relevant information is characterized in that, the described information of leaving over comprises install software, load software, cookie record, browser access record or file access information.
3. a method of monitoring and clearing up the intelligent cipher key equipment relevant information automatically is characterized in that, said method comprising the steps of:
Steps A: intelligent cipher key equipment and computer connect;
Step B: described intelligent cipher key equipment starts automatic running program;
Step C: described automatic running program installation or loading monitoring program and liquidation procedures are in described computer;
Step D: move described monitoring program;
Step e: described monitoring program checks whether described intelligent cipher key equipment is connected with described computer disconnection; If call liquidation procedures automatically and clear up the information of leaving over after the described intelligent cipher key equipment operation and from computer, unload described monitoring program and described liquidation procedures self; Otherwise, continue to check.
4. the method for automatic monitoring as claimed in claim 3 and cleaning intelligent cipher key equipment relevant information, it is characterized in that the described information of leaving over comprises the install software relevant with intelligent cipher key equipment, load software, cookie record, browser access record or file access information.
CN2006101443356A 2006-12-04 2006-12-04 Automatic monitoring and cleaning intelligent key system and working method thereof Active CN1976279B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2006101443356A CN1976279B (en) 2006-12-04 2006-12-04 Automatic monitoring and cleaning intelligent key system and working method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2006101443356A CN1976279B (en) 2006-12-04 2006-12-04 Automatic monitoring and cleaning intelligent key system and working method thereof

Publications (2)

Publication Number Publication Date
CN1976279A CN1976279A (en) 2007-06-06
CN1976279B true CN1976279B (en) 2010-10-06

Family

ID=38126096

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006101443356A Active CN1976279B (en) 2006-12-04 2006-12-04 Automatic monitoring and cleaning intelligent key system and working method thereof

Country Status (1)

Country Link
CN (1) CN1976279B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014015B (en) * 2010-06-29 2012-10-03 飞天诚信科技股份有限公司 Self-checking method of intelligent secret key equipment
CN104331488B (en) * 2014-11-13 2018-04-10 北京奇虎科技有限公司 File clean-up method, apparatus and equipment based on suspended window

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2524296Y (en) * 2002-01-31 2002-12-04 广州理想资讯科技有限公司 Digital sign identifying devices
CN1609829A (en) * 2003-10-24 2005-04-27 英业达股份有限公司 Plug-and-play method for USB equipment under linux operation system
CN1801122A (en) * 2004-12-31 2006-07-12 联想(北京)有限公司 Method for controlling automatic running program in USB memory and USB memory thereof
CN1838142A (en) * 2006-04-29 2006-09-27 北京飞天诚信科技有限公司 USB device with data memory and intelligent secret key and control method thereof
CN1851679A (en) * 2006-05-30 2006-10-25 北京飞天诚信科技有限公司 USB device automatic initialization method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2524296Y (en) * 2002-01-31 2002-12-04 广州理想资讯科技有限公司 Digital sign identifying devices
CN1609829A (en) * 2003-10-24 2005-04-27 英业达股份有限公司 Plug-and-play method for USB equipment under linux operation system
CN1801122A (en) * 2004-12-31 2006-07-12 联想(北京)有限公司 Method for controlling automatic running program in USB memory and USB memory thereof
CN1838142A (en) * 2006-04-29 2006-09-27 北京飞天诚信科技有限公司 USB device with data memory and intelligent secret key and control method thereof
CN1851679A (en) * 2006-05-30 2006-10-25 北京飞天诚信科技有限公司 USB device automatic initialization method and device

Also Published As

Publication number Publication date
CN1976279A (en) 2007-06-06

Similar Documents

Publication Publication Date Title
US8122172B2 (en) Portable information security device
CN101436233B (en) Hard disk multi-user partition switch control method, system and computer terminal
EP2159727B1 (en) Securing a device based on atypical user behavior
CN101568119A (en) Mobile terminal with antitheft function and antitheft method thereof
JP2001290776A (en) Data processing system and data processing method for restoring basic password remotely
EP2350862B1 (en) Method and apparatus for access to a computer unit
US7788717B2 (en) Apparatus, system, and method for selectively enabling a power-on password
US20080092217A1 (en) Environment migration system, terminal apparatus, information processing apparatus, management server, and portable storage medium
WO2008003175A1 (en) One time password access to portable credential entry and memory storage devices
WO2007007397A1 (en) Sharing management program, sharing management method, terminal, and sharing management system
CN101673330A (en) BIOS-based computer security protection method and system
CN107403152A (en) High-pass platform TrustZone fingerprint recognition realization method and systems
US10796027B2 (en) Methods and a system for secure data storage
CN1976279B (en) Automatic monitoring and cleaning intelligent key system and working method thereof
CN101217399B (en) A data card background system and the corresponding operating method
CN101025769B (en) Multi-user safety chip resource allocation method and muiti-user safety system
CN110673863B (en) Intelligent lock system supporting pluggable external storage and intelligent upgrading method
TWM356972U (en) Portable storage device with local and remote identity recognition function
JP4561213B2 (en) Hard disk security management system and method thereof
CN111914311B (en) Hard disk password management method and device, electronic equipment and storage medium
CN110569075B (en) Switching method of multiple operating systems
CN2896370Y (en) Intelligent key device
JP2002304231A (en) Computer system
CN101640595B (en) Method, device and system for controlling switching of isolation card
CN104598784A (en) Information processing method and electronic device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: FEITIAN CHENGXIN TECHNOLOGIES CO., LTD.

Free format text: FORMER NAME: BEIJING FEITIAN CHENGXIN SCIENCE + TECHNOLOGY CO. LTD.

CP03 Change of name, title or address

Address after: 100085 Beijing city Haidian District Xueqing Road No. 9 Ebizal building B block 17 layer

Patentee after: Feitian Technologies Co., Ltd.

Address before: 100083, Haidian District, Xueyuan Road, No. 40 research, 7 floor, 5 floor, Beijing

Patentee before: Beijing Feitian Chengxin Science & Technology Co., Ltd.