CN202009397U - Remote fingerprint USB (Universal Serial Bus) flash disk erasion system - Google Patents
Remote fingerprint USB (Universal Serial Bus) flash disk erasion system Download PDFInfo
- Publication number
- CN202009397U CN202009397U CN2011200321201U CN201120032120U CN202009397U CN 202009397 U CN202009397 U CN 202009397U CN 2011200321201 U CN2011200321201 U CN 2011200321201U CN 201120032120 U CN201120032120 U CN 201120032120U CN 202009397 U CN202009397 U CN 202009397U
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- server
- disk
- database
- erasion
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The utility model relates to the field of information security. A remote fingerprint USB flash disk erasion system relates to a fingerprint USB flash disk, system databases are divided into an intranet database and an extranet database which are synchronized by program control data, servers are divided into an intranet server and an extranet server, the intranet server is connected with the extranet server through signals, and is connected with the intranet database, and the extranet server is connected with the extranet database and fingerprint USB flash disk clients. The system is simple, and since the databases are divided into the intranet database and the extranet database which are synchronized by the program control data, the security of data is sufficiently guaranteed. Since the servers are divided into the intranet server and the extranet server, each erasion instruction is verified by the two servers, and is executed only after passing verification. Each fingerprint USB flash disk erasion code is generated randomly, consequently, the security of erasion is guaranteed, unauthorized erasion is prevented, and the system can remotely erase files in the security zone by utilizing a network, and can protect the private information of users.
Description
Technical field
The utility model relates to information security field, particularly fingerprint U disk information security management.
Background technology
Fingerprint U disk is according to content in the identification of fingerprint USB flash disk, improves the USB flash disk of computer information safe keyholed back plate, because multifunctional fingerprint of providing keyholed back plate software is provided for it, increases USB flash disk content protecting level; Identification of fingerprint is convenient, accurate, quick; Characteristics such as system's support extensively need not to drive the length of run preface, and operation-interface is simple, and is easy to use can be as the data that store confidentiality, as the carrier of PKI key and company data.But when providing convenience, the security performance of fingerprint U disk itself also needs to protect relatively, and does not still have relevant art in this regard at present.
Summary of the invention
The purpose of this utility model is to overcome above-mentioned not enough problem, and a kind of fingerprint U disk remote destroying system is provided, and system is simple, and Long-distance Control fingerprint U disk safety makes fingerprint U disk more safe and reliable.
The technical scheme that the utility model is adopted for achieving the above object is: fingerprint U disk remote destroying system, system relates to fingerprint U disk, system database is divided into intranet data storehouse and outer grid database, synchronous by program control data, network server and outer network server in server is divided into, interior network server is connected with the outer net server signal, and interior network server is connected with the intranet data storehouse, outer network server is connected with outer grid database, and outer network server connects the fingerprint U disk client.
Network server and super Administrator Client are by network interconnection in described.
Two memory spaces in open district and place of safety are arranged in the described fingerprint U disk, and the place of safety is the memory block that could visit by finger-print cipher.
The utility model system is simple, and database is divided into intranet data storehouse and outer grid database, and is synchronous by program control data, fully ensured safety of data.Network server and outer network server in server is divided into are destroyed to instruct for every and all can be passed through 2 server authentications, confirm just can carry out after errorless.Each fingerprint U disk all has different destruction sign indicating numbers, destroys sign indicating number and generates at random, has ensured the fail safe of destroying, and has stopped illegal destruction.The destruction process of client is finished by the system backstage, and the interface does not have any response, finishes the destruction process unconsciously.What the destruction mode adopted is management of electronic documents software application system design standard (No. 5015.2 standard of U.S. Department of Defense), and 7 layers of file are pulverized and can be guaranteed that your data is not leaked.Super keeper can check the state and the destruction degree of each fingerprint U disk at any time, can also stop destroying.Final realization utilizes the file in the network remote destruction place of safety, can protect user's privacy information.
Description of drawings:
Fig. 1 is the utility model system architecture diagram.
Fig. 2 is the utility model Shredding Process block diagram.
Embodiment:
Fingerprint U disk remote destroying system as shown in Figure 1, system relates to fingerprint U disk, two memory spaces in open district and place of safety are arranged in the fingerprint U disk, the place of safety is the memory block that could visit by finger-print cipher, system database is divided into intranet data storehouse and outer grid database, synchronous by program control data, network server and outer network server in server is divided into, interior network server is connected with the outer net server signal, interior network server is connected with the intranet data storehouse, outer network server is connected with outer grid database, and outer network server connects the fingerprint U disk client, and interior network server and super Administrator Client are by network interconnection.
Remote destroying is opened the service of destruction by the website, as shown in Figure 2, software can be pointed out when opening back startup fingerprint U disk client, when the user one who finds fingerprint U disk opens software, the fingerprint U disk backstage just is connected on the outer network server automatically, outer network server is by interconnecting with outer grid database, detect legitimacy, again by double-deck server authentication, give interior network server after outer network server detects message transmission, interior network server is by interconnecting with the intranet data storehouse, detect legitimacy, and will verify that the result feeds back to outer network server, outer network server sends instruction according to the checking result, if be proved to be successful, need to destroy, promptly destroy, be i.e. remote format place of safety and make software failure, if need not destroy, then notify the client can relieved use fingerprint U disk
Claims (3)
1. fingerprint U disk remote destroying system, relate to fingerprint U disk, it is characterized in that: system database is divided into intranet data storehouse and outer grid database, synchronous by program control data, network server and outer network server in server is divided into, interior network server is connected with the outer net server signal, and interior network server is connected with the intranet data storehouse, outer network server is connected with outer grid database, and outer network server connects the fingerprint U disk client.
2. fingerprint U disk remote destroying according to claim 1 system is characterized in that: network server and super Administrator Client are by network interconnection in described.
3. fingerprint U disk remote destroying according to claim 1 and 2 system, it is characterized in that: two memory spaces in open district and place of safety are arranged in the fingerprint U disk, and the place of safety is the memory block that could visit by finger-print cipher.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011200321201U CN202009397U (en) | 2011-01-30 | 2011-01-30 | Remote fingerprint USB (Universal Serial Bus) flash disk erasion system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011200321201U CN202009397U (en) | 2011-01-30 | 2011-01-30 | Remote fingerprint USB (Universal Serial Bus) flash disk erasion system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN202009397U true CN202009397U (en) | 2011-10-12 |
Family
ID=44751049
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011200321201U Expired - Fee Related CN202009397U (en) | 2011-01-30 | 2011-01-30 | Remote fingerprint USB (Universal Serial Bus) flash disk erasion system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN202009397U (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102571823A (en) * | 2012-02-27 | 2012-07-11 | 深圳趋势数码科技有限公司 | Remote security protection method for data of flash disk |
CN107679608A (en) * | 2017-08-25 | 2018-02-09 | 芜湖市振华戎科智能科技有限公司 | Combine locking-type secrecy USB flash disk device |
CN107679607A (en) * | 2017-08-25 | 2018-02-09 | 芜湖市振华戎科智能科技有限公司 | Exclusive personal encrypted u disk |
CN108875884A (en) * | 2018-06-11 | 2018-11-23 | 广州东为智能技术有限公司 | A kind of fingerprint U disk and its man-machine interaction method |
-
2011
- 2011-01-30 CN CN2011200321201U patent/CN202009397U/en not_active Expired - Fee Related
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102571823A (en) * | 2012-02-27 | 2012-07-11 | 深圳趋势数码科技有限公司 | Remote security protection method for data of flash disk |
CN107679608A (en) * | 2017-08-25 | 2018-02-09 | 芜湖市振华戎科智能科技有限公司 | Combine locking-type secrecy USB flash disk device |
CN107679607A (en) * | 2017-08-25 | 2018-02-09 | 芜湖市振华戎科智能科技有限公司 | Exclusive personal encrypted u disk |
CN108875884A (en) * | 2018-06-11 | 2018-11-23 | 广州东为智能技术有限公司 | A kind of fingerprint U disk and its man-machine interaction method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107947922B (en) | Digital file management method and system based on block chain technology | |
CN102624699B (en) | Method and system for protecting data | |
CN103701611B (en) | Method for accessing and uploading data in data storage system | |
CN104081409B (en) | Method for protecting computing device | |
CN101364984B (en) | Method for guarantee safety of electronic file | |
CN105740725B (en) | A kind of document protection method and system | |
CN202795383U (en) | Device and system for protecting data | |
CN101923678A (en) | Data security protection method of enterprise management software | |
CN101635018A (en) | Method of safety ferriage of USB flash disk data | |
CN104085203A (en) | Portable intelligent digital seal | |
CN106533693B (en) | Access method and device of railway vehicle monitoring and overhauling system | |
CN103530559A (en) | Integrity protection system of Android system | |
CN104021332A (en) | Method for performing identity authentication and file encryption and decryption based on fingerprint UsbKey | |
CN202009397U (en) | Remote fingerprint USB (Universal Serial Bus) flash disk erasion system | |
CN102316449A (en) | Security terminal system and authentication and interruption method thereof | |
CN102799831A (en) | Information safety protection system of application system based on database and information safety protection method | |
CN110402440B (en) | Segmented key authentication system | |
CN101694683A (en) | Method for preventing Trojans ferrying via movable memories to steal files | |
CN102831335A (en) | Safety protecting method and safety protecting system of Windows operating system | |
CN104363093A (en) | Method for encrypting file data by dynamic authorization code | |
CN104680054A (en) | RFID (radio frequency identification devices) data processing method | |
CN106533678A (en) | Multi-signature-based login method and system thereof | |
CN107273725A (en) | A kind of data back up method and system for classified information | |
CN115017480A (en) | Computer safety protection management and control system based on intelligent control | |
CN104683285A (en) | Network-based secret-related controllable U disk system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20111012 Termination date: 20120130 |