CN204539201U - One lands safely verification system - Google Patents
One lands safely verification system Download PDFInfo
- Publication number
- CN204539201U CN204539201U CN201520249657.1U CN201520249657U CN204539201U CN 204539201 U CN204539201 U CN 204539201U CN 201520249657 U CN201520249657 U CN 201520249657U CN 204539201 U CN204539201 U CN 204539201U
- Authority
- CN
- China
- Prior art keywords
- module
- output
- microprocessor
- verification system
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
The utility model discloses one and land safely verification system, comprise client and mobile terminal; Described client comprises subscriber interface module, first microprocessor module, secret generation module, memory module, encryption chip, wireless transmitter module and password matching module; Subscriber interface module is connected with secret generation module, encryption chip, wireless transmitter module successively by first microprocessor module; Secret generation module is also connected with memory module, the input of password matching module and memory module and first microprocessor model calling, and its output is connected with subscriber interface module; Mobile terminal comprises wireless receiving module, the second microprocessor module, deciphering chip and display module, wireless receiving module is connected with the output of wireless transmitter module, and wireless receiving module is connected successively with the second microprocessor module, deciphering chip, display module.The utility model structure is simple, easy to carry, fail safe is high lands safely verification system.
Description
Technical field
The utility model relates to computer security field, particularly relates to a kind of for landing safely verification system in the equipment such as computer.
Background technology
Along with the progress of science and technology society, increasing people uses computer more and more universal in live and work, a lot of individual privacies or the valuable information in working all are stored in computer equipment, due to the carelessness of user or the rank of computer security system lower, cause the leakage of vital document or classified document or maliciously stolen, thus causing the loss that cannot retrieve, the security setting therefore strengthening computer login just seems particularly important.
In prior art, in order to protect the safety of computer internal information, fairly simple guard method is log in password by setting to prevent illegally logging in of computer, just only take correct password can open computer, and reads the data information in computer; More senior safety verification technology is fingerprint technique, iris technology etc., but this computer opening ways utilizing computer owner unique features, although in use fail safe is higher, but these class methods are except me, other people cannot log in, therefore the owner of computer cannot ask others to replace him to open computer, causes very large inconvenience, particularly in enterprise.
Summary of the invention
In order to solve the problem, the purpose of this utility model is to provide that a kind of structure is simple, easy to carry, fail safe is high lands safely verification system, effectively can prevent the leakage of the file in computer equipment or maliciously be stolen.
The utility model adopts following technical scheme:
One lands safely verification system, comprises client and mobile terminal; Described client comprises subscriber interface module, first microprocessor module, secret generation module, memory module, encryption chip, wireless transmitter module and password matching module; Described subscriber interface module is connected with secret generation module by first microprocessor module, the output of secret generation module is connected with the input of wireless transmitter module by encryption chip, the output of described secret generation module is also connected with the data transmission terminal of memory module, the input of described password matching module is connected with memory module data transmission terminal and the output of first microprocessor module connects, and its output is connected with subscriber interface module; Described mobile terminal comprises wireless receiving module, the second microprocessor module, deciphering chip and display module, the output wireless connections of the wireless transmitter module in the input of described wireless receiving module and client, the output of described wireless receiving module is connected with deciphering chip by the second microprocessor module, and the output of deciphering chip is connected with display module.
Further, described client is computer, and it also comprises Keysheet module, and the output of described Keysheet module is connected with the input of first microprocessor module, for key feeding cipher in system.
Further, described mobile terminal comprises ring care and ring face; It is inner that described wireless receiving module, the second microprocessor module, deciphering chip are arranged on ring face, and described display module is arranged on ring face on the surface.
Further, described display module is LED display module, comprises the light-emitting diode display of multiple independent distribution.
Further, described light-emitting diode display is digital display or alphascope.
Further, described mobile terminal module also comprises jtag interface, for arranging the parameter in mobile terminal module.
The beneficial effects of the utility model:
The utility model structure is simple, fail safe is high, random Crypted password is produced by client, and being sent to mobile terminal by wireless transmitter module, the deciphering chip in mobile terminal is decrypted the Crypted password received, and is shown by LED display module; What mobile terminal in the utility model adopted is finger ring type structure, user friendlyly carries with, and profile is exquisite, while playing protection system safety, also has decoration function.
Further, LED display module of the present utility model, by being designed to multiple independent light-emitting diode display, for the display password that distributes, only being known that password reads the people of rule, could effectively be read, play the benefit strengthening password cracking difficulty.
Further, mobile terminal of the present utility model is provided with jtag interface, conveniently carries out optimum configurations to it, improves the intellectuality of system.
Accompanying drawing explanation
Fig. 1 is the structural representation of a kind of embodiment of the utility model;
Fig. 2 is the principle schematic of a kind of embodiment of the utility model.
Embodiment
Below in conjunction with the accompanying drawing in the utility model embodiment, be clearly and completely described the technical scheme in the utility model embodiment, obviously, described embodiment is only the utility model part embodiment, instead of whole embodiments.Based on the embodiment in the utility model, those of ordinary skill in the art are not making the every other embodiment obtained under creative work prerequisite, all belong to the scope of the utility model protection.
As illustrated in fig. 1 and 2, one lands safely verification system, comprises client and mobile terminal, described client comprises subscriber interface module 1, first microprocessor module 2, secret generation module 3, memory module 4, encryption chip 5, wireless transmitter module 6 and password matching module 7, described subscriber interface module 1 is connected with secret generation module 3 by first microprocessor module 2, the output of secret generation module 3 is connected with the input of wireless transmitter module 6 by encryption chip 5, the output of described secret generation module 3 is also connected with the data transmission terminal of memory module 4, user is by clicking the button in subscriber interface module 1, send password generation instruction and generate random cipher to secret generation module 3, random cipher is sent in encryption chip 5 and memory module 4, after encryption chip 5 is encrypted the random cipher produced, sent by wireless transmitter module 6, the input of described password matching module 7 is connected with memory module 4 data transmission terminal and the output of first microprocessor module 2 connects, its output is connected with subscriber interface module 1, whether the password for match user being inputted is consistent with the random cipher that system generates, if consistent, then direct login system, if inconsistent, then user interface display " logging in unsuccessful ", described mobile terminal comprises wireless receiving module 8, second microprocessor module 9, deciphering chip 10 and display module 11, the output wireless connections of the wireless transmitter module 6 in the input of described wireless receiving module 8 and client, the output of described wireless receiving module 8 is connected with deciphering chip 10 by the second microprocessor module 9, the output of deciphering chip is connected with display module 11, wireless receiving module 8 in mobile terminal receives the Crypted password that wireless transmitter module 6 launches, and send this Crypted password to deciphering chip 10, after the Crypted password entering encryption is deciphered by deciphering chip 10, be sent to LED display module, by LED display module, password is shown, user directly can carry out Password Input by the numeric keypad clicked in subscriber interface module 1.Wireless transmitter module 6 and the wireless receiving module 8 of this practical embodiment are 3G wireless module; What the encryption chip in the present embodiment adopted is DM2016 chip, and what deciphering chip adopted is SK24C16 chip.
Preferably, described client is computer, it also comprises Keysheet module 12, the output of described Keysheet module 12 is connected with the input of first microprocessor module 2, for key feeding cipher in system, user by identifying the encrypted message in LED display module, by keyboard output password, thus open system, facilitate the operation of user.
In the present embodiment, described mobile terminal comprises ring care and ring face; It is inner that described wireless receiving module 8, second microprocessor module 9, deciphering chip 10 are arranged on ring face, described display module 11 is arranged on ring face on the surface, display module in the present embodiment is LED display module, comprise the light-emitting diode display 13 of multiple independent distribution, light-emitting diode display 13 is digital display or alphascope.This design outline is exquisite, and structure is simple, and is convenient for carrying.
In the present embodiment, described mobile terminal module also comprises jtag interface, for arranging the parameter in mobile terminal module, substantially increases intellectuality of the present utility model, different parameters can be set arbitrarily to change the operating state of utility model, effectively improve security performance.
To those skilled in the art, obvious the utility model is not limited to the details of above-mentioned one exemplary embodiment, and when not deviating from spirit of the present utility model or essential characteristic, can realize the utility model in other specific forms.Therefore, no matter from which point, all should embodiment be regarded as exemplary, and be nonrestrictive, scope of the present utility model is limited by claims instead of above-mentioned explanation, and all changes be therefore intended in the implication of the equivalency by dropping on claim and scope are included in the utility model.Any Reference numeral in claim should be considered as the claim involved by limiting.
In addition, be to be understood that, although this specification is described according to execution mode, but not each execution mode only comprises an independently technical scheme, this narrating mode of specification is only for clarity sake, those skilled in the art should by specification integrally, and the technical scheme in each embodiment also through appropriately combined, can form other execution modes that it will be appreciated by those skilled in the art that.
Claims (6)
1. land safely a verification system, it is characterized in that: comprise client and mobile terminal; Described client comprises subscriber interface module (1), first microprocessor module (2), secret generation module (3), memory module (4), encryption chip (5), wireless transmitter module (6) and password matching module (7); Described subscriber interface module (1) is connected with secret generation module (3) by first microprocessor module (2), the output of secret generation module (3) is connected with the input of wireless transmitter module (6) by encryption chip (5), and the output of described secret generation module (3) is also connected with the data transmission terminal of memory module (4); The input of described password matching module (7) is connected with memory module (4) data transmission terminal and the output of first microprocessor module (2) connects, and its output is connected with subscriber interface module (1); Described mobile terminal comprises wireless receiving module (8), the second microprocessor module (9), deciphering chip (10) and display module (11), the output wireless connections of the wireless transmitter module (6) in the input of described wireless receiving module (8) and client, the output of described wireless receiving module (8) is connected with deciphering chip (10) by the second microprocessor module (9), and the output of deciphering chip (10) is connected with display module (11).
2. one according to claim 1 lands safely verification system, it is characterized in that: described client is computer, it also comprises Keysheet module (12), the output of described Keysheet module (12) is connected with the input of first microprocessor module (2), for key feeding cipher in system.
3. one according to claim 1 lands safely verification system, it is characterized in that: described mobile terminal comprises ring care and ring face; It is inner that described wireless receiving module (8), the second microprocessor module (9) and deciphering chip (10) are arranged on ring face; Described display module (11) is arranged on ring face on the surface.
4. one according to claim 3 lands safely verification system, it is characterized in that: described display module (11) is LED display module, comprises the light-emitting diode display (13) of multiple independent distribution.
5. one according to claim 4 lands safely verification system, it is characterized in that: described light-emitting diode display (13) is digital display or alphascope.
6. one according to claim 1 lands safely verification system, it is characterized in that: described mobile terminal module also comprises jtag interface, for arranging the parameter in mobile terminal module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201520249657.1U CN204539201U (en) | 2015-04-22 | 2015-04-22 | One lands safely verification system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201520249657.1U CN204539201U (en) | 2015-04-22 | 2015-04-22 | One lands safely verification system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN204539201U true CN204539201U (en) | 2015-08-05 |
Family
ID=53753157
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201520249657.1U Expired - Fee Related CN204539201U (en) | 2015-04-22 | 2015-04-22 | One lands safely verification system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN204539201U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109492409A (en) * | 2018-09-28 | 2019-03-19 | 内蒙古师范大学 | A kind of security of computer software encryption handling system |
-
2015
- 2015-04-22 CN CN201520249657.1U patent/CN204539201U/en not_active Expired - Fee Related
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109492409A (en) * | 2018-09-28 | 2019-03-19 | 内蒙古师范大学 | A kind of security of computer software encryption handling system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2014083335A3 (en) | A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors | |
CN104253694A (en) | Encrypting method for network data transmission | |
CN101043326B (en) | Dynamic information encrypting system and method | |
CN102419805A (en) | Terminal equipment and method for encrypting user information | |
CN105656621A (en) | Safety management method for cryptographic device | |
CN108234458A (en) | Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher | |
CN102664898A (en) | Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system | |
CN104270242A (en) | Encryption and decryption device used for network data encryption transmission | |
CN104182676A (en) | Intelligent terminal data encryption method and device | |
CN204180095U (en) | A kind of ciphering and deciphering device for network data encryption transmission | |
CN105450419A (en) | Method, device and system | |
CN106548054A (en) | It is a kind of towards PC and mobile terminal without driving personal identification number management method and equipment | |
CN106936763A (en) | Data encryption and the method and apparatus of decryption | |
CN102572750A (en) | Method and terminal for protecting short messages | |
CN204539201U (en) | One lands safely verification system | |
CN105847261B (en) | A kind of electronic signature method based on the wireless encryption and decryption of bluetooth | |
CN104036204A (en) | Touch-tone encrypted safety USB (universal serial bus) flash disk | |
CN106452754B (en) | Multi-user online dynamic encryption method and device | |
CN102868705B (en) | Device for achieving network login certification by using dynamic passwords and using method of device | |
CN101299664B (en) | Cryptosystem transmitting key through collision | |
CN204028917U (en) | A kind of Bluetooth encryption device and application for network payment | |
CN106372541A (en) | U disk security encryption management method | |
CN105282738A (en) | Security authentication method for mobile terminal | |
CN102902903B (en) | A kind of ecommerce intelligent code key with button and its implementation | |
CN102270182A (en) | Encrypted mobile storage equipment based on synchronous user and host machine authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150805 Termination date: 20200422 |