CN206097120U - Sound authentication safety key dish with self -destruction function - Google Patents
Sound authentication safety key dish with self -destruction function Download PDFInfo
- Publication number
- CN206097120U CN206097120U CN201620570709.XU CN201620570709U CN206097120U CN 206097120 U CN206097120 U CN 206097120U CN 201620570709 U CN201620570709 U CN 201620570709U CN 206097120 U CN206097120 U CN 206097120U
- Authority
- CN
- China
- Prior art keywords
- module
- sound
- recognition unit
- voice recognition
- self
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Lock And Its Accessories (AREA)
- Storage Device Security (AREA)
Abstract
The utility model discloses a sound authentication safety key dish with self -destruction function, including controller, the memory area that is used for storing user data and voice recognition unit, voice recognition unit and memory area are connected to the controller to voice recognition unit connects the memory area, is provided with the safety zone in the memory area, is provided with in the controller to be used for the kibbling destruction module of the data in the safety zone, and the voice recognition unit connection triggers the destruction module. Be provided with the biggest number of times module and statistics module in the controller module, statistics module is connected to the biggest number of times module, and statistics module connects voice recognition unit, and statistics module connection and trigger the destruction module. Its the biggest number of times can freely be set for to the biggest number of times module. The utility model discloses an it prevents that lawless persons from stealing the back with the key dish, the outflow of important information in the key dish, the security that improves the key dish to smash the safety zone in the memory area.
Description
Technical field
This utility model belongs to movable storage device field, and more specifically to a kind of sound with self-destroying function is recognized
Demonstrate,prove safe Key disks.
Background technology
USBKey is a kind of private key and digital certificate that user is stored by memory space, is utilized also referred to as Key disks
USBKey built-in public key algorithm realizes the hardware device to authenticating user identification.It is safe and reliable, be easy to carry, user
Just the advantages of, with low cost, have become the high security predominant authentication mode for growing up recent years.
Comparatively, USBKey is safer, but USBKey is not perfectly safe, and there is also the possibility being cracked, and
And nowadays more and more powerful viruses, wooden horse etc. steals information tool appearance, and USBKey itself also has some not
Foreseeable security breaches.Just such as password is at any time situations such as dummy keyboard and keyboard, mouse are monitored.
Therefore people are improved by way of carrying out cipher authentication entrance to further strengthen the safety of USBKey
Safety in utilization, such as numerical ciphers, sound password, finger-print cipher etc., but USBKey is once fallen in the handss of lawless person,
Through constantly trial, eventually being cracked step by step, ultimately causes the leakage of information, even results in not for the password of this class
Appreciable consequence.
Utility model content
The technical problems to be solved in the utility model is to provide a kind of higher sound with self-destroying function of safety and recognizes
Demonstrate,prove safe Key disks
In order to solve above-mentioned technical problem, the technical solution of the utility model is:A kind of sound with self-destroying function is recognized
Demonstrate,prove safe Key disks, including controller, the memory block for storing user data and voice recognition unit, the controller connection
The voice recognition unit and the memory block, and the voice recognition unit connects the memory block, arranges in the memory block
There is place of safety, be provided with the controller for by the destruction module of the data crushing in place of safety, the voice recognition unit
Connect and trigger the destruction module.
Further, maximum times module and statistical module, the maximum times module are provided with the controller module
Connect the statistical module, the statistical module connects the voice recognition unit, and the statistical module connects and triggers described
Destroy module.
Further, the maximum times module can freely set its maximum times.
Further, the voice recognition unit is included for the sound password area of stored voice encrypted message and for verifying
The sound authentication device of sound password.
Further, the voice recognition unit also includes the voiceprint area of voiceprint device and storage voiceprint.
Using above-mentioned technical proposal, due to voice recognition unit and the cooperation for destroying module, when mistake occurs in sound password authentification
Mistake, module is destroyed by the data destroying inside the place of safety in memory block, prevent data flow from falling in the handss of lawless person, really
The safety of security personnel whole district data, improves the safety of Key disks.
Description of the drawings
Structure and Process schematic diagrams of the Fig. 1 for a kind of safe Key disks of sound authentication with self-destroying function of this utility model;
Specific embodiment
Below in conjunction with the accompanying drawings specific embodiment of the present utility model is described further.Here it should be noted that
For the explanation of these embodiments is used to help understand this utility model, but do not constitute to restriction of the present utility model.This
Outward, as long as technical characteristic involved in this utility model disclosed below each embodiment does not constitute conflict each other
Can just be mutually combined.
With reference to the safe Key disks of a kind of sound authentication with self-destroying function shown in Fig. 1, including controller, for storing
The memory block of user data and voice recognition unit, controller connection voice recognition unit and memory block, and voice recognition unit company
Memory block is connect, place of safety in memory block, is provided with, is provided with controller for by the destruction mould of the data crushing in place of safety
Block, voice recognition unit connect and trigger destruction module.
Maximum times module and statistical module, maximum times module connection statistics module, system are provided with controller module
Meter module connects voice recognition unit, and statistical module connects and triggers destruction module.
Maximum times module can freely set its maximum times.
Voice recognition unit is included for the sound password area of stored voice encrypted message and for verifying sound password
Sound authentication device.Sound password area can advance for multiple checking sound passwords.Voice recognition unit also includes voiceprint
The voiceprint area of device and storage voiceprint.Voiceprint area can advance for multiple voiceprints.Can also be sound
Sound authenticator will pass through with the common authenticator for combining of voiceprint device, not only sound password, and voiceprint will also pass through.
Significant data is deposited in place of safety by the owner of Key disks, and when Key disks are used, user passes through voice recognition unit
Checking identification is carried out, sound authentication device (or voiceprint device) will verify sound password (voiceprint) and sound password area
The sound password (voiceprint) that (voiceprint area) preserves is contrasted, if correctly, user is directly entered memory block.And
If incorrect, once mistake is charged to by statistical module, statistics number is pre-set by statistical module with maximum times module
Good maximum times are contrasted, and when statistics number is less than the maximum times for pre-setting, statistical module only retains statistics
Number of times, user cannot be introduced into memory block.And when statistics number is more than or equal to the maximum times for pre-setting, statistics
Module is destroyed in module triggering, destroys module by the data crushing in the place of safety in memory block, the number in effective protection memory block
According to safety.
Maximum times freely can be set as needed, be generally three times, i.e., when user verifies wrong in first time
Mistake, statistical module counts a statistics number, and user cannot be introduced into memory block, at this moment user can carry out second
Checking, likewise, when correct, user is directly entered memory block, when mistake, user still cannot be introduced into memory block,
And second statistics number is counted, when user carries out third time fingerprint authentication, if correctly, user is directly entered to be deposited
Storage area, and if mistake, user still cannot be introduced into memory block, and count third time statistics number, now statistics number
More than or equal to maximum times, module is destroyed in triggering, destroys module by the data crushing in the place of safety in memory block, and so
The fingerprint authentication success at the 4th time even with person, the place of safety in memory block is also empty, in effective protection memory block
Place of safety inside significant data safety.
Embodiment of the present utility model is explained in detail above in association with accompanying drawing, but this utility model is not limited to be retouched
The embodiment stated.For a person skilled in the art, it is in the case of without departing from this utility model principle and spirit, right
These embodiments carry out various changes, modification, replacement and modification, still fall within protection domain of the present utility model.
Claims (5)
1. a kind of safe Key disks of sound authentication with self-destroying function, is characterized in that:Including controller, for storing number of users
According to memory block and voice recognition unit, the controller connects the voice recognition unit and the memory block, and the sound
Sound evaluator connects the memory block, and place of safety is provided with the memory block, is provided with for inciting somebody to action safety in the controller
The destruction module of the data crushing in area, the voice recognition unit connect and trigger the destruction module.
2. the safe Key disks of the sound authentication with self-destroying function according to claim 1, is characterized in that:The controller
Maximum times module and statistical module are provided with module, the maximum times module connects the statistical module, the statistics
Module connects the voice recognition unit, and the statistical module connects and triggers the destruction module.
3. the safe Key disks of the sound authentication with self-destroying function according to claim 2, is characterized in that:Described maximum time
Digital-to-analogue block can freely set its maximum times.
4. the safe Key disks of the sound authentication with self-destroying function according to claim 1, is characterized in that:The sound is known
Other device is included for the sound password area of stored voice encrypted message and the sound authentication device for verifying sound password.
5. the safe Key disks of the sound authentication with self-destroying function according to claim 1, is characterized in that:The sound is known
Other device also includes the voiceprint area of voiceprint device and storage voiceprint.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201620570709.XU CN206097120U (en) | 2016-06-14 | 2016-06-14 | Sound authentication safety key dish with self -destruction function |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201620570709.XU CN206097120U (en) | 2016-06-14 | 2016-06-14 | Sound authentication safety key dish with self -destruction function |
Publications (1)
Publication Number | Publication Date |
---|---|
CN206097120U true CN206097120U (en) | 2017-04-12 |
Family
ID=58471898
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201620570709.XU Expired - Fee Related CN206097120U (en) | 2016-06-14 | 2016-06-14 | Sound authentication safety key dish with self -destruction function |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN206097120U (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107679607A (en) * | 2017-08-25 | 2018-02-09 | 芜湖市振华戎科智能科技有限公司 | Exclusive personal encrypted u disk |
CN109598514A (en) * | 2018-07-26 | 2019-04-09 | 南京物联传感技术有限公司 | A kind of intelligent sound box with vocal print protection |
CN110471864A (en) * | 2019-07-18 | 2019-11-19 | 深圳市德名利电子有限公司 | A kind of storing data self-destruction method and memory and equipment based on memory |
-
2016
- 2016-06-14 CN CN201620570709.XU patent/CN206097120U/en not_active Expired - Fee Related
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107679607A (en) * | 2017-08-25 | 2018-02-09 | 芜湖市振华戎科智能科技有限公司 | Exclusive personal encrypted u disk |
CN109598514A (en) * | 2018-07-26 | 2019-04-09 | 南京物联传感技术有限公司 | A kind of intelligent sound box with vocal print protection |
CN110471864A (en) * | 2019-07-18 | 2019-11-19 | 深圳市德名利电子有限公司 | A kind of storing data self-destruction method and memory and equipment based on memory |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6073237A (en) | Tamper resistant method and apparatus | |
CN102800141A (en) | Entrance guard controlling method and system based on bidirectional authentication | |
CN206097120U (en) | Sound authentication safety key dish with self -destruction function | |
CN104537300A (en) | Safe password setting and verifying mode | |
CN108900296B (en) | Secret key storage method based on biological feature identification | |
WO2015117507A1 (en) | Authentication method, collection device, authentication device and system, and cabinet and unlocking method therefor | |
CN110310406A (en) | A kind of method for unlocking and intelligent door lock of intelligent door lock | |
CN104408363A (en) | Safe password system | |
CN106027467B (en) | A kind of identity card reading response system | |
CN101237353A (en) | A method and system for monitoring mobile storage device based on USBKEY | |
CN109190389A (en) | A kind of solid state hard disk data guard method based on USB flash disk authentication | |
CN105635089A (en) | Authentication method, unlocking method and unlocking system for dynamic password lock | |
CN104363093B (en) | The method encrypted by dynamic authorization code to file data | |
CN104537313A (en) | Data protection method, terminal and server | |
CN102852400A (en) | Coded lock system based on USB (universal serial bus) key and authentication control method thereof | |
CN112102529B (en) | Power facility protection system based on passive intelligent lock and execution process thereof | |
CN109961542A (en) | A kind of entrance guard device, verifying device, verifying system and its verification method | |
CN107767514A (en) | Key of safety encryption matrix contact type electronic lock | |
CN106027477B (en) | A kind of identity card reading response method | |
CN105007267A (en) | Privacy protection method and device | |
CN206097149U (en) | That can fix a position prevents losing USB storage device | |
CN109190364A (en) | A kind of safe U disc for solid state hard disk authentication | |
CN105991648B (en) | A kind of dispatching method of reading identity card | |
CN105991649B (en) | A kind of scheduling system of reading identity card | |
CN104618104B (en) | Accessory, electronic equipment and the system for realizing accessory certification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170412 Termination date: 20200614 |