CN206097120U - Sound authentication safety key dish with self -destruction function - Google Patents

Sound authentication safety key dish with self -destruction function Download PDF

Info

Publication number
CN206097120U
CN206097120U CN201620570709.XU CN201620570709U CN206097120U CN 206097120 U CN206097120 U CN 206097120U CN 201620570709 U CN201620570709 U CN 201620570709U CN 206097120 U CN206097120 U CN 206097120U
Authority
CN
China
Prior art keywords
module
sound
recognition unit
voice recognition
self
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201620570709.XU
Other languages
Chinese (zh)
Inventor
孙巍
朱晓阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Wu An Information Technology Co Ltd
Original Assignee
Nanjing Wu An Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Wu An Information Technology Co Ltd filed Critical Nanjing Wu An Information Technology Co Ltd
Priority to CN201620570709.XU priority Critical patent/CN206097120U/en
Application granted granted Critical
Publication of CN206097120U publication Critical patent/CN206097120U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The utility model discloses a sound authentication safety key dish with self -destruction function, including controller, the memory area that is used for storing user data and voice recognition unit, voice recognition unit and memory area are connected to the controller to voice recognition unit connects the memory area, is provided with the safety zone in the memory area, is provided with in the controller to be used for the kibbling destruction module of the data in the safety zone, and the voice recognition unit connection triggers the destruction module. Be provided with the biggest number of times module and statistics module in the controller module, statistics module is connected to the biggest number of times module, and statistics module connects voice recognition unit, and statistics module connection and trigger the destruction module. Its the biggest number of times can freely be set for to the biggest number of times module. The utility model discloses an it prevents that lawless persons from stealing the back with the key dish, the outflow of important information in the key dish, the security that improves the key dish to smash the safety zone in the memory area.

Description

A kind of safe Key disks of the sound authentication with self-destroying function
Technical field
This utility model belongs to movable storage device field, and more specifically to a kind of sound with self-destroying function is recognized Demonstrate,prove safe Key disks.
Background technology
USBKey is a kind of private key and digital certificate that user is stored by memory space, is utilized also referred to as Key disks USBKey built-in public key algorithm realizes the hardware device to authenticating user identification.It is safe and reliable, be easy to carry, user Just the advantages of, with low cost, have become the high security predominant authentication mode for growing up recent years.
Comparatively, USBKey is safer, but USBKey is not perfectly safe, and there is also the possibility being cracked, and And nowadays more and more powerful viruses, wooden horse etc. steals information tool appearance, and USBKey itself also has some not Foreseeable security breaches.Just such as password is at any time situations such as dummy keyboard and keyboard, mouse are monitored.
Therefore people are improved by way of carrying out cipher authentication entrance to further strengthen the safety of USBKey Safety in utilization, such as numerical ciphers, sound password, finger-print cipher etc., but USBKey is once fallen in the handss of lawless person, Through constantly trial, eventually being cracked step by step, ultimately causes the leakage of information, even results in not for the password of this class Appreciable consequence.
Utility model content
The technical problems to be solved in the utility model is to provide a kind of higher sound with self-destroying function of safety and recognizes Demonstrate,prove safe Key disks
In order to solve above-mentioned technical problem, the technical solution of the utility model is:A kind of sound with self-destroying function is recognized Demonstrate,prove safe Key disks, including controller, the memory block for storing user data and voice recognition unit, the controller connection The voice recognition unit and the memory block, and the voice recognition unit connects the memory block, arranges in the memory block There is place of safety, be provided with the controller for by the destruction module of the data crushing in place of safety, the voice recognition unit Connect and trigger the destruction module.
Further, maximum times module and statistical module, the maximum times module are provided with the controller module Connect the statistical module, the statistical module connects the voice recognition unit, and the statistical module connects and triggers described Destroy module.
Further, the maximum times module can freely set its maximum times.
Further, the voice recognition unit is included for the sound password area of stored voice encrypted message and for verifying The sound authentication device of sound password.
Further, the voice recognition unit also includes the voiceprint area of voiceprint device and storage voiceprint.
Using above-mentioned technical proposal, due to voice recognition unit and the cooperation for destroying module, when mistake occurs in sound password authentification Mistake, module is destroyed by the data destroying inside the place of safety in memory block, prevent data flow from falling in the handss of lawless person, really The safety of security personnel whole district data, improves the safety of Key disks.
Description of the drawings
Structure and Process schematic diagrams of the Fig. 1 for a kind of safe Key disks of sound authentication with self-destroying function of this utility model;
Specific embodiment
Below in conjunction with the accompanying drawings specific embodiment of the present utility model is described further.Here it should be noted that For the explanation of these embodiments is used to help understand this utility model, but do not constitute to restriction of the present utility model.This Outward, as long as technical characteristic involved in this utility model disclosed below each embodiment does not constitute conflict each other Can just be mutually combined.
With reference to the safe Key disks of a kind of sound authentication with self-destroying function shown in Fig. 1, including controller, for storing The memory block of user data and voice recognition unit, controller connection voice recognition unit and memory block, and voice recognition unit company Memory block is connect, place of safety in memory block, is provided with, is provided with controller for by the destruction mould of the data crushing in place of safety Block, voice recognition unit connect and trigger destruction module.
Maximum times module and statistical module, maximum times module connection statistics module, system are provided with controller module Meter module connects voice recognition unit, and statistical module connects and triggers destruction module.
Maximum times module can freely set its maximum times.
Voice recognition unit is included for the sound password area of stored voice encrypted message and for verifying sound password Sound authentication device.Sound password area can advance for multiple checking sound passwords.Voice recognition unit also includes voiceprint The voiceprint area of device and storage voiceprint.Voiceprint area can advance for multiple voiceprints.Can also be sound Sound authenticator will pass through with the common authenticator for combining of voiceprint device, not only sound password, and voiceprint will also pass through.
Significant data is deposited in place of safety by the owner of Key disks, and when Key disks are used, user passes through voice recognition unit Checking identification is carried out, sound authentication device (or voiceprint device) will verify sound password (voiceprint) and sound password area The sound password (voiceprint) that (voiceprint area) preserves is contrasted, if correctly, user is directly entered memory block.And If incorrect, once mistake is charged to by statistical module, statistics number is pre-set by statistical module with maximum times module Good maximum times are contrasted, and when statistics number is less than the maximum times for pre-setting, statistical module only retains statistics Number of times, user cannot be introduced into memory block.And when statistics number is more than or equal to the maximum times for pre-setting, statistics Module is destroyed in module triggering, destroys module by the data crushing in the place of safety in memory block, the number in effective protection memory block According to safety.
Maximum times freely can be set as needed, be generally three times, i.e., when user verifies wrong in first time Mistake, statistical module counts a statistics number, and user cannot be introduced into memory block, at this moment user can carry out second Checking, likewise, when correct, user is directly entered memory block, when mistake, user still cannot be introduced into memory block, And second statistics number is counted, when user carries out third time fingerprint authentication, if correctly, user is directly entered to be deposited Storage area, and if mistake, user still cannot be introduced into memory block, and count third time statistics number, now statistics number More than or equal to maximum times, module is destroyed in triggering, destroys module by the data crushing in the place of safety in memory block, and so The fingerprint authentication success at the 4th time even with person, the place of safety in memory block is also empty, in effective protection memory block Place of safety inside significant data safety.
Embodiment of the present utility model is explained in detail above in association with accompanying drawing, but this utility model is not limited to be retouched The embodiment stated.For a person skilled in the art, it is in the case of without departing from this utility model principle and spirit, right These embodiments carry out various changes, modification, replacement and modification, still fall within protection domain of the present utility model.

Claims (5)

1. a kind of safe Key disks of sound authentication with self-destroying function, is characterized in that:Including controller, for storing number of users According to memory block and voice recognition unit, the controller connects the voice recognition unit and the memory block, and the sound Sound evaluator connects the memory block, and place of safety is provided with the memory block, is provided with for inciting somebody to action safety in the controller The destruction module of the data crushing in area, the voice recognition unit connect and trigger the destruction module.
2. the safe Key disks of the sound authentication with self-destroying function according to claim 1, is characterized in that:The controller Maximum times module and statistical module are provided with module, the maximum times module connects the statistical module, the statistics Module connects the voice recognition unit, and the statistical module connects and triggers the destruction module.
3. the safe Key disks of the sound authentication with self-destroying function according to claim 2, is characterized in that:Described maximum time Digital-to-analogue block can freely set its maximum times.
4. the safe Key disks of the sound authentication with self-destroying function according to claim 1, is characterized in that:The sound is known Other device is included for the sound password area of stored voice encrypted message and the sound authentication device for verifying sound password.
5. the safe Key disks of the sound authentication with self-destroying function according to claim 1, is characterized in that:The sound is known Other device also includes the voiceprint area of voiceprint device and storage voiceprint.
CN201620570709.XU 2016-06-14 2016-06-14 Sound authentication safety key dish with self -destruction function Expired - Fee Related CN206097120U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201620570709.XU CN206097120U (en) 2016-06-14 2016-06-14 Sound authentication safety key dish with self -destruction function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201620570709.XU CN206097120U (en) 2016-06-14 2016-06-14 Sound authentication safety key dish with self -destruction function

Publications (1)

Publication Number Publication Date
CN206097120U true CN206097120U (en) 2017-04-12

Family

ID=58471898

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201620570709.XU Expired - Fee Related CN206097120U (en) 2016-06-14 2016-06-14 Sound authentication safety key dish with self -destruction function

Country Status (1)

Country Link
CN (1) CN206097120U (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107679607A (en) * 2017-08-25 2018-02-09 芜湖市振华戎科智能科技有限公司 Exclusive personal encrypted u disk
CN109598514A (en) * 2018-07-26 2019-04-09 南京物联传感技术有限公司 A kind of intelligent sound box with vocal print protection
CN110471864A (en) * 2019-07-18 2019-11-19 深圳市德名利电子有限公司 A kind of storing data self-destruction method and memory and equipment based on memory

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107679607A (en) * 2017-08-25 2018-02-09 芜湖市振华戎科智能科技有限公司 Exclusive personal encrypted u disk
CN109598514A (en) * 2018-07-26 2019-04-09 南京物联传感技术有限公司 A kind of intelligent sound box with vocal print protection
CN110471864A (en) * 2019-07-18 2019-11-19 深圳市德名利电子有限公司 A kind of storing data self-destruction method and memory and equipment based on memory

Similar Documents

Publication Publication Date Title
US6073237A (en) Tamper resistant method and apparatus
CN102800141A (en) Entrance guard controlling method and system based on bidirectional authentication
CN206097120U (en) Sound authentication safety key dish with self -destruction function
CN104537300A (en) Safe password setting and verifying mode
CN108900296B (en) Secret key storage method based on biological feature identification
WO2015117507A1 (en) Authentication method, collection device, authentication device and system, and cabinet and unlocking method therefor
CN110310406A (en) Unlocking method of intelligent door lock and intelligent door lock
CN104408363A (en) Safe password system
CN106027467B (en) A kind of identity card reading response system
CN101237353A (en) A method and system for monitoring mobile storage device based on USBKEY
CN112102529B (en) Power facility protection system based on passive intelligent lock and execution process thereof
CN109190389A (en) A kind of solid state hard disk data guard method based on USB flash disk authentication
CN105635089A (en) Authentication method, unlocking method and unlocking system for dynamic password lock
CN104363093B (en) The method encrypted by dynamic authorization code to file data
CN104537313A (en) Data protection method, terminal and server
CN102852400A (en) Coded lock system based on USB (universal serial bus) key and authentication control method thereof
CN109961542A (en) A kind of entrance guard device, verifying device, verifying system and its verification method
CN107767514A (en) Key of safety encryption matrix contact type electronic lock
CN106027477B (en) A kind of identity card reading response method
CN105007267A (en) Privacy protection method and device
CN206097149U (en) That can fix a position prevents losing USB storage device
CN109190364A (en) A kind of safe U disc for solid state hard disk authentication
CN105991649B (en) A kind of scheduling system of reading identity card
CN104618104B (en) Accessory, electronic equipment and the system for realizing accessory certification
KR101624394B1 (en) Device for authenticating password and operating method thereof

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170412

Termination date: 20200614