Security terminal system and authentication and interruption method thereof

A terminal system and security terminal technology, applied in the field of information and data security terminal systems, can solve problems such as hidden dangers of terminal system security by encryption means

Active Publication Date: 2014-04-16
NATIONZ TECH INC
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a secure terminal system and its authentication and interruption method, which solves the problem that the loopholes in the existing encryption means lead to hidden dangers in the security of the terminal system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security terminal system and authentication and interruption method thereof
  • Security terminal system and authentication and interruption method thereof
  • Security terminal system and authentication and interruption method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0045] like figure 1 A secure terminal system shown includes a trusted computing module device, a biometric identification device, a mobile key device, a safe storage device, a positioning device, a communication module and a main control processor.

[0046] The biometric identification device is used to collect biometric features and input identification data to the trusted computing module device;

[0047] The mobile key device is used to send the key to the trusted computing module device;

[0048] The secure storage device stores data, and obtains encryption and decryption keys from the trusted computing module device;

[0049] The positioning device is used to obtain the current geographic location informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security terminal system and a method for improving the security of a terminal. The security terminal system comprises a trusted computing module device, a master control processor and an external device, wherein the external device comprises a biometric identification device, a mobile key device, a secure storage device, a positioning device and a communication module; and the trusted computing module device can detect whether the external device is trusted or not and authenticate the mobile key device and the secure storage device, periodically accesses the positioning device to acquire geographical position information, transmits the acquired geographical position information to the communication device and executes a control instruction input by the communication module. Therefore, the whole user data is ensured never to be decrypted once the terminal is discovered to be stolen or the external device is discovered to be replaced by special equipment.

Description

technical field [0001] The invention relates to an information data security terminal system and a method for improving terminal security. Background technique [0002] With the development of the information age, data has become more and more important. The important data and information of most companies, industries, and individuals are basically stored in modern storage media, and some important data may be stored in system terminals. Such as personal computer (PC), personal digital assistant (PDA), server or removable media. At present, the storage media in personal computers (PCs), personal digital assistants (PDAs), servers, and removable storage media do not have encryption features. Once the storage media is lost, there are various ways to obtain the original data on the media, which seriously threatens personal Privacy, commercial secrets, and even financial and military secrets. [0003] There are significant loopholes in the various encryption methods currentl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04W12/02G06F21/78G06F21/88H04W12/041H04W12/0431
Inventor 陈官学
Owner NATIONZ TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products