Method and system for realizing wireless information security equipment

An information security and implementation method technology, applied in the field of information security, can solve the problems of inability to control and manage multiple encryption locks, high cost, inconvenience, etc., so as to reduce the risk of information leakage, save costs, and avoid frequent plugging and unplugging. Effect

Active Publication Date: 2016-06-08
BEIJING SENSESHIELD TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this process, some people may forget to bring or lose the dongle; in addition, each person is assigned a dongle, and it is easy to be lost or damaged and needs to be replaced, which is too expensive
Moreover, it is not easy to manage when there are multiple encryption locks, and there may be a risk of information leakage due to intentional or unintentional operations by personnel
In the prior art, there is no technical solution capable of controlling and managing multiple encryption locks to solve the above problems
[0005] 2. When using a dongle, it may be necessary to frequently plug and unplug the dongle (such as the process of plugging and unplugging the lock when going to get off work, leaving work, or leaving every day)
Especially in today's society that advocates convenience and high efficiency, such frequent and repetitive operations have brought great inconvenience to users
The prior art also fails to solve the technical problems of improving the usability and convenience of the dongle

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing wireless information security equipment
  • Method and system for realizing wireless information security equipment
  • Method and system for realizing wireless information security equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0118] For example, an IT company and a research and development team use the product in the present invention. According to an embodiment of the present invention, a certain number of wireless transceiver devices are customized according to the needs of the research and development team. Assuming that there are 10 project personnel (including the project manager), then 1 1 information security equipment and 10 wireless transceivers supporting the information security equipment. In this embodiment, the information security device is a dongle, the dongle is carried and kept by the project manager, the wireless communication method is bluetooth, and the wireless transceiver device adopts a USB connector (the wireless transceiver device is hereinafter referred to as a USB transceiver). The wireless transmission range is 10 meters.

[0119] In this embodiment, the 10 USB transceivers are assumed to be named U1, U2...U10 for easy identification; the dongle ID is assumed to be USB_B...

Embodiment 2

[0132] This embodiment is partly the same as Embodiment 1. The difference in this embodiment is that a list of identification information of 10 matching USB transceivers is stored inside the dongle. Such as Figure 5 Shown, the concrete implementation mode of this embodiment is:

[0133] 1. Project participants connect the USB transceiver to the host through the host interface;

[0134] 2. The USB transceiver automatically detects other wireless signals within the signal coverage (when the project manager carrying the dongle enters the signal coverage, the USB transceiver will detect the wireless signal of the dongle);

[0135] 3. After the USB transceiver detects the wireless signal, it automatically sequentially connects with the wireless signals in the detected wireless signal list, and sends a verification request, and the verification request includes the identification information of the USB transceiver;

[0136] 4. If the wireless signal device does not respond or ret...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an implementation method and a system of a wireless information safety device and belongs to the technical field of information safety. The system of the wireless information safety device comprises wireless transceivers and an information safety device. The implementation method of a wireless the information safety device comprises that the plurality of wireless transceivers matched with the information safety device are connected with a corresponding host of every wireless transceiver through interfaces; wireless signals in a signal coverage area are automatically detected through the wireless transceivers; when a person with the information safety device enters the coverage area of the wireless signals, every wireless transceiver is connected with the information safety device to establish a separate wireless communication link respectively; during usage, identity authentication is performed by entering passwords (PIN (Personal Identification Number) code); wireless data interaction of the hosts and the information safety device can be achieved through the corresponding wireless transceiver after the authentication is passed. By means of the implementation method and the system of the wireless information safety device, the usage of a plurality of information safety devices and the risks of loss and damage can be avoided, and the costs can be saved; the information safety device is kept and managed by a specially-assigned person, so that the risk of information leakage can be reduced.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method and system for realizing wireless information security equipment. Background technique [0002] In the prior art, an information security device is a main means to realize software security protection, copyright protection, network security protection or identity authentication. The so-called information security device is a hardware device attached to the host interface (such as: USB interface, serial port, parallel port, etc.), which performs security protection and copyright protection for specific software or sensitive information running on the host. Among the current software protection technologies, dongle is the most commonly used one. The so-called encryption lock is a hardware system that uses high-strength smart card chips and advanced cryptography technology, has certain computing and storage capabilities, and is difficult to be cracked and copied...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12G06F21/44H04W12/02
CPCG06F21/10G06F21/35
Inventor 不公告发明人
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products