Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for realizing wireless information security equipment

A technology of information security and wireless equipment, applied in the field of information security, can solve problems such as link failure, computer crash, failure to control and manage multiple dongles, etc., to achieve cost savings, improve user experience, and reduce the risk of information leakage.

Active Publication Date: 2017-08-25
BEIJING SENSESHIELD TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. When using a dongle, it may be necessary to frequently plug and unplug the dongle (such as the process of plugging and unplugging the lock when going to get off work, getting off work, leaving, etc. every day)
Especially in today's society that advocates convenience and high efficiency, such frequent and repetitive operations have brought great inconvenience to users
The prior art also fails to solve the technical problems of improving the usability and convenience of the dongle
[0006] 2. When the user is using the encryption lock, if he forgets to unplug the encryption lock when he leaves temporarily for something, at this time illegal persons may sneak in and steal user privacy or other data information
[0007] 3. As a hardware device, the encryption lock may have static electricity when it is physically connected to the interface of the computer through the connector, which may cause the computer to crash and cause data loss.
[0008] 4. As a hardware device, the dongle is physically connected to the computer through the connector. When plugging and unplugging frequently, the connector of the dongle may be worn, the internal spring may be loose, and the link may fail, which will cause inconvenience in use. And there is a certain cost to replace the connector
During this process, some people may forget or lose the encryption lock. In addition, each person is assigned an encryption lock, and it is easy to be lost or damaged, and the cost is too high; and it is not easy to manage when there are multiple encryption locks, which may cause Man-made information leakage occurs, and there is no technical method capable of controlling and managing multiple dongles in the prior art to solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for realizing wireless information security equipment
  • A method and system for realizing wireless information security equipment
  • A method and system for realizing wireless information security equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] In this embodiment, one information security device corresponds to one wireless transceiver device, and the switch of the information security device is a sliding switch. The switch is set on the side of the information security device, and the switch state of the information security device is controlled by sliding back and forth. The information security device in this embodiment is an encryption lock, which can be carried with you (for example, it can be placed in a briefcase, pocket, key chain, etc.), and the wireless transceiver device uses a USB head (hereinafter referred to as a USB transceiver) to connect to the host computer. The wireless communication method is Bluetooth. According to an embodiment of the present invention, such as figure 2 As shown, the specific steps are as follows:

[0058] 1. Connect the USB transceiver to the host;

[0059] 2. Turn on the encryption lock switch by sliding;

[0060] 3. The dongle automatically detects the wireless sign...

Embodiment 2

[0070] In this embodiment, one information security device corresponds to multiple wireless transceiver devices, and the switch of the information security device is a push-button switch, and the switch state of the information security device is controlled by the switch button. The information security device in this embodiment is an encryption lock, which can be carried with you (for example, it can be placed in a briefcase, pocket, key chain, etc.), and the wireless transceiver device uses a USB head (hereinafter referred to as a USB transceiver) to connect to the host computer. The wireless communication mode is bluetooth, and the matching USB transceiver identification list is stored in the dongle in the present invention, and the time for automatically closing the dongle is set to 10 minutes. According to an embodiment of the present invention, specific steps are as follows:

[0071] 1. Connect multiple USB transceivers to their respective hosts through the host interfac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for realizing wireless information security equipment, belonging to the field of information security. The system includes wireless transceiver equipment and information security equipment. The method includes: turning on the switch of the information security device, the information security device automatically detects the wireless signal of the wireless transceiver device within the coverage of the signal and connects wirelessly; when in use, the information security device performs identity authentication, and if the authentication passes, the information security device passes the The wireless transceiver device realizes the data interaction between the host and the information security device; when leaving, the information security device is manually or automatically turned off, and the connection between the information security device and the host is disconnected. The method provided by the invention does not require manual insertion and extraction, and brings convenience to users in terms of use under the premise of safety.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method and system for realizing wireless information security equipment. Background technique [0002] In the prior art, an information security device is a main means to realize software security protection, copyright protection, network security protection or identity authentication. The so-called information security device is a hardware device attached to the host interface (such as: USB interface, serial port, parallel port, etc.), which performs security protection and copyright protection for specific software or sensitive information running on the host. Among the current software protection technologies, dongle is the most commonly used one. The so-called encryption lock is a hardware system that uses high-strength smart card chips and advanced cryptography technology, has certain computing and storage capabilities, and is difficult to be cracked and copied...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/32H04B5/00G06F21/12
Inventor 不公告发明人
Owner BEIJING SENSESHIELD TECH