专利汇可以提供Authentication method based on private space of the usb flash memory media专利检索,专利查询,专利分析的服务。并且The present invention discloses an authentication method based on private bytes of USB flash memory media, and implements a unit for executing authentication by using private bytes of USB flash memory media which is often used. A control chip of the USB flash memory disk receives a read/write instruction sent from the authentication unit, determines whether a read/write operation is executed to the private bytes. If it is, the read/write operation to the private bytes is executed. Otherwise, the read/write operation to normal bytes is executed. Thus, a variety of authentication information can be stored in the private bytes of the USB flash memory disk, which are invisible to users and can not be copied and deleted. The normal data can be stored in the normal bytes of the USB flash memory disk so that an encryption and authentication mechanism can be achieved with security and convenience.,下面是Authentication method based on private space of the usb flash memory media专利的具体信息内容。
1. Field of Invention
The present invention relates to an authentication method based on private bytes of USB flash memory media, and uses for the field of computer security.
2. Description of Prior Art
Conventional computers generally have no encryption devices. Recently, the privacy of the personal computers is paid more and more attention, especially for the security of business secretes and personal materials. Generally, the encryption function of the conventional computes is implemented by software. However, the probability that software is hacked is increased, and thus the information in the computers is less secure. On the other hand, most of the encryption methods with hardware, which are commercial available, are the use of Smart Cards, fingerprint recognition and watchdog which is a hardware encryption device. Although the encryption methods with hardware generates better effects than the use of the software, some disadvantages in those methods are as follows:
1. The use of the encryption methods with hardware lacks popularity and the use is limited, for example, a lot of computers can not support a Smart Card;
2. The hardware structure and circuit is complex, which results in an expensive cost; and
3. The function of such encryption by using hardware is alone and thus does not represent notable advantages to the users.
Recently, products encrypted with Universal Serial Bus (USB) flash memory disks also appear. But the encrypted information is placed in normal bytes of the USB flash memory disks, which is visible to the ordinary users and can be copied and deleted. Therefore, the security of the encryption can not be guaranteed well.
The object of the present invention is to provide an authentication method based on private bytes of USB flash memory media which uses a commonly used USB flash memory media, for example, USB flash memory disk, with combination with authentication software. The method of the present invention uses the private bytes of the USB flash memory disk, which are invisible to a normal user and can not be copied and deleted, to store encrypted information and encrypted files so that the computer encryption and authentication can be achieved with security and convenience.
The object of the present invention is achieved by the following technical solutions.
An authentication method based on private bytes of USB flash memory media, comprising:
step 10, reading authentication information from the private bytes of the USB flash memory media by an authentication unit;
step 20, authenticating, by the authentication unit, the authentication information input by a user by using the authentication information read from the private bytes of the USB flash memory media;
step 30, determining whether the authentication is successful or not, if it is successful, opening an operation authorization based on the authentication information, otherwise, executing a process for failed authentication.
Preferably, before the step 10, the method further comprises:
step 1, detecting whether the USB flash memory disk is connected to the authentication unit, if it is, executing the step 10;
step 2, inquiring the user whether to re-authenticate or not, if the user determines to re-authenticate, then prompting the user to connect a USB flash memory media to a USB interface, and executing the step 1 after confirming the connection, otherwise, determining that the authentication is failed, and executing the process for failed authentication.
Further, the process for failed authentication in the step 30 is to execute the step 2.
Alternatively, before the step 10, the method further comprises:
step 1′, detecting, by the authentication unit, whether the USB flash memory disk is connected to the authentication unit or not;
step 2′, if the connection is held, executing the step 1′ after a predetermined time period, and if the connection is not held, then locking the operating system (for example, windows);
step 3′, prompting the user to connect the USB flash memory media to the USB interface and inputting the authentication information;
step 4′, detecting, by the authentication unit, whether the USB flash memory media is connected to the authentication unit;
step 5′, if the connection is held, then executing the step 10; otherwise, executing the step 3′.
The process for failed authentication in the step 30 is to release the lock of the operating system and execute the step 1′ if it is successful, otherwise, execute the step 4′.
Preferably, the authentication method based on private bytes of USB flash memory media further comprises the step of setting the authentication information to the private bytes of the USB flash memory media when the authentication unit is installed, the setting step comprising:
step A, sending the authentication information input by the user to the private bytes of the USB flash memory media by the authentication unit; step B, determining whether the operation of writing the authentication information into the private bytes of the USB flash memory media is successful, if it is successful, opening an operation authorization based on the authentication information, otherwise, executing a subsequent process for failed authentication if the operation of writing the authentication information is not successful.
Preferably, the operating system log-on information of the user is contained in the authentication information.
Preferably, before the step A, the method further comprises:
step X, detecting, by the authentication unit, whether the USB flash memory media is connected to the authentication unit, if the connection is held, executing the step A;
step Y, inquiring the user whether to re-authenticate or not , if the user determines to re-authenticate, then prompting the user to connect the USB flash memory disk to the USB interface, and executing the step X after confirming the connection; otherwise, determining that the authentication is failed, and ending the setting process.
The subsequent process for failed authentication in the step B is to execute the step Y.
A control chip of the USB flash memory media receives a read/write instruction sent from the authentication unit, determines whether a read/write operation is executed to the private bytes, if it is, the read/write operation to the private bytes is executed, if it is not, the read/write operation to normal bytes is executed.
The present invention implements a module for executing authentication by using private bytes of USB flash memory media which is often used. A control chip of the USB flash memory media receives a read/write instruction sent from the authentication unit, determines whether a read/write operation is executed to the private bytes. If it is, the read/write operation to the private bytes is executed. If it is not, the read/write operation to normal bytes is executed. Thus, a variety of authentication information can be stored in the private bytes, which are invisible to a normal user and can not be copied and deleted, of the USB flash memory media, for example, a USB flash memory disk. The normal data can be stored in the normal bytes of the USB flash memory disk. According to the present invention, an encryption and authentication mechanism is achieved with security and convenience.
The above and other objects, features and advantages of the present invention will be clearer from the following detailed description about the non-limited embodiments of the present invention taken in conjunction with the accompanied drawings, in which:
The present invention will be described in conjunction with the embodiments and with reference to the drawings in detailed as below.
As shown in
As shown in
The Difference between the Private Bytes and the Normal Bytes is as follows.
The private bytes are also referred as reserved bytes and are generally set during the manufacturing and the contents to be stored therein can be written by dedicated tools. The users can not change the properties, sizes and contents of the private bytes. In addition, these private bytes are invisible to the users and can not be formatted.
The normal bytes are storage areas which can be used by the users with a right of complete control.
Next, the process of writing a USB flash memory disk password and installing the security software will be described with reference to
At step 101, the security software is installed.
At step 102, the security software is initialized, and the operation system log-on information such as username and log-on password is collected.
At step 103, whether the USB flash memory disk is properly connected or not is detected;
At step 104, whether the USB flash memory disk is properly connected is determining based on the detecting result of the step 103. If so, the process goes to step 107.
At step 105, the user is inquired whether to end the installation or not. If the user confirms the complete of the software installation, then the security software is quitted, and the installation procedure is ended. Therefore, the installation of the software is fail.
At step 106, the user is prompted to connect the USB flash memory disk to the USB interface, and the process goes to the step 103 after the user confirms the connection.
At step 107, a password of the USB flash memory disk is inputted by the user.
At step 108, the operation system log-on information and the USB flash memory disk password is formed into an encrypted file.
At step 109, the password is written into the private bytes or the normal bytes of the USB flash memory disk.
At step 110, it judges whether the writing of the password is successful or not. If it is, the process goes to execute the step 111. If it is not, the process returns to the step 105.
At step 111, the installation of the security software is complete, the operation system is rebooted.
Next, the flow for authentication while the operation system of a computer is started-up will be described with reference of
At step 201, the operation system is started up.
At step 202, whether the USB flash memory disk is properly connected or not is detected.
At step 203, whether the USB flash memory disk is properly connected or not is determined based on the detecting result in the step 202. If it is, the process goes to the step 206. If it is not, the process proceeds to the step 204;
At step 204, the user is inquired whether to re-authenticate or not. If the user determines to re-authenticate, the process goes to the step 205. Otherwise, the operation system is shut down.
At step 205, the user is prompted to connect the USB flash memory disk to the USB interface, and the process returns to the step 202 after the user confirms the connection;
At step 206, the user inputs a USB flash memory disk password;
At step 207, the authentication information of the USB flash memory disk is read.
At step 208, the password input by the user is authenticated according to the authentication information.
At step 209, whether the authentication is successful or not is determined. If it is successful, the process goes to the step 210, and if it is not, the process returns to the step 204.
At step 210, the operation system is automatically logged on with the operation system log-on information stored in the USB flash memory disk.
Next, the process for monitoring the USB flash memory disk and executing authentication after the USB flash memory disk disconnects with the USB interface will be described with reference to
At step 301, the security software periodically detects the USB flash memory disk when the user executes normal operations;
At step 302, it determines whether the USB flash memory disk is properly connected or not based on the detecting result in the step 301. If it is, the process returns to the step 301. Otherwise, the process goes to the step 303.
At step 303, the operating system is locked.
At step 304, the user is prompted to connect the USB flash memory disk to the USB interface.
At step 305, whether the USB flash memory disk is properly connected or not is detected after the connecting of the USB flash memory disk.
At step 306, whether the USB flash memory disk is properly connected or not is determined based on the detecting result in step 305. If it is, the process goes to the step 307. Otherwise, process returns to the step 304.
At step 307, the user inputs a USB flash memory disk password.
At step 308, the authentication information of the USB flash memory disk is read.
At step 309, the password input by the user is authenticated according to the authentication information;
At step 310, whether the authentication is successful or not is determined. If it is successful, the process goes to the step 311. If it is not, the process returns to the step 304.
At step 311, the lock of the operating system is released and then the process returns to the step 301.
The encryption/decryption to files with the security software and the USB flash memory disk will be described with reference to
At step 501, the file to be encrypted is determined.
At step 502, whether the USB flash memory disk is properly connected or not is detected;
At step 503, whether the USB flash memory disk is properly connected or not is determined based on the detecting result in the step 502. If it is, the process goes to the step 506. If it is not, the process goes to the step 504.
At step 504, the user is inquired whether to re-authenticate or not. If the user determines to re-authenticate, the process goes to the step 505. Otherwise,the encryption process is exited, and the file is unencrypted.
At step 505, the user is prompted to connect a USB flash memory disk to the USB interface. The process goes to the step 502 after confirming the connecting of the USB flash memory disk.
At step 506, the user inputs an encryption password.
At step 507, the authentication information is written into the private bytes of the USB flash memory disk.
At step 508, it judges whether the writing of the authentication information is successful or not. If it is successful, the process goes to the step 509. Otherwise, the process returns to the step 504;
At step 509, the normal file is converted into an encrypted file.
Next, a method of decrypting the encrypted files with the security software and the USB flash memory disk will be described with reference to
At step 401, the file to be decrypted is determined.
At step 402, whether the USB flash memory disk is properly connected or not is detected.
At step 403, whether the USB flash memory disk is properly connected or not is determined based on the detecting result in the step 402. If it is, the process goes to the step 406. If it is not, then the process goes to the step 404.
At step 404, the user is inquired whether to re-authenticate or not. If the user determines to re-authenticate, then the process goes to the step 405. Otherwise, the decryption process is exited. At that time, the file is still in the encrypted state.
At step 405, the user is prompted to connect the USB flash memory disk to the USB interface. The process returns to the step 402 after confirming the connection of the USB flash memory disk.
At step 406, the user inputs a decryption password.
At step 407, the authentication information of the USB flash memory disk is read.
At step 408, the password input by the user is authenticated according to the authentication information.
At step 409, whether the authentication is successful or not is determined. If it is successful, the process goes to the step 410. If it is not, the process returns to the step 404.
At step 410, the encrypted file is restore into the normal file.
It should be noted that the above embodiments are described for only illustrating the technical solutions of the present invention without limiting the scope of the present invention. Although the present invention is illustrated with reference to the preferred embodiments thereof, it should be understood by those skilled in the art that various changes or equivalent alterations to the present invention are possible without departing from the spirit or scope of the present invention and are encompassed in the scope defined by the claims of the present invention.
标题 | 发布/更新时间 | 阅读量 |
---|---|---|
一种检测实验室数据智能管理系统 | 2020-05-14 | 496 |
一种通用串行总线接口及其电路、USB闪存盘 | 2020-05-08 | 292 |
一种系统日志的收集方法 | 2020-05-18 | 860 |
一种用于存储数据的闪存盘 | 2020-05-12 | 480 |
一种记录心率的闪存盘 | 2020-05-15 | 134 |
一种无储能模块保持显示信息的新型USB闪存盘 | 2020-05-11 | 66 |
一种四合一OTG闪存盘 | 2020-05-13 | 132 |
一种活体指纹识别的安全芯片加密可管理USB闪存盘 | 2020-05-17 | 403 |
一种多功能点读笔学习系统 | 2020-05-18 | 677 |
一种涂布烘烤温度的测量装置 | 2020-05-20 | 22 |
高效检索全球专利专利汇是专利免费检索,专利查询,专利分析-国家发明专利查询检索分析平台,是提供专利分析,专利查询,专利检索等数据服务功能的知识产权数据服务商。
我们的产品包含105个国家的1.26亿组数据,免费查、免费专利分析。
专利汇分析报告产品可以对行业情报数据进行梳理分析,涉及维度包括行业专利基本状况分析、地域分析、技术分析、发明人分析、申请人分析、专利权人分析、失效分析、核心专利分析、法律分析、研发重点分析、企业专利处境分析、技术处境分析、专利寿命分析、企业定位分析、引证分析等超过60个分析角度,系统通过AI智能系统对图表进行解读,只需1分钟,一键生成行业专利分析报告。