CN102708321A - Cloud terminal security key - Google Patents
Cloud terminal security key Download PDFInfo
- Publication number
- CN102708321A CN102708321A CN201210138249XA CN201210138249A CN102708321A CN 102708321 A CN102708321 A CN 102708321A CN 201210138249X A CN201210138249X A CN 201210138249XA CN 201210138249 A CN201210138249 A CN 201210138249A CN 102708321 A CN102708321 A CN 102708321A
- Authority
- CN
- China
- Prior art keywords
- encryption
- usb
- usb interface
- decryption
- casing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004891 communication Methods 0.000 abstract description 3
- 238000005516 engineering process Methods 0.000 abstract description 3
- 238000003909 pattern recognition Methods 0.000 abstract 1
- 238000000034 method Methods 0.000 description 3
- 238000007726 management method Methods 0.000 description 2
- 241001310793 Podium Species 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a cloud terminal security key which comprises a casing and a movement circuit, wherein the movement circuit is arranged in the casing, the movement circuit comprises a microprocessor, an E2PROM (electrically erasable programmable read-only memory), a FlashROM (flash read only memory), a USB (universal serial bus) controller and an encryption and decryption module, and the E2PROM, the FlashROM, the USB controller and the encryption and decryption module are connected with the microprocessor, the casing is provided with a USB interface, and the USB controller is connected with an external device (with a USB interface) through the USB interface. According to the invention, because a credible cryptography technology is adopted, a situation that the communication is intercepted and cracked can be prevented, and the credible-pattern recognition and authentication on encryption and decryption'algorithms' and the key can be supported; an asymmetric key algorithm is adopted for carrying out encryption and decryption, user identity and terminal binding, and integrity authentication examination on online data, so that a user automatically starts up encryption and decryption programs in the device by using any PC (personal computer) or a USB interface (of a PC) capable of accessing the network so as to verify the legitimacy of an account and a password of a terminal user, thereby guaranteeing the safety of dialogues between a cloud terminal user and a cloud computing server.
Description
Technical field
The present invention relates to a kind of cloud terminal security key.
Background technology
Cloud computing (cloud computing) is a kind of account form based on the internet, and in this way, software and hardware resources of sharing and information can offer computing machine and other equipment as required.The core concept of cloud computing is computational resource unified management and the scheduling that connects with network in a large number, constitutes a computational resource pond, to the user service is provided by user's request.
Cloud computing has the ability of facility, cheapness and the large scale computer of Internet service concurrently for the user provides a kind of new high-level efficiency computation schema.Its purpose is that resource is concentrated on the data center on the internet, and the centralized services of application layer, podium level and infrastructure layer is provided by this cloud center.Gathering, optimization, dynamic assignment and the recovery of information resources stressed in cloud computing, is intended to the burden of practicing thrift IT application cost, cutting down the consumption of energy, alleviating user profileization, improves the efficient of data center.The appearance of cloud computing has solved specific large-scale data and has handled problems.
Cloud computing is because the high concentration of its user, information resources.User's data storage, processing, Network Transmission etc. are all relevant with cloud computing system; If key or privacy information take place to be lost, steals; Concerning the user, be undoubtedly fatally, how guarantee the demand for security that safety management that cloud service provider is inner and access control mechanisms meet the client, how to implement effective security audit; Security monitoring is carried out in data operations, the security challenge of how avoiding multi-user's coexistence brings in the cloud computing environment potential risk all to become cloud computing environment being faced.
People utilize the powerful calculating ability of cloud computing server at present; Strengthen the safety that the terminal user authorizes; When the terminal user applied for authorizing, Cloud Server can be directed against each different user, adopted the different encrypted system to authorize encryption; Terminal device only need carry out the affirmation of encryption system and user identity, can realize deciphering.
Summary of the invention
The object of the invention promptly is to overcome the deficiency of prior art, and a kind of cloud terminal security key is provided, and is the convenient spoon at safe opening cloud gate, is the terminal device that the cloud platform inserts.Through using cloud terminal security key, start the safety key system, but the user can use the PC or the laptop devices of access network arbitrarily; Being connected in the proprietary cloud desktop of cloud computing server end of safe and convenient effectively utilized the computational resource of system, carries out long-range access authentication after user's login; Login the cloud platform after the mandate, use the high in the clouds service, carry out various operations; And needn't worry that common virus, file lose or be stolen, and the safety problem brought of device losses.
The object of the invention is realized through following technical scheme: cloud terminal security key, and it comprises casing and the movement circuit that places in the casing, described movement circuit comprises microprocessor, E
2PROM, Flash ROM, USB controller and encryption and decryption module, described casing is provided with one or more USB interfaces, and microprocessor is respectively through internal bus and E
2PROM, Flash ROM, USB controller, encryption and decryption module are electrically connected, and the USB controller is connected with the equipment of external belt USB interface through USB interface.
The invention has the beneficial effects as follows:
(1) the present invention provides a kind of software and hardware height integrated incorporate cloud terminal security key; Abide by national cloud computing construction technique index and the requirement of safety standard deisgn product; It is a kind of safety product that software and hardware is encrypted; Built-in miniature processor CPU adopts asymmetric key algorithm, and online data are carried out encrypting and decrypting, user identity and terminal binding, integrated authentication inspection and password authentification;
(2) the present invention provides a kind of cloud terminal security key; For the interactive communication that prevents user terminal and data center is cracked by third party's intercepting and capturing; Expand to credible cryptological technique to cryptological technique; This technology can be taken precautions against communication and cracked by intercepting and capturing, supports again encryption and decryption " algorithm " and key itself are carried out trusted mode identification authentication;
(3) the present invention provides a kind of cloud terminal security key; The PC that arbitrarily insertion can access network or the USB interface of notebook; Automatically start the encryption and decryption program in this equipment; The legitimacy of verification terminal user account and password ensures the dialogue safety between cloud terminal user and the cloud computing server.
Description of drawings
Fig. 1 is a structured flowchart of the present invention.
Embodiment
Below in conjunction with accompanying drawing the present invention is done further description, but protection scope of the present invention is not limited to the following stated.
As shown in Figure 1, cloud terminal security key, it comprises casing and the movement circuit that places in the casing, described movement circuit comprises microprocessor CPU, E
2PROM, Flash ROM, USB controller and encryption and decryption module, described casing is provided with one or more USB interfaces, and microprocessor CPU is respectively through internal bus and E
2PROM, Flash ROM, USB controller, encryption and decryption module are electrically connected, and the USB controller is connected with the equipment of external belt USB interface through USB interface, and the equipment of described external belt USB interface can be PC, notebook computer etc.
Claims (1)
1. cloud terminal security key is characterized in that: it comprises casing and the movement circuit that places in the casing, and described movement circuit comprises microprocessor, E
2PROM, Flash ROM, USB controller and encryption and decryption module, described casing is provided with one or more USB interfaces, and microprocessor is respectively through internal bus and E
2PROM, Flash ROM, USB controller, encryption and decryption module are electrically connected, and the USB controller is connected with the equipment of external belt USB interface through USB interface.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201210138249.XA CN102708321B (en) | 2012-05-07 | 2012-05-07 | cloud terminal security key |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201210138249.XA CN102708321B (en) | 2012-05-07 | 2012-05-07 | cloud terminal security key |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN102708321A true CN102708321A (en) | 2012-10-03 |
| CN102708321B CN102708321B (en) | 2016-07-06 |
Family
ID=46901072
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201210138249.XA Active CN102708321B (en) | 2012-05-07 | 2012-05-07 | cloud terminal security key |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN102708321B (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102946440A (en) * | 2012-12-04 | 2013-02-27 | 乐视致新电子科技(天津)有限公司 | Automatic cloud synchronization and recovery system based on cloud storage technology |
| CN103944718A (en) * | 2014-01-15 | 2014-07-23 | 东方通信股份有限公司 | Data processing method for ATM machine-core encryption and decryption device |
| CN106971092A (en) * | 2017-02-27 | 2017-07-21 | 无锡紫光存储系统有限公司 | USB encryption card management systems based on cloud platform |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN2491897Y (en) * | 2001-07-30 | 2002-05-15 | 冯宇彦 | Information key |
| CN1622517A (en) * | 2003-11-27 | 2005-06-01 | 上海安创信息科技有限公司 | An embedded information security platform |
| US20080049984A1 (en) * | 2001-06-28 | 2008-02-28 | Trek 2000 International Ltd. | Portable device having biometrics-based authentication capabilities |
| CN202206419U (en) * | 2011-05-04 | 2012-04-25 | 赵金俊 | Network security terminal and interactive system based on terminal |
-
2012
- 2012-05-07 CN CN201210138249.XA patent/CN102708321B/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080049984A1 (en) * | 2001-06-28 | 2008-02-28 | Trek 2000 International Ltd. | Portable device having biometrics-based authentication capabilities |
| CN2491897Y (en) * | 2001-07-30 | 2002-05-15 | 冯宇彦 | Information key |
| CN1622517A (en) * | 2003-11-27 | 2005-06-01 | 上海安创信息科技有限公司 | An embedded information security platform |
| CN202206419U (en) * | 2011-05-04 | 2012-04-25 | 赵金俊 | Network security terminal and interactive system based on terminal |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102946440A (en) * | 2012-12-04 | 2013-02-27 | 乐视致新电子科技(天津)有限公司 | Automatic cloud synchronization and recovery system based on cloud storage technology |
| CN103944718A (en) * | 2014-01-15 | 2014-07-23 | 东方通信股份有限公司 | Data processing method for ATM machine-core encryption and decryption device |
| CN103944718B (en) * | 2014-01-15 | 2017-04-19 | 东方通信股份有限公司 | Data processing method for ATM machine-core encryption and decryption device |
| CN106971092A (en) * | 2017-02-27 | 2017-07-21 | 无锡紫光存储系统有限公司 | USB encryption card management systems based on cloud platform |
Also Published As
| Publication number | Publication date |
|---|---|
| CN102708321B (en) | 2016-07-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9741033B2 (en) | System and method for point of sale payment data credentials management using out-of-band authentication | |
| CN105187362B (en) | Method and device for connection authentication between desktop cloud client and server | |
| US9832172B2 (en) | Content protection for data as a service (DaaS) | |
| WO2017197974A1 (en) | Biometric characteristic-based security authentication method, device and electronic equipment | |
| US10193895B2 (en) | System and method for remote authentication with dynamic usernames | |
| CN104660583B (en) | A kind of cryptographic services method based on Web cryptographic services | |
| CN103457922A (en) | Electronic authentication client-side system, processing method, electronic authentication system and method | |
| CN102694781A (en) | Internet-based system and method for security information interaction | |
| CN101221641A (en) | On-line trading method and its safety affirmation equipment | |
| CN106462688A (en) | Universal authenticator across web and mobile | |
| CN108494793B (en) | Network access method, device and system | |
| CN117081736A (en) | Key distribution method, key distribution device, communication method, and communication device | |
| CN109587098A (en) | A kind of Verification System and method, authorization server | |
| US20160140329A1 (en) | Enhanced security mechanism for authentication of users of a system | |
| CN102708321A (en) | Cloud terminal security key | |
| CN102412969B (en) | Method for carrying out authentication by remotely using certificate and secret key, apparatus and system thereof | |
| CN103532961A (en) | Method and system for authenticating identity of power grid website based on trusted crypto modules | |
| CN114520735A (en) | User identity authentication method, system and medium based on trusted execution environment | |
| CN103051614A (en) | Secure access and data transmission method for cloud platform | |
| Chen et al. | A secure mobile DRM system based on cloud architecture | |
| CN202563516U (en) | Security key for cloud terminal | |
| CN117201124A (en) | Data encryption method, device, computer equipment and storage medium | |
| CN102647415A (en) | Audio-interface-based method and system for providing identity authentication | |
| CN102393886B (en) | Safety control method of mobile terminal, device and system | |
| CN108023979A (en) | Safety strong portable operation terminal and system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant |