[go: up one dir, main page]

CN102708321A - Cloud terminal security key - Google Patents

Cloud terminal security key Download PDF

Info

Publication number
CN102708321A
CN102708321A CN201210138249XA CN201210138249A CN102708321A CN 102708321 A CN102708321 A CN 102708321A CN 201210138249X A CN201210138249X A CN 201210138249XA CN 201210138249 A CN201210138249 A CN 201210138249A CN 102708321 A CN102708321 A CN 102708321A
Authority
CN
China
Prior art keywords
encryption
usb
usb interface
decryption
casing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210138249XA
Other languages
Chinese (zh)
Other versions
CN102708321B (en
Inventor
武志学
李志�
赵阳
周静
吴开强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU GOLDTEL INDUSTRY GROUP Co Ltd
Original Assignee
CHENGDU GOLDTEL INDUSTRY GROUP Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU GOLDTEL INDUSTRY GROUP Co Ltd filed Critical CHENGDU GOLDTEL INDUSTRY GROUP Co Ltd
Priority to CN201210138249.XA priority Critical patent/CN102708321B/en
Publication of CN102708321A publication Critical patent/CN102708321A/en
Application granted granted Critical
Publication of CN102708321B publication Critical patent/CN102708321B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a cloud terminal security key which comprises a casing and a movement circuit, wherein the movement circuit is arranged in the casing, the movement circuit comprises a microprocessor, an E2PROM (electrically erasable programmable read-only memory), a FlashROM (flash read only memory), a USB (universal serial bus) controller and an encryption and decryption module, and the E2PROM, the FlashROM, the USB controller and the encryption and decryption module are connected with the microprocessor, the casing is provided with a USB interface, and the USB controller is connected with an external device (with a USB interface) through the USB interface. According to the invention, because a credible cryptography technology is adopted, a situation that the communication is intercepted and cracked can be prevented, and the credible-pattern recognition and authentication on encryption and decryption'algorithms' and the key can be supported; an asymmetric key algorithm is adopted for carrying out encryption and decryption, user identity and terminal binding, and integrity authentication examination on online data, so that a user automatically starts up encryption and decryption programs in the device by using any PC (personal computer) or a USB interface (of a PC) capable of accessing the network so as to verify the legitimacy of an account and a password of a terminal user, thereby guaranteeing the safety of dialogues between a cloud terminal user and a cloud computing server.

Description

Cloud terminal security key
Technical field
The present invention relates to a kind of cloud terminal security key.
Background technology
Cloud computing (cloud computing) is a kind of account form based on the internet, and in this way, software and hardware resources of sharing and information can offer computing machine and other equipment as required.The core concept of cloud computing is computational resource unified management and the scheduling that connects with network in a large number, constitutes a computational resource pond, to the user service is provided by user's request.
Cloud computing has the ability of facility, cheapness and the large scale computer of Internet service concurrently for the user provides a kind of new high-level efficiency computation schema.Its purpose is that resource is concentrated on the data center on the internet, and the centralized services of application layer, podium level and infrastructure layer is provided by this cloud center.Gathering, optimization, dynamic assignment and the recovery of information resources stressed in cloud computing, is intended to the burden of practicing thrift IT application cost, cutting down the consumption of energy, alleviating user profileization, improves the efficient of data center.The appearance of cloud computing has solved specific large-scale data and has handled problems.
Cloud computing is because the high concentration of its user, information resources.User's data storage, processing, Network Transmission etc. are all relevant with cloud computing system; If key or privacy information take place to be lost, steals; Concerning the user, be undoubtedly fatally, how guarantee the demand for security that safety management that cloud service provider is inner and access control mechanisms meet the client, how to implement effective security audit; Security monitoring is carried out in data operations, the security challenge of how avoiding multi-user's coexistence brings in the cloud computing environment potential risk all to become cloud computing environment being faced.
People utilize the powerful calculating ability of cloud computing server at present; Strengthen the safety that the terminal user authorizes; When the terminal user applied for authorizing, Cloud Server can be directed against each different user, adopted the different encrypted system to authorize encryption; Terminal device only need carry out the affirmation of encryption system and user identity, can realize deciphering.
Summary of the invention
The object of the invention promptly is to overcome the deficiency of prior art, and a kind of cloud terminal security key is provided, and is the convenient spoon at safe opening cloud gate, is the terminal device that the cloud platform inserts.Through using cloud terminal security key, start the safety key system, but the user can use the PC or the laptop devices of access network arbitrarily; Being connected in the proprietary cloud desktop of cloud computing server end of safe and convenient effectively utilized the computational resource of system, carries out long-range access authentication after user's login; Login the cloud platform after the mandate, use the high in the clouds service, carry out various operations; And needn't worry that common virus, file lose or be stolen, and the safety problem brought of device losses.
The object of the invention is realized through following technical scheme: cloud terminal security key, and it comprises casing and the movement circuit that places in the casing, described movement circuit comprises microprocessor, E 2PROM, Flash ROM, USB controller and encryption and decryption module, described casing is provided with one or more USB interfaces, and microprocessor is respectively through internal bus and E 2PROM, Flash ROM, USB controller, encryption and decryption module are electrically connected, and the USB controller is connected with the equipment of external belt USB interface through USB interface.
The invention has the beneficial effects as follows:
(1) the present invention provides a kind of software and hardware height integrated incorporate cloud terminal security key; Abide by national cloud computing construction technique index and the requirement of safety standard deisgn product; It is a kind of safety product that software and hardware is encrypted; Built-in miniature processor CPU adopts asymmetric key algorithm, and online data are carried out encrypting and decrypting, user identity and terminal binding, integrated authentication inspection and password authentification;
(2) the present invention provides a kind of cloud terminal security key; For the interactive communication that prevents user terminal and data center is cracked by third party's intercepting and capturing; Expand to credible cryptological technique to cryptological technique; This technology can be taken precautions against communication and cracked by intercepting and capturing, supports again encryption and decryption " algorithm " and key itself are carried out trusted mode identification authentication;
(3) the present invention provides a kind of cloud terminal security key; The PC that arbitrarily insertion can access network or the USB interface of notebook; Automatically start the encryption and decryption program in this equipment; The legitimacy of verification terminal user account and password ensures the dialogue safety between cloud terminal user and the cloud computing server.
Description of drawings
Fig. 1 is a structured flowchart of the present invention.
Embodiment
Below in conjunction with accompanying drawing the present invention is done further description, but protection scope of the present invention is not limited to the following stated.
As shown in Figure 1, cloud terminal security key, it comprises casing and the movement circuit that places in the casing, described movement circuit comprises microprocessor CPU, E 2PROM, Flash ROM, USB controller and encryption and decryption module, described casing is provided with one or more USB interfaces, and microprocessor CPU is respectively through internal bus and E 2PROM, Flash ROM, USB controller, encryption and decryption module are electrically connected, and the USB controller is connected with the equipment of external belt USB interface through USB interface, and the equipment of described external belt USB interface can be PC, notebook computer etc.

Claims (1)

1. cloud terminal security key is characterized in that: it comprises casing and the movement circuit that places in the casing, and described movement circuit comprises microprocessor, E 2PROM, Flash ROM, USB controller and encryption and decryption module, described casing is provided with one or more USB interfaces, and microprocessor is respectively through internal bus and E 2PROM, Flash ROM, USB controller, encryption and decryption module are electrically connected, and the USB controller is connected with the equipment of external belt USB interface through USB interface.
CN201210138249.XA 2012-05-07 2012-05-07 cloud terminal security key Active CN102708321B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210138249.XA CN102708321B (en) 2012-05-07 2012-05-07 cloud terminal security key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210138249.XA CN102708321B (en) 2012-05-07 2012-05-07 cloud terminal security key

Publications (2)

Publication Number Publication Date
CN102708321A true CN102708321A (en) 2012-10-03
CN102708321B CN102708321B (en) 2016-07-06

Family

ID=46901072

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210138249.XA Active CN102708321B (en) 2012-05-07 2012-05-07 cloud terminal security key

Country Status (1)

Country Link
CN (1) CN102708321B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102946440A (en) * 2012-12-04 2013-02-27 乐视致新电子科技(天津)有限公司 Automatic cloud synchronization and recovery system based on cloud storage technology
CN103944718A (en) * 2014-01-15 2014-07-23 东方通信股份有限公司 Data processing method for ATM machine-core encryption and decryption device
CN106971092A (en) * 2017-02-27 2017-07-21 无锡紫光存储系统有限公司 USB encryption card management systems based on cloud platform

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2491897Y (en) * 2001-07-30 2002-05-15 冯宇彦 Information key
CN1622517A (en) * 2003-11-27 2005-06-01 上海安创信息科技有限公司 An embedded information security platform
US20080049984A1 (en) * 2001-06-28 2008-02-28 Trek 2000 International Ltd. Portable device having biometrics-based authentication capabilities
CN202206419U (en) * 2011-05-04 2012-04-25 赵金俊 Network security terminal and interactive system based on terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080049984A1 (en) * 2001-06-28 2008-02-28 Trek 2000 International Ltd. Portable device having biometrics-based authentication capabilities
CN2491897Y (en) * 2001-07-30 2002-05-15 冯宇彦 Information key
CN1622517A (en) * 2003-11-27 2005-06-01 上海安创信息科技有限公司 An embedded information security platform
CN202206419U (en) * 2011-05-04 2012-04-25 赵金俊 Network security terminal and interactive system based on terminal

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102946440A (en) * 2012-12-04 2013-02-27 乐视致新电子科技(天津)有限公司 Automatic cloud synchronization and recovery system based on cloud storage technology
CN103944718A (en) * 2014-01-15 2014-07-23 东方通信股份有限公司 Data processing method for ATM machine-core encryption and decryption device
CN103944718B (en) * 2014-01-15 2017-04-19 东方通信股份有限公司 Data processing method for ATM machine-core encryption and decryption device
CN106971092A (en) * 2017-02-27 2017-07-21 无锡紫光存储系统有限公司 USB encryption card management systems based on cloud platform

Also Published As

Publication number Publication date
CN102708321B (en) 2016-07-06

Similar Documents

Publication Publication Date Title
US9741033B2 (en) System and method for point of sale payment data credentials management using out-of-band authentication
CN105187362B (en) Method and device for connection authentication between desktop cloud client and server
US9832172B2 (en) Content protection for data as a service (DaaS)
WO2017197974A1 (en) Biometric characteristic-based security authentication method, device and electronic equipment
US10193895B2 (en) System and method for remote authentication with dynamic usernames
CN104660583B (en) A kind of cryptographic services method based on Web cryptographic services
CN103457922A (en) Electronic authentication client-side system, processing method, electronic authentication system and method
CN102694781A (en) Internet-based system and method for security information interaction
CN101221641A (en) On-line trading method and its safety affirmation equipment
CN106462688A (en) Universal authenticator across web and mobile
CN108494793B (en) Network access method, device and system
CN117081736A (en) Key distribution method, key distribution device, communication method, and communication device
CN109587098A (en) A kind of Verification System and method, authorization server
US20160140329A1 (en) Enhanced security mechanism for authentication of users of a system
CN102708321A (en) Cloud terminal security key
CN102412969B (en) Method for carrying out authentication by remotely using certificate and secret key, apparatus and system thereof
CN103532961A (en) Method and system for authenticating identity of power grid website based on trusted crypto modules
CN114520735A (en) User identity authentication method, system and medium based on trusted execution environment
CN103051614A (en) Secure access and data transmission method for cloud platform
Chen et al. A secure mobile DRM system based on cloud architecture
CN202563516U (en) Security key for cloud terminal
CN117201124A (en) Data encryption method, device, computer equipment and storage medium
CN102647415A (en) Audio-interface-based method and system for providing identity authentication
CN102393886B (en) Safety control method of mobile terminal, device and system
CN108023979A (en) Safety strong portable operation terminal and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant