CN-122020743-A - Method for dynamically monitoring storage data of intelligent encrypted USB flash disk
Abstract
The invention discloses a dynamic monitoring method of storage data of an intelligent encryption U disk, which relates to the technical field of U disk encryption storage and comprises the following steps of inputting identity information of a user for the intelligent encryption U disk, extracting information characteristics in the identity information, generating a dedicated identity encryption key for the identity information based on the information characteristics, converting the identity information into information codes, carrying out encryption protection on the identity information through the identity encryption key, outputting an identity ciphertext, simultaneously retaining the identity information, decrypting the identity ciphertext and verifying whether the identity ciphertext can be restored to the identity information or not, and completing monitoring on whether the identity ciphertext has errors in an encryption process.
Inventors
- HUANG CHUNMING
- SHI XUEFEI
- WANG HONG
Assignees
- 深圳市杰芯智电子科技有限公司
Dates
- Publication Date
- 20260512
- Application Date
- 20260127
Claims (10)
- 1. The method for dynamically monitoring the storage data of the intelligent encrypted USB flash disk is characterized by comprising the following steps of: inputting identity information of a user for the intelligent encryption USB flash disk; Extracting information characteristics in the identity information, and generating a dedicated identity encryption key for the identity information based on the information characteristics; The identity information is converted into information codes, the identity information is encrypted and protected through an identity encryption key, an identity ciphertext is output, and meanwhile the identity information is reserved; Decrypting the identity ciphertext and verifying whether the identity ciphertext can be restored to the identity information, so as to finish monitoring whether the identity ciphertext has errors in the encryption process.
- 2. The method for dynamically monitoring the storage data of the intelligent encryption USB flash disk according to claim 1, wherein the step of inputting the identity information of the user for the intelligent encryption USB flash disk comprises the following sub-steps: after purchasing the intelligent encryption USB flash disk, the user creates an access password when using for the first time; the intelligent encryption USB flash disk is characterized in that a fingerprint acquisition device is arranged on the surface of the intelligent encryption USB flash disk, when a user holds the USB flash disk and inserts the USB interface, the fingerprint acquisition device can directly acquire fingerprint data of the user, and the fingerprint data are stored in a text format; After the user creates the access password, prompting the user to input fingerprint data, wherein the first input fingerprint data is used as fingerprint reference data; The access password and the fingerprint reference data together form identity information.
- 3. The method for dynamically monitoring storage data of an intelligent encrypted usb disk according to claim 2, wherein the steps of extracting information features from the identity information and generating a dedicated identity encryption key for the identity information based on the information features include the following sub-steps: converting the access password in the identity information into hexadecimal format and extracting information characteristics in the hexadecimal format; A proprietary identity encryption key is generated for the identity information based on the information characteristics.
- 4. The method for dynamically monitoring storage data of an intelligent encrypted usb disk according to claim 3, wherein the steps of converting an access password in the identity information into hexadecimal format and extracting information features therein include the following sub-steps: converting the access password into hexadecimal format codes according to ASCII codes, and naming the hexadecimal format codes as identity codes; Each bit of character in the access password is converted into a code in a two-bit hexadecimal format, the code is named as a body part code, the identity part codes are numbered according to the sequence from left to right, the code is represented by a symbol W n , n is a non-zero natural number, n is a serial number of W, and W n is an information characteristic.
- 5. The method for dynamically monitoring storage data of an intelligent encrypted usb disk according to claim 4, wherein the steps of extracting information features in the identity code and generating the identity encryption key include the following sub-steps: The first digit and the last digit in W n are respectively marked as Q1 and Q2; Calculation of The integer of the result obtained by calculating Q1 and Q2 in W n is marked as E n ; e n is combined according to the sequence from n to obtain an identity encryption key.
- 6. The method for dynamically monitoring storage data of an intelligent encrypted USB flash disk according to claim 5, wherein the steps of converting the identity information into an information code and encrypting and protecting the identity information by an identity encryption key, outputting an identity ciphertext, and simultaneously retaining the identity information comprise the following sub-steps: the identity information is converted into information codes, and a coding table to be encrypted is generated based on the information codes; and encrypting and protecting the coding table to be encrypted through the identity encryption key, and outputting an identity ciphertext.
- 7. The method for dynamically monitoring storage data of an intelligent encrypted usb disk according to claim 6, wherein the step of converting the identity information into an information code, and generating the coding table to be encrypted based on the information code includes the following sub-steps: converting any identity information into a binary format code based on UTF-8 coding, and naming the binary format code as an information code, wherein each character in the identity information is converted into an eight-bit binary format code, namely the bit number of the information code is a multiple of 8, and dividing the bit number of the information code by 8 to obtain X; And constructing an X-row 8-column table, named as a blank coding table, and recording the information codes into the blank coding table to obtain the coding table to be encrypted.
- 8. The method for dynamically monitoring storage data of an intelligent encrypted usb disk according to claim 7, wherein the encrypting protection of the encoding table to be encrypted by the identity encryption key, and the outputting of the identity ciphertext comprises the following sub-steps: acquiring an identity encryption key, converting the identity encryption key into a code in a decimal format based on ASCII (integrated circuit code) coding, naming the code as a key code, numbering the numbers in the key code according to the sequence from left to right, and representing the numbers by a symbol R m , wherein m is a non-zero natural number and m is a serial number of R; The number in the ith row and the jth column in the coding table to be encrypted is marked as S (i, j); Starting with m=1, acquiring R m and R m+1 , judging whether the parity of R m and R m+1 are the same, if so, outputting a combined signal, if not, judging whether R m and R m+1 are prime numbers, if so, outputting a combined signal, and if not, outputting a termination signal; if the combined signal is output, R m and R m+1 are summarized into a group of encryption arrays, and meanwhile, i is added together for re-judgment, and if the termination signal is output, i is added together for re-judgment; Counting the number of R m in different encrypted arrays, naming the number as a split number, numbering the encrypted arrays according to the sequence of generation of the encrypted arrays, and representing the encrypted arrays by a symbol T c , wherein c is a non-zero natural number and c is a sequence number of T, and marking the split number corresponding to T c as Y c ; Starting with i=1 and c=1, dividing the ith row to the Y c +Y c-1 row in the coding table to be encrypted into a group of coding sub-tables, dividing the coding sub-tables again by i+Y c and c+1, numbering the coding sub-tables according to the dividing sequence, and representing the coding sub-tables by a symbol K d , wherein d is a non-zero natural number and d is a sequence number of K; For any K d , the number in the a-th row and b-th column in K d is marked as L (a, b), L (a, b) is acquired downwards from L (1, 1) starting with a=b=1, and is marked as V u according to the acquisition sequence, wherein u is a non-zero natural number and u is a serial number of V, if L (a, b) or L (a, b) cannot be acquired, the acquisition direction is rotated anticlockwise, L (a, b) is continuously acquired, V u is obtained, when the acquisition direction is rotated downwards, the right acquisition is changed, the upward acquisition is changed, the left acquisition is changed, and the circular execution is performed; and combining the V u according to the sequence from u to d to K d to obtain an identity ciphertext, and respectively corresponding the access password and the fingerprint reference data to one identity ciphertext.
- 9. The method for dynamically monitoring the storage data of the intelligent encrypted USB flash disk according to claim 8, wherein the steps of decrypting the identity ciphertext and verifying whether the identity ciphertext can be restored to the identity information, and completing the monitoring of whether the identity ciphertext has errors in the encryption process comprise the following sub-steps: after the identity ciphertext is obtained through encryption, the identity information is reserved, the identity ciphertext is decrypted through an identity encryption key, and an access password and fingerprint reference data obtained through decryption are named as an access verification password and fingerprint verification data respectively; judging whether the access verification password is the same as the access password, judging whether fingerprint verification data is the same as fingerprint reference data, outputting a verification passing signal if the fingerprint verification data is the same as the fingerprint reference data, otherwise outputting a verification failure signal, and collectively judging the verification passing signal and the verification failure signal as monitoring verification signals; And processing the identity ciphertext and the identity information based on the monitoring verification signal.
- 10. The method for dynamically monitoring stored data of an intelligent encrypted usb disk according to claim 9, wherein the processing of the identity ciphertext and the identity information based on the monitoring verification signal includes the following sub-steps: If the verification passing signal is output, the identity information is deleted, and the identity ciphertext is stored in the intelligent encryption U disk; If the verification failure signal is output, deleting the identity ciphertext, and encrypting the identity information again until the verification passing signal is output; When a user accesses the intelligent encryption USB flash disk, fingerprint data of the user are extracted when the user inserts the intelligent encryption USB flash disk, the user inputs an access password, then the access password is analyzed to obtain an identity encryption key, the identity ciphertext is decrypted through the identity encryption key, and whether the user logs in or not is judged through the access verification password and the fingerprint verification data obtained after decryption.
Description
Method for dynamically monitoring storage data of intelligent encrypted USB flash disk Technical Field The invention relates to the technical field of USB flash disk encryption storage, in particular to a method for dynamically monitoring storage data of an intelligent encryption USB flash disk. Background The U disk encryption storage technology is a security technology which can convert stored data into a ciphertext form which cannot be directly read through a cryptography method in a hardware (U disk) layer and can decrypt and access original plaintext data in real time after authorization identity verification is strictly controlled. The technology for encrypting and storing the USB flash disk generally relates to encryption of storage contents, after encryption and storage of the storage contents are completed, the identity of a visitor needs to be verified, but when the identity of the visitor is verified, the prior technology for encrypting and storing the USB flash disk generally only passes through password verification, security measures are fewer, and password leakage can lead to all leakage of encrypted data stored in the USB flash disk, meanwhile, when the identity of the visitor is verified, corresponding verification data are required to be stored in the USB flash disk, the prior technology for encrypting and storing the USB flash disk has insufficient protection of the verification data, in the encryption process, based on the loophole existing in a computer, a certain bit in data transmission can cause errors in encrypted ciphertext, and if the verification data are encrypted at the moment, a user cannot open an intelligent encrypted USB flash disk, for example, in the patent application with a publication number of CN110533142A, an encrypted USB flash disk and a USB flash disk partition method are disclosed, fingerprint information in the scheme is used for verifying identity information of the user, but the fingerprint stored in the USB flash disk is not subjected to security protection, and the prior art has a certain risk of preventing and verifying the identity information from being accurately being leaked, and the risk of preventing the password from being stored in the USB flash disk cannot be verified accurately. Disclosure of Invention The invention aims to solve at least one of the technical problems in the prior art to a certain extent, by inputting the identity information of a user for an intelligent encryption U disk, then converting an access password in the identity information into a hexadecimal format and extracting information characteristics in the hexadecimal format, generating a special identity encryption key for the identity information based on the information characteristics, converting the identity information into information codes, generating a coding table to be encrypted based on the information codes, then carrying out encryption protection on the coding table to be encrypted through the identity encryption key, outputting an identity ciphertext, decrypting the identity ciphertext and verifying whether the identity ciphertext can be restored to the identity information or not, and completing the monitoring of whether the identity ciphertext has errors in the encryption process, so that the problems that the safety protection of the identity verification information is insufficient and the verification of the accuracy of the identity verification information is lacking in the conventional U disk encryption storage technology, and the intelligent encryption U disk is at leakage risk and unusable risk are solved. In order to achieve the above purpose, the present application provides a method for dynamically monitoring storage data of an intelligent encrypted USB flash disk, comprising the following steps: inputting identity information of a user for the intelligent encryption USB flash disk; Extracting information characteristics in the identity information, and generating a dedicated identity encryption key for the identity information based on the information characteristics; The identity information is converted into information codes, the identity information is encrypted and protected through an identity encryption key, an identity ciphertext is output, and meanwhile the identity information is reserved; Decrypting the identity ciphertext and verifying whether the identity ciphertext can be restored to the identity information, so as to finish monitoring whether the identity ciphertext has errors in the encryption process. Further, entering the identity information of the user for the intelligent encrypted USB flash disk comprises the following sub-steps: after purchasing the intelligent encryption USB flash disk, the user creates an access password when using for the first time; the intelligent encryption USB flash disk is characterized in that a fingerprint acquisition device is arranged on the surface of the intelligent encryption USB flash disk, when