Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Visible light communication-based limited area authority authentication device and file security method

A technology of visible light communication and limited area, which is applied in the direction of secure communication devices, computer security devices, encoding/decoding devices, etc., can solve problems such as no results, achieve improved freedom, clear security boundaries, and expand wireless hardware and software resources Effect

Active Publication Date: 2011-12-21
中港大公科技(北京)有限公司
View PDF4 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, visible light communication is an international cutting-edge scientific research field. Combining visible light communication with information security, especially in the area of ​​limited access control for file confidentiality, has not yet achieved relevant results at home and abroad.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Visible light communication-based limited area authority authentication device and file security method
  • Visible light communication-based limited area authority authentication device and file security method
  • Visible light communication-based limited area authority authentication device and file security method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Such as figure 1 As shown, the limited area authority authentication device based on visible light communication of the present invention includes an LED controller, a photoelectric receiver, a security management host, and a user host. The LED controller is connected with the security management host; the photoelectric receiver is connected with the user host.

[0038] The LED controller includes an encoding module, a modulation module, an LED driver module, an LED module, and a communication interface module. The LED controller selects a high-security CPLD programmable device as the core device to realize the coding function, such as figure 2 shown. CPLD first obtains information with the security management host through the USB interface module, and then combines the two signals of the clock signal and the data signal into one through Manchester coding, and then uses the DD311 dedicated LED driver chip to perform OOK modulation on the white LED to emit visible lig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a restrictive region permission authentication device based on visible optical communication. The device comprises an LED (Light Emitting Diode) controller, a photoelectric receiver, a safety management host and a user host. The LED controller is connected with the safety management host. The photoelectric receiver is connected with the user host. A file encryption methodcomprises the following steps of: 1, numbering files in a unified manner through a file permission management program, hiding in ciphertexts of the files, and distributing to users; 2, numbering fileusers in a unified manner through the file permission management program, and correspondingly establishing a permission database according to user permissions and numbers of the encrypted files; 3, encrypting information and secret keys in the permission database through the file permission management program, and broadcasting the information in a restrictive region through interface equipment; 4, decrypting the permission information and the secrete keys through a file permission service program, and inquiring the user permissions with input user numbers; and 5, regularly executing the step 3 according to application environment requirements, and updating the permission information and the secrete keys till the system stops working.

Description

technical field [0001] The invention relates to a limited area authority authentication device and a file security method based on visible light communication, and belongs to the technical field of information security. Background technique [0002] At present, units and departments (especially national defense and military industries) that involve national security and cutting-edge technology require employees to complete their work in a specified physical location, and they are not allowed to continue using work resources if they leave the specified physical location. In addition to the requirements of rules and regulations, access control in limited areas is technically required, that is, the files in the computer can only be accessed in specified areas such as laboratories, offices, etc. Once the files in the computer exceed the specified area, they cannot be accessed. Accessed by any user. [0003] File encryption technology has experienced the development process of s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/24G06F21/62
CPCH04L9/3226G09C1/00
Inventor 尚涛邢志博杨学行许晋瑞武宇航刘建伟
Owner 中港大公科技(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products