CN111354107B - File management device and file management method - Google Patents

File management device and file management method Download PDF

Info

Publication number
CN111354107B
CN111354107B CN202010104735.4A CN202010104735A CN111354107B CN 111354107 B CN111354107 B CN 111354107B CN 202010104735 A CN202010104735 A CN 202010104735A CN 111354107 B CN111354107 B CN 111354107B
Authority
CN
China
Prior art keywords
control terminal
main control
file
fingerprint
input mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010104735.4A
Other languages
Chinese (zh)
Other versions
CN111354107A (en
Inventor
朱志能
宋淑萍
胡云飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Chunhuixin Archives Technology Service Co Ltd
Original Assignee
Shenzhen Chunhuixin Archives Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Chunhuixin Archives Technology Service Co Ltd filed Critical Shenzhen Chunhuixin Archives Technology Service Co Ltd
Priority to CN202010104735.4A priority Critical patent/CN111354107B/en
Publication of CN111354107A publication Critical patent/CN111354107A/en
Application granted granted Critical
Publication of CN111354107B publication Critical patent/CN111354107B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a file management device and a file management method, which solve the problem that the file cabinet can be freely opened by outsiders after knowing the opening mode of the file cabinet, and the information of files in the file cabinet is easy to leak, and comprises the following steps: step S100: the main control terminal judges whether a file manager exists around the file cabinet; step S200: the master control terminal dynamically adjusts an actual correct password and an actual correct password input mode by combining the voice and the fingerprint of a file manager; step S300: the main control terminal compares the password input by the user and the input mode of the password with the actual correct password and the actual correct password input mode. The invention has the effect of preventing outsiders from opening the file cabinet by means of encryption.

Description

File management device and file management method
Technical Field
The present invention relates to the field of file management technologies, and in particular, to a file management apparatus and a file management method.
Background
Filing cabinets, i.e. cabinets for holding archival data, are more traditional devices for holding files, and are usually boxes with covers and cabinets with doors.
The utility model provides an application number is CN201510832863.X and name is intelligent file administration cabinet, including intelligent file administration cabinet main part, be equipped with ventilation circulation exhaust apparatus seat groove in intelligent file administration cabinet main part, be equipped with ventilation exhaust apparatus in the ventilation circulation exhaust apparatus seat groove, be equipped with ventilation exhaust apparatus on the ventilation exhaust apparatus, be equipped with the grid of taking a breath in the ventilation exhaust apparatus, the ventilation exhaust apparatus right side is equipped with the suggestion lamp groove, is equipped with the suggestion lamp shade in the suggestion lamp groove, is equipped with the suggestion flashing lamp in the suggestion lamp shade. The multifunctional archive storage and retrieval system is complete in function, convenient to use, time-saving, labor-saving, scientific, convenient, safe, efficient, scientific, effective, complete in function, scientific and comfortable when being used for carrying out intelligent management and multifunctional storage and retrieval of archives, and reduces the working difficulty of archive office managers.
The above prior art solutions have the following drawbacks: the file cabinet can be freely opened after the file cabinet opening mode is known by outsiders, and the information of files in the file cabinet is easily leaked.
Disclosure of Invention
The invention aims to provide a file management method which has the effect of preventing outsiders from opening a file cabinet by encryption means.
The above object of the present invention is achieved by the following technical solutions:
a method of archive management, comprising:
step S100: the main control terminal judges whether a file manager exists around the file cabinet;
step S200: the master control terminal dynamically adjusts an actual correct password and an actual correct password input mode by combining the voice and the fingerprint of a file manager;
step S300: the main control terminal compares the password input by the user and the input mode of the password with the actual correct password and the actual correct password input mode.
By adopting the technical scheme, whether the file management personnel are near the file cabinet or not is effectively judged through the setting of the step S100, the step S200 and the step S300, and meanwhile, the file cabinet is prevented from being opened by outsiders at will by an encryption mode.
The invention is further configured to: the file management method, step S100, includes the following steps:
step S110: the main control terminal takes a file manager as a query object, and queries a mobile phone number matched with the corresponding file manager in a first database, wherein the first database is a preset database and stores the file manager and the mobile phone number of the file manager;
step S120: the main control terminal takes the mobile phone number of the file manager as a query object to query the position of the corresponding file manager in the first database;
step S130: the main control terminal judges whether the file management personnel are around the file cabinet or not based on the position of the file management personnel and the preset position of the file cabinet.
By adopting the technical scheme, the method effectively discloses how to judge that the archive management personnel is near the archive cabinet through the settings of the step S110, the step S120 and the step S130.
The invention is further configured to: step S200 includes the steps of:
step S210: the main control terminal takes a file manager as an inquiry object to inquire out the fingerprint of each finger of the corresponding file manager and the number corresponding to the corresponding fingerprint in a second database, the second database is a preset database and stores the fingerprint information of the file manager and the corresponding file manager, and the fingerprint information comprises the finger fingerprint and the number corresponding to the corresponding finger fingerprint;
the main control terminal takes the file managers as query objects to query the voice information of different numbers of the corresponding file managers in the third database;
step S220: the main control terminal identifies the first input fingerprint of the user through the fingerprint identification device, and queries in the second database, if yes, then step S230 is started.
Through adopting above-mentioned technical scheme, effectively realized the preliminary judgement whether to open the filing cabinet to the file administration staffing personnel through the setting of step S210, step S220.
The invention is further configured to: step S230 includes the steps of:
step S231: the master control terminal starts an identifying code transmitter to transmit a random digital identifying code to a user mobile phone;
step S232: the main control terminal obtains the last two digits of the current date and compares the last two digits, the larger digit is used as the first digit, the smaller digit is positioned at the last digit, and the random number verification code is used as the middle digit section to form a complete password;
step S233: the main control terminal determines the input mode of the complete password according to the parity of the last digit of the complete password, if the number of the last digit is odd, the input mode of the password is a fingerprint input mode, namely, the input mode is one by one according to the fingerprint corresponding to each digit, and the main control terminal identifies the fingerprint of the user one by one through a fingerprint identification device and inquires out the digit matched with the corresponding fingerprint in a second database;
if the number is even, the password input mode is a voice input mode, that is, the main control terminal identifies each digital voice of the user through the voice identification device and inquires out the number represented by the corresponding user in the third database.
By adopting the technical scheme, the generation mode of the specific complete password and the input mode aiming at the complete password are effectively disclosed through the combined setting of the step S231, the step S232 and the step S233, and the file cabinet is further prevented from being opened by an outsider through random login.
The invention is further configured to: step S300 includes the steps of:
step S310: the main control terminal compares the password input by the user and the input mode of the password with the actual correct password and the actual correct password input mode;
step S320: if the comparison is successful once, the file cabinet is opened;
if the comparison times are more than 1 and less than 4, returning to the step S200;
if the comparison times exceed 4, step S330 is started.
By adopting the technical scheme, the judgment is made based on the password input by the user and the input mode through the combined setting of the step S310 and the step S320, and corresponding operation is carried out based on the judgment result.
The invention is further configured to: step S330: the main control terminal sends a correct password input mode to the mobile phone of the user through a short message.
By adopting the technical scheme, the file manager can conveniently forget the correct password input mode, so that the file manager can not log in.
The invention is further configured to: the short message in step S330 is sent by the short message sender.
By adopting the technical scheme, on one hand, the short message can be sent by the short message sender, and the cost can be reduced.
The invention also aims to provide a file management device which has the effect of preventing outsiders from opening the file cabinet by means of encryption.
A file management apparatus, comprising a memory, a main control terminal and a program stored in the memory and capable of running on the main control terminal, wherein the program can be loaded and executed by the main control terminal to implement the file management method according to any one of claims 1 to 7.
Through adopting above-mentioned technical scheme, effectively improved the encrypted degree of difficulty through above-mentioned procedure, avoided the outsider to explain to open the filing cabinet.
In conclusion, the beneficial technical effects of the invention are as follows: by intelligently changing the password and adjusting the input mode of the input password, the possibility of login of outsiders is greatly avoided.
Drawings
FIG. 1 is a diagram illustrating the overall steps of the file management method according to the present invention.
Fig. 2 is a detailed step diagram of step S100 in fig. 1.
Fig. 3 is a detailed step diagram of step S200 in fig. 1.
Fig. 4 is a detailed step diagram of step S230.
Fig. 5 is a detailed step diagram of step S300 in fig. 1.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
Referring to fig. 1, a file management method disclosed by the present invention includes: step S100: the main control terminal judges whether a file manager exists around the file cabinet; step S200: the master control terminal dynamically adjusts an actual correct password and an actual correct password input mode by combining the voice and the fingerprint of a file manager; step S300: the main control terminal compares the password input by the user and the input mode of the password with the actual correct password and the actual correct password input mode.
As shown in fig. 2, the step S100 includes the following steps for determining whether there is a file manager around the file cabinet: step S110: the main control terminal takes a file manager as a query object, and queries a mobile phone number matched with the corresponding file manager in a first database, wherein the first database is a preset database and stores the file manager and the mobile phone number of the file manager; step S120: the main control terminal takes the mobile phone number of the file manager as a query object to query the position of the corresponding file manager in the first database; step S130: the main control terminal judges whether the file management personnel are around the file cabinet or not based on the position of the file management personnel and the preset position of the file cabinet.
As shown in fig. 3, the step S200 includes the following steps in view of preliminarily judging that the archive administrator wants to log in: step S210: the main control terminal takes a file manager as an inquiry object to inquire out the fingerprint of each finger of the corresponding file manager and the number corresponding to the corresponding fingerprint in a second database, the second database is a preset database and stores the fingerprint information of the file manager and the corresponding file manager, and the fingerprint information comprises the finger fingerprint and the number corresponding to the corresponding finger fingerprint; the main control terminal takes the file managers as query objects to query the voice information of different numbers of the corresponding file managers in the third database; step S220: the main control terminal identifies the first input fingerprint of the user through the fingerprint identification device, and queries in the second database, if yes, then step S230 is started.
As shown in fig. 4, a corresponding encryption method is further set for improving the judgment of the archive administrator, and step S230 includes the following steps: step S231: the master control terminal starts an identifying code transmitter to transmit a random digital identifying code to a user mobile phone; step S232: the main control terminal obtains the last two digits of the current date and compares the last two digits, the larger digit is used as the first digit, the smaller digit is positioned at the last digit, and the random number verification code is used as the middle digit section to form a complete password; step S233: the main control terminal determines the input mode of the complete password according to the parity of the last digit of the complete password, if the number of the last digit is odd, the input mode of the password is a fingerprint input mode, namely, the input mode is one by one according to the fingerprint corresponding to each digit, and the main control terminal identifies the fingerprint of the user one by one through a fingerprint identification device and inquires out the digit matched with the corresponding fingerprint in a second database; if the number is even, the password input mode is a voice input mode, that is, the main control terminal identifies each digital voice of the user through the voice identification device and inquires out the number represented by the corresponding user in the third database.
For example, assuming that the random number authentication code transmitted by the authentication code transmitter is 1358, the last two digits of the current date are 15, the complete password is 513581, the mantissa is 1, i.e., an odd number, and in the case of an odd number, the fingerprint input mode is provided, assuming that starting from the left hand of the user, the thumb of the left hand represents 0, the index finger of the left hand is 1, the middle finger of the left hand is 2, the ring finger of the left hand is 3, the little finger of the left hand is 4, the thumb of the right hand is 5, the index finger of the right hand is 6, the middle finger of the right hand is 7, the ring finger of the right hand is 8, and the little finger of the right hand is 4, the input mode is sequentially: and the thumb of the right hand, the index finger of the left hand, the ring finger of the left hand, the thumb of the right hand and the index finger of the left hand are used for opening the file management cabinet after the password is input.
As shown in fig. 5, further considering the judgment of the password input to the archive management cabinet, step S300 includes the following steps: step S310: the main control terminal compares the password input by the user and the input mode of the password with the actual correct password and the actual correct password input mode; step S320: if the comparison is successful once, the file cabinet is opened; if the comparison times are more than 1 and less than 4, returning to the step S200; if the comparison times exceeds 4, step S330 is started, wherein step S330: the main control terminal sends a correct password input mode to the mobile phone of the user through a short message, and the short message in the step S330 is sent through a short message sender.
An embodiment of the present invention provides a file management apparatus, including a memory, a main control terminal, and a program stored in the memory and capable of running on the main control terminal, where the program is capable of being loaded and executed by the main control terminal, and is implemented as shown in fig. 1 to 5.
The embodiments of the present invention are preferred embodiments of the present invention, and the scope of the present invention is not limited by these embodiments, so: all equivalent changes made according to the structure, shape and principle of the invention are covered by the protection scope of the invention.

Claims (5)

1. A method of archive management, comprising:
step S100: the main control terminal judges whether a file manager exists around the file cabinet;
step S200: the master control terminal dynamically adjusts an actual correct password and an actual correct password input mode by combining the voice and the fingerprint of a file manager;
step S300: the main control terminal compares the password input by the user and the input mode of the password with the actual correct password and the actual correct password input mode;
step S100 includes the steps of:
step S110: the main control terminal takes a file manager as a query object, and queries a mobile phone number matched with the corresponding file manager in a first database, wherein the first database is a preset database and stores the file manager and the mobile phone number of the file manager;
step S120: the main control terminal takes the mobile phone number of the file manager as a query object to query the position of the corresponding file manager in the first database;
step S130: the main control terminal judges whether the file manager is around the file cabinet or not based on the position of the file manager and the preset position of the file cabinet;
step S200 includes the steps of:
step S210: the main control terminal takes a file manager as an inquiry object to inquire out the fingerprint of each finger of the corresponding file manager and the number corresponding to the corresponding fingerprint in a second database, the second database is a preset database and stores the fingerprint information of the file manager and the corresponding file manager, and the fingerprint information comprises the finger fingerprint and the number corresponding to the corresponding finger fingerprint;
the main control terminal takes the file managers as query objects to query the voice information of different numbers of the corresponding file managers in the third database;
step S220: the main control terminal identifies the first input fingerprint of the user through the fingerprint identification device, queries in the second database, and starts the step S230 if the first input fingerprint is queried;
step S230 includes the steps of:
step S231: the master control terminal starts an identifying code transmitter to transmit a random digital identifying code to a user mobile phone;
step S232: the main control terminal obtains the last two digits of the current date and compares the last two digits, the larger digit is used as the first digit, the smaller digit is positioned at the last digit, and the random number verification code is used as the middle digit section to form a complete password;
step S233: the main control terminal determines the input mode of the complete password according to the parity of the last digit of the complete password, if the number of the last digit is odd, the input mode of the password is a fingerprint input mode, namely, the input mode is one by one according to the fingerprint corresponding to each digit, and the main control terminal identifies the fingerprint of the user one by one through a fingerprint identification device and inquires out the digit matched with the corresponding fingerprint in a second database;
if the number is even, the password input mode is a voice input mode, that is, the main control terminal identifies each digital voice of the user through the voice identification device and inquires out the number represented by the corresponding user in the third database.
2. The archive management method according to claim 1, wherein the step S300 includes the steps of:
step S310: the main control terminal compares the password input by the user and the input mode of the password with the actual correct password and the actual correct password input mode;
step S320: if the comparison is successful once, the file cabinet is opened;
if the comparison times are more than 1 and less than 4, returning to the step S200;
if the comparison times exceed 4, step S330 is started.
3. The archive management method according to claim 2, wherein step S330: the main control terminal sends a correct password input mode to the mobile phone of the user through a short message.
4. The archive management method according to claim 3, wherein the short message in step S330 is sent by a short message sender.
5. An archive management apparatus characterized by: the file management system comprises a memory, a main control terminal and a program which is stored on the memory and can run on the main control terminal, wherein the program can be loaded and executed by the main control terminal to realize the file management method according to any one of claims 1 to 4.
CN202010104735.4A 2020-02-20 2020-02-20 File management device and file management method Active CN111354107B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010104735.4A CN111354107B (en) 2020-02-20 2020-02-20 File management device and file management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010104735.4A CN111354107B (en) 2020-02-20 2020-02-20 File management device and file management method

Publications (2)

Publication Number Publication Date
CN111354107A CN111354107A (en) 2020-06-30
CN111354107B true CN111354107B (en) 2021-09-10

Family

ID=71194046

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010104735.4A Active CN111354107B (en) 2020-02-20 2020-02-20 File management device and file management method

Country Status (1)

Country Link
CN (1) CN111354107B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112883090A (en) * 2020-12-31 2021-06-01 深圳市创奇电气有限公司 Control method and system for low-voltage power distribution cabinet with explosion-proof flame-retardant structure and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102841755A (en) * 2012-08-28 2012-12-26 广东欧珀移动通信有限公司 Method and system for unlocking mobile communication terminal
KR101281523B1 (en) * 2012-12-04 2013-07-03 박성진 Dual type door locking equipment used to finger scan
CN205038690U (en) * 2015-09-17 2016-02-17 成都九龙柜业有限公司 Acoustic control password anti -theft system
CN105678131A (en) * 2015-12-31 2016-06-15 宇龙计算机通信科技(深圳)有限公司 Information processing method, information device, mobile terminal and server
CN205405648U (en) * 2016-02-26 2016-07-27 江苏经贸职业技术学院 Training room control system
CN105976471A (en) * 2016-05-18 2016-09-28 北京千丁互联科技有限公司 Access control equipment, visitor management method and visitor management system
CN106982223A (en) * 2017-04-25 2017-07-25 上海汇尔通信息技术有限公司 A kind of safety identification authentication method and system based on fingerprint
CN107958517A (en) * 2017-12-18 2018-04-24 中国地质大学(武汉) Unlocking method based on smart lock safe class
CN109830023A (en) * 2019-03-02 2019-05-31 浙江弘电智能科技有限公司 A kind of intelligent building access control system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4704148B2 (en) * 2005-08-25 2011-06-15 Kddi株式会社 User authentication system, authentication device, terminal device, and computer program
CN103236094B (en) * 2013-03-29 2015-09-30 东莞宇龙通信科技有限公司 Gate control system and the method with mobile terminal unblock access control equipment
CN204759430U (en) * 2015-06-03 2015-11-11 杭州电子科技大学 Random cipher input device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102841755A (en) * 2012-08-28 2012-12-26 广东欧珀移动通信有限公司 Method and system for unlocking mobile communication terminal
KR101281523B1 (en) * 2012-12-04 2013-07-03 박성진 Dual type door locking equipment used to finger scan
CN205038690U (en) * 2015-09-17 2016-02-17 成都九龙柜业有限公司 Acoustic control password anti -theft system
CN105678131A (en) * 2015-12-31 2016-06-15 宇龙计算机通信科技(深圳)有限公司 Information processing method, information device, mobile terminal and server
CN205405648U (en) * 2016-02-26 2016-07-27 江苏经贸职业技术学院 Training room control system
CN105976471A (en) * 2016-05-18 2016-09-28 北京千丁互联科技有限公司 Access control equipment, visitor management method and visitor management system
CN106982223A (en) * 2017-04-25 2017-07-25 上海汇尔通信息技术有限公司 A kind of safety identification authentication method and system based on fingerprint
CN107958517A (en) * 2017-12-18 2018-04-24 中国地质大学(武汉) Unlocking method based on smart lock safe class
CN109830023A (en) * 2019-03-02 2019-05-31 浙江弘电智能科技有限公司 A kind of intelligent building access control system

Also Published As

Publication number Publication date
CN111354107A (en) 2020-06-30

Similar Documents

Publication Publication Date Title
US6381631B1 (en) Method and apparatus for controlling client computer systems
US9497191B2 (en) Multiple user authentications on a communications device
US9024720B2 (en) Access control method, and associated lock device and administration server
CA2571848A1 (en) Security access device and method
US8639873B1 (en) Detachable storage device with RAM cache
CN109344588A (en) Safety certifying method and terminal device
CN111209586A (en) Document management system and method
CN111354107B (en) File management device and file management method
CN101415075A (en) Digital camera with fingerprint identification function and use method thereof
CN109756446A (en) A kind of access method and system of mobile unit
CN108460262B (en) Cipher management method, device, terminal device and storage medium
CN111046368B (en) Face recognition-based intelligent automobile cloud platform login method
CN110103888A (en) A kind of control method of car door, system and storage medium
KR102301478B1 (en) Smart lock device, lock management system including the device, and lock management method using the system
CN111131142A (en) Fingerprint authentication encryption system and method for multi-application system
CA2509119C (en) Method, system and device for authenticating a user
CN108614979A (en) A kind of encryption system and encryption method of the wireless memory device based on Bluetooth technology
CN112469039A (en) Mobile terminal security authorization method based on security chip
CN110430207B (en) Multi-point remote cross-network interaction collaborative authentication method for smart power grid
CN112671534A (en) Service key management method, service terminal and system based on biological characteristics
CN110766832A (en) Method and system for setting temporary password of intelligent door lock
CN109326022A (en) A kind of double-core control method and system based on bluetooth Fingerprint Lock
CN106485100A (en) A kind of method of internet computer software lock and its service system
CN110675538A (en) Intelligent door lock system
US20080319998A1 (en) System and method for dynamic authorization to database objects

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant