CN1427343A - Device for preventing setting of equipment of software be used or altered by non authorized person - Google Patents
Device for preventing setting of equipment of software be used or altered by non authorized person Download PDFInfo
- Publication number
- CN1427343A CN1427343A CN 01144326 CN01144326A CN1427343A CN 1427343 A CN1427343 A CN 1427343A CN 01144326 CN01144326 CN 01144326 CN 01144326 A CN01144326 A CN 01144326A CN 1427343 A CN1427343 A CN 1427343A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- password
- software
- equipment
- data bank
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
- Collating Specific Patterns (AREA)
Abstract
A device for preventing the settings in device and software from being used or modified by non-authorized person is composed of fingerprint image inductor, cipher, fringerprint characteristics database and cipher input unit. It features the combination of fingerprint identification or verification and cipher.
Description
Technical field
The present invention relates to a kind of close locking device, particularly a kind of device that prevents that the setting in equipment and the software from being used or changing by the unauthorized personnel.
Background technology
General hardware device or software systems are not all carried additionally any safeguard measure, so that the higher or expensive hardware device of some precision is often by some personage's uses without permission, thereby cause the hardware device spoilage high, even because of not carrying additionally any safeguard measure yet, cause unauthorized personage to enter easily and spy upon content in the system,, cause the total system characteristic to be changed fully even change the interior setting of software without authorization, and then cause the running situation of system destroyed, or content is stolen; Though closely there is the people to protect aforementioned hardware device and software in the mode of input password; enter the soft interior setting of use or change system without authorization with the uncommitted personage of strict keyholed back plate; right its password is still easily by careless and oral instructions; or usurp; and can't prevent that unauthorized personage enters; and desire is got rid of in the future; or when forbidding that this mandate personage enters; it is more difficult then to seem; even because the password in the data bank is deleted; so still can be because of oral instructions; usurp and enter again steal money get; thereby can't control fully and authorize personage's forbidding in the future; and more be unable to escape hacker's invasion, so its poor effect.
As seen, the use of this conventional cipher, the deposited mechanism of saving from damage is required, and the biological characteristic identification technology that therefore, possesses " unique not replacing " property is arisen at the historic moment.
Therefore, how to provide the method for a kind of tool uniqueness and maintainability, be the place of the technical difficulties of this case inventor institute desire solution.
Summary of the invention
In view of this, this case inventor is professional attainment and the technical concept that is possessed with itself, through the improvement that studies repeatedly, the present invention is born.
Technical matters to be solved by this invention is, above-mentioned deficiency at prior art, and a kind of device that prevents that the setting in equipment and the software from being used or changing by the unauthorized personnel is provided, preventing that the unauthorized personnel from entering hardware device or the intrasystem operator scheme of saving from damage, so reach that the equipment of preventing is used or software in setting by unauthorized personnel's change, destroy the System Operation situation or spy on content.
Above-mentioned technical matters of the present invention is realized by following technical scheme.
A kind of device that prevents that the setting in equipment and the software from being used or changing by the unauthorized personnel, it is characterized in that: comprise a fingerprint image sensor, one password, the fingerprint characteristic data bank, one password input block is formed, it is the technology by identification of fingerprint or checking, by the fingerprint characteristic data that is stored in the data bank, fingerprint characteristic comparison with fingerprint image sensor input user, the combined type checking of the password input block of arranging in pairs or groups simultaneously input password, and be equipped with according to hardware, or the degree of secrecy of system, grading authorized with operating habit, preventing that the unauthorized personnel from entering hardware device or the intrasystem operator scheme of saving from damage, and then reach the equipment of preventing and be used, or the setting in the software is changed by the unauthorized personnel, destroy the System Operation situation, or spy on content; And be authorized to the personage and enter again if desire to forbid or get rid of this in the future, then fingerprint that only will this member is deleted from the fingerprint data in the data bank, even then though this member is obtained password or usurps password by oral instructions, then still can not be inconsistent because of identification of fingerprint or the checking of not having this in the data bank, and refuse entering of this, and then can obtain the power controlled fully, but control mandate personage's right of ingress, because of can prevent the interior setting of equipment and software used by the unauthorized personnel change or content by improper destruction.
The invention has the advantages that:
1, fingerprint feature point possesses the speciality of [ten thousand people's differences, throughout one's life constant], by the identification technique and the fingerprint feature point coding techniques of fingerprint feature point, can stop fingerprint and forge, and exempts the danger of networking hacker attacks.
2, everyone all has ten fingers to use at random flexibly, can set up on demand also that different brackets employing fingerprint feature data bank (as main fingerprint, less important fingerprint, the anti-fingerprint of coercing) is easy to use, practicality is high.
3, by the technology of identification of fingerprint or checking, at will enter the hardware device system to prevent the non-management employee, but the maintainability of strengthening system.
4, dark tool convenience, practicality.
5, value on tool business circles and the industrial community.
Be convenient and understand content of the present invention, and the effect that can reach, conjunction with figs. is enumerated a specific embodiment now, detailed introduction is described as follows:
Description of drawings
Fig. 1 is a configuration diagram of the present invention.
Fig. 2 is an action flow chart of the present invention.
Embodiment
As Fig. 1, shown in Figure 2, the present invention provides a kind of device that prevents that the setting in equipment and the software from being used or changing by the unauthorized personnel, it is can be by a fingerprint image sensor 1, one password, fingerprint characteristic data bank 8, one password input block 5 is formed, technology by identification of fingerprint (Identification) or checking (Verification), by being stored in password, fingerprint characteristic data in the fingerprint characteristic data bank, compare mutually with the living body finger print feature 7 of fingerprint image sensor 1, arrange in pairs or groups the simultaneously combined type verification mode of password, and according to hardware outfit 9, or the degree of secrecy of system, grading authorized with operating habit, preventing that the unauthorized personnel from entering hardware device or the intrasystem operator scheme of saving from damage, and then reach the equipment of preventing and be used, or the setting in the software is changed by the unauthorized personnel, destroy the System Operation situation, or spy on content person; And in the future if desire to forbid, or get rid of this and be authorized to the personage and enter again and (promptly be listed in unauthorized personage, as the personnel that leave office), then fingerprint that only will this member is deleted from the fingerprint data in the data bank, even then though this member is obtained password by oral instructions, or usurp password, then still can not be inconsistent because of identification of fingerprint (Identification) or the checking (Verification) of not having this in the data bank, and refuse entering of this, and then can obtain the power of control fully, but make control mandate personage's right of ingress, used by the unauthorized personnel or change because of preventing setting in equipment and the software, or content is by improper destruction.
This operator scheme can be and inputs password (password) in advance, import fingerprint characteristic 7 again, it is beginning 4 o'clock, when the supvr connects Web or GUI 2 (world wide web), then this Web or GUI2 (world wide web) can require the user by password input block 5 input passwords, via administrative center 3 with its with password, fingerprint characteristic data bank 8 in the password comparison, verify, meet determining whether? do not meet, then be considered as uncommitted personage, refusal allows this user enter; And when meeting, this hardware equiping system then, Web or GUI 2 (world wide web) can require just to import via fingerprint image sensor 1 with the person user's fingerprint characteristic 7 more again, and when the fingerprint of fingerprint characteristic 7 and password, fingerprint characteristic data bank 8 met again, then this Web or GUI 2 (world wide web) side allowed user can use this hardware device or enters the setting changing operation conditions in the change hardware equiping system 9 or look into and look content; Otherwise, then be considered as refusing to allow this user enter without being authorized to the personage; Wherein this fingerprint characteristic is to utilize the fingerprint characteristic value of a fingerprint image sensor 1 (Fingerprint Image Sensor) with the acquisition user.
In addition the above-mentioned operator scheme of the present invention also can change to be made as and inputs fingerprint characteristic 7 in advance and input password (password) again.
In sum, the present invention has met the application important document of patent of invention really, files an application in accordance with the law.
Claims (1)
1, a kind of device that prevents that the setting in equipment and the software from being used or changing by the unauthorized personnel, it is characterized in that: comprise a fingerprint image sensor, one password, the fingerprint characteristic data bank, one password input block is formed, it is the technology by identification of fingerprint or checking, by the fingerprint characteristic data that is stored in the data bank, fingerprint characteristic comparison with fingerprint image sensor input user, the combined type checking of the password input block of arranging in pairs or groups simultaneously input password, and be equipped with according to hardware, or the degree of secrecy of system, grading authorized with operating habit, preventing that the unauthorized personnel from entering hardware device or the intrasystem operator scheme of saving from damage, and then reach the equipment of preventing and be used, or the setting in the software is changed by the unauthorized personnel, destroy the System Operation situation, or spy on content; And be authorized to the personage and enter again if desire to forbid or get rid of this in the future, then fingerprint that only will this member is deleted from the fingerprint data in the data bank, even then though this member is obtained password or usurps password by oral instructions, then still can not be inconsistent because of identification of fingerprint or the checking of not having this in the data bank, and refuse entering of this, and then can obtain the power controlled fully, but control mandate personage's right of ingress, because of can prevent the interior setting of equipment and software used by the unauthorized personnel change or content by improper destruction.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 01144326 CN1427343A (en) | 2001-12-18 | 2001-12-18 | Device for preventing setting of equipment of software be used or altered by non authorized person |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 01144326 CN1427343A (en) | 2001-12-18 | 2001-12-18 | Device for preventing setting of equipment of software be used or altered by non authorized person |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1427343A true CN1427343A (en) | 2003-07-02 |
Family
ID=4677478
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 01144326 Pending CN1427343A (en) | 2001-12-18 | 2001-12-18 | Device for preventing setting of equipment of software be used or altered by non authorized person |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1427343A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100348012C (en) * | 2003-12-05 | 2007-11-07 | 夏普株式会社 | Data processing apparatus |
WO2010115308A1 (en) * | 2009-04-10 | 2010-10-14 | Sheng Yongxiang | Login system and login method |
CN101604216B (en) * | 2008-06-10 | 2012-11-21 | 鸿富锦精密工业(深圳)有限公司 | Password protection method |
CN101464927B (en) * | 2008-07-11 | 2013-05-08 | 理康互联科技(北京)有限公司 | Medical data transmission processing system and method thereof |
CN105160274A (en) * | 2015-09-24 | 2015-12-16 | 宇龙计算机通信科技(深圳)有限公司 | User data protection method and terminal |
CN105656630A (en) * | 2015-06-29 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Identity verification method and device |
CN105701906A (en) * | 2014-11-27 | 2016-06-22 | 珠海汇金科技股份有限公司 | Self-service equipment safety management method based on fingerprint password lock |
CN106503503A (en) * | 2016-10-20 | 2017-03-15 | 宁波江东大金佰汇信息技术有限公司 | A kind of user behavior encryption method and system based on computer big data |
CN111819561A (en) * | 2018-03-09 | 2020-10-23 | 高通股份有限公司 | Integrated circuit data protection |
-
2001
- 2001-12-18 CN CN 01144326 patent/CN1427343A/en active Pending
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100348012C (en) * | 2003-12-05 | 2007-11-07 | 夏普株式会社 | Data processing apparatus |
CN101604216B (en) * | 2008-06-10 | 2012-11-21 | 鸿富锦精密工业(深圳)有限公司 | Password protection method |
CN101464927B (en) * | 2008-07-11 | 2013-05-08 | 理康互联科技(北京)有限公司 | Medical data transmission processing system and method thereof |
WO2010115308A1 (en) * | 2009-04-10 | 2010-10-14 | Sheng Yongxiang | Login system and login method |
CN105701906A (en) * | 2014-11-27 | 2016-06-22 | 珠海汇金科技股份有限公司 | Self-service equipment safety management method based on fingerprint password lock |
CN105701906B (en) * | 2014-11-27 | 2018-07-24 | 珠海汇金科技股份有限公司 | A kind of self-service device method for managing security based on finger-print puzzle lock |
CN105656630A (en) * | 2015-06-29 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Identity verification method and device |
WO2017000351A1 (en) * | 2015-06-29 | 2017-01-05 | 宇龙计算机通信科技(深圳)有限公司 | Identity verification method and apparatus |
CN105160274A (en) * | 2015-09-24 | 2015-12-16 | 宇龙计算机通信科技(深圳)有限公司 | User data protection method and terminal |
CN106503503A (en) * | 2016-10-20 | 2017-03-15 | 宁波江东大金佰汇信息技术有限公司 | A kind of user behavior encryption method and system based on computer big data |
CN111819561A (en) * | 2018-03-09 | 2020-10-23 | 高通股份有限公司 | Integrated circuit data protection |
CN111819561B (en) * | 2018-03-09 | 2023-11-03 | 高通股份有限公司 | Integrated circuit data protection |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6185316B1 (en) | Self-authentication apparatus and method | |
US6219439B1 (en) | Biometric authentication system | |
Ratha et al. | Enhancing security and privacy in biometrics-based authentication systems | |
CA2490226C (en) | Systems and methods for secure biometric authentication | |
Breebaart et al. | A reference architecture for biometric template protection based on pseudo identities | |
EP1394655A2 (en) | Secure system and method for accessing files in computers using fingerprints | |
JP2009176408A (en) | Security clearance card, system and method of reading the same | |
US20030217276A1 (en) | Match template protection within biometric security systems | |
Ratha et al. | Biometrics break-ins and band-aids | |
Schneier | Biometrics: uses and abuses | |
WO1999012144A1 (en) | Digital signature generating server and digital signature generating method | |
EP1706957B1 (en) | Biometric authentication | |
CN1427343A (en) | Device for preventing setting of equipment of software be used or altered by non authorized person | |
Gao | Biometric authentication in smart grid | |
CN112905965A (en) | Financial big data processing system based on block chain | |
CN106022037A (en) | Financial terminal authentication method and device | |
DE19703970B4 (en) | Method for collecting data and transmitting it in authentic form | |
Smejkal et al. | Strong authentication using dynamic biometric signature | |
Mills et al. | Cybercrimes against consumers: could biometric technology be the solution? | |
Aramice et al. | Secure Code Generation for Multi-Level Mutual Authentication | |
Bharvada | Electronic Signatures, Biometrics and PKI in the UK | |
Agbinya et al. | Development of digital environment identity (DEITY) system for online access | |
Wen et al. | Privacy and security in E-healthcare information management | |
Alliance | Smart Cards and Biometrics in Privacy-Sensitiv Secure Personal Identification System | |
Singh | Robust security system for critical computers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |