CN1427343A - Device for preventing setting of equipment of software be used or altered by non authorized person - Google Patents

Device for preventing setting of equipment of software be used or altered by non authorized person Download PDF

Info

Publication number
CN1427343A
CN1427343A CN 01144326 CN01144326A CN1427343A CN 1427343 A CN1427343 A CN 1427343A CN 01144326 CN01144326 CN 01144326 CN 01144326 A CN01144326 A CN 01144326A CN 1427343 A CN1427343 A CN 1427343A
Authority
CN
China
Prior art keywords
fingerprint
password
software
equipment
data bank
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 01144326
Other languages
Chinese (zh)
Inventor
林文奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
YANGQING ELECTRONIC CO Ltd
Original Assignee
YANGQING ELECTRONIC CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by YANGQING ELECTRONIC CO Ltd filed Critical YANGQING ELECTRONIC CO Ltd
Priority to CN 01144326 priority Critical patent/CN1427343A/en
Publication of CN1427343A publication Critical patent/CN1427343A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Collating Specific Patterns (AREA)

Abstract

A device for preventing the settings in device and software from being used or modified by non-authorized person is composed of fingerprint image inductor, cipher, fringerprint characteristics database and cipher input unit. It features the combination of fingerprint identification or verification and cipher.

Description

Prevent the device that the setting in equipment and the software is used or changed by the unauthorized personnel
Technical field
The present invention relates to a kind of close locking device, particularly a kind of device that prevents that the setting in equipment and the software from being used or changing by the unauthorized personnel.
Background technology
General hardware device or software systems are not all carried additionally any safeguard measure, so that the higher or expensive hardware device of some precision is often by some personage's uses without permission, thereby cause the hardware device spoilage high, even because of not carrying additionally any safeguard measure yet, cause unauthorized personage to enter easily and spy upon content in the system,, cause the total system characteristic to be changed fully even change the interior setting of software without authorization, and then cause the running situation of system destroyed, or content is stolen; Though closely there is the people to protect aforementioned hardware device and software in the mode of input password; enter the soft interior setting of use or change system without authorization with the uncommitted personage of strict keyholed back plate; right its password is still easily by careless and oral instructions; or usurp; and can't prevent that unauthorized personage enters; and desire is got rid of in the future; or when forbidding that this mandate personage enters; it is more difficult then to seem; even because the password in the data bank is deleted; so still can be because of oral instructions; usurp and enter again steal money get; thereby can't control fully and authorize personage's forbidding in the future; and more be unable to escape hacker's invasion, so its poor effect.
As seen, the use of this conventional cipher, the deposited mechanism of saving from damage is required, and the biological characteristic identification technology that therefore, possesses " unique not replacing " property is arisen at the historic moment.
Therefore, how to provide the method for a kind of tool uniqueness and maintainability, be the place of the technical difficulties of this case inventor institute desire solution.
Summary of the invention
In view of this, this case inventor is professional attainment and the technical concept that is possessed with itself, through the improvement that studies repeatedly, the present invention is born.
Technical matters to be solved by this invention is, above-mentioned deficiency at prior art, and a kind of device that prevents that the setting in equipment and the software from being used or changing by the unauthorized personnel is provided, preventing that the unauthorized personnel from entering hardware device or the intrasystem operator scheme of saving from damage, so reach that the equipment of preventing is used or software in setting by unauthorized personnel's change, destroy the System Operation situation or spy on content.
Above-mentioned technical matters of the present invention is realized by following technical scheme.
A kind of device that prevents that the setting in equipment and the software from being used or changing by the unauthorized personnel, it is characterized in that: comprise a fingerprint image sensor, one password, the fingerprint characteristic data bank, one password input block is formed, it is the technology by identification of fingerprint or checking, by the fingerprint characteristic data that is stored in the data bank, fingerprint characteristic comparison with fingerprint image sensor input user, the combined type checking of the password input block of arranging in pairs or groups simultaneously input password, and be equipped with according to hardware, or the degree of secrecy of system, grading authorized with operating habit, preventing that the unauthorized personnel from entering hardware device or the intrasystem operator scheme of saving from damage, and then reach the equipment of preventing and be used, or the setting in the software is changed by the unauthorized personnel, destroy the System Operation situation, or spy on content; And be authorized to the personage and enter again if desire to forbid or get rid of this in the future, then fingerprint that only will this member is deleted from the fingerprint data in the data bank, even then though this member is obtained password or usurps password by oral instructions, then still can not be inconsistent because of identification of fingerprint or the checking of not having this in the data bank, and refuse entering of this, and then can obtain the power controlled fully, but control mandate personage's right of ingress, because of can prevent the interior setting of equipment and software used by the unauthorized personnel change or content by improper destruction.
The invention has the advantages that:
1, fingerprint feature point possesses the speciality of [ten thousand people's differences, throughout one's life constant], by the identification technique and the fingerprint feature point coding techniques of fingerprint feature point, can stop fingerprint and forge, and exempts the danger of networking hacker attacks.
2, everyone all has ten fingers to use at random flexibly, can set up on demand also that different brackets employing fingerprint feature data bank (as main fingerprint, less important fingerprint, the anti-fingerprint of coercing) is easy to use, practicality is high.
3, by the technology of identification of fingerprint or checking, at will enter the hardware device system to prevent the non-management employee, but the maintainability of strengthening system.
4, dark tool convenience, practicality.
5, value on tool business circles and the industrial community.
Be convenient and understand content of the present invention, and the effect that can reach, conjunction with figs. is enumerated a specific embodiment now, detailed introduction is described as follows:
Description of drawings
Fig. 1 is a configuration diagram of the present invention.
Fig. 2 is an action flow chart of the present invention.
Embodiment
As Fig. 1, shown in Figure 2, the present invention provides a kind of device that prevents that the setting in equipment and the software from being used or changing by the unauthorized personnel, it is can be by a fingerprint image sensor 1, one password, fingerprint characteristic data bank 8, one password input block 5 is formed, technology by identification of fingerprint (Identification) or checking (Verification), by being stored in password, fingerprint characteristic data in the fingerprint characteristic data bank, compare mutually with the living body finger print feature 7 of fingerprint image sensor 1, arrange in pairs or groups the simultaneously combined type verification mode of password, and according to hardware outfit 9, or the degree of secrecy of system, grading authorized with operating habit, preventing that the unauthorized personnel from entering hardware device or the intrasystem operator scheme of saving from damage, and then reach the equipment of preventing and be used, or the setting in the software is changed by the unauthorized personnel, destroy the System Operation situation, or spy on content person; And in the future if desire to forbid, or get rid of this and be authorized to the personage and enter again and (promptly be listed in unauthorized personage, as the personnel that leave office), then fingerprint that only will this member is deleted from the fingerprint data in the data bank, even then though this member is obtained password by oral instructions, or usurp password, then still can not be inconsistent because of identification of fingerprint (Identification) or the checking (Verification) of not having this in the data bank, and refuse entering of this, and then can obtain the power of control fully, but make control mandate personage's right of ingress, used by the unauthorized personnel or change because of preventing setting in equipment and the software, or content is by improper destruction.
This operator scheme can be and inputs password (password) in advance, import fingerprint characteristic 7 again, it is beginning 4 o'clock, when the supvr connects Web or GUI 2 (world wide web), then this Web or GUI2 (world wide web) can require the user by password input block 5 input passwords, via administrative center 3 with its with password, fingerprint characteristic data bank 8 in the password comparison, verify, meet determining whether? do not meet, then be considered as uncommitted personage, refusal allows this user enter; And when meeting, this hardware equiping system then, Web or GUI 2 (world wide web) can require just to import via fingerprint image sensor 1 with the person user's fingerprint characteristic 7 more again, and when the fingerprint of fingerprint characteristic 7 and password, fingerprint characteristic data bank 8 met again, then this Web or GUI 2 (world wide web) side allowed user can use this hardware device or enters the setting changing operation conditions in the change hardware equiping system 9 or look into and look content; Otherwise, then be considered as refusing to allow this user enter without being authorized to the personage; Wherein this fingerprint characteristic is to utilize the fingerprint characteristic value of a fingerprint image sensor 1 (Fingerprint Image Sensor) with the acquisition user.
In addition the above-mentioned operator scheme of the present invention also can change to be made as and inputs fingerprint characteristic 7 in advance and input password (password) again.
In sum, the present invention has met the application important document of patent of invention really, files an application in accordance with the law.

Claims (1)

1, a kind of device that prevents that the setting in equipment and the software from being used or changing by the unauthorized personnel, it is characterized in that: comprise a fingerprint image sensor, one password, the fingerprint characteristic data bank, one password input block is formed, it is the technology by identification of fingerprint or checking, by the fingerprint characteristic data that is stored in the data bank, fingerprint characteristic comparison with fingerprint image sensor input user, the combined type checking of the password input block of arranging in pairs or groups simultaneously input password, and be equipped with according to hardware, or the degree of secrecy of system, grading authorized with operating habit, preventing that the unauthorized personnel from entering hardware device or the intrasystem operator scheme of saving from damage, and then reach the equipment of preventing and be used, or the setting in the software is changed by the unauthorized personnel, destroy the System Operation situation, or spy on content; And be authorized to the personage and enter again if desire to forbid or get rid of this in the future, then fingerprint that only will this member is deleted from the fingerprint data in the data bank, even then though this member is obtained password or usurps password by oral instructions, then still can not be inconsistent because of identification of fingerprint or the checking of not having this in the data bank, and refuse entering of this, and then can obtain the power controlled fully, but control mandate personage's right of ingress, because of can prevent the interior setting of equipment and software used by the unauthorized personnel change or content by improper destruction.
CN 01144326 2001-12-18 2001-12-18 Device for preventing setting of equipment of software be used or altered by non authorized person Pending CN1427343A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 01144326 CN1427343A (en) 2001-12-18 2001-12-18 Device for preventing setting of equipment of software be used or altered by non authorized person

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 01144326 CN1427343A (en) 2001-12-18 2001-12-18 Device for preventing setting of equipment of software be used or altered by non authorized person

Publications (1)

Publication Number Publication Date
CN1427343A true CN1427343A (en) 2003-07-02

Family

ID=4677478

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 01144326 Pending CN1427343A (en) 2001-12-18 2001-12-18 Device for preventing setting of equipment of software be used or altered by non authorized person

Country Status (1)

Country Link
CN (1) CN1427343A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100348012C (en) * 2003-12-05 2007-11-07 夏普株式会社 Data processing apparatus
WO2010115308A1 (en) * 2009-04-10 2010-10-14 Sheng Yongxiang Login system and login method
CN101604216B (en) * 2008-06-10 2012-11-21 鸿富锦精密工业(深圳)有限公司 Password protection method
CN101464927B (en) * 2008-07-11 2013-05-08 理康互联科技(北京)有限公司 Medical data transmission processing system and method thereof
CN105160274A (en) * 2015-09-24 2015-12-16 宇龙计算机通信科技(深圳)有限公司 User data protection method and terminal
CN105656630A (en) * 2015-06-29 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Identity verification method and device
CN105701906A (en) * 2014-11-27 2016-06-22 珠海汇金科技股份有限公司 Self-service equipment safety management method based on fingerprint password lock
CN106503503A (en) * 2016-10-20 2017-03-15 宁波江东大金佰汇信息技术有限公司 A kind of user behavior encryption method and system based on computer big data
CN111819561A (en) * 2018-03-09 2020-10-23 高通股份有限公司 Integrated circuit data protection

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100348012C (en) * 2003-12-05 2007-11-07 夏普株式会社 Data processing apparatus
CN101604216B (en) * 2008-06-10 2012-11-21 鸿富锦精密工业(深圳)有限公司 Password protection method
CN101464927B (en) * 2008-07-11 2013-05-08 理康互联科技(北京)有限公司 Medical data transmission processing system and method thereof
WO2010115308A1 (en) * 2009-04-10 2010-10-14 Sheng Yongxiang Login system and login method
CN105701906A (en) * 2014-11-27 2016-06-22 珠海汇金科技股份有限公司 Self-service equipment safety management method based on fingerprint password lock
CN105701906B (en) * 2014-11-27 2018-07-24 珠海汇金科技股份有限公司 A kind of self-service device method for managing security based on finger-print puzzle lock
CN105656630A (en) * 2015-06-29 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Identity verification method and device
WO2017000351A1 (en) * 2015-06-29 2017-01-05 宇龙计算机通信科技(深圳)有限公司 Identity verification method and apparatus
CN105160274A (en) * 2015-09-24 2015-12-16 宇龙计算机通信科技(深圳)有限公司 User data protection method and terminal
CN106503503A (en) * 2016-10-20 2017-03-15 宁波江东大金佰汇信息技术有限公司 A kind of user behavior encryption method and system based on computer big data
CN111819561A (en) * 2018-03-09 2020-10-23 高通股份有限公司 Integrated circuit data protection
CN111819561B (en) * 2018-03-09 2023-11-03 高通股份有限公司 Integrated circuit data protection

Similar Documents

Publication Publication Date Title
US6185316B1 (en) Self-authentication apparatus and method
US6219439B1 (en) Biometric authentication system
US6745327B1 (en) Electronic certificate signature program
CA2490226C (en) Systems and methods for secure biometric authentication
Breebaart et al. A reference architecture for biometric template protection based on pseudo identities
EP1394655A2 (en) Secure system and method for accessing files in computers using fingerprints
Ratha et al. Biometrics break-ins and band-aids
Schneier Biometrics: uses and abuses
EP1706957B1 (en) Biometric authentication
CN1427343A (en) Device for preventing setting of equipment of software be used or altered by non authorized person
CN112905965A (en) Financial big data processing system based on block chain
CN1195360C (en) Safety All-in-one-card system realized by intelligent card
CN106022037A (en) Financial terminal authentication method and device
DE19703970B4 (en) Method for collecting data and transmitting it in authentic form
Smejkal et al. Strong authentication using dynamic biometric signature
Mills et al. Cybercrimes against consumers: could biometric technology be the solution?
Aramice et al. Secure Code Generation for Multi-Level Mutual Authentication
Kotkova Use of Dynamic Biometric Signature in Communication of Company
Agbinya et al. Development of digital environment identity (DEITY) system for online access
Wen et al. Privacy and security in E-healthcare information management
Alliance Smart Cards and Biometrics in Privacy-Sensitiv Secure Personal Identification System
STOICA The Future Risk of Biometric Data Theft in Cybersecurity
Fleming Biometrics: past, present and future
Sriram et al. PRATYUG-" The total security system"
Dike-Anyiam et al. Biometric vs. password authentication: A user’s perspective

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication