CN1959693A - Method of realizing intelligence cryptographic key set of fingerprint for multiple users to use - Google Patents

Method of realizing intelligence cryptographic key set of fingerprint for multiple users to use Download PDF

Info

Publication number
CN1959693A
CN1959693A CNA2006101441897A CN200610144189A CN1959693A CN 1959693 A CN1959693 A CN 1959693A CN A2006101441897 A CNA2006101441897 A CN A2006101441897A CN 200610144189 A CN200610144189 A CN 200610144189A CN 1959693 A CN1959693 A CN 1959693A
Authority
CN
China
Prior art keywords
fingerprint
intelligence
cryptographic key
key set
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2006101441897A
Other languages
Chinese (zh)
Other versions
CN100446021C (en
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Original Assignee
Beijing Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Feitian Technologies Co Ltd filed Critical Beijing Feitian Technologies Co Ltd
Priority to CNB2006101441897A priority Critical patent/CN100446021C/en
Publication of CN1959693A publication Critical patent/CN1959693A/en
Application granted granted Critical
Publication of CN100446021C publication Critical patent/CN100446021C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

A method for realizing fingerprint cipher key unit to be used by multi-user includes setting a user right value for each user, setting multiple different state value on fingerprint cipher key unit, corresponding each user right value to one state value of fingerprint cipher key unit, changing state value of said cipher key unit to be said cipher key unit state value corresponding to current user right value when fingerprint verification is passed by said cipher key unit in order to let user carry out operation as per current state value of fingerprint cipher key unit.

Description

A kind of method that realizes that intelligence cryptographic key set of fingerprint for multiple users uses
Technical field
The present invention relates to the infotech security fields, relate in particular to a kind of method that the multi-user uses that on intelligence cryptographic key set of fingerprint, realizes.
Background technology
The authentication lock is a kind of small hardware device that has processor and storer, and it can be connected with computing machine by the data communication interface of computing machine.It has the key systematic function, but and the safe storage key, can preset cryptographic algorithm.The computing relevant with key of authentication lock be fully at the device internal operation, and the authentication lockset has the anti-characteristic of attacking of physics, and security is high.In order further to improve the security of authentication lock, the developer of authentication lock adds fingerprint sensor on its basis, verify user's legitimacy by fingerprint characteristic, the authentication lock of this adding fingerprint sensor is commonly referred to intelligence cryptographic key set of fingerprint.
Existing authentication lock is provided with two grades---keeper and domestic consumer, and wherein keeper's password is SoPIN, i.e. safety officer PIN, and the password of domestic consumer is user PIN, keeper's authority is bigger than domestic consumer.According to the difference of user identity, the user can select verification mode to carry out the checking of SoPIN or user PIN before the input PIN code when using the authentication lock.The grade setting of intelligence cryptographic key set of fingerprint and above-mentioned authentication are phase-locked also to be that two grades are only arranged together, yet in the wide model of intelligence cryptographic key set of fingerprint used, two Permission Levels far can not satisfy user's demand.
Because fingerprint identification technology is a complexity and meticulous technology, fingerprint sensor also needs to reach corresponding complexity and meticulous requirement, so the price comparison costliness of fingerprint sensor, this just causes the cost and price of intelligence cryptographic key set of fingerprint higher.Thereby the utilization factor of raising intelligence cryptographic key set of fingerprint, reduce use cost is user's demand always, the demand that satisfies the user simultaneously also is fingerprint intelligent key apparatus developer's a target always.
Summary of the invention
The present invention is intended to provide a kind of method that realizes that intelligence cryptographic key set of fingerprint for multiple users uses for solving existing intelligence cryptographic key set of fingerprint utilization factor problem low, that Permission Levels are few.
Technical scheme of the present invention is as follows: for each user fingerprints is provided with a user right value, for intelligence cryptographic key set of fingerprint is provided with a plurality of different state values, each user right value is corresponding with an intelligence cryptographic key set of fingerprint state value; After intelligence cryptographic key set of fingerprint passed through finger-mark check, the intelligence cryptographic key set of fingerprint state value was changed into the intelligence cryptographic key set of fingerprint state value corresponding with active user's authority credentials, and the active user can operate according to current intelligence cryptographic key set of fingerprint state value.
A plurality of user fingerprints can corresponding identical user right value.
Described intelligence cryptographic key set of fingerprint state value number is identical with described user right value number, and described intelligent key apparatus state value is corresponding one by one with described user right value.
The method of described finger-mark check is after the user imports fingerprint, and intelligence cryptographic key set of fingerprint is compared described fingerprint and registered fingerprint one by one.
The method of described verification fingerprint can also be that the user at first selects its user name in user list, imports its fingerprint again, and intelligence cryptographic key set of fingerprint finds corresponding fingerprint according to user name, compares with the fingerprint of user's input.
In the firmware program of intelligence cryptographic key set of fingerprint, set the corresponding intelligence cryptographic key set of fingerprint state value of various operations.
Described operation comprises the file in the visit intelligence cryptographic key set of fingerprint.
For the file in the intelligence cryptographic key set of fingerprint is provided with a file attribute value, described file attribute value is corresponding with the intelligence cryptographic key set of fingerprint state value, and when the intelligence cryptographic key set of fingerprint state value was consistent with the file attribute value, the active user can visit corresponding document.
A plurality of files in the intelligence cryptographic key set of fingerprint can corresponding identical file attribute value.
Compared with prior art, the invention has the beneficial effects as follows: the method for the invention has realized the fingerprint characteristic data of a plurality of users of storage in an intelligence cryptographic key set of fingerprint, and for each user fingerprints is provided with corresponding authority credentials, corresponding a plurality of different brackets, make intelligence cryptographic key set of fingerprint to use for a plurality of users, improved the dirigibility of intelligence cryptographic key set of fingerprint, reduced user cost, convenient user's use.
Description of drawings
Fig. 1 is the process flow diagram that the fingerprint intelligent key apparatus carries out the fingerprint registration;
Fig. 2 carries out authentication to the user and generates the process flow diagram of cipher key command with intelligence cryptographic key set of fingerprint;
Fig. 3 carries out authentication to the user and visits the process flow diagram of file in the intelligence cryptographic key set of fingerprint with intelligence cryptographic key set of fingerprint.
Embodiment
Below in conjunction with the drawings and specific embodiments system and method for the present invention is described in more detail.
In the internal memory of intelligence cryptographic key set of fingerprint, mark off a part of zone and be used to store user list.Comprise items such as user ID, user name, user right value and user fingerprints characteristic in the user list.Wherein, the numbering of user ID representative of consumer generally according to user's registration order user ID serial number from small to large, has nothing in common with each other.System distributes a user ID in order each user automatically when fingerprint is registered.User each user's by name title, general in same intelligence cryptographic key set of fingerprint each user's user name difference, the user can set the user's name that a character string is oneself as required when fingerprint register.The user right value is meant the Permission Levels the when user operates intelligence cryptographic key set of fingerprint, can set a plurality of ranks for intelligence cryptographic key set of fingerprint as the case may be, can the corresponding user right value of each user fingerprints characteristic, also can the corresponding authority credentials of a plurality of user fingerprints characteristics.Fingerprint characteristic data is user's a finger print data, is the fingerprint characteristic data of user's input when fingerprint is registered.
Intelligence cryptographic key set of fingerprint has different user modes, and the number of state can be set according to concrete needs by the keeper, and the number of user right value is general identical with the number of intelligence cryptographic key set of fingerprint user mode, and corresponding one by one.After the user passed through finger print identifying, intelligence cryptographic key set of fingerprint operating system can be searched the user right value of relative users in user list, and the state value of intelligence cryptographic key set of fingerprint is set to the state value corresponding with active user's authority credentials then.
Stipulate that at the firmware program of intelligence cryptographic key set of fingerprint (be used in the equipment operate program) each operates pairing intelligence cryptographic key set of fingerprint state value, when current intelligence cryptographic key set of fingerprint state value satisfies the required intelligence cryptographic key set of fingerprint state value of operation, the user just can operate accordingly, otherwise quiescing.
Among the present invention, each file of storing in the data storage area of intelligence cryptographic key set of fingerprint all has a file attribute value, the state value of the corresponding intelligence cryptographic key set of fingerprint of the property value of file, when the file of user capture intelligence cryptographic key set of fingerprint, intelligence cryptographic key set of fingerprint operating system all can read the property value of file, and the state value that this property value and intelligence cryptographic key set of fingerprint is current compares, if unanimity then the user can visit this document, otherwise the user is rejected visit.
In order to clearly demonstrate, illustrate with embodiment below.
User right value number is 3 in certain intelligence cryptographic key set of fingerprint system, promptly be divided into three Permission Levels, three user right values are respectively 1,2 and 3 (setting of user right value can be selected other numerals or character string for use when specific implementation, as long as three user right values are different).When the user imports fingerprint characteristic data, be its selected user right value (any one in 1,2 and 3), and record in the user list; The number of corresponding intelligence cryptographic key set of fingerprint state value also is 3, be respectively 1,2 and 3, after the user imported fingerprint characteristic data and passes through checking, intelligence cryptographic key set of fingerprint was made as its state value and the corresponding intelligence cryptographic key set of fingerprint state value of active user's authority credentials.For example active user's user right value is 1, and when its input fingerprint characteristic data and after by checking, the state value of intelligence cryptographic key set of fingerprint just is set to 1.Stipulate the intelligence cryptographic key set of fingerprint state value that each operation is corresponding in the firmware program of intelligence cryptographic key set of fingerprint, for example generating cipher key operation requires the intelligence cryptographic key set of fingerprint state value smaller or equal to 2, then all can finish the generation cipher key command when the intelligence cryptographic key set of fingerprint state value is 1 or 2, user's lack of competence generates key when the intelligence cryptographic key set of fingerprint state value is 3.Intelligence cryptographic key set of fingerprint data storage area user file property value can be got 3 different values 1,2 or 3.For example the property value with a file is made as 2, the state value of current intelligence cryptographic key set of fingerprint is 1, and then the active user is when this file of visit, and intelligence cryptographic key set of fingerprint reads its property value and itself and intelligence cryptographic key set of fingerprint state value are compared, the result is inconsistent, refusal active user visit.And for example the property value with a file is made as 1, the state value of current intelligence cryptographic key set of fingerprint is 1, then the active user is when this file of visit, intelligence cryptographic key set of fingerprint reads its property value and itself and intelligence cryptographic key set of fingerprint state value is compared, unanimity then allows the active user to visit this file as a result.
Three authorities among this embodiment also can be regardless of grade, be about to the user and be divided into three groups, corresponding 3 user right values, be respectively 1,2 and 3, user on the same group is not provided with different functions of use, and promptly certain group user can only carry out the operation of permission in its group, and the function between group can be different fully, also mutual intersection can be arranged, other operations are all identical with above-mentioned graduate method.
Fig. 1 is the process flow diagram that intelligence cryptographic key set of fingerprint carries out the fingerprint registration in the method for the invention.In the present embodiment, if super keeper's user right value is 1, keeper's user right value is 2, the authority credentials of domestic consumer is 3, above-mentioned 3 user rights can have a plurality of users, a plurality of super keepers, keeper or domestic consumer promptly can be arranged, wherein super keeper has the authority of operation intelligence cryptographic key set of fingerprint all functions and visit All Files, the keeper compares the operation that can not register fingerprint with super keeper, and domestic consumer can only visit the partial document in the intelligence cryptographic key set of fingerprint.
With reference to figure 1, super keeper's fingerprint characteristic data is entered in the intelligence cryptographic key set of fingerprint, when the intelligence cryptographic key set of fingerprint initialization as shown in Figure 1:
Step 101 is connected to computing machine with intelligence cryptographic key set of fingerprint;
Step 102, super keeper selects its user name in the user list of computing machine, and imports its fingerprint characteristic data by fingerprint sensor;
Step 103, intelligence cryptographic key set of fingerprint reads its corresponding user fingerprints characteristic according to user name in user list;
Step 104, the user characteristic data that reads in the fingerprint characteristic data of user's input and the step 103 in the intelligence cryptographic key set of fingerprint comparison step 102, if inconsistent then execution in step 105, if unanimity then execution in step 106 is passed through in authentication;
Step 105, the prompting mistake;
Step 106, the state value of intelligence cryptographic key set of fingerprint are set to the intelligence cryptographic key set of fingerprint state value 1 of super keeper's correspondence;
Step 107, super keeper carries out the fingerprint registration by the upper level applications in the computing machine to the user, inserts user's user name, selects the user right value, and typing user's fingerprint characteristic data;
Whether step 108, intelligence cryptographic key set of fingerprint detect registration successful, and whether promptly detect user name unique, and whether the fingerprint characteristic data input successfully waits; If unsuccessful then execution in step 109, successful then execution in step 110;
Step 109, the prompting mistake, and return step 107;
Step 110, add user in the user list during intelligence cryptographic key set of fingerprint is deposited within it, promptly a user ID is set automatically in order by system, the user name of inserting in the write step 107, the user right value is set to the user right value of selection in the step 107, and the user fingerprints characteristic is recorded as the fingerprint characteristic data of input in the step 107;
Step 111, fingerprint are registered successfully, return step 107, carry out next user's fingerprint registration.
Fig. 2 carries out authentication to the user and generates the process flow diagram of cipher key command with intelligence cryptographic key set of fingerprint, as shown in Figure 2:
Step 201 is connected to computing machine with intelligence cryptographic key set of fingerprint;
Step 202, the user selects its user name in the user list of computing machine, and imports its fingerprint characteristic data by fingerprint sensor;
Step 203, intelligence cryptographic key set of fingerprint reads its corresponding user fingerprints characteristic according to user name in user list;
Step 204, the user characteristic data that reads in the fingerprint characteristic data of user's input and the step 203 in the intelligence cryptographic key set of fingerprint comparison step 202, if inconsistent, then execution in step 205; If consistent, then authentication is passed through, execution in step 206;
Step 205, the prompting mistake;
Step 206, intelligence cryptographic key set of fingerprint reads the user right value of relative users in the user list, and the state value of intelligence cryptographic key set of fingerprint is set to consistently with active user's authority credentials, if the user is the keeper, then the intelligence cryptographic key set of fingerprint state value is set to 2;
Step 207, the user sends to intelligence cryptographic key set of fingerprint by upper level applications and generates cipher key command;
Step 208, intelligence cryptographic key set of fingerprint judges whether the state value of current intelligence cryptographic key set of fingerprint satisfies the requirement (requirement of supposing the generation cipher key command is that current intelligence cryptographic key set of fingerprint state value is smaller or equal to 2) that generates cipher key command, because current intelligence cryptographic key set of fingerprint state value is 2, so can carry out this operation, execution in step 210; If the active user is a domestic consumer, promptly current intelligence cryptographic key set of fingerprint state value is 3, then cannot carry out this operation, execution in step 209;
Step 209, the prompting mistake;
Step 210, intelligence cryptographic key set of fingerprint generates key;
Step 211 finishes.
Fig. 3 carries out authentication to the user and visits the process flow diagram of file in the intelligence cryptographic key set of fingerprint with intelligence cryptographic key set of fingerprint, as shown in Figure 3:
Step 301 is connected to computing machine with intelligence cryptographic key set of fingerprint;
Step 302, the user imports its fingerprint characteristic data by fingerprint sensor;
Step 303, intelligence cryptographic key set of fingerprint is compared the fingerprint characteristic data of user's input and all fingerprint characteristic datas in the user list one by one;
If do not find consistent fingerprint characteristic data then execution in step 304, if compare successfully then execution in step 305 is passed through in authentication;
Step 304, the prompting mistake;
Step 305, intelligence cryptographic key set of fingerprint read the user right value of relative users in the user list, and the state value of intelligence cryptographic key set of fingerprint is set to consistent with active user's authority credentials;
File in the step 306, user capture intelligence cryptographic key set of fingerprint;
Step 307, intelligence cryptographic key set of fingerprint at first read the property value of corresponding document;
Step 308, intelligence cryptographic key set of fingerprint judge whether the user can visit this file, judge promptly whether the state value of current intelligence cryptographic key set of fingerprint is consistent with the file attribute value, if inconsistent then execution in step 309, if unanimity then execution in step 310;
Step 309, the prompting mistake;
Step 310, intelligence cryptographic key set of fingerprint allows this file of user capture;
Step 311 finishes.
The above embodiment only is the preferred embodiments of the present invention; the invention is not restricted to the foregoing description; for persons skilled in the art; the any conspicuous change of under the prerequisite that does not deviate from the principle of the invention it being done all belongs to the protection domain of design of the present invention and claims.

Claims (9)

1. method that realizes that intelligence cryptographic key set of fingerprint for multiple users uses, it is characterized in that: for each user fingerprints is provided with a user right value, for intelligence cryptographic key set of fingerprint is provided with a plurality of different state values, each user right value is corresponding with an intelligence cryptographic key set of fingerprint state value; After intelligence cryptographic key set of fingerprint passed through finger-mark check, the intelligence cryptographic key set of fingerprint state value was changed into the intelligence cryptographic key set of fingerprint state value corresponding with active user's authority credentials, and the active user can operate according to current intelligence cryptographic key set of fingerprint state value.
2. the method that realization intelligence cryptographic key set of fingerprint for multiple users according to claim 1 uses is characterized in that: a plurality of user fingerprints can corresponding identical user right value.
3. the method that realization intelligence cryptographic key set of fingerprint for multiple users according to claim 1 uses, it is characterized in that: described intelligence cryptographic key set of fingerprint state value number is identical with described user right value number, and described intelligence cryptographic key set of fingerprint state value is corresponding one by one with described user right value.
4. the method that realization intelligence cryptographic key set of fingerprint for multiple users according to claim 1 uses, it is characterized in that: the method for described finger-mark check is after the user imports fingerprint, intelligence cryptographic key set of fingerprint is compared described fingerprint and registered fingerprint one by one.
5. the method that realization intelligence cryptographic key set of fingerprint for multiple users according to claim 1 uses, it is characterized in that: the method for described verification fingerprint can also be that the user at first selects its user name in user list, import its fingerprint again, intelligence cryptographic key set of fingerprint finds corresponding fingerprint according to user name, compares with the fingerprint of user's input.
6. the method that realization intelligence cryptographic key set of fingerprint for multiple users according to claim 1 uses is characterized in that: set the corresponding intelligence cryptographic key set of fingerprint state value of various operations in the firmware program of intelligence cryptographic key set of fingerprint.
7. the method that realization intelligence cryptographic key set of fingerprint for multiple users according to claim 6 uses is characterized in that: described operation comprises the file in the visit intelligence cryptographic key set of fingerprint.
8. the method that realization intelligence cryptographic key set of fingerprint for multiple users according to claim 7 uses, it is characterized in that: for the file in the intelligence cryptographic key set of fingerprint is provided with a file attribute value, described file attribute value is corresponding with the intelligence cryptographic key set of fingerprint state value, when the intelligence cryptographic key set of fingerprint state value was consistent with the file attribute value, the active user can visit corresponding document.
9. the method that realization intelligence cryptographic key set of fingerprint for multiple users according to claim 8 uses is characterized in that: a plurality of files in the intelligence cryptographic key set of fingerprint can corresponding identical file attribute value.
CNB2006101441897A 2006-11-29 2006-11-29 Method of realizing intelligence cryptographic key set of fingerprint for multiple users to use Active CN100446021C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2006101441897A CN100446021C (en) 2006-11-29 2006-11-29 Method of realizing intelligence cryptographic key set of fingerprint for multiple users to use

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2006101441897A CN100446021C (en) 2006-11-29 2006-11-29 Method of realizing intelligence cryptographic key set of fingerprint for multiple users to use

Publications (2)

Publication Number Publication Date
CN1959693A true CN1959693A (en) 2007-05-09
CN100446021C CN100446021C (en) 2008-12-24

Family

ID=38071384

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006101441897A Active CN100446021C (en) 2006-11-29 2006-11-29 Method of realizing intelligence cryptographic key set of fingerprint for multiple users to use

Country Status (1)

Country Link
CN (1) CN100446021C (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8055032B2 (en) 2007-10-16 2011-11-08 Premier Image Technology (China) Ltd. Digital camera with fingerprint identification function
WO2012006830A1 (en) * 2010-07-14 2012-01-19 中兴通讯股份有限公司 Mobile terminal and encryption method thereof
CN102404330A (en) * 2011-11-30 2012-04-04 上海博泰悦臻电子设备制造有限公司 Method and system for managing multiple on-line users
CN103116720A (en) * 2011-11-16 2013-05-22 航天信息股份有限公司 Universal serial bus (USB) Key device and account management method and authentication application method thereof
CN103701611A (en) * 2013-12-30 2014-04-02 天地融科技股份有限公司 Method for accessing and uploading data in data storage system
CN105303085A (en) * 2015-10-28 2016-02-03 广东欧珀移动通信有限公司 File sharing method and sharing system
CN105700873A (en) * 2015-12-31 2016-06-22 联想(北京)有限公司 Information processing method and electronic device
CN106295426A (en) * 2016-08-17 2017-01-04 合肥耀贝软件开发有限公司 Many scale fingerprint unlock display
CN107994984A (en) * 2017-12-01 2018-05-04 北京深思数盾科技股份有限公司 A kind of cryptographic key protection method and device
CN109086702A (en) * 2018-07-23 2018-12-25 浙江钜士安防科技股份有限公司 A kind of biological characteristic really weighs formula electrically activating switch

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5648648A (en) * 1996-02-05 1997-07-15 Finger Power, Inc. Personal identification system for use with fingerprint data in secured transactions
CN1235145C (en) * 2002-08-19 2006-01-04 英保达股份有限公司 Fingerprint identification information storage system with different access authorities and its method
JP2006012136A (en) * 2004-06-03 2006-01-12 Oce Technologies Bv Control of document processing based on fingerprint of user
US8508340B2 (en) * 2004-11-12 2013-08-13 Koninklijke Philips N.V. Distinctive user identification and authentication for multiple user access to display devices
CN1674501A (en) * 2005-03-23 2005-09-28 西安青松科技股份有限公司 File enciphered signature system based on fingerprint and realizing method thereof
CN1866153A (en) * 2005-05-17 2006-11-22 英华达股份有限公司 Electronic device with fingerprint recognition function

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8055032B2 (en) 2007-10-16 2011-11-08 Premier Image Technology (China) Ltd. Digital camera with fingerprint identification function
WO2012006830A1 (en) * 2010-07-14 2012-01-19 中兴通讯股份有限公司 Mobile terminal and encryption method thereof
CN103116720B (en) * 2011-11-16 2016-02-24 航天信息股份有限公司 A kind of USB Key device and account management thereof and checking using method
CN103116720A (en) * 2011-11-16 2013-05-22 航天信息股份有限公司 Universal serial bus (USB) Key device and account management method and authentication application method thereof
CN102404330A (en) * 2011-11-30 2012-04-04 上海博泰悦臻电子设备制造有限公司 Method and system for managing multiple on-line users
CN102404330B (en) * 2011-11-30 2018-07-20 上海博泰悦臻电子设备制造有限公司 Multi-user while online management method and system
CN103701611A (en) * 2013-12-30 2014-04-02 天地融科技股份有限公司 Method for accessing and uploading data in data storage system
CN103701611B (en) * 2013-12-30 2017-01-18 天地融科技股份有限公司 Method for accessing and uploading data in data storage system
CN105303085A (en) * 2015-10-28 2016-02-03 广东欧珀移动通信有限公司 File sharing method and sharing system
CN105700873A (en) * 2015-12-31 2016-06-22 联想(北京)有限公司 Information processing method and electronic device
CN105700873B (en) * 2015-12-31 2019-06-25 联想(北京)有限公司 Information processing method and electronic equipment
CN106295426A (en) * 2016-08-17 2017-01-04 合肥耀贝软件开发有限公司 Many scale fingerprint unlock display
CN107994984A (en) * 2017-12-01 2018-05-04 北京深思数盾科技股份有限公司 A kind of cryptographic key protection method and device
CN109086702A (en) * 2018-07-23 2018-12-25 浙江钜士安防科技股份有限公司 A kind of biological characteristic really weighs formula electrically activating switch

Also Published As

Publication number Publication date
CN100446021C (en) 2008-12-24

Similar Documents

Publication Publication Date Title
CN1959693A (en) Method of realizing intelligence cryptographic key set of fingerprint for multiple users to use
CN1156785C (en) Electronic data management system
CN1221900C (en) User's identity authentication method of dynamic electron cipher equipment and its resources sharing system
CN105429761B (en) A kind of key generation method and device
CN1520090A (en) System and method of authenticating validity and dropoff
CN1818919A (en) Permission verification and verifying system for electronic file
CN1889432A (en) Long-distance password identifying method based on smart card, smart card, server and system
CN101038619A (en) Radio frequency recognition system privacy identification method
CN101218590A (en) Enforcing native access control to indexed documents
CN1661961A (en) Method, a hardware token, and a computer program for authentication
CN1866224A (en) Mobile memory device and method for accessing encrypted data in mobile memory device
CN101950342B (en) Device and method for managing access control permission of integrated circuit card
CN102004866A (en) Method and device for user identity verification and access control of information system
Pang et al. Verifying completeness of relational query answers from online servers
CN101316166A (en) Dynamic password identity authentication method based on accidental character set
WO2008035390A2 (en) Method for dynamic secure management of an authenticated relational table in a database
Guo Fragile watermarking scheme for tamper detection of relational database
CN106161442A (en) A kind of system control user login method
CN101075281A (en) Method for logining BIOS based on fingerprint verification
CN100444184C (en) Method and system of software identify identification
CN1992592A (en) System and method of dynamic password identification
CN1991800A (en) Fingerprint identification storage device and fingerprint identification method
CN200980081Y (en) A network identity authentication system
CN105279453A (en) Separate storage management-supporting file partition hiding system and method thereof
CN1494686A (en) User identification with improved password input method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: FEITIAN TECHNOLOGIES CO., LTD.

Free format text: FORMER NAME: BEIJING FEITIAN CHENGXIN TECHNOLOGY CO., LTD.

CP03 Change of name, title or address

Address after: 100085 Beijing city Haidian District Xueqing Road No. 9 Ebizal building B block 17 layer

Patentee after: Feitian Technologies Co., Ltd.

Address before: 100083, Haidian District, Xueyuan Road, Beijing No. 40 research, 7A building, 5 floor

Patentee before: Beijing Feitian Chengxin Science & Technology Co., Ltd.