CN201590083U - Management and control apparatus based on handwriting encrypting - Google Patents

Management and control apparatus based on handwriting encrypting Download PDF

Info

Publication number
CN201590083U
CN201590083U CN2010201180776U CN201020118077U CN201590083U CN 201590083 U CN201590083 U CN 201590083U CN 2010201180776 U CN2010201180776 U CN 2010201180776U CN 201020118077 U CN201020118077 U CN 201020118077U CN 201590083 U CN201590083 U CN 201590083U
Authority
CN
China
Prior art keywords
management
handwriting
control device
person
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2010201180776U
Other languages
Chinese (zh)
Inventor
张青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU HUAAN INDUSTRIES TECHNOLOGY Co Ltd
Original Assignee
JIANGSU HUAAN INDUSTRIES TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGSU HUAAN INDUSTRIES TECHNOLOGY Co Ltd filed Critical JIANGSU HUAAN INDUSTRIES TECHNOLOGY Co Ltd
Priority to CN2010201180776U priority Critical patent/CN201590083U/en
Application granted granted Critical
Publication of CN201590083U publication Critical patent/CN201590083U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The utility model to provide a management and control apparatus based on handwriting encrypting, pertaining to the field of electronic apparatus. The handhold terminal includes a main management and control device, an auxiliary management and control device, a management and control matching module, a list management module and a handwriting identification module. The handwriting is input by adopting the handwriting input structure provided in the main management and control device in the utility model, when the main management and control device affirms that the note verification passes through, the auxiliary management and control device can be controlled to perform decipher operations to the management and control objects. All information material based on handwriting enciphering are all stored in the auxiliary management and control device, and separatign separation is realized by management and control objects, therefore, when no main management and control device exist, criminals can not obtain the related encrypted data, deciphering operations can not tentatively performed to the management and control objects, thereby effectively ensuring the safety of the management and control objects.

Description

A kind of control device of encrypting based on person's handwriting
Technical field
The utility model belongs to electronic device field, relates to a kind of control device of encrypting based on person's handwriting.
Background technology
Along with the progress and the development of society's science and technology, the raising gradually of people's living standard is in the society that this quantity of information grows with each passing day, people begin to depend on the use electronic product, write down a lot of information as personal terminal, as address list information, social information, even comprise commercial matters information.And some important Hard copy file or article; as design drawing, company contract, famous and precious jewellery etc.; also need to be kept in certain safe space; and the storage security of these information, file, article decisive role sometimes; in this case, safety precautions is ready to appear.
And traditional safety precautions generally all is the mode that is confined to be provided with character password; and this simple guard method is easy to be cracked; and because allegro life and bulky information collision, the user forgets or obscures character password easily, brings the puzzlement of arriving very much to the user.
Person's handwriting identification is an important research content of living things feature recognition, and it is the identification of utilization computer patterns, and methods such as texture analysis by the relatively discriminating between two parts person's handwriting, determine whether it is the technical skill of same people's person's handwriting.
The implementation method that the utility model provides based on the radio-frequency verification handwriting recognition system; the control device that utilization is encrypted based on person's handwriting; to important object, space; and personal electric terminal; the security management and control mechanism of separate type is set; tighter safeguard protection is provided, guarantees the data security of user profile, file and object.
The utility model content
The purpose of this utility model provides a kind of control device of encrypting based on person's handwriting.
A kind of control device of encrypting based on person's handwriting, the described control device of encrypting based on person's handwriting includes:
Be responsible for the control device, it is to be used to control following looped pipeline control device, and with the structure that realizes encrypting based on person's handwriting, the described person in charge is controlled device and included handwriting inputting structure, handwriting recognition module, and the master instruction transport module,
Handwriting inputting structure wherein is the induction structure that is used to receive user's input writing person's handwriting,
Handwriting recognition module wherein, comprise the standard handwriting submodule that prestores the validated user standard handwriting, in order to store the person's handwriting submodule to be identified of handwriting information to be identified, and transfer the person's handwriting that the handwriting information in person's handwriting submodule to be identified and the standard handwriting submodule compares and discern and differentiate submodule
Master instruction transport module wherein, be in order to and following pair instruction transport module between carry out transmission and reception between data, thereby indicate the structure of following looped pipeline control device execution command;
Looped pipeline control device, it is cooperate to be responsible for the control device, and the management and control target is carried out structure based on the management and control of person's handwriting cipher mode, described looped pipeline control device is provided with management and control and depends on module, secondary instruction transport module, and person's handwriting encrypts execution module,
Module is depended in management and control wherein, and it is to be used for described looped pipeline control device, and merges to described management and control target based on the management and control mode of person's handwriting encryption, determines the structure of cryptographic object in the management and control target,
Wherein pair instruction transport module, it is to be used to cooperate above-mentioned master instruction transport module, finishes the structure of Data Receiving and transmission between secondary instruction transport module and the master instruction transport module,
Person's handwriting is wherein encrypted execution module, and it is based on handwriting recognition module, to described management and control target and definite cryptographic object, is identified as cipher mode with the person's handwriting input, encrypts the module of management and control;
The list management module, it is to be used to enumerate above-mentioned management and control target, cryptographic object, the person in charge to control device and looped pipeline control device, and between the management corresponding relation, and the module that described management corresponding relation is managed and adds up.
Further, the described this control device of encrypting based on person's handwriting also has following technical characterictic:
The described control device of encrypting based on person's handwriting is provided with and will be responsible for the encapsulating housing that control device and looped pipeline control device are packaged together, the described control device of encrypting based on person's handwriting carries out the portable external structure that data are connected for being provided with the two one at least of wireless radio frequency modules and wire transmission interface with described management and control target.
Described looped pipeline control device is the internals by described management and control target, the embedding structure that is connected with described management and control target data.
The described person in charge is controlled the encryption prompting module that device is provided with prompting management and control target encrypted state, and described looped pipeline control device is provided with and monitors and transmission management and control target encrypted state, and described encrypted state is sent to the encryption monitor module of encrypting prompting module.
Described list management module is provided with the management and control matching module, is to be used at least one management and control target that a cryptographic object is responsible for the control device for one and is mated pairing, the structure that associates with at least one looped pipeline control device.
The described person in charge is controlled device and is provided with the time management module, described time management module is provided with the time qualified submodule that is used for the setting-up time restriction, be used for being set in the described looped pipeline control device of different time sections management the period of described management and control target cipher mode is encrypted submodule, and be used to point out the time alarm submodule of administration module service time whether.
The described person in charge is controlled device and is provided with the region administration module, described region administration module is provided with and is used to judge the region decision sub-module of being responsible for control device region location, be used for being set in the described looped pipeline control device of different region management submodule is encrypted in the region of described management and control target cipher mode, and be used to point out the region of whether using the region administration module to remind submodule.
Described secondary instruction transport module is provided with instruction temporary respite module, it be used to receive be responsible for the control device based on the encryption of person's handwriting input, decryption instructions after, in limiting time, by with management and control object and cryptographic object data UNICOM after, carry out the module of above-mentioned instruction.
Advantage of the present utility model is: the user is when using or entering object by the control device management and control of encrypting based on person's handwriting, have only by being arranged on described based on the handwriting inputting structure of being responsible in the control device of person's handwriting encryption on the control device, import person's handwriting, under the situation that the checking of person in charge's control device affirmation person's handwriting is passed through, could control looped pipeline control device, be decrypted operation.And all be stored in person in charge's control device based on all information materials that person's handwriting is encrypted, realize separating keeping with the management and control object, only when the management and control object being carried out the encryption and decryption operation, just need be responsible for control device, looped pipeline control device, and the management and control object carries out the data connection.Therefore, under the situation of not being responsible for the control device, the encrypted data that the lawless person just can't obtain to be correlated with, also can't trial property the management and control object is decrypted operation, thereby guarantee the safety of management and control object effectively.
Description of drawings
Below in conjunction with accompanying drawing the utility model is described in detail.
Fig. 1 is the theory diagram of a kind of control device of encrypting based on person's handwriting described in the utility model.
Fig. 2 is the process flow diagram of the implementation method of a kind of control device of encrypting based on person's handwriting described in the utility model.
Fig. 3 is the structural representation of a kind of control device of encrypting based on person's handwriting described in the utility model, is a kind of embodiment.
Fig. 4 is the structural representation of a kind of control device of encrypting based on person's handwriting described in the utility model, is another kind of embodiment.
Embodiment
Below with reference to accompanying drawing, the utility model is described further in conjunction with specific embodiment.
At first join shown in Figure 1ly, one-piece construction of the present utility model is done explanation.
Shown in ginseng Fig. 1, the primary structure of having showed this control device of encrypting based on person's handwriting 100 among this figure, should include based on the control device 100 that person's handwriting is encrypted: be responsible for control device 200, it is to be used to control looped pipeline control device 300, with the structure that realizes encrypting based on person's handwriting, the described person in charge is controlled device 200 and is included handwriting inputting structure 210, handwriting recognition module 220, master instruction transport module 230, encrypts prompting module 240, time management module 250, and region administration module 260.
Wherein, handwriting inputting structure 210 is the induction structures that are used to receive user's input writing person's handwriting, is generally touch-screen 211 or touch pad 212, and the user can be directly at touch-screen 211 or touch pad 212 input handwriting informations.
Handwriting recognition module 220, comprise the standard handwriting submodule 221 that prestores validated user standard handwriting information, in order to store the person's handwriting submodule 222 to be identified of handwriting information to be identified, and transfer the person's handwriting that the handwriting information in person's handwriting submodule 222 to be identified and the standard handwriting submodule 221 compares and discern and differentiate submodule 223, when the user used or wants to reset described encipheror in the first time, by touch-screen 211 or the legal standard handwriting information of touch pad 212 inputs, be stored in above-mentioned standard handwriting submodule 221, when needs are verified by person's handwriting, the user imports person's handwriting to be identified to be verified, be stored in person's handwriting submodule 222 to be identified, differentiate submodule 223 by person's handwriting then, whether the person's handwriting to be identified of checking user input coincide with standard handwriting, if coincide, then the person's handwriting checking is passed through.
Master instruction transport module 230, be in order to and following pair instruction transport module 320 between carry out transmission and reception between data, thereby indicate the modular structure of following looped pipeline control device 300 execution commands.
Encrypt prompting module 240, it is by being arranged on the encryption monitor module 340 on the looped pipeline control device 300, monitoring the encrypted state of management and control target, and receives the structure of described encrypted state.
Time management module 250, described time management module 250 is provided with the time qualified submodule 251 that is used for the setting-up time restriction, the period that is used for being set in 300 pairs of described management and control target cipher modes of the different time sections described looped pipeline control device of management is encrypted submodule 252, and be used to point out start-up time whether administration module 250 time alarm submodule 253.
For example and without limitation, the user can pass through time qualified submodule 251, is arranged on that described management and control target is in decrypted state always within decryption oprerations half an hour, enters encrypted state after half an hour; By period encryption submodule 252, the user can be set in 7:007:00 in the time period, and the management and control target is in encrypted state always, needs by being responsible for the checking of control device 200 input validation person's handwritings, and the interior management and control target of section is in decrypted state At All Other Times, can directly use; By time alarm submodule 253, the user can select above-mentioned time qualified submodule 251 according to hobby and needs, and period encryption submodule 252, and the management and control target is carried out based on time-related qualification operation.
Region administration module 260, described region administration module 260 is provided with and is used to judge the region decision sub-module 261 of being responsible for control device 200 region locations, be used for being set in the described looped pipeline control device 300 of different region management, submodule 262 is encrypted in region to described management and control Target Setting cipher mode, and is used to point out the region of whether using region administration module 260 to remind submodule 263.
For example and without limitation, the user can remind submodule 263 by the region, load region administration module 260, judge the region location of being responsible for control device 200 by region decision sub-module 261, encrypting submodule 262, set the cipher mode of management and control target by the region, setting the management and control target as the user at home the time is decrypted state, and when other region location, set the management and control target and be in encrypted state, need verify by being responsible for control device 200 input handwriting informations.
Looped pipeline control device 300, it is to cooperate to be responsible for control device 200, the management and control target is carried out structure based on the management and control of person's handwriting cipher mode, it can and be responsible for control device 200 by encapsulating housing 400 and be packaged together, and perhaps is built in the management and control target, and described looped pipeline control device 300 is provided with management and control and depends on module 310, secondary instruction transport module 320, and person's handwriting is encrypted execution module 330, encryption monitor module 340, instruction temporary respite module 350.
Wherein, module 310 is depended in management and control, and it is to be used for described looped pipeline control device 300, and merges to described management and control target based on the management and control mode of person's handwriting encryption, determines the modular structure of cryptographic object in the management and control target.
Person's handwriting is encrypted execution module 330, and it is based on handwriting recognition module 220, to described management and control target and definite cryptographic object, is identified as cipher mode with the person's handwriting input, encrypts the modular structure of management and control.
For example and without limitation, depend on module 310 by management and control, it is the management and control target that the user can set its notebook computer, and the boot action of this notebook computer is a cryptographic object, carry out cryptographic operation by the boot action of 330 pairs of these notebook computers of person's handwriting encryption execution module then, therefore, when the user attempts to open this notebook computer, need will be prompted corresponding decryption oprerations.
Secondary instruction transport module 320, it is to be used to cooperate above-mentioned master instruction transport module 230, finishes the modular structure of Data Receiving and transmission between secondary instruction transport module 320 and the master instruction transport module 230.
Instruction temporary respite module 350, receive be responsible for control device 200 based on the encryption of person's handwriting input, decryption instructions after, in limiting time, after looped pipeline control device 300 and management and control target and cryptographic object data UNICOM, carry out the module of above-mentioned instruction.
As an example the explanation and non-limiting, the user is when being provided with cryptographic operation, the management and control target is not nearby, the instruction that the user can be provided with this cryptographic operation is carried out in half an hour and is got final product, therefore, within half an hour, after management and control target and the combination of looped pipeline control device 300 data, looped pipeline control device 300 is carried out this instruction, and the cryptographic object of management and control target is encrypted.
The described control device of encrypting based on person's handwriting 100 also includes management and control matching module 500, be to be used for at least one management and control target, a cryptographic object is responsible for control device 200 for one and is mated pairing, the structure that associates with at least one looped pipeline control device 300; List management module 600, it is to be used to enumerate above-mentioned management and control target, cryptographic object, the person in charge to control device 200 and looped pipeline control device 300, and between the management corresponding relation, and the module that described management corresponding relation is managed and adds up; The two one at least of wireless radio frequency modules 700 and wire transmission interface 800 carries out data with described management and control target and is connected.
As an example the explanation and non-limiting, the user can a looped pipeline control of management and control Target Setting device 300 as embedding structure, and then a plurality of persons in charge are set control device 200, mate described looped pipeline control device, these matching relationships all can be stored in the list management module 600, the user can be connected to electric terminal by being responsible for control device 200, as notebook computer, revises and be provided with the wherein matching relationship of certain person in charge's control device 200 at any time.
Launch explanation below in conjunction with some specific embodiments.
The explanation of Fig. 3:
Join shown in Figure 3ly, showed among this figure the enforcement synoptic diagram of the control device of encrypting based on person's handwriting described in the utility model to be a kind of embodiment.
In this embodiment, management and control object 900 is a notebook computer, and looped pipeline control device 300 is built in the management and control object 900, and data connect with it.Be responsible for control device 200 by wireless radio frequency modules 700, carry out exchanges data with looped pipeline control device 300.
The user is after enabling the described control device of encrypting based on person's handwriting, looped pipeline control device 300 can be set according to the user, specify corresponding cryptographic object 910, perhaps as shown in Figure 1, on the display screen of notebook computer, enumerate out the clauses and subclauses that may need management and control to encrypt, select for the user, suppose that it is cryptographic object 910 that the user selects the clauses and subclauses of local disk C dish, then looped pipeline control device 300 depends on module settings by management and control: the use of local disk C dish or associative operation all need to decipher by the person's handwriting checking.
Therefore,, when needing to use local disk C dish, be responsible for control device 200 and will point out the user on handwriting inputting structure 210, import corresponding person's handwriting checking, be decrypted operation when the user has opened notebook computer.Therefore when other user uses this notebook computer, when not being responsible for the decryption oprerations of control device 200 and correspondence, just can't visit local disk C dish.
By the control device of encrypting based on person's handwriting, accomplish that cryptographic object separates keeping with decryption device, increased security.
The explanation of Fig. 4:
Joining shown in Figure 4ly, is the enforcement synoptic diagram of the control device of encrypting based on person's handwriting described in the utility model, is another kind of embodiment.
As shown in Figure 4, management and control object 900 is for being equipped with the door of electronic entrance guard device (cryptographic object 910), the user holds the control device based on the person's handwriting encryption of one encapsulation, wherein, be responsible for control device 200 and looped pipeline control device 300, be encapsulated in the same encapsulating housing 400, then according to user's request, wireless radio frequency modules 700 or wire transmission interface 800 can be set, usually, use wireless radio frequency modules 700 more efficient and convenient.
The user is provided with by relevant, and with electronic entrance guard device, i.e. therefore the breakdown action setting of cryptographic object 910, when the user does not hold the control device of encrypting based on person's handwriting, just can't open electronic entrance guard device based on the cryptographic operation of person's handwriting checking.
And, according to user's needs, can load instructions temporary respite module, be that the user can be in advance at handwriting inputting structure 210 input validation person's handwritings, and by checking, at this moment, the control device of encrypting based on person's handwriting that the user holds only needs near described electronic entrance guard device, described decryption instructions will be performed, and electronic entrance guard device is in opening, and door is opened.
The explanation of Fig. 2:
Join shown in Figure 2ly, be the process flow diagram of the implementation method of the control device of encrypting based on person's handwriting described in the utility model.The implementation method of this device comprises the steps:
Step 1 is enumerated management and control target, cryptographic object, the person in charge by the list management module and is controlled device and looped pipeline control device, and between the management corresponding relation;
As shown in Figure 3, described corresponding relation is:
The management and control target: notebook computer,
Cryptographic object: local disk C dish,
Looped pipeline control device: be built in notebook computer.
Step 2 by the described management corresponding relation in the step 1, is provided with and is responsible for the control device, and looped pipeline control device, the described person in charge is controlled device and is controlled described looped pipeline control device, sets the management and control target, and cryptographic object in the management and control target, determine to encrypt based on the mode of person's handwriting input;
As described in Figure 4, the electronic entrance guard device that the user can open when setting the decision door is a cryptographic object, and loads the encryption measures based on person's handwriting identification checking.
Step 2, the user is by being responsible for the handwriting inputting structure in the control device, the input standard handwriting;
Step 3, the user is a purpose to decipher described cryptographic object, imports person's handwriting to be identified;
Step 4, the described person in charge is controlled device the standard handwriting described in person's handwriting to be identified described in the step 3 and the step 2 is compared, and obtains recognition result.
Step 5, described looped pipeline control device is decrypted cryptographic object according to the recognition result that step 4 obtains, and perhaps points out the user to decipher failure.
More than be to description of the present utility model and non-limiting, based on other embodiment of the utility model thought, all among protection domain of the present utility model.

Claims (8)

1. a control device of encrypting based on person's handwriting is characterized in that, the described control device of encrypting based on person's handwriting includes:
Be responsible for the control device, it is to be used to control following looped pipeline control device, and with the structure that realizes encrypting based on person's handwriting, the described person in charge is controlled device and included handwriting inputting structure, handwriting recognition module, and the master instruction transport module,
Handwriting inputting structure wherein is the induction structure that is used to receive user's input writing person's handwriting,
Handwriting recognition module wherein, comprise the standard handwriting submodule that prestores the validated user standard handwriting, in order to store the person's handwriting submodule to be identified of handwriting information to be identified, and transfer the person's handwriting that the handwriting information in person's handwriting submodule to be identified and the standard handwriting submodule compares and discern and differentiate submodule
Master instruction transport module wherein, be in order to and following pair instruction transport module between carry out transmission and reception between data, thereby indicate the structure of following looped pipeline control device execution command;
Looped pipeline control device, it is cooperate to be responsible for the control device, and the management and control target is carried out structure based on the management and control of person's handwriting cipher mode, described looped pipeline control device is provided with management and control and depends on module, secondary instruction transport module, and person's handwriting encrypts execution module,
Module is depended in management and control wherein, and it is to be used for described looped pipeline control device, and merges to described management and control target based on the management and control mode of person's handwriting encryption, determines the structure of cryptographic object in the management and control target,
Wherein pair instruction transport module, it is to be used to cooperate above-mentioned master instruction transport module, finishes the structure of Data Receiving and transmission between secondary instruction transport module and the master instruction transport module,
Person's handwriting is wherein encrypted execution module, and it is based on handwriting recognition module, to described management and control target and definite cryptographic object, is identified as the encryption French with the person's handwriting input, encrypts the module of management and control;
The list management module, it is to be used to enumerate above-mentioned management and control target, cryptographic object, the person in charge to control device and looped pipeline control device, and between the management corresponding relation, and the module that described management corresponding relation is managed and adds up.
2. the control device of encrypting based on person's handwriting according to claim 1, it is characterized in that: the described control device of encrypting based on person's handwriting is provided with and will be responsible for the encapsulating housing that control device and looped pipeline control device are packaged together, the described control device of encrypting based on person's handwriting carries out the portable external structure that data are connected for being provided with the two one at least of wireless radio frequency modules and wire transmission interface with described management and control target.
3. the control device of encrypting based on person's handwriting according to claim 1 is characterized in that: described looped pipeline control device is the internals by described management and control target, the embedding structure that is connected with described management and control target data.
4. the control device of encrypting based on person's handwriting according to claim 1, it is characterized in that: the described person in charge is controlled the encryption prompting module that device is provided with prompting management and control target encrypted state, described looped pipeline control device is provided with and monitors and transmission management and control target encrypted state, and described encrypted state is sent to the encryption monitor module of encrypting prompting module.
5. the control device of encrypting based on person's handwriting according to claim 1, it is characterized in that: described list management module is provided with the management and control matching module, be to be used for at least one management and control target, a cryptographic object, be responsible for the control device for one and mate pairing, the structure that associates with at least one looped pipeline control device.
6. the control device of encrypting based on person's handwriting according to claim 1, it is characterized in that: the described person in charge is controlled device and is provided with the time management module, described time management module is provided with the time qualified submodule that is used for the setting-up time restriction, be used for being set in the described looped pipeline control device of different time sections management the period of described management and control target cipher mode is encrypted submodule, and be used to point out the time alarm submodule of administration module service time whether.
7. the control device of encrypting based on person's handwriting according to claim 1, it is characterized in that: the described person in charge is controlled device and is provided with the region administration module, described region administration module is provided with and is used to judge the region decision sub-module of being responsible for control device region location, be used for being set in the described looped pipeline control device of different region management submodule is encrypted in the region of described management and control target cipher mode, and be used to point out the region of whether using the region administration module to remind submodule.
8. the control device of encrypting based on person's handwriting according to claim 1, it is characterized in that: described secondary instruction transport module is provided with instruction temporary respite module, it be used to receive be responsible for the control device based on the encryption of person's handwriting input, decryption instructions after, in limiting time, by with management and control object and cryptographic object data UNICOM after, carry out the module of above-mentioned instruction.
CN2010201180776U 2010-01-27 2010-01-27 Management and control apparatus based on handwriting encrypting Expired - Fee Related CN201590083U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010201180776U CN201590083U (en) 2010-01-27 2010-01-27 Management and control apparatus based on handwriting encrypting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010201180776U CN201590083U (en) 2010-01-27 2010-01-27 Management and control apparatus based on handwriting encrypting

Publications (1)

Publication Number Publication Date
CN201590083U true CN201590083U (en) 2010-09-22

Family

ID=42749871

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010201180776U Expired - Fee Related CN201590083U (en) 2010-01-27 2010-01-27 Management and control apparatus based on handwriting encrypting

Country Status (1)

Country Link
CN (1) CN201590083U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101799854A (en) * 2010-01-27 2010-08-11 江苏华安高技术安防产业有限公司 Control device based on handwriting encryption and implementation method thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101799854A (en) * 2010-01-27 2010-08-11 江苏华安高技术安防产业有限公司 Control device based on handwriting encryption and implementation method thereof

Similar Documents

Publication Publication Date Title
CN102936980B (en) Method and device for controlling electronic lock
WO2010148832A1 (en) Entrance guard control and information display system, method and terminal
CN102509055A (en) Mobile terminal and method for hiding programs of mobile terminal
CN104123769B (en) The unblanking of a kind of safety intelligent lock, close lock control method
CN103338445A (en) File encryption and decryption method and system
CN103034417A (en) Unlocking method for touch screen and terminal equipment
CN204833409U (en) Ammeter case intelligence lock based on NFC and wireless network
CN103530559A (en) Integrity protection system of Android system
CN104346550B (en) A kind of information processing method and a kind of electronic equipment
CN108540457A (en) A kind of safety equipment and its biological identification control method and device
CN104778774A (en) Bluetooth integrated control machine and control method with Bluetooth mobile phone replacing RFID card
CN105426727B (en) Fingerprint decryption method and mobile terminal
CN205068524U (en) Intelligent gate inhibition system
CN102521169B (en) Confidential USB (universal serial bus) memory disk with display screen and security control method of confidential USB memory disk
CN103324881A (en) System and method for wireless locking and unlocking
CN106157409A (en) Communication means between intelligent terminal and gate inhibition and device
CN105321072B (en) Certification method of payment and payment authentication system based on wearable device
CN205354036U (en) Data encryption cloud storage system based on multimode biological identification technique
CN104282059A (en) Bluetooth-based safety intelligent lock system with video monitoring function and unlocking and locking methods
CN101799854A (en) Control device based on handwriting encryption and implementation method thereof
CN104376631A (en) Commercial cipher algorithm based security access control system and implementation method thereof
CN108122307A (en) Access control management method, apparatus and system
CN103279692A (en) File encrypting and decrypting method and device based on mobile phone
CN104732134B (en) Information safety devices and its authentication method with software protection function
CN201590083U (en) Management and control apparatus based on handwriting encrypting

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100922

Termination date: 20140127