CN204883719U - System for it is external to cell -phone control and protect file through iris recognition device - Google Patents
System for it is external to cell -phone control and protect file through iris recognition device Download PDFInfo
- Publication number
- CN204883719U CN204883719U CN201520514363.7U CN201520514363U CN204883719U CN 204883719 U CN204883719 U CN 204883719U CN 201520514363 U CN201520514363 U CN 201520514363U CN 204883719 U CN204883719 U CN 204883719U
- Authority
- CN
- China
- Prior art keywords
- iris
- mobile phone
- usb interface
- external
- identification device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
The utility model discloses a system for it is external to cell -phone control and protect file through iris recognition device especially relates to the biological characteristics recognition technology field. The utility model discloses a cell -phone and external iris recognition device, iris recognition device include that the iris absorbs device, information processing apparatus, storage device, encryption device and USB interface, the iris absorbs device and USB interface connection to the iris information characteristic that will absorb conveys to information processing apparatus and handles, information processing apparatus respectively with storage device and USB interface connection, the encryption device is connected with USB interface and information processing apparatus respectively. The utility model provides a with the system of giving first place to to cell -phone secret protect file to low -cost system has solved user's protect file, carries out the authentication with strict mode, ensures that the cell -phone that lawless persons obtained is a part and the information file who has the mess code.
Description
Technical field
The utility model relates to biometrics identification technology field, particularly relates to a kind ofly to control and the system of information protection mobile phone by iris identification device is external.
Background technology
Along with mobile terminal, particularly smart mobile phone is universal, how to ensure that the security of these mobile terminals just becomes an important topic.
In prior art, be disclosed a kind of mobile phone with iris recognition, however expensive, be not suitable for ruck, and this type of mobile phone makes mobile phone need to overcome mobile phone size because of the hardware facility needed for built-in iris recognition technology, thickness and camera are transformed, compatible problem.
But the mobile phone that manufacture has iris recognition is not again the thing that each producer can do, commercially, all kinds, various function, the mobile phone of various price has its market, often someone will because a variety of causes wants to buy the mobile phone of iris recognition and can not achieve one's goal.
In actual life, after people buy mobile phone, after consider the security of mobile phone; such as fall and whether can have been broken into pieces; also can buy cell-phone cover to protect, however the cell-phone cover function singleness on market, problems such as just protecting mobile phone not broken into pieces, rub, collide with.
Commercially, for the iris identification device of mobile telephone external, few, the basis not changing mobile phone existing structure and hardware realizes iris recognition just becomes a problem.
Utility model content
Technical problem to be solved in the utility model is to provide and a kind ofly controls and the system of information protection mobile phone by iris identification device is external.
For solving the problems of the technologies described above, technical solution adopted in the utility model is: 1, a kind ofly by iris identification device is external, mobile phone to be controlled and the system of information protection, it is characterized in that: comprise mobile phone and external iris identification device, described iris identification device comprises iris capturing apparatus, signal conditioning package, memory storage, encryption device and USB interface, described iris capturing apparatus is connected with USB interface, and by picked-up to iris information feature be sent to signal conditioning package and process, described signal conditioning package is connected with memory storage and USB interface respectively, described encryption device is connected with USB interface and signal conditioning package respectively.
Further technical scheme is, its operation steps is as follows:
A, equipment connection: external iris identification device is connected to the mobile phone being provided with corresponding iris technology process software by USB interface;
B, data initialization: utilize iris capturing apparatus under the control of mobile phone, carry out original iris information collection apparatus and deliver to signal conditioning package, carry out feature extraction to iris information feature and store in the storage device as primary key; Mobile phone carries out opening initialization operation;
C, authentication: operation is carried out to mobile phone and can trigger iris identification device iris recognition is carried out to user, if with original iris information characteristic matching success, user obtains and permits the operation of mobile phone, carries out step D; If unsuccessful with original iris information characteristic matching, mobile phone then decline user operation, repeats step C.
D, data manipulation: user obtains operation license, operates the data in mobile phone, the data in mobile phone to be encrypted the data stored in mobile phone memory storage by encryption device with primary key and to the decrypt data of taking out mobile phone memory storage.
E, again identity verification: user obtains the mobile phone operation to a certain action, middle shut-down operation exceedes mobile phone Preset Time this actuation time, needs to re-start step C: authentication.
Further technical scheme is, describedly comprises mobile phone power-on to the operation that mobile phone carries out, shutdown, screen locking, Xie Ping, and data store, revise and check.
Further technical scheme is, described iris identification device is the cell-phone cover or the charger baby that are provided with iris capturing apparatus, and it can also be the iris identification device of other external device transformation.
Further technical scheme is, the cryptographic algorithm in described encryption device is one or the combination of AES, DES, RSA, MD5.
Further technical scheme is: described iris information is characterized as the annular formations between the black pupil of eye and white sclera, and it includes the minutia of much interlaced spot, filament, crown, striped, crypts etc.
Further technical scheme is, described USB interface comprises multiple USB port, and described USB interface comprises 2 USB port, and described USB interface is connected with mobile phone USB interface through data line.
Further technical scheme is also, described step D: data manipulation comprises the operation of the private information to user.
The beneficial effect adopting technique scheme to produce is: the utility model provides a kind of based on the system protected mobile phone private information; the information protection of user is solved with the system of low cost; carry out authentication in strict mode, guarantee that the mobile phone that lawless person obtains is a part and the message file with mess code.
Accompanying drawing explanation
Below in conjunction with the drawings and specific embodiments, the utility model is described in further detail.
Fig. 1 is structural representation of the present utility model;
Fig. 2 is process flow diagram of the present utility model;
Embodiment
Below in conjunction with the accompanying drawing in the utility model embodiment, be clearly and completely described the technical scheme in the utility model embodiment, obviously, described embodiment is only a part of embodiment of the present utility model, instead of whole embodiments.Based on the embodiment in the utility model, those of ordinary skill in the art are not making the every other embodiment obtained under creative work prerequisite, all belong to the scope of the utility model protection.
Set forth a lot of detail in the following description so that fully understand the utility model, but the utility model can also adopt other to be different from alternate manner described here to implement, those skilled in the art can when doing similar popularization without prejudice to when the utility model intension, and therefore the utility model is by the restriction of following public specific embodiment.
In following embodiment,
Mobile phone adopts the smart mobile phone based on operating systems such as Android, iOS, FirefoxOS, YunOS, BlackBerry, Windowsphone, symbian, Palm, BADA, WindowsMobile, ubuntu
Iris capturing apparatus: iris camera, model SWO2ASUNNY
Memory storage: storer, model AT24C02-10PU-2,7
Control panel; Model Oniu-C-U02
Encryption device: encryption chip, model: LKT4200HS-128
Signal conditioning package: image procossing dsp chip, the DSP56200 of motorola inc
As shown in the figure, the utility model comprises mobile phone and external iris identification device, described iris identification device comprises iris capturing apparatus, signal conditioning package, memory storage, encryption device and USB interface, iris capturing apparatus, signal conditioning package, memory storage, encryption device and USB interface are all integrated on control panel, described iris capturing apparatus is connected with USB interface, and by picked-up to iris information feature be sent to signal conditioning package and process, described signal conditioning package is connected with memory storage and USB interface respectively, described encryption device is connected with USB interface and signal conditioning package respectively.
Preferably, described iris identification device is the cell-phone cover or the charger baby that are provided with iris capturing apparatus, and it can also be the iris identification device of other external device transformation.
Described iris information is characterized as the annular formations between the black pupil of eye and white sclera, and it includes the minutia of much interlaced spot, filament, crown, striped, crypts etc.
Control panel obtains USB interface and comprise multiple USB port, described USB interface comprises 2 USB port, described USB interface is connected with mobile phone USB interface through data line, and the USB port of at least 2 can not cause mobile phone USB port very few and carry out other operations after needs dismounting, such as: mobile phone charges.
The utility model operation steps is as follows:
A, equipment connection: external iris identification device is connected to the mobile phone being provided with corresponding iris technology process software by USB interface;
B, data initialization: utilize iris capturing apparatus under the control of mobile phone, carry out original iris information collection apparatus and deliver to signal conditioning package, carry out the extraction of iris information character and store in the storage device as primary key; Mobile phone carries out opening initialization operation;
C, authentication: operation is carried out to mobile phone and can trigger iris identification device iris recognition is carried out to user, if with original iris information characteristic matching success, user obtains and permits the operation of mobile phone, carries out step D; If unsuccessful with original iris information characteristic matching, mobile phone then decline user operation, repeats step C.
D, data manipulation: user obtains operation license, operates the data in mobile phone, the data in mobile phone to be encrypted the data stored in mobile phone memory storage by encryption device with primary key and to the decrypt data of taking out mobile phone memory storage.
E, again identity verification: user obtains the mobile phone operation to a certain action, middle shut-down operation exceedes mobile phone Preset Time this actuation time, needs to re-start step C: authentication.
Preferably, the cryptographic algorithm in described encryption device is one or the combination of AES, DES, RSA, MD5.
Claims (5)
1. one kind controls and the system of information protection mobile phone by iris identification device is external; it is characterized in that: comprise mobile phone and external iris identification device; described iris identification device comprises iris capturing apparatus, signal conditioning package, memory storage, encryption device and USB interface; described iris capturing apparatus is connected with USB interface; and by picked-up to iris information feature be sent to signal conditioning package and process; described signal conditioning package is connected with memory storage and USB interface respectively, and described encryption device is connected with USB interface and signal conditioning package respectively.
2. according to claim 1ly a kind ofly by iris identification device is external, mobile phone to be controlled and the system of information protection; it is characterized in that: described iris identification device is the cell-phone cover or the charger baby that are provided with iris capturing apparatus, it can also be the iris identification device of other external device transformation.
3. according to claim 1ly a kind ofly by iris identification device is external, mobile phone to be controlled and the system of information protection, it is characterized in that: the cryptographic algorithm in described encryption device is one of AES, DES, RSA, MD5 or combines.
4. according to claim 1ly a kind ofly by iris identification device is external, mobile phone to be controlled and the system of information protection; it is characterized in that: described iris information is characterized as the annular formations between the black pupil of eye and white sclera, it includes the minutia of much interlaced spot, filament, crown, striped, crypts etc.
5. according to claim 1ly a kind ofly by iris identification device is external, mobile phone to be controlled and the system of information protection; it is characterized in that: described USB interface comprises multiple USB port; described USB interface comprises 2 USB port, and described USB interface is connected with mobile phone USB interface through data line.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201520514363.7U CN204883719U (en) | 2015-07-15 | 2015-07-15 | System for it is external to cell -phone control and protect file through iris recognition device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201520514363.7U CN204883719U (en) | 2015-07-15 | 2015-07-15 | System for it is external to cell -phone control and protect file through iris recognition device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN204883719U true CN204883719U (en) | 2015-12-16 |
Family
ID=54828072
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201520514363.7U Expired - Fee Related CN204883719U (en) | 2015-07-15 | 2015-07-15 | System for it is external to cell -phone control and protect file through iris recognition device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN204883719U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105760730A (en) * | 2015-07-15 | 2016-07-13 | 石家庄蜗牛科技有限公司 | System for mobile control and information protection through external iris recognition device |
CN106127895A (en) * | 2016-06-21 | 2016-11-16 | 柳州治业科技有限公司 | A kind of external iris authentication equipment |
-
2015
- 2015-07-15 CN CN201520514363.7U patent/CN204883719U/en not_active Expired - Fee Related
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105760730A (en) * | 2015-07-15 | 2016-07-13 | 石家庄蜗牛科技有限公司 | System for mobile control and information protection through external iris recognition device |
CN106127895A (en) * | 2016-06-21 | 2016-11-16 | 柳州治业科技有限公司 | A kind of external iris authentication equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3291124A1 (en) | Electronic data protection method and device, and terminal device | |
CN102867136B (en) | A kind of second-generation identity card authentication system with fingerprint characteristic | |
CN103763091B (en) | A kind of application program encryption and decryption method and encryption, decryption device | |
CN105045085A (en) | Control method of smart watch and the smart watch | |
CN108011716A (en) | A kind of encryption apparatus and implementation method | |
CN102419805A (en) | Terminal equipment and method for encrypting user information | |
CN103167149A (en) | System and method of safety of mobile phone based on face recognition | |
CN105554226A (en) | Mode switching method and system, and terminal | |
CN103401771A (en) | Network isolation method and network isolation system | |
CN205788363U (en) | A kind of multiple authentication Gate-ban Monitoring System of Home House | |
CN105187640A (en) | Anti-theft method and system of mobile terminal | |
CN105426727B (en) | Fingerprint decryption method and mobile terminal | |
CN204883719U (en) | System for it is external to cell -phone control and protect file through iris recognition device | |
US20170091483A1 (en) | Method and Device for Protecting Address Book, and Communication System | |
CN104408360A (en) | Encryption equipment and method based on mobile terminal | |
WO2020073916A1 (en) | Encryption method and apparatus for storage device, and storage medium | |
CN205354036U (en) | Data encryption cloud storage system based on multimode biological identification technique | |
CN105760730A (en) | System for mobile control and information protection through external iris recognition device | |
CN105824666B (en) | Data Recapture Unit and method | |
CN105205415A (en) | File processing method and processing system | |
CN204836255U (en) | Integrated iris identification equipment's cell -phone cover | |
CN101226671A (en) | Adversaria prompting method and apparatus | |
CN104794430B (en) | A kind of method and system of fingerprint decryption | |
CN103824029B (en) | Intelligent card data treating method and apparatus | |
CN105389027A (en) | Iris encrypted mouse |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20151216 Termination date: 20180715 |
|
CF01 | Termination of patent right due to non-payment of annual fee |