Unlock instant, AI-driven research and patent intelligence for your innovation.

Non-contact digital safety system

A security system, non-contact technology, applied in the field of non-contact digital security system

Inactive Publication Date: 2009-07-08
郑保夏
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, because the radio frequency signal between the electronic key and the security device is easily captured by an illegal security device, and then an identical electronic key is copied, this leads to the fact that although there is a fairly safe protection mechanism, the user still needs to enter an additional password in order to avoid the occurrence of the above-mentioned illegal acts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Non-contact digital safety system
  • Non-contact digital safety system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Please refer to figure 1 , figure 1 It is a schematic diagram of the non-contact digital security system of the present invention. like figure 1 As shown, the non-contact digital security system of the present invention mainly includes a digital key 16 , a verification device 14 , and a management module executed in the electronic device 10 . The digital key 16 and the verification device 14 use the wireless components 16a and 14a that they both have to communicate through magnetic coupling or microwaves, while the verification device 14 and the electronic device 10 can use Bluetooth, infrared wireless bus or PCI, USB, 1394 wired bus. The electronic device 10 can be a computer, a PDA, a mobile phone or other devices with computing capabilities.

[0038] Please refer to figure 2 , figure 2 It is a schematic diagram of the operation of the contactless digital security system. figure 2 As shown, the digital key 16 additionally has a first storage unit 22 and a co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In the non-contact digital security system of the present invention, only when the legal digital key held by the legal user is close to the verification device, the electronic device will automatically release the locked state. In the above verification procedure, the verification device and the digital key use mutual verification to prevent the fake verification device from obtaining the data in the digital key, and also prevent the fake digital key from fooling the verification device, so that legitimate users do not need to enter the password Or identify fingerprints, iris and other second identification mechanisms, conveniently and effectively achieve the purpose of digital security.

Description

technical field [0001] The invention relates to a digital security system, in particular to a non-contact digital security system. Background technique [0002] General computer operating systems use account / password verification as a means of data protection. Although the accounts / passwords of some operating systems are not easily cracked, once a data processing device such as a hard disk drive is detached from a computer, another computer can be used to easily read the data stored therein. [0003] In order to overcome this problem, Chinese Taiwan No. 550459 patent provides a computer data protection device, which is expected to solve such problems. In short, the technical means used are to add an additional computer data protection device between the host (or the CPU of the computer) and the hard disk drive, and when writing / reading data from the hard disk drive, borrow The purpose of data protection is achieved through encryption / decryption. [0004] However, if the h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06K9/00G06F21/44G06F21/60G06F21/78
Inventor 郑保夏
Owner 郑保夏