Unlock instant, AI-driven research and patent intelligence for your innovation.

Fingerprint identification cipher device

A password device and fingerprint recognition technology, which is applied in the field of personal passwords, can solve the problems of increasing the work difficulty of managers, passwords are easy to forget, and short passwords are cracked and stolen.

Inactive Publication Date: 2009-09-02
BEIJING KEENS TECH
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the great development of network informatization, users need to enter user names and personal passwords in more and more applications. Too many and too long passwords are easy to forget, while short passwords are very easy to be cracked and stolen.
For example, in order to ensure the login security of the server, the login password needs to be changed regularly. When managing a large number of servers, frequent password changes will greatly increase the difficulty of the administrator's work.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fingerprint identification cipher device
  • Fingerprint identification cipher device
  • Fingerprint identification cipher device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Depend on figure 1 The interface control module, fingerprint identification module, function control module, status display module and power supply module are composed of five parts, which is the functional module diagram of the present invention (fingerprint cipher).

[0020] The fingerprint cipher automatically enters the running state after it is powered on. It mainly monitors the status of the function control module through the fingerprint identification module to control the work of other modules. The working process is as follows: figure 2 shown.

[0021] Step 201: After starting to work, first check the initial state of each module, and confirm the communication with the host. Enter step 202 after the detection is completed.

[0022] Step 202: If it is detected that the fingerprint has not been registered, it is necessary to register the fingerprint first. After the registration is complete, return to step 2 to detect the command to register the fingerprint ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fingerprint identification cipher device, which consists of an interface control module, a fingerprint identification module, a function control module, a state display module and a power module. The fingerprint cipher coder identifies the true identity of a user through uniqueness of the fingerprint features so as to control the user to safely login various devices or services, and can be used as a cipher input device for safe login of personal computers, servers and other electronic devices such as POS machines. The user needs passing the comparison and verification of a fingerprint acquired by the fingerprint sensor in the fingerprint identification module to use a corresponding cipher for login. Besides, the fingerprint cipher coder also can generate different user login ciphers according to different users. The interface of the fingerprint cipher coder connected with a host can be a serial port, a P / S2 interface, a USB interface or other interface capable of supporting user input.

Description

technical field [0001] The invention uses the uniqueness of the fingerprint feature to identify the real identity of the user, and generates the user's personal password through the fingerprint feature and random number generation, thereby controlling the user's safe login to various devices or services, and can be used as a personal computer, server and POS A password device for secure login of computers and other electronic equipment. Background technique [0002] Ordinary keyboards can only realize the input function, and cannot distinguish the real identity of the user and the restricted user, nor can it remember the user's login information. Passwords / passwords or personal identification numbers (PINs) are commonly used in automated control environments for personal computers, e-commerce, financial institutions, and banking. This authentication is purely digital, rather than a confirmation verification process of an individual's identity. With the great development of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F21/00G06F21/32
Inventor 袁波赵清一
Owner BEIJING KEENS TECH