Handwriting privacy lock device and application method thereof

An application method and security lock technology, applied in computer security devices, digital data authentication, electrical digital data processing, etc., can solve the problems of low security and easy cracking of security lock devices, and achieve the effect of improving security

Inactive Publication Date: 2012-07-11
SHANGHAI CHENXING ELECTRONICS SCI & TECH CO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is to provide a handwriting security lock device and its application method in order to overcome the defects that the security lock device in the prior art is easy to crack and the security density is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Handwriting privacy lock device and application method thereof
  • Handwriting privacy lock device and application method thereof
  • Handwriting privacy lock device and application method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The preferred embodiments of the present invention are given below in conjunction with the accompanying drawings to describe the technical solution of the present invention in detail.

[0035] figure 1 It is a structural block diagram of the handwriting security locking device of the present invention.

[0036] refer to figure 1 , The handwriting security locking device mainly includes: a sensor 2, a processing module 3 and a matching module 4.

[0037] The sensing module 2 is used to record the position of each point that the user enters the handwriting; the processing module 3 is used to assign the position of the handwriting and record it in the corresponding current array; the matching module 4 is used to compare the current array and the confidential handwriting array content and get a match score. Such as figure 1 As shown, the sensor 2, the processing module 3 and the matching module 4 are connected in sequence.

[0038] Wherein, the array is a two-dimension...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a handwriting privacy lock device, which comprises an inductor, a processing module and a matching module, which are sequentially connected, wherein the inductor is used for recording the position of each point, through which the handwriting input by a user passes; the processing module is used for carrying out value assignment on the handwriting, and recording in a corresponding current array; and the matching module is used for comparing contents of the current array and the privacy handwriting array to obtain a matching degree. According to the invention, handwriting of cipher character is recorded, so that the cipher character cannot duplicated; and the handwriting encryption treatment is carried out on the function requiring privacy, thus the function or electronic equipment is difficult to open even if the cipher character is leaked carelessly, and the privacy degree is remarkably improved.

Description

technical field [0001] The invention relates to a security lock device, in particular to a handwriting security lock device and an application method thereof, which are suitable for touch screen electronic equipment such as touch screen mobile phones. Background technique [0002] With the development of science and technology, more and more electronic devices (such as mobile phones, MP4, mobile hard drives, etc.) are integrated into our lives. The functions of electronic equipment are constantly changing and increasing, so the data stored in the electronic equipment must be very large. Important data, private information, etc. will be stored intentionally or unintentionally in electronic devices carried by users. [0003] For example, mobile phones, with the powerful image function of mobile phones, these data are mostly stored in the form of pictures or short videos, and the privacy of mobile phones is becoming more and more obvious. However, small and exquisite mobile p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/04G06F21/44
Inventor 李仁启
Owner SHANGHAI CHENXING ELECTRONICS SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products