Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Coded lock based on brain-computer switching technique and encryption and decryption method of coded lock

An exchange technology, encryption and decryption technology, applied in the direction of instruments, digital data authentication, time register, etc., can solve the problems of monotonous password, easy to decipher, long and complex password combination, etc., to prevent peeping password behavior and strengthen security. Effect

Active Publication Date: 2014-05-21
SUZHOU UNIV
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, in the existing password combination, the password is mostly composed of numbers, letters, and symbols. The monotony of the password makes the password easy to crack; in addition, for normal people, in order to improve the security of the password, it is generally necessary to combine It is long and complicated to set up, but for some people who are paralyzed, it is difficult to set the password itself; again, as mentioned above, the passwords of various combination locks in today's society are not only monotonous and easy to be stolen and easy to decipher. And because some passwords with complex combinations are often permutations and combinations without specific meanings, they are easily forgotten, which brings a lot of inconvenience to people.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Coded lock based on brain-computer switching technique and encryption and decryption method of coded lock
  • Coded lock based on brain-computer switching technique and encryption and decryption method of coded lock

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Such as figure 1 As shown, the combination lock 100 based on the brain-computer exchange technology of the present invention includes: a wearable device 10, the wearable device 10 includes a shell that matches the human head, and when people use the combination lock of the present invention, they need to wear the above-mentioned shell with the head on. Specifically, the above-mentioned casing has a shape similar to an earphone.

[0044]The outer shell is formed with an inner space, and the brainwave sensor 101 and the first encrypted wireless transmitter 102 are arranged in the inner space, and the brainwave sensor 101 and the first encrypted wireless transmitter 102 perform signal transmission. Wherein, the electroencephalogram sensor 101 specifically includes a sensing unit and a signal transmission unit, the above-mentioned sensing unit is used to sense and receive the brain wave information of the human body, and the signal transmission unit is used to transmit the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a coded lock based on a brain-computer switching technique and an encryption and decryption method of the coded lock. The coded lock comprises dressing equipment, encryption and decryption equipment and a code memory, wherein the dressing equipment comprises a shell matched with a human head; an internal space is formed by the shell; a brain wave sensor and a first encryption wireless transmitter are arranged inside the internal space; the brain wave sensor comprises a sensing unit and a signal transmission unit; the encryption and decryption equipment comprises a receiver and a matcher; the receiver comprises a receiving unit and a second encryption wireless transmitter; one end of the matcher is electrically connected with the receiving unit; an interface matched with equipment to be encrypted is arranged at the other end of the matcher; the matcher comprises a storing unit and a reading unit; the code memory is arranged in the equipment to be encrypted. The coded lock provided by the invention has the relatively high security, can provide the great convenience for the disable and the unschooled when passwords are set, and has the advantages of being simple to operate, convenient to use and wide in application.

Description

technical field [0001] The invention relates to the technical field of brain-computer exchange, in particular to a combination lock based on brain-computer exchange technology and an encryption and decryption method thereof. Background technique [0002] With the rapid development of science and technology, passwords have become indispensable in real life, such as bank card passwords, online banking passwords, mobile phone passwords, and so on. Passwords are closely related to people's property and privacy security. Once the password is deciphered or no password is set, the user's information security, account security and property security will not be guaranteed. [0003] At present, in the existing password combination, the password is mostly composed of numbers, letters, and symbols. The monotony of the password makes the password easy to crack; in addition, for normal people, in order to improve the security of the password, it is generally necessary to combine It is lo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00G06F21/32
Inventor 严建峰姚婷婷蔡丰蔓李云飞杨璐
Owner SUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products