Unlock instant, AI-driven research and patent intelligence for your innovation.

A network gatekeeper information extraction method combined with fingerprint verification

A technology of information extraction and gatekeeper, applied in the field of biometrics, can solve the problems of high cost, simultaneous maintenance of software and hardware, etc., and achieve the effect of ensuring security

Active Publication Date: 2019-06-11
EAST CHINA NORMAL UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But its disadvantage is that the cost is high, and software and hardware need to be maintained at the same time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network gatekeeper information extraction method combined with fingerprint verification
  • A network gatekeeper information extraction method combined with fingerprint verification
  • A network gatekeeper information extraction method combined with fingerprint verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] refer to figure 1 , the gatekeeper system of this method comprises power supply module 1, micro control unit 2, FPGA programmable logic device 3, FPM10A fingerprint recognition module 4, first ethernet chip 5, second ethernet chip 6, extranet client 7, Intranet server 8 and storage medium 9 are formed. In the present invention, the fingerprint information is identified by the FPM10A fingerprint identification module 4 . If the fingerprint matches, the microcontroller unit 2 configures a whitelist for the FPGA programmable logic device 3 and monitors the external network client 7, and then the external network client 7 requests a data port to the internal network server 8, and the server returns a fixed port (port number: 80) as a data port. The external network client 7 sends network data to the first Ethernet chip 5 through the data port and converts it into MAC frame format data. After isolation, filtering and extraction of the gatekeeper realized by FPGA, the data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a GAP information extraction method combining with fingerprint verification. The method establishes a GAP system achieved by using a programmable logic device FPGA, and achieves three-level data security protection including fingerprint verification, GAP data isolation and filtration and password verification. After a fingerprint library is established, the GAP hardware system is started; and after verifying a fingerprint and verifying a password at an intranet server side, the user utilizes a storage medium to safely extract required data from the mainframe of the intranet server.

Description

technical field [0001] The present invention relates to biometrics, embedded systems and network communications. In particular, a netgate information extraction method combined with fingerprint verification. Background technique [0002] Today's life is inseparable from the network, data flows through the network, and information is disseminated through the network. However, along with the convenience and welfare that the network brings to people, the problems of data security and authentication follow. People need to protect the network of important workplaces, and at the same time, they need to filter, isolate, and extract valid data from big data in a complex network environment. [0003] The existing network security protection measures are classified according to the implementation methods, including software program maintenance methods, hardware device maintenance methods, and biometric identification methods. [0004] First, use software to write encryption algorit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0245H04L63/0861H04L63/101H04L63/105
Inventor 刘一清林顺豪张鼎夏邓伟
Owner EAST CHINA NORMAL UNIV