Unlock instant, AI-driven research and patent intelligence for your innovation.

Fingerprint encryption system and working method

An encryption system and working method technology, which is applied in the field of electronic communication, can solve the problems of not being able to protect user privacy and information data security, and cannot effectively ensure information security, information security protection, etc., so that it is easy to carry around, realize adjustment at any time, The effect of enhancing security

Inactive Publication Date: 2016-12-21
四川易科天成科技有限公司
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In daily life, mobile storage devices such as USB flash drives and flash drives have become our main tools for saving and transferring files. However, the existing mobile storage devices cannot effectively guarantee the security of information stored in the device. If the storage device is lost or stolen, the information stored in it will be leaked; therefore, the existing mobile storage cannot well protect user privacy and information data security
Moreover, mobile storage devices often store various types of information files and are used on different computer terminals; therefore, it is difficult for existing mobile storage devices to protect personal privacy and information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fingerprint encryption system and working method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] Such as figure 1 As shown, a fingerprint encryption system includes a fingerprint identification module and an information processing module connected to the fingerprint identification module in communication;

[0033] The fingerprint identification module includes a first processor, a fingerprint identifier connected to the first processor, and a first memory connected to the first processor; the first processor calls the fingerprint information in the first memory and Compare the fingerprint signals acquired in the fingerprint reader to generate comparison information;

[0034] The information processing module includes a second processor and a second memory connected to the second processor; after the second memory obtains the comparison information, the second processor calls the comparison information in the second memory to execute the read Write or delete file operations;

[0035] The first processor is in communication connection with the second processor.

...

Embodiment 2

[0048] Such as figure 1 Shown, a kind of fingerprint encryption system working method comprises steps:

[0049] A. Store data information in the first memory or cloud platform in advance;

[0050] Pre-storing data information in the first memory or cloud platform can adopt the following methods:

[0051] Mode 1, enter the first fingerprint information through the fingerprint reader of the fingerprint identification module, store it in the first memory or send it to the cloud platform through the first communication unit for use;

[0052] Method 2: Input the first fingerprint information through the fingerprint reader of the input unit of the information processing module, and send it to the first memory or cloud platform for storage.

[0053] The first fingerprint information and the second fingerprint information include fingerprint pattern information of more than one finger.

[0054] B. The first processor of the fingerprint identification module calls the first fingerpr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the electronic communication technology field, to be specific, relates to a fingerprint encryption system and a working method. The fingerprint encryption system is used to solve a problem of a prior art that user privacy and information data safety cannot be well protected. The fingerprint encryption system comprises a fingerprint identification module and an information processing module connected with the fingerprint identification module in a communicated manner. The fingerprint identification module comprises a first processor, a fingerprint identification device connected with the first processor, and a first memory connected with the first processor. The first processor is used to invoke fingerprint information stored in the first memory, and the fingerprint information is compared with a fingerprint signal acquired by the fingerprint identification device to generate comparison information. The information processing module comprises a second processor and a second memory connected with the second processor. After the comparison information is acquired by the second memory, the second processor is used to invoke the comparison information stored in the second memory, and reading-writing operation or file deleting operation is executed. The fingerprint encryption system and the working method have advantages of convenient operation, good encryption effect, safety, and reliability.

Description

technical field [0001] The invention belongs to the technical field of electronic communication, and in particular relates to a fingerprint encryption system and a working method. Background technique [0002] With the rapid development of information technology, information confidentiality and information security are becoming more and more important; with the further development of the Internet and big data, personal privacy and the preservation of confidential documents have become the most urgent issues at present. In daily life, mobile storage devices such as USB flash drives and flash drives have become our main tools for saving and transferring files. However, the existing mobile storage devices cannot effectively guarantee the security of information stored in the device. If the storage device is lost or stolen, the information stored in it will be leaked; therefore, the existing mobile storage cannot well protect user privacy and information data security. Moreover...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00
CPCG06V40/13G06V40/1365
Inventor 赵志鹏
Owner 四川易科天成科技有限公司