Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Isolation method based on fingerprint recognition of computer input and output devices

A technology for input and output devices and fingerprint identification, which is applied in the protection of internal/peripheral computer components, digital data authentication, etc., and can solve problems such as poor security

Active Publication Date: 2017-02-22
INFORMATION & COMM COMPANY OF STATE GRID HEILONGJIANG ELECTRIC POWER COMPANY +1
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention is to solve the problem that the existing computer input and output devices are directly plugged into the USB interface of the computer and directly operate the computer host, and the problem of poor security is proposed, and a method for isolating computer input and output devices based on fingerprint identification is proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Isolation method based on fingerprint recognition of computer input and output devices
  • Isolation method based on fingerprint recognition of computer input and output devices

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0022] Specific implementation mode 1. Combination figure 1 and 2 Describe this embodiment, the computer input and output equipment isolation method based on fingerprint identification described in this embodiment, the method is realized by the computer input and output equipment isolation device based on fingerprint identification, the device includes a housing 1, a fingerprint identification device 2, a number one Connection control switch 3, microcontroller 4, USB expansion card 5, n number three connection control switches 6, n USB expansion interfaces 7, external video output port 8, second connection control switch 9, external audio output port 10 and No. 4 connection control switch 15;

[0023] The fingerprint identification device 2, n USB extension interfaces 7, external video output port 8 and external audio output port 10 are all embedded in the side of the housing 1, and the video input port 12, USB main port 14 and audio input port 13 are also embedded. On the c...

specific Embodiment approach 2

[0037] Specific Embodiment 2. This embodiment is a further description of the method for isolating computer input and output devices based on fingerprint identification described in Specific Embodiment 1. No. 1 connection control switch 3, n No. 3 connection control switches 6 and No. 2 connection The control switches 9 are all single-pole single-throw switches.

specific Embodiment approach 3

[0038] Specific Embodiment 3. The difference between this embodiment and the method for isolating computer input and output devices based on fingerprint identification described in Specific Embodiment 1 is that it uses an NFC card reader or an RFID card reader instead of the fingerprint identification device 2, and the NFC The card reader or the RFID card reader is used to identify the NFC card or the RFID card, and the signal output end of the NFC card reader or the RFID card reader is connected to the card identification signal input end of the microcontroller 4 .

[0039] When the USB device is connected to the host computer through the device, the microcontroller 4 of the device connects the USB device to the microcontroller 4 of the device through the USB expansion card 5, the third connection control switch 6 and the fourth connection control switch 15 USB interface, the microcontroller 4 loads the USB device driver, reads the UUID (Universally Unique Identifier, Universa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an isolation method based on fingerprint recognition of computer input and output devices, which belongs to computer security technology field. The isolation method based on fingerprint recognition of computer input and output devices specifically includes isolation equipments of computer input and output devices and method of the isolation equipments of computer input and output devices. The isolation method based on fingerprint recognition of computer input and output devices solves poor security issue, which is caused by direct insertion of computer input and output devices into computer's USB jack and by direct control of the computer input and output devices on computer host. The method of the isolation equipments of computer input and output devices is implemented on the basis of the isolation equipments of computer input and output devices. The isolation equipments of computer input and output devices make the computer host separate with the computer input and output devices in a physical layer. The isolation equipments of computer input and output devices can also make unauthorized input and output devices disconnect with the computer host in order that unauthorized users can be prevented from operating the computer host by directly inserting input and output devices into computer's USB jack. The isolation equipments of computer input and output devices make authorized users be able to operate the authorized input and output devices by the fingerprint recognition to identify authorized users. The isolation equipments of computer input and output devices control devices which are connected to the computer and users. The isolation method based on fingerprint recognition of computer input and output devices is suitable to be used to encrypt computer's hardware.

Description

technical field [0001] The invention belongs to the technical field of computer security, and in particular relates to a method for isolating computer input and output devices. Background technique [0002] At present, the input and output devices of computers, such as keyboards, mice, monitors, speakers, printers and other devices, are directly connected to the host computer through data cables. However, with the rapid development of information security technology, for some computer hosts with relatively high security levels, these input and output devices that can be directly connected to the computer host can directly operate the computer host, and there are large security risks. If illegal users do not need to log in The operating system can shut down or restart the host computer to interrupt the running program; the direct connection method cannot prevent the attack of the USB hacking tool disguised as a keyboard or mouse, so that illegal users can attack the host comp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06F21/82
CPCG06F21/32G06F21/82
Inventor 赵威
Owner INFORMATION & COMM COMPANY OF STATE GRID HEILONGJIANG ELECTRIC POWER COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products