Device for preventing setting of equipment of software be used or altered by non authorized person

A non-authorized, software technology, applied in the direction of preventing unauthorized use of memory, etc., can solve problems such as content theft, system operation status damage, high damage rate of hardware equipment, etc., to prevent fingerprint forgery, strengthen security, and high practicability Effect

Inactive Publication Date: 2003-07-02
GLOBAL SUN TECH
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] General hardware devices or software systems are not equipped with any protection measures, so that some high-precision or expensive hardware devices are often used by unauthorized persons, resulting in a very high damage rate of hardware devices, and even because of No protection measures have been added, so that unauthorized persons can easily enter the system to spy on the content, or even change the settings in the software without authorization, resulting in the complete change of the characteristics of the entire system, resulting in the destruction of the operating status of the system or theft of content; although Recently, some people use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device for preventing setting of equipment of software be used or altered by non authorized person
  • Device for preventing setting of equipment of software be used or altered by non authorized person
  • Device for preventing setting of equipment of software be used or altered by non authorized person

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Such as figure 1 , figure 2 As shown, the present invention provides a device for preventing the settings in equipment and software from being used or changed by unauthorized persons, which can be used by a fingerprint image sensor 1, a password, a fingerprint feature database 8, and a password input unit 5, through fingerprint identification (Identification) or verification (Verification) technology, through the fingerprint feature data stored in the password, fingerprint feature database, and the fingerprint image sensor 1 live fingerprint feature 7 mutual comparison, at the same time Combined authentication method with password, and hierarchical authorization according to the hardware equipment 9, or the confidentiality level of the system, and operating habits to prevent unauthorized personnel from entering the security operation mode of the hardware device or the system, thereby preventing the device from being used, Or the settings in the software have been changed b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A device for preventing the settings in device and software from being used or modified by non-authorized person is composed of fingerprint image inductor, cipher, fringerprint characteristics database and cipher input unit. It features the combination of fingerprint identification or verification and cipher.

Description

Technical field [0001] The invention relates to a secret lock device, in particular to a device that prevents the settings in equipment and software from being used or changed by unauthorized persons. Background technique [0002] General hardware devices or software systems are not equipped with any protection measures, so that some high-precision or expensive hardware devices are often used by some unauthorized persons, resulting in a very high rate of damage to hardware devices, even due to Without any protection measures, unauthorized persons can easily enter the system to snoop on the content, and even change the settings in the software without authorization, resulting in the complete change of the entire system characteristics, which in turn causes the system's operating status to be damaged or the content to be stolen; Someone has recently used passwords to protect the aforementioned hardware devices and software to strictly control unauthorized access to use or change th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14
Inventor 林文奇
Owner GLOBAL SUN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products