Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Finger-print type port encipherizing device

An encryption device and port technology, applied in the direction of instruments, electrical digital data processing, digital data processing components, etc., can solve problems such as inconvenient use of computers, easy passwords to be stolen, and enterprise losses, etc., to reduce the risk of data theft Possibility, prevention of data leakage, and the effect of satisfying normal use

Inactive Publication Date: 2007-03-28
SHENZHEN TOPSTAR DIGITAL TECH
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Especially for enterprise users, a lot of data and materials involve business secrets, once stolen or leaked out, it will cause immeasurable losses to the enterprise
[0003] At present, the most common method is to set passwords with different permissions for different users, but the passwords are easy to be stolen, and the traditional password protection mode can no longer meet the current confidentiality requirements for computer data.
Some enterprises use the "zero port" method to ensure that internal data will not be leaked out. The so-called "zero port" means that all terminal computers on the intranet do not have any ports, and no one can copy the data out. The disadvantage of the method is that it is very inconvenient to use the computer, and the internal information has achieved the purpose of keeping secret, but it is also difficult to copy the required external information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Finger-print type port encipherizing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] Hereinafter, the present invention will be further described with reference to the accompanying drawings and the embodiments.

[0016] Please refer to FIGS. 1 and 2 together. The fingerprint-type port encryption device of the present invention includes a fingerprint input processing device, which is connected to a computer system, and includes a connection circuit 7, a fingerprint processor 3, a fingerprint receiving module 1 and a memory 4. The connection circuit 4 is used to connect the fingerprint input processing device to the computer system. The fingerprint receiving module 1 is used to receive a user's fingerprint to generate a fingerprint image signal 2. The memory 4 stores a fingerprint encoding module 5. The fingerprint processor 3 is used to execute the fingerprint encoding module 5 stored in the memory 3 to encode the fingerprint image signal 2 into the fingerprint code 6. The fingerprint code 6 can be transmitted to the designated transmission port 8 in the com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is about an encryption device of fingerprint-port. It include: The treating device for the fingerprint input, which is used to input the fingerprint so as to output the fingerprint code, and the storage device. The treating device for the fingerprint input is connected to the storage device by assign the port for transmition, the following parts have been storaged in the storage device: The database used to storage the fingerprint code of the user. The control module of the port, it can be used to control the designate port and receive the fingerprint code of it and used to read and write the database and to encrypte or decrypte the port needed. This invention can not only avoid the leak of the database efficiently, but also retain the port not being encrypted, so as to meet the normal use of the legitimate users.

Description

Technical field [0001] The present invention relates to the field of port encryption, and particularly relates to a fingerprint-type port encryption device applicable to electronic equipment such as computers, mobile phones, PDAs and the like. Background technique [0002] With the increasing development of computer and network technology and electronic equipment, data confidentiality has become an indispensable task. Especially for enterprise users, many data and materials involve trade secrets. Once stolen or leaked out, it will cause immeasurable losses to the enterprise. [0003] At present, the most common method is to set passwords with different permissions for different users. However, the passwords are easily stolen. The traditional password protection mode can no longer meet the current requirements for confidentiality of computer data. Some companies use the "zero port" method to ensure that internal data is not leaked. The so-called "zero port" means that there are no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F1/00
Inventor 舒峰
Owner SHENZHEN TOPSTAR DIGITAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products