Method of realizing intelligence cryptographic key set of fingerprint for multiple users to use

An intelligent key device, multi-user technology, applied in computer security devices, instruments, digital data authentication and other directions, can solve the problems of low utilization rate of fingerprint intelligent key device and less authority levels, etc., to improve flexibility and reduce user costs. Cost, Ease of Use

Active Publication Date: 2007-05-09
FEITIAN TECHNOLOGIES
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention aims to provide a method for realizing multi-user use of the fingerprint smart key devic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of realizing intelligence cryptographic key set of fingerprint for multiple users to use
  • Method of realizing intelligence cryptographic key set of fingerprint for multiple users to use
  • Method of realizing intelligence cryptographic key set of fingerprint for multiple users to use

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The system and method of the present invention will be described in more detail below with reference to the accompanying drawings and specific embodiments.

[0020] A part of the area is divided in the memory of the fingerprint smart key device for storing the user list. The user list includes items such as user ID, user name, user authority value, and user fingerprint feature data. Wherein, the user ID represents the serial number of the user, and generally the user IDs are numbered in descending order according to the registration order of the users, and each of them is different. During fingerprint registration, the system automatically assigns a user ID to each user in sequence. The user name is the name of each user. Generally, the user names of each user in the same fingerprint smart key device are different. When registering fingerprints, the user can set a character string as his user name as required. The user authority value refers to the authority level whe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for realizing fingerprint cipher key unit to be used by multi-user includes setting a user right value for each user, setting multiple different state value on fingerprint cipher key unit, corresponding each user right value to one state value of fingerprint cipher key unit, changing state value of said cipher key unit to be said cipher key unit state value corresponding to current user right value when fingerprint verification is passed by said cipher key unit in order to let user carry out operation as per current state value of fingerprint cipher key unit.

Description

technical field [0001] The invention relates to the field of information technology security, in particular to a method for realizing multi-user use on a fingerprint intelligent key device. Background technique [0002] The identity authentication lock is a small hardware device with a processor and a memory, which can be connected with a computer through the computer's data communication interface. It has a key generation function, and can store keys safely, and can preset encryption algorithms. The operations related to the identity authentication lock and the key are completely run inside the device, and the identity authentication lock has the characteristics of physical anti-attack, and the security is extremely high. In order to further improve the security of the identity authentication lock, the developer of the identity authentication lock has added a fingerprint sensor on its basis to verify the legitimacy of the user through fingerprint features. This identity au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/32
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products