In the computerize epoch, no matter be in personal computer, ecommerce, financial institution and the banking system, individual secret mode nothing more than access to your password (password) or personal identification sign indicating number (Personal Identification number, PIN); But these methods only can't authenticate the people the cipher word authentication, and in these passwords or the authentication processing process of personal identification sign indicating number, can utilize various method to find password position and crack its password, or password/personal identification sign indicating number stolen by other people, just can enter in the computer system easily.For example, the invador will consult password, can utilize software (the Soft In Circuit Emulator that obtains easily, Soft ICE) finds out the region of memory that password stores, and a bit of program of implantation (is commonly called as and is worm in this zone, BUG), the program of this section is changed to do not check or check correct, can enter computing machine easily and use every resource.In case entered system, your operation all is legal operations for computing machine.
Point out that according to " 1999 CSI/FBI computer crime and safety survey " the access crime rate of being authorized by inner unauthorized personnel continues to increase in recent years.Hence one can see that, maintains secrecy with personal identification sign indicating number or password, can't guarantee that personal identification sign indicating number or personal identification number are the uses by this personal identification sign indicating number/password holder.
In view of this, the method to any computing machine user carries out authentication can be limited to the people who enters computing machine the personnel of legal authorization fully, and can prevent that the unauthorized personnel from usurping personal identification sign indicating number/password or the right to work scope of invading the authorized person.
Fundamental purpose of the present invention; provide a kind of identification of fingerprint key board unit and discrimination method thereof; promptly according in the human biological nature; fingerprint is the most stable; can't duplicate; the biological characteristic of change and singularity; on simultaneous computer uses the most widely input media also be keyboard; see through the real donor of protection identification of keyed access; replace PIN or personal identification number with identification of fingerprint; carry out authentication; and no longer be to use the identification of any spendable per capita numeral and monogram; so be used for method as personal identification with identification of fingerprint, can will allow computing machine carry out the access that more definite donor authorizes.
For achieving the above object, the invention provides a kind of identification of fingerprint key board unit and discrimination method thereof, in this device, include a fingerprint identifier (Finger Print Reader) at least, it is established in and carries out fingerprint in " enter " or " return " key in the keyboard and read, or all button installing fingerprint identifier is to read fingerprint at any time on keyboard; A keyboard controller in order to carry out coding, decoding and the comparison of fingerprint data, reaches a memory storage, in order to store real grantee's fingerprint data.Its discrimination method is, when the user by to the button of fingerprint identifier the time, will read user's fingerprint, and change the fingerprint that is read in into signal and import in the keyboard controller; Simultaneously the key (key) in the keyboard controller is accepted to carry out the deciphering of the fingerprint data in the memory storage by the instruction that central processing unit transmitted, compare with the fingerprint signal that keyboard controller transmits again, and whether be the authorized person with identification user's identity.
Now the embodiment shown in conjunction with the accompanying drawings describes structure of the present invention and function in detail.Wherein:
As shown in Figure 1, thiskey board unit 10 includes:
At least onefingerprint identifier 11, system is established in " enter " or " return " key in thekey board unit 10, or onkey board unit 10 in all button, in order to reading fingerprint at any time, and the fingerprint data that reads is converted to digital signal is sent tokeyboard controller 12;
Akeyboard controller 12, in order to carry out coding, decoding and the comparison of finger print data, include one only one key (key) 13 in it, thiskey 13 is that the central processing unit (CPU) 31 that is subjected tocomputer system 30 activates, and the fingerprint data of being imported is encrypted (encryption); And
Amemory storage 14 is in order to store the fingerprint data after real grantee encrypts, can use flash memory (flash).
Be stored in the fingerprint data of the legal authorization person in thememory storage 14 in above-mentioned, set up whenkey board unit 10 is used for the first time, thekey board unit 10 that is built in " ENTER " key with afingerprint identifier 11 is illustrated.Computer system 30 can be carried out " fingerprint input and storing step " earlier; When pushing " ENTER " key, the fingerprint data that is read the user by thefingerprint identifier 11 in " ENTER " keyimports keyboard controller 12 afterwards into,central processing unit 31 can send anonly key 13 that is built inkeyboard controller 12 in the control command A deactivation simultaneously, fingerprint data to input is encrypted, and the fingerprint data B after will encrypting is stored in theinterior memory storage 14 ofkey board unit 10.
First legal authorization person can import its all finger prints that need, and can determine other legal authorization person, and requires the necessary fingerprint data of its input; Certainly also have only first legal authorization person to have the right to determine other legal authorization persons' adding.
As shown in Figure 2, after finishing the foundation of authorized person's fingerprint database, during input that thefingerprint identifier 11 in " ENTER " ofkey board unit 10 key is sensed fingerprint (step 20), thiskeyboard identification device 11 converts the fingerprint data that is read in to digital signal and imports in thekeyboard controller 12;Central processing unit 31 is promptly given an order C with stored fingerprint data in thememory storage 14 simultaneously, be decrypted (decryption) (step 21) by thekey 13 in thekeyboard controller 12, the fingerprint data of authorized person after the fingerprint data imported ofkeyboard controller 12 and the deciphering is compared (step 22) subsequently, if comparison result does not meet the mandate fingerprint data of internal memory, thecomputer system 30 message D that will give a warning, and with all functions ofkey board unit 10 locked (step 23), with any access requirement of refusal unauthorized person.And if comparison result meets authorized person's fingerprint data,computer system 30 will be carried out the user any access thatkey board unit 10 is sent will be required E (step 24).
In addition, since presentkey board unit 10 be adopt withcomputer system 30 with wired or wireless mode of connection, the user can change any keyboard arbitrarily, therefore, for the user who prevents from not to be authorized arbitrarily changes common keyboard, or authorized person's fingerprint data keyboard is changed into the keyboard of unauthorized person's fingerprint data, and evade by use a computer resource in thesystem 30 of identity identification, as shown in Figure 3, the present invention links thisplug 40 ofcomputer systems 30 peripheral interfaces atkey board unit 10 and includes one group and hide plug 41 (hidden plug) and outer plug 42 (real plug), and thehiding plug 41 that disposed of eachkey board unit 10 corresponding pass that reachesouter plug 42 is unique in the present invention.
Above-mentionedhiding plug 41 is as thin as a wafer a thin layer, betweenouter plug 42 andcomputing machine 30 peripheral interfaces, is equipped with two metallic contacts on thishiding plug 41 and theouter plug 42.
When for the first time usingkey board unit 10, after theplug 40 ofkey board unit 10 inserts the peripheral interface ofcomputer systems 30, hidingplug 41 wherein will be fixed on the peripheral interface, become the part ofcomputer system 30 and can't separate; And two metalliccontacts hiding plug 41 can be in contact with one another with two metallic contacts on theouter plug 42, form an electric circulation, to export computer system to by the instruction thatkey board unit 10 is imported, whenkey board unit 10 was pulled away peripheral interface,outer plug 42 meetings were leftcomputer system 30 along withkey board unit 10 and are separated withhiding plug 41.
Again as shown in Figure 4, because hidingplug 41 is an only configuration with the difference metallic contact position thatouter plug 42 is provided with, onehides plug 41 can only peg graft for theouter plug 42 of mutually same group, metallic contact is corresponded to each other, therefore pull out or metallic contact does not meet can't peg graft the time whenkey board unit 10, this electric circulation will disappear thereupon,computer system 30 detects this phenomenon will send caution sound, and it is all functions ofkey board unit 10 are locked, and can't use the key board unit binding of common keyboard or storage unauthorized person fingerprint to entercomputer system 30, control legal user's identity of thesystem 30 that uses a computer with strictness.
In addition, also can inkey board unit 10, use battery to power in the present invention, in case during the power-off of system, can continue the aforesaid electric circulation of detecting, and send caution sound as power supply.
In sum, identification of fingerprint key board unit provided by the present invention and discrimination method thereof, can see through of the identification of the biological characteristic of fingerprint to user's identity, the prevention unauthorized person enters computer system and uses every resource, can't propose effective solution and countermeasure for tradition to the leak that the people authenticates with password, identification code.