Identity identification security method based on cloud computing

An identity recognition and cloud computing technology, applied in the field of cloud computing, can solve problems such as high capital threshold and expensive hardware investment, and achieve the effect of ensuring stability

Inactive Publication Date: 2012-12-05
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The use of supercomputers requires expensive hard

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity identification security method based on cloud computing
  • Identity identification security method based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] The method of the present invention is described in detail below with reference to the accompanying drawings.

[0011] as appendix figure 1 As shown, data such as fingerprint images are transmitted from the client to the cloud computing server through the network for identification processing. The server side is a server group based on cloud architecture. Through cloud computing technology, multiple ordinary personal computers, standard servers (collectively referred to as computing nodes) and storage devices are combined using the network to form a supercomputer cluster. The access and identification operations of each client are distributed to different computing nodes for processing through the network, and the results are sent back to the client through the network. The cloud server provides powerful identification processing capabilities, thereby reducing the processing burden on the client, making the user terminal simplified into a simple input and output devic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity identification security method based on cloud computing. A system comprises a cloud platform, an identification terminal and a cloud server, and the method is characterized in that the system is based on the cloud platform, after the identification terminal completes acquisition of image information, the system sends the image information to the cloud server through a network, all identification processing is completed on the cloud server, identification results are returned to the terminal through the network, and finally, a user terminal is simplified to a simple input and output device and is capable of enjoying supercomputing processing capacity of 'cloud' as required.

Description

technical field [0001] The present invention relates to the technical field of cloud computing, in particular to an identification security method based on cloud computing. Background technique [0002] With the development of social economy, cases such as burglary, robbery, and wounding frequently occur in the current society. The life and property safety of individuals, families, enterprises and institutions cannot be effectively guaranteed. Traditional anti-theft doors and access control systems also bring hidden dangers to families and businesses because of their single structure and simple cracking; There are also rising expectations for local security. The single-function access control system can no longer meet the existing needs. More and more functions such as door opening record, video surveillance, fingerprint recognition, and face recognition are applied to the security system. In practical applications, there is an urgent need for a long-distance and rapid id...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 马旭军张新玲杨振林
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products