Operation and maintenance safety management method based on fingerprint identification

A technology of fingerprint identification and operation and maintenance security, which is applied in the field of IT operation and maintenance to achieve the effect of improving security, ensuring confidentiality and reducing security crises

Inactive Publication Date: 2013-07-03
勤智数码科技股份有限公司
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to a survey conducted by a professional security association in the United States on nearly a thousand company network administrator

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation and maintenance safety management method based on fingerprint identification
  • Operation and maintenance safety management method based on fingerprint identification
  • Operation and maintenance safety management method based on fingerprint identification

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0018] All the features disclosed in this specification, or all disclosed methods or steps in the process, except for mutually exclusive features and / or steps, can be combined in any manner.

[0019] A fingerprint recognition-based operation and maintenance security management method, its characteristic steps include: 1) the fingerprint recognition machine collects user fingerprint information and saves it to the fingerprint information database; 2) submits the user’s fingerprint information to the security authentication server and registers the user’s basic information for binding Determine the fingerprint information; 3) Before logging into the operation and maintenance management system, the user scans the fingerprint information to the fingerprint identification machine; 4) The fingerprint identification machine compares the fingerprint information scanned in step 3) with the fingerprints in the fingerprint information database. Identification; 5) Send the comparison result t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an operation and maintenance safety management method based on fingerprint identification. The method comprises the steps as follows: 1) collecting and registering fingerprint information to a fingerprint information library; 2) registering user information and binding the fingerprint information on a safety certification server; 3) scanning the fingerprint information on a fingerprint identification machine by a user required to log in an operation and maintenance management system; 4) comparing the scanned fingerprint information with fingerprints in the fingerprint information library one by one for identification; 5) sending a fingerprint information comparison result to the safety certification server; and 6) when the comparison result is passed, allowing the user to enter the operation and maintenance management system, and when the comparison result is not passed, refusing admission to the operation and maintenance management system. According to the method, the safety of the operation and maintenance service is improved through the advanced, unique and stable biological identification technology.

Description

technical field [0001] The invention relates to the field of IT operation and maintenance, in particular to an operation and maintenance safety management method. Background technique [0002] In finance, telecommunications, public security and other government departments and industries, due to the high confidentiality requirements of their information, strict management and control must be carried out on the internal IT infrastructure of departments and enterprises, and all personnel without permission and certification cannot access The most common and simplest security management method is to use passwords to confirm the legitimacy of users by matching passwords. Insecure passwords are a common hidden danger in network systems. [0003] According to relevant data, the loss caused by password loss is huge every year. For example, in the United States, due to the loss of passwords or management errors, hundreds of millions of dollars in welfare funds are fraudulently cla...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32G06K9/00G06K9/20
Inventor 马桂忠
Owner 勤智数码科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products