Fingerprint identity authentication system and authentication method

An identity authentication and fingerprint technology, which is applied in the identity authentication system and its authentication field using fingerprints, can solve the problems of strict implementation, virtual authority authentication cannot be reliably verified, security policies cannot be guaranteed, etc., so as to achieve ease of use. Strong, mature technology, widely popular effect

Inactive Publication Date: 2013-09-11
深圳市嘉乐祥珠宝饰品有限公司
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the traditional "password + password" is still used in the virtualization application process. Once the administrator account / embedded account that controls the terminal and application is illegally used and shared, the real identity of the virtualization authority authentication cannot be reliable. It has been confirmed that illegal users can easily take the opportunity to access the interface and interfaces of the information system and other major facilities through terminal devices such as PCs, mobile phones, and PDAs, and the security policies of the system will not be guaranteed to be strictly enforced.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fingerprint identity authentication system and authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be described in further detail below in conjunction with the embodiments and with reference to the accompanying drawings.

[0021] Multi-virtual systems will use a unified identity authentication ID, and unified management of man-machine management, witness management, and fingerprint multi-device management (fingerprint AD domain, fingerprint SSO single sign-on, fingerprint electronic signature, fingerprint VPN, etc.) Ensure that the account and the actual authorized user identity card are integrated and unified, thereby enhancing the security and service performance of virtual machines and physical servers.

[0022] Such as figure 1 , a fingerprint membership authentication system, including the following components:

[0023] 1. A remote connection server with fingerprint authentication software installed 3

[0024] The installed fingerprint identity authentication software is a SERVICE program responsible for providing fingerprint identit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a fingerprint identity authentication system which comprises a fingerprint information collecting device and a data processing terminal device in electric connection with the fingerprint information collecting device. The data processing terminal device can further communicate with a remote data server through a network. The invention further discloses a fingerprint identity authentication method which comprises the following steps of (1) fingerprint registration, (2) making client information with fingerprint digital characteristic data, and (3) client login. The fingerprint identity authentication system and the fingerprint identity authentication method have the advantage that fingerprints, which is a kind of biological recognition, of a specific person is used as a user identity dependable authentication method.

Description

technical field [0001] The invention relates to an identity authentication system, in particular to an identity authentication system using fingerprints and an authentication method thereof. Background technique [0002] With the development of society and the advancement of science and technology, electronic and network technologies have been applied in daily work and life. The application virtualization is based on the application / server computing C / S architecture. logically isolated. When a user accesses an application after server virtualization, the user computer only needs to transmit the human-computer interaction logic to the server through the AIP protocol, and the server opens an independent session space for the user, and the calculation logic of the application program runs in this session space , and transmit the changed human-computer interaction logic to the client, and display it on the corresponding device of the client, so that the user can obtain the sam...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06K9/00
Inventor 陈月明
Owner 深圳市嘉乐祥珠宝饰品有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products