Remote wireless identity authentication system

An identity authentication and remote wireless technology, which is applied in the field of remote wireless identity authentication system, can solve problems such as unfavorable development of integrated equipment, increase of system development cost, and poor adaptability to the environment, so as to ensure safety, ensure safety, and ensure leaked effect

Inactive Publication Date: 2014-02-26
NANNING COLLEGE FOR VOCATIONAL TECH
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the existing system can meet the needs of users in terms of storage space, the addition of PCs will undoubtedly increase the development cost of the system
Moreover, its large volume and poor environmental adaptability are not conducive to the devel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote wireless identity authentication system
  • Remote wireless identity authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] figure 1 It is the overall block diagram of the system of the present invention, figure 2 It is a general diagram of the client design of the wireless identity authentication system of the present invention. The remote wireless identity authentication system is composed of a wireless identity authentication system client and a remote server. The client side of the wireless identity authentication system is equipped with a fingerprint collection module and a communication module A, and the fingerprint collection module is used to collect fingerprint grayscale images and extract fingerprint feature data from the grayscale images , The fingerprint collection module is connected with the communication module A, and the communication module A sends the request message of the fingerprint feature data from the wireless identity authentication system client to the remote server end by means of wireless communication; the remote server end is a server group, composed of It co...

Embodiment 2

[0035] figure 1 It is an overall block diagram of the system of the present invention, and the remote wireless identity authentication system is composed of a wireless identity authentication system client and a remote server. The client side of the wireless identity authentication system is equipped with a fingerprint collection module and a communication module A, and the fingerprint collection module is used to collect fingerprint grayscale images and extract fingerprint feature data from the grayscale images , The fingerprint acquisition module is connected with the communication module A, and the communication module A sends the request message of the fingerprint feature data from the wireless identity authentication system client to the remote server end through wireless communication; the remote server end is a server group, composed of a It consists of a hardware firewall device, an authentication server, and two fingerprint database servers. The authentication server ...

Embodiment 3

[0042] figure 1 It is an overall block diagram of the system of the present invention, and the remote wireless identity authentication system is composed of a wireless identity authentication system client and a remote server. The client side of the wireless identity authentication system is equipped with a fingerprint collection module and a communication module A, and the fingerprint collection module is used to collect fingerprint grayscale images and extract fingerprint feature data from the grayscale images , The fingerprint acquisition module is connected with the communication module A, and the communication module A sends the request message of the fingerprint feature data from the wireless identity authentication system client to the remote server end through wireless communication; the remote server end is a server group, composed of a It consists of a hardware firewall device, two authentication servers, and a fingerprint database server. The authentication server i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a remote wireless identity authentication system which comprises a wireless identity authentication system client employing the 3G/4G technology and a remote server end. A user acquires a fingerprint gray scale image on the client through a wireless identity authentication system, and fingerprint characteristics are extracted from the image. Once a server receives the fingerprint characteristics of the user, the received fingerprint characteristics and fingerprint characteristics in a database are contrasted, and a contrast result is fed back to the client timely. Corresponding processing is carried out by the client according to the feed-back result from the server end, and thereby identity information authentication of the user is carried out. The remote wireless identity authentication system has properties of low cost and safe and reliable performance, can establish wide development and application space for the identity authentication technology and the 3G/4G technology, and thereby an ideal solution scheme is provided for various technical problems of identity authentication and information safety in a present society.

Description

technical field [0001] The invention relates to an identity authentication system, in particular to a remote wireless identity authentication system. Background technique [0002] With the rapid development of society and economy, communication and exchange between people have become closer. However, most identity authentications currently use certificates, magnetic cards or passwords. These methods cannot avoid forgery or loss, and passwords are easily stolen or forgotten, resulting in the emergence of criminal activities with various forged identities. Biometric technology, especially fingerprint recognition technology, has developed rapidly due to its advanced nature and reliability. [0003] At present, most of the identity authentication systems related to biometrics at home and abroad are PC-online, which is composed of a biometrics collection system and a PC. Although the existing system can meet the needs of users in terms of storage space, the addition of PC will...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 王凤岭张远翼
Owner NANNING COLLEGE FOR VOCATIONAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products