Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication system and method

An identity verification method and identity verification technology, applied in user identity/authority verification, transmission systems, electrical components, etc., can solve problems such as accidental or malicious modification of data, theft or betrayal, data leakage, etc., to reduce the risk of being leaked , avoid data loss and improve security

Inactive Publication Date: 2014-08-20
谭知微 +1
View PDF14 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the different password requirements on many different systems and platforms, the passwords stored in different systems are often different, causing difficulties in people's memory and management
[0004] Moreover, if the data is stored on a single network system, it will bring great risks to the security of the data
For example, external attacks, hackers, or viruses on the network system will cause data leakage, and data management loopholes will also lead to data copying and theft, and data may also be accidentally or maliciously modified, stolen or sold, lost, etc.
In addition, the unreasonable use of data managers, for example, one department can freely view the data stored in the server of another department, etc., all of which lead to the leakage of data stored on the network
[0005] Once the fingerprint information of people stored by the entry-exit management department is leaked, it will cause the leakage of people's personal information
Moreover, once people's fingerprint information is used by criminals, it will also cause great harm to society

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication system and method
  • Identity authentication system and method
  • Identity authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The identity verification system of the present invention is used for the identity verification of entry-exit personnel by the entry-exit management department, and the identity verification method mainly uses the above-mentioned identity verification system to verify the identity of the entry-exit personnel. Of course, the identity verification system can also be applied to other occasions that require identity verification, such as bank vaults, offices, offices of government secrecy departments, and clubs that only allow members to enter.

[0023] The identity verification system of the present invention needs to obtain people's biological information, including fingerprint information or iris information. Fingerprint information can be obtained through a fingerprint scanner, and iris information can be obtained through an iris scanner. Fingerprint scanners and iris scanners are common There is technology, and the present invention will not be described in detail.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication system and method. The identity authentication method comprises the biological information obtaining and storing step and the authentication step, wherein in the biological information obtaining and storing step, biological information is obtained, numeralization is carried out on the obtained biological information, the numerical biological information is encrypted, encrypted data are processed in a decentralized mode to form three or more data blocks, the data blocks are stored in different storage devices respectively, and each data block does not contain the complete data of the biological information; in the authentication step, the data stored in the storage devices are obtained, the obtained data are combined, the combined data are decrypted, the decrypted data are compared with data obtained after numeralization is carried out on biological information obtained by an identity authentication device, and the authenticity of an identity is authenticated according to a comparison result. The method is applied to authenticating the identity through the identity authentication system. Safety of data storage can be improved, and complete personal information leakage caused by data leakage is avoided.

Description

technical field [0001] The invention relates to the field of identity verification, in particular to an identity verification system and a method for applying the system to identity verification. Background technique [0002] When people leave or enter the country, they usually need to carry out identity verification, such as scanning their fingerprints for identification. The usual practice is that the entry-exit management department obtains people's fingerprint information in advance, such as pre-scanning people's fingerprints when making entry-exit documents, digitizes the scanned fingerprint image, and stores it on the server of the entry-exit management department . When people leave or enter the country, they scan their fingerprints on the fingerprint scanning device. After the fingerprint scanning device obtains the fingerprint image and digitizes the fingerprint image, it compares it with the fingerprint information stored in the server of the entry-exit management...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 谭知微
Owner 谭知微