Identity authentication method based on image recognition

A technology of identity authentication and image recognition, applied to individual input/output registers, instruments, time registers, etc., can solve the problems of forgery of personal information, loss of personal items, impersonation of others, etc., so that it is not easy to forge and be The effect of anti-theft, good operability, and improved confidentiality

Inactive Publication Date: 2017-02-15
福建省智慧物联网研究院有限责任公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These traditional identification methods have obvious disadvantages: loss of personal items, forgery of personal information, and even impersonation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method based on image recognition
  • Identity authentication method based on image recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to further explain the technical solution of the present invention, the present invention will be described in detail below through specific examples.

[0022] figure 1 It is the process flow of the entrance identity authentication method based on image recognition of the present invention. Such as figure 2 The present invention shown is realized by the following hardware, including a collection terminal, a server, and a verification terminal. The server includes a remote terminal and a client. The remote terminal is provided with a remote terminal database and a data processing unit. The remote terminal database includes multiple regional classification databases, and each regional classification database includes multiple identity category databases. The data processing unit includes a region attribution judging unit and a sample judging unit.

[0023] In addition, as an emergency solution, a data processing unit and a client database are additionally set...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an admittance identity authentication method based on image identification. The method comprises the steps that character information and image information are acquired, so as to generate acquired data; the acquired data are stored in corresponding region classification databases in a remote-end database of a server according to regional attributions of the acquired data; data to be authenticated are acquired from the regional attributions and are sent to the server, the server compares the data to be authenticated with the acquired data, judges whether the regional attributions are matched with the region classification databases, where the corresponding acquired data are located, or not, and generates authentication information according to matching results, so as to judge whether authentication permissions can be obtained or not, and then, whether the data to be authenticated pass through the admittance authentication of the regional attributions or not is acquired. The method has the advantages that the anti-counterfeiting performance is good, forgery and theft are difficult, convenience is brought for the arrangement of various types of field services, the admittance efficiency is increased, the staff setting is simplified, then, the effect of getting twice the result with half the effort is achieved, the identity check and authentication among different regional attributions can be prevented, and thus, the confidentiality of identity authentication is improved.

Description

technical field [0001] The invention relates to an identity authentication method for image recognition, in particular to an authentication method for an invigilator identity. Background technique [0002] In the existing examination process, students can only enter the venue after identification with the admission ticket. There are two disadvantages in this examination process. Second, the process is not humane enough, and candidates tend to miss the admission ticket or go through other complicated procedures. This consumes time and undoubtedly adds unnecessary psychological burden to candidates. [0003] The traditional identification method mentioned above mainly includes two aspects: 1. identification items, such as ID cards, ATM cards, keys, etc.; 2. identification knowledge, such as user names and passwords. These traditional identification methods have obvious disadvantages: loss of personal items, forgery of personal information, and even impersonation of others. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00
Inventor 史志明庄弘陈进民陈心香
Owner 福建省智慧物联网研究院有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products