Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A boot authority verification method and system based on an intelligent terminal

A technology of intelligent terminal and verification method, applied in the field of authority verification, can solve the problems of high development cost, high expansion cost, impact control, etc., and achieve the effect of easy expansion and upgrade

Active Publication Date: 2018-04-13
SUN YAT SEN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1. Each instrument control terminal included in the management must be equipped with a scanning device, such as a card reader controller, and the expansion cost is high
[0007] 2. The internal program of the scanning device needs to be customized and written by a dedicated code writer, and the development cost is high
Therefore, it is necessary to purchase and install from the developer to add an instrument control terminal or to upgrade, and the maintenance cost is high and the update is difficult.
[0008] 3. On some instruments with complex interface control, the access interface of the scanning device may conflict with other interfaces of the instrument, resulting in unstable instrument status
[0009] 4. Some instruments will generate radio frequency interference to the card reader controller and affect the control
[0010] To sum up, the method of collecting user information by scanning devices and then pushing it from the host to the server for authority verification has lagged behind.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A boot authority verification method and system based on an intelligent terminal
  • A boot authority verification method and system based on an intelligent terminal
  • A boot authority verification method and system based on an intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] With the development of science and technology, smart terminal products have become very popular. In the past, the verification method of using scanning equipment to obtain user information for verification and authorization has highlighted problems such as high expansion costs, possible interface conflicts, and radio frequency interference. Therefore, it is the general trend to develop alternative methods that are cheaper and more versatile, and reduce interface interference.

[0034] The smart terminal can easily access the network for signal transmission of various networks. At the same time, by developing the client program of the general operating system, the user can expand the smart terminal. Since the smart terminal has the above advantages, the present invention selects the smart terminal to obtain user identity information to verify the power-on authority.

[0035] Such as figure 2 , 3 As shown, the verification method provided by the present invention incl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a boot permission verification method based on an intelligent terminal and a system of the boot permission verification method. The verification method comprises the following steps of: 1, obtaining user permission information by using the intelligent terminal, wherein the user permission information includes user identity information and a control end identifier of instrument equipment to be used by a user; and 2, sending the user permission information to a server end by the intelligent terminal for permission verification, and determining whether to boot or not by an instrument equipment control end corresponding to the control end identifier according to the permission verification result. The verification method provided by the invention has the advantages that the intelligent terminal is used for permission verification; the intelligent terminal cannot generate radio-frequency interference; the intelligent terminal and the instrument equipment control end are accessed into the server end through a network; and the access through hardware interfaces is not needed, so that the additional interface occupation is not needed; during control end updating or port expansion of the instrument equipment, a control program can be automatically installed; the writing-in by a special coder is not needed; and the user can easily realize volume expansion and updating.

Description

technical field [0001] The present invention relates to the field of authority verification, and more specifically, to a smart terminal-based boot authority verification method and system. Background technique [0002] The use of machinery and equipment usually involves the issue of user permissions. To verify the authority, the user identity must first be identified. There are many ways to identify the user identity at this stage, such as through face recognition, fingerprint recognition, or through various ICs and ID cards that bind user identities. However, the method of biometric identification will increase the hidden danger of data security, and the cost is relatively expensive. Therefore, the technical means of using various card reading devices as equipment for identifying user identities is widely used. When performing authority authentication, as long as the user information obtained by the card reading device is compared with the authorization list, the user's po...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/34
CPCG06F21/31G06F21/34G06F2221/2141
Inventor 罗剑文
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products