A Staff Security System Based on Mobile Internet Service Application
A mobile Internet and staff technology, applied in the field of staff security system based on mobile Internet service applications, to achieve the effect of guaranteeing personal safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0079] The staff security system of the present invention is described by taking this embodiment as an example. In the present invention, staff members and customer personnel are collectively referred to as users.
[0080] The user installs the mobile terminal 10 on the mobile device or computer system. The user logs into the mobile terminal 10, registers and uploads personal information through the personal information module 101. Among them, the staff need to upload valid qualification certificates to confirm their qualifications for employment. Qualification certificates include one or more of ID cards, health certificates, specific industry qualification certificates and practice certificates issued by relevant units, and at least one of the certificates has the image of the staff. After the staff uploads the relevant qualification certificates, the human service personnel of the labor management module 208 manually check the qualification certificates. After the human ...
Embodiment 2
[0110] This embodiment is a further improvement on Embodiment 1, and describes the watermark generation process and watermark verification process. The parts that are the same as those in Embodiment 1 will not be described again.
[0111] According to a preferred embodiment, the watermark image is composed of several pixels similar to the background color of the certificate image. These pixels are distributed in an irregular manner on the certificate image with the watermark image, so that no regular pattern that is easy to distinguish by human eyes will be produced.
[0112] The steps of the watermark image generation method include:
[0113] S201: Establish a scrambling matrix for the original image, where the scrambling matrix includes positions corresponding to pixels of the original image one-to-one.
[0114] S202: Fill all positions of the scrambling matrix with values obtained by multiplying the key by the points in the Gaussian elliptic curve domain.
[0115] S203...
Embodiment 3
[0172] This embodiment is an improvement on Embodiment 1. This embodiment describes the first mapping table and the second mapping table in the database 202, and the parts not described are the same as those in Embodiment 1.
[0173] In this embodiment, the first user is a staff member, and the second user is a customer. Conversely, when the first user is a customer and the second user is a staff member, the first mapping table and the second mapping table can be established and updated in the same manner.
[0174] Such as figure 2 As shown, the first mapping table includes geographic location data of the first user and geographic location data of at least one second user. Wherein, the geographic location data of the first user is uploaded by the first user via the mobile terminal 10 . The geographic location data of at least one second user is matched by the data matching module 204 from the user information in the database 202 based on the geographic location data upload...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


