Double identity recognition method with relatively high security

An identity recognition and security technology, applied in the field of identity recognition, can solve the problems of verification uncertainty and troublesome system entry, and achieve the effect of simple entry, improved security, and increased security.

Inactive Publication Date: 2017-10-03
郑州靓岛建筑设计有限公司
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the computer verification technology of biological special diagnosis, fingerprints and irises are verified by non-contact, which is not only very troublesome in system entry, but also has great uncertainty in verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double identity recognition method with relatively high security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0031] see figure 1 , in the embodiment of the present invention, a double identification method with high security, the identification method includes the following steps:

[0032] (1) Create Jiugongge identity password

[0033] A. Record the labels of the points that the administrator selects in the Jiugongge graphics in turn, and generate label strings in the order of selection;

[0034] B. Encrypt the label character string, generate Jiugongge identity p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a double identity recognition method with relatively high security. The identity recognition method comprises the following steps of building a 9*9 grid identity password, building an encryption feature of a fingerprint image, verifying the 9*9 grid identity password, and verifying the identity of the fingerprint image. The method provided by the invention combines traditional identity verification with an existing fingerprint biological characteristic verification technology, so that security of identity verification is greatly improved; meanwhile, being different from traditional fingerprint biological characteristic verification, the method sets the fingerprint image to be corresponding to the 9*9 grid password, further refines the distinguishing characteristic in the fingerprint image, and greatly increases security of fingerprint verification; and meanwhile, input is relatively simple, and the requirement of current identity verification is met.

Description

technical field [0001] The invention relates to the technical field of identification, in particular to a double identification method with high security. Background technique [0002] Identification technology adopts cryptographic technology (especially public key cryptographic technology) to design a protocol with high security. It includes a password mode and a mark mode. The password mode refers to: generally a character string with a length of 5 to 8, composed of numbers, letters, special characters, control characters, etc. The username and password approach has been used for decades to provide ownership and quasi-secure authentication to provide some level of server protection. The way of marking means: it is a personal possession, which acts like a key and is used to start electronic equipment, and the mark records personal information for machine identification. [0003] At present, traditional technologies based on carrying objects (such as IC cards, keys, etc.) ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/32H04L9/3226H04L9/3231H04L63/08H04L63/0861
Inventor 李亮任索影
Owner 郑州靓岛建筑设计有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products