Intelligent identity information identification method based on RFID technique

A technology of identity information and identification method, applied in the field of RFID, can solve the problems of password leakage authentication system, authentication and identification system is difficult to play, length is limited, etc.

Active Publication Date: 2018-02-27
CHONGQING SOUTHWEST INTEGRATED CIRCUIT DESIGN
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Although the password-based authentication mechanism has been widely used because of its simple implementation and convenient use, this technology has serious security risks: first, password leakage is the biggest threat to the authentication system, and user passwords are usually a set of Commonly used character strings have a limited length. For the convenience of memory, regular or meaningful character strings are generally selected as passwords; if the password transmission method is a static password transmitted in plain text, the security risks will be more serious, usually through network eavesdropping and interception. / Replay technology, dictionary attack, exhaustive attack, forged service attack (common such as ARP attack) and other methods steal user passwords, so that it is difficult for this kind of authentication and identification system to perform its expected functions; at present, a single password-based identity The verification system is gradually withdrawing from the stage of history
[0008] Although the simple token identification system represented by the existing radio frequency identification technology has obvious improvement in the aspect of identity information leakage compared with the password system (identity representation is stored on the medium instead of simple user password), but its The verification process is too simple, the domain technology is too simple and other factors lead to the disadvantages of rigid verification rules and single verification methods in the use process of this kind of system, which cannot meet the requirements of intelligent system; the verification process cannot avoid internal threats such as authorization violations. Improper operation of authorization, resulting in unexpected huge losses
Its too fixed database distribution structure is not conducive to large-scale, multi-queue information verification operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent identity information identification method based on RFID technique
  • Intelligent identity information identification method based on RFID technique
  • Intelligent identity information identification method based on RFID technique

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] see Figure 1 to Figure 4 , a kind of intelligent identification information identification method based on RFID technology, comprises the steps:

[0050] A. Establish several subsystems, each subsystem includes RFID reader, hyper terminal, MCU module, distributed database chip and image acquisition module; and the subsystem is connected to the host system through a switch in the form of a bus; the host system includes the host and servers; servers include database servers and computing servers.

[0051] The host system is used to complete the data communication and the interactive operation of the control logic with the sub-systems of the lower layer through the switch, and perform the second convolution feature extraction level filter calculation on the user's physiological image information to obtain the complex feature vector matrix of the second image.

[0052] see Figure 5 , each subsystem includes RFID reader, hyper terminal, MCU module, image acquisition modu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent identity information identification method based on an RFID technique. The method is characterized by comprising the following steps of creating multiple subsystems, wherein each subsystem includes an RFID reader, a super terminal, an MCU module, a distributed database chip and an image collecting module; connecting the subsystems with a host system through interchangers; carrying out an RFID label reading operation through the RFID readers, and reading and sending the RFID label information to the MCU modules; collecting physiological image information of a user in real time through the image collecting modules, and sending the user's physiological image information collected in real time to the MCU modules in a pixel image sequence dataflow mode; parsing personal identity information and personal permission information which are reserved on an RFID label through the MCU modules; searching the distributed database chips through the MCU modules todetermine whether or not information in accordance with the personal identity information reserved on the RFID label is stored; if yes, carrying out permission information analysis. The intelligent identity information identification method can be widely applied to various industrial and mining enterprises, schools, institutions and other fields.

Description

technical field [0001] The invention belongs to the technical field of RFID, and in particular relates to an intelligent identity information identification method based on RFID technology. Background technique [0002] With the development of Internet technology and the needs of Enterprise Resource Planning (ERP), the establishment of a complete personnel identity information database has become a key factor in the fields of enterprise information development, information security protection, and technical production resource scheduling. An important factor in the construction of the personnel information system is to complete the accurate identification and authentication of personnel identities, and to realize the addition, deletion, modification and update of personnel information by completing a series of information acquisition processes such as collection, extraction, verification, and storage of personnel information and other maintenance operations, to achieve secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K17/00G06N3/04G06F21/31
CPCG06F21/31G06K17/0022G06N3/045
Inventor 胥昕苏良勇王露陈昆
Owner CHONGQING SOUTHWEST INTEGRATED CIRCUIT DESIGN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products