Intelligent identity information identification method based on rfid technology

A technology of identity information and RFID tags, applied in the direction of collaborative devices, instruments, biological neural network models, etc., can solve the problems of password leakage authentication system, limited length, security risks, etc.

Active Publication Date: 2020-07-28
CHONGQING SOUTHWEST INTEGRATED CIRCUIT DESIGN
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Although the password-based authentication mechanism has been widely used because of its simple implementation and convenient use, this technology has serious security risks: first, password leakage is the biggest threat to the authentication system, and user passwords are usually a set of Commonly used character strings have a limited length. For the convenience of memory, regular or meaningful character strings are generally selected as passwords; if the password transmission method is a static password transmitted in plain text, the security risks will be more serious, usually through network eavesdropping and interception. / Replay technology, dictionary attack, exhaustive attack, forged service attack (common such as ARP attack) and other methods steal user passwords, so that it is difficult for this kind of authentication and identification system to perform its expected functions; at present, a single password-based identity The verification system is gradually withdrawing from the stage of history
[0008] Although the simple token identification system represented by the existing radio frequency identification technology has obvious improvement in the aspect of identity information leakage compared with the password system (identity representation is stored on the medium instead of simple user password), but its The verification process is too simple, the domain technology is too simple and other factors lead to the disadvantages of rigid verification rules and single verification methods in the use process of this kind of system, which cannot meet the requirements of intelligent system; the verification process cannot avoid internal threats such as authorization violations. Improper operation of authorization, resulting in unexpected huge losses
Its too fixed database distribution structure is not conducive to large-scale, multi-queue information verification operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent identity information identification method based on rfid technology
  • Intelligent identity information identification method based on rfid technology
  • Intelligent identity information identification method based on rfid technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] see Figure 1 to Figure 4 , a kind of intelligent identification information identification method based on RFID technology, comprises the steps:

[0050] A. Establish several subsystems, each subsystem includes RFID reader, hyper terminal, MCU module, distributed database chip and image acquisition module; and the subsystem is connected to the host system through a switch in the form of a bus; the host system includes the host and servers; servers include database servers and computing servers.

[0051] The host system is used to complete the data communication and the interactive operation of the control logic with the sub-systems of the lower layer through the switch, and perform the second convolution feature extraction level filter calculation on the user's physiological image information to obtain the complex feature vector matrix of the second image.

[0052] see Figure 5 , each subsystem includes RFID reader, hyper terminal, MCU module, image acquisition modu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent identity information identification method based on RFID technology, which is characterized in that it includes the following steps: establishing several subsystems, each subsystem includes an RFID reader, a super terminal, an MCU module, a distributed database chip and Image acquisition module; and the subsystem is connected to the host system through the switch; the RFID reader performs the operation of reading the RFID tag, reads the RFID tag information and sends it to the MCU module; the image acquisition module collects the user's physiological image information in real time, and The collected physiological image information of the user is sent to the MCU module in the form of pixel map sequence data stream; the MCU module parses out the personal identity information and personal authority information reserved on the RFID tag; the MCU module queries whether the distributed database chip is If there is information consistent with the personal identity information reserved on the RFID tag, if there is consistent information in the distributed database chip, the authority information analysis will be performed; the invention can be widely used in various industrial and mining enterprises, schools, institutions, etc. field.

Description

technical field [0001] The invention belongs to the technical field of RFID, and in particular relates to an intelligent identity information identification method based on RFID technology. Background technique [0002] With the development of Internet technology and the needs of Enterprise Resource Planning (ERP), the establishment of a complete personnel identity information database has become a key factor in the fields of enterprise information development, information security protection, and technical production resource scheduling. An important factor in the construction of the personnel information system is to complete the accurate identification and authentication of personnel identities, and to realize the addition, deletion, modification and update of personnel information by completing a series of information acquisition processes such as collection, extraction, verification, and storage of personnel information and other maintenance operations, to achieve secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K17/00G06N3/04G06F21/31
CPCG06F21/31G06K17/0022G06N3/045
Inventor 胥昕苏良勇王露陈昆
Owner CHONGQING SOUTHWEST INTEGRATED CIRCUIT DESIGN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products