Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User safety verification method and system

A security verification and user technology, applied in the field of user security verification methods and systems, can solve problems such as insufficient understanding of protection and safety precautions, interns entering illegal organizations by mistake, and lack of safety supervision and protection mechanisms

Inactive Publication Date: 2018-05-29
山东嘉友互联软件股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Every year, a large number of graduates from colleges and universities enter the society, which is a huge group that cannot be ignored. During the internship before entering the society, it is the weakness of safety supervision. During the internship, students do not have a comprehensive understanding of their own protection and safety precautions, and they are open-minded. , easy to accept new things, and at the same time, lawbreakers also use this feature to mislead students into illegal places; especially in today's Internet, network social, and mobile social development, it is even more serious. It is understood that a large number of interns enter by mistake every year. Illegal organizations do not know themselves
Therefore, there is a lack of an effective safety supervision and protection mechanism during the student internship

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User safety verification method and system
  • User safety verification method and system
  • User safety verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] figure 1 It is a schematic diagram of a user security verification method provided by an embodiment of the present invention.

[0046] This embodiment provides a user security verification method, and the execution subject may be a server, such as figure 1 As shown, the method includes the following steps:

[0047] Step S101, acquiring human body biometric information and location information collected by the user terminal;

[0048] Specifically, the biometric information of a human body includes voiceprint information, fingerprint information, or facial feature information. The user enters the voiceprint, fingerprint or scans the face through the user terminal, so that the user terminal collects the user's biometric information, and the server obtains the biometric information collected by the user terminal, and obtains the positioning information through the GPS positioning system of the user terminal. In order to know the location of the user.

[0049] In order t...

Embodiment 2

[0064] image 3 It is a schematic diagram of the user security verification system provided by the embodiment of the present invention.

[0065] This embodiment provides a user security verification system, such as image 3 As shown, the system includes an information acquisition module 10, a comparison module 20 and a first information sending module 30:

[0066] An information acquisition module 10, configured to acquire human body biometric information and positioning information collected by a user terminal;

[0067] Specifically, the biometric information of a human body includes voiceprint information, fingerprint information, or facial feature information.

[0068] A comparison module 20, configured to compare human body biometric information and location information with preset information;

[0069] The first information sending module 30 is configured to send user abnormality information to the second receiving unit of the user management terminal when the biometri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user safety verification method and system, and relates to the technical field of safety supervision. The method comprises the steps that human biological characteristic information and positioning information, which are collected by a user terminal, are acquired; the human biological characteristic information and the positioning information are compared with preset information; if the human biological characteristic information and / or the positioning information do not match the preset information, user abnormality information is sent to a user management terminal. According to the invention, safety verification can be carried out on a user; safety supervision of the user is realized; and safety accidents are prevented.

Description

technical field [0001] The invention relates to the technical field of safety supervision, in particular to a user safety verification method and system. Background technique [0002] Every year, a large number of graduates from colleges and universities enter the society, which is a huge group that cannot be ignored. During the internship before entering the society, it is the weakness of safety supervision. During the internship, students do not have a comprehensive understanding of their own protection and safety precautions, and they are open-minded. , easy to accept new things, and at the same time, lawbreakers also use this feature to mislead students into illegal places; especially in today's Internet, network social, and mobile social development, it is even more serious. It is understood that a large number of interns enter by mistake every year. Lawless organizations cannot know themselves. Therefore, there is a lack of an effective safety supervision and protecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/021
CPCH04W4/021
Inventor 惠鸿庆孙良旗杨智君韩红伟
Owner 山东嘉友互联软件股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products