Real-time user authentication method for security system
A real-time user and security system technology, applied in the field of identity identification and authentication, can solve problems such as inability to solve user experience well, and achieve the effect of solving user experience problems and ensuring security and confidentiality.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0010] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.
[0011] Such as figure 1 As shown, a security system real-time user authentication method provided by the present invention includes: a user authentication module, an authentication policy module and an APP control module. The user authentication module first obtains the relevant face or iris information of the user, compares it with the information preset in the device, and finally dynamically displays the comparison result on the module, and the person who passes the authentication can see the private What other people see is completely different information; the authentication strategy module is a module that can be customized flexibly, and is mainly responsible for what kind of authentication strategy each application in the security system should use. The main content of the authentication policy module is a configuration list of...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com