Supercharge Your Innovation With Domain-Expert AI Agents!

Computer identity recognition system and method

A kind of identity recognition and computer technology, applied in the field of identity recognition, can solve the problems that others cannot carry out identity recognition, and achieve the effect of improving safety and safety performance

Inactive Publication Date: 2018-09-14
XIDIAN UNIV
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the computer identification system in the prior art usually verifies the identity of the person through various identification methods to improve computer security, that is, in order to improve the security performance of the computer, only the person can be identified through complex identification methods and can be identified successfully, others cannot be identified
However, when I am not in front of the computer but urgently need to know some information inside the computer, I need other people near the computer to help me obtain it. At this time, I need others to also enter the computer through identification. Security features can also allow others to access the computer's technical presence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer identity recognition system and method
  • Computer identity recognition system and method
  • Computer identity recognition system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0071] figure 1 A computer identification system provided by an embodiment of the present invention. Such as figure 1 As shown, the system includes: registration module 1, identification mode selection module 2, personal login subsystem 31, other people's login subsystem 32 and database 4, and the registration module 1, personal login subsystem 31 and other people's login subsystem 32 are all connected with Database 4 connections.

[0072] Specifically, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a computer identity recognition system and method. The system includes a registration module, an identification mode selection module, a personal login subsystem, an others login subsystem and a database. By setting two computer login modes including a personal login mode and an others login mode, the security performance of a computer is improved while others are allowed to temporarily enter the computer for conducting specific operation, and the purpose that others can enter the computer to help obtain relevant information when a person is not in front of the computerbut some information in the computer urgently needs to be known is achieved; in the personal login mode, through multiple matching verification, matching is conducted after decryption of a face image, sound and fingerprints, so that security is improved; in the others login mode, firstly head portrait information and a mobile phone MAC address of an operator are saved in a database as an evidencefor later viewing, and secondly a two-dimensional code and an authorization code are adopted to complete the identity recognition of others to log in the computer, so that security is improved.

Description

technical field [0001] The present invention relates to the field of identification, and more specifically relates to a computer identification system and method. Background technique [0002] With the continuous development of computer technology, information security has become the focus of attention, especially in the fields of computer information systems such as airports, banks, prisons, various government departments, military institutions, and enterprises. The usual method is to set and input various forms of passwords on each computer, or use magnetic cards, fingerprints and other means to confirm the user's identity and responsibility during work to prevent illegal The user with the identity uses the machine or accesses the computer system through the machine. [0003] However, the computer identification system in the prior art usually verifies the identity of the person through various identification methods to improve computer security, that is, in order to impr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/62
CPCG06F21/32G06F21/6218
Inventor 杨大泷陈婧娴孙龙陈奋增缪涵
Owner XIDIAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More