User management system
A user management and user technology, applied in the field of management systems, can solve problems such as difficult to simultaneously ensure user information security and effective management, and affect user experience, and achieve the effects of improving structural diversity, ensuring safe storage, and tight and fast deployment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0024] see figure 1 , the user information collection end includes a name input module, an account input module and a password setting module; the name input module is used to collect the user's name information, which is backed up and stored according to the user name information to provide convenience for future extraction, and the account number input module is used for the user Set up your own account, each user has a corresponding account, and the password setting module allows users to log in to the system by setting a password, which greatly increases the security of the user management system; the central data processor includes a data reading module, a data calculation module and The data transmission module; the data reading module reads the collection information of all users from the user information collection terminal and sends it to the data calculation module, which improves the speed of the system. The data calculation module calculates the data and processes t...
Embodiment 2
[0026] see Figure 2-3 , the difference from Embodiment 1 is that the user information collection terminal provides the functions of adding, editing, and deleting system user information, as well as setting passwords and assigning roles, which provides convenience for users' information entry and is also conducive to users' adjustment of information in the future. Access and view, the password setting module of the user information collection terminal can set personal passwords according to personal privacy. While protecting personal privacy, users can use their account passwords to log in to the client to query information at any time, and the central processor classifies the user's input information. , and send the processed information to the memory through the data transmission module, which ensures the fast transmission and safe storage of the data. It can also play a role in allocating information at the user system processing end, improve the structural diversity of the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


