Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity recognition system based on a computer network

A computer network and identity recognition technology, applied in the field of identity recognition, can solve the problems of easy to be stolen or deciphered, low security factor of passwords, cumbersome passwords, etc., to achieve the effect of not easy to steal or decipher, and high security factor

Pending Publication Date: 2019-03-26
SHENGDA ECONOMICS TRADE & MANAGEMENT COLLEGE OF ZZ
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The method of user name and password has been used for decades to provide ownership and quasi-secure authentication to provide a certain degree of protection to the server. However, there are some problems in the application of password identification: the password is cumbersome and difficult to remember, and the security factor of the simpler password However, it is relatively low, and it is easy to be stolen or deciphered, so an identification system based on a computer network is needed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity recognition system based on a computer network
  • Identity recognition system based on a computer network
  • Identity recognition system based on a computer network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the invention, but it should be understood that the protection scope of the present invention is not limited by the specific embodiments.

[0025] refer to Figure 1-4 , the present invention provides a computer network-based identification system, comprising:

[0026] The man-machine operation module is used to obtain the instruction data input by the operator and send it to the central processing module;

[0027] The camera is used to collect the face data of the operator and send it to the central processing module for storage and post-processing.

[0028] The data acquisition module is used to collect various identity verification data and send them to the data processing module, and the data processing module performs data processing after receiving various identity verification data, and sends th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity recognition system based on a computer network, which relates to the technical field of identity recognition and comprises a man-machine operation module, a data acquisition module, a data processing module, a data storage module, a data encryption module, a background management module, an identity data comparison module, a verification passing module, an authority management module and an alarm module. According to the invention, various biological characteristic identity verification modes are adopted; Identity authentication of an operator, an operator does not need to record complex and tedious passwords; The system is simple in structure, high in safety coefficient, not prone to being stolen or decoded, capable of flexibly adjusting the identity permission of a client according to actual needs, capable of giving an alarm in time and recording the facial features of a displacer if masquerading displacement or other violation operations are found, and very suitable for an identity recognition system based on a computer network.

Description

technical field [0001] The invention relates to the technical field of identification, in particular to an identification system based on a computer network. Background technique [0002] With the progress of society and the development of the times, Internet technology is more and more developed, and people in all walks of life pay more and more attention to the verification of identity, and in the context of the establishment of credit reporting system in the whole country, it is necessary to accurately identify the parties Identity has also become more important. [0003] At present, commonly used identification systems mostly use password identification, that is, generally a character string with a length of 5 to 8, consisting of numbers, letters, special characters, control characters, etc. The method of user name and password has been used for decades to provide ownership and quasi-secure authentication to provide a certain degree of protection to the server. However,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/60G06F21/62
CPCG06F21/32G06F21/602G06F21/604G06F21/6218G06F2221/2141
Inventor 庞海
Owner SHENGDA ECONOMICS TRADE & MANAGEMENT COLLEGE OF ZZ
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products