Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A computer authentication device and system based on iris recognition

A technology for iris recognition and authentication devices, applied in the field of information security, to achieve a wide range of application prospects, solve hardware, and achieve the effect of safe and reliable mechanism

Inactive Publication Date: 2019-04-05
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While these technologies have their advantages, there are also significant disadvantages
For example, there is a risk that password unlocking can be easily cracked. Fingerprint recognition and face recognition are relatively safe, but they are not without loopholes. After all, certain technical means can be used to copy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A computer authentication device and system based on iris recognition
  • A computer authentication device and system based on iris recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Specific embodiments of the present invention will be described below in conjunction with the accompanying drawings.

[0021] like figure 1 A kind of computer authentication device based on iris recognition as shown, comprises computer, and described computer is provided with a plurality of USB2.0 interfaces, also comprises: special-purpose USBkey and iris recognition device; .0 interface connection, the dedicated USBkey is connected to another USB2.0 interface of the computer; the dedicated USBkey is used to store the private key and digital certificate of the computer user, and the user identity is authenticated through the built-in public key algorithm of the USB Key; the iris recognition device is used It is used to perform iris recognition on the user after the special USBkey authentication, and unlock the computer after the recognition is successful. Described iris recognition device is installed on the top of computer display screen, and iris recognition device ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a computer authentication device and system based on iris recognition. Data acquisition is carried out by using a CMOS lens module through an iris recognition device. analog-to-digital conversion is carried out through the MCU processing board; The iris recognition server side in the computer calls an algorithm tool upgraded based on discrete cosine transform for authentication and authorization, meanwhile, the iris recognition device is combined with the special USBKey for use, iris registration information is stored in the USBKey, and registration and identity authentication are also needed for login of the USBKey. And the double-insurance security mechanism reduces the risk of illegal login to the maximum extent.

Description

technical field [0001] The invention relates to the technical field of information security, and more specifically relates to a computer authentication device and system based on iris recognition. Background technique [0002] With the increasing popularity of Internet technology and the development of computer technology, people pay more and more attention to privacy. Research on computer information security is also increasing day by day. In the prior art, security authentication technologies such as password unlocking and fingerprint recognition have been developed and widely popularized. Although these technologies have their advantages, the disadvantages are also obvious. For example, there is a risk that password unlocking can be easily cracked. Fingerprint recognition and face recognition are relatively safe, but they are not without loopholes. After all, certain technical means can be used to copy them. [0003] Biometric technology is a technology for identificat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/34G06F21/33
CPCG06F21/32G06F21/33G06F21/34
Inventor 刘洋冯磊马双涛刘文颖
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products