Unlock instant, AI-driven research and patent intelligence for your innovation.

An identity authentication system, device and computer-readable storage medium

An identity authentication and device technology, applied in the electronic field, can solve problems such as inconvenience of use, easy guessing or brute force cracking of user passwords, etc.

Active Publication Date: 2021-06-25
SHENZHEN HEILS ZHONGCHENG TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 1) Simple user passwords are easy to guess or brute force; 2) When using multiple online services, users need to memorize a large number of different user IDs and user passwords. For example, in a modern enterprise, many IT systems are usually established inside, such as mail system, office automation system, human resources management system, financial system, etc. These systems are built at different times by different people and using different technologies. If employees need to memorize multiple user IDs and user passwords, it will cause problems inconvenient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity authentication system, device and computer-readable storage medium
  • An identity authentication system, device and computer-readable storage medium
  • An identity authentication system, device and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] figure 1 It is the first block diagram of the identity authentication system of the present invention. An identity authentication system, the system includes an open platform 10 and a system architecture 20, wherein:

[0055] The open platform 10 includes a peripheral layer 11, an access layer 12, a service layer 13 and a data layer 14, wherein,

[0056] The peripheral layer 11 is used to provide a software platform corresponding to the identity authentication requirement;

[0057] The access layer 12 is used to build a console, and is also used to support data collection requirements, device activation requirements, account management requirements, and application interface service requirements;

[0058] The service layer 13 is used to provide basic information corresponding to business requirements;

[0059] The data layer 14 is used to provide data storage, data encryption and data management related to business information and authentication information;

[0060...

Embodiment 2

[0083] Based on the above-mentioned embodiments, the present invention also proposes an identity authentication device, which includes a memory, a processor, and a computer program stored in the memory and operable on the processor, the computer program being controlled by the When the processor executes:

[0084] Provide a software platform corresponding to the identity authentication requirements;

[0085] Build a console, which is also used to support data collection requirements, device activation requirements, account management requirements, and application interface service requirements;

[0086] Provide basic information corresponding to business needs;

[0087] Provide data storage, data encryption and data management related to business information and authentication information;

[0088] providing an interactive interface, and receiving interactive operations acquired by the interactive interface;

[0089] Package business functions into corresponding services; ...

Embodiment 3

[0099]Based on the above embodiments, the present invention also proposes a computer-readable storage medium, where an identity authentication program is stored on the computer-readable storage medium, and when the identity authentication program is executed by a processor, it realizes:

[0100] Provide a software platform corresponding to the identity authentication requirements;

[0101] Build a console, which is also used to support data collection requirements, device activation requirements, account management requirements, and application interface service requirements;

[0102] Provide basic information corresponding to business needs;

[0103] Provide data storage, data encryption and data management related to business information and authentication information;

[0104] providing an interactive interface, and receiving interactive operations acquired by the interactive interface;

[0105] Package business functions into corresponding services;

[0106] Perform ari...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication system, equipment and computer-readable storage medium. The system includes an open platform and a system architecture, wherein the open platform includes a peripheral layer, an access layer, a service layer and a data layer. The system The architecture includes interaction layer, service layer and kernel layer. The invention realizes an identity authentication scheme with high security, quick response, stability and flexibility.

Description

technical field [0001] The present invention relates to the field of electronic technology, in particular to an identity authentication system, equipment and a computer-readable storage medium. Background technique [0002] In the existing field of identity authentication, identity recognition systems play an important role. Traditional identification systems require users to carry keys or key-like credentials and perform authentication operations. When it comes to authority control in multiple areas, due to the security issues of common credentials and the reproducibility of credentials, it is often necessary to carry multiple credentials. The traditional solution is to carry multiple keys, but it is very inconvenient. [0003] There are two existing solutions: [0004] One is the local identification method, such as using a fingerprint machine, which has high reliability and simple configuration, but it is unsanitary and requires user-contact operation. In addition, beca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31
Inventor 杨泽霖许少臻涂前彦
Owner SHENZHEN HEILS ZHONGCHENG TECH CO LTD