Electronic identity authentication method and authentication system

An electronic identity and identity authentication technology, applied in the field of identity authentication, can solve the problem that the access control system cannot guarantee the security of the shared office area, and achieve the effect of high reliability, rich means and strong flexibility

Inactive Publication Date: 2019-08-06
TERMINUSBEIJING TECH CO LTD
View PDF10 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problem that the traditional access control system cannot guarantee the security of the shared office area, the present invention innovatively provides an electronic identity authentication method and authentication system, which effectively solves the problems existing in the prior art through the double authentication method and the identity authentication system. problems, in order to allow the personnel in the shared office area to enter and avoid the malicious entry of impersonated personnel, so as to effectively improve the security of "shared office"

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic identity authentication method and authentication system
  • Electronic identity authentication method and authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] Such as figure 1 , 2As shown, this embodiment specifically discloses an electronic identity authentication method, which can be used to authenticate or verify the identity of a person entering a shared office area, thereby effectively avoiding problems such as maliciously entering the shared office area by pretending to be a person, and ensuring shared office space. The security of the office area fundamentally solves the security problem of "shared office" and makes the promotion and application of "shared office" possible; the method specifically includes the following steps.

[0050] Step 1, first judge whether there is a person in the preset area, and if there is, after the first preset time period, obtain the biometric information of the person in the preset area; this step includes the step of adjusting the brightness of the preset area, To obtain more accurate biological feature information; in this embodiment, the biological feature information is face informat...

Embodiment 2

[0057] This embodiment is based on the same inventive concept as Embodiment 1. This embodiment specifically discloses an electronic identity authentication system, which includes a feature acquisition device, an identity identification device, an authorization identification device, a monitoring center, and a database. The feature acquisition device and The identification device is connected, the identification device is connected to the monitoring center by wired or wireless communication, the authorized identification device is also connected to the monitoring center by wired or wireless communication, and the monitoring center is connected to the database; specifically as figure 2 shown.

[0058] The feature acquisition device is used to acquire the biometric information of the person in the preset area; in this embodiment, the feature acquisition device includes a dimming module, a camera module, a start module and a delay module; the biometric information is face informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an electronic identity authentication method and authentication system. The method comprises the steps: acquiring biological characteristic information of a person and identifying the biological characteristic information of the person to obtain the identity information of the person; reading and analyzing authorization information that is stored by an authorization deviceand is shown by the person to obtain electronic identity information; and matching the identity information of the person with the identity authentication information to obtain a first matching degree, matching the electronic identity information with the identity authentication information to obtain a second matching degree, and authenticating the identity of the person based on the first and second matching degrees. In addition, the system includes a feature acquiring device, an identity identifying device, an authorization identifying device, a monitoring center, and a database. According to the invention, the electronic identity authentication method and authentication system based on dual information acquisition are employed innovatively, so that the high security of the shared officearea is ensured and thus a problem that the impostor enters the shared office area maliciously is solved.

Description

technical field [0001] The invention relates to the technical field of identity authentication, and more specifically, the invention relates to an electronic identity authentication method and an authentication system. Background technique [0002] "Shared office" means that people who are engaged in different occupations or employed by different organizations work in the same place. It can also be called "joint office" or "flexible office". Occupancy and evacuation are very free, which can effectively reduce the waste of idle office resources. However, because "shared office" involves a variety of workers, security is the primary consideration of "shared office"; although the traditional access control system allows people with access cards to enter the shared office area, the access card It is used to store information. This kind of card is easy to be copied, and the communication data exchanged between the access control card and the access control system is also easy to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
CPCG07C9/32G07C9/37
Inventor 刘斌李杨
Owner TERMINUSBEIJING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products