Communication method based on personal information database
A communication method and database technology, which can be applied to telephone communication, wireless communication, security devices, etc., can solve the problem of single identification method of mobile communication users, and achieve the effect of high login security level and convenient use.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0032] Example: Fingerprint recognition plus password verification login:
[0033] The first step is to buy a new mobile phone, collect fingerprints through the identity information collection and identification device, and the information control processor encrypts the fingerprints and uploads the fingerprints to the personal information database through the communication module to associate and archive the personal information. This operation only needs one time. There is no need to associate the archive again later. Users with associated archived information will perform search and comparison verification. After matching the user’s identity information, the corresponding unique user communication account information will be returned to the communication module; input the initial password (set during the first use, and can be changed later) , The user confirms the personal information, and after the confirmation is consistent, the identity information is verified correctly;
[0...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

