A Communication Method Based on Personal Information Database
A communication method and database technology, which can be applied in telephone communication, wireless communication, digital transmission system, etc., can solve the problem of single identification method of mobile communication users, and achieve the effect of high login security level and convenient use.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0032] Example: fingerprint identification plus password verification login:
[0033] The first step is to buy a new mobile phone and collect fingerprints through the identity information collection and identification device. The information control processor encrypts the fingerprints and uploads them to the personal information database through the communication module to associate and archive the personal information. This operation only needs to be done once. There is no need to associate the archive again in the future. Users with related archive information will search, compare and verify, and after matching user identity information, send the corresponding unique user communication account information back to the communication module; enter the initial password (set at the first use, and can be changed later) , the user confirms the personal information, and after the confirmation is consistent, the identity information is verified to be correct;
[0034] The second ste...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

