A security authentication method for multi-server clusters applied to palm vein recognition

A server cluster and multi-server technology, applied in the field of computer network information security, can solve the problems of slow recognition speed, insufficient stability and reliability, etc., and achieve the effect of breaking through the application bottleneck

Active Publication Date: 2021-12-03
MELUX TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on the above background, the present invention provides a security authentication method applied to multi-server clusters of palm vein recognition, which solves the slow and unstable recognition speed of palm vein recognition technology in the face of large traffic and large concurrency in commercial application scenarios reliable question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security authentication method for multi-server clusters applied to palm vein recognition
  • A security authentication method for multi-server clusters applied to palm vein recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The technical solution of the present invention will be described in further detail below according to the drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the technical solutions of the present invention, and other embodiments obtained by those skilled in the art without creative efforts shall fall within the protection scope of the present invention.

[0020] refer to figure 1 Shown is a schematic diagram of a multi-server cluster network of the present invention, a security authentication method applied to a multi-server cluster for palm vein identification, and its network topology includes a master server cluster (MSC), a slave server cluster (SSC) and palm vein identification Terminal, its security authentication method comprises the following steps:

[0021] Step 1. The palm authentication task is assigned to the corresponding server cluster through a dynamic load balancing scheduling mechani...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security authentication method for a multi-server cluster applied to palm vein identification, which belongs to the technical field of computer network information security, and its network topology includes master server cluster (MSC), slave server cluster (SSC) and palm vein identification The terminal is started by the master server cluster MSC. When the slave server cluster SSC is deployed, the MSC assigns a key K to each SSC i , shared key K c and the cluster identity ID, which is S i . Decrypt the encrypted information packets between the master server cluster and the slave server cluster to complete mutual authentication and establish a mutual trust relationship. The technical solution provided by the present invention can realize ultra-high-speed comparison and identification of massive palm pulse data with high security and high reliability in the application scenario of large flow and large concurrent volume, and break through the application bottleneck of the development of palm pulse recognition technology.

Description

technical field [0001] The invention relates to the technical field of computer network information security, in particular to a security authentication method applied to a multi-server cluster for palm pulse identification. Background technique [0002] As a biometric identification technology with high security and high accuracy, palm vein recognition technology has been more and more popularized and applied. When the palm vein recognition technology is used for identity authentication, the palm vein recognition terminal obtains the user's palm vein information, calculates the feature vector through deep learning algorithm, and then encrypts it and sends it to the server for comparison, thereby authenticating the user's identity information. In the process of palm vein recognition technology shifting from the laboratory application environment to a wide range of commercial application scenarios, especially in large-traffic and high-concurrency application scenarios, the mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/44G06F9/50
CPCG06F21/445G06F9/5083G06V40/10G06V40/14G06V10/95
Inventor 余孟春谢清禄
Owner MELUX TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products