Computer network identity verification system

A computer network and identity verification technology, applied in the field of computer network identity verification systems, can solve problems such as the inability of the verification system to meet the needs, and achieve the effects of preventing illegal acts, high security, and convenient use.

Inactive Publication Date: 2020-04-17
广州华彩智云科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the prior art, computer network identity verification systems usually only need a verification code to enter the network system correctly, but when the security level of the network system is very high, ordinary verification systems cannot meet the needs, so it is urgent to invent a authentication system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer network identity verification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0018] refer to figure 1 , a computer network identity verification system proposed by the present invention, including a central processing system, an information collection module, a portrait camera module, a verification code input module, a computer network entry module and an alarm module;

[0019] The central processing system is equipped with an information check module and a verification code check module; the portrait camera module is connected to the information collection module by communication; the information collection module is connected to the information check module by communication;

[0020] The verification code input module is in communication connection with the verification code checking module; the portrait camera module, the computer network entry module and the alarm module are all in communication connection with the central processing system.

Embodiment 2

[0022] refer to figure 1 , a computer network identity verification system proposed by the present invention, including a central processing system, an information collection module, a portrait camera module, a verification code input module, a computer network entry module and an alarm module;

[0023] The central processing system is equipped with an information check module and a verification code check module; the portrait camera module is connected to the information collection module by communication; the information collection module is connected to the information check module by communication;

[0024] The verification code input module is in communication connection with the verification code checking module; the portrait camera module, the computer network entry module and the alarm module are all in communication connection with the central processing system.

[0025] The use of computer network authentication system includes the following steps:

[0026] S1, inpu...

Embodiment 3

[0032] refer to figure 1 , a computer network identity verification system proposed by the present invention, including a central processing system, an information collection module, a portrait camera module, a verification code input module, a computer network entry module and an alarm module;

[0033] The central processing system is equipped with an information check module and a verification code check module; the portrait camera module is connected to the information collection module by communication; the information collection module is connected to the information check module by communication;

[0034] The verification code input module is in communication connection with the verification code checking module; the portrait camera module, the computer network entry module and the alarm module are all in communication connection with the central processing system.

[0035] The use of computer network authentication system includes the following steps:

[0036] S1, inpu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer network identity verification system, and the system comprises a central processing system, an information acquisition module, a portrait camera module, a verification code input module, a computer network access module and an alarm module; an information checking module and a verification code checking module are arranged in the central processing system; the portrait camera module is in communication connection with the information acquisition module; the information acquisition module is in communication connection with the information checking module; theverification code input module is in communication connection with the verification code checking module; the portrait shooting module, the computer network access module and the alarm module are allin communication connection with the central processing system. According to the invention, the identity verification system carries out verification in sequence through the verification code information and the portrait collection information, effectively prevents illegal behaviors, is high in safety, is convenient to use, and is suitable for most amplitude departments and commercial departments.

Description

technical field [0001] The invention relates to the field of identity verification systems, in particular to a computer network identity verification system. Background technique [0002] In the prior art, computer network identity verification systems usually only need a verification code to enter the network system correctly, but when the security level of the network system is very high, ordinary verification systems cannot meet the needs, so it is urgent to invent a an authentication system. Contents of the invention [0003] In order to solve the technical problems in the background technology, the present invention proposes a computer network identity verification system, which performs verification sequentially through verification code information and portrait collection information respectively, effectively prevents illegal activities, and has high security. [0004] A computer network identity verification system proposed by the present invention includes a cent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/0861
Inventor 钟晓云王照峰魏华林
Owner 广州华彩智云科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products