Visitor identity authentication method, system, device, computer equipment and storage medium

A technology for identity authentication and ID number, which is applied in the fields of devices, computer equipment and storage media, systems, and visitor identity authentication methods, and can solve the problems of time-consuming, complicated opening procedures, and increased development and maintenance costs.

Pending Publication Date: 2020-08-18
CHINA SOUTHERN POWER GRID DIGITAL GRID RES INST CO LTD
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The disadvantage of traditional technology is that it greatly increases the cost of development and maintenance, and the data interaction between internal and external networks is complicated and time-consuming due to information security issues.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Visitor identity authentication method, system, device, computer equipment and storage medium
  • Visitor identity authentication method, system, device, computer equipment and storage medium
  • Visitor identity authentication method, system, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0082] figure 1 It is a schematic structural diagram of a visitor identity authentication system of an embodiment, including a client 10, an external network server 20, an information code identification device 30, and an internal network server 40. Interactive programs, for example, the client can be a WeChat applet, mobile APP, etc.; the client 10 can be connected to the external server 20 through the external network, and the information code identification device 30 can be a two-dimensional Code recognition equipment, barcode scanning gun, etc., the information code r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a visitor identity authentication system, a method, a device, computer equipment and a storage medium. The system comprises the following components: a client which acquires access information of a visitor and sends an access application carrying the access information to an external network server; an extranet server which acquires approval result information of the account of the internal user for the access application, and issues the approval result information to the visitor account of the visitor; a client which generates a target information code according to approval information which is issued by the extranet server and contains approval passing information; an information code identification device which identifies the target information code displayed bythe client and pushes the approval result information obtained through identification to an intranet server; and an intranet server which performs identity authentication on the visitor according tothe approval result information. By adopting the method, the problem of internal and external network information interaction can be solved, identity authentication of visitors is realized, and the cost of maintaining information security by enterprises is reduced.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a visitor identity authentication method, system, device, computer equipment and storage medium. Background technique [0002] As the emphasis on enterprise data security increases, it will choose to physically isolate the internal network from the external network to ensure the security of enterprise internal network data. In such a situation where the internal and external networks are physically isolated from each other, visitors need to submit their personal information to the enterprise management personnel to manually enter the internal management system before entering the enterprise before visiting the enterprise. Unable to log in to the internal management system to authorize visitors and reduce office efficiency. [0003] In order to solve this defect, in the prior art, through the development of a corresponding interactive platform, various business...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0442H04L63/0861H04L63/0876H04L63/10H04L67/55
Inventor 白振东陈强陈灏周幸郭晓斌林冬
Owner CHINA SOUTHERN POWER GRID DIGITAL GRID RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products