Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for accessing server

A technology for accessing servers and servers, applied in the field of image processing, can solve problems such as identity verification information theft, information leakage, etc., and achieve the effect of preventing information leakage and improving security

Pending Publication Date: 2020-09-01
XIAN WANXIANG ELECTRONICS TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present disclosure provides a method and device for accessing a server, which can solve the problem that the data stored on the server will be obtained by the illegal user if the identity verification information is stolen by the illegal user, resulting in information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for accessing server
  • Method and device for accessing server
  • Method and device for accessing server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0097] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0098] figure 1 is a schematic structural diagram of a system for accessing servers provided by an embodiment of the present disclosure, such as figure 1 As shown, the system includes:

[0099] A terminal device 11 and a server 12, the terminal device 11 is connected to the server 12 in communication. The terminal device 11 may be a device such as a mobile phone, a tablet, a compute...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for accessing a server, relates to the technical field of image processing, and can solve the problem of information leakage caused by the fact that data stored in a server is acquired by an illegal user when identity verification information is stolen by the illegal user. According to the specific technical scheme, the method includes the steps of receiving targetidentity verification information sent by terminal equipment; if it is determined that the target identity verification information exists in an identity verification information list, sending a faceimage acquisition instruction to the terminal equipment; receiving first face feature data sent by the terminal equipment; and if it is determined that the user is an illegal user according to the first face feature data, sending a screen locking instruction to the terminal equipment, wherein the screen locking instruction is used for indicating the terminal equipment to lock a screen. The methodis used for improving the security of data stored in a server in the process of accessing the server by the user.

Description

technical field [0001] The present disclosure relates to the technical field of image processing, and in particular to a method and device for accessing a server. Background technique [0002] In the prior art, in order to prevent information leakage, the data is stored on the server, and the terminal device does not save any data. The user accesses the server through the terminal device to obtain the data stored in the server. When a user accesses a server through a terminal device, identity verification is usually required, that is, the user enters identity verification information on the terminal device for identity verification to determine whether the user is a legitimate user. After the identity verification is passed, the user is determined to be a legitimate user, and the user can access the server. For example, the user can obtain data from the server only after entering the correct user name and password on the terminal device. [0003] However, if the authentic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06K9/00
CPCG06F21/32G06V40/172
Inventor 江润生范志刚卢涛
Owner XIAN WANXIANG ELECTRONICS TECH CO LTD