Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method and device based on power system, computer equipment and storage medium

An identity authentication and power system technology, applied in the power field, can solve problems such as low security and achieve the effect of high security

Pending Publication Date: 2022-01-04
SHENZHEN POWER SUPPLY BUREAU
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the identity authentication method in the power system of the prior art has the problem of low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device based on power system, computer equipment and storage medium
  • Identity authentication method and device based on power system, computer equipment and storage medium
  • Identity authentication method and device based on power system, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0069] The identity authentication method based on the power system provided by this application can be applied to such as figure 1 shown in the application environment. The application environment includes a server 1 and a terminal 2, wherein the terminal 2 is equipped with a camera 21, a display 22, and a voice input device 23. The server 1 communicates with the terminal 2 through the network. Terminal 2 collects identity authentication information through the configured camera, display, and voice input device, and sends the collected identity authentication informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity authentication method and device based on a power system, computer equipment and a storage medium. The method comprises the following steps: obtaining identity authentication information of a user, wherein the identity authentication information comprises physiological feature information and login equipment information of the user; judging whether the user is a target user or not according to the physiological feature information and standard physiological feature information of the user; if the user is the target user, judging whether login equipment of the user is target equipment or not according to the login equipment information to obtain a judgment result; and allocating operation permissions to the user according to the judgment result. By adopting the method, the identity authentication security of a power system can be improved.

Description

technical field [0001] The present application relates to the field of electric power technology, in particular to an identity authentication method, device, computer equipment and storage medium based on electric power system. Background technique [0002] With the continuous development of the power system, the power system puts forward higher requirements for data transmission and information security. Identity authentication is the premise to ensure the security of data and information, so it is very necessary to authenticate the operators in the power system. [0003] In the prior art, the identity authentication of the first user who logs into the power system is mainly performed through the login account and password, so as to assign the corresponding operation authority to the first user. For example, when the equipment in the power system needs to be routinely inspected or overhauled, the operator usually obtains the operation authority of the inspection or overhau...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/46G06Q50/06
CPCG06F21/32G06F21/46G06Q50/06
Inventor 吕启深张林向真余英薛荣阳浩张宏钊任佳
Owner SHENZHEN POWER SUPPLY BUREAU