Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information processing method based on fingerprint attendance system and fingerprint attendance service system

An information processing method and fingerprint technology, applied in the information security field of a fingerprint attendance system, can solve the problems of insufficient basic feature quantity, difficulty in identifying the accuracy of risk and vulnerability categories to achieve the expected effect, etc., and achieve the effect of improving the accuracy.

Active Publication Date: 2022-07-01
苏州英博特力信息科技有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The premise of vulnerability repair is to identify its existing risk vulnerabilities. In related technologies, only the risk vulnerability field variables of abnormal monitoring activity data are analyzed. The basic feature quantity based on the analysis is slightly insufficient, which makes it difficult to achieve the accuracy of risk vulnerability category identification. expected result

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information processing method based on fingerprint attendance system and fingerprint attendance service system
  • Information processing method based on fingerprint attendance system and fingerprint attendance service system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of the embodiments. According to the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative work fall within the protection scope of the present application.

[0020] S102: Acquire the abnormal monitoring activity big data of the fingerprint attendance system, perform abnormal monitoring activity variable mining on the abnormal monitoring activity big data, and output the abnormal monitoring activity variable.

[0021] Among them, the abnormal monitoring activity big data refers to the abnormal monitoring activity data collection of the risk vulnerability information to be parsed, which is used to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an information processing method based on a fingerprint attendance system and a fingerprint attendance service system, and the method comprises the steps: carrying out the abnormal monitoring activity variable mining of abnormal monitoring activity big data, and outputting an abnormal monitoring activity variable; outputting each abnormal trajectory variable in the abnormal monitoring activity big data and a corresponding risk vulnerability positioning variable and a risk vulnerability field variable according to the abnormal monitoring activity variable, and outputting each risk vulnerability abnormal trajectory variable according to the risk vulnerability positioning variable and each abnormal trajectory variable, and performing connectivity aggregation on each risk vulnerability abnormal trajectory variable, and outputting risk vulnerability aggregation features in the abnormal monitoring activity big data, thereby performing comprehensive analysis of risk vulnerability categories by combining the aggregation dimension of the abnormal trajectory of the risk vulnerability and the risk vulnerability field dimension. Compared with a traditional scheme in which analysis is carried out only based on risk vulnerability field variables, the method can improve the accuracy of risk vulnerability category identification.

Description

technical field [0001] The present application relates to the technical field of information security of a fingerprint attendance system, in particular, to an information processing method based on a fingerprint attendance system and a fingerprint attendance service system. Background technique [0002] Fingerprint attendance system collects, analyzes and compares living fingerprints through special photoelectric conversion equipment and computer image processing technology, and can quickly and accurately identify personal identity. It consists of database server, application server, management computer, etc.) and fingerprint attendance system (or fingerprint reader + access control controller). The fingerprint attendance service system is used to provide online services to fingerprint attendance machines, such as remote distributed security monitoring services. With the development of network information technology, most fingerprint attendance systems have the ability to co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40G07C1/10G06K9/62
CPCH04L63/1416H04L63/1425H04L63/1433G07C1/10G06F18/241G06F18/214
Inventor 潘泱
Owner 苏州英博特力信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products