Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Security and protection method and system based on multiple biological recognition technology

A technology of biometric identification and security, which is applied in the field of security methods and systems based on multiple biometric identification technologies, which can solve the problems of insufficient intelligence and accuracy of security, and the inability to accurately follow the security level, etc., to achieve the effect of improving the security effect

Active Publication Date: 2022-07-05
江苏东方数码系统集成有限公司
View PDF16 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a security method and system based on multiple biometric identification technologies, which solves the problem of inability to intelligently adjust the security means for security authentication according to the security level in the prior art during the security process, which leads to insufficient security intelligence Accurate technical issues, to achieve the intelligent adjustment of the security control scheme for the corresponding location according to the security level, improve the security effect based on the combination of biometric features, and achieve the technical effect of accurate intelligent security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security and protection method and system based on multiple biological recognition technology
  • Security and protection method and system based on multiple biological recognition technology
  • Security and protection method and system based on multiple biological recognition technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] like figure 1 As shown, the present application provides a security method based on multiple biometric identification technologies, the method is applied to a security control system, and the method includes:

[0029] Step S100: obtaining current security level information, and obtaining a first security control scheme according to the security level information;

[0030] Step S200: Obtain the first authentication identification information of the first location, and match the first authentication user according to the first authentication identification information;

[0031] Specifically, the security control system is a system that performs overall security control, the security control system is connected to a plurality of security control devices in communication, and can perform security control of each security control device, and through the security control system, you can Real-time adjustment of the security level, according to the adjusted security level, upg...

Embodiment 2

[0086] Based on the same inventive concept as the security method based on multiple biometric identification technologies in the foregoing embodiment, the present invention also provides a security protection system based on multiple biometric identification technologies, such as Figure 5 As shown, the system includes:

[0087] a first obtaining unit 11, the first obtaining unit 11 is configured to obtain current security level information, and obtain a first security control scheme according to the security level information;

[0088] a second obtaining unit 12, the second obtaining unit 12 is configured to obtain the first authentication identification information of the first location, and match the first authentication user according to the first authentication identification information;

[0089] a third obtaining unit 13, the third obtaining unit 13 is configured to obtain the first permission level of the first authenticated user according to the first security control...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security and protection method and system based on a multiple biological recognition technology, and the method comprises the steps: obtaining the current security and protection grade information, and obtaining a first security and protection control scheme; matching a first authentication user according to the first authentication identification information; obtaining a first authority level of the first authenticated user according to the first security control scheme; obtaining position permission information of the first position according to the first security control scheme, and obtaining a first permission control level according to the position permission information; when the first permission level is matched with the first permission control level, performing control scheme matching of a control level combination scheme set according to the first permission control level to obtain a first security verification combination scheme; and security verification of the first authentication user is carried out based on the first security verification combination scheme. The technical problem that security and protection are not intelligent and accurate enough due to the fact that security and protection means cannot be intelligently adjusted to perform security and protection authentication accurately according to security and protection levels in the security and protection process in the prior art is solved.

Description

technical field [0001] The invention relates to the security related field, in particular to a security method and system based on multiple biometric identification technologies. Background technique [0002] Security refers to the process of loss prevention and crime prevention through access control and fire protection, entrance and exit control, monitoring and alarming, etc. In the process of security protection, it is possible to use the inherent physiological characteristics of people for identity authentication through the combination of biometric technology and the close combination of computers with optical, acoustic and biological sensors. [0003] However, in the process of realizing the technical solution of the invention in this application, it is found that the above-mentioned technology has at least the following technical problems: [0004] In the process of security protection in the prior art, there is a technical problem that the security protection cannot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06V40/70G07C9/37
CPCG07C9/37
Inventor 蔡旭李志浩李九林王高
Owner 江苏东方数码系统集成有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products