Real-time user authentication method for security system

A real-time user and security system technology, applied in the field of identity identification and authentication, can solve problems such as inability to solve user experience well, and achieve the effect of solving user experience problems and ensuring security and confidentiality.

Inactive Publication Date: 2018-06-22
ZHEJIANG TECHAIN ELECTRONICS TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A large part of this problem is that if passwords or fingerprints are used for real-time uninterrupted authentication, the user experience problem cannot be solved well.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Real-time user authentication method for security system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0011] Such as figure 1 As shown, a security system real-time user authentication method provided by the present invention includes: a user authentication module, an authentication policy module and an APP control module. The user authentication module first obtains the relevant face or iris information of the user, compares it with the information preset in the device, and finally dynamically displays the comparison result on the module, and the person who passes the authentication can see the private What other people see is completely different information; the authentication strategy module is a module that can be customized flexibly, and is mainly responsible for what kind of authentication strategy each application in the security system should use. The main content of the authentication policy module is a configuration list of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a real-time user authentication method for a security system and belongs to the field of identity recognition authentication. The real-time user authentication method for the security system comprises a user authentication module, an authentication policy module and an APP control module. The user authentication module is realized by mainly adopting human face recognition oriris recognition, and is used for automatically finishing input and authentication processes of user information; the authentication policy module is mainly in charge of giving an opportunity of performing authentication in the security system according to an actual condition to the user authentication module; and the APP control module controls whether a current APP needs to exit or not according to a user authentication result, or performs certain special processing on the APP through the system. Based on the modules and the method, higher security control and privacy protection can be realized.

Description

technical field [0001] The invention relates to the field of identification and authentication, in particular to a real-time user authentication method for a security system. Background technique [0002] At present, the protection of the security system is basically user authentication at the entrance stage, and the user identity is not confirmed again after entering the privacy system after one authentication. In some smart devices, as long as the privacy system is entered through similar password or fingerprint recognition, real-time identity authentication will not be performed in the privacy system. In fact, this also has a certain risk of security and privacy leakage. For example, after entering the security system, if the mobile phone is taken by others, all security information will be exposed. A large part of the reason for this problem is that real-time uninterrupted authentication based on passwords or fingerprints cannot solve the user experience problem well. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06F21/32H04M1/725H04M1/67H04M1/72463
CPCH04M1/67G06F21/32G06F21/45H04M1/72463
Inventor 李帆
Owner ZHEJIANG TECHAIN ELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products