Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Novel highly integrated identity recognition and security verification control equipment

A technology of security equipment and security verification, which is applied in the field of new highly integrated identification and security verification control equipment, can solve the problems of improving equipment, waste, not suitable for display, etc., and achieve high security effects

Inactive Publication Date: 2018-09-25
周玉燕 +1
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. The shape of various modules is defined by the module manufacturer, so the equipment integrator has to rack their brains to arrange a large number of equipment in the limited internal space of the equipment, which will lead to two situations: either the volume of the equipment is very large Large size, difficult to deploy equipment; or unreasonable location of equipment modules, inconvenient for customers to use
If equipment manufacturers require module manufacturers to modify the module shape according to their own requirements, it will lead to a significant increase in cost
[0005] 2. Once a new type of security certification module appears on the market, or if you want to upgrade and install a security certification module on the old equipment, you will also face a series of problems such as space layout, wiring, and panel modification, which greatly reduces the cost of equipment manufacturers. business efficiency
[0006] 3. Various modules have their own hardware interface definitions and power supply requirements. If there are too many modules, special power boards and various interface control boards will be used in the equipment. At the same time, a large number of connecting wires will be generated, which will not only lead to This not only increases the cost of equipment manufacturing, but also greatly increases the maintenance cost of the equipment in the later period.
[0007] 4. Different modules need their own set of hardware and software control modes and appearance parts. These costs will be borne by equipment manufacturers and end users. In fact, many costs are overlapped or completely wasted.
[0008] 5. The power consumption of different modules is independently designed, and the superimposed power consumption is considerable. Once the module layout is unreasonable, it will lead to poor heat dissipation inside the device, and long-term operation will increase the failure rate of the device; if by increasing the power Fans are used to improve the internal heat dissipation capacity of the device, which will also lead to increased costs, increased overall power consumption, and disturbing noise from operation.
However, these sensitive information are not suitable for display on conventional vertical screens, and need to be displayed to customers through a more private horizontal second screen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Novel highly integrated identity recognition and security verification control equipment
  • Novel highly integrated identity recognition and security verification control equipment
  • Novel highly integrated identity recognition and security verification control equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0032] 1. Dynamic encrypted keyboard: LCD full-touch encrypted keyboard; characters including 0-9, a-z, A-Z, !@#$%&* and space can be input, including special function keys such as back, confirm, and cancel; The buttons can be used to switch between the numeric keyboard and the alphabetic character keyboard. When switching to the character keyboard, the upper and lower case can be switched through the shift key; both the numeric keyboard and the alphabetic keyboard are displayed in a dynamic manner to ensure the order of all inputable characters each time The positions on the screen and on the screen are random; after the password is entered, it will enter a special encryption chip for storage. In addition, you can choose not to dynamically display the password keyboard according to the application requirements.

[0033] 2. Password encrypted storage: load the master encryption key into the encryption chip in plain text; load the communication key into the encryption chip in c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

PropertyMeasurementUnit
Thicknessaaaaaaaaaa
Login to View More

Abstract

The invention relates to novel highly integrated identity recognition and security verification control equipment. Identity recognition, band card recognition, fingerprint recognition, face recognition, iris recognition, voiceprint recognition, gesture recognition, password verification and other safe verification means achieve effective integration, data security is guaranteed, and meanwhile thepurposes of minimizing the module size, saving the space and reducing purchase cost are achieved; simplification of an equipment interface is achieved, and the manufacturing and maintenance cost is lowered; green and energy-saving operation is achieved, and the equipment is environmentally friendly and affectionate to people; a high-definition touch screen is integrated, the personal privacy information display problem is solved, and a brand new human-computer interaction channel is additionally arranged. The security equipment can serve as a security certification module and can also serve asa terminal with the security certification management function, small number of peripherals only need to be additionally arranged, high-security industry application can be developed through the equipment, the product development efficiency is effectively improved, and the huge market substitution effect is played in various fields needing reliable identity recognition and security certification.

Description

technical field [0001] The invention belongs to the technical field of security control that requires personal identification and legality verification, relates to a highly integrated electronic device, and specifically relates to a fingerprint recognition, face recognition, iris recognition, voice recognition, ID card recognition, Social security card identification, bank card identification, two-dimensional code identification, dynamic password and other mainstream identification and security verification control functions in the market are integrated into a small box-packed electronic device. Background technique [0002] With the establishment of a credit society and the increasing popularity of the Internet economy, personal credit and privacy have also become the entrance of various businesses and transactions in the market. It is captured and monitored by various cameras at any time. In addition, in order to strengthen personal security verification, various new secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06F21/34G06F21/62G06F21/79G06F12/14
CPCG06F12/14G06F21/32G06F21/34G06F21/62G06F21/79Y02D10/00
Inventor 不公告发明人
Owner 周玉燕
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products