Computer network authentication system and method, computer program

An identity verification method and computer network technology, applied in the information field, can solve problems such as poor confidentiality, poor security, and loss

Inactive Publication Date: 2019-01-15
WENZHOU VOCATIONAL COLLEGE OF SCI & TECH
View PDF10 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] During the authentication process, the password will be exposed, and the password is easy to be peeped and stolen. Swiping the card for authentication and login will cause loss, forgetting, etc., and the security is poor
[0005] In the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer network authentication system and method, computer program
  • Computer network authentication system and method, computer program
  • Computer network authentication system and method, computer program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0211] In order to further understand the content, features and effects of the present invention, the following examples are given, and detailed descriptions are given below with reference to the accompanying drawings.

[0212] The structure of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0213] figure 1 , the computer network identity verification system provided by the embodiment of the present invention includes:

[0214] IP terminal;

[0215] The IP terminal includes a login unit and a registration unit, the registration unit includes a basic information interface and a verification module, and information read from the basic information interface successfully enters the verification module;

[0216] The verification module includes a face recognition interface, an iris upload interface, and a fingerprint entry interface;

[0217] The face recognition interface enters the eye iris upload interface, and the eye ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of information technology, the invention relates to a computer network authentication system and a computer program. The IP terminal of the computer network authentication system comprises a login unit and a registration unit. The registration unit comprises a basic information interface and an authentication module. The authentication module comprises a face recognition interface, an iris upload interface and a fingerprint input interface. The login unit comprises an identification module, wherein the identification module comprises a dynamic two-dimensionalcode interface, an authentication code verification interface and an iris verification interface; the dynamic two-dimensional code interface information is scanned to enter the verification code interface, and the verification code interface information enters the iris verification interface. The invention integrates real name authentication, face recognition authentication, eye iris authentication and fingerprint authentication to avoid leakage of personal identity and privacy information. Scanning two-dimensional code to improve the convenience of system login.

Description

technical field [0001] The invention belongs to the field of information technology, and in particular relates to a computer network identity verification system and method, and a computer program. Background technique [0002] At present, the account number (sometimes referred to as user name) and password are directly input and transmitted to the server through the user terminal, and the server compares the pre-stored account number and password to see if they are the same to determine the authenticity of the user's identity. This authentication method will expose the password during the authentication process, and the password is easy to be peeped and stolen, and the password is not easy to remember, and there will be confusion and failure to log in. In some places, authentication and login is performed by swiping the card, which may be lost or forgotten, and the security is poor. At the same time, these technologies will gradually be phased out. Failure to properly keep...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32G06F21/46G06K9/00H04L29/06
CPCH04L63/0861G06F21/32G06F21/46G06V40/197
Inventor 李余党许驰崔晓军
Owner WENZHOU VOCATIONAL COLLEGE OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products