Offline identity authentication system and device and computer readable storage medium

An identity authentication and computer program technology, applied in the electronic field, can solve problems such as inconvenient use, easy guessing or brute force cracking of user passwords

Active Publication Date: 2019-06-14
SHENZHEN HEILS ZHONGCHENG TECH CO LTD
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 1) Simple user passwords are easy to guess or brute force; 2) When using multiple online services, users need to memorize a large number of different user IDs and user passwords. For example, in a modern enterprise, many IT systems are usually established inside, such as mail syst

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Offline identity authentication system and device and computer readable storage medium
  • Offline identity authentication system and device and computer readable storage medium
  • Offline identity authentication system and device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] figure 1 is the first block diagram of the offline identity authentication system of the present invention. An offline identity authentication system, the system includes an interaction layer 10, a service layer 20 and a kernel layer 30, wherein:

[0040] The interactive layer 10 is used to provide an interactive interface, and receive interactive operations acquired by the interactive interface;

[0041] The service layer 20 is used to package business functions into corresponding services, wherein the business functions include preloading the feature data set of the admitted personnel locally, performing feature extraction and feature comparison operations in real time in an offline state, and at the same time , performing a verification and identification operation on the target object in the offline state;

[0042] The kernel layer 30 is used to perform operations and logical task processing.

[0043] Optionally, the system further includes a personnel management...

Embodiment 2

[0069] Based on the above embodiments, the present invention also proposes an offline identity authentication device, which includes a memory, a processor, and a computer program stored in the memory and operable on the processor, the computer program being executed by the When the processor executes, it achieves:

[0070] The interactive layer is used to provide an interactive interface, and receive interactive operations acquired by the interactive interface;

[0071] The service layer is used to package business functions into corresponding services, wherein the business functions include preloading the feature data set of the admitted personnel locally, performing feature extraction and feature comparison operations in real time in an offline state, and at the same time, performing a verification and identification operation on the target object in the offline state;

[0072] The kernel layer is used to perform calculation and logic task processing.

[0073] Optionally, ...

Embodiment 3

[0080] Based on the above-mentioned embodiments, the present invention also proposes a computer-readable storage medium, on which an identity authentication program is stored, and when the identity authentication program is executed by a processor, it realizes:

[0081] The interactive layer is used to provide an interactive interface, and receive interactive operations acquired by the interactive interface;

[0082] The service layer is used to package business functions into corresponding services, wherein the business functions include preloading the feature data set of the admitted personnel locally, performing feature extraction and feature comparison operations in real time in an offline state, and at the same time, performing a verification and identification operation on the target object in the offline state;

[0083] The kernel layer is used to perform calculation and logic task processing.

[0084]It can be understood that the computer-readable storage medium propo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an offline identity authentication system and device and a computer readable storage medium. The system comprises an interaction layer, a service layer and a kernel layer, wherein the interaction layer is used for providing an interaction interface and receiving an interaction operation obtained by the interaction interface; the service layer is used for packaging businessfunctions into corresponding services, and the business functions comprise locally preloading a feature data set of admission personnel, performing feature extraction and feature comparison operationin real time in an offline state, and performing verification and identification operation on a target object in the offline state, and the kernel layer is used for executing operation and logic taskprocessing. According to the scheme, an identity authentication scheme with high security, quick response, stability and flexibility is realized.

Description

technical field [0001] The present invention relates to the field of electronic technology, in particular to an offline identity authentication system, equipment and computer-readable storage medium. Background technique [0002] In the existing field of identity authentication, identity recognition systems play an important role. Traditional identification systems require users to carry keys or key-like credentials and perform authentication operations. When it comes to authority control in multiple areas, due to the security issues of common credentials and the reproducibility of credentials, it is often necessary to carry multiple credentials. The traditional solution is to carry multiple keys, but it is very inconvenient. [0003] There are two existing solutions: [0004] One is the local identification method, such as using a fingerprint machine, which has high reliability and simple configuration, but it is unsanitary and requires user-contact operation. In addition...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F21/45
Inventor 杨泽霖涂前彦杨坚
Owner SHENZHEN HEILS ZHONGCHENG TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products