CN109885993A - A kind of identity authorization system, equipment and computer readable storage medium - Google Patents
A kind of identity authorization system, equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN109885993A CN109885993A CN201910014797.3A CN201910014797A CN109885993A CN 109885993 A CN109885993 A CN 109885993A CN 201910014797 A CN201910014797 A CN 201910014797A CN 109885993 A CN109885993 A CN 109885993A
- Authority
- CN
- China
- Prior art keywords
- demand
- authentication
- information
- identity
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a kind of identity authorization system, equipment and computer readable storage mediums, the system includes open platform and system architecture, wherein, the open platform includes perisphere, access layer, service layer and data Layer, and the system architecture includes alternation of bed, service layer and inner nuclear layer.The present invention realizes the highly-safe, response quickly of one kind and stablizes flexible identity authentication scheme.
Description
Technical field
The present invention relates to electronic technology field more particularly to a kind of identity authorization systems, equipment and computer-readable storage
Medium.
Background technique
In existing field of identity authentication, identification system plays key player.Traditional identifying system needs
User's carrying keys or class key voucher simultaneously carry out authentication operation.When the permission for being related to multiple regions controls, due to logical
With the safety issue of the reproducibility of voucher and voucher, generally require to carry multiple vouchers, traditional solution is to take
With more keys, but it is very inconvenient.
There are two types of existing solutions:
One is local identification methods, and for example, by using fingerprint machine, high reliablity, configuration is simple, but there are unhygienic, need
The problem of wanting user's contact to operate, in addition, since the framework of its design does not consider the interconnection between machine, it carries out
When data inputting, efficiency is very low, needs to carry out typing one by one, and visualization is low, in addition, the biography that fingerprint machine is similar
Local authentication tool of uniting has inflexible, inconvenient to use, the high puzzlement of learning cost.
Another kind is the mode of on-line authentication, is directed to the authentication of the network user at present, is all mainly user password
Authentication mode, process include: 1) user registered on the server of online service in advance, by server by user identifier, use
Family password or its Hash (Hash) value are associated, and are saved;2) user needs to input user's mark before using online service
The information such as knowledge, user password carry out login authentication;3) information that server is submitted according to user, with the information that saves when registration into
Row verification.
But the authentication mode based on user password, there are the following problems:
1) ease of user password is easy to be hypothesized or Brute Force;2) when using multiple online services, user needs to remember
Recall a large amount of different user identifiers and user password, such as in a modern enterprise, inside typically set up many IT systems,
Such as mailing system, the office automation system, Human Resource Management System, financial system, these systems be all different times,
It is constructed by different people, using different technologies, if employee needs to remember multiple user identifiers and user password, can bring and use
It is inconvenient.
Summary of the invention
In order to solve above-mentioned technological deficiency in the prior art, the invention proposes a kind of identity authorization system, the systems
Including open platform and system architecture, in which:
The open platform includes perisphere, access layer, service layer and data Layer, wherein
The perisphere is for providing software platform corresponding with the authentication demand;
The access layer for constructing console is also used to that data is supported to acquire demand, device activation demand, account management
Demand and application interface services demand;
The service layer is for providing basic information corresponding with business demand;
The data Layer is for providing data storage relevant to business information and authentication information, data encryption and number
According to management;
The system architecture includes alternation of bed, service layer and inner nuclear layer, wherein
The alternation of bed is for providing interactive interface, and the interactive operation that reception is obtained by the interactive interface;
The service layer is used to business function being packaged as corresponding service;
The inner nuclear layer is for executing operation and logic task processing.
Optionally, the system architecture further includes personal management module, system management module and identification record management mould
Block.
Optionally, the personal management module is used to by way of batch importing or live typing believe authentication
The identity information in breath data bottom library executes increase, deletion, modification and inquiry operation.
Optionally, the system management module is for executing system log access, the distribution of SUB ADMINISTRATOR's account and equipment
Information change operation.
Optionally, the identification record management module is used to execute the identity information authentication result screening, deletes and grasp
Make, is also used to be arranged the self-cleaning condition of the identity information.
The invention also provides a kind of ID authentication device, which includes memory, processor and is stored in described deposit
It is real when the computer program is executed by the processor on reservoir and the computer program that can run on the processor
It is existing:
Software platform corresponding with the authentication demand is provided;
Console is constructed, is also used to that data acquisition demand, device activation demand, account management demand and application is supported to connect
Mouth demand for services;
Basic information corresponding with business demand is provided;
Data storage relevant to business information and authentication information, data encryption and data management are provided;
Interactive interface is provided, and receives the interactive operation obtained by the interactive interface;
Business function is packaged as corresponding service;
Execute operation and logic task processing.
Optionally, it is realized when the computer program is executed by the processor:
Increasing is executed to the identity information in authentication information data bottom library by way of batch importing or live typing
Add, delete, modifying and inquiry operation.
Optionally, it is realized when the computer program is executed by the processor:
Execute system log access, the distribution of SUB ADMINISTRATOR's account and facility information change operation.
Optionally, it is realized when the computer program is executed by the processor:
Screening, delete operation are executed to the identity information authentication result, and, the self-cleaning of the identity information is set
Condition.
The invention also provides a kind of computer readable storage medium, body is stored on the computer readable storage medium
Part authentication procedure, realization when the authentication program is executed by processor:
Software platform corresponding with the authentication demand is provided;
Console is constructed, is also used to that data acquisition demand, device activation demand, account management demand and application is supported to connect
Mouth demand for services;
Basic information corresponding with business demand is provided;
Data storage relevant to business information and authentication information, data encryption and data management are provided;
Interactive interface is provided, and receives the interactive operation obtained by the interactive interface;
Business function is packaged as corresponding service;
Execute operation and logic task processing.
Implement identity authorization system of the invention, equipment and computer readable storage medium, which includes open platform
And system architecture, wherein the open platform includes perisphere, access layer, service layer and data Layer, the system architecture
Including alternation of bed, service layer and inner nuclear layer.It realizes the highly-safe, response quickly of one kind and stablizes flexible authentication
Scheme.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
Fig. 1 is the first block diagram of identity authorization system of the present invention;
Fig. 2 is the second block diagram of identity authorization system of the present invention;
Fig. 3 is the third block diagram of identity authorization system of the present invention;
Fig. 4 is the 4th block diagram of identity authorization system of the present invention;
Fig. 5 is the 5th block diagram of identity authorization system of the present invention.
Specific embodiment
It should be appreciated that described herein, specific examples are only used to explain the present invention, is not intended to limit the present invention.
In subsequent description, it is only using the suffix for indicating such as " module ", " component " or " unit " of element
Be conducive to explanation of the invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix
Ground uses.
Embodiment one
Fig. 1 is the first block diagram of identity authorization system of the present invention.A kind of identity authorization system, the system include open platform
10 and system architecture 20, in which:
The open platform 10 includes perisphere 11, access layer 12, service layer 13 and data Layer 14, wherein
The perisphere 11 is for providing software platform corresponding with the authentication demand;
The access layer 12 for constructing console is also used to that data is supported to acquire demand, device activation demand, account pipe
Reason demand and application interface services demand;
The service layer 13 is for providing basic information corresponding with business demand;
The data Layer 14 stores for providing relevant to business information and authentication information data, data encryption and
Data management;
The system architecture 20 includes alternation of bed 21, service layer 22 and inner nuclear layer 23, wherein
The alternation of bed 21 is for providing interactive interface, and the interactive operation that reception is obtained by the interactive interface;
The service layer 22 is used to business function being packaged as corresponding service;
The inner nuclear layer 23 is for executing operation and logic task processing.
It optionally, is the second block diagram of identity authorization system of the present invention as shown in Figure 2, the system architecture 20 further includes people
Member's management module, system management module and identification record management module.
Optionally, the personal management module is used to by way of batch importing or live typing believe authentication
The identity information in breath data bottom library executes increase, deletion, modification and inquiry operation.
Optionally, the system management module is for executing system log access, the distribution of SUB ADMINISTRATOR's account and equipment
Information change operation.
Optionally, the identification record management module is also used to for executing screening, delete operation to the identity information
The self-cleaning condition of the identity information is set.
Specifically, being the third block diagram of identity authorization system of the present invention, open platform as shown in Figure 3 in the present embodiment
10 points are perisphere 11, access layer 12, service layer 13 and data Layer 14.In perisphere 11, this programme, which provides identity for user, to be recognized
Application program required for card identifies or application development external member, user can be by application programs or based on application development set
In the software installation and specific hardware device of part exploitation, to complete the acquisition of identity information and compare certification.This programme simultaneously
Application programming interfaces are provided and do system function call or system docking for user in need.It constructs and controls in 12 this programme of access layer
Platform processed, the business demands such as support data acquisition, device activation, enterprise account management and enterprise application interface service.It is taking
Business layer 13, this programme provide richer professional ability based on every basic information that open platform provides.In data Layer 14, originally
Scheme provides data storage, encryption and management service with the information for authentication for every business event information.
It specifically in the present embodiment, is the 4th block diagram of identity authorization system of the present invention as shown in Figure 4, this programme is
System framework is divided into interaction, service, three layers of kernel, and successively deeply, user can use application programming interfaces directly facing alternation of bed 21
Call service layer function.Inner nuclear layer 23 is responsible for executing specific every operation and types of functionality is packaged by logic, service layer 22
For certain one kind service, alternation of bed is then for users to use.
Specifically, in the present embodiment, for user, there are mainly two types of usage modes for system: interface alternation and applying journey
Sequence interactive interfacing, user can realize personal management, system administration, identification record management three zones module by both modes
Use.For interface alternation, user directly operates in terminal.For application programming interfaces interaction, user can be voluntarily right
The local systems such as internal OA are connect, it, can be square with the various network transmission protocols using application programming interfaces operating system and interaction data
Just the docking of carry out operation flow.Such as: user can realize the working attendance function of local multiple terminals according to identification record, tool
Only the personnel identity identification record of the terminal of local runtime need to be read and be summarized by application programming interfaces for body, then root
Range of checking card is determined according to the union of user identity, finally takes intersection that can give birth to identification record and the user identity checked card in range
At the situation of checking card of each user identity.
Specifically, in the present embodiment, being the 5th block diagram of identity authorization system of the present invention as shown in Figure 5, being stepped in terminal
After recording administrator's account, the administrator after logging in operates the administration page.For personal management, user login management person's account,
Into personal management module, can be imported batch or live typing by way of to the ID in the library of identity information data bottom into
Row additions and deletions change look into Deng data manipulations.For identification record, user can carry out the function that screening is checked and deleted, can self-setting mistake
The mechanism that phase clears up automatically.For system administration, system log can be easily checked, distribute SUB ADMINISTRATOR's account, change equipment
Information etc..
Specifically, in the present embodiment, the combination authentication of terminal can pass through the mode of IC/ID card, identity card, face
And its logical combination (with or wait logical combinations) carry out, for IC/ID card and identity card, the information for mainly reading card is same
Information comparison in the library of identification authentication data bottom carrys out authenticating identity, carries out living body by camera detection face for face authentication
Verifying obtains human face data if it is living body, by the model of deep learning, extracts face characteristic, is existed using nearest neighbor algorithm
Information is matched in database.By taking IC/ID card+identity card+face authentication simultaneously certification mode as an example, content is specifically compared
Are as follows: personnel to be certified brush IC/ID card and identity card within the scope of terminal camera, system to IC/ID card number and identification card number into
Row precise alignment generates high dimensional feature vector, same authentication to the human face photo for having passed through In vivo detection that real-time capture arrives
In the library of data bottom prestore vector group carry out threshold value comparison (i.e. in the library of bottom the face feature vector of certain ID with real-time face feature to
The K distance of amount thinks to compare successfully when being less than systemic presupposition threshold value), three comparisons can look in the library of identification authentication data bottom
To corresponding ID, and finding is the same ID, then certification is logical, other situations then prompt, denied access, access etc. after please registering
Interaction, subsequent interface return the standby page.
Optionally, in the present embodiment, different from the offline identity authorization system of fingerprint class, this system can import face photograph
The voucher of piece, IC/ID card number and identification card number as authentication, user can be real after having named photo according to system format requirement
An existing key imports, and the ID of each importing has the additional informations such as authentication information and name, and user can be in local device after importing
The logical relation of interior three kinds of authentication modes of flexible configuration, such as: needing face and IC/ID card while authenticating, need face or body
Part card one way in which certification needs face and IC/ID card while authenticating or identity card individually authenticates, etc. and logically to match
It sets.In actual use, the personnel for having been introduced into information identify identity according to the authentication logic set, such as enable face and
IC/ID card authenticates simultaneously, and user brushes IC/ID card before equipment camera lens, and equipment collects current face information and reads IC/ID letter
Breath, system by comparing IC/ID card and face characteristic whether in authenticating library, and compare IC/ID card and face information whether
With (preventing IC/ID card from falsely using), authentication is completed after comparing successfully.
Optionally, in the present embodiment, different from the online identity Verification System of the texts class such as digital alphabet, this system is logical
Various entity physics releases (IC card, ID card and identity card) and biological information (face) certification are crossed, are carried out on entity device
Authentication.The security level of authentication information is improved, the property broken through of certification foundation is reduced.
Optionally, in the present embodiment, the conventional face of face characteristic comparison is carried out by operation platform different from terminal
Identify identity authorization system framework, this system independently disposes in each terminal and exclusively carried out miniaturization and speed-optimization
Recognition of face deep learning algorithm and vivo identification algorithm, the information that each identification terminal can be imported according to user generate identity
Information data bottom library, so that terminal eliminates the reliance on cloud and calculated, each terminal has identification and a checking feature, therefore
In the case where without networking, terminal also can normally identify the personnel for needing to carry out identity information certification and carry out database comparison,
Realize the authentication of typing personnel.For single terminal, the entry that can be provided according to user when importing personnel is generated
The corresponding face high dimensional feature vector of each ID, IC/ID card number, identification card number and other additional informations, so that they are same
It is corresponded under one ID, these ID combine to form identity information data bottom library.During carrying out authentication, if
The standby photo that IC/ID card number, reading identity card number and identity card storage inside can be read according to user-defined logic, capture mirror
Facial image before head simultaneously calculates the high dimensional feature vector of real-time face image, is then carried according to these contents, this system
Quick retrieval is compared one by one with each ID in the library of identity information data bottom, checks the correspondence of information and correct
Property, finally carry out authentication.
Optionally, the terminal hardware of this system is based on X86 or ARM platform, through terminal RGB camera and other sensors into
After row information acquisition, is directly handled in real time by X86 the or ARM platform arithmetic element of terminal in local host, extracts information characteristics
(without transmitting raw information to cloud, it is only necessary to upload authentication result, be conducive to the personal secrets for protecting user), by this
Access personnel characteristics' data set that ground is preloaded into realizes that real-time characteristic is extracted, compared, in the case where not uploading personnel's human face data state
Realize verifying, the identification to specific people.
Optionally, this system provides standard to enterprise and developer by building authentication open platform, this system
The api interface of change, facilitate its carry out with own service system dock and exploitation, it can be achieved that enterprise account registration, service configuration,
Functions, the open platforms such as personnel's registration, personnel's reading, identification record, video flowing real time inspection can be in public clouds and private clound portion
Administration, this system can be attached calling by multiple network agreement.Identity information registration, for mostly multiple identification certifications
Terminal is as authentication determination foundation, thus unified identity authentication mechanism of the building in a system.
It is understood that this system has the following beneficial effects:
1. highly-safe: passing through various entity physics releases (IC card, ID card and identity card) and biological information (face)
Certification, carries out authentication on entity device, and the security level of certification, drop are improved from certification scene and authentication information source
The property broken through of low certification foundation;
2. response quickly: local terminal completely disengages the dependence for calculating cloud power, and scheduling and verification process do not need cloud
It participates in, IC/ID, identity card are read, and face alignment, In vivo detection function all runs at local, effectively saves communication and peace
The time changed entirely, speed are not influenced by network quality, are responded at any time;
3. stablizing flexible: since open platform itself function is more complete, and providing simple and safe access mode.User
Only need access platform that can obtain stable authentication ability.Meanwhile system is supported sufficiently to define authentication logic process, it is right
Personalized certification scene sufficiently adapts to, and the management such as personnel equipment are intuitively simple, uses flexible and convenient.
Embodiment two
Based on the above embodiment, the invention also provides a kind of ID authentication device, which includes memory, processor
And it is stored in the computer program that can be run on the memory and on the processor, the computer program is by the place
Reason device is realized when executing:
Software platform corresponding with the authentication demand is provided;
Console is constructed, is also used to that data acquisition demand, device activation demand, account management demand and application is supported to connect
Mouth demand for services;
Basic information corresponding with business demand is provided;
Data storage relevant to business information and authentication information, data encryption and data management are provided;
Interactive interface is provided, and receives the interactive operation obtained by the interactive interface;
Business function is packaged as corresponding service;
Execute operation and logic task processing.
Optionally, it is realized when the computer program is executed by the processor:
Increasing is executed to the identity information in authentication information data bottom library by way of batch importing or live typing
Add, delete, modifying and inquiry operation.
Optionally, it is realized when the computer program is executed by the processor:
Execute system log access, the distribution of SUB ADMINISTRATOR's account and facility information change operation.
Optionally, it is realized when the computer program is executed by the processor:
Screening, delete operation are executed to the identity information authentication result, and, the self-cleaning of the identity information is set
Condition.
It is understood that ID authentication device proposed by the invention is to apply on the basis of the above embodiment 1
The entity device arrived, the entity device can be realized the correlation function of the identity authorization system of above-described embodiment one and reach phase
The beneficial effect of pass.
Embodiment three
Based on the above embodiment, described computer-readable to deposit the invention also provides a kind of computer readable storage medium
Authentication program is stored on storage media, realization when the authentication program is executed by processor:
Software platform corresponding with the authentication demand is provided;
Console is constructed, is also used to that data acquisition demand, device activation demand, account management demand and application is supported to connect
Mouth demand for services;
Basic information corresponding with business demand is provided;
Data storage relevant to business information and authentication information, data encryption and data management are provided;
Interactive interface is provided, and receives the interactive operation obtained by the interactive interface;
Business function is packaged as corresponding service;
Execute operation and logic task processing.
It is understood that computer readable storage medium proposed by the invention is in above-described embodiment one and above-mentioned
The storage medium run on the basis of embodiment two, the computer program which is stored can be realized above-described embodiment
The correlation function of one identity authorization system and reach relevant beneficial effect.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form, all of these belong to the protection of the present invention.
Claims (10)
1. a kind of identity authorization system, which is characterized in that the system comprises open platform and system architectures, in which:
The open platform includes perisphere, access layer, service layer and data Layer, wherein
The perisphere is for providing software platform corresponding with the authentication demand;
The access layer for constructing console is also used to that data is supported to acquire demand, device activation demand, account management demand
And application interface services demand;
The service layer is for providing basic information corresponding with business demand;
The data Layer is for providing data storage relevant to business information and authentication information, data encryption and data pipe
Reason;
The system architecture includes alternation of bed, service layer and inner nuclear layer, wherein
The alternation of bed is for providing interactive interface, and the interactive operation that reception is obtained by the interactive interface;
The service layer is used to business function being packaged as corresponding service;
The inner nuclear layer is for executing operation and logic task processing.
2. identity authorization system according to claim 1, which is characterized in that the system architecture further includes personal management mould
Block, system management module and identification record management module.
3. identity authorization system according to claim 2, which is characterized in that the personal management module is for passing through batch
Import or the mode of live typing increase, deletion are executed to the identity information in authentication information data bottom library, modify and
Inquiry operation.
4. identity authorization system according to claim 3, which is characterized in that the system management module is for executing system
Log access, the distribution of SUB ADMINISTRATOR's account and facility information change operation.
5. identity authorization system according to claim 4, which is characterized in that the identification record management module is used for institute
It states identity information authentication result and executes screening, delete operation, be also used to be arranged the self-cleaning condition of the identity information.
6. a kind of ID authentication device, which is characterized in that the equipment includes memory, processor and is stored in the memory
Computer program that is upper and can running on the processor, the computer program are realized when being executed by the processor:
Software platform corresponding with the authentication demand is provided;
Console is constructed, is also used to support data acquisition demand, device activation demand, account management demand and application interface clothes
Business demand;
Basic information corresponding with business demand is provided;
Data storage relevant to business information and authentication information, data encryption and data management are provided;
Interactive interface is provided, and receives the interactive operation obtained by the interactive interface;
Business function is packaged as corresponding service;
Execute operation and logic task processing.
7. ID authentication device according to claim 6, which is characterized in that the computer program is held by the processor
Row Shi Shixian:
Increase is executed to the identity information in authentication information data bottom library by way of batch importing or live typing, is deleted
It removes, modify and inquiry operation.
8. identity identifying method according to claim 7, which is characterized in that the computer program is held by the processor
Row Shi Shixian:
Execute system log access, the distribution of SUB ADMINISTRATOR's account and facility information change operation.
9. identity identifying method according to claim 8, which is characterized in that the computer program is held by the processor
Row Shi Shixian:
Screening, delete operation are executed to the identity information authentication result, and, the self-cleaning item of the identity information is set
Part.
10. a kind of computer readable storage medium, which is characterized in that be stored with identity on the computer readable storage medium and recognize
Program is demonstrate,proved, realization when the authentication program is executed by processor:
Software platform corresponding with the authentication demand is provided;
Console is constructed, is also used to support data acquisition demand, device activation demand, account management demand and application interface clothes
Business demand;
Basic information corresponding with business demand is provided;
Data storage relevant to business information and authentication information, data encryption and data management are provided;
Interactive interface is provided, and receives the interactive operation obtained by the interactive interface;
Business function is packaged as corresponding service;
Execute operation and logic task processing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910014797.3A CN109885993B (en) | 2019-01-08 | 2019-01-08 | Identity authentication system, equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910014797.3A CN109885993B (en) | 2019-01-08 | 2019-01-08 | Identity authentication system, equipment and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109885993A true CN109885993A (en) | 2019-06-14 |
CN109885993B CN109885993B (en) | 2021-06-25 |
Family
ID=66925727
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910014797.3A Active CN109885993B (en) | 2019-01-08 | 2019-01-08 | Identity authentication system, equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109885993B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116542827A (en) * | 2023-06-20 | 2023-08-04 | 上海天方夜谭网络科技有限公司 | Road transportation enterprise safety training background management system and method |
CN116862117A (en) * | 2023-09-05 | 2023-10-10 | 深圳市银通商智能卡有限公司 | ID card management system and method based on induction type |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130219472A1 (en) * | 2012-02-17 | 2013-08-22 | Qsan Technology, Inc. | Authentication system, authentication method, and network storage appliance |
US20140007185A1 (en) * | 2012-06-29 | 2014-01-02 | Apple Inc. | Automatic Association of Authentication Credentials with Biometrics |
CN104765998A (en) * | 2015-04-16 | 2015-07-08 | 国家电网公司 | User identity reliably-verifying system based on face identification and using method thereof |
CN105117851A (en) * | 2015-08-31 | 2015-12-02 | 盛世铸成科技(天津)有限公司 | NFC based smart travel system |
CN105631292A (en) * | 2015-12-24 | 2016-06-01 | 南京通弘联电子科技有限公司 | Identity authentication and financial payment all-in-one machine terminal |
CN105786494A (en) * | 2016-02-24 | 2016-07-20 | 中国航空工业集团公司沈阳飞机设计研究所 | Software configuration information data management system |
CN105869248A (en) * | 2016-04-29 | 2016-08-17 | 成都千帆科技开发有限公司 | Access control cloud management system and method based on face recognition |
CN107786379A (en) * | 2017-11-15 | 2018-03-09 | 四川省龙逸凤集网络科技有限公司 | A kind of layering cloud management platform based on micro services framework |
CN108053530A (en) * | 2017-12-17 | 2018-05-18 | 深圳禾思众成科技有限公司 | A kind of intelligent access control system of the Yun Jiaduan based on face recognition |
-
2019
- 2019-01-08 CN CN201910014797.3A patent/CN109885993B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130219472A1 (en) * | 2012-02-17 | 2013-08-22 | Qsan Technology, Inc. | Authentication system, authentication method, and network storage appliance |
US20140007185A1 (en) * | 2012-06-29 | 2014-01-02 | Apple Inc. | Automatic Association of Authentication Credentials with Biometrics |
CN104765998A (en) * | 2015-04-16 | 2015-07-08 | 国家电网公司 | User identity reliably-verifying system based on face identification and using method thereof |
CN105117851A (en) * | 2015-08-31 | 2015-12-02 | 盛世铸成科技(天津)有限公司 | NFC based smart travel system |
CN105631292A (en) * | 2015-12-24 | 2016-06-01 | 南京通弘联电子科技有限公司 | Identity authentication and financial payment all-in-one machine terminal |
CN105786494A (en) * | 2016-02-24 | 2016-07-20 | 中国航空工业集团公司沈阳飞机设计研究所 | Software configuration information data management system |
CN105869248A (en) * | 2016-04-29 | 2016-08-17 | 成都千帆科技开发有限公司 | Access control cloud management system and method based on face recognition |
CN107786379A (en) * | 2017-11-15 | 2018-03-09 | 四川省龙逸凤集网络科技有限公司 | A kind of layering cloud management platform based on micro services framework |
CN108053530A (en) * | 2017-12-17 | 2018-05-18 | 深圳禾思众成科技有限公司 | A kind of intelligent access control system of the Yun Jiaduan based on face recognition |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116542827A (en) * | 2023-06-20 | 2023-08-04 | 上海天方夜谭网络科技有限公司 | Road transportation enterprise safety training background management system and method |
CN116862117A (en) * | 2023-09-05 | 2023-10-10 | 深圳市银通商智能卡有限公司 | ID card management system and method based on induction type |
CN116862117B (en) * | 2023-09-05 | 2023-12-19 | 深圳市银通商智能卡有限公司 | ID card management system and method based on induction type |
Also Published As
Publication number | Publication date |
---|---|
CN109885993B (en) | 2021-06-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101833624B (en) | Information machine and access control method thereof | |
RU2320009C2 (en) | Systems and methods for protected biometric authentication | |
US7690032B1 (en) | Method and system for confirming the identity of a user | |
US8970348B1 (en) | Using sequences of facial gestures to authenticate users | |
US20170032601A1 (en) | Access control system and data processing method thereof | |
JP2020530144A (en) | Door access control method, door access control device, system and storage medium | |
CN110148232B (en) | Visitor management system, method, device and storage medium | |
CN108537030A (en) | Management method, device and the electronic equipment of identity-based identification | |
CN112005231A (en) | Biometric authentication method, system and computer program | |
JP2017073062A (en) | Communication support system | |
US10482225B1 (en) | Method of authorization dialog organizing | |
CN201548974U (en) | Unification authentication platform based on palm vena recognition | |
CN110324350A (en) | Identity identifying method and server based on the non-sensitive sensing data in mobile terminal | |
CN109885993A (en) | A kind of identity authorization system, equipment and computer readable storage medium | |
CN115758398A (en) | Access control data processing method and device, access control system and storage medium | |
CN110766850B (en) | Visitor information management method, access control system, server and storage medium | |
CN109885994B (en) | Offline identity authentication system, device and computer readable storage medium | |
Podio | Personal authentication through biometric technologies | |
CN110390193A (en) | A kind of personal computer system and control method with portrait dynamic rights authentication function | |
JP5073866B1 (en) | Portable information terminal that can communicate with IC chip | |
US20230386255A1 (en) | Method and system for verifying image identification | |
JP5037720B1 (en) | Portable information terminal that can communicate with IC chip | |
CN107742141A (en) | Smart identity information collecting method and system based on RFID technique | |
CN107391987A (en) | Application guard method, device and electronic equipment based on living things feature recognition | |
US11163862B2 (en) | Authentication of users based on snapshots thereof taken in corresponding acquisition conditions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |