CN110969738A - Control system and method of intelligent security entrance guard based on 5G architecture - Google Patents

Control system and method of intelligent security entrance guard based on 5G architecture Download PDF

Info

Publication number
CN110969738A
CN110969738A CN202010046515.0A CN202010046515A CN110969738A CN 110969738 A CN110969738 A CN 110969738A CN 202010046515 A CN202010046515 A CN 202010046515A CN 110969738 A CN110969738 A CN 110969738A
Authority
CN
China
Prior art keywords
access control
mobile terminal
intelligent
equipment
intelligent access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010046515.0A
Other languages
Chinese (zh)
Inventor
朱明甫
马传琦
刘文奇
刁智华
段崇
王士斌
孙鹏
侯青霞
张廷杰
徐赵飞
陈亚飞
刘尚鑫
赵波
罗勇
王贵宾
马新
朱智丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Chuidian Technology Co ltd
Original Assignee
Henan National Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan National Information Technology Co Ltd filed Critical Henan National Information Technology Co Ltd
Priority to CN202010046515.0A priority Critical patent/CN110969738A/en
Publication of CN110969738A publication Critical patent/CN110969738A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]

Abstract

The invention provides a control system and a method of an intelligent security entrance guard based on a 5G framework, wherein the control system comprises an MEC platform, a 5G base station, an intelligent entrance guard device and a mobile terminal device; the MEC platform is connected with the 5G base station, and the 5G base station is respectively connected with the intelligent access control equipment and the mobile terminal equipment through 5G wireless communication; the mobile terminal device is connected with the intelligent access control device through D2D communication. The invention adopts the 5G technology to provide uniform and more accurate identification service through the nearby and quick response capability of the mobile edge computing domain, thereby solving the problem of uneven identification level; the invention combines the D2D communication mode from the device to the device in 5G, increases the hardware identification to prevent the forgery and the deception while carrying out the biological identification, and can further improve the safety guarantee coefficient of the intelligent safety entrance guard by adopting the soft and hard combination mode.

Description

Control system and method of intelligent security entrance guard based on 5G architecture
Technical Field
The invention relates to the technical field of information and communication, in particular to an intelligent security access control system and method based on a 5G framework.
Background
The intelligent safety entrance guard system is a novel modern digital intelligent safety management system, and is widely applied to various occasions, the existing intelligent technology mostly adopts biological identification such as irises, fingerprints, voices and human faces, the entrance and exit conditions of personnel can be automatically recorded constantly, the entrance and exit area and the entrance and exit time of internal personnel are limited, the passengers can be politely refused, and meanwhile, the property is effectively protected from being invaded. The intelligent security access control system has high recognition error rate due to the fact that technical conditions and application maturity levels of various technologies are different. Moreover, pure biometric identification also risks counterfeiting.
With the maturity and popularization of the 5G technology, the 5G technology provides a new solution for the problem of uneven recognition level in the existing access control technology through the nearby and quick response capability of a mobile edge computing domain (MEC).
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides an intelligent safety access control system and method based on a 5G framework, and solves the technical problems that the existing intelligent safety access control identification technology has large error and uneven technical level, and the individual biological identification is easy to forge and deceive.
The technical scheme of the invention is realized as follows:
a control method of intelligent security entrance guard based on 5G architecture comprises the following steps:
step S101: establishing 5G communication connection between the mobile terminal equipment and the MEC platform, binding the identifier of the intelligent access control equipment and the identifier of the mobile terminal equipment through an APP software login control system on the mobile terminal equipment, and storing the identifier bound between the mobile terminal equipment and the intelligent access control equipment into the MEC platform;
step S102: acquiring biological sample data of a user by using intelligent access control equipment or mobile terminal equipment, and logging in a control system through APP software to store the biological sample data in a user characteristic sample library of the MEC platform;
step S103: acquiring data information to be identified by using intelligent access control equipment or mobile terminal equipment, uploading the data information to an MEC platform, comparing the data information with biological sample data in a user characteristic sample library on the MEC platform, and feeding back a comparison result to the intelligent access control equipment or the mobile terminal equipment;
step S104: the intelligent access control equipment or the mobile terminal equipment receives the comparison result of the MEC platform, if the comparison result is correct, the intelligent access control equipment searches the bound mobile terminal equipment nearby through D2D communication or searches the bound intelligent access control equipment nearby through D2D communication, and step S105 is executed, otherwise, the intelligent access control equipment keeps a locking state;
step S105: if the intelligent access control equipment successfully searches the bound mobile terminal equipment through D2D communication or successfully searches the bound intelligent access control equipment through D2D communication, the mobile terminal equipment sends an unlocking instruction to the intelligent access control equipment, the intelligent access control equipment executes an access unlocking instruction to open an intelligent lock, otherwise, the intelligent access control equipment keeps a locking state, and the control of intelligent security access control is completed.
The identification of the intelligent access control equipment is a hardware serial number of the intelligent access control equipment, and the identification of the mobile terminal equipment is a hardware serial number of the mobile terminal equipment.
A control system of intelligent security entrance guard based on 5G architecture comprises an MEC platform, a 5G base station, intelligent entrance guard equipment and mobile terminal equipment; the MEC platform is connected with the 5G base station, and the 5G base station is respectively connected with the intelligent access control equipment and the mobile terminal equipment through 5G wireless communication; the mobile terminal device is connected with the intelligent access control device through D2D communication.
The intelligent access control equipment comprises a fingerprint identification module, a voice identification module, a face identification module, an iris identification module and a 5G wireless communication module; fingerprint identification module, speech recognition module, face identification module, iris identification module all are connected with the MEC platform through 5G wireless communication module, fingerprint identification module, speech recognition module, face identification module, iris identification module all are connected with mobile terminal equipment through 5G wireless communication module.
The mobile terminal equipment comprises an APP software login control system, an acquisition module and a 5G wireless communication module, the APP software login control system and the acquisition module are connected with the MEC platform through the 5G wireless communication module, and the APP software login control system is connected with the intelligent access control equipment through D2D communication.
The beneficial effect that this technical scheme can produce: the invention adopts the 5G technology to provide uniform and more accurate identification service through the nearby and quick response capability of the mobile edge computing domain (MEC), thereby solving the problem of uneven identification level; the invention combines the D2D communication mode from the device to the device in 5G, increases the hardware identification to prevent the forgery and the deception while carrying out the biological identification, and can further improve the safety guarantee coefficient of the intelligent safety entrance guard by adopting the soft and hard combination mode.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a block diagram of the system of the present invention;
FIG. 2 is a schematic diagram of the recognition based on the 5G architecture of the present invention;
fig. 3 is a schematic diagram of the 5G-based architecture of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without inventive effort based on the embodiments of the present invention, are within the scope of the present invention.
Embodiment 1, an intelligent security access control system based on a 5G architecture, as shown in fig. 1, includes an MEC platform, a 5G base station, an intelligent access control device, and a mobile terminal device; the MEC platform is connected with the 5G base station, and the 5G base station is respectively connected with the intelligent access control equipment and the mobile terminal equipment through 5G wireless communication; the mobile terminal device is connected with the intelligent access control device through D2D communication.
The MEC platform establishes wireless connection with the intelligent access control equipment through the 5G base station, utilizes 5G communication and mobile edge to calculate the nearby service provided by the MEC platform, and the biological identification request sent by the intelligent access control equipment is responded quickly and accurate identification service is provided.
The intelligent access control equipment comprises a fingerprint identification module, a voice identification module, a face identification module, an iris identification module and a 5G wireless communication module; the fingerprint identification module is used for collecting fingerprint information of a user, the voice identification module is used for collecting voice information of the user, the face identification module is used for collecting face image information of the user, and the iris identification module is used for collecting iris information of the user. Fingerprint identification module, speech recognition module, face identification module, iris identification module all are connected with the MEC platform through 5G wireless communication module, fingerprint identification module, speech recognition module, face identification module, iris identification module all are connected with mobile terminal equipment through 5G wireless communication module.
The mobile terminal equipment comprises but is not limited to smart phone equipment of a user, the mobile terminal equipment carries a wireless communication module, serves as hardware equipment for hardware anti-counterfeiting, and provides interactive control and setting of an intelligent security access control system. The mobile terminal equipment comprises an APP software login control system, an acquisition module and a 5G wireless communication module, wherein the acquisition module is used for acquiring biological data of a user. APP software login system and collection module all are connected with the MEC platform through 5G wireless communication module, and APP software login control system is connected with intelligent entrance guard's equipment through D2D communication.
Embodiment 2, an intelligent security access control method based on a 5G architecture, where an intelligent access control device has a biometric capability, as shown in fig. 2, and the communication among the MEC platform, the intelligent access control device, and the mobile terminal device in embodiment 2 all uses a 5G technology. The MEC platform mainly provides a general biological recognition algorithm, the intelligent access control equipment collects sample data through biological recognition hardware, and the mobile terminal equipment is mainly used as a hardware lock. The method comprises the following specific steps:
step S201: establishing a 5G connection relation between the mobile terminal equipment and the MEC platform, binding the identifier of the intelligent access control equipment and the identifier of the mobile terminal equipment through an APP software login control system on the mobile terminal equipment, and storing the identifier bound between the mobile terminal equipment and the intelligent access control equipment into the MEC platform; the identification of the intelligent access control equipment is a hardware serial number of the intelligent access control equipment, and the identification of the mobile terminal equipment is a hardware serial number of the mobile terminal equipment.
Step S202: the method comprises the steps of establishing 5G communication connection between the intelligent access control equipment and the MEC platform, collecting biological sample data of a user through a fingerprint recognition module, a voice recognition module, a face recognition module or an iris recognition module of the intelligent access control equipment, and storing the biological sample data in a user characteristic sample library of the MEC platform through an APP software login control system.
Step S203: after the setting of step S201 and step S202, when the user needs to open the intelligent security access control, the intelligent access control device is used to collect data information to be identified, the data information is uploaded to the MEC platform, on the MEC platform, the data information is compared with the biological sample data in the user characteristic sample library, and the comparison result is fed back to the intelligent access control device.
Step S204: the intelligent access control equipment receives the comparison result of the MEC platform, if the comparison result is correct, the intelligent access control equipment searches the bound mobile terminal equipment nearby through D2D communication, step S205 is executed, otherwise, the intelligent access control equipment keeps a locking state. And the intelligent access control equipment refuses unlocking if the comparison result is not matched according to the comparison result fed back by the MEC platform system, and the software identification process is finished if the comparison result is matched. However, since the data information collected in step S203 may be a forged fingerprint or a forced collection behavior under an illegal behavior, further hardware device anti-counterfeit identification is required. Therefore, in order to avoid this situation, or to enhance the security system, the hardware device anti-counterfeit identification process of step S205 needs to be entered;
step S205: if the intelligent access control device successfully searches the bound mobile terminal device through D2D communication, hardware anti-counterfeiting information is found, for example, UUID (Universal unique identifier) information of a CPU (Central processing Unit) of the mobile terminal is the hardware anti-counterfeiting information of the mobile terminal; and combining the acquired hardware anti-counterfeiting information, comparing the software identification information fed back in the step S204, if the software identification information and the hardware identification information both meet the requirements, executing an unlocking instruction to open the intelligent lock, otherwise, keeping the intelligent access control equipment in a locking state, and finishing the control of the intelligent safety access control.
Embodiment 3, an intelligent security access control method based on a 5G architecture, where an intelligent access control device does not have a biometric capability, but places the biometric capability in a mobile terminal device, as shown in fig. 3, and the communication among the MEC platform, the intelligent access control device, and the mobile terminal device in embodiment 3 all uses a 5G technology. Considering the development of hardware, the miniaturization of the biological identification component can be integrated into the mobile terminal equipment, and the sampling function of the original intelligent lock can be completed by the mobile terminal equipment, so that the repetition of the component is avoided, and the user cost is reduced. In embodiment 3, the MEC platform mainly provides a biometric algorithm, the intelligent access control device integrates a 5G communication module and provides functions of receiving an unlocking instruction and unlocking, and the mobile terminal device integrates a biometric acquisition hardware module, provides a data acquisition function, and serves as a hardware lock at the same time. The method comprises the following specific steps:
step S301: establishing a 5G connection relation between the mobile terminal equipment and the MEC platform, binding the identifier of the intelligent access control equipment and the identifier of the mobile terminal equipment through an APP software login control system on the mobile terminal equipment, and storing the identifier bound between the mobile terminal equipment and the intelligent access control equipment into the MEC platform; the identification of the intelligent access control equipment is a hardware serial number of the intelligent access control equipment, and the identification of the mobile terminal equipment is a hardware serial number of the mobile terminal equipment.
Step S302: the method comprises the steps of collecting biological sample data of a user by using a collection module of the mobile terminal device, logging in a control system through APP software, and storing the biological sample data in a user characteristic sample library of the MEC platform.
Step S303: after the settings of step S201 and step S202, when the user needs to open the intelligent security access control, the mobile terminal device is used to collect data information to be identified, the data information is uploaded to the MEC platform, the data information is compared with the biological sample data in the user characteristic sample library on the MEC platform, and the comparison result is fed back to the mobile terminal device.
Step S304: the mobile terminal device receives the comparison result of the MEC platform, if the comparison result is correct, the mobile terminal device searches for the bound intelligent access control device through D2D communication, step S305 is executed, otherwise, the intelligent access control device keeps a locking state. And the mobile terminal equipment fails to unlock if the comparison result is not matched according to the comparison result fed back by the MEC platform system. And if the comparison result is matching, ending the software identification process. However, since the data information sample collected in step S302 may be a fake fingerprint or a forced collection behavior under an illegal behavior, further hardware device anti-counterfeit identification is required. Therefore, in order to avoid this situation, or to enhance the security system, a hardware device anti-counterfeit identification process is required.
Step S305: if the mobile terminal device successfully searches the bound intelligent access control device through D2D communication, hardware anti-counterfeiting information is found, the mobile terminal device comprehensively compares the software identification comparison result information obtained in the step S304, if the two conditions are met, the mobile terminal device communicates through D2D, an unlocking instruction is directly sent to the intelligent access control device, the intelligent access control device executes an access unlocking instruction to open an intelligent lock, otherwise, the intelligent access control device keeps a locking state, and the control of intelligent security access control is completed.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (5)

1. A control method of intelligent security entrance guard based on 5G architecture is characterized by comprising the following steps:
step S101: establishing 5G communication connection between the mobile terminal equipment and the MEC platform, binding the identifier of the intelligent access control equipment and the identifier of the mobile terminal equipment through an APP software login control system on the mobile terminal equipment, and storing the identifier bound between the mobile terminal equipment and the intelligent access control equipment into the MEC platform;
step S102: acquiring biological sample data of a user by using intelligent access control equipment or mobile terminal equipment, and logging in a control system through APP software to store the biological sample data in a user characteristic sample library of the MEC platform;
step S103: acquiring data information to be identified by using intelligent access control equipment or mobile terminal equipment, uploading the data information to an MEC platform, comparing the data information with biological sample data in a user characteristic sample library on the MEC platform, and feeding back a comparison result to the intelligent access control equipment or the mobile terminal equipment;
step S104: the intelligent access control equipment or the mobile terminal equipment receives the comparison result of the MEC platform, if the comparison result is correct, the intelligent access control equipment searches the bound mobile terminal equipment nearby through D2D communication or searches the bound intelligent access control equipment nearby through D2D communication, and step S105 is executed, otherwise, the intelligent access control equipment keeps a locking state;
step S105: if the intelligent access control equipment successfully searches the bound mobile terminal equipment through D2D communication or successfully searches the bound intelligent access control equipment through D2D communication, the mobile terminal equipment sends an unlocking instruction to the intelligent access control equipment, the intelligent access control equipment executes an access unlocking instruction to open an intelligent lock, otherwise, the intelligent access control equipment keeps a locking state, and the control of intelligent security access control is completed.
2. The intelligent access control method based on the 5G architecture of claim 1, wherein the identifier of the intelligent access control device is a hardware serial number of the intelligent access control device, and the identifier of the mobile terminal device is a hardware serial number of the mobile terminal device.
3. The intelligent security entrance guard control system based on 5G architecture of claim 1 or 2, comprising an MEC platform, a 5G base station, an intelligent entrance guard device and a mobile terminal device; the MEC platform is connected with the 5G base station, and the 5G base station is respectively connected with the intelligent access control equipment and the mobile terminal equipment through 5G wireless communication; the mobile terminal device is connected with the intelligent access control device through D2D communication.
4. The intelligent security entrance guard control system based on 5G architecture of claim 3, wherein the intelligent entrance guard equipment comprises a fingerprint recognition module, a voice recognition module, a face recognition module, an iris recognition module and a 5G wireless communication module; fingerprint identification module, speech recognition module, face identification module, iris identification module all are connected with the MEC platform through 5G wireless communication module, fingerprint identification module, speech recognition module, face identification module, iris identification module all are connected with mobile terminal equipment through 5G wireless communication module.
5. The intelligent security entrance guard control system based on 5G framework of claim 1, characterized in that, mobile terminal includes APP software login control system, collection module and 5G wireless communication module, APP software login control system and collection module all are connected with MEC platform through 5G wireless communication module, APP software login control system is connected with intelligent entrance guard's equipment through D2D communication.
CN202010046515.0A 2020-01-16 2020-01-16 Control system and method of intelligent security entrance guard based on 5G architecture Pending CN110969738A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010046515.0A CN110969738A (en) 2020-01-16 2020-01-16 Control system and method of intelligent security entrance guard based on 5G architecture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010046515.0A CN110969738A (en) 2020-01-16 2020-01-16 Control system and method of intelligent security entrance guard based on 5G architecture

Publications (1)

Publication Number Publication Date
CN110969738A true CN110969738A (en) 2020-04-07

Family

ID=70038241

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010046515.0A Pending CN110969738A (en) 2020-01-16 2020-01-16 Control system and method of intelligent security entrance guard based on 5G architecture

Country Status (1)

Country Link
CN (1) CN110969738A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112492602A (en) * 2020-11-19 2021-03-12 武汉武钢绿色城市技术发展有限公司 5G terminal safety access device, system and equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system
US20170006536A1 (en) * 2015-07-03 2017-01-05 Samsung Electronics Co., Ltd. Method of and apparatus for network access in wireless communication system supporting isolated e-utran operation for public safety
CN106340087A (en) * 2015-07-16 2017-01-18 黄月平 Intelligent switch lock system based on intelligent mobile terminal
CN107734158A (en) * 2017-09-29 2018-02-23 孟庆国 The method and system of remote management is carried out using intelligent hand-held terminal Lock device with two same action member
CN108374606A (en) * 2018-01-18 2018-08-07 新开普电子股份有限公司 A kind of intelligent door lock
CN109583810A (en) * 2018-11-16 2019-04-05 大唐高鸿信息通信研究院(义乌)有限公司 A kind of traceability anti-fake system and method based on 5G framework and block chain technology
CN110086809A (en) * 2016-07-13 2019-08-02 吴平 Permission operation is carried out to neighbouring target facility by mobile device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system
US20170006536A1 (en) * 2015-07-03 2017-01-05 Samsung Electronics Co., Ltd. Method of and apparatus for network access in wireless communication system supporting isolated e-utran operation for public safety
CN106340087A (en) * 2015-07-16 2017-01-18 黄月平 Intelligent switch lock system based on intelligent mobile terminal
CN110086809A (en) * 2016-07-13 2019-08-02 吴平 Permission operation is carried out to neighbouring target facility by mobile device
CN107734158A (en) * 2017-09-29 2018-02-23 孟庆国 The method and system of remote management is carried out using intelligent hand-held terminal Lock device with two same action member
CN108374606A (en) * 2018-01-18 2018-08-07 新开普电子股份有限公司 A kind of intelligent door lock
CN109583810A (en) * 2018-11-16 2019-04-05 大唐高鸿信息通信研究院(义乌)有限公司 A kind of traceability anti-fake system and method based on 5G framework and block chain technology

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
楚俊生: "边缘计算在物联网领域的应用及展望", 《信息通信技术》 *
王尚广: "《移动边缘计算》", 31 August 2017, 北京邮电大学出版社 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112492602A (en) * 2020-11-19 2021-03-12 武汉武钢绿色城市技术发展有限公司 5G terminal safety access device, system and equipment
CN112492602B (en) * 2020-11-19 2023-08-01 武汉武钢绿色城市技术发展有限公司 5G terminal safety access device, system and equipment

Similar Documents

Publication Publication Date Title
US10810816B1 (en) Information-based, biometric, asynchronous access control system
CN1972186B (en) A mobile identity authentication system and its authentication method
AU2018323233A1 (en) Resource transfer method, fund payment method and apparatus, and electronic device
US7567689B2 (en) Authentication apparatus and authentication method
US11496471B2 (en) Mobile enrollment using a known biometric
US11616776B2 (en) Authority management method and computing device utilizing method
CN110135250A (en) A kind of auth method based on bio-identification, device, equipment and readable medium
CN104660613A (en) Authentication method of user identification module and electronic equipment
KR102188775B1 (en) Method and system for remotely controlling client terminals using face recognition and face recognition terminal
CN110659908A (en) Data transaction identity verification system
CN110782559A (en) Access control device, access control authentication method, access control authentication device and storage medium
CN110969738A (en) Control system and method of intelligent security entrance guard based on 5G architecture
CN110015023A (en) A kind of charging pile with fingerprint recognition and payment system
CN109493475B (en) Method for serving as electronic fence based on biological characteristics
CN112669501B (en) Access control method, device and computer readable storage medium
JP2003099780A (en) Access control system
CN115690969A (en) Non-contact fingerprint authentication method, terminal, access control equipment and storage medium
CN111683085B (en) External network identity authentication method, system, equipment and storage medium based on internal network connection
CN112232443B (en) Identity authentication method, device, equipment and storage medium
US10867022B2 (en) Method and apparatus for providing authentication using voice and facial data
CN113298996A (en) Intelligent access control management method and control system thereof
CN116959184B (en) Correlation analysis method and system based on multi-mode data
JP2020135666A (en) Authentication device, terminal for authentication, authentication method, program and recording medium
CN211554949U (en) Portable biological recognition device
CN115147968B (en) Identity verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200720

Address after: Room 306, national optoelectronics 2 scientific research building, Xiangjiang East Road, Qibin District, Hebi City, Henan Province

Applicant after: Henan chuidian Technology Co.,Ltd.

Address before: 458030 room 611, incubation building, entrepreneurship and Innovation Park, east of Juxin Road, north of Xiangjiang South Road, Qibin District, Hebi City, Henan Province

Applicant before: Henan National Information Technology Co.,Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20200407

RJ01 Rejection of invention patent application after publication