CN112632508A - Identity recognition method and device based on cloud computing - Google Patents
Identity recognition method and device based on cloud computing Download PDFInfo
- Publication number
- CN112632508A CN112632508A CN202011586675.0A CN202011586675A CN112632508A CN 112632508 A CN112632508 A CN 112632508A CN 202011586675 A CN202011586675 A CN 202011586675A CN 112632508 A CN112632508 A CN 112632508A
- Authority
- CN
- China
- Prior art keywords
- server terminal
- information
- identification
- computing
- cloud computing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
- G06F9/5072—Grid computing
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Mathematical Physics (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention provides an identity recognition method and device based on cloud computing. The method comprises the following steps: acquiring identity information to be identified on a cloud computing platform, and establishing different information classification sets according to the identity information to be identified; counting the numerical value of the computing resource required by each information classification set as a numerical value to be compared, sending a computing request instruction to the server terminal, waiting for the feedback of the server terminal, and extracting the computing resource threshold value of each server terminal from the feedback of the server terminal; comparing the value to be compared with the computing resource threshold value of each server terminal, and distributing each information classification set to the corresponding server terminal according to the comparison result; and identifying the information classification set through each server terminal to finish the identification of the identity information to be identified. According to the invention, different identity identifications are combined in a cloud computing mode and then are verified and identified, so that the accuracy of the identity identification is improved, and meanwhile, the efficiency of the identity identification is also improved by utilizing the cloud computing.
Description
Technical Field
The invention relates to the technical field of cloud computing, in particular to an identity identification method and device based on cloud computing.
Background
In recent years, with the development of networks, social networks, electronic commerce, digital cities, online videos and the like are in a rush, and the rising technologies need to be supported by a large storage and a high-performance server, so that cloud computing appears, which is one of distributed computing and refers to decomposing a huge data computing processing program into countless small programs through a network "cloud", and then processing and analyzing the small programs through a system consisting of a plurality of servers to obtain results and returning the results to users.
Identity recognition is one of the important means of the existing security protection, not only is the judgment of personal identity, but also personal security can be protected, the traditional identity recognition mode is often single, and the recognition accuracy is not accurate enough, so that the need for an identity recognition method based on cloud computing can be improved on the traditional identity recognition mode is urgent.
The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.
Disclosure of Invention
In view of this, the invention provides an identity recognition method and device based on cloud computing, and aims to solve the technical problem that the prior art cannot improve the identity recognition accuracy through cloud computing.
The technical scheme of the invention is realized as follows:
in one aspect, the present invention provides an identity recognition method based on cloud computing, which includes the following steps:
s1, acquiring identity information to be recognized on the cloud computing platform, and establishing different information classification sets according to the identity information to be recognized;
s2, counting the value of the computing resource needed by each information classification set as the value to be compared, sending a computing request instruction to the server terminal, waiting for the feedback of the server terminal, and extracting the computing resource threshold value of each server terminal from the feedback of the server terminal;
s3, comparing the value to be compared with the computing resource threshold of each server terminal, and distributing each information classification set to the corresponding server terminal according to the comparison result;
and S4, identifying the information classification set through each server terminal, and completing the identification of the identity information to be identified.
On the basis of the above technical solution, preferably, in step S1, acquiring identity information to be recognized on the cloud computing platform, and establishing a different information classification set according to the identity information to be recognized, the method further includes the following steps of acquiring the identity information to be recognized on the cloud computing platform, where the identity information to be recognized includes: the method comprises the steps that different information classification sets are established according to identity information to be recognized by user basic information, face information, iris information, electrocardiogram data and fingerprint information, the identity information to be recognized of the same user is marked through the user basic information, and the corresponding identity information to be recognized is stored in the information classification sets.
On the basis of the above technical solution, preferably, in step S2, counting the numerical value of the computing resource required by each information classification set as a to-be-compared numerical value, sending a computing request instruction to the server terminal, waiting for the server terminal to feed back, and extracting the computing resource threshold value of each server terminal from the server terminal feedback, further comprising the steps of counting the numerical value of the computing resource required by each information classification set, taking the numerical value of the computing resource required by each information classification set as a to-be-compared numerical value, sending a computing request instruction to the server terminal, and when the server terminal feedback is received, extracting the computing resource threshold value of each server terminal from the server terminal feedback; and when the feedback of the server terminal is not received, continuing to wait for the feedback of the server terminal.
On the basis of the technical scheme, preferably, a calculation request instruction is sent to the server terminal, and when server terminal feedback is received, the calculation resource threshold value of each server terminal is extracted from the server terminal feedback; when the feedback of the server terminal is not received, continuing to wait for the feedback of the server terminal, and further comprising the following steps of acquiring a platform identification code, sending a calculation request instruction to the server terminal through the platform identification code, verifying the received platform identification code by the server terminal, and sending the feedback of the calculation resource threshold value of the server terminal to the corresponding platform when the verification is passed; and when the verification fails, sending an identity error alarm to the corresponding platform.
On the basis of the above technical solution, preferably, in step S3, comparing the value to be compared with the computing resource threshold of each server terminal, and allocating each information classification set to the corresponding server terminal according to the comparison result, further comprising the steps of comparing the value to be compared with the computing resource threshold of each server terminal, and when the value to be compared is smaller than the computing resource threshold of each server terminal, allocating the information classification set corresponding to the value to be compared to the corresponding server terminal; and when the numerical value to be compared is larger than the computing resource threshold value of each server terminal, reselecting the server terminal.
On the basis of the above technical solution, preferably, in step S4, the server terminals identify the information classification set to complete identification of the identity information to be identified, and the method further includes the following steps of obtaining a plurality of corresponding identification methods according to the information classification set, and identifying the information classification set by using the identification methods through the server terminals to complete identification of the identity information to be identified.
On the basis of the above technical solution, preferably, each server terminal identifies the information classification set by using the identification method, and completes identification of the identity information to be identified, and further includes the following steps of recording the identification results of each identification method on the information classification set, comparing a plurality of identification results of the same identity information to be identified with each other, and marking the identity information to be identified and feeding back the identity information to an administrator if the identification results given by at least 2 identification methods are inconsistent with the identification results given by other identification methods.
Still further preferably, the cloud computing-based identification apparatus includes:
the acquisition module is used for acquiring identity information to be identified on the cloud computing platform and establishing different information classification sets according to the identity information to be identified;
the extraction module is used for counting the numerical value of the computing resource required by each information classification set as a numerical value to be compared, sending a computing request instruction to the server terminal, waiting for the feedback of the server terminal, and extracting the computing resource threshold value of each server terminal from the feedback of the server terminal;
the distribution module is used for comparing the numerical value to be compared with the computing resource threshold value of each server terminal and distributing each information classification set to the corresponding server terminal according to the comparison result;
and the identification module is used for identifying the information classification set through each server terminal to finish the identification of the identity information to be identified.
In a second aspect, the cloud computing-based identity recognition method further includes a device, the device including: a memory, a processor and a cloud computing based identification method program stored on the memory and executable on the processor, the cloud computing based identification method program being configured to implement the steps of the cloud computing based identification method as described above.
In a third aspect, the cloud computing-based identity recognition method further includes a medium, which is a computer medium, and the computer medium stores a cloud computing-based identity recognition method program, and when the cloud computing-based identity recognition method program is executed by a processor, the cloud computing-based identity recognition method program implements the steps of the cloud computing-based identity recognition method as described above.
Compared with the prior art, the identity recognition method based on cloud computing has the following beneficial effects:
(1) multiple identity recognition verification can be simultaneously carried out through a cloud computing mode, the accuracy rate of identity recognition verification can be improved, the identity recognition verification efficiency is improved, and the user experience is improved.
(2) By comparing the computing resource threshold values of the server terminals in advance, the information to be subjected to identity recognition can be extracted and reasonably distributed, so that the condition that verification is interrupted due to insufficient computing resources is avoided, and the efficiency of identity recognition verification is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic diagram of an apparatus in a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a first embodiment of a cloud computing-based identity recognition method according to the present invention;
fig. 3 is a functional module diagram of a first embodiment of the cloud computing-based identity recognition method according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
As shown in fig. 1, the apparatus may include: a processor 1001, such as a Central Processing Unit (CPU), a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a WIreless interface (e.g., a WIreless-FIdelity (WI-FI) interface). The Memory 1005 may be a Random Access Memory (RAM) Memory, or may be a Non-Volatile Memory (NVM), such as a disk Memory. The memory 1005 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the configuration shown in fig. 1 does not constitute a limitation of the device, and that in actual implementations the device may include more or less components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a medium, may include therein an operating system, a network communication module, a user interface module, and a cloud computing-based identification method program.
In the device shown in fig. 1, the network interface 1004 is mainly used for establishing a communication connection between the device and a server storing all data required in the cloud computing-based identification method system; the user interface 1003 is mainly used for data interaction with a user; the processor 1001 and the memory 1005 of the cloud computing-based identity recognition method device may be arranged in the cloud computing-based identity recognition method device, and the cloud computing-based identity recognition method device calls the cloud computing-based identity recognition method program stored in the memory 1005 through the processor 1001 and executes the cloud computing-based identity recognition method provided by the implementation of the present invention.
With reference to fig. 2, fig. 2 is a schematic flowchart of a cloud computing-based identity recognition method according to a first embodiment of the present invention.
In this embodiment, the cloud computing-based identity recognition method includes the following steps:
s10: the method comprises the steps of collecting identity information to be recognized on a cloud computing platform, and establishing different information classification set information according to the identity information to be recognized.
It should be understood that, in this embodiment, the system first collects identity information to be recognized on the cloud computing platform, where the identity information to be recognized includes: the method comprises the steps that different information classification sets are established according to identity information to be recognized by user basic information, face information, iris information, electrocardiogram data and fingerprint information, the identity information to be recognized of the same user is marked through the user basic information, and the corresponding identity information to be recognized is stored in the information classification sets.
S20: and counting the numerical value of the computing resource required by each information classification set as a numerical value to be compared, sending a computing request instruction to the server terminal, waiting for the feedback of the server terminal, and extracting the computing resource threshold value of each server terminal from the feedback of the server terminal.
It should be understood that the system then counts the value of the computing resource required by each information classification set, takes the value of the computing resource required by each information classification set as a value to be compared, sends a computing request instruction to the server terminal, and extracts the computing resource threshold value of each server terminal from the server terminal feedback when the server terminal feedback is received; and when the feedback of the server terminal is not received, continuing to wait for the feedback of the server terminal.
It should be understood that, the system will then obtain the platform identification code, send a calculation request instruction to the server terminal through the platform identification code, and the server terminal verifies the received platform identification code and sends the server terminal calculation resource threshold feedback to the corresponding platform when the verification is passed; sending an identity error alert to a corresponding platform when authentication fails
S30: and comparing the numerical value to be compared with the computing resource threshold value of each server terminal, and distributing each information classification set to the corresponding server terminal according to the comparison result.
It should be understood that the system also compares the value to be compared with the computing resource threshold of each server terminal, and when the value to be compared is smaller than the computing resource threshold of each server terminal, the information classification set corresponding to the value to be compared is distributed to the corresponding server terminal; and when the numerical value to be compared is larger than the computing resource threshold value of each server terminal, reselecting the server terminal.
It should be understood that the system may obtain a plurality of corresponding identification methods according to the information classification set, and complete the identification of the identity information to be identified by using the identification method to identify the information classification set through each server terminal.
S40: and identifying the information classification set through each server terminal to finish the identification of the identity information to be identified.
It should be understood that, finally, the system records the recognition result of each recognition method on the information classification set, compares a plurality of recognition results of the same identity information to be recognized with each other, marks the identity information to be recognized and feeds back the identity information to the administrator if the recognition results given by at least 2 recognition methods are inconsistent with the recognition results given by other recognition methods.
The above description is only for illustrative purposes and does not limit the technical solutions of the present application in any way.
According to the above description, it is not difficult to find that different information classification sets are established according to the identity information to be recognized by collecting the identity information to be recognized on the cloud computing platform; counting the numerical value of the computing resource required by each information classification set as a numerical value to be compared, sending a computing request instruction to the server terminal, waiting for the feedback of the server terminal, and extracting the computing resource threshold value of each server terminal from the feedback of the server terminal; comparing the value to be compared with the computing resource threshold value of each server terminal, and distributing each information classification set to the corresponding server terminal according to the comparison result; and identifying the information classification set through each server terminal to finish the identification of the identity information to be identified. According to the embodiment, different identity identifications are combined to carry out verification and identification after the identity identifications are combined in a cloud computing mode, so that the accuracy rate of the identity identification is improved, and meanwhile, the efficiency of the identity identification is also improved by utilizing cloud computing.
In addition, the embodiment of the invention also provides an identity recognition device based on cloud computing. As shown in fig. 3, the cloud computing-based identification apparatus includes: acquisition module 10, extraction module 20, assignment module 30, and identification module 40.
The acquisition module 10 is used for acquiring each piece of identity information to be identified on the cloud computing platform and establishing different information classification sets according to each piece of identity information to be identified;
the extraction module 20 is configured to count a numerical value of a computational resource required by each information classification set as a numerical value to be compared, send a computation request instruction to the server terminal, wait for server terminal feedback, and extract a computational resource threshold of each server terminal from the server terminal feedback;
the distribution module 30 is used for comparing the value to be compared with the computing resource threshold value of each server terminal, and distributing each information classification set to the corresponding server terminal according to the comparison result;
and the identification module 40 is used for identifying the information classification set through each server terminal to complete identification of the identity information to be identified.
In addition, it should be noted that the above-described embodiments of the apparatus are merely illustrative, and do not limit the scope of the present invention, and in practical applications, a person skilled in the art may select some or all of the modules to implement the purpose of the embodiments according to actual needs, and the present invention is not limited herein.
In addition, technical details that are not described in detail in this embodiment may be referred to the cloud computing-based identity recognition method provided in any embodiment of the present invention, and are not described herein again.
In addition, an embodiment of the present invention further provides a medium, where the medium is a computer medium, and the computer medium stores a cloud computing-based identity recognition method program, where the cloud computing-based identity recognition method program, when executed by a processor, implements the following operations:
s1, acquiring identity information to be recognized on the cloud computing platform, and establishing different information classification sets according to the identity information to be recognized;
s2, counting the value of the computing resource needed by each information classification set as the value to be compared, sending a computing request instruction to the server terminal, waiting for the feedback of the server terminal, and extracting the computing resource threshold value of each server terminal from the feedback of the server terminal;
s3, comparing the value to be compared with the computing resource threshold of each server terminal, and distributing each information classification set to the corresponding server terminal according to the comparison result;
and S4, identifying the information classification set through each server terminal, and completing the identification of the identity information to be identified.
Further, when executed by a processor, the cloud computing-based identity recognition method program further realizes the following operations:
acquiring identity information to be identified on a cloud computing platform, wherein the identity information to be identified comprises: the method comprises the steps that different information classification sets are established according to identity information to be recognized by user basic information, face information, iris information, electrocardiogram data and fingerprint information, the identity information to be recognized of the same user is marked through the user basic information, and the corresponding identity information to be recognized is stored in the information classification sets.
Further, when executed by a processor, the cloud computing-based identity recognition method program further realizes the following operations:
counting the numerical value of the computing resource required by each information classification set, taking the numerical value of the computing resource required by each information classification set as a numerical value to be compared, sending a computing request instruction to a server terminal, and extracting the computing resource threshold value of each server terminal from the server terminal feedback when the server terminal feedback is received; and when the feedback of the server terminal is not received, continuing to wait for the feedback of the server terminal.
Further, when executed by a processor, the cloud computing-based identity recognition method program further realizes the following operations:
acquiring a platform identification code, sending a calculation request instruction to a server terminal through the platform identification code, verifying the received platform identification code by the server terminal, and sending server terminal calculation resource threshold feedback to a corresponding platform when the verification is passed; and when the verification fails, sending an identity error alarm to the corresponding platform.
Further, when executed by a processor, the cloud computing-based identity recognition method program further realizes the following operations:
comparing the value to be compared with the computing resource threshold value of each server terminal, and when the value to be compared is smaller than the computing resource threshold value of each server terminal, distributing the information classification set corresponding to the value to be compared to the corresponding server terminal; and when the numerical value to be compared is larger than the computing resource threshold value of each server terminal, reselecting the server terminal.
Further, when executed by a processor, the cloud computing-based identity recognition method program further realizes the following operations:
and acquiring multiple corresponding identification methods according to the information classification set, and identifying the information classification set by using the identification method through each server terminal to finish the identification of the identity information to be identified.
Further, when executed by a processor, the cloud computing-based identity recognition method program further realizes the following operations:
recording the recognition result of each recognition method on the information classification set, comparing a plurality of recognition results of the same identity information to be recognized with each other, marking the identity information to be recognized if the recognition results given by at least 2 recognition methods are inconsistent with the recognition results given by other recognition methods, and feeding back the identity information to the administrator.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (10)
1. An identity recognition method based on cloud computing is characterized in that: comprises the following steps;
s1, acquiring identity information to be recognized on the cloud computing platform, and establishing different information classification sets according to the identity information to be recognized;
s2, counting the value of the computing resource needed by each information classification set as the value to be compared, sending a computing request instruction to the server terminal, waiting for the feedback of the server terminal, and extracting the computing resource threshold value of each server terminal from the feedback of the server terminal;
s3, comparing the value to be compared with the computing resource threshold of each server terminal, and distributing each information classification set to the corresponding server terminal according to the comparison result;
and S4, identifying the information classification set through each server terminal, and completing the identification of the identity information to be identified.
2. The cloud computing-based identity recognition method of claim 1, wherein: in step S1, acquiring identity information to be recognized on the cloud computing platform, and establishing a different information classification set according to the identity information to be recognized, further including the following steps of acquiring the identity information to be recognized on the cloud computing platform, where the identity information to be recognized includes: the method comprises the steps that different information classification sets are established according to identity information to be recognized by user basic information, face information, iris information, electrocardiogram data and fingerprint information, the identity information to be recognized of the same user is marked through the user basic information, and the corresponding identity information to be recognized is stored in the information classification sets.
3. The cloud computing-based identity recognition method of claim 2, wherein: in step S2, counting the number of computing resources required for each information classification set as a number to be compared, sending a computing request instruction to a server terminal, waiting for a server terminal to feed back, and extracting a computing resource threshold value of each server terminal from the server terminal feedback, and further including the steps of counting the number of computing resources required for each information classification set, taking the number of computing resources required for each information classification set as a number to be compared, sending a computing request instruction to the server terminal, and extracting a computing resource threshold value of each server terminal from the server terminal feedback when the server terminal feedback is received; and when the feedback of the server terminal is not received, continuing to wait for the feedback of the server terminal.
4. The cloud-computing-based identity recognition method of claim 3, wherein: sending a calculation request instruction to the server terminal, and extracting a calculation resource threshold value of each server terminal from the server terminal feedback when the server terminal feedback is received; when the feedback of the server terminal is not received, continuing to wait for the feedback of the server terminal, and further comprising the following steps of acquiring a platform identification code, sending a calculation request instruction to the server terminal through the platform identification code, verifying the received platform identification code by the server terminal, and sending the feedback of the calculation resource threshold value of the server terminal to the corresponding platform when the verification is passed; and when the verification fails, sending an identity error alarm to the corresponding platform.
5. The cloud computing-based identity recognition method of claim 4, wherein: in step S3, comparing the value to be compared with the computing resource threshold of each server terminal, and distributing each information classification set to the corresponding server terminal according to the comparison result, further comprising the steps of comparing the value to be compared with the computing resource threshold of each server terminal, and distributing the information classification set corresponding to the value to be compared to the corresponding server terminal when the value to be compared is smaller than the computing resource threshold of each server terminal; and when the numerical value to be compared is larger than the computing resource threshold value of each server terminal, reselecting the server terminal.
6. The cloud computing-based identity recognition method of claim 5, wherein: in step S4, the server terminals recognize the information classification set to complete the identification of the identity information to be recognized, and the method further includes the following steps of obtaining multiple corresponding identification methods according to the information classification set, and recognizing the information classification set by the server terminals by using the identification methods to complete the identification of the identity information to be recognized.
7. The cloud computing-based identity recognition method of claim 6, wherein: the method comprises the steps of utilizing each server terminal to identify information classification sets by utilizing the identification method to complete identification of identity information to be identified, recording identification results of each identification method to the information classification sets, comparing a plurality of identification results of the same identity information to be identified with each other, marking the identity information to be identified and feeding back the identity information to an administrator if the identification results given by at least 2 identification methods are inconsistent with the identification results given by other identification methods.
8. An identification device based on cloud computing, the identification device based on cloud computing comprising:
the acquisition module is used for acquiring identity information to be identified on the cloud computing platform and establishing different information classification sets according to the identity information to be identified;
the extraction module is used for counting the numerical value of the computing resource required by each information classification set as a numerical value to be compared, sending a computing request instruction to the server terminal, waiting for the feedback of the server terminal, and extracting the computing resource threshold value of each server terminal from the feedback of the server terminal;
the distribution module is used for comparing the numerical value to be compared with the computing resource threshold value of each server terminal and distributing each information classification set to the corresponding server terminal according to the comparison result;
and the identification module is used for identifying the information classification set through each server terminal to finish the identification of the identity information to be identified.
9. An apparatus, characterized in that the apparatus comprises: a memory, a processor, and a cloud computing-based identification method program stored on the memory and executable on the processor, the cloud computing-based identification method program configured to implement the steps of the cloud computing-based identification method of any one of claims 1 to 7.
10. A medium, characterized in that the medium is a computer medium on which a cloud computing-based identification method program is stored, which when executed by a processor implements the steps of the cloud computing-based identification method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011586675.0A CN112632508B (en) | 2020-12-28 | 2020-12-28 | Identity recognition method and device based on cloud computing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011586675.0A CN112632508B (en) | 2020-12-28 | 2020-12-28 | Identity recognition method and device based on cloud computing |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112632508A true CN112632508A (en) | 2021-04-09 |
CN112632508B CN112632508B (en) | 2023-10-20 |
Family
ID=75286206
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011586675.0A Active CN112632508B (en) | 2020-12-28 | 2020-12-28 | Identity recognition method and device based on cloud computing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112632508B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102457509A (en) * | 2010-11-02 | 2012-05-16 | 中兴通讯股份有限公司 | Safe access method, device and system of cloud computing resource |
CN102457507A (en) * | 2010-10-29 | 2012-05-16 | 中兴通讯股份有限公司 | Secure sharing method, device and system for cloud computing resources |
CN102811222A (en) * | 2012-08-09 | 2012-12-05 | 浪潮电子信息产业股份有限公司 | Identity identification security method based on cloud computing |
US20150039767A1 (en) * | 2013-08-05 | 2015-02-05 | Verizon Patent And Licensing Inc. | Global cloud computing environment resource allocation with local optimization |
CN105187246A (en) * | 2015-08-27 | 2015-12-23 | 浪潮(北京)电子信息产业有限公司 | Method and system for expanding calculation nodes in cloud platform |
CN108984286A (en) * | 2018-06-29 | 2018-12-11 | 广东工业大学 | A kind of resource regulating method and system of cloud computing platform |
CN110362388A (en) * | 2018-04-11 | 2019-10-22 | 中移(苏州)软件技术有限公司 | A kind of resource regulating method and device |
CN111865964A (en) * | 2020-07-16 | 2020-10-30 | 董海霞 | Identity authentication system based on enterprise private cloud encrypted file system |
US20200379813A1 (en) * | 2019-05-31 | 2020-12-03 | Altair Engineering, Inc. | Allocation of cloud computing resources |
-
2020
- 2020-12-28 CN CN202011586675.0A patent/CN112632508B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102457507A (en) * | 2010-10-29 | 2012-05-16 | 中兴通讯股份有限公司 | Secure sharing method, device and system for cloud computing resources |
CN102457509A (en) * | 2010-11-02 | 2012-05-16 | 中兴通讯股份有限公司 | Safe access method, device and system of cloud computing resource |
CN102811222A (en) * | 2012-08-09 | 2012-12-05 | 浪潮电子信息产业股份有限公司 | Identity identification security method based on cloud computing |
US20150039767A1 (en) * | 2013-08-05 | 2015-02-05 | Verizon Patent And Licensing Inc. | Global cloud computing environment resource allocation with local optimization |
CN105187246A (en) * | 2015-08-27 | 2015-12-23 | 浪潮(北京)电子信息产业有限公司 | Method and system for expanding calculation nodes in cloud platform |
CN110362388A (en) * | 2018-04-11 | 2019-10-22 | 中移(苏州)软件技术有限公司 | A kind of resource regulating method and device |
CN108984286A (en) * | 2018-06-29 | 2018-12-11 | 广东工业大学 | A kind of resource regulating method and system of cloud computing platform |
US20200379813A1 (en) * | 2019-05-31 | 2020-12-03 | Altair Engineering, Inc. | Allocation of cloud computing resources |
CN111865964A (en) * | 2020-07-16 | 2020-10-30 | 董海霞 | Identity authentication system based on enterprise private cloud encrypted file system |
Also Published As
Publication number | Publication date |
---|---|
CN112632508B (en) | 2023-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109509021B (en) | Behavior track-based anomaly identification method and device, server and storage medium | |
US20190012450A1 (en) | Biometric-based authentication method, apparatus and system | |
CN109389723B (en) | Visitor management method and device using face recognition and computer equipment | |
WO2019196303A1 (en) | User identity authentication method, server and storage medium | |
CN110544109A (en) | user portrait generation method and device, computer equipment and storage medium | |
CN109194689B (en) | Abnormal behavior recognition method, device, server and storage medium | |
CN109600336A (en) | Store equipment, identifying code application method and device | |
CN111260220B (en) | Group control equipment identification method and device, electronic equipment and storage medium | |
CN111949702B (en) | Abnormal transaction data identification method, device and equipment | |
CN110933147A (en) | Information technology analysis system based on cloud computing | |
CN110795714A (en) | Identity authentication method and device, computer equipment and storage medium | |
CN113412607B (en) | Content pushing method and device, mobile terminal and storage medium | |
CN110929244A (en) | Digital identity identification method, device, equipment and storage medium | |
CN112507314B (en) | Client identity verification method, device, electronic equipment and storage medium | |
CN109088788B (en) | Data processing method, device, equipment and computer readable storage medium | |
CN111191207A (en) | Electronic file control method and device, computer equipment and storage medium | |
CN104980421A (en) | Method and system for processing batch requests | |
CN110675252A (en) | Risk assessment method and device, electronic equipment and storage medium | |
CN110807050B (en) | Performance analysis method, device, computer equipment and storage medium | |
CN110851334B (en) | Flow statistics method, electronic equipment, system and medium | |
CN112115455B (en) | Method, device, server and medium for setting association relation of multiple user accounts | |
CN107391980B (en) | Login verification method, device, equipment and storage medium based on equipment data | |
CN113486316A (en) | User identity authentication method and device, electronic equipment and readable storage medium | |
CN111339317A (en) | User registration identification method and device, computer equipment and storage medium | |
CN112632508A (en) | Identity recognition method and device based on cloud computing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |