CN112632508A - Identity recognition method and device based on cloud computing - Google Patents

Identity recognition method and device based on cloud computing Download PDF

Info

Publication number
CN112632508A
CN112632508A CN202011586675.0A CN202011586675A CN112632508A CN 112632508 A CN112632508 A CN 112632508A CN 202011586675 A CN202011586675 A CN 202011586675A CN 112632508 A CN112632508 A CN 112632508A
Authority
CN
China
Prior art keywords
server terminal
information
identification
computing
cloud computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011586675.0A
Other languages
Chinese (zh)
Other versions
CN112632508B (en
Inventor
王绪生
卫才智
邹巍
卢利祥
俞俊
刘乾超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongjin Data Wuhan Supercomputing Technology Co ltd
Original Assignee
Zhongjin Data Wuhan Supercomputing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongjin Data Wuhan Supercomputing Technology Co ltd filed Critical Zhongjin Data Wuhan Supercomputing Technology Co ltd
Priority to CN202011586675.0A priority Critical patent/CN112632508B/en
Publication of CN112632508A publication Critical patent/CN112632508A/en
Application granted granted Critical
Publication of CN112632508B publication Critical patent/CN112632508B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Mathematical Physics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention provides an identity recognition method and device based on cloud computing. The method comprises the following steps: acquiring identity information to be identified on a cloud computing platform, and establishing different information classification sets according to the identity information to be identified; counting the numerical value of the computing resource required by each information classification set as a numerical value to be compared, sending a computing request instruction to the server terminal, waiting for the feedback of the server terminal, and extracting the computing resource threshold value of each server terminal from the feedback of the server terminal; comparing the value to be compared with the computing resource threshold value of each server terminal, and distributing each information classification set to the corresponding server terminal according to the comparison result; and identifying the information classification set through each server terminal to finish the identification of the identity information to be identified. According to the invention, different identity identifications are combined in a cloud computing mode and then are verified and identified, so that the accuracy of the identity identification is improved, and meanwhile, the efficiency of the identity identification is also improved by utilizing the cloud computing.

Description

Identity recognition method and device based on cloud computing
Technical Field
The invention relates to the technical field of cloud computing, in particular to an identity identification method and device based on cloud computing.
Background
In recent years, with the development of networks, social networks, electronic commerce, digital cities, online videos and the like are in a rush, and the rising technologies need to be supported by a large storage and a high-performance server, so that cloud computing appears, which is one of distributed computing and refers to decomposing a huge data computing processing program into countless small programs through a network "cloud", and then processing and analyzing the small programs through a system consisting of a plurality of servers to obtain results and returning the results to users.
Identity recognition is one of the important means of the existing security protection, not only is the judgment of personal identity, but also personal security can be protected, the traditional identity recognition mode is often single, and the recognition accuracy is not accurate enough, so that the need for an identity recognition method based on cloud computing can be improved on the traditional identity recognition mode is urgent.
The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.
Disclosure of Invention
In view of this, the invention provides an identity recognition method and device based on cloud computing, and aims to solve the technical problem that the prior art cannot improve the identity recognition accuracy through cloud computing.
The technical scheme of the invention is realized as follows:
in one aspect, the present invention provides an identity recognition method based on cloud computing, which includes the following steps:
s1, acquiring identity information to be recognized on the cloud computing platform, and establishing different information classification sets according to the identity information to be recognized;
s2, counting the value of the computing resource needed by each information classification set as the value to be compared, sending a computing request instruction to the server terminal, waiting for the feedback of the server terminal, and extracting the computing resource threshold value of each server terminal from the feedback of the server terminal;
s3, comparing the value to be compared with the computing resource threshold of each server terminal, and distributing each information classification set to the corresponding server terminal according to the comparison result;
and S4, identifying the information classification set through each server terminal, and completing the identification of the identity information to be identified.
On the basis of the above technical solution, preferably, in step S1, acquiring identity information to be recognized on the cloud computing platform, and establishing a different information classification set according to the identity information to be recognized, the method further includes the following steps of acquiring the identity information to be recognized on the cloud computing platform, where the identity information to be recognized includes: the method comprises the steps that different information classification sets are established according to identity information to be recognized by user basic information, face information, iris information, electrocardiogram data and fingerprint information, the identity information to be recognized of the same user is marked through the user basic information, and the corresponding identity information to be recognized is stored in the information classification sets.
On the basis of the above technical solution, preferably, in step S2, counting the numerical value of the computing resource required by each information classification set as a to-be-compared numerical value, sending a computing request instruction to the server terminal, waiting for the server terminal to feed back, and extracting the computing resource threshold value of each server terminal from the server terminal feedback, further comprising the steps of counting the numerical value of the computing resource required by each information classification set, taking the numerical value of the computing resource required by each information classification set as a to-be-compared numerical value, sending a computing request instruction to the server terminal, and when the server terminal feedback is received, extracting the computing resource threshold value of each server terminal from the server terminal feedback; and when the feedback of the server terminal is not received, continuing to wait for the feedback of the server terminal.
On the basis of the technical scheme, preferably, a calculation request instruction is sent to the server terminal, and when server terminal feedback is received, the calculation resource threshold value of each server terminal is extracted from the server terminal feedback; when the feedback of the server terminal is not received, continuing to wait for the feedback of the server terminal, and further comprising the following steps of acquiring a platform identification code, sending a calculation request instruction to the server terminal through the platform identification code, verifying the received platform identification code by the server terminal, and sending the feedback of the calculation resource threshold value of the server terminal to the corresponding platform when the verification is passed; and when the verification fails, sending an identity error alarm to the corresponding platform.
On the basis of the above technical solution, preferably, in step S3, comparing the value to be compared with the computing resource threshold of each server terminal, and allocating each information classification set to the corresponding server terminal according to the comparison result, further comprising the steps of comparing the value to be compared with the computing resource threshold of each server terminal, and when the value to be compared is smaller than the computing resource threshold of each server terminal, allocating the information classification set corresponding to the value to be compared to the corresponding server terminal; and when the numerical value to be compared is larger than the computing resource threshold value of each server terminal, reselecting the server terminal.
On the basis of the above technical solution, preferably, in step S4, the server terminals identify the information classification set to complete identification of the identity information to be identified, and the method further includes the following steps of obtaining a plurality of corresponding identification methods according to the information classification set, and identifying the information classification set by using the identification methods through the server terminals to complete identification of the identity information to be identified.
On the basis of the above technical solution, preferably, each server terminal identifies the information classification set by using the identification method, and completes identification of the identity information to be identified, and further includes the following steps of recording the identification results of each identification method on the information classification set, comparing a plurality of identification results of the same identity information to be identified with each other, and marking the identity information to be identified and feeding back the identity information to an administrator if the identification results given by at least 2 identification methods are inconsistent with the identification results given by other identification methods.
Still further preferably, the cloud computing-based identification apparatus includes:
the acquisition module is used for acquiring identity information to be identified on the cloud computing platform and establishing different information classification sets according to the identity information to be identified;
the extraction module is used for counting the numerical value of the computing resource required by each information classification set as a numerical value to be compared, sending a computing request instruction to the server terminal, waiting for the feedback of the server terminal, and extracting the computing resource threshold value of each server terminal from the feedback of the server terminal;
the distribution module is used for comparing the numerical value to be compared with the computing resource threshold value of each server terminal and distributing each information classification set to the corresponding server terminal according to the comparison result;
and the identification module is used for identifying the information classification set through each server terminal to finish the identification of the identity information to be identified.
In a second aspect, the cloud computing-based identity recognition method further includes a device, the device including: a memory, a processor and a cloud computing based identification method program stored on the memory and executable on the processor, the cloud computing based identification method program being configured to implement the steps of the cloud computing based identification method as described above.
In a third aspect, the cloud computing-based identity recognition method further includes a medium, which is a computer medium, and the computer medium stores a cloud computing-based identity recognition method program, and when the cloud computing-based identity recognition method program is executed by a processor, the cloud computing-based identity recognition method program implements the steps of the cloud computing-based identity recognition method as described above.
Compared with the prior art, the identity recognition method based on cloud computing has the following beneficial effects:
(1) multiple identity recognition verification can be simultaneously carried out through a cloud computing mode, the accuracy rate of identity recognition verification can be improved, the identity recognition verification efficiency is improved, and the user experience is improved.
(2) By comparing the computing resource threshold values of the server terminals in advance, the information to be subjected to identity recognition can be extracted and reasonably distributed, so that the condition that verification is interrupted due to insufficient computing resources is avoided, and the efficiency of identity recognition verification is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic diagram of an apparatus in a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a first embodiment of a cloud computing-based identity recognition method according to the present invention;
fig. 3 is a functional module diagram of a first embodiment of the cloud computing-based identity recognition method according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
As shown in fig. 1, the apparatus may include: a processor 1001, such as a Central Processing Unit (CPU), a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a WIreless interface (e.g., a WIreless-FIdelity (WI-FI) interface). The Memory 1005 may be a Random Access Memory (RAM) Memory, or may be a Non-Volatile Memory (NVM), such as a disk Memory. The memory 1005 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the configuration shown in fig. 1 does not constitute a limitation of the device, and that in actual implementations the device may include more or less components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a medium, may include therein an operating system, a network communication module, a user interface module, and a cloud computing-based identification method program.
In the device shown in fig. 1, the network interface 1004 is mainly used for establishing a communication connection between the device and a server storing all data required in the cloud computing-based identification method system; the user interface 1003 is mainly used for data interaction with a user; the processor 1001 and the memory 1005 of the cloud computing-based identity recognition method device may be arranged in the cloud computing-based identity recognition method device, and the cloud computing-based identity recognition method device calls the cloud computing-based identity recognition method program stored in the memory 1005 through the processor 1001 and executes the cloud computing-based identity recognition method provided by the implementation of the present invention.
With reference to fig. 2, fig. 2 is a schematic flowchart of a cloud computing-based identity recognition method according to a first embodiment of the present invention.
In this embodiment, the cloud computing-based identity recognition method includes the following steps:
s10: the method comprises the steps of collecting identity information to be recognized on a cloud computing platform, and establishing different information classification set information according to the identity information to be recognized.
It should be understood that, in this embodiment, the system first collects identity information to be recognized on the cloud computing platform, where the identity information to be recognized includes: the method comprises the steps that different information classification sets are established according to identity information to be recognized by user basic information, face information, iris information, electrocardiogram data and fingerprint information, the identity information to be recognized of the same user is marked through the user basic information, and the corresponding identity information to be recognized is stored in the information classification sets.
S20: and counting the numerical value of the computing resource required by each information classification set as a numerical value to be compared, sending a computing request instruction to the server terminal, waiting for the feedback of the server terminal, and extracting the computing resource threshold value of each server terminal from the feedback of the server terminal.
It should be understood that the system then counts the value of the computing resource required by each information classification set, takes the value of the computing resource required by each information classification set as a value to be compared, sends a computing request instruction to the server terminal, and extracts the computing resource threshold value of each server terminal from the server terminal feedback when the server terminal feedback is received; and when the feedback of the server terminal is not received, continuing to wait for the feedback of the server terminal.
It should be understood that, the system will then obtain the platform identification code, send a calculation request instruction to the server terminal through the platform identification code, and the server terminal verifies the received platform identification code and sends the server terminal calculation resource threshold feedback to the corresponding platform when the verification is passed; sending an identity error alert to a corresponding platform when authentication fails
S30: and comparing the numerical value to be compared with the computing resource threshold value of each server terminal, and distributing each information classification set to the corresponding server terminal according to the comparison result.
It should be understood that the system also compares the value to be compared with the computing resource threshold of each server terminal, and when the value to be compared is smaller than the computing resource threshold of each server terminal, the information classification set corresponding to the value to be compared is distributed to the corresponding server terminal; and when the numerical value to be compared is larger than the computing resource threshold value of each server terminal, reselecting the server terminal.
It should be understood that the system may obtain a plurality of corresponding identification methods according to the information classification set, and complete the identification of the identity information to be identified by using the identification method to identify the information classification set through each server terminal.
S40: and identifying the information classification set through each server terminal to finish the identification of the identity information to be identified.
It should be understood that, finally, the system records the recognition result of each recognition method on the information classification set, compares a plurality of recognition results of the same identity information to be recognized with each other, marks the identity information to be recognized and feeds back the identity information to the administrator if the recognition results given by at least 2 recognition methods are inconsistent with the recognition results given by other recognition methods.
The above description is only for illustrative purposes and does not limit the technical solutions of the present application in any way.
According to the above description, it is not difficult to find that different information classification sets are established according to the identity information to be recognized by collecting the identity information to be recognized on the cloud computing platform; counting the numerical value of the computing resource required by each information classification set as a numerical value to be compared, sending a computing request instruction to the server terminal, waiting for the feedback of the server terminal, and extracting the computing resource threshold value of each server terminal from the feedback of the server terminal; comparing the value to be compared with the computing resource threshold value of each server terminal, and distributing each information classification set to the corresponding server terminal according to the comparison result; and identifying the information classification set through each server terminal to finish the identification of the identity information to be identified. According to the embodiment, different identity identifications are combined to carry out verification and identification after the identity identifications are combined in a cloud computing mode, so that the accuracy rate of the identity identification is improved, and meanwhile, the efficiency of the identity identification is also improved by utilizing cloud computing.
In addition, the embodiment of the invention also provides an identity recognition device based on cloud computing. As shown in fig. 3, the cloud computing-based identification apparatus includes: acquisition module 10, extraction module 20, assignment module 30, and identification module 40.
The acquisition module 10 is used for acquiring each piece of identity information to be identified on the cloud computing platform and establishing different information classification sets according to each piece of identity information to be identified;
the extraction module 20 is configured to count a numerical value of a computational resource required by each information classification set as a numerical value to be compared, send a computation request instruction to the server terminal, wait for server terminal feedback, and extract a computational resource threshold of each server terminal from the server terminal feedback;
the distribution module 30 is used for comparing the value to be compared with the computing resource threshold value of each server terminal, and distributing each information classification set to the corresponding server terminal according to the comparison result;
and the identification module 40 is used for identifying the information classification set through each server terminal to complete identification of the identity information to be identified.
In addition, it should be noted that the above-described embodiments of the apparatus are merely illustrative, and do not limit the scope of the present invention, and in practical applications, a person skilled in the art may select some or all of the modules to implement the purpose of the embodiments according to actual needs, and the present invention is not limited herein.
In addition, technical details that are not described in detail in this embodiment may be referred to the cloud computing-based identity recognition method provided in any embodiment of the present invention, and are not described herein again.
In addition, an embodiment of the present invention further provides a medium, where the medium is a computer medium, and the computer medium stores a cloud computing-based identity recognition method program, where the cloud computing-based identity recognition method program, when executed by a processor, implements the following operations:
s1, acquiring identity information to be recognized on the cloud computing platform, and establishing different information classification sets according to the identity information to be recognized;
s2, counting the value of the computing resource needed by each information classification set as the value to be compared, sending a computing request instruction to the server terminal, waiting for the feedback of the server terminal, and extracting the computing resource threshold value of each server terminal from the feedback of the server terminal;
s3, comparing the value to be compared with the computing resource threshold of each server terminal, and distributing each information classification set to the corresponding server terminal according to the comparison result;
and S4, identifying the information classification set through each server terminal, and completing the identification of the identity information to be identified.
Further, when executed by a processor, the cloud computing-based identity recognition method program further realizes the following operations:
acquiring identity information to be identified on a cloud computing platform, wherein the identity information to be identified comprises: the method comprises the steps that different information classification sets are established according to identity information to be recognized by user basic information, face information, iris information, electrocardiogram data and fingerprint information, the identity information to be recognized of the same user is marked through the user basic information, and the corresponding identity information to be recognized is stored in the information classification sets.
Further, when executed by a processor, the cloud computing-based identity recognition method program further realizes the following operations:
counting the numerical value of the computing resource required by each information classification set, taking the numerical value of the computing resource required by each information classification set as a numerical value to be compared, sending a computing request instruction to a server terminal, and extracting the computing resource threshold value of each server terminal from the server terminal feedback when the server terminal feedback is received; and when the feedback of the server terminal is not received, continuing to wait for the feedback of the server terminal.
Further, when executed by a processor, the cloud computing-based identity recognition method program further realizes the following operations:
acquiring a platform identification code, sending a calculation request instruction to a server terminal through the platform identification code, verifying the received platform identification code by the server terminal, and sending server terminal calculation resource threshold feedback to a corresponding platform when the verification is passed; and when the verification fails, sending an identity error alarm to the corresponding platform.
Further, when executed by a processor, the cloud computing-based identity recognition method program further realizes the following operations:
comparing the value to be compared with the computing resource threshold value of each server terminal, and when the value to be compared is smaller than the computing resource threshold value of each server terminal, distributing the information classification set corresponding to the value to be compared to the corresponding server terminal; and when the numerical value to be compared is larger than the computing resource threshold value of each server terminal, reselecting the server terminal.
Further, when executed by a processor, the cloud computing-based identity recognition method program further realizes the following operations:
and acquiring multiple corresponding identification methods according to the information classification set, and identifying the information classification set by using the identification method through each server terminal to finish the identification of the identity information to be identified.
Further, when executed by a processor, the cloud computing-based identity recognition method program further realizes the following operations:
recording the recognition result of each recognition method on the information classification set, comparing a plurality of recognition results of the same identity information to be recognized with each other, marking the identity information to be recognized if the recognition results given by at least 2 recognition methods are inconsistent with the recognition results given by other recognition methods, and feeding back the identity information to the administrator.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (10)

1. An identity recognition method based on cloud computing is characterized in that: comprises the following steps;
s1, acquiring identity information to be recognized on the cloud computing platform, and establishing different information classification sets according to the identity information to be recognized;
s2, counting the value of the computing resource needed by each information classification set as the value to be compared, sending a computing request instruction to the server terminal, waiting for the feedback of the server terminal, and extracting the computing resource threshold value of each server terminal from the feedback of the server terminal;
s3, comparing the value to be compared with the computing resource threshold of each server terminal, and distributing each information classification set to the corresponding server terminal according to the comparison result;
and S4, identifying the information classification set through each server terminal, and completing the identification of the identity information to be identified.
2. The cloud computing-based identity recognition method of claim 1, wherein: in step S1, acquiring identity information to be recognized on the cloud computing platform, and establishing a different information classification set according to the identity information to be recognized, further including the following steps of acquiring the identity information to be recognized on the cloud computing platform, where the identity information to be recognized includes: the method comprises the steps that different information classification sets are established according to identity information to be recognized by user basic information, face information, iris information, electrocardiogram data and fingerprint information, the identity information to be recognized of the same user is marked through the user basic information, and the corresponding identity information to be recognized is stored in the information classification sets.
3. The cloud computing-based identity recognition method of claim 2, wherein: in step S2, counting the number of computing resources required for each information classification set as a number to be compared, sending a computing request instruction to a server terminal, waiting for a server terminal to feed back, and extracting a computing resource threshold value of each server terminal from the server terminal feedback, and further including the steps of counting the number of computing resources required for each information classification set, taking the number of computing resources required for each information classification set as a number to be compared, sending a computing request instruction to the server terminal, and extracting a computing resource threshold value of each server terminal from the server terminal feedback when the server terminal feedback is received; and when the feedback of the server terminal is not received, continuing to wait for the feedback of the server terminal.
4. The cloud-computing-based identity recognition method of claim 3, wherein: sending a calculation request instruction to the server terminal, and extracting a calculation resource threshold value of each server terminal from the server terminal feedback when the server terminal feedback is received; when the feedback of the server terminal is not received, continuing to wait for the feedback of the server terminal, and further comprising the following steps of acquiring a platform identification code, sending a calculation request instruction to the server terminal through the platform identification code, verifying the received platform identification code by the server terminal, and sending the feedback of the calculation resource threshold value of the server terminal to the corresponding platform when the verification is passed; and when the verification fails, sending an identity error alarm to the corresponding platform.
5. The cloud computing-based identity recognition method of claim 4, wherein: in step S3, comparing the value to be compared with the computing resource threshold of each server terminal, and distributing each information classification set to the corresponding server terminal according to the comparison result, further comprising the steps of comparing the value to be compared with the computing resource threshold of each server terminal, and distributing the information classification set corresponding to the value to be compared to the corresponding server terminal when the value to be compared is smaller than the computing resource threshold of each server terminal; and when the numerical value to be compared is larger than the computing resource threshold value of each server terminal, reselecting the server terminal.
6. The cloud computing-based identity recognition method of claim 5, wherein: in step S4, the server terminals recognize the information classification set to complete the identification of the identity information to be recognized, and the method further includes the following steps of obtaining multiple corresponding identification methods according to the information classification set, and recognizing the information classification set by the server terminals by using the identification methods to complete the identification of the identity information to be recognized.
7. The cloud computing-based identity recognition method of claim 6, wherein: the method comprises the steps of utilizing each server terminal to identify information classification sets by utilizing the identification method to complete identification of identity information to be identified, recording identification results of each identification method to the information classification sets, comparing a plurality of identification results of the same identity information to be identified with each other, marking the identity information to be identified and feeding back the identity information to an administrator if the identification results given by at least 2 identification methods are inconsistent with the identification results given by other identification methods.
8. An identification device based on cloud computing, the identification device based on cloud computing comprising:
the acquisition module is used for acquiring identity information to be identified on the cloud computing platform and establishing different information classification sets according to the identity information to be identified;
the extraction module is used for counting the numerical value of the computing resource required by each information classification set as a numerical value to be compared, sending a computing request instruction to the server terminal, waiting for the feedback of the server terminal, and extracting the computing resource threshold value of each server terminal from the feedback of the server terminal;
the distribution module is used for comparing the numerical value to be compared with the computing resource threshold value of each server terminal and distributing each information classification set to the corresponding server terminal according to the comparison result;
and the identification module is used for identifying the information classification set through each server terminal to finish the identification of the identity information to be identified.
9. An apparatus, characterized in that the apparatus comprises: a memory, a processor, and a cloud computing-based identification method program stored on the memory and executable on the processor, the cloud computing-based identification method program configured to implement the steps of the cloud computing-based identification method of any one of claims 1 to 7.
10. A medium, characterized in that the medium is a computer medium on which a cloud computing-based identification method program is stored, which when executed by a processor implements the steps of the cloud computing-based identification method according to any one of claims 1 to 7.
CN202011586675.0A 2020-12-28 2020-12-28 Identity recognition method and device based on cloud computing Active CN112632508B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011586675.0A CN112632508B (en) 2020-12-28 2020-12-28 Identity recognition method and device based on cloud computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011586675.0A CN112632508B (en) 2020-12-28 2020-12-28 Identity recognition method and device based on cloud computing

Publications (2)

Publication Number Publication Date
CN112632508A true CN112632508A (en) 2021-04-09
CN112632508B CN112632508B (en) 2023-10-20

Family

ID=75286206

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011586675.0A Active CN112632508B (en) 2020-12-28 2020-12-28 Identity recognition method and device based on cloud computing

Country Status (1)

Country Link
CN (1) CN112632508B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102457509A (en) * 2010-11-02 2012-05-16 中兴通讯股份有限公司 Safe access method, device and system of cloud computing resource
CN102457507A (en) * 2010-10-29 2012-05-16 中兴通讯股份有限公司 Secure sharing method, device and system for cloud computing resources
CN102811222A (en) * 2012-08-09 2012-12-05 浪潮电子信息产业股份有限公司 Identity identification security method based on cloud computing
US20150039767A1 (en) * 2013-08-05 2015-02-05 Verizon Patent And Licensing Inc. Global cloud computing environment resource allocation with local optimization
CN105187246A (en) * 2015-08-27 2015-12-23 浪潮(北京)电子信息产业有限公司 Method and system for expanding calculation nodes in cloud platform
CN108984286A (en) * 2018-06-29 2018-12-11 广东工业大学 A kind of resource regulating method and system of cloud computing platform
CN110362388A (en) * 2018-04-11 2019-10-22 中移(苏州)软件技术有限公司 A kind of resource regulating method and device
CN111865964A (en) * 2020-07-16 2020-10-30 董海霞 Identity authentication system based on enterprise private cloud encrypted file system
US20200379813A1 (en) * 2019-05-31 2020-12-03 Altair Engineering, Inc. Allocation of cloud computing resources

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102457507A (en) * 2010-10-29 2012-05-16 中兴通讯股份有限公司 Secure sharing method, device and system for cloud computing resources
CN102457509A (en) * 2010-11-02 2012-05-16 中兴通讯股份有限公司 Safe access method, device and system of cloud computing resource
CN102811222A (en) * 2012-08-09 2012-12-05 浪潮电子信息产业股份有限公司 Identity identification security method based on cloud computing
US20150039767A1 (en) * 2013-08-05 2015-02-05 Verizon Patent And Licensing Inc. Global cloud computing environment resource allocation with local optimization
CN105187246A (en) * 2015-08-27 2015-12-23 浪潮(北京)电子信息产业有限公司 Method and system for expanding calculation nodes in cloud platform
CN110362388A (en) * 2018-04-11 2019-10-22 中移(苏州)软件技术有限公司 A kind of resource regulating method and device
CN108984286A (en) * 2018-06-29 2018-12-11 广东工业大学 A kind of resource regulating method and system of cloud computing platform
US20200379813A1 (en) * 2019-05-31 2020-12-03 Altair Engineering, Inc. Allocation of cloud computing resources
CN111865964A (en) * 2020-07-16 2020-10-30 董海霞 Identity authentication system based on enterprise private cloud encrypted file system

Also Published As

Publication number Publication date
CN112632508B (en) 2023-10-20

Similar Documents

Publication Publication Date Title
CN109509021B (en) Behavior track-based anomaly identification method and device, server and storage medium
US20190012450A1 (en) Biometric-based authentication method, apparatus and system
CN109389723B (en) Visitor management method and device using face recognition and computer equipment
WO2019196303A1 (en) User identity authentication method, server and storage medium
CN110544109A (en) user portrait generation method and device, computer equipment and storage medium
CN109194689B (en) Abnormal behavior recognition method, device, server and storage medium
CN109600336A (en) Store equipment, identifying code application method and device
CN111260220B (en) Group control equipment identification method and device, electronic equipment and storage medium
CN111949702B (en) Abnormal transaction data identification method, device and equipment
CN110933147A (en) Information technology analysis system based on cloud computing
CN110795714A (en) Identity authentication method and device, computer equipment and storage medium
CN113412607B (en) Content pushing method and device, mobile terminal and storage medium
CN110929244A (en) Digital identity identification method, device, equipment and storage medium
CN112507314B (en) Client identity verification method, device, electronic equipment and storage medium
CN109088788B (en) Data processing method, device, equipment and computer readable storage medium
CN111191207A (en) Electronic file control method and device, computer equipment and storage medium
CN104980421A (en) Method and system for processing batch requests
CN110675252A (en) Risk assessment method and device, electronic equipment and storage medium
CN110807050B (en) Performance analysis method, device, computer equipment and storage medium
CN110851334B (en) Flow statistics method, electronic equipment, system and medium
CN112115455B (en) Method, device, server and medium for setting association relation of multiple user accounts
CN107391980B (en) Login verification method, device, equipment and storage medium based on equipment data
CN113486316A (en) User identity authentication method and device, electronic equipment and readable storage medium
CN111339317A (en) User registration identification method and device, computer equipment and storage medium
CN112632508A (en) Identity recognition method and device based on cloud computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant