productsSolutionsservicesSupport
 
 
Index >> Solutions >> Enterprise
Enterprise
 Best IT management solution in Enterprise

Overview
 

General

By providing solution based on security technology, we offers a integrated, perfect, and secure login environment for companies, which enables the employees there convenient to log on to corresponding transaction system and solves many security problems occurred in their daily working.

Data centralization system and decentralized Operation have been the trend for transaction system. However, what is widely used in companies now is still traditional PASSWORD.

The existing PASSWORD identity authentication has some big problems as follows:

Firstly, weak risk awareness of employees and easy access to get password, give rise to security issues for the whole system --not only bring economic loss to companies but also damage their social image.

Secondly, because of its technical deficiency, PASSWORD identity authentication is bad in terms of security, and easy to copy and pattern.

Finally, the shortcoming of the traditional method that only objects but humans can be recognized cut the connection between authorization and user, increasing the difficulty for management.

 

System structure

 

Plug-in fingerprint identification system

In this solution, a fingerprint authentication server, on which the operations of verification and storage of fingerprint data will be carried out, is used to independent to AP system. The server only preserves the user information and fingerprint related information. When users need to authenticate, system will prompt them to carry out the operation by fingerprints, at the same time sent the account number and fingerprint data to the server for fingerprint recognition, only after the passage of authentication the follow-up operation is carried out.

The benefits of this solution are to small change of the system, fast implementation and quick results. At the same time, control more flexible and user identity authentication may make use of the three options: password only, fingerprint only, and password + fingerprint.

 

Embedded fingerprint identification system

 

In this solution, fingerprint authentication server combining with existing AP systems, fingerprint data is directly preserved in the existing database and verification operation is carried out on the original AP server. When users need to authenticate, system will prompt them to carry out the operation by fingerprints, at the same time sent the account number and fingerprint data to the server for fingerprint recognition, only after the passage of authentication the follow-up operation is carried out.

In this solution, higher security system is ensured by the seamless combination of fingerprint system and the existing system. At the same time, due to the fingerprint data and user information in the original database, the maintenance of the server capacity significantly reduced. To verify the identity of the user may make use of the three options: password only, fingerprint only, and password + fingerprint.

 

 

Benefit

1. Centralized storage and management of fingerprint data

Fingerprint identity authentication system will be designed on the principle of centralized storage and management. It realizes the management by united management of collection and storage of fingerprint information. Meanwhile, based on transaction requirement, the system stores fingerprint image and/or template data of employees. The system supports main C/S and B/S mode

2. Fingerprint comparison in the background

Fingerprint identity authentication system will be designed on the principle of background comparison. Fingerprints will be compared in the background database and integrated with transaction.

3. Based on advanced technology

This system is designed based on the high advanced technology, which can be seen in the system architecture and performance of fingerprint devices.

 

4. Open and expansible

This system supports the extension of system architecture. With modularization design, the software and hardware are equipped with expansion capability to meet the expanding range of applications, increasing the need for multiple functions

5. Reliability and emergency response

Only if the system is definitely reliable, then it can work normally and properly. It needs perfect breakdown recovery mechanism and fault tolerance mechanism.

6. Variety of security mechanism

Different level and cost of service are offered according to different requirement for security. Various security mechanisms are set up to meet different requirement of security.