Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

199results about How to "Improve authentication accuracy" patented technology

Authentication techniques in a monitoring system

An Electronic House Arrest Monitoring (EHAM) system of the present invention includes a transmitter attached to a monitored offender and a receiver positioned in the vicinity of the desired monitoring location. The transmitter and the receiver each have a pattern stored or generated therein for determining the interval of time between signal transmissions and receptions. The pattern is pseudo-random to offer improved protection against imposter transmitters, in other words the time intervals are selected to be unequal and randomly varying but the pattern is repeated or cycled to allow continuing signal transmission by the transmitter. The transmitter transmits signals at varying time intervals according to this pattern, and the receiver authenticates signals it receives as coming from the monitored transmitter based on the expected time intervals from the pattern. The pattern may include any number of time intervals and, in one embodiment, includes more than one subpattern to extend the length of the repeat cycle to increase the difficulty of defeating the monitoring system. As further protection against imposter devices, the receiver may verify the signals based on information unique to the transmitter included in each signal. The receiver may further use the received signals and unique time interval patterns to determine a number of operating states, including New Transmitter ID Received, Transmitter In Range and Locked to Transmitter, Transmitter In Range and Not Locked, Transmitter Out of Range, and Imposter Likely. The monitoring system may also include a remote host computer linked to the receiver or receivers to enable these operating states to be monitored remotely by enforcement personnel.
Owner:BI

Biometrics authentication method and biometrics authentication system

A biometrics authentication system detect body characteristics, verify the characteristics against registered biometrics data to perform individual authentication. In 1:n authentication, a plurality of different type biometrics database sets of a user are registered in a database, and at the time of verification of one type biometrics data set with one type registered biometrics data set, the control unit judges whether similar biometrics data sets of other person are registered, and if other person's similar biometrics data sets are registered, performs verification of each of the another type biometrics data sets of the plurality of similar biometrics data sets with the detected another type biometrics data set, and identifies the individual in question.
Owner:FUJITSU LTD

Design method of safety face verification system based on CNN (convolutional neural network) feature extractor

The invention provides a design method of a safety face verification system based on a CNN (convolutional neural network) feature extractor, belongs to the field of biological feature identification, and particularly relates to a method of utilizing the CNN to extract face features and using a Paillier algorithm and an oblivious transfer technique to encrypt. Compared with the SCiFi (secure computation of face identification) system, the method has the advantages that the manually extracted feature is converted into the CNN self-learning feature, and the CNN self-learning feature is performed with binarization to remove the noise effect, so that the identification accuracy is higher; the testing identification rate is 91.48% on a view 2 of an LFW (labeled face wild) base; in the whole identification process, a server will not obtain any feature information of a requester, and only receive the feature ciphertext information, but not decrypt; a client only obtains whether the identification is passed or not, and does not know the other information, including hamming distance; one face picture is expressed by the 320bit feature, and compared with the SCiFi system, the feature data volume is decreased by 2/3, so that the consumption time of encrypting and identification is low, and the real-time performance is high.
Owner:BEIJING UNIV OF TECH

Registration determination device, control method and control program therefor, and electronic apparatus

Whether an obtained candidate face image is registered or not is appropriately determined. A similarity degree calculating unit calculates the degree of similarity between a candidate face image extracted by a face image extracting unit and a registration face image registered in a storage unit. An in-class variance calculating unit calculates an in-class variance of the degree of similarity of the registered person identified by a registered person identifying unit, and an inter-class variance calculating unit calculates an inter-class variance of the degree of similarity of each registered person registered in the storage unit. A variance ratio calculating unit calculates a variance ratio between the inter-class variance and the in-class variance, and on the basis of the calculated variance ratio, a registration determining unit determines whether a target face image is to be registered or not.
Owner:ORMON CORP

Terminal authentication system, server device, and terminal authentication method

ActiveUS20150350196A1Improve terminal authentication accuracyImproving terminal authentication accuracyTransmissionClient-sideAuthentication system
Provided is a terminal authentication system including a client terminal and a server device. The client terminal transmits first information based on secret information different for each client terminal and a client certificate including a hash value of the secret information which is derived from the secret information, to a server device. The server device receives the first information and the client certificate, derives a hash value from the secret information based on the first information using a unidirectional function, and authenticates the client terminal on the basis of the derived hash value and the hash value of the secret information which is included in the client certificate.
Owner:PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO LTD

Authenticating prescriber identity to enable electronically ordering drug samples from a drug sample fulfillment platform

An fully online process to facilitate the fulfillment of drug samples to prescribers is described. With the present invention, a prescriber may order physical drug samples online by undergoing an authentication process that is in lieu of requiring a signature match. In the invention, the ordering of drug samples is made over a communication network without requiring a handwritten signature.
Owner:SYMMETRYRX LLC

Intelligent vein authentication method and system having autonomous learning capability

The invention discloses an intelligent vein authentication method and system having autonomous learning capability. The method comprises steps that model training of the full convolutional neural network depth learning model in repeated and regular global training and irregular local training modes is carried out, before online operation of the full convolutional neural network depth learning model, one global training is carried out through utilizing accumulated samples, and optimized characteristic extraction, characteristic identification and characteristic classification parameters are stored; after online operation of the model, newly-registered samples are utilized to carry out irregular local training of the model, and characteristic classification parameter optimization is completed; under the specific condition, the newly-accumulated samples are utilized to carry out regular global training of the model, and the characteristic extraction, characteristic identification and characteristic classification parameters are optimized for another time, the model is guaranteed to be the intelligent authentication system having the autonomous learning capability, and vein authentication precision is further enhanced.
Owner:通华科技(大连)有限公司

Machine learning-based physical layer channel authentication method

The invention discloses a physical layer channel authentication method based on machine learning. The method comprises the steps of S1, collecting the information packet channel information (CSI) of alegal information sender A and a simulated illegal information sender E by means of a receiver B; S2, pre-processing the information packet channel information of the legal information sender A and the simulated illegal information sender E by the receiver B; S3, generating a binary training data set by the receiver B; S4, based on the classification algorithm in the machine learning algorithm, carrying out the training by the receiver B according to the binary training data set to generate a classifier; S5, judging whether a received information packet is legal or not by the receiver B by utilizing the classifier, and realizing the authentication of the information packet. The invention provides the physical layer channel authentication method based on machine learning. The method is suitable for authentication equipment and authentication scenes with limited resources. The method has the advantages of low calculation complexity and high authentication accuracy.
Owner:UNIV OF ELECTRONIC SCI & TECH OF CHINA

Face authentication method and device

The embodiment of the invention provides a face authentication method and a face authentication device. The method comprises the following steps of conducting the feature extraction on the data of a same target face through a first convolution neural network and a second convolution neural network respectively so as to obtain a corresponding first face feature and a corresponding second face feature, wherein the first convolution neural network and the second convolution neural network are trained through different loss functions; combining the first face feature and the second face feature into combined face features; and conducting authentication treatment on the data of the target face based on the combined face features. According to the embodiment of the invention, the accuracy of face authentication can be improved.
Owner:BEIJING EYECOOL TECH CO LTD

Wireless access point safe authentication method and system

Disclosed is a wireless access point safe authentication method and system. The method comprises transmitting a discovery request message from a wireless access point to a wireless controller; receiving the discovery request message from the wireless controller, analyzing the discovery request message to obtain the serial number and the MAC (media access control) address of the wireless access point, and transmitting a discovery responding message to the wireless access point; receiving the discovery responding message from the wireless access point and analyzing the discovery responding message to obtain the IP (Internet protocol) address information of the wireless controller, binding the IP address information with the wireless controller, and transmitting a connection request message to the wireless controller; after receiving the connection request message from the wireless controller, determining whether the serial number and the MAC address of the wireless access point are matched with a prestored serial number and a prestored MAC address; if so, establishing a communication channel between the wireless controller and the wireless access point. By taking that whether the serial number and the MAC address of the wireless access point are matched as the access basis, the wireless access point safe authentication method and system prevents unallowed wireless access points from access to the wireless controller, thereby improving the authentication accuracy.
Owner:湖南恒茂信息技术有限公司

Cross-platform identity authentication system and method based on human-computer interaction behaviors

ActiveCN104778387ASolve the problem of reduced authentication accuracyImprove authentication accuracyDigital data authenticationAuthentication systemHuman system interaction
The invention discloses a cross-platform identity authentication system and method based on human-computer interaction behaviors. The cross-platform identify authentication method comprises the following steps that (1) a user enters a behavior authentication system, wherein the behavior authentication system judges whether the user is a new user, and if so, a step (2) is carried out for registration, and if the user is a registered user, a step (3) is carried out for cross-platform detection; (2) the new user carries out registration; (3) cross-platform detection is carried out, and if the user crosses platforms, a step (5) is carried out for cross-platform identity authentication; (4) single-platform identity authentication is carried out; (5) cross-platform identity authentication is carried out, a cross-platform feature library of the user is updated, and a single-platform identity authentication model is established. Under an existing internet environment, the user can often access the same network account by using different terminal equipment, and the accuracy of a traditional identity authentication technology based on the human-computer interaction behaviors is greatly reduced by different hardware environments. The problems can be effectively solved by the cross-platform authentication method based on a cross-platform identity verification model.
Owner:XI AN JIAOTONG UNIV

Personal authentication system and personal authentication method

A personal authentication system comprises an imaging section for capturing an image of a user's eye including the iris; pupil / iris region extraction section for extracting a pupil region and an iris region from the captured image; a three-dimensional polar coordinate image creation section for estimating the three-dimensional center position of the eyeball based on the extracted pupil region and iris region and for creating a three-dimensional polar coordinate image by converting the iris region into three-dimensional coordinates with reference to the center position of the eyeball; and a three-dimensional polar coordinate image coding section for creating a three-dimensional polar coordinate image code formed by extracting and coding a characteristic of the created three-dimensional polar coordinate image. The personal authentication system can create iris information highly accurately representing characteristics of a user's iris independent of the direction of line of sight of the user.
Owner:OKI ELECTRIC IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products