Objectively detected identity recognition method based on human brain memory character

An identity recognition and memory technology, applied in the field of personal identity recognition, can solve problems such as theft and forgery, and achieve the effect of high precision and good repeatability

Inactive Publication Date: 2008-08-20
TSINGHUA UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These three processes are subject to security attacks such as embezzlement and forgery

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Objectively detected identity recognition method based on human brain memory character
  • Objectively detected identity recognition method based on human brain memory character
  • Objectively detected identity recognition method based on human brain memory character

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] P300 was first discovered in 1965 by American psychologist Sutton et al. When the subject recognized the "target stimulus", the largest late positive wave recorded on the scalp with a latency of about 300 ms was the P300. P is the abbreviation of English "positive wave" (positivity), and 300 means that the latency is about 300ms.

[0052] figure 1 That is a typical P300 potential waveform. The classic stimulation mode to elicit P300 potential is the novel (Oddball) experimental mode. The main point of this experimental model is: a series of stimuli to the same sensory pathway consists of two stimuli, one stimulus has a high probability of appearing (such as 85%), which is called the standard stimulus; the other stimulus has a small probability of appearing ( Such as 15%), known as novel stimuli. The order in which the two stimuli appear is random. In this way, the deviated stimulus is accidental for the subject, so that the subject can press a button or remember its...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a personnel ID recognition method, which comprises the following steps: inputting the public information base into the computer; setting the detecting electrode in the detected head; affirming the relative and irrelative history information of detected ID through computer; classifying the grade to affirm the testing frequency; regarding the target stimulation type as target and non-target stimulation; setting the target information group and non-target information group with the target information less than one third whole information unit; forming the visual-to-acoustic memory evoked stimulation sequence randomly; sending the stimulation sequence for the detected object; extracting the brain wave through electrode; extracting P300 potential waveform of target stimulation through coherent analytical method; affirming the ID according to the set target stimulation.

Description

technical field [0001] The invention belongs to the technical field of personal identification. Background technique [0002] In modern society, with the rapid development of computer and network technology, information security has shown unprecedented importance. Identity authentication is a necessary prerequisite to ensure system security. In financial, national security, judicial, e-commerce, e-government and other application fields, accurate identity authentication is required, such as whether someone has the right to enter a secure area (security system), whether there is The right to conduct specific transactions, how to provide protection for certain special information with separate passwords or keys, etc. There are two main types of identification methods: [0003] 1. Traditional identification [0004] Currently widely used personal identification methods are mainly ID cards (such as ID cards, work permits, smart cards, computer logo cards and savings cards, et...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): A61B5/00A61B5/0476A61B5/117G06F19/00G06K9/00
Inventor 高小榕洪波高上凯张志广
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products