Identity authentication method and device

A technology of identity authentication and user identity authentication, which is applied in the direction of instruments, induction recording carriers, character and pattern recognition, etc., can solve the problems of certificates and IC cards being easily used and counterfeited, insufficient storage space, etc., so as to facilitate promotion and improve The effect of safety and simple structure

Inactive Publication Date: 2010-11-17
HANVON CORP
View PDF3 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention adopts face recognition as the basis of identity authentication, adopts IC card and face double authentication, fundamentally avoids the shortcoming that certificates and IC cards are easily used and forged as identity authentication; The combination of technologies solves the problem of insufficient storage space for embedded face recognition devices and promotes the promotion of embedded identity authentication applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0043] Such as figure 1 As shown, in the embodiment of the present invention, the flow of the identity authentication method may include:

[0044] Step 101, read the card information of the IC card, and authenticate the IC card according to the card information.

[0045] Step 102. When the IC card is successfully authenticated, read facial feature data from the IC card.

[0046] Step 103: Perform identity authentication on the card user according to the face feature data of the card user and the face feature data read from the IC card.

[0047] Depend on figure 1 As can be seen from the flow shown, the IC card needs to be pre-written with card information and face feature data.

[0048] The card information of the IC card, as the basic information of the user, can be stored in a memory as the card's authorization identification, so as to facilitate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method and a device, belonging to the communication and computer technical field. The method comprises the following steps: reading the card information of an integrated circuit (IC) card, and authenticating the IC card according to the card information; when IC card authentication is successful, reading facial feature data from the IC card; and authenticating the identity of a cardholder according to the facial feature data of the cardholder and the facial feature data read from the IC card. The invention also discloses an identity authentication device. The security of user identity authentication can be improved by using the method and the device of the invention. In the invention, an embedded CPU is used to carry out double authentication of the IC card and the facial feature data. Compared with the prior art using a bulky PC application system, the invention has simple structure, easy installation and use and easy popularization, can be widely applied to an access control system, an attendance system and other intelligent application systems, and can carry out intelligent control on different authorities in the systems, thus meeting the demands of different users.

Description

technical field [0001] The invention relates to the technical fields of communication and computer, in particular to an identity authentication method and device. Background technique [0002] There are many fields that require identity authentication in real life, such as: customs, banks, confidential departments, companies, etc. There are also many methods that can be used as identity authentication, such as: passport, ID card, work permit, password, work card, etc. However, these methods have the disadvantages of being easily lost and forged, and are not sufficiently safe and reliable. With the development of science and technology, the use of human biometrics as identity authentication has gradually been realized. Due to the uniqueness of human biological characteristics, more accurate identity authentication, and less likely to be stolen, more and more fields that require identity authentication use human biological characteristics as the basis for identity authentica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00G06K7/00G06K9/00
Inventor 石践曾建军金友芝任亚娟
Owner HANVON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products