authentication system
A technology for identity authentication and authentication equipment, applied in user identity/authority verification, transmission systems, electrical components, etc., can solve the problems of single-factor authentication insecurity, high cost, insufficient security and usability, etc., to improve security The effect of sex and ease of use
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0039] Example 1: CJ is the fingerprints of all the fingers of the user, ZJ=CJ, the collected sample is the fingerprint of a certain finger.
example 2
[0040] Example 2: CJ is the voice set 0-99, ZJ={10,20,30,40,50,60,70,80,90}, the collected sample is the data of a specified voice.
[0041] Example 3: CJ is a set of all 5 letters, ZJ=CJ, the collection sample is to input a string of 5 letters with the keyboard, such as abcde, ijkom, etc.
[0042] The present invention can be implemented and has the principle that the identity authentication has higher security and ease of use:
[0043] Principle 1: Biometric information should not be used directly. If it is used directly, especially in remote authentication, the characteristic information must be directly used for network transmission, which creates a considerable security risk. If there is a leak during the transmission, it will be more dangerous in the later use process, because usually a very high security confidence is placed on the biometric feature, and it will be more difficult to find the problem. And usually there are relatively few biological characteristics (for...
Embodiment 1
[0047] Embodiment 1: The biometric feature used in this embodiment is voiceprint, and corresponding to this solution, the following technical solutions are included.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 