Verification method achieved by combining human faces with identities

An identity verification method and identity verification technology, applied in digital data authentication, instruments, electronic digital data processing, etc., can solve the problems of security problems and limit the large-scale promotion and application of biometric identification technology, and achieve the effect of high security

Inactive Publication Date: 2014-03-19
SOUTHEAST UNIV
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in the actual application process, the security problems caused by the theft of fixed biometrics limit the large-scale promotion and application of biometric technology.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method achieved by combining human faces with identities
  • Verification method achieved by combining human faces with identities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] User Zhang San first sets up an account in the bank and submits face information and his chosen identity verification password of 56789, 2525 alarm password and 111888 backup password to be included in the database of the bank server. Then Zhang San needs to pay for online shopping through the client installed on the mobile phone. After logging into the bank account, he first captures his face image through the mobile phone camera and sends the ciphertext obtained through the symmetric encryption algorithm to the bank server. After feature extraction and template extraction, it is compared with the face information in the bank server database. After the comparison is matched, the bank server notifies Zhang San to enter the identity verification password through the cipher text, and Zhang San enters the identity verification password through the dynamic soft keyboard that comes with the client. And the ciphertext obtained through the asymmetric encryption algorithm is sen...

Embodiment 2

[0027] After a prison system sets up an access control system network, it first collects the face information submitted by each prison guard and the 13856 identity verification password and 25888 alarm password selected by the prison guard A to be included in the database of the access control system server. Usually prison guard A goes to work through the client with camera and dynamic soft keyboard installed at each cell door of the prison to use his face information to log in. The server compares the face image of prison guard A with the face information in the database of the access control server through feature extraction and template extraction. The built-in dynamic soft keyboard enters the identity verification password and sends the ciphertext obtained through the asymmetric encryption algorithm to the access control server. The access control server compares the identity verification password entered by prison guard A with the password information in the database, and ...

Embodiment 3

[0030] Wang Wu installs an authentication system with a camera and a dynamic soft keyboard on the safe, so that the safe can only be opened after successful authentication. Then Wang Wu submitted his face information and his selected 666888 identity verification password, 5188 alarm password and LI12345 backup password to be included in the database of the safe server. At this point the client and server are merged together. When Li Si needs to open the safe later, he first needs to log in through face information. The identity verification system of the safe compares Wang Wu's face information with the face information in the identity verification system database after feature extraction and template extraction. After matching, prompt to enter the identity verification password. Wang Wu enters the identity verification password through the dynamic soft keyboard of the identity verification system. The identity verification system compares the identity verification password en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a verification method achieved by combining human faces with identities, and relates to information safety. In particular, fixed biological characteristic information of the human faces is combined with password information input by a dynamic soft keyboard. The verification method is based on a client side and a server side, the client side is provided with the dynamic soft keyboard and an information extraction system except that the client side allows identity verifiers to log in, the client side can obtain human face images of the identity verifiers or further obtain human face information through characteristic extraction and template extraction, information comparison can be carried out on the human face information, the information extraction system is provided with passwords composed of dynamic soft keyboard codes. Therefore, not only can relatively high security, reliability and conveniences of human body biological characteristic recognition be developed, but also dynamic characteristics of passwords can be exerted to eliminate the safety problem caused by the fact that the biological characteristic information is stolen, meanwhile, due to the fact that complexity of the passwords can be lowered, burdens of password memory on the identity verifiers can be lightened, improvement of information safety is facilitated, and furthermore, popularization and application of the authentication technology are promoted.

Description

technical field [0001] The invention relates to a face combination identity verification method, in particular combining face information with specific biological features and coded password information of a soft keyboard capable of dynamic encryption, so as to realize the combination of static biological feature encryption and dynamic coded password to improve Security based on biometric authentication. Background technique [0002] Entering the 21st century, the progress of science and technology has made the society quickly enter the information age. The rapid development of information technology has made people's information exchange more convenient and faster, and the work efficiency has been greatly improved, reshaping our society from all aspects. . However, the ensuing information security issues such as information theft, fraudulent use or tampering have also brought severe challenges to the development of our society. According to the estimates of the US Federal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32H04L29/06
CPCG06F21/32G06F2221/2105G06F2221/2131
Inventor 张继中
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products