Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for verifying authorization on basis of biological recognition

A verification method and biometric technology, applied in the field of biometrics, can solve problems such as poor accuracy of verification results, complexity of identity confirmation work, and the inability of biometric terminals to retrieve and output characteristic data, etc.

Inactive Publication Date: 2015-03-25
HIERSTAR SUZHOU
View PDF3 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The above identity verification has at least the following disadvantages: there is a delay in retrieving and matching the feature data of the extracted biometric image in the database to the output, and in the absence of a network, the biometric terminal cannot retrieve and output the matching from the database. Characteristic data, and manual verification to ensure that the identity is legal and the user and the certificate are consistent, resulting in the complexity of the identity confirmation work, and the verification results have problems of poor accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for verifying authorization on basis of biological recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] figure 1 It is a flowchart of a biometric information authorization verification method provided in Embodiment 1 of the present invention.

[0024] Such as figure 1 As shown, the biometric information authorization verification method includes the following steps:

[0025] Step 101, the user terminal collects first biometric information of the user according to an instruction input by the user for collecting biometric characteristics.

[0026] Specifically, the user terminal may be a biological collection device such as a mobile phone, a computer, and a tablet computer with a camera function; the first biological feature information is the biological feature information of the user to be authenticated for identity authorization.

[0027] When using a biometric storage device for identity authorization verification, the user enters an instruction to collect biometric information on the user terminal as needed to enable the biometric information collection function, for...

Embodiment 2

[0048] In this embodiment, the biometric information stored in the biometric storage device can be specifically the facial information of the user; the biometric storage device can be specifically an ID card with a wireless near-field communication NFC function; the user terminal can be specifically a camera function and a wireless Connected phone. Taking mobile phone card authorization or mobile phone function authorization as an example, the identity authorization verification process is described in detail. The specific identity authorization verification process is as follows:

[0049] The mobile phone collects the user's facial feature information according to the command of collecting facial feature information input by the user; when the mobile phone receives the command of collecting facial feature information, the mobile phone sends a wireless connection request to the ID card; after the ID card receives the wireless connection request message sent by the mobile phone...

Embodiment 3

[0051] This embodiment provides a mobile phone and a bank card for identity authorization through wireless communication. In this embodiment, online transfer is taken as an example. The specific process is as follows:

[0052] The user conducts online transfer through the mobile phone, and the user enters the online transfer application software of the mobile phone through the user name and password set; then enters the name of the owner of the transfer account, the transfer account, the transfer amount and other relevant transaction information; the transfer application software prompts the user to perform identity authorization verification; According to the prompt information, send a wireless connection request message to the bank card; when the bank card receives the wireless connection request message sent by the mobile phone, it matches the identity of the mobile phone and the bank card, and sends a wireless connection response message to the mobile phone; the mobile phone...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for verifying authorization on the basis of biological recognition. The method includes acquiring first biological characteristic information of users according to biological characteristic acquisition instructions inputted by the users; acquiring biological characteristic information bases in biological characteristic storage equipment; matching the first biological characteristic information with biological characteristic information in the biological characteristic information bases; determining that the users pass authorization verification if the first biological characteristic information is successfully matched with the biological characteristic information in the biological characteristic information bases. At least one piece of biological characteristic information is preliminarily stored in each biological characteristic information base. The method has the advantages that characteristic images of biological information of the users are stored in the biological characteristic storage equipment by the aid of biological recognition, and accordingly the users and documents can be efficiently verified, can be verified in an offline manner and can be automatically verified.

Description

technical field [0001] The invention relates to the field of biometric identification, in particular to an authorization verification method based on biometric identification. Background technique [0002] With the development of the economy, there are various unstable factors in the security issues of individuals and public places. In order to ensure the safety of people and finances, many occasions, such as public places: train stations, subways, libraries, banks, etc. require legal identities to Enter, the current verification of legal identity uses real-name identity verification, using biometric technology. [0003] Biometric identification is a biometric identification technology based on the user's biometric information. The biometric terminal collects images or video streams containing biometric data, and automatically detects and tracks creatures in the images, and then detects the detected biometrics. Perform biometric data matching and biometric image recognition...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32
CPCG06F21/32
Inventor 张鹏鲍文彬李敏刚谢涛令张徴
Owner HIERSTAR SUZHOU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products