Identity authentication system and method thereof

A technology of identity authentication and authentication code, applied in the direction of digital data authentication, etc., can solve problems such as insufficient consideration in practice, and achieve the effect of increasing difficulty and reducing risks.

Inactive Publication Date: 2015-07-15
UTECHZONE CO LTD
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In other words, if the internal code of the RFID is cracked, those interested only need to modify the internal biometric data to skip the biometric identification process, which is not very considerate in practice

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication system and method thereof
  • Identity authentication system and method thereof
  • Identity authentication system and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] Relevant detailed description and technical contents of the present invention are described as follows with regard to matching drawings now.

[0088] see figure 1 , is a schematic block diagram of the identity authentication device of the present invention, as shown in the figure: the present invention provides an identity authentication system for performing identity authentication on a user so as to determine whether the user is a legitimate user. The identity authentication system mainly includes an image capture device 10 for obtaining multiple user images, a verification database 40 storing pre-stored biometric templates and action information authentication codes, and a verification database 40 for processing images and targeting the above-mentioned A processing unit 30 for comparing authentication codes, and a wireless transmission unit 20 (such as Figure 9 shown). The image capture device 10 can be a general planar camera, an active depth camera (Active Depth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication system and a method thereof. The identity authentication system comprises an image processing module, a verification database and a processing unit. An image acquisition device is used for obtaining images of a plurality of users. The verification database stores a biological characteristic template and an action message authentication code. The processing unit is coupled to between the image acquisition device and the verification database, analyzes images of the users in order to generate a biological characteristic and a face dynamic message, and generates an action message code in dependence on the face dynamic message. If the biological characteristic accords with the biological characteristic template, the processing unit compares the action message code with the action message authentication code. If the action message code accords with the action message authentication code, the identity of the user is verified successfully. According to the invention, a multiple authentication manner is employed, the difficulty degree of password cracking is greatly improved, and the risk that the password is cracked is reduced.

Description

technical field [0001] The present invention relates to an identity authentication system, in particular to an identity authentication system that enhances the difficulty of password cracking through multiple identity authentication procedures. Background technique [0002] At present, the common anti-theft locks on the market can be mainly divided into two types, one is the traditional mechanical lock, and the other is the electronic lock. [0003] Traditional mechanical locks have the advantages of low cost, easy manufacturing and maintenance, and low error rate. However, due to inherent structural limitations, almost all mechanical locks are quite easy to crack for the unlocker. To be honest, even those who are willing to study locks carefully, it is not difficult to learn the skill of cracking mechanical locks. Therefore, it is often said that the function of mechanical locks is to prevent gentlemen rather than villains, and the market is gradually tending to conduct re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32
Inventor 邹嘉骏赖昀暘
Owner UTECHZONE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products