Iris identification method and apparatus

An iris recognition and iris technology, applied in the electronic field, can solve the problems of easy theft, leakage of iris template, and inability to replace iris, etc., and achieve the effect of preventing leakage

Active Publication Date: 2016-05-04
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the uniqueness and immutability of the iris, once the user's iris template is leaked, the security risk is irreversible, that is, the user cannot use a method similar to "replacing the password" to replace the iris
At the same time, electronic terminals are easy to be stolen due to their small size and portability, so how to ensure the security of the stored iris templates is a critical issue when applying iris recognition solutions on electronic terminals
At present, the main solution is to directly store the iris template in the terminal, or encrypt and save the iris template through a password set by the user. However, due to the reversibility of password encryption (that is, there is a decryption method that can restore the original data), there are still attackers who can After successfully decrypting the encrypted iris template, the possibility of leaking the iris template

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Iris identification method and apparatus
  • Iris identification method and apparatus
  • Iris identification method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0026] figure 1 It is a schematic flow chart of the iris recognition setting method in the embodiment of the present invention. The flow of this method can be implemented by an iris recognition device, and the iris recognition device can be a user iris recognition device or a software program running on a user iris recognition device. The identification device may include a mobile phone, a notebook computer, a tablet computer, a vehicle computer, a POS (PointOfSale...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an iris identification method. The method comprises: iris feature information of a user is obtained; a vault value that is generated in advance is read, wherein the vault value is obtained in advance by calculation based on iris feature information of an authorized user and a preset encrypted secret key; according to the iris feature information of the user as well as the vault value, a decrypted secret key is calculated; whether the decrypted secret key obtained by calculation matches the preset encrypted secret key is determined; and if so, success of the iris identification is confirmed. In addition, the invention also discloses an iris identification apparatus. With the method and apparatus, encryption protection can be carried out on the terminal and leakage of iris feature information can be prevented effectively.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to an iris recognition method and device. Background technique [0002] As the use scenarios and functions of electronic terminals become more and more extensive, more and more personal privacy information is stored in electronic terminals. Therefore, there are higher and higher requirements for the security and privacy of electronic terminals. Iris recognition It is a very popular identification method at present. However, due to the uniqueness and invariance of the iris, once the user's iris template is leaked, the security risk is irreversible, that is, the user cannot use a method similar to "replacing the password" to replace the iris. At the same time, electronic terminals are easy to be stolen due to their small size and portability. Therefore, when an iris recognition solution is applied to electronic terminals, how to ensure the security of stored iris templates is a c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06F21/60
CPCG06F21/602G06V40/197G06F21/60G06F18/00
Inventor 钟焰涛傅文治蒋罗
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products