Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and system based on multi-factor, multi-engine, human-machine combination

An identity verification method and identity verification technology, applied in the direction of digital data authentication, etc., can solve problems such as inability to guarantee recognition results, failure to achieve accuracy, sensor noise, and defects in feature extraction and matching, and achieve high recognition accuracy Effect

Inactive Publication Date: 2018-10-12
BEIJING INFORMATION SECURITY ALLIANCE TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The existing biometric-based identification methods or identification systems have their own advantages, but their use is limited due to the following reasons:
[0003] 1. In some applications, the required accuracy rate cannot be achieved. For example, in the banking and financial system, the accuracy requirements for identification are much higher than the identification accuracy requirements of the company's biometric attendance machine;
[0004] 2. Due to the noise of the sensor and the defects of feature extraction and matching, it is often impossible to guarantee the correct recognition results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system based on multi-factor, multi-engine, human-machine combination
  • Authentication method and system based on multi-factor, multi-engine, human-machine combination
  • Authentication method and system based on multi-factor, multi-engine, human-machine combination

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0063] based on figure 1 The identity verification method described in, its first embodiment comprises the following steps:

[0064] Step 1. Obtain two categories of biometric information provided by the current user.

[0065] Wherein, the two types of biometric information are facial feature information and fingerprint feature information of the current user respectively.

[0066] In addition, before the implementation of step 1, it also includes the step of collecting the user's biometric information to establish the user's biometric information database, wherein the collected user biometric information includes the user's facial features, fingerprint features, iris features and sound characteristics.

[0067] The biometric information database not only stores facial features, fingerprint features, iris features and voice features based on the user, but also stores a variety of existing facial feature recognition methods, multiple fingerprint feature recognition methods, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a multi-factor, multi-engine and human-computer combined identity verification method, comprising the steps of acquiring at least two types of biological feature information provided by a current user; identifying all types of biological feature information by adopting multiple different identification methods, and separately obtaining multiple identification results after matching; fusing all the obtained identification results to obtain a fusion result, making a decision on the fusion result, and obtaining an identity verification result of the current user according to the decision result; if the decision result falls into a suspected interval, artificially verifying the biological feature information to obtain an artificial verification result as the verification result. An identity verification system adopting the method comprises a biological feature information acquisition device, a biological feature information identification device and a biological feature information database. The method and the system have the characteristic of high identification accuracy, and can meet the requirements of financial institutions such as banks, social security offices and the like for high identification precision.

Description

technical field [0001] The invention relates to an identity verification method, in particular to an identity verification method and system based on multi-factor, multi-engine and human-machine combination. Background technique [0002] The existing biometric-based identification methods or identification systems have their own advantages, but their use is limited due to the following reasons: [0003] 1. In some applications, the required accuracy rate cannot be met, such as the banking and financial system, the accuracy requirements for identification are much higher than the identification accuracy requirements of the company's biometric attendance machine; [0004] 2. Due to the noise of the sensor and the defects of feature extraction and matching, it is often impossible to guarantee the correct recognition result. Contents of the invention [0005] In view of the deficiencies in the above problems, the present invention provides a multi-factor, multi-engine, man-ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32
CPCG06F21/32
Inventor 胡勇蔡佳琪曹学光敖翔罗忠奎伍振宇
Owner BEIJING INFORMATION SECURITY ALLIANCE TECH CO LTD