Identity recognition keyboard and method of performing identity authentication according to identity recognition keyboard

A technology of identity recognition and identity verification, applied in the field of identity verification, which can solve problems such as low security, fuzzy memory of passwords, data acquisition and theft, etc.

Active Publication Date: 2017-03-22
BEIJING UNIV OF TECH
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the user name and password are really existing data, it is easy to be obtained and stolen. Although there is real-time update, this method is not safe and the method of real-time update password will cause users to vaguely remember the password.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity recognition keyboard and method of performing identity authentication according to identity recognition keyboard
  • Identity recognition keyboard and method of performing identity authentication according to identity recognition keyboard
  • Identity recognition keyboard and method of performing identity authentication according to identity recognition keyboard

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] Embodiment 1: as Figure 1-2 As shown, the invention provides an identification keyboard, including a keyboard body 10 and a plurality of keys 20 arranged on the keyboard body 10 (its structure is a commonly used keyboard structure), and also includes a fingerprint identification area 30 arranged on the keyboard body 10 , the blue light sensing board 50 and the learning unit 60 arranged in the keyboard main body 10;

[0042] Fingerprint identification area 30 is used for entering user's fingerprint, generates the complete fingerprint image of each finger; Wherein: fingerprint identification area 30 comprises LED light source 31, fingerprint collection lens 32 and image processor 33; Each finger of the user is photographed and collected at least three times to generate at least three fingerprint images, and the generated at least three fingerprint images are transmitted to the image processor 33; the image processor 33 includes a preprocessing unit 34 and a synthesis uni...

Embodiment 2

[0048] Embodiment 2: The present invention provides a method for identity verification based on an identity recognition keyboard, including:

[0049] S101. Fingerprint entry: enter the user's fingerprint in the fingerprint identification area, generate and store a complete fingerprint image of each finger; where:

[0050] Step 11, taking pictures of each finger of the user at least three times to generate at least three fingerprint images;

[0051] Step 12, preprocessing the generated fingerprint images respectively, the preprocessing includes removing water marks and sweat stains from the fingerprint image;

[0052] Step 13, vertically project the preprocessed fingerprint image according to the same direction as the pixel points of the core and the pixels around the core, and slightly shift the fingerprint image so that the pixels of the core of the preprocessed fingerprint image are accurate coincide to generate a complete fingerprint image for that finger.

[0053] S102. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity recognition keyboard and a method of performing identity authentication according to the identity recognition keyboard. A fingerprint recognition area is used for inputting fingerprints of a user to generate an intact fingerprint image of all fingers; a blue light induction plate is used for collecting palm information, wherein the palm information comprises basic radians and fingering of both hands working on keys; a data acquisition unit for collecting key information is arranged on each key, wherein the key information comprises the fingerprints of the fingers tapping the keys, keying strength and stay time; a learning unit performs training and learning on the palm information and the key information, and an identity authentication model for the user tapping the keyboard is established in combination with the intact fingerprint image. By arranging the fingerprint recognition area, the blue light induction plate and the data acquisition units on the keyboard, input and matching of the fingerprints of the user are realized; according to the input fingerprints of the user, encryption of a computer can be realized through the keyboard, and only when the fingerprints of the user tap the keyboard can opening of a computer coded lock, normal use of the keyboard and identity authentication of the user be realized.

Description

technical field [0001] The invention relates to the technical field of identity verification, in particular to an identity recognition keyboard and an identity verification method based on the identity recognition keyboard. Background technique [0002] With the rapid development of computer technology, computers are more and more widely used in people's daily life. While computers provide convenient ways for people to obtain information, they also increase the threat to information leakage and data security protection, ensuring that the identity of computer users becomes Today's hot research topic, in the prior art, the main methods of identity verification of computer users are traditional identity verification methods such as user name and password. Because the user name and password are really existing data, it is easy to be stolen, although there is real-time update, this method is not safe and the method of real-time update password will cause fuzzy memory of the user ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/83G06F21/31G06F21/32
Inventor 何泾沙蔡方博徐树振穆鹏宇刘畅常成月
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products