Identity authentication method and system based on electroencephalogram characteristics

A technology of identity authentication and EEG, applied in the field of Internet of Things technology and information security, can solve problems such as false alarms, untimely use of users, and low recognition accuracy

Active Publication Date: 2017-09-22
西安慧脑智能科技有限公司
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are many shortcomings in these traditional identity authentication methods: some of them are easy to be broken, such as password leakage, fingerprints stolen, etc.;
[0003] Most of the existing brainwave identity authentication systems use convolutional neural networks or deep belief networks as feature extraction and classification methods. However, the implementation of convolutional neural networks is relatively complicated, and the cost of specific instantiation is high, so it is not suitable for promotion. , and due to the separate training of different tasks, the training time is relatively long, so users may not be able to use it in time; while the traditional deep belief network sometimes falls into local optimum due to the random assignment of weights between layers and produces "premature " phenomenon, so the present invention proposes to use the deep belief network optimized by the immune leapfrog algorithm to extract and classify brain wave features, so that not only can jump out of the local optimal solution, but also speed up the calculation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system based on electroencephalogram characteristics
  • Identity authentication method and system based on electroencephalogram characteristics
  • Identity authentication method and system based on electroencephalogram characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0097] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0098] (Step1——user model training and password setting)

[0099] A: If figure 1 , the user first randomly selects 3 patterns from the password gallery as the training password.

[0100] B: The system randomly selects 22 patterns from the background gallery (the number of patterns is greater than and including the password gallery), and the 3 patterns selected by the previous user form a total of 25 pattern training sets this time.

[0101] C: Next, the system presents the pattern training set in front of the user in an indefinite order and indefinite number of times. The interval between each pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method and system based on electroencephalogram characteristics. The method comprises the following steps: model training, password setting, alpha wave test, electroencephalogram characteristic extraction and classification, and model updating. The electroencephalogram characteristic extraction and classification method is composed of pre-training layer by layer, network fine tuning and classification. According to the identity authentication method and system disclosed by the invention, first level authentication is performed on a tester by means of the property that the alpha waves fluctuate greatly when the tester is lying, meanwhile the existing method is improved to establish a feature extraction method based on a depth belief network, meanwhile the feature extraction method is optimized by using an immune leapfrog algorithm, and when the tester observes password patterns, feature extraction and classification are performed on the brain waves so as to perform second level authentication. By means of the two levels of authentication, the security of the user can be guaranteed, and the improved depth belief network can also improve the existing identification precision, ensure less error rates, avoid a large number of false alarms and bring good user experience.

Description

technical field [0001] The present invention relates to the field of Internet of Things technology and information security technology, in particular to an identity authentication method and authentication system based on EEG features. Background technique [0002] Traditional identity authentication methods include voice authentication, face recognition, password authentication, fingerprint authentication, and iris authentication. These traditional identity authentication methods have many disadvantages: some of them are easy to be breached, such as password leaks, fingerprints stolen, etc.; Therefore, an identity authentication system that is difficult to break, difficult to leak, and has high recognition accuracy came into being-the brain wave identity authentication system. Experimental studies have shown that EEG characteristics are unique to each person. Even when the same person is facing different events or in different mental states, EEG characteristics will be ver...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06G06K9/00
CPCH04L41/142H04L41/145H04L63/0861G06V40/10G06V40/15
Inventor 常嘉乐李天宇陈明阳黄海平杜安明何凡胡林康潘华宇
Owner 西安慧脑智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products