Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method and authentication system based on EEG features

An identity authentication and EEG technology, which is applied in the field of Internet of Things technology and information security, can solve the problems of high instantiation cost, precociousness, and accelerated computing speed.

Active Publication Date: 2020-04-14
西安慧脑智能科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are many shortcomings in these traditional identity authentication methods: some of them are easy to be broken, such as password leakage, fingerprints stolen, etc.;
[0003] Most of the existing brainwave identity authentication systems use convolutional neural networks or deep belief networks as feature extraction and classification methods. However, the implementation of convolutional neural networks is relatively complicated, and the cost of specific instantiation is high, so it is not suitable for promotion. , and due to the separate training of different tasks, the training time is relatively long, so users may not be able to use it in time; while the traditional deep belief network sometimes falls into local optimum due to the random assignment of weights between layers and produces "premature " phenomenon, so the present invention proposes to use the deep belief network optimized by the immune leapfrog algorithm to extract and classify brain wave features, so that not only can jump out of the local optimal solution, but also speed up the calculation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and authentication system based on EEG features
  • Identity authentication method and authentication system based on EEG features
  • Identity authentication method and authentication system based on EEG features

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0097] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0098] (Step1——user model training and password setting)

[0099] A: If figure 1 , the user first randomly selects 3 patterns from the password gallery as the training password.

[0100] B: The system randomly selects 22 patterns from the background gallery (the number of patterns is greater than and including the password gallery), and the 3 patterns selected by the previous user form a total of 25 pattern training sets this time.

[0101] C: Next, the system presents the pattern training set in front of the user in an indefinite order and indefinite number of times. The interval between each pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method and an authentication system based on electroencephalogram features, wherein the method includes five steps of model training, password setting, alpha wave testing, electroencephalogram feature extraction and classification, and model updating. Among them, the brain wave feature extraction and classification method is composed of three parts: layer-by-layer pre-training, network fine-tuning, and classification. The present invention first utilizes the characteristic that α waves fluctuate greatly when a person tells a lie to carry out the first re-authentication on the tester, improves the existing method at the same time, establishes a feature extraction method based on a deep belief network, and uses the immune leapfrog algorithm to It is optimized to perform feature extraction and classification on the tester's brain waves when observing the password pattern, so as to perform the second verification. The two-layer verification can not only ensure the safety of users, but the improved deep belief network can also improve the existing recognition accuracy, reduce the error rate, avoid a large number of false alarms, and bring a good experience to users.

Description

technical field [0001] The present invention relates to the field of Internet of Things technology and information security technology, in particular to an identity authentication method and authentication system based on EEG features. Background technique [0002] Traditional identity authentication methods include voice authentication, face recognition, password authentication, fingerprint authentication, and iris authentication. These traditional identity authentication methods have many disadvantages: some of them are easy to be breached, such as password leaks, fingerprints stolen, etc.; Therefore, an identity authentication system that is difficult to break, difficult to leak, and has high recognition accuracy came into being-the brain wave identity authentication system. Experimental studies have shown that EEG characteristics are unique to each person. Even when the same person is facing different events or in different mental states, EEG characteristics will be ver...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/06G06K9/00
CPCH04L41/142H04L41/145H04L63/0861G06V40/10G06V40/15
Inventor 常嘉乐李天宇陈明阳黄海平杜安明何凡胡林康潘华宇
Owner 西安慧脑智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products