Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-biological feature authentication or identification-based method and system

A biometric and authentication technology, applied in the field of information security, can solve problems such as tampering with identification or authentication, information security cannot be guaranteed, and operators lose consciousness

Active Publication Date: 2018-10-30
AGRICULTURAL BANK OF CHINA
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the problem that cannot be ignored is that the biometric feature itself cannot be changed. If the characteristic value of the biometric feature is used for identification and authentication of personnel, once the biometric feature is leaked, it is easy to clone the leaked biometric feature to achieve forgery. or tampering for identification or authentication purposes
In addition, if criminals restrict the operator, for example, make the operator unconscious or coerce the operator, it is easy to manipulate the operator's body to successfully complete the collection of biometrics
In this way, information security cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-biological feature authentication or identification-based method and system
  • Multi-biological feature authentication or identification-based method and system
  • Multi-biological feature authentication or identification-based method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0151] Embodiment 1: Call the pre-set authentication code or identification code from the database;

[0152] It can be seen that before executing S104, the authentication code or identification code has been set in advance, and the operation of this embodiment is to establish the mapping relationship between the original authentication code or identification code and the biometric feature, so that the biometric feature can be used for authentication. rights or identification.

Embodiment approach 2

[0153] Embodiment 2: Edit and / or combine multiple mapping codes to generate an authentication code or an identification code.

[0154] It can be seen that Embodiment 2 is generated after re-editing and / or combining the mapping code, and is generated after editing and / or combining the mapping code corresponding to the identification code of the biometric feature set. Among them, editing and / or combining the mapping codes may include multiple implementations, which are not limited in this embodiment. In order to facilitate the understanding of this part, this embodiment provides several optional implementations:

[0155] Method 1: Combine part or all of the mapping codes in an orderly manner to obtain the authentication code or identification code;

[0156] In this embodiment, it can be understood that the obtained authentication code or identification code is an ordered mapping code.

[0157] For example: Assume that the biometric feature set includes: fingerprint, iris, dynam...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-biological feature authentication or identification-based method and system. The method comprises the following steps of: acquiring a plurality of groups of biologicalfeatures of a first target object set and obtaining biological feature values; in order to recognize each biological feature, distributing a biological feature identifier for each biological feature;establishing a mapping relationship between each biological feature identifier and a preset mapping code set; and after an authentication code or an identification code formed by mapping codes corresponding to a part or all of the biological feature identifiers is determined, carrying out authentication or identification according to the authentication code or the identification code. According tothe system and method, the problem that biological features of natural persons are abused as the biological features of the natural persons are leaked or the using of the biological features of the natural persons is not controlled by the natural persons is avoided, the confidentiality and verifiability of safety information are improved, and the non-repudiation is improved at the same time.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method and system based on multiple biometric feature authentication or identification. Background technique [0002] In modern society, with the rapid development of computer and network technology, information security has shown unprecedented importance, and identity verification is a necessary prerequisite to ensure system security. In financial, national security, judicial, e-commerce, e-government and other application fields, accurate identification is required. Currently widely used traditional methods such as certificates, personal identification numbers, and passwords to confirm personal identities are facing severe challenges and are increasingly unsuitable for the development of modern technology and social progress. Biometric identification is a science of identification and / or individual verification by using the unique physiological and behavioral char...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40
CPCG06Q20/40145
Inventor 李宽
Owner AGRICULTURAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products