Check patentability & draft patents in minutes with Patsnap Eureka AI!

Identity authentication method based on biological characteristics and identity authentication system thereof

A biometric and identity authentication technology, applied in the computer field, can solve problems such as low accuracy, reduced user experience of face recognition, and lack of Bluetooth function.

Active Publication Date: 2020-03-27
CHINA UNIONPAY
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] (1) The first mode limits the use of face recognition, and face recognition cannot be achieved in some open scenarios such as supermarkets and restaurants.
[0013] (2) In the second mode, users need to perform additional operations to reduce the orientation of N, which reduces the user experience of using face recognition
[0014] (3) The method described in the third mode above requires additional construction of edge device nodes, and the method of recording faces through historical locations is less accurate and prone to failure to recognize
[0015] (4) When the fourth mode is recognized, the user needs to turn on the Bluetooth function of the mobile phone. The Bluetooth function is not a common function of the user, which is equivalent to requiring the user to perform additional opening operations, and the user experience is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method based on biological characteristics and identity authentication system thereof
  • Identity authentication method based on biological characteristics and identity authentication system thereof
  • Identity authentication method based on biological characteristics and identity authentication system thereof

Examples

Experimental program
Comparison scheme
Effect test

no. 1 approach

[0251] The first implementation mode (the first mode of the plaintext comparison mode)

[0252] Figure 11 is a schematic flowchart showing the biometric-based identity authentication method of the first embodiment.

[0253] Such as Figure 11 As shown, the biometric-based identity authentication method of the first embodiment includes the following steps: 1. After the user enters the merchant, the mobile phone sends LAC and mobile phone number information to the base station, wherein LAC refers to geographic location update information, that is, when When the mobile phone receives the signal broadcast by the base station, and finds that the base station signal it originally received is different from the broadcast signal received now, it will upload the information;

[0254] 2. Base station (by Figure 11 The pattern representation between the mobile phone and the base station management module) sends the mobile phone number and the base station number to the base station ...

no. 2 approach

[0277] The second implementation mode (the second mode of the plaintext comparison mode)

[0278] Figure 13is a schematic flowchart showing the biometric-based identity authentication method of the second embodiment.

[0279] Such as Figure 13 As shown, the biometric-based identity authentication method of the second embodiment includes the following steps:

[0280] 1. After the user enters the merchant, the mobile phone will send the location update information and mobile phone number information to the base station;

[0281] 2. The base station sends the mobile phone number and base station number to the base station management module;

[0282] 3. The base station management module dynamically maintains the mobile phone number list in the merchant according to the base station number, and the mobile phone number is HASH encrypted;

[0283] 4. The face recognition terminal collects faces;

[0284] 5. The face recognition terminal uploads the merchant number and face to...

no. 3 approach

[0297] The third implementation mode (the first mode of the confusing comparison mode)

[0298] Figure 15 is a schematic flowchart showing the biometric-based identity authentication method of the third embodiment.

[0299] Such as Figure 15 As shown, the biometric-based identity authentication method of the third embodiment includes the following steps:

[0300] 1. After the user enters the merchant, the mobile phone will send the location update information and mobile phone number information to the base station;

[0301] 2. The base station sends the mobile phone number and base station number to the base station management module;

[0302] 3. The base station management module dynamically maintains the mobile phone number list in the merchant according to the base station number, and the mobile phone number is HASH encrypted;

[0303] 4. The face recognition terminal collects faces;

[0304] 5. The face recognition terminal uploads the merchant number and face to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity authentication method and system based on biological characteristics. The method comprises: acquiring mobile terminal numbers of all users entering a specified area through a base station associated with the users entering the specified area so as to generate a first mobile terminal number list; identifying the biological characteristics of the user, and obtaining a second mobile terminal number list composed of n mobile terminal numbers having the highest similarity with the biological characteristics based on a pre-established binding relationship betweenthe biological characteristics of the user and the mobile terminal numbers; and comparing the first mobile terminal number list with the second mobile terminal number list, and if the intersection ofthe two numbers is one mobile terminal number, judging that the user of the mobile terminal number is an identity authentication success user, and if the intersection of the two numbers is greater than one number, judging that the user of the mobile terminal number with the highest biological characteristic similarity in the intersection is the identity authentication success user. According to the invention, the range of face recognition N can be reduced, and a user only needs to carry a mobile phone and can complete 1: N face recognition without additional operation.

Description

technical field [0001] The invention relates to computer technology, in particular to an identity authentication method based on biometric features and an identity authentication system based on biometric features. Background technique [0002] At present, face recognition technology is developing rapidly, and the technology maturity has basically met the requirements of financial applications for recognition accuracy and recognition efficiency, and it is mostly used in payment and public security scenarios. For example, the iPhone X launched the Face ID function, Alipay piloted facial recognition payments, and Agricultural Bank of China introduced facial recognition withdrawals, etc. Face recognition technology is becoming one of the most rapidly developing biometric technologies with the broadest application prospects. [0003] In terms of technical solutions for face recognition, according to the number of recognition ranges, it is generally believed by the industry that...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/021H04W12/06H04L29/06H04L9/32
CPCH04W4/021H04W12/06H04L63/0861H04L9/3236G06V40/172G06V10/761G06V10/803G06V40/1365G06V40/14G06V40/70H04W12/63H04W12/72H04W12/64
Inventor 余玮琦万四爽何朔
Owner CHINA UNIONPAY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More