Extended biological characteristic verification method

A biometric and verification technology, applied in the field of extended biometric verification, can solve the problems of stealing biometrics, the object being inspected cannot be hidden, the object being inspected cannot be changed, etc., and the effect of overcoming security loopholes is achieved.

Pending Publication Date: 2020-04-24
黄策
7 Cites 1 Cited by

AI-Extracted Technical Summary

Problems solved by technology

Numerous online and offline leak points make it basically impossible to hide the subject matter
In real life, there are even various cases of stealing biometrics in a "legal f...
View more

Abstract

The invention provides a brand-new verification method based on biological characteristics, namely an extended biological characteristic verification method. In the verification method, a certain biological characteristic of the verified object is no longer used as a unique verification target which needs to be verified in one verification process. A plurality of biological characteristics and a plurality of external physical characteristics are also used as verification targets required to be verified in one verification process. The biological characteristics include but are not limited to fingerprints, voiceprints and face images; wherein the external physical characteristics include but are not limited to a background picture, a foreground picture, geographic position information and apassword. In the one-time verification process, a plurality of required verification targets can be collected in the same frame at a time and can also be collected in a time-sharing mode in an effective time period. The verification method can effectively avoid two fatal security vulnerabilities that a verification target of a single biological characteristic verification method is easy to stealand no verification target is available once the verification target is stolen.

Application Domain

Protocol authorisation

Technology Topic

EngineeringAlgorithm +5

Examples

  • Experimental program(3)

Example Embodiment

[0007] Implementation case 1: Multiple fingerprint verification.
[0008] Nowadays, fingerprint verification uses a fingerprint collector to collect fingerprints one at a time for verification. In relatively low-end verification schemes or verification scenarios with a relatively small budget, a high repetition rate is the biggest pain point of this verification. Statistics show that when the number of people tested reaches a scale of about dozens to hundreds of people, there will be a high probability that at least one person will be difficult to collect fingerprints or verification of the test sample.

Example Embodiment

[0009] The extended biometric verification method can have at least the following two implementation options:
[0010] Solution 1: Collect three fingerprints separately on a fingerprint collector. The standard for passing the authentication can be three-to-two verification; or three-to-three verification. Whether using three-to-two verification or three-to-three verification, in order to strengthen the verification strength, the correctness of the collection sequence can also be included in the certification criteria.
[0011] Solution 2: Use three fingerprint collectors to collect three fingerprints at the same time, and the authentication standard is three-to-two verification or three-to-three verification. In this solution, the correct sequence of the fingerprints collected can also be used as a criterion for authentication.
[0012] Whether it is scheme 1 or scheme 2, or other similar multi-fingerprint verification schemes, it can effectively reduce the repetition rate, improve the accuracy of verification, and increase the difficulty of attack.

Example Embodiment

[0013] Implementation case 2: Face recognition authentication
[0014] At present, the commonly used facial recognition authentication technology on the market, no matter which company provides it, has the common pain point that it needs to find a balance between the pass rate and the misjudgment rate. Lowering the misjudgment rate will inevitably bring about a decrease in the pass rate, and the increase in the passing rate will inevitably come at the cost of improving the misjudgment rate. AI deep simulation technology and high-resolution 3D printing technology all pose the least potential threats to facial recognition authentication. In the commercial facial recognition system in use, there is a high probability that identical twins with high similarity cannot be distinguished.
[0015] With the extended biometric verification method, countless high-security facial recognition schemes can be designed. The verification scheme of facial recognition + specific background + fixed geographic location information is just one of the many extended facial recognition authentication solutions.
[0016] This program is particularly suitable for the protection of bank accounts. As long as the bank account owner does not disclose the relevant information of a specific background, even the twins of their account cannot be swiped away, and it is even more impossible to be stolen in their sleep. The fixed geographic location information can ensure that even if the account owner is hijacked, they can only be swiped away for a limited amount.
[0017] The face-brushing technology based on 2D image recognition technology has been proved by countless "photo" face-brushing experiments as the most insecure face-brushing authentication technology in the face-brushing authentication technology system. This technical solution is practical for face-brushing verification In the system, it has been basically abandoned. Incorporating specific relative positions, hand-shaped scissors hand picture information, or specific picture information in the background of the person being verified into the subject of verification can be based on the 2D image recognition technology that has been proven to be the most insecure. The extended 2D face verification method effectively resists all the "photo" attacks of the verified person.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products