Extended biological characteristic verification method
A biometric and verification technology, applied in the field of extended biometric verification, can solve the problems of stealing biometrics, the object being inspected cannot be hidden, the object being inspected cannot be changed, etc., and the effect of overcoming security loopholes is achieved.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment example 1
[0007] Implementation case 1: Multi-fingerprint verification.
[0008] The current fingerprint verification uses a fingerprint collector to collect one fingerprint at a time for verification. In a relatively low-end verification solution or a verification scenario with a relatively small budget, the high repetition rate is the biggest pain point of this verification. According to statistics, when the number of people to be inspected reaches about dozens to hundreds of people, there will be at least one person with a high probability, and it will be difficult to collect or verify the fingerprints of the inspection samples.
Embodiment approach
[0010] Solution 1: On one fingerprint collector, collect three fingerprints respectively, and the authentication standard can be three-to-two verification; or three-to-three verification. No matter whether it adopts three-to-two verification or adopts three-to-three verification, in order to strengthen the verification strength, the correctness of the collection sequence can also be included in the certification standard.
[0011] Scheme 2: Use three fingerprint collectors to collect three fingerprints at the same time, and the authentication passing standard is three-to-two verification or three-to-three verification. In this solution, the correct order of the collected fingerprints can also be used as a standard for passing the authentication.
[0012] Whether it is Scheme 1 or Scheme 2, or other similar multi-fingerprint verification schemes, it can effectively reduce the repetition rate, improve the accuracy of verification, and increase the difficulty of attacks.
Embodiment example 2
[0013] Implementation Case 2: Face ID Authentication
[0014] No matter which company provides the facial recognition authentication technology commonly used in the market at present, the common pain point is that they all need to find a balance between the pass rate and the false positive rate. Reducing the misjudgment rate will inevitably bring about a reduction in the pass rate, and the increase in the pass rate will inevitably come at the cost of increasing the misjudgment rate. AI deep simulation technology and high-resolution 3D printing technology all pose the least potential threat to face authentication. There is a high probability that the commercial face-swiping authentication system in use cannot distinguish identical twins with a high degree of similarity.
[0015] With the extended biometric verification method, countless high-security face-swiping authentication schemes can be designed. The verification scheme of facial recognition + specific background + fixe...
PUM

Abstract
Description
Claims
Application Information

- Generate Ideas
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com