Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Extended biological characteristic verification method

A biometric and verification technology, applied in the field of extended biometric verification, can solve the problems of stealing biometrics, the object being inspected cannot be hidden, the object being inspected cannot be changed, etc., and the effect of overcoming security loopholes is achieved.

Pending Publication Date: 2020-04-24
黄策
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Numerous online and offline leak points make it basically impossible to hide the subject matter
In real life, there are even various cases of stealing biometrics in a "legal form"; once the subject of inspection is leaked, the inability to change the subject of inspection has become a major hidden danger of the single biometric verification method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment example 1

[0007] Implementation case 1: Multi-fingerprint verification.

[0008] The current fingerprint verification uses a fingerprint collector to collect one fingerprint at a time for verification. In a relatively low-end verification solution or a verification scenario with a relatively small budget, the high repetition rate is the biggest pain point of this verification. According to statistics, when the number of people to be inspected reaches about dozens to hundreds of people, there will be at least one person with a high probability, and it will be difficult to collect or verify the fingerprints of the inspection samples.

Embodiment approach

[0010] Solution 1: On one fingerprint collector, collect three fingerprints respectively, and the authentication standard can be three-to-two verification; or three-to-three verification. No matter whether it adopts three-to-two verification or adopts three-to-three verification, in order to strengthen the verification strength, the correctness of the collection sequence can also be included in the certification standard.

[0011] Scheme 2: Use three fingerprint collectors to collect three fingerprints at the same time, and the authentication passing standard is three-to-two verification or three-to-three verification. In this solution, the correct order of the collected fingerprints can also be used as a standard for passing the authentication.

[0012] Whether it is Scheme 1 or Scheme 2, or other similar multi-fingerprint verification schemes, it can effectively reduce the repetition rate, improve the accuracy of verification, and increase the difficulty of attacks.

Embodiment example 2

[0013] Implementation Case 2: Face ID Authentication

[0014] No matter which company provides the facial recognition authentication technology commonly used in the market at present, the common pain point is that they all need to find a balance between the pass rate and the false positive rate. Reducing the misjudgment rate will inevitably bring about a reduction in the pass rate, and the increase in the pass rate will inevitably come at the cost of increasing the misjudgment rate. AI deep simulation technology and high-resolution 3D printing technology all pose the least potential threat to face authentication. There is a high probability that the commercial face-swiping authentication system in use cannot distinguish identical twins with a high degree of similarity.

[0015] With the extended biometric verification method, countless high-security face-swiping authentication schemes can be designed. The verification scheme of facial recognition + specific background + fixe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a brand-new verification method based on biological characteristics, namely an extended biological characteristic verification method. In the verification method, a certain biological characteristic of the verified object is no longer used as a unique verification target which needs to be verified in one verification process. A plurality of biological characteristics and a plurality of external physical characteristics are also used as verification targets required to be verified in one verification process. The biological characteristics include but are not limited to fingerprints, voiceprints and face images; wherein the external physical characteristics include but are not limited to a background picture, a foreground picture, geographic position information and apassword. In the one-time verification process, a plurality of required verification targets can be collected in the same frame at a time and can also be collected in a time-sharing mode in an effective time period. The verification method can effectively avoid two fatal security vulnerabilities that a verification target of a single biological characteristic verification method is easy to stealand no verification target is available once the verification target is stolen.

Description

technical field [0001] The invention relates to an extended biometric verification method based on biometric verification. Background technique [0002] Authentication is the foundation of all web applications. It can be said that there is no web application without authentication. Biometric authentication is the most rapidly developed authentication method in recent years. The typical and most common biometric authentication methods include fingerprint authentication and facial recognition authentication. The currently popular biometric verification methods have a common technical feature no matter what biometrics are used as the object to be tested: a single biometric is used as the object to be inspected. This verification method with a single biometric feature as the inspection target has great potential safety hazards. This threatening security risk comes from two aspects. Numerous leak points online and offline make it basically impossible to hide the subject matt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/40
CPCG06Q20/40145
Inventor 黄策
Owner 黄策
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More