Attack test method, device and equipment for biological feature recognition
A biometric feature recognition and biometric technology, applied in the computer field, can solve the problems of large manual operation errors, long test cycle, and difficult to reproduce
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0022] Such as figure 1 As shown, the embodiment of this specification provides an attack testing method for biometric identification, and the execution subject of the method may be a testing device for biometric identification, such as Figure 2A As shown, the test equipment may include a main control sub-device and a mechanical arm, etc., wherein the main control sub-device may be a terminal device or a server, wherein the server may be an independent server, or may be composed of multiple servers A server cluster, etc., the server may be a background server such as a financial business or an online shopping business, or a background server of an application program. The terminal device may be a mobile terminal device such as a mobile phone or a tablet computer, and may also be a device such as a personal computer. In the embodiment of this specification, the main control sub-device is used as an example for detailed description. For the case of the server, reference may be...
Embodiment 2
[0040] Such as image 3 As shown, the embodiment of this specification provides an attack testing method for biometric identification, and the execution subject of the method may be a testing device for biometric identification, such as Figure 2A As shown, the test equipment may include a main control sub-device and a mechanical arm, etc., wherein the main control sub-device may be a terminal device or a server, wherein the server may be an independent server, or may be composed of multiple servers A server cluster, etc., the server may be a background server such as a financial business or an online shopping business, or a background server of an application program. The terminal device may be a mobile terminal device such as a mobile phone or a tablet computer, and may also be a device such as a personal computer. In the embodiment of this specification, the main control sub-device is used as an example for detailed description. For the case of the server, reference may be...
Embodiment 3
[0107] The above is the attack test method of biometric feature recognition provided by the embodiment of this specification. Based on the same idea, the embodiment of this specification also provides an attack test device of biometric feature recognition, such as Figure 5 shown.
[0108] The attack test device for biometric identification includes: a component acquisition module 501, an attack test module 502 and a test result determination module 503, wherein:
[0109] The component acquiring module 501, acquires the biometric component required for performing a biometric attack on the biometric device, and the biometric component includes a feature attachment component and a conductive component attached with a biometric feature;
[0110] Attack test module 502, controlling the mechanical arm to place the biometric component in the recognition area of the biometric device, and controlling the mechanical arm to press the biometric component to trigger the biometric compon...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com