Safety prevention and control method, device and system based on biological feature recognition

A biometric identification and biometric technology, applied in the field of information identification, can solve problems such as failure to detect whether the authorized person is in a voluntary/normal identification state on the device side, and potential safety hazards, so as to protect personal health, improve safety, and protect personal health. safe effect

Inactive Publication Date: 2020-09-22
BEIJING IRISKING
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current identity authentication is mainly to identify whether the current user has authority, such as granting current personnel permission to pass or identifying illegal personnel to prohibit passage
However, there is no mechanism on the device side to detect whether the authorized person is in a voluntary / normal identification state. For example, once the authorized person is threatened, it can still be recognized on the device side, that is, the authority is granted, which poses a huge security risk.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety prevention and control method, device and system based on biological feature recognition
  • Safety prevention and control method, device and system based on biological feature recognition
  • Safety prevention and control method, device and system based on biological feature recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] figure 2 It is a schematic flowchart of a security prevention and control method generally required by an embodiment of the present invention. Such as figure 2 As shown, the specific process of the method can be: when the device is in the standby state, the user inputs a trigger signal at the device end to enable the device to start the image acquisition and recognition process; the device end or the background server detects whether a duress alarm signal is received; When a threat alarm signal is received, the emergency treatment process is executed, that is, all permissions of the current user are prohibited; further, the collected iris image, face image and alarm signal of the current user are transmitted to relevant personnel or equipment for processing by relevant personnel; When no coercion alarm signal is detected, the normal biometric identity authentication procedure is executed, and the corresponding authority is granted to the user after the authentication...

Embodiment 2

[0064] Figure 6 A schematic flowchart of a security prevention and control method with high security requirements according to an embodiment of the present invention. Such as Figure 6 As shown, the specific process of the method can be: when the device is in the standby state, the user inputs a trigger signal at the device end to enable the device to start the image acquisition and recognition process; the device end collects the current user's iris image and face image, and performs Compare and identify; when the identification result meets the conditions, enter the password input page; the user enters the duress password on this page. When the device determines that the user input is a duress password, it sends the iris image, face image and alarm signal to the background server; the background server performs biometric comparison, and then sends the alarm signal and identity verification results to the relevant responsible At the same time, in order to prevent the coerc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safety prevention and control method, device and system based on biometric feature recognition. The method comprises the steps that one or more groups of stress alarm information data and biometric feature certificate data of an authorized user are preset and stored in a memory; after the control module receives a trigger signal for requesting verification, the control module receives the biological characteristic to-be-verified data and the environment information data from the acquisition device, and then performs the following processing: verifying whether the biological characteristic to-be-verified data is consistent with the biological characteristic voucher data or not, and searching whether stress alarm information exists in the environment information dataor not, and under the condition that the stress alarm information is found, starting a preset stress alarm step. The invention further provides a device and a system for executing the safety prevention and control method. According to the technical scheme disclosed by the invention, the safety of identity authentication of the biometric feature recognition equipment end is enhanced, and a stressed person can be more safely protected.

Description

technical field [0001] The present invention relates to the technical field of information identification, in particular to a security prevention and control method, device and system based on biometric identification. Background technique [0002] With the rapid development of computer technology and the Internet, traditional information verification methods can no longer meet people's needs, and "security" has become a research hotspot in the field of information security today. In addition, since personal information is more and more easily obtained, people's awareness of security protection is also increasing. As a result, people's requirements for safe and reliable defense systems are getting higher and higher. [0003] In recent years, with the continuous development and maturity of biometric identification technology, the application of biometric identification technology in information verification system has gradually become the mainstream. The biometric authentica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0861H04L63/08H04L63/083
Inventor 张慧潘鹏李志林孔超周水子
Owner BEIJING IRISKING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products