Non-contact user identity authentication method based on RFID and convolutional neural network

A technology of user identity authentication and convolutional neural network, applied in the field of action recognition, to achieve the effect of improving system security, simple layout, accurate and effective segmentation of actions

Active Publication Date: 2021-06-01
NANJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The traditional contact identification technology already has the problem of carrying special equipment, so the concept of non-contact identification that does not rely on identification objects to carry special equipment has gradually become the focus of research in recent years

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Non-contact user identity authentication method based on RFID and convolutional neural network
  • Non-contact user identity authentication method based on RFID and convolutional neural network
  • Non-contact user identity authentication method based on RFID and convolutional neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0052] refer to figure 1 , the method includes: a phase preprocessing process, an action extraction process and an identity authentication process. Among them, the passive RFID tag matrix collects the phase data information of user identification actions, and the position layout of the tags is as follows: figure 2 and image 3 As shown; the collected phase information data includes: 5 kinds of movement modes for identity authentication. The collected actions and movement methods are as follows: Figure 4 shown. Antenna, used to send signals to passive RFID tags, while receiving signals from passive RFID tags, and sending them to RFID readers; RFID readers, used to modulate and demodulate signals, and decode data packets; phase preprocessing unit, It is used to perform phase expansion, normalization and data smoothing processing...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a non-contact user identity authentication method based on RFID and a convolutional neural network, and the method comprises the steps: simulating the unlocking of a sudoku of a mobile phone, deploying an RFID tag matrix, collecting the phase information during the movement of a hand, and achieving the identity authentication of a user through the convolutional neural network. The method comprises the following implementation steps of: 1, acquiring phase information of an action for identity authentication; 2, preprocessing the acquired phase information; 3, extracting starting point information of each action sample from the preprocessed phase information; 4, making the obtained phase information into a data set, and training the data by adopting a deep learning convolutional neural network to obtain a convolutional neural network model for authentication; 5, identifying the action of the user by using the trained model when the identity of the user is authenticated; and 6, obtaining an authentication result, and judging whether authentication succeeds or not. According to the invention, the invention employs the CNN-based convolutional neural network to extract the features in the phase, carries out the motion recognition, carries out the identity authentication, and is better in accuracy, safety and robustness.

Description

technical field [0001] The invention relates to the technical field of action recognition, in particular to a non-contact user identity authentication method based on RFID and a convolutional neural network. Background technique [0002] In recent years, wireless sensing has developed rapidly in various fields, such as activity perception, indoor positioning, smart home and behavior analysis. More and more households are deploying IoT devices. While it brings intelligence and convenience to people, security issues are often overlooked. Some IoT devices can control building access and the environment, and even monitor occupants' audio and video equipment, so authentication is critical. [0003] Traditional contact identification technology already has the problem of carrying special equipment, so the concept of non-contact identification that does not rely on identification objects to carry special equipment has gradually become the focus of research in recent years. It mai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06K17/00G06N3/04G06N3/08
CPCG06F21/32G06K17/0022G06N3/08G06N3/045
Inventor 肖甫戴纪馨盛碧云周剑刘海猛
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products