High-security identity authentication system

An identity authentication, electronic ID card technology, applied in the direction of digital data authentication, instrument, character and pattern recognition, etc., can solve the problems of high verification cost, property security threat, easy forgery, etc., to achieve accurate results, safe data storage, authoritative reliable results

Pending Publication Date: 2021-07-02
江苏芯灵智能科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

An ID card with a medium is easy to lose, and secondly, it is easy to forge. It is not troublesome for the holder, and the verification cost is quite high for the verifier.
[0003] To this end, the Ministry of Public Security of the People's Republic of China has launched an electronic ID card (EID) and a network ID card. The electronic ID card loads the identity information on a chip, and when verifying, it is compared with the data stored in the central database to achieve verification. There is still a medium , needs to be carried by individuals, and there are still hidden dangers in the data security of the central database, such as being attacked by hackers, or the operation and maintenance personnel steal data and sell it for profit, which affects the privacy of hundreds of millions of citizens. Although the Ministry of Public Security is promoting EID and block Chain integration solves the problem of data security, but it still needs a chip as a portable medium
[0004] The network ID card can only be used by relying on everyone's communication equipment. This method is not very friendly to the elderly who are not familiar with the operation of modern electronic communication equipment; If the data on the replaced old machine is interpreted by others, it still poses a threat to personal privacy and property security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-security identity authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] See figure 1 , a highly secure identity authentication system of the present invention, which includes a hand vein feature collection and identification system 1, an electronic ID card or a network ID card system 2 of the Ministry of Public Security, and the hand vein feature data is stored in one-to-one correspondence with the data of the Ministry of Public Security In the blockchain system 3, during the authentication process, the data obtained and verified by the hand vein feature recognition system is guaranteed to be the person’s living body, and the pre-collected and retained data of the Ministry of Public Security is used for authentication to ensure authority and reliability. .

[0013] In the high-security identity authentication system, the vein characteristics of the hand include but not limited to the vein characteristics of the fingers, the center of the palm or the back of the palm.

[0014] In the highly secure identity authentication system, the block c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to identity authentication, in particular to an identity authentication system. The high-security identity authentication system comprises a hand vein feature acquisition and recognition system and an electronic identity card or network identity card system of the Ministry of Public Security, and hand vein feature data and data of the Ministry of Public Security are stored in a block chain system after being in one-to-one correspondence; in the authentication process, data obtained and verified by the hand vein feature recognition system is ensured to be a living body of the person, and authentication is carried out through pre-collected and stored data of the Ministry of Public Security to ensure authority and reliability. The method does not need to carry media, verifies information source authority, and is safe and reliable in data storage.

Description

technical field [0001] The invention relates to identity authentication, in particular to an identity authentication system. Background technique [0002] In today's society, the application scenarios of identity authentication are becoming more and more extensive. An ID card with a medium is easy to lose on the one hand, and easy to falsify on the other hand. It is not troublesome for the holder, and the verification cost is quite high for the verifier. [0003] To this end, the Ministry of Public Security of the People's Republic of China has launched an electronic ID card (EID) and a network ID card. The electronic ID card loads the identity information on a chip, and when verifying, it is compared with the data stored in the central database to achieve verification. There is still a medium , needs to be carried by individuals, and there are still hidden dangers in the data security of the central database, such as being attacked by hackers, or the operation and maintena...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06F21/32
CPCG06F21/32G06V40/10G06V40/14
Inventor 徐伟吴松
Owner 江苏芯灵智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products