Unlock instant, AI-driven research and patent intelligence for your innovation.

Biological recognition method, device and equipment

A technology of biometric identification and biological samples, which is applied in the field of biometric identification methods, devices and equipment, and can solve problems such as low security

Pending Publication Date: 2022-07-15
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The simplest way is to protect private information through an encryption algorithm. Specifically, through a series of image row and column transformations, the content of the image becomes invisible. However, the security of the above method is often low, and attackers can use brute force to crack way to restore the original image

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Biological recognition method, device and equipment
  • Biological recognition method, device and equipment
  • Biological recognition method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] like Figure 1A and Figure 1B As shown, the embodiments of this specification provide a biometric identification method, and the execution body of the method may be a terminal device, wherein the terminal device may be a mobile terminal device such as a mobile phone and a tablet computer, or a computer such as a notebook computer or a desktop computer. The device, or, may also be an IoT device (specifically, a smart watch, a vehicle-mounted device, etc.) and the like. The method may specifically include the following steps:

[0035] In step S102, a biometric identification request of the user is obtained, where the biometric identification request includes user biometric information for identifying the user's identity.

[0036] The user may be any user, such as the owner of the above-mentioned terminal device, and the user may initiate a biometric identification request through the terminal device. The user biometric information may include various types, such as the...

Embodiment 2

[0052] like image 3 As shown, the embodiments of this specification provide a biometric identification method, and the execution body of the method may be a terminal device, wherein the terminal device may be a certain terminal device such as a mobile phone and a tablet computer, or a computer such as a notebook computer or a desktop computer. The device, or, may also be an IoT device (specifically, a smart watch, a vehicle-mounted device, etc.) and the like. The method may specifically include the following steps:

[0053] In step S302, a biometric identification request of the user is obtained, where the biometric identification request includes user biometric information for identifying the user's identity.

[0054] In step S304, if the acquisition time of the above-mentioned biometric identification request is not within the first period corresponding to the current model parameters of the desensitization model, drive data for adjusting the model parameters of the desens...

Embodiment 3

[0067] like Figure 4A and Figure 4BAs shown, the embodiments of this specification provide a biometric identification method, and the execution body of the method may be a server, wherein the server may be an independent server, or a server cluster composed of multiple servers, etc., the server may be It is a background server such as financial business or online shopping business, or it can be a background server of an application program. The method may specifically include the following steps:

[0068] In step S402, the desensitized user biometric information and the driving data for adjusting the model parameters of the desensitization model sent by the terminal device are received. The desensitized user biometric information is obtained when the user's biometric identification request is obtained. The biometric processing corresponding to the biometric request satisfies the preset time-varying condition of the model parameters, then generating drive data for adjusting...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a biological recognition method, device and equipment, and the method is applied to terminal equipment, and comprises the steps: obtaining a biological recognition request of a user, the biological recognition request comprises user biological information used for recognizing the identity of the user, if biological recognition processing corresponding to the biological recognition request meets a preset model parameter time-varying condition, generating driving data for adjusting model parameters of a desensitization model, and adjusting the model parameters of the desensitization model based on the driving data to obtain an adjusted desensitization model, and inputting user biological information into the adjusted desensitization model to obtain desensitized user biological information, sending the desensitized user biological information and the driving data to a server, and receiving an identification result corresponding to the biological identification request sent by the server, the driving data and the desensitized biological information of the user are used for triggering the server to recognize the identity of the user.

Description

technical field [0001] This document relates to the field of computer technology, in particular to a biometric identification method, device and device. Background technique [0002] In recent years, biometric technology has developed rapidly, and the application of biometrics has entered people's work and life, such as face access control in a community, face cash register in a supermarket, and fingerprint unlocking of mobile phones. However, while the biometric system provides convenience for users, the biometric system needs to collect, transmit, process and store the user's biometric information, which puts the user's private information (ie, the user's biometric information) in a high-risk state. , once users' private information is leaked, their property and information security will be greatly threatened. [0003] In order to protect users' private information, biometric systems have begun to integrate various privacy protection methods. The simplest way is to prote...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06V40/70G06V10/764G06V10/82G06K9/62G06N3/04G06N3/08
CPCG06N3/08G06N3/045G06F18/24323
Inventor 曹佳炯丁菁汀
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More