A mobile identity authentication system and its authentication method

An identity authentication, mobile technology, applied in the direction of user identity/authority verification, character and pattern recognition, telephone communication, etc., can solve the problems of insecurity, cracking, inconvenience, etc., and achieve a wide range of applications.

Inactive Publication Date: 2007-05-30
INST OF AUTOMATION CHINESE ACAD OF SCI
View PDF0 Cites 51 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In an open wireless network, many application systems require a reliable identity authentication mechanism, and some data resources also require different access rights to be set according to the identity of the user. Now the com

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile identity authentication system and its authentication method
  • A mobile identity authentication system and its authentication method
  • A mobile identity authentication system and its authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0081] Embodiment 1: Mobile phone car key based on palmprint recognition

[0082] Embed non-contact IC chip in the mobile phone, just can have remote control function, and this is prior art. In this example, the user chooses to use the mobile phone as the key of the car, and writes the corresponding secret information (which can be a key) in the car lock and the IC chip of the mobile phone. Assume that the mobile phone IC chip has the following characteristics:

[0083] One is protected, the internal information cannot be deciphered;

[0084] The second is controllable, and the transmission of radio frequency information can be started or stopped with control commands.

[0085] The advantage of above-mentioned mobile phone car key is convenient, and general user has mobile phone, needn't carry car key to go out in addition. But if the user loses his phone, his car is also at risk of being stolen.

[0086] If a set of palmprint recognition application module is installed on...

Embodiment 2

[0096] Criminals with previous convictions will collect their palmprint characteristics when they enter prisons or public security bureaus, and a central palmprint database for criminals will be established nationwide, which will be dynamically updated through wired or wireless networks. Each suspect has 3 images on each palm, and the feature size of each palmprint image is 512 bytes. Assuming that 10 million suspects’ palmprint features are collected, the storage space of the database is about 30G bytes. The capacity of the hard disk is generally 80G to 200G, which is enough to record the central palmprint database of all criminals in the country. The policeman on patrol is equipped with a mobile palmprint recognition system, that is, palmprint recognition software and communication software are installed on the PDA. If a suspicious fugitive is seen on the street, the police can use the camera on the PDA to collect the palmprint image of the suspect, automatically extract the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to digital image process, mode identification and wireless communication technique field and to one mobile id system and method, which uses palm image identification to test id on cell phone or PDA and comprises the following steps: getting palm images; extracting palm characteristics and computing similarity; identifying user; mobile device cameral head is image forming device to extract image characteristics to select local mobile terminal or remote servo.

Description

technical field [0001] The invention relates to the technical fields of digital image processing, pattern recognition and wireless communication, in particular to a mobile identity authentication system and authentication method based on palmprint image recognition realized on mobile devices such as mobile phones and PDAs. Background technique [0002] Mobile phones and personal digital assistants (PDAs, or personal handheld computers) with built-in cameras are becoming more and more popular now, and their own mobile computing and storage functions are becoming stronger and stronger, and corresponding wireless application software is also developing vigorously. [0003] A known mobile communication device, a mobile phone, is composed of a radio frequency chip, a mobile phone processor, and external devices. Referring to FIG. 1 , a known mobile communication device, a mobile phone, is composed of a radio frequency chip 2.1, an analog baseband circuit 2.2, a digital baseband c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06K9/00H04M11/00
Inventor 谭铁牛李子青孙哲南韩宇飞郝瑛
Owner INST OF AUTOMATION CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products