CN110458988A - Identity identifying method, computer readable storage medium and electronic lock - Google Patents
Identity identifying method, computer readable storage medium and electronic lock Download PDFInfo
- Publication number
- CN110458988A CN110458988A CN201910723222.9A CN201910723222A CN110458988A CN 110458988 A CN110458988 A CN 110458988A CN 201910723222 A CN201910723222 A CN 201910723222A CN 110458988 A CN110458988 A CN 110458988A
- Authority
- CN
- China
- Prior art keywords
- authentication
- identity
- authentication condition
- user
- threshold value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/14—Vascular patterns
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of identity identifying method, computer readable storage medium and electronic locks.Identity identifying method includes: the authentication information for acquiring user to be certified;Judge the current authentication moment whether within a preset period of time;If it is, carrying out authentication based on the first authentication condition, authentication is otherwise carried out based on the second authentication condition, wherein the authentication success rate based on first authentication condition is greater than the authentication success rate based on second authentication condition.The present invention improves the flexibility of authentication, the period that may be implemented frequently to authenticate in user suitably reduces security performance, improves percent of pass by the way that different certification thresholds is arranged in different periods.
Description
Technical field
The present invention relates to identity identifying technology field more particularly to a kind of identity identifying methods, further relate to a kind of computer
Readable storage medium storing program for executing and electronic lock.
Background technique
Today of senior house has been popularized in intelligent door lock, intelligent door lock how to be allowed to possess better user experience and peace
Full performance is to need the problem of thinking deeply.Fin- ger vein authentication is the highest authentication mode of current safety coefficient, be widely used in bank,
In the scenes such as financial circles.In view of the high security of fin- ger vein authentication, nowadays high-end intelligent door lock generally uses fin- ger vein authentication
Instead of finger print identifying.Due to the high security of fin- ger vein authentication, certification refuse it is sincere also higher, therefore using referring to intravenous approach
When being authenticated, not putting the lateral deviation just generated by user's finger will lead to authentification failure, usually occur needing to authenticate multiple
The successful phenomenon of ability.
As it can be seen that in the prior art intelligent door lock refer to hand vein recognition there are the problem of are as follows: for fin- ger vein authentication principle, out
It now refuses to refer to vein with module user in the collected characteristic point for referring to vein image of module when genuine situation is due to user authentication
Feature Points Matching number in image library does not reach the demand by certification, and the operation for being typically due to user lack of standardization is led
It causes, such as finger is not put just completely.Therefore, referring to hand vein recognition although has powerful security performance, but more harsh to user,
Reduce user experience.
Summary of the invention
The technical problem to be solved by the present invention is refer to hand vein recognition although and have powerful security performance, but to user compared with
For harshness, user experience is reduced.
In order to solve the above technical problems, the present invention provides a kind of identity identifying method, computer readable storage medium and
Electronic lock.
According to an aspect of the present invention, a kind of identity identifying method is provided comprising:
Acquire the authentication information of user to be certified;
Judge the current authentication moment whether within a preset period of time;
In the case where judging the current authentication moment within a preset period of time, identity is carried out based on the first authentication condition and is recognized
Card;
In the case where judging that the current authentication moment is in the other times section except preset time period, recognize based on second
Card condition carries out authentication,
Wherein, the authentication success rate based on first authentication condition is greater than the body based on second authentication condition
Part certification success rate.
Preferably, the authentication information is finger venous image.
Preferably, authentication is carried out based on the first authentication condition, comprising:
Feature Points Matching is carried out to the finger venous image and the standard finger venous image as key, obtains finger
The feature point number of successful match in vein image;
Judge the number whether feature point number of the successful match is more than or equal in first authentication condition
Threshold value;
It is more than or equal to the number in first authentication condition in the feature point number for judging the successful match
In the case where threshold value, determine that the identity of user to be certified is legal;
Wherein, the number threshold value in first authentication condition is less than the number threshold value in second authentication condition.
Preferably, authentication is carried out based on the first authentication condition, further includes:
It is less than the feelings of the number threshold value in first authentication condition in the feature point number for judging the successful match
Under condition, determine that the identity of user to be certified is illegal.
Preferably, authentication is carried out based on the second authentication condition, comprising:
Feature Points Matching is carried out to the finger venous image and the standard finger venous image as key, obtains finger
The feature point number of successful match in vein image;
Judge the number whether feature point number of the successful match is more than or equal in second authentication condition
Threshold value;
It is more than or equal to the number in second authentication condition in the feature point number for judging the successful match
In the case where threshold value, determine that the identity of user to be certified is legal;
Wherein, the number threshold value in first authentication condition is less than the number threshold value in second authentication condition.
Preferably, authentication is carried out based on the second authentication condition, further includes:
It is less than the feelings of the number threshold value in second authentication condition in the feature point number for judging the successful match
Under condition, determine that the identity of user to be certified is illegal.
Preferably, before the authentication information for acquiring user to be certified, the method also includes:
Standard finger venous image of the offline acquisition as key.
Preferably, the preset time period is arranged via client.
According to another aspect of the present invention, a kind of computer readable storage medium is provided, wherein being stored with computer journey
Sequence, the computer program realize above-mentioned identity identifying method when being executed by processor.
According to another aspect of the invention, a kind of electronic lock is provided comprising:
Processor;
Computer readable storage medium, and the processor communication connection are deposited in the computer readable storage medium
The computer program of storage realizes above-mentioned identity identifying method when being executed by the processor;And
Lock body structure is controlled by the processor, to unlock when the identity of user to be certified is legal.
Compared with prior art, one or more embodiments in above scheme can have following advantage or beneficial to effect
Fruit:
Body is improved by the way that different certification thresholds is arranged in different periods using identity identifying method provided by the invention
The flexibility of part certification, such as the period that may be implemented frequently to authenticate in user suitably reduce security performance, improve percent of pass.
Detailed description of the invention
The detailed description for reading hereafter exemplary embodiment in conjunction with the accompanying drawings is better understood the scope of the present disclosure.Its
In included attached drawing be:
Fig. 1 shows the flow diagram of identity identifying method of the embodiment of the present invention;
Fig. 2 shows the flow diagrams for carrying out authentication in the embodiment of the present invention based on the first authentication condition;
Fig. 3 shows the flow diagram for carrying out authentication in the embodiment of the present invention based on the second authentication condition;
Fig. 4, which shows user of the embodiment of the present invention and adjusted according to the period, refers to vein security work flow diagram;
Fig. 5, which shows user in the embodiment of the present invention and adjusted according to the period, refers to vein security work schematic illustration.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, come below with reference to accompanying drawings and embodiments detailed
Illustrate implementation method of the invention, whereby to how the invention applies technical means to solve technical problems, and reaches technology effect
The realization process of fruit can be fully understood and implemented.
In the prior art intelligent door lock refer to hand vein recognition there are the problem of are as follows: for fin- ger vein authentication principle, refuse
Refer to vein image with module user in the collected characteristic point for referring to vein image of module when genuine situation is due to user authentication
Feature Points Matching number in library does not reach the demand by certification, be typically due to user operation it is lack of standardization cause, such as
Finger is not put just etc. completely.Therefore, referring to hand vein recognition although has powerful security performance, but more harsh to user, reduces
User experience.
In order to solve the above-mentioned technical problem, the embodiment of the invention provides a kind of identity identifying methods.
Embodiment one
Fig. 1 shows the flow diagram of identity identifying method of the embodiment of the present invention.As shown in Figure 1, the body of the present embodiment
Identity authentication method mainly includes step S101 to step S104.
In step s101, the authentication information of user to be certified is acquired.
Specifically, authentication information can be the biotinylated biomolecule of user to be certified, such as finger print information, the palm of user to be certified
Type information, shape of face information, retinal information, iris information, finger venous image etc..In a preferred embodiment of the invention,
Authentication information is preferably the finger venous image of user to be certified.
In step s 102, judge the current authentication moment whether within a preset period of time.
Specifically, preset time period can be arranged by the user for having been subjected to certification via cell phone client.In general,
The period frequently authenticated is set preset time period by the user.User can be arranged in the terminals such as mobile phone APP and refer to that vein is normal
6:00PM-7:00PM is set as with period, such as period.
It is worth noting that user can adjust the preset time period according to personal habits by software.
In step s 103, in the case where judging the current authentication moment within a preset period of time, based on the first certification
Condition carries out authentication.
In step S104, situation of the current authentication moment in the other times section except preset time period is being judged
Under, authentication is carried out based on the second authentication condition.Here, the authentication success rate based on first authentication condition is greater than
Authentication success rate based on second authentication condition.That is, the first authentication condition is looser than the second authentication condition, Yong Hurong
Easily by certification, at this point, even if there is lateral deviation in user, and possibly through the first authentication condition of relative loose.On the contrary
Ground, the second authentication condition are more harsh than the first authentication condition, and user is more difficult by certification, at this point, user needs stringent alignment detection
Device, occur significantly lateral deviation when be cannot be by the second relatively harsh authentication condition.
Specifically, Fig. 2 shows the process signals for carrying out authentication in the embodiment of the present invention based on the first authentication condition
Figure.As shown in Fig. 2, the embodiment of the present invention is based on the first authentication condition to carry out identity authentication method mainly including step S1031
To step S1034.
In step S1031, feature is carried out to the finger venous image and the standard finger venous image as key
Point matching, obtains the feature point number of successful match in finger venous image.Here, standard finger venous image can in advance from
Line is collected, using as matching when key.
In step S1032, judge whether the feature point number of the successful match is more than or equal to described first and recognizes
Number threshold value in card condition.Here, the number threshold value in first authentication condition is less than in second authentication condition
Number threshold value.For example, the number threshold value in the first authentication condition is 13, and the number threshold value in the second authentication condition is
23.
In step S1033, it is more than or equal to described first in the feature point number for judging the successful match and recognizes
In the case where number threshold value in card condition, determine that the identity of user to be certified is legal.
In step S1034, it is less than in first authentication condition in the feature point number for judging the successful match
Number threshold value in the case where, determine that the identity of user to be certified is illegal.
Fig. 3 shows the flow diagram for carrying out authentication in the embodiment of the present invention based on the second authentication condition.Such as Fig. 3
Shown, the embodiment of the present invention is based on the second authentication condition and carries out identity authentication method mainly to include step S1041 to step
S1044。
In step S1041, feature is carried out to the finger venous image and the standard finger venous image as key
Point matching, obtains the feature point number of successful match in finger venous image.
In step S1042, judge whether the feature point number of the successful match is more than or equal to described second and recognizes
Number threshold value in card condition.Here, the number threshold value in first authentication condition is less than in second authentication condition
Number threshold value.For example, the number threshold value in the first authentication condition is 13, and the number threshold value in the second authentication condition is
23.
In step S1043, it is more than or equal to described second in the feature point number for judging the successful match and recognizes
In the case where number threshold value in card condition, determine that the identity of user to be certified is legal.
In step S1044, it is less than in second authentication condition in the feature point number for judging the successful match
Number threshold value in the case where, determine that the identity of user to be certified is illegal.
Using identity identifying method provided in an embodiment of the present invention, by the way that different certification thresholds is arranged in different periods,
The flexibility of authentication is improved, such as the period that may be implemented frequently to authenticate in user suitably reduces security performance, improved
Percent of pass.Intelligent door lock is adjusted according to the period refer to hand vein recognition safety that is, the present embodiment realizes a kind of user
Can method, by different time period to certification refer to vein image characteristic point it is different from number of matches setting, it can be achieved that
User suitably reduces security performance the common period, improves percent of pass.
Embodiment two
An example of the invention is described in detail below with reference to Fig. 4 and Fig. 5.
Referring to Fig. 4, user is shown according to period adjusting and refers to vein security work flow chart.As shown in figure 4, user
It can be arranged in the terminals such as mobile phone APP and refer to that vein often uses the period, as the period is set as 6:00PM-7:00PM.If user
Fin- ger vein authentication is carried out within the set period, then required matching characteristic point number is reduced when fin- ger vein authentication, and finger is crossed in typing
The user of vein will be more easily by certification.If user carries out fin- ger vein authentication other periods outside the setting period, refer to
Vein is authenticated according to arm's length standard, and required matched vein image characteristic point is more when certification, and security performance reaches financial rank,
Valuation Standard is more harsh.
Referring to Fig. 5, user is shown according to period adjusting and refers to vein security work schematic diagram.As shown in figure 5, with
In the common finger vein period of family setting, such as during 6:00PM-7:00PM, user carries out required matching when fin- ger vein authentication
Image characteristic point it is less (in part (a) of Fig. 5 example be 13 characteristic points), user is easy to be not easy out by certification at this time
Now refuse genuine situation.And when outside the period, user carries out required matched image characteristic point more (Fig. 5 when fin- ger vein authentication
The part (b) in example be 23 characteristic points), refer to that hand vein recognition security performance is high at this time, user the person, property all can be
It ensures.
Using the identity identifying method of the present embodiment, it is arranged user's in the intelligent terminals platform such as cell phone application by user
Common authenticated time, such as quitting time 6:00PM-7:00PM.Fin- ger vein authentication is carried out within the time period needs matched finger
Vein pattern point quantity is few than usual, i.e. security performance decline (refers to that vein is finger blood-vessel image, can not replicate, security performance
Still it is much higher than fingerprint), user will be reduced using fin- ger vein authentication authentication requesting at this time, can user's finger has certain deviate
It authenticates successfully, improves user experience, and crossed period 6:00PM-7:00PM, restore normal, that is, it is harsh to restore certification
Situation.
Embodiment three
A kind of computer readable storage medium is present embodiments provided, wherein it is stored with computer program, the computer
The identity identifying method of above-described embodiment one or embodiment two is realized when program is executed by processor.
Using computer readable storage medium provided in an embodiment of the present invention, by the way that different certifications is arranged in different periods
Threshold, improves the flexibility of authentication, such as the period that may be implemented frequently to authenticate in user suitably reduces security performance,
Improve percent of pass.That is, the present embodiment is by referring to vein image characteristic point and coupling number to certification in different time period
Amount setting is different, it can be achieved that suitably reducing security performance, raising percent of pass the common period in user.
Example IV
Present embodiments provide a kind of intelligent electronic lock comprising processor and the calculating with processor communication connection
Machine readable storage medium storing program for executing and lock body structure.
Specifically, computer readable storage medium and processor communication connection store in computer readable storage medium
Computer program realizes the identity identifying method of above-described embodiment one or embodiment two when being executed by the processor.Lock body structure
It is controlled by the processor, unlocks when the identity of user to be certified is legal.
It is mentioned using intelligent electronic lock provided in an embodiment of the present invention by the way that different certification thresholds is arranged in different periods
The flexibility of high authentication, such as the period that may be implemented frequently to authenticate in user suitably reduce security performance, improve logical
Cross rate.That is, the present embodiment is by referring to that vein image characteristic point and number of matches are arranged to certification in different time period
Difference is, it can be achieved that suitably reduce security performance, raising percent of pass the common period in user.
While it is disclosed that embodiment content as above but described only to facilitate understanding the present invention and adopting
Embodiment is not intended to limit the invention.Any those skilled in the art to which this invention pertains are not departing from this
Under the premise of the disclosed spirit and scope of invention, any modification and change can be made in the implementing form and in details,
But protection scope of the present invention still should be subject to the scope of the claims as defined in the appended claims.
Claims (10)
1. a kind of identity identifying method characterized by comprising
Acquire the authentication information of user to be certified;
Judge the current authentication moment whether within a preset period of time;
In the case where judging the current authentication moment within a preset period of time, authentication is carried out based on the first authentication condition;
In the case where judging that the current authentication moment is in the other times section except preset time period, based on the second certification item
Part carries out authentication,
Wherein, the authentication success rate based on first authentication condition is greater than the identity based on second authentication condition and recognizes
Demonstrate,prove success rate.
2. identity identifying method according to claim 1, which is characterized in that the authentication information is finger venous image.
3. identity identifying method according to claim 2, which is characterized in that carry out identity based on the first authentication condition and recognize
Card, comprising:
Feature Points Matching is carried out to the finger venous image and the standard finger venous image as key, obtains finger vena
The feature point number of successful match in image;
Judge the number the threshold value whether feature point number of the successful match is more than or equal in first authentication condition;
It is more than or equal to the number threshold value in first authentication condition in the feature point number for judging the successful match
In the case where, determine that the identity of user to be certified is legal;
Wherein, the number threshold value in first authentication condition is less than the number threshold value in second authentication condition.
4. identity identifying method according to claim 3, which is characterized in that carry out identity based on the first authentication condition and recognize
Card, further includes:
In the case where judging that the feature point number of the successful match is less than the number threshold value in first authentication condition,
Determine that the identity of user to be certified is illegal.
5. identity identifying method according to claim 2, which is characterized in that carry out identity based on the second authentication condition and recognize
Card, comprising:
Feature Points Matching is carried out to the finger venous image and the standard finger venous image as key, obtains finger vena
The feature point number of successful match in image;
Judge the number the threshold value whether feature point number of the successful match is more than or equal in second authentication condition;
It is more than or equal to the number threshold value in second authentication condition in the feature point number for judging the successful match
In the case where, determine that the identity of user to be certified is legal;
Wherein, the number threshold value in first authentication condition is less than the number threshold value in second authentication condition.
6. identity identifying method according to claim 5, which is characterized in that carry out identity based on the second authentication condition and recognize
Card, further includes:
In the case where judging that the feature point number of the successful match is less than the number threshold value in second authentication condition,
Determine that the identity of user to be certified is illegal.
7. identity identifying method according to claim 2, which is characterized in that the authentication information for acquiring user to be certified it
Before, the method also includes:
Standard finger venous image of the offline acquisition as key.
8. identity identifying method according to any one of claim 1 to 7, which is characterized in that the preset time period is
Via client setting.
9. a kind of computer readable storage medium, which is characterized in that be wherein stored with computer program, the computer program quilt
Such as identity identifying method described in any item of the claim 1 to 8 is realized when processor executes.
10. a kind of electronic lock characterized by comprising
Processor;
Computer readable storage medium, and the processor communication connection store in the computer readable storage medium
Such as identity identifying method described in any item of the claim 1 to 8 is realized when computer program is executed by the processor;And
Lock body structure is controlled by the processor, to unlock when the identity of user to be certified is legal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910723222.9A CN110458988A (en) | 2019-08-06 | 2019-08-06 | Identity identifying method, computer readable storage medium and electronic lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910723222.9A CN110458988A (en) | 2019-08-06 | 2019-08-06 | Identity identifying method, computer readable storage medium and electronic lock |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110458988A true CN110458988A (en) | 2019-11-15 |
Family
ID=68485181
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910723222.9A Pending CN110458988A (en) | 2019-08-06 | 2019-08-06 | Identity identifying method, computer readable storage medium and electronic lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110458988A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105513179A (en) * | 2015-12-07 | 2016-04-20 | 小米科技有限责任公司 | Unlocking method and device, as well as intelligent lock |
CN107045744A (en) * | 2017-04-14 | 2017-08-15 | 特斯联(北京)科技有限公司 | A kind of intelligent villa entrance guard authentication method and system |
CN108537917A (en) * | 2018-02-07 | 2018-09-14 | 青岛海尔智能家电科技有限公司 | Identification success rate improvement method and intelligent door lock, doorway machine and server |
CN108960187A (en) * | 2018-07-20 | 2018-12-07 | 珠海格力电器股份有限公司 | Permission determines method and device |
CN109389070A (en) * | 2018-09-29 | 2019-02-26 | 珠海格力电器股份有限公司 | It is a kind of to refer to hand vein recognition device, generating the method and apparatus for referring to vein model |
CN109410371A (en) * | 2017-08-16 | 2019-03-01 | 广州子祥信息科技有限公司 | Finger vein identification access control system based on intelligent management |
-
2019
- 2019-08-06 CN CN201910723222.9A patent/CN110458988A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105513179A (en) * | 2015-12-07 | 2016-04-20 | 小米科技有限责任公司 | Unlocking method and device, as well as intelligent lock |
CN107045744A (en) * | 2017-04-14 | 2017-08-15 | 特斯联(北京)科技有限公司 | A kind of intelligent villa entrance guard authentication method and system |
CN109410371A (en) * | 2017-08-16 | 2019-03-01 | 广州子祥信息科技有限公司 | Finger vein identification access control system based on intelligent management |
CN108537917A (en) * | 2018-02-07 | 2018-09-14 | 青岛海尔智能家电科技有限公司 | Identification success rate improvement method and intelligent door lock, doorway machine and server |
CN108960187A (en) * | 2018-07-20 | 2018-12-07 | 珠海格力电器股份有限公司 | Permission determines method and device |
CN109389070A (en) * | 2018-09-29 | 2019-02-26 | 珠海格力电器股份有限公司 | It is a kind of to refer to hand vein recognition device, generating the method and apparatus for referring to vein model |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10777030B2 (en) | Conditional and situational biometric authentication and enrollment | |
CN106096539B (en) | A kind of method and terminal for carrying out bio-identification | |
US9122913B2 (en) | Method for logging a user in to a mobile device | |
US20210004451A1 (en) | Step-up authentication | |
CN106446652A (en) | Mobile terminal unlocking method and mobile terminal unlocking device | |
US10963714B2 (en) | Method for updating biometric reference data | |
US20130326613A1 (en) | Dynamic control of device unlocking security level | |
EP1417633A1 (en) | Fingerprint scar recognition method and apparatus | |
Sun et al. | A 3‐D hand gesture signature based biometric authentication system for smartphones | |
WO2016188230A1 (en) | Unlocking method and device | |
CN110675549B (en) | Bank account security processing method and device | |
US20190371099A1 (en) | Biometric fusion electronic lock system | |
CN105006077A (en) | ATM safe operation method and system based on fingerprint identification, and ATM | |
CN105701386A (en) | Security certification method and device | |
WO2021011769A1 (en) | Methods, systems, and media for secure authentication of users using one or more biometric recognition systems | |
CN106599843A (en) | Fingerprint authentication method and device | |
Yang et al. | Retraining and dynamic privilege for implicit authentication systems | |
CN110458988A (en) | Identity identifying method, computer readable storage medium and electronic lock | |
Lee et al. | Feature subset for improving accuracy of keystroke dynamics on mobile environment | |
KR102060563B1 (en) | Method and apparatus for providing authentication using voice and facial data | |
JP2007011710A (en) | Authentication device and authentication method | |
US20220253513A1 (en) | Biometric-based graded authentication systems and methods | |
Singh | Robust security system for critical computers | |
CN108629247A (en) | A kind of method and system based on face eyeprint certification | |
CN106548544A (en) | A kind of unlocking system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |