CN110458988A - Identity identifying method, computer readable storage medium and electronic lock - Google Patents

Identity identifying method, computer readable storage medium and electronic lock Download PDF

Info

Publication number
CN110458988A
CN110458988A CN201910723222.9A CN201910723222A CN110458988A CN 110458988 A CN110458988 A CN 110458988A CN 201910723222 A CN201910723222 A CN 201910723222A CN 110458988 A CN110458988 A CN 110458988A
Authority
CN
China
Prior art keywords
authentication
identity
authentication condition
user
threshold value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910723222.9A
Other languages
Chinese (zh)
Inventor
张景弘
唐磊
吴健锐
黄俊炜
陈育新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201910723222.9A priority Critical patent/CN110458988A/en
Publication of CN110458988A publication Critical patent/CN110458988A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/14Vascular patterns

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of identity identifying method, computer readable storage medium and electronic locks.Identity identifying method includes: the authentication information for acquiring user to be certified;Judge the current authentication moment whether within a preset period of time;If it is, carrying out authentication based on the first authentication condition, authentication is otherwise carried out based on the second authentication condition, wherein the authentication success rate based on first authentication condition is greater than the authentication success rate based on second authentication condition.The present invention improves the flexibility of authentication, the period that may be implemented frequently to authenticate in user suitably reduces security performance, improves percent of pass by the way that different certification thresholds is arranged in different periods.

Description

Identity identifying method, computer readable storage medium and electronic lock
Technical field
The present invention relates to identity identifying technology field more particularly to a kind of identity identifying methods, further relate to a kind of computer Readable storage medium storing program for executing and electronic lock.
Background technique
Today of senior house has been popularized in intelligent door lock, intelligent door lock how to be allowed to possess better user experience and peace Full performance is to need the problem of thinking deeply.Fin- ger vein authentication is the highest authentication mode of current safety coefficient, be widely used in bank, In the scenes such as financial circles.In view of the high security of fin- ger vein authentication, nowadays high-end intelligent door lock generally uses fin- ger vein authentication Instead of finger print identifying.Due to the high security of fin- ger vein authentication, certification refuse it is sincere also higher, therefore using referring to intravenous approach When being authenticated, not putting the lateral deviation just generated by user's finger will lead to authentification failure, usually occur needing to authenticate multiple The successful phenomenon of ability.
As it can be seen that in the prior art intelligent door lock refer to hand vein recognition there are the problem of are as follows: for fin- ger vein authentication principle, out It now refuses to refer to vein with module user in the collected characteristic point for referring to vein image of module when genuine situation is due to user authentication Feature Points Matching number in image library does not reach the demand by certification, and the operation for being typically due to user lack of standardization is led It causes, such as finger is not put just completely.Therefore, referring to hand vein recognition although has powerful security performance, but more harsh to user, Reduce user experience.
Summary of the invention
The technical problem to be solved by the present invention is refer to hand vein recognition although and have powerful security performance, but to user compared with For harshness, user experience is reduced.
In order to solve the above technical problems, the present invention provides a kind of identity identifying method, computer readable storage medium and Electronic lock.
According to an aspect of the present invention, a kind of identity identifying method is provided comprising:
Acquire the authentication information of user to be certified;
Judge the current authentication moment whether within a preset period of time;
In the case where judging the current authentication moment within a preset period of time, identity is carried out based on the first authentication condition and is recognized Card;
In the case where judging that the current authentication moment is in the other times section except preset time period, recognize based on second Card condition carries out authentication,
Wherein, the authentication success rate based on first authentication condition is greater than the body based on second authentication condition Part certification success rate.
Preferably, the authentication information is finger venous image.
Preferably, authentication is carried out based on the first authentication condition, comprising:
Feature Points Matching is carried out to the finger venous image and the standard finger venous image as key, obtains finger The feature point number of successful match in vein image;
Judge the number whether feature point number of the successful match is more than or equal in first authentication condition Threshold value;
It is more than or equal to the number in first authentication condition in the feature point number for judging the successful match In the case where threshold value, determine that the identity of user to be certified is legal;
Wherein, the number threshold value in first authentication condition is less than the number threshold value in second authentication condition.
Preferably, authentication is carried out based on the first authentication condition, further includes:
It is less than the feelings of the number threshold value in first authentication condition in the feature point number for judging the successful match Under condition, determine that the identity of user to be certified is illegal.
Preferably, authentication is carried out based on the second authentication condition, comprising:
Feature Points Matching is carried out to the finger venous image and the standard finger venous image as key, obtains finger The feature point number of successful match in vein image;
Judge the number whether feature point number of the successful match is more than or equal in second authentication condition Threshold value;
It is more than or equal to the number in second authentication condition in the feature point number for judging the successful match In the case where threshold value, determine that the identity of user to be certified is legal;
Wherein, the number threshold value in first authentication condition is less than the number threshold value in second authentication condition.
Preferably, authentication is carried out based on the second authentication condition, further includes:
It is less than the feelings of the number threshold value in second authentication condition in the feature point number for judging the successful match Under condition, determine that the identity of user to be certified is illegal.
Preferably, before the authentication information for acquiring user to be certified, the method also includes:
Standard finger venous image of the offline acquisition as key.
Preferably, the preset time period is arranged via client.
According to another aspect of the present invention, a kind of computer readable storage medium is provided, wherein being stored with computer journey Sequence, the computer program realize above-mentioned identity identifying method when being executed by processor.
According to another aspect of the invention, a kind of electronic lock is provided comprising:
Processor;
Computer readable storage medium, and the processor communication connection are deposited in the computer readable storage medium The computer program of storage realizes above-mentioned identity identifying method when being executed by the processor;And
Lock body structure is controlled by the processor, to unlock when the identity of user to be certified is legal.
Compared with prior art, one or more embodiments in above scheme can have following advantage or beneficial to effect Fruit:
Body is improved by the way that different certification thresholds is arranged in different periods using identity identifying method provided by the invention The flexibility of part certification, such as the period that may be implemented frequently to authenticate in user suitably reduce security performance, improve percent of pass.
Detailed description of the invention
The detailed description for reading hereafter exemplary embodiment in conjunction with the accompanying drawings is better understood the scope of the present disclosure.Its In included attached drawing be:
Fig. 1 shows the flow diagram of identity identifying method of the embodiment of the present invention;
Fig. 2 shows the flow diagrams for carrying out authentication in the embodiment of the present invention based on the first authentication condition;
Fig. 3 shows the flow diagram for carrying out authentication in the embodiment of the present invention based on the second authentication condition;
Fig. 4, which shows user of the embodiment of the present invention and adjusted according to the period, refers to vein security work flow diagram;
Fig. 5, which shows user in the embodiment of the present invention and adjusted according to the period, refers to vein security work schematic illustration.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, come below with reference to accompanying drawings and embodiments detailed Illustrate implementation method of the invention, whereby to how the invention applies technical means to solve technical problems, and reaches technology effect The realization process of fruit can be fully understood and implemented.
In the prior art intelligent door lock refer to hand vein recognition there are the problem of are as follows: for fin- ger vein authentication principle, refuse Refer to vein image with module user in the collected characteristic point for referring to vein image of module when genuine situation is due to user authentication Feature Points Matching number in library does not reach the demand by certification, be typically due to user operation it is lack of standardization cause, such as Finger is not put just etc. completely.Therefore, referring to hand vein recognition although has powerful security performance, but more harsh to user, reduces User experience.
In order to solve the above-mentioned technical problem, the embodiment of the invention provides a kind of identity identifying methods.
Embodiment one
Fig. 1 shows the flow diagram of identity identifying method of the embodiment of the present invention.As shown in Figure 1, the body of the present embodiment Identity authentication method mainly includes step S101 to step S104.
In step s101, the authentication information of user to be certified is acquired.
Specifically, authentication information can be the biotinylated biomolecule of user to be certified, such as finger print information, the palm of user to be certified Type information, shape of face information, retinal information, iris information, finger venous image etc..In a preferred embodiment of the invention, Authentication information is preferably the finger venous image of user to be certified.
In step s 102, judge the current authentication moment whether within a preset period of time.
Specifically, preset time period can be arranged by the user for having been subjected to certification via cell phone client.In general, The period frequently authenticated is set preset time period by the user.User can be arranged in the terminals such as mobile phone APP and refer to that vein is normal 6:00PM-7:00PM is set as with period, such as period.
It is worth noting that user can adjust the preset time period according to personal habits by software.
In step s 103, in the case where judging the current authentication moment within a preset period of time, based on the first certification Condition carries out authentication.
In step S104, situation of the current authentication moment in the other times section except preset time period is being judged Under, authentication is carried out based on the second authentication condition.Here, the authentication success rate based on first authentication condition is greater than Authentication success rate based on second authentication condition.That is, the first authentication condition is looser than the second authentication condition, Yong Hurong Easily by certification, at this point, even if there is lateral deviation in user, and possibly through the first authentication condition of relative loose.On the contrary Ground, the second authentication condition are more harsh than the first authentication condition, and user is more difficult by certification, at this point, user needs stringent alignment detection Device, occur significantly lateral deviation when be cannot be by the second relatively harsh authentication condition.
Specifically, Fig. 2 shows the process signals for carrying out authentication in the embodiment of the present invention based on the first authentication condition Figure.As shown in Fig. 2, the embodiment of the present invention is based on the first authentication condition to carry out identity authentication method mainly including step S1031 To step S1034.
In step S1031, feature is carried out to the finger venous image and the standard finger venous image as key Point matching, obtains the feature point number of successful match in finger venous image.Here, standard finger venous image can in advance from Line is collected, using as matching when key.
In step S1032, judge whether the feature point number of the successful match is more than or equal to described first and recognizes Number threshold value in card condition.Here, the number threshold value in first authentication condition is less than in second authentication condition Number threshold value.For example, the number threshold value in the first authentication condition is 13, and the number threshold value in the second authentication condition is 23.
In step S1033, it is more than or equal to described first in the feature point number for judging the successful match and recognizes In the case where number threshold value in card condition, determine that the identity of user to be certified is legal.
In step S1034, it is less than in first authentication condition in the feature point number for judging the successful match Number threshold value in the case where, determine that the identity of user to be certified is illegal.
Fig. 3 shows the flow diagram for carrying out authentication in the embodiment of the present invention based on the second authentication condition.Such as Fig. 3 Shown, the embodiment of the present invention is based on the second authentication condition and carries out identity authentication method mainly to include step S1041 to step S1044。
In step S1041, feature is carried out to the finger venous image and the standard finger venous image as key Point matching, obtains the feature point number of successful match in finger venous image.
In step S1042, judge whether the feature point number of the successful match is more than or equal to described second and recognizes Number threshold value in card condition.Here, the number threshold value in first authentication condition is less than in second authentication condition Number threshold value.For example, the number threshold value in the first authentication condition is 13, and the number threshold value in the second authentication condition is 23.
In step S1043, it is more than or equal to described second in the feature point number for judging the successful match and recognizes In the case where number threshold value in card condition, determine that the identity of user to be certified is legal.
In step S1044, it is less than in second authentication condition in the feature point number for judging the successful match Number threshold value in the case where, determine that the identity of user to be certified is illegal.
Using identity identifying method provided in an embodiment of the present invention, by the way that different certification thresholds is arranged in different periods, The flexibility of authentication is improved, such as the period that may be implemented frequently to authenticate in user suitably reduces security performance, improved Percent of pass.Intelligent door lock is adjusted according to the period refer to hand vein recognition safety that is, the present embodiment realizes a kind of user Can method, by different time period to certification refer to vein image characteristic point it is different from number of matches setting, it can be achieved that User suitably reduces security performance the common period, improves percent of pass.
Embodiment two
An example of the invention is described in detail below with reference to Fig. 4 and Fig. 5.
Referring to Fig. 4, user is shown according to period adjusting and refers to vein security work flow chart.As shown in figure 4, user It can be arranged in the terminals such as mobile phone APP and refer to that vein often uses the period, as the period is set as 6:00PM-7:00PM.If user Fin- ger vein authentication is carried out within the set period, then required matching characteristic point number is reduced when fin- ger vein authentication, and finger is crossed in typing The user of vein will be more easily by certification.If user carries out fin- ger vein authentication other periods outside the setting period, refer to Vein is authenticated according to arm's length standard, and required matched vein image characteristic point is more when certification, and security performance reaches financial rank, Valuation Standard is more harsh.
Referring to Fig. 5, user is shown according to period adjusting and refers to vein security work schematic diagram.As shown in figure 5, with In the common finger vein period of family setting, such as during 6:00PM-7:00PM, user carries out required matching when fin- ger vein authentication Image characteristic point it is less (in part (a) of Fig. 5 example be 13 characteristic points), user is easy to be not easy out by certification at this time Now refuse genuine situation.And when outside the period, user carries out required matched image characteristic point more (Fig. 5 when fin- ger vein authentication The part (b) in example be 23 characteristic points), refer to that hand vein recognition security performance is high at this time, user the person, property all can be It ensures.
Using the identity identifying method of the present embodiment, it is arranged user's in the intelligent terminals platform such as cell phone application by user Common authenticated time, such as quitting time 6:00PM-7:00PM.Fin- ger vein authentication is carried out within the time period needs matched finger Vein pattern point quantity is few than usual, i.e. security performance decline (refers to that vein is finger blood-vessel image, can not replicate, security performance Still it is much higher than fingerprint), user will be reduced using fin- ger vein authentication authentication requesting at this time, can user's finger has certain deviate It authenticates successfully, improves user experience, and crossed period 6:00PM-7:00PM, restore normal, that is, it is harsh to restore certification Situation.
Embodiment three
A kind of computer readable storage medium is present embodiments provided, wherein it is stored with computer program, the computer The identity identifying method of above-described embodiment one or embodiment two is realized when program is executed by processor.
Using computer readable storage medium provided in an embodiment of the present invention, by the way that different certifications is arranged in different periods Threshold, improves the flexibility of authentication, such as the period that may be implemented frequently to authenticate in user suitably reduces security performance, Improve percent of pass.That is, the present embodiment is by referring to vein image characteristic point and coupling number to certification in different time period Amount setting is different, it can be achieved that suitably reducing security performance, raising percent of pass the common period in user.
Example IV
Present embodiments provide a kind of intelligent electronic lock comprising processor and the calculating with processor communication connection Machine readable storage medium storing program for executing and lock body structure.
Specifically, computer readable storage medium and processor communication connection store in computer readable storage medium Computer program realizes the identity identifying method of above-described embodiment one or embodiment two when being executed by the processor.Lock body structure It is controlled by the processor, unlocks when the identity of user to be certified is legal.
It is mentioned using intelligent electronic lock provided in an embodiment of the present invention by the way that different certification thresholds is arranged in different periods The flexibility of high authentication, such as the period that may be implemented frequently to authenticate in user suitably reduce security performance, improve logical Cross rate.That is, the present embodiment is by referring to that vein image characteristic point and number of matches are arranged to certification in different time period Difference is, it can be achieved that suitably reduce security performance, raising percent of pass the common period in user.
While it is disclosed that embodiment content as above but described only to facilitate understanding the present invention and adopting Embodiment is not intended to limit the invention.Any those skilled in the art to which this invention pertains are not departing from this Under the premise of the disclosed spirit and scope of invention, any modification and change can be made in the implementing form and in details, But protection scope of the present invention still should be subject to the scope of the claims as defined in the appended claims.

Claims (10)

1. a kind of identity identifying method characterized by comprising
Acquire the authentication information of user to be certified;
Judge the current authentication moment whether within a preset period of time;
In the case where judging the current authentication moment within a preset period of time, authentication is carried out based on the first authentication condition;
In the case where judging that the current authentication moment is in the other times section except preset time period, based on the second certification item Part carries out authentication,
Wherein, the authentication success rate based on first authentication condition is greater than the identity based on second authentication condition and recognizes Demonstrate,prove success rate.
2. identity identifying method according to claim 1, which is characterized in that the authentication information is finger venous image.
3. identity identifying method according to claim 2, which is characterized in that carry out identity based on the first authentication condition and recognize Card, comprising:
Feature Points Matching is carried out to the finger venous image and the standard finger venous image as key, obtains finger vena The feature point number of successful match in image;
Judge the number the threshold value whether feature point number of the successful match is more than or equal in first authentication condition;
It is more than or equal to the number threshold value in first authentication condition in the feature point number for judging the successful match In the case where, determine that the identity of user to be certified is legal;
Wherein, the number threshold value in first authentication condition is less than the number threshold value in second authentication condition.
4. identity identifying method according to claim 3, which is characterized in that carry out identity based on the first authentication condition and recognize Card, further includes:
In the case where judging that the feature point number of the successful match is less than the number threshold value in first authentication condition, Determine that the identity of user to be certified is illegal.
5. identity identifying method according to claim 2, which is characterized in that carry out identity based on the second authentication condition and recognize Card, comprising:
Feature Points Matching is carried out to the finger venous image and the standard finger venous image as key, obtains finger vena The feature point number of successful match in image;
Judge the number the threshold value whether feature point number of the successful match is more than or equal in second authentication condition;
It is more than or equal to the number threshold value in second authentication condition in the feature point number for judging the successful match In the case where, determine that the identity of user to be certified is legal;
Wherein, the number threshold value in first authentication condition is less than the number threshold value in second authentication condition.
6. identity identifying method according to claim 5, which is characterized in that carry out identity based on the second authentication condition and recognize Card, further includes:
In the case where judging that the feature point number of the successful match is less than the number threshold value in second authentication condition, Determine that the identity of user to be certified is illegal.
7. identity identifying method according to claim 2, which is characterized in that the authentication information for acquiring user to be certified it Before, the method also includes:
Standard finger venous image of the offline acquisition as key.
8. identity identifying method according to any one of claim 1 to 7, which is characterized in that the preset time period is Via client setting.
9. a kind of computer readable storage medium, which is characterized in that be wherein stored with computer program, the computer program quilt Such as identity identifying method described in any item of the claim 1 to 8 is realized when processor executes.
10. a kind of electronic lock characterized by comprising
Processor;
Computer readable storage medium, and the processor communication connection store in the computer readable storage medium Such as identity identifying method described in any item of the claim 1 to 8 is realized when computer program is executed by the processor;And
Lock body structure is controlled by the processor, to unlock when the identity of user to be certified is legal.
CN201910723222.9A 2019-08-06 2019-08-06 Identity identifying method, computer readable storage medium and electronic lock Pending CN110458988A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910723222.9A CN110458988A (en) 2019-08-06 2019-08-06 Identity identifying method, computer readable storage medium and electronic lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910723222.9A CN110458988A (en) 2019-08-06 2019-08-06 Identity identifying method, computer readable storage medium and electronic lock

Publications (1)

Publication Number Publication Date
CN110458988A true CN110458988A (en) 2019-11-15

Family

ID=68485181

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910723222.9A Pending CN110458988A (en) 2019-08-06 2019-08-06 Identity identifying method, computer readable storage medium and electronic lock

Country Status (1)

Country Link
CN (1) CN110458988A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105513179A (en) * 2015-12-07 2016-04-20 小米科技有限责任公司 Unlocking method and device, as well as intelligent lock
CN107045744A (en) * 2017-04-14 2017-08-15 特斯联(北京)科技有限公司 A kind of intelligent villa entrance guard authentication method and system
CN108537917A (en) * 2018-02-07 2018-09-14 青岛海尔智能家电科技有限公司 Identification success rate improvement method and intelligent door lock, doorway machine and server
CN108960187A (en) * 2018-07-20 2018-12-07 珠海格力电器股份有限公司 Permission determines method and device
CN109389070A (en) * 2018-09-29 2019-02-26 珠海格力电器股份有限公司 It is a kind of to refer to hand vein recognition device, generating the method and apparatus for referring to vein model
CN109410371A (en) * 2017-08-16 2019-03-01 广州子祥信息科技有限公司 Finger vein identification access control system based on intelligent management

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105513179A (en) * 2015-12-07 2016-04-20 小米科技有限责任公司 Unlocking method and device, as well as intelligent lock
CN107045744A (en) * 2017-04-14 2017-08-15 特斯联(北京)科技有限公司 A kind of intelligent villa entrance guard authentication method and system
CN109410371A (en) * 2017-08-16 2019-03-01 广州子祥信息科技有限公司 Finger vein identification access control system based on intelligent management
CN108537917A (en) * 2018-02-07 2018-09-14 青岛海尔智能家电科技有限公司 Identification success rate improvement method and intelligent door lock, doorway machine and server
CN108960187A (en) * 2018-07-20 2018-12-07 珠海格力电器股份有限公司 Permission determines method and device
CN109389070A (en) * 2018-09-29 2019-02-26 珠海格力电器股份有限公司 It is a kind of to refer to hand vein recognition device, generating the method and apparatus for referring to vein model

Similar Documents

Publication Publication Date Title
US10777030B2 (en) Conditional and situational biometric authentication and enrollment
CN106096539B (en) A kind of method and terminal for carrying out bio-identification
US9122913B2 (en) Method for logging a user in to a mobile device
US20210004451A1 (en) Step-up authentication
CN106446652A (en) Mobile terminal unlocking method and mobile terminal unlocking device
US10963714B2 (en) Method for updating biometric reference data
US20130326613A1 (en) Dynamic control of device unlocking security level
EP1417633A1 (en) Fingerprint scar recognition method and apparatus
Sun et al. A 3‐D hand gesture signature based biometric authentication system for smartphones
WO2016188230A1 (en) Unlocking method and device
CN110675549B (en) Bank account security processing method and device
US20190371099A1 (en) Biometric fusion electronic lock system
CN105006077A (en) ATM safe operation method and system based on fingerprint identification, and ATM
CN105701386A (en) Security certification method and device
WO2021011769A1 (en) Methods, systems, and media for secure authentication of users using one or more biometric recognition systems
CN106599843A (en) Fingerprint authentication method and device
Yang et al. Retraining and dynamic privilege for implicit authentication systems
CN110458988A (en) Identity identifying method, computer readable storage medium and electronic lock
Lee et al. Feature subset for improving accuracy of keystroke dynamics on mobile environment
KR102060563B1 (en) Method and apparatus for providing authentication using voice and facial data
JP2007011710A (en) Authentication device and authentication method
US20220253513A1 (en) Biometric-based graded authentication systems and methods
Singh Robust security system for critical computers
CN108629247A (en) A kind of method and system based on face eyeprint certification
CN106548544A (en) A kind of unlocking system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination