WO2013139221A1 - 一种基于生物特征的认证方法、装置及系统 - Google Patents
一种基于生物特征的认证方法、装置及系统 Download PDFInfo
- Publication number
- WO2013139221A1 WO2013139221A1 PCT/CN2013/072531 CN2013072531W WO2013139221A1 WO 2013139221 A1 WO2013139221 A1 WO 2013139221A1 CN 2013072531 W CN2013072531 W CN 2013072531W WO 2013139221 A1 WO2013139221 A1 WO 2013139221A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- biometric
- client
- authenticated
- image
- template
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/94—Hardware or software architectures specially adapted for image or video understanding
- G06V10/95—Hardware or software architectures specially adapted for image or video understanding structured as a network, e.g. client-server architectures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/50—Maintenance of biometric data or enrolment thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/04—Protocols for data compression, e.g. ROHC
Definitions
- the present invention relates to the field of computers, and in particular, to a biometric-based authentication method, apparatus, and system.
- Biometrics technology refers to the identification of a person's identity using human physiological or behavioral characteristics. In today's information age, how to accurately identify a person's identity and protect information security has become a key social issue that must be resolved. Traditional identity authentication Because it is extremely easy to forge and lose, it is increasingly difficult to meet the needs of society. The most convenient and secure solution is biometrics. It is not only fast and clean, but it is also very secure, reliable and accurate for identity authentication.
- biometric identification technologies mainly include: face recognition, fingerprint recognition, and iris recognition.
- Face recognition is taken as an example.
- a variety of face recognition-based authentication services are included, such as: Attendance service based on hardware such as attendance machine, local face collection and matching, face attendance and access control Features,
- Embodiments of the present invention provide a biometric-based authentication method, apparatus, and system.
- the technical solution is as follows:
- a biometric-based authentication method comprising:
- Feature extraction is performed on the biometric image to be authenticated to obtain a biometric template to be authenticated, and the biometric template saved locally is matched and authenticated, and the matching authentication result is returned. Further, the feature extraction of the to-be-certified biometric image to obtain a biometric template to be authenticated includes:
- Feature extraction is performed on the biometric image to be authenticated after the illumination normalization, and the extracted features are subjected to dimension reduction calculation, and the descending dimension calculation results are sequentially serially connected to the to-be-certified biometric template.
- the method further includes:
- Feature extraction is performed on the biometric image to be registered to obtain a biometric template, and the corresponding relationship between the biometric template, the client identifier, and the first user identifier is saved to complete registration of the user, and the registration result is returned.
- the method further includes:
- the user identifiers in the recognition result set are sorted according to the order of similarity from large to d, and the recognition result set is returned to the client.
- the method further includes:
- the matching authentication is performed with the locally saved biometric template, and the matching authentication result is returned, including:
- a biometric-based authentication method comprising:
- the performing biometric positioning processing on the user image to obtain the biometric image to be authenticated includes:
- a cloud server includes:
- An access module configured to receive a biometric image to be authenticated sent by the client, and an authentication module, configured to perform feature extraction on the biometric image to be authenticated to obtain a biometric template to be authenticated, and the biometric template saved in the data module Perform matching authentication and return matching authentication results;
- the data module is configured to save the biometric template. Further, the authentication module includes:
- An illumination processing unit configured to perform illumination normalization processing on the biometric image to be authenticated
- a feature extraction unit configured to normalize the illumination to be authenticated biometrics
- the image is subjected to feature extraction, and the extracted features are subjected to dimension reduction calculation, and the reduced dimension calculation results are sequentially connected in series to obtain the to-be-certified biometric template;
- an authentication unit configured to perform matching and authentication on the biometric template to be authenticated and the biometric template saved in the data module, and return a matching authentication result.
- the access module is further configured to: before receiving the biometric image to be authenticated sent by the client, receive the to-be-registered biometric image, the client identifier, and the first user identifier sent by the client;
- the cloud server further includes:
- a session module configured to perform feature extraction on the biometric image to be registered to obtain a biometric template, and send a correspondence between the biometric template, the client identifier, and the first user identifier to the data module To complete the user's registration and return the registration result;
- the data module is further configured to save a correspondence between the biometric template, the client identifier, and the first user identifier.
- the access module is further configured to: when receiving the biometric image to be authenticated sent by the client, receive the client identifier sent by the client;
- the authentication module includes:
- a template obtaining unit configured to perform feature extraction on the biometric image to be authenticated to obtain a biometric template to be authenticated
- a collection obtaining unit configured to search, according to the client identifier, a set of biometric templates saved in the data module corresponding to the client identifier;
- a recognition unit configured to perform similarity calculation on the biometric template to be authenticated and each biometric template in the set, where the similarity between the biometric template in the set and the biometric template to be authenticated is greater than
- the identification result sending unit is configured to sort the user identifiers in the recognition result set according to the order of similarity, and return the recognition result set to the client through the access module.
- the access module is further configured to: when receiving the biometric image to be authenticated sent by the client, receive the client identifier and the second user identifier sent by the client;
- the authentication module includes:
- a template obtaining unit configured to perform feature extraction on the biometric image to be authenticated to obtain a biometric template to be authenticated
- a searching unit configured to obtain, according to the client identifier and the second user identifier, a biometric template corresponding to the client identifier and the second user identifier, and a verification unit, configured to: Performing similarity calculation on the biometric template corresponding to the client identifier and the second user identifier, and determining that the user verification passes when the calculated similarity is greater than the preset verification threshold;
- a client the client includes:
- An acquisition module configured to collect a user image, and perform biometric positioning processing on the user image to obtain a biometric image to be authenticated
- a sending module configured to send the to-be-certified biometric image to the cloud server, to enable the cloud server to perform feature extraction on the to-be-certified biometric image to obtain a biometric template to be authenticated, and obtain the biometric to be authenticated
- the template is matched and authenticated with the biometric template saved by the cloud server
- the receiving module is configured to receive a matching authentication result returned by the cloud server. Further, the collecting module includes:
- An acquisition unit configured to collect the image of the user
- a detecting unit configured to calibrate a location of the biometric feature when detecting that the user image includes a preset biometric feature
- a key point positioning unit configured to select a key point position of the biometric feature, and acquire coordinates of the key point position
- the pose normalization unit is configured to perform posture correction on the key point position according to the acquired coordinates of the key point position to obtain the biometric image to be authenticated.
- a biometric based authentication system comprising a cloud server as described above and a client as described above.
- the technical solution provided by the embodiment of the present invention has the beneficial effects that after the client obtains the biometric image, the cloud server can perform feature extraction on the biometric image to obtain a biometric template.
- Biometric-based authentication for users or clients. The process of feature extraction is completed on the cloud server, which can reduce the complexity of the client, increase the scalability of the client, eliminate the limitation of biometric recognition only in the client, and support diverse applications.
- FIG. 1 is a schematic flowchart of a biometric-based authentication method according to an embodiment of the present invention
- FIG. 2 is a schematic diagram of a network architecture for implementing biometric-based registration and authentication services according to an embodiment of the present invention
- FIG. 3 is a schematic diagram of a network architecture for implementing biometric-based registration according to an embodiment of the present invention
- FIG. 4 is a schematic flowchart of a biometric-based registration method according to an embodiment of the present invention.
- FIG. 5 is a schematic flowchart diagram of a biometric-based verification method according to an embodiment of the present invention.
- FIG. 6 is a schematic diagram of a network architecture for implementing biometric-based verification according to an embodiment of the present invention.
- FIG. 7 is a schematic flowchart of a biometric-based verification method according to an embodiment of the present invention.
- FIG. 8 is a schematic flowchart diagram of a biometric-based identification method according to an embodiment of the present invention.
- FIG. 9 is a schematic diagram of a network architecture for implementing biometric-based identification according to an embodiment of the present invention.
- FIG. 10 is a schematic flowchart of a biometric-based identification method according to an embodiment of the present invention.
- FIG. 11 is a schematic structural diagram of a cloud server according to an embodiment of the present invention
- FIG. 12 is a schematic structural diagram of an authentication module in a cloud server according to an embodiment of the present disclosure
- FIG. 13 is a schematic diagram of a second structure of a cloud server according to an embodiment of the present disclosure
- FIG. 14 is a schematic diagram of a second structure of an authentication module in a cloud server according to an embodiment of the present disclosure
- FIG. 15 is a schematic diagram of a third structure of an authentication module in a cloud server according to an embodiment of the present disclosure.
- FIG. 16 is a schematic structural diagram of a client according to an embodiment of the present invention
- FIG. 17 is a schematic structural diagram of an acquisition module in a client according to an embodiment of the present invention
- FIG. 18 is a hardware structural diagram of a client according to an embodiment of the present invention.
- the existing biometrics technology is based on the client's local implementation. Its application has limitations, it can't support multi-client extension, lacks diversified functions, and authentication on the client side will also lead to the client's authentication logic. complex.
- the client includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a personal computer, an in-vehicle electronic system, a PDA (Personal Digital Assistant, a handheld computer), etc., and may be any peripheral device that can access the Internet.
- a mobile phone a tablet computer, a notebook computer, a personal computer, an in-vehicle electronic system, a PDA (Personal Digital Assistant, a handheld computer), etc.
- PDA Personal Digital Assistant, a handheld computer
- an embodiment of the present invention provides a biometric-based authentication method, and the method includes the following steps:
- the client collects a user image, and performs biometric positioning processing to obtain a biometric image to be authenticated;
- the client sends the biometric image to be authenticated to the cloud server.
- the cloud server performs feature extraction on the to-be-certified biometric image to obtain a biometric template to be authenticated, and performs matching and authentication with the locally pre-stored biometric template.
- the cloud server returns a matching authentication result to the client.
- An embodiment of the present invention provides a biometric-based authentication method. After a biometric image is acquired by a client, the cloud server can perform feature extraction on the biometric image to obtain a biometric template. Biometric-based authentication for users or clients. The process of feature extraction is completed on the cloud server, which can reduce the complexity of the client, increase the scalability of the client, eliminate the limitation of biometric recognition only in the client, and support diverse applications.
- the method provided by the embodiment of the present invention can complete the biometric-based registration and authentication service of the user, wherein the authentication service includes: an authentication service and an identification service.
- the embodiment of the present invention provides an architecture as shown in FIG. 2 for implementing the above functions.
- the Access Server, the Session Server, the Verification Server, the Recognition Server, and the Data Server are the same.
- a cloud server is formed.
- the access server is configured to communicate with the client and other servers in the cloud server by using the Hypertext Transfer Protocol (http) protocol or TCP (Transmission Control Protocol). Data exchange based on any protocol based on the Internet (Internet Protocol);
- the session server is used to complete the user's biometric-based registration service
- the authentication server is used to complete the user's biometric-based authentication service
- the identification server is configured to complete the biometric-based identification service of the user
- the data server is used to store the user ID (identity), the client ID, the legal biometric template, and the correspondence between the three.
- Embodiments of the present invention provide a biometric-based registration method. Need to explain Yes, before the user performs biometric-based authentication through the client, biometric-based registration is required, that is, the client ID, the user ID, and the legal biometric template are bound on the cloud server side.
- FIG. 3 is a schematic diagram of a network architecture for implementing biometric-based registration according to an embodiment of the present invention.
- the network architecture includes a client, an access server, a session server, and a data server.
- the biometric identification technology is specifically described, but the embodiment of the present invention is not limited to face recognition, and may be other biometric recognition-based technologies such as iris recognition and fingerprint recognition.
- an embodiment of the present invention provides a biometric-based registration method, including the following steps:
- the client collects a user image.
- the client collects user images. Specifically, the client can collect in a local picture or video, or through other collection devices, for example, through a mobile phone camera.
- the client detects a face in the user image, and calibrates the location of the face. Specifically, when there is a face in the user image, the location of the face is calibrated.
- Haar feature +adaboost face detection algorithm This step can be implemented by Haar feature +adaboost face detection algorithm.
- Haar features are divided into three categories: edge features, linear features, central features and diagonal features; adaboost face detection algorithms include Haar feature selection and feature calculation, and feature calculations can use integral map methods:
- the above three types of Haar features are combined into a feature template.
- the feature template has two rectangles, white and black, and defines the template's feature values as white rectangle pixels and minus black rectangles. Pixels and.
- the main idea of the integral graph is to store the sum of the pixels of the rectangular area formed by the image from the starting point to each point as an element of an array.
- the elements of the array can be directly indexed. Instead of recalculating the pixel sums of this area, the calculation is speeded up.
- the integral map can use the same time to calculate different characteristics of the area under various sizes in the same area, so the detection speed can be greatly improved.
- the Adaboost algorithm is a prior art method for face detection, and will not be described here.
- the client selects a key position of the face and obtains a coordinate of the key point position
- the eyes and the mouth of the face are used as the key point positions. Therefore, the key point position of the face is selected, and the coordinates of the key point position are obtained, which may be: , calibrate the position of the eyes and mouth of the face, use the image projection to obtain the candidate eye and mouth area, and use the Haar feature +adaboost algorithm to obtain the accurate eye center coordinates in the candidate eye area, and use the gabor feature and adaboost in the candidate mouth area.
- the algorithm obtains accurate corner coordinates.
- the extraction of the gabor feature is a prior art method for face recognition, and is not described here.
- the client normalizes the position of the key point to obtain a face image; wherein, the pose normalization is performed on the key position to obtain a face image, which may be:
- the original user will be normalized by cropping, zooming, posture correction, etc.
- the image is converted to a standard face template, ensuring that the eyes and mouth are in a standard position in the standard face template, resulting in a standard face image.
- the client compresses the face image, and sends the compressed face image to the cloud server through the network.
- the method further includes: sending the user ID and the client ID to the cloud server.
- the cloud server performs image decompression on the compressed face image.
- the normalized processing by illumination makes the acquired face image images in the same illumination condition, thus improving The accuracy of face recognition.
- the cloud server performs feature extraction to obtain a facial feature template.
- the cloud server performs feature extraction to obtain a facial feature template, which may be:
- LDA is a set probability model, which is mainly used to process discrete data sets and reduce dimensions.
- this step may specifically be:
- the cloud server creates and saves the user ID, client ID, and legal face feature templates. Correspondence, complete user registration. The correspondence between the user ID, the client ID, and the legal face feature template is saved in a template database of the cloud server.
- the embodiment of the invention provides a biometric-based registration method, so that the user or the client can transmit the biometric image to the cloud server for registration, and save the correspondence between the user ID, the client ID and the biometric image in the cloud.
- the server enables the biometric authentication to be performed based on the Internet, which can reduce the complexity of the client, increase the scalability of the client, and eliminate the limitation that the biometric identification can only be completed locally at the client, and can support diversification. application.
- FIG. 5 is a schematic flowchart diagram of a biometric-based verification method provided by an embodiment of the present invention.
- the user ID and the client ID are selected in the template database of the cloud server, and compared with the face feature template to be verified, to perform biometric-based verification on the user and the client, and determine the user to the client. End usage rights.
- FIG. 6 is a schematic diagram of a network architecture for implementing biometric-based authentication according to an embodiment of the present invention.
- the network architecture includes a client, an access server, an authentication server, and a data server.
- face recognition is still described as a biometric recognition technique.
- an embodiment of the present invention provides a biometric-based verification method, including the following steps:
- the client collects a user image.
- the client collects user images. Specifically, the client can collect in a local picture or video, or can collect through other collecting devices, for example, by using a mobile phone. Capture like a head.
- the client detects a face in the user image, and calibrates the location of the face. Specifically, when there is a face in the user image, the location of the face is calibrated.
- This step can be implemented by Haar feature +adaboost face detection algorithm.
- the specific implementation of this step is the same as step 202 in the foregoing biometric-based registration method, and details are not described herein again.
- the client selects a key point location of the face, and obtains a coordinate of the key point location;
- the eyes and the mouth of the face are used as the key point positions. Therefore, the key point position of the face is selected, and the coordinates of the key point position are obtained, which may be: , calibrate the position of the eyes and mouth of the face, use the image projection to obtain the candidate eye and mouth area, and use the Haar feature +adaboost algorithm to obtain the accurate eye center coordinates in the candidate eye area, and use the gabor feature and adaboost in the candidate mouth area.
- the algorithm obtains accurate corner coordinates.
- the extraction of the gabor feature is a prior art method for face recognition, and is not described here.
- the client performs a pose normalization process on the key position to obtain a face image to be verified.
- the pose normalization processing is performed on the position of the key point to obtain the image of the face image to be verified, which may be:
- the original user image is converted into a standard face template by a normalization operation such as cropping, zooming, posture correction, etc., ensuring the eye and the eye. Mouth in the standard face template In the standard position, the standard face image to be verified is obtained.
- the client compresses the to-be-verified face image, and sends the compressed face image to be verified to the cloud server through the network.
- the method further includes: sending the user ID and the client ID to the cloud server.
- the cloud server performs image decompression on the compressed image to be verified.
- the cloud server performs feature extraction to obtain a face feature template to be verified.
- the cloud server performs feature extraction to obtain a face feature template to be verified, which may be:
- the global block feature extraction including Gabor local features, LBP and HOG is performed, and the extracted features are used to calculate the dimension of the drop using the LDA model.
- the face feature template to be verified is obtained in series.
- LDA is a set probability model, which is mainly used to process discrete data sets and reduce dimensions.
- the matching the face feature template to be verified and the locally saved face feature template are matched and verified, and the verification result is returned, which may include:
- 309-1 Obtain a corresponding facial feature template in the template database according to the user ID and the client ID. 309-2. Calculate a similarity between the face feature template corresponding to the user ID and the client ID and the face feature template to be verified.
- the cosine distance and KNN k-Nearest Neighbor
- KNN K-Nearest Neighbor
- the biometric-based verification method provided by the embodiments of the present invention can be exemplified as follows.
- the user hacks into the instant messaging application on the mobile phone A (ie the client), such as Tencent QQ, and the login password is the face of the user A.
- the process of verifying the user A is as follows: User A enters the QQ number A (ie, the user ID) registered by the user A on the mobile phone A, and collects the face of the user A by using the mobile phone A, and the number 00 and the user A are collected by the user A.
- the face and the identity of the mobile phone A ie, the client identifier
- the cloud server passes the authentication, the user A can successfully log in to the QQ number A on the mobile phone A.
- the embodiment of the invention provides a biometric-based verification method.
- the cloud server can perform feature extraction on the biometric image to obtain a biometric template. Biometric-based verification of users or clients.
- the process of feature extraction is completed on the cloud server, which can reduce the complexity of the client, increase the scalability of the client, eliminate the limitation of biometric recognition only in the client, and support diverse applications.
- FIG. 8 is a schematic flowchart diagram of a biometric-based identification method according to an embodiment of the present invention.
- the feature template of the user to be recognized may be obtained through feature extraction, and the corresponding template is selected in the template database of the cloud server by using the client ID, and compared with the face feature template to be recognized, Complete biometric-based knowledge of users and clients Otherwise, the user ID corresponding to the face feature template to be recognized is obtained.
- FIG. 9 is a schematic diagram of a network architecture for implementing biometric-based identification according to an embodiment of the present invention.
- the network architecture includes a client, an access server, an identification server, and a data server.
- face recognition is still described as a biometric recognition technique.
- an embodiment of the present invention provides a biometric-based identification method, including the following steps:
- the client collects a user image.
- the client collects user images. Specifically, the client can collect in a local picture or video, or through other collection devices, for example, through a mobile phone camera.
- the client detects a face in the user image, and calibrates the position of the face; specifically, when there is a face in the user image, the position of the face is calibrated.
- This step can be implemented by Haar feature +adaboost face detection algorithm.
- the specific implementation of this step is the same as step 202 in the foregoing biometric-based registration method, and details are not described herein again.
- the client selects a key position of the face and obtains coordinates of the key position.
- the eyes and the mouth of the face are used as key positions, and therefore, the key point of the face is selected.
- Position, and get the coordinates of the key point location specifically:
- the position of the face and mouth of the face is calibrated, the candidate eye and mouth area are obtained by image projection, and the coordinates of the center of the eye are obtained by using the Haar feature +adaboost algorithm in the candidate eye area. Mouth area utilization
- the gabor feature and the adaboost algorithm obtain accurate corner coordinates.
- the extraction of the gabor feature is a prior art method for face recognition, and is not described here.
- the client performs a pose normalization process on the key position to obtain a face image to be recognized.
- the pose normalization processing is performed on the position of the key point to obtain the image of the face image to be recognized, which may be:
- the original user image is converted into a standard face template by a normalization operation such as cropping, zooming, posture correction, etc., ensuring eyes and mouth.
- a normalization operation such as cropping, zooming, posture correction, etc.
- the client compresses the image of the to-be-recognized face image, and sends the compressed image of the to-be-identified face image to the cloud server through the network.
- the method further includes: sending the client ID to the cloud server, when the compressed image to be recognized is sent to the cloud server.
- the cloud server performs image decompression on the compressed facial image to be recognized.
- the cloud server performs feature extraction to obtain a facial feature template to be identified.
- the cloud server performs feature extraction to obtain a facial feature template to be identified, which may be:
- LDA is a set probability model, which is mainly used to process discrete data sets and reduce dimensions.
- the set may include one or more facial feature templates corresponding to the client ID.
- the cosine distance and the KNN algorithm can be used to perform the similarity calculation, and details are not described herein again.
- step 409-3 sequentially determining whether the calculated similarity is greater than a preset identification threshold, and if yes, performing step 409-4, if not, identifying failure;
- the identification result may specifically be a recognition failure, or a sorted recognition result set.
- the biometric-based identification method provided by the embodiments of the present invention can be exemplified as follows. Assume that user A logs in to the instant messaging application on mobile phone A (ie, client), such as Tencent QQ, the login password is the face of the user A, and user A has registered three No. 00, A, and 8 on mobile phone A. The process of identifying user A is as follows: When user A wants to log in to QQ on mobile phone A, user A collects his/her face through mobile phone A, and sends it together with the identity of mobile phone A (ie, the client identification).
- the cloud server recognizes; if the cloud server recognizes the pass, it returns 00 No. 8, B and C to the mobile phone A, and the user A can select any one of the numbers to directly log in to the QQ, and no need to perform the verification process, that is, the identification is passed at the same time. The verification has also been passed.
- An embodiment of the present invention provides a biometric-based recognition method. After a biometric image is acquired by a client, the cloud server can perform feature extraction on the biometric image to obtain a biometric template. Biometric-based recognition of the user or client and returning the corresponding user ID. The process of feature extraction is completed on the cloud server, which can reduce the complexity of the client, increase the scalability of the client, eliminate the limitation of biometric recognition only in the client, and support diverse applications.
- an embodiment of the present invention provides a cloud server 5, where the cloud server 5 includes:
- the access module 51 is configured to receive a biometric image to be authenticated sent by the client, and the authentication module 52 is configured to perform feature extraction on the biometric image to be authenticated received by the access module 51 to obtain a biometric template to be authenticated, and The biometric template pre-stored in the data module 53 performs matching authentication, and returns a matching authentication result;
- the data module 53 is configured to save the biometric template.
- the access module 51 can be implemented by the access server provided by the embodiment of the present invention, and the authentication module 52 can be recognized by the embodiment of the present invention.
- the data server 53 can be implemented by the data server provided by the embodiment of the present invention.
- the foregoing authentication module 52 includes: an illumination processing unit 521, configured to perform illumination normalization processing on the biometric image to be authenticated;
- the feature extraction unit 522 is configured to perform feature extraction on the biometric image to be authenticated after the illumination normalization process, and perform dimension reduction calculation on the extracted features, and serially connect the reduced dimension calculation results to obtain the biometric template to be authenticated;
- the authentication unit 523 is configured to perform matching and authentication on the biometric template to be authenticated obtained by the feature extraction unit 522 and the biometric template prestored in the data module 53 to return a matching authentication result.
- the access module 51 is further configured to: before receiving the biometric image to be authenticated sent by the client, receive the biometric image, the client identifier, and the user identifier sent by the client; correspondingly, as shown in FIG.
- the cloud server 5 further includes:
- the session module 54 is configured to perform feature extraction on the biometric image received by the access module 51 to obtain a biometric template, and send the biometric template, the correspondence between the client identifier and the user identifier received by the access module 51 to the data module. 53. Complete the registration of the user and return the registration result;
- the data module 53 is further configured to save the correspondence between the biometric template, the client identifier, and the user identifier sent by the session module 54.
- the session module 54 can be implemented by the session server provided by the embodiment of the present invention.
- the access module 51 is further configured to: when receiving the biometric image to be authenticated sent by the client, receive the client identifier sent by the client; correspondingly, as shown in FIG. 14, the foregoing authentication module 52 further include:
- the first template obtaining unit 524 is configured to perform feature extraction on the biometric image to be authenticated received by the access module 51 to obtain a biometric template to be authenticated;
- the collection obtaining unit 525 is configured to search, according to the client identifier received by the access module 51, the biometric template saved by the data module 53 to obtain a set of biometric templates corresponding to the client identifier.
- the identifying unit 526 is configured to perform similarity calculation on each biometric template in the set obtained by the first template obtaining unit 524 and the biometric template in the set obtained by the set obtaining unit 525, when When the similarity between the biometric template and the biometric template to be authenticated is greater than the preset recognition threshold, the user identifier corresponding to the biometric template in the set is added to the recognition result set; otherwise, the determination is not passed; the recognition result sending unit 527.
- the user identifiers in the recognition result set are sorted according to the order of similarity, and the recognition result set is returned to the client through the access module 51.
- the recognition result may be a recognition failure, or a sorted recognition result set.
- the authentication module 52 shown in FIG. 14 can be implemented by the identification server provided by the embodiment of the present invention.
- the access module 51 is further configured to: when receiving the biometric image to be authenticated sent by the client, receive the client identifier and the user identifier sent by the client; correspondingly, as shown in FIG.
- the authentication module 52 also includes:
- the second template obtaining unit 528 is configured to perform feature extraction on the biometric image to be authenticated received by the access module 51 to obtain a biometric template to be authenticated;
- the searching unit 529 is configured to obtain a biometric template corresponding to the client identifier and the user identifier according to the client identifier and the user identifier received by the access module 51.
- the verification unit 5210 is configured to acquire the second template.
- Unit 528 receives the pending The biometric template is calculated by using the biometric template corresponding to the client identifier and the user identifier received by the access module 51 by the searching unit 529, and the calculated similarity is greater than the preset verification. At the threshold, it is determined that the user verification is passed; otherwise, it is determined that the user verification fails;
- the verification result sending unit 5211 is configured to return the verification result to the client through the access module 51.
- the authentication module 52 shown in FIG. 15 can be implemented by the authentication server provided by the embodiment of the present invention.
- modules and/or units in the embodiments of the present invention may be implemented by software (for example, computer readable instructions stored in a storage medium), or may be implemented by hardware (for example, an application specific integrated circuit (ASIC)). ), or by a combination of software and hardware; each module and / or unit can be integrated or deployed separately.
- software for example, computer readable instructions stored in a storage medium
- hardware for example, an application specific integrated circuit (ASIC)
- ASIC application specific integrated circuit
- the embodiment of the invention provides a cloud server. After the cloud server obtains the biometric image sent by the client, the feature image of the biometric image can be extracted to obtain a biometric template, and the biometric authentication is performed on the user or the client. .
- the process of feature extraction is completed on the cloud server, which can reduce the complexity of the client, increase the scalability of the client, eliminate the limitation of biometric recognition only in the client, and support diverse applications.
- an embodiment of the present invention provides a client 6, which includes:
- the acquiring module 61 is configured to collect a user image, and perform biometric positioning processing to obtain a biometric image to be authenticated;
- the sending module 62 is configured to send, to the cloud server, the biometric image to be authenticated obtained by the collecting module 61, so that the cloud server performs feature extraction on the biometric image to be authenticated. Obtaining a biometric template to be authenticated and matching and authenticating with the pre-stored biometric template;
- the receiving module 63 is configured to receive a matching authentication result returned by the cloud server.
- the foregoing acquisition module 61 includes: an acquisition unit 611, configured to collect a user image;
- the detecting unit 612 is configured to: when detecting that the preset biometric feature is included in the user image, calibrating the location of the biometric feature;
- a key point locating unit 613 configured to select a key point position of the biometric feature, and obtain coordinates of the key point position
- the pose normalization unit 614 is configured to perform posture correction on the key point position according to coordinates of the key point position acquired by the key point positioning unit 613 to obtain a biometric image to be authenticated.
- the various modules and/or units in the embodiments of the present invention may be implemented by software (for example, computer readable instructions stored in a storage medium), or may be implemented by hardware (for example, a processor of an ASIC), or by a combination of software and hardware. Implementation; individual modules and/or units can be integrated or deployed separately.
- FIG. 18 is a schematic structural diagram of a hardware of a client according to an embodiment of the present invention.
- the client shown in FIG. 18 includes: a processor 701, a storage medium 702, and an I/O port 703, wherein the storage medium 702 stores computer instructions;
- the processor 701 performs the following operations by executing the computer instruction: collecting a user image, and performing biometric positioning processing to obtain a biometric image to be authenticated;
- the processor 701 further performs the following operations by executing the computer instructions:
- the location of the biometric feature is calibrated
- the storage medium 702 may be a volatile storage medium (such as a random access memory (RAM)), a non-volatile storage medium (such as a read-only memory (ROM) or The flash memory, or a combination of the two, is not specifically limited in the embodiment of the present invention.
- RAM random access memory
- ROM read-only memory
- the flash memory or a combination of the two, is not specifically limited in the embodiment of the present invention.
- An embodiment of the present invention provides a client that can acquire a biometric image of a user and send the biometric image to a cloud server, so that the cloud server extracts the feature of the biometric image to obtain a biometric template.
- Biometric-based authentication by the user or client The process of feature extraction is completed on the cloud server, which makes the client's complexity low and the client's scalability strong. It eliminates the limitation of biometric recognition only on the client side and supports diverse applications.
- the embodiment of the present invention further provides a biometric-based authentication system, which includes the cloud server 5 and the client 6 provided by the above embodiments of the present invention.
- the program may be stored in a computer readable storage medium, which, when executed, may include the flow of an embodiment of the methods described above.
- the storage medium mentioned above may be a magnetic disk, an optical disk, a ROM, a RAM, or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Software Systems (AREA)
- Multimedia (AREA)
- Computing Systems (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Human Computer Interaction (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AP2014008012A AP2014008012A0 (en) | 2012-03-19 | 2013-03-13 | Authentication method, device and system based on biological characteristics |
RU2014141345/08A RU2589344C2 (ru) | 2012-03-19 | 2013-03-13 | Способ, устройство и система аутентификации на основе биологических характеристик |
KR1020147029180A KR101629224B1 (ko) | 2012-03-19 | 2013-03-13 | 생체 특징에 기반한 인증 방법, 장치 및 시스템 |
US14/478,024 US10108792B2 (en) | 2012-03-19 | 2014-09-05 | Biometric-based authentication method, apparatus and system |
ZA2014/06794A ZA201406794B (en) | 2012-03-19 | 2014-09-16 | Authentication method, device and system based on biological characteristics |
US16/131,844 US10664581B2 (en) | 2012-03-19 | 2018-09-14 | Biometric-based authentication method, apparatus and system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210072147.2 | 2012-03-19 | ||
CN201210072147.2A CN102646190B (zh) | 2012-03-19 | 2012-03-19 | 一种基于生物特征的认证方法、装置及系统 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/478,024 Continuation US10108792B2 (en) | 2012-03-19 | 2014-09-05 | Biometric-based authentication method, apparatus and system |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013139221A1 true WO2013139221A1 (zh) | 2013-09-26 |
Family
ID=46659006
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2013/072531 WO2013139221A1 (zh) | 2012-03-19 | 2013-03-13 | 一种基于生物特征的认证方法、装置及系统 |
Country Status (7)
Country | Link |
---|---|
US (2) | US10108792B2 (zh) |
KR (1) | KR101629224B1 (zh) |
CN (1) | CN102646190B (zh) |
AP (1) | AP2014008012A0 (zh) |
RU (1) | RU2589344C2 (zh) |
WO (1) | WO2013139221A1 (zh) |
ZA (1) | ZA201406794B (zh) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104573457A (zh) * | 2014-12-30 | 2015-04-29 | 东莞市高明企业服务有限公司 | 一种基于云平台的智能门控制系统及其控制方法 |
KR101528112B1 (ko) * | 2014-11-20 | 2015-06-17 | 중앙대학교 산학협력단 | 생체 특성에 기반해 데이터 서버로 액세스하고자 하는 사용자를 인증하기 위한 클라우드 서버 |
WO2017071493A1 (zh) * | 2015-10-26 | 2017-05-04 | 阿里巴巴集团控股有限公司 | 身份识别、业务处理以及生物特征信息的处理方法和设备 |
EP3214798A4 (en) * | 2014-10-28 | 2017-10-11 | Alibaba Group Holding Limited | Identity authentication method and device |
WO2020140014A1 (en) * | 2018-12-27 | 2020-07-02 | John Woodyear | System and method for the verification of medication |
US10740440B2 (en) | 2016-02-11 | 2020-08-11 | Sebron Hood, III | System and method for the verification of medication |
US10896752B2 (en) | 2016-02-11 | 2021-01-19 | John Woodyear | System and method for the verification of medication |
US11842804B2 (en) | 2018-12-27 | 2023-12-12 | John Woodyear | System and method for the verification of medication |
Families Citing this family (65)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102646190B (zh) | 2012-03-19 | 2018-05-08 | 深圳市腾讯计算机系统有限公司 | 一种基于生物特征的认证方法、装置及系统 |
US11594072B1 (en) | 2012-09-07 | 2023-02-28 | Stone Lock Global, Inc. | Methods and apparatus for access control using biometric verification |
US11163983B2 (en) * | 2012-09-07 | 2021-11-02 | Stone Lock Global, Inc. | Methods and apparatus for aligning sampling points of facial profiles of users |
US11017213B1 (en) * | 2012-09-07 | 2021-05-25 | Stone Lock Global, Inc. | Methods and apparatus for biometric verification |
US11017214B1 (en) * | 2012-09-07 | 2021-05-25 | Stone Lock Global, Inc. | Methods and apparatus for biometric verification |
US11017211B1 (en) * | 2012-09-07 | 2021-05-25 | Stone Lock Global, Inc. | Methods and apparatus for biometric verification |
US11163984B2 (en) * | 2012-09-07 | 2021-11-02 | Stone Lock Global, Inc. | Methods and apparatus for constructing biometrical templates using facial profiles of users |
US11275929B2 (en) * | 2012-09-07 | 2022-03-15 | Stone Lock Global, Inc. | Methods and apparatus for privacy protection during biometric verification |
US11301670B2 (en) * | 2012-09-07 | 2022-04-12 | Stone Lock Global, Inc. | Methods and apparatus for collision detection in biometric verification |
US11017212B2 (en) * | 2012-09-07 | 2021-05-25 | Stone Lock Global, Inc. | Methods and apparatus for biometric verification |
CN103716505A (zh) * | 2012-09-28 | 2014-04-09 | 北京蒙恬科技有限公司 | 图像识别系统及方法 |
CN103259800A (zh) * | 2013-05-29 | 2013-08-21 | 苏州福丰科技有限公司 | 基于人脸识别的互联网登录系统及其方法 |
TW201514887A (zh) * | 2013-10-15 | 2015-04-16 | Utechzone Co Ltd | 影像信息的播放系統及方法 |
CN104734852B (zh) * | 2013-12-24 | 2018-05-08 | 中国移动通信集团湖南有限公司 | 一种身份认证方法及装置 |
CN104866806A (zh) * | 2014-02-21 | 2015-08-26 | 深圳富泰宏精密工业有限公司 | 具有人脸定位辅助功能的自拍系统及方法 |
CN104881667B (zh) * | 2014-02-28 | 2019-08-09 | 阿里巴巴集团控股有限公司 | 一种特征信息的提取方法及装置 |
CN103810577A (zh) * | 2014-03-14 | 2014-05-21 | 哈尔滨工业大学 | 基于人体生物特征的云考勤方法 |
CN105450407A (zh) * | 2014-07-31 | 2016-03-30 | 阿里巴巴集团控股有限公司 | 身份认证方法和装置 |
US9985963B2 (en) | 2015-02-15 | 2018-05-29 | Beijing Kuangshi Technology Co., Ltd. | Method and system for authenticating liveness face, and computer program product thereof |
CN105447441B (zh) * | 2015-03-19 | 2019-03-29 | 北京眼神智能科技有限公司 | 人脸认证方法和装置 |
CN104834849B (zh) * | 2015-04-14 | 2018-09-18 | 北京远鉴科技有限公司 | 基于声纹识别和人脸识别的双因素身份认证方法及系统 |
CN104794464B (zh) * | 2015-05-13 | 2019-06-07 | 上海依图网络科技有限公司 | 一种基于相对属性的活体检测方法 |
CN106330850B (zh) | 2015-07-02 | 2020-01-14 | 创新先进技术有限公司 | 一种基于生物特征的安全校验方法及客户端、服务器 |
CN105099701B (zh) * | 2015-07-29 | 2018-06-26 | 努比亚技术有限公司 | 一种终端及终端鉴权的方法 |
KR101696602B1 (ko) * | 2015-08-11 | 2017-01-23 | 주식회사 슈프리마 | 제스처를 이용한 생체 인증 |
CN105068731B (zh) * | 2015-08-27 | 2018-09-04 | 广东欧珀移动通信有限公司 | 一种图片缩放方法及用户终端 |
CN105335713A (zh) * | 2015-10-28 | 2016-02-17 | 小米科技有限责任公司 | 指纹识别方法及装置 |
CN105282164B (zh) * | 2015-10-30 | 2019-01-25 | 东莞酷派软件技术有限公司 | 一种操作权限的验证方法、装置及车载系统 |
CN105979363A (zh) * | 2015-11-09 | 2016-09-28 | 乐视致新电子科技(天津)有限公司 | 一种身份识别法和装置 |
US9847997B2 (en) | 2015-11-11 | 2017-12-19 | Visa International Service Association | Server based biometric authentication |
US10778672B2 (en) | 2015-11-16 | 2020-09-15 | International Business Machines Corporation | Secure biometrics matching with split phase client-server matching protocol |
US10034174B1 (en) * | 2015-12-21 | 2018-07-24 | United Services Automobile Association (Usaa) | Systems and methods for authenticating a caller using biometric authentication |
CN107451550B (zh) * | 2016-03-15 | 2020-12-04 | Oppo广东移动通信有限公司 | 指纹解锁的方法及相关产品 |
CN105844227B (zh) * | 2016-03-21 | 2019-06-04 | 湖南君士德赛科技发展有限公司 | 面向校车安全的司机身份认证方法 |
KR101760211B1 (ko) * | 2016-04-04 | 2017-07-21 | 엔에이치엔엔터테인먼트 주식회사 | 안구 인식을 통해 보안이 강화된 인증 방법 및 시스템 |
CN105976519A (zh) * | 2016-04-29 | 2016-09-28 | 江苏诚创信息技术研发有限公司 | 一种防银行卡被盗用atm机及其工作方法 |
CN105806038A (zh) * | 2016-05-10 | 2016-07-27 | 青岛海尔股份有限公司 | 冰箱门锁的控制方法与冰箱 |
CN106022043A (zh) * | 2016-05-23 | 2016-10-12 | 南京甄视智能科技有限公司 | 一种生物特征识别业务处理平台的系统架构及实现方法 |
WO2018008934A2 (en) | 2016-07-07 | 2018-01-11 | Samsung Electronics Co., Ltd. | Adaptive quantization method for iris image encoding |
CN106411856A (zh) * | 2016-09-06 | 2017-02-15 | 北京交通大学 | 基于移动终端人脸识别的认证方法和装置 |
CN108121943B (zh) * | 2016-11-30 | 2022-05-06 | 阿里巴巴集团控股有限公司 | 基于图片的判别方法及装置和计算设备 |
CN106790136A (zh) * | 2016-12-28 | 2017-05-31 | 汉王科技股份有限公司 | 一种基于云平台的身份认证方法、装置以及系统 |
EP3379015A1 (fr) * | 2017-03-21 | 2018-09-26 | STMicroelectronics (Grand Ouest) SAS | Procédé et système de contrôle d'un objet destiné à être partagé par plusieurs utilisateurs potentiels |
CN106980840A (zh) * | 2017-03-31 | 2017-07-25 | 北京小米移动软件有限公司 | 脸型匹配方法、装置及存储介质 |
CN109034815B (zh) | 2017-06-09 | 2021-06-18 | 创新先进技术有限公司 | 基于生物特征进行安全验证的方法及装置 |
CN107480494B (zh) * | 2017-07-21 | 2020-12-29 | Oppo广东移动通信有限公司 | 解锁方法及相关产品 |
WO2019026828A1 (en) * | 2017-07-31 | 2019-02-07 | Ricoh Company, Ltd. | COMMUNICATION SYSTEM, DISTRIBUTED PROCESSING SYSTEM, DISTRIBUTED PROCESSING METHOD, AND RECORDING MEDIUM |
KR20190046063A (ko) * | 2017-10-25 | 2019-05-07 | 현대자동차주식회사 | 사용자 인증 시스템, 사용자 인증 방법 및 서버 |
CN108171139A (zh) * | 2017-12-25 | 2018-06-15 | 联想(北京)有限公司 | 一种数据处理方法、装置及系统 |
JP2019204288A (ja) | 2018-05-23 | 2019-11-28 | 富士通株式会社 | 生体認証装置、生体認証方法及び生体認証プログラム |
WO2019231252A1 (en) * | 2018-05-31 | 2019-12-05 | Samsung Electronics Co., Ltd. | Electronic device for authenticating user and operating method thereof |
KR102495238B1 (ko) * | 2018-05-31 | 2023-02-03 | 삼성전자주식회사 | 사용자의 고유 정보와 결합한 생체 정보를 생성하기 위한 전자 장치 및 그의 동작 방법 |
US11127236B1 (en) * | 2018-08-28 | 2021-09-21 | Robert William Kocher | National access control center (NACC) |
CN109684806A (zh) * | 2018-08-31 | 2019-04-26 | 深圳壹账通智能科技有限公司 | 基于生理特征信息的身份验证方法、装置、系统和介质 |
US10977353B2 (en) * | 2018-09-18 | 2021-04-13 | International Business Machines Corporation | Validating authorized activities approved by a guardian |
KR20200100481A (ko) * | 2019-02-18 | 2020-08-26 | 삼성전자주식회사 | 생체 정보를 인증하기 위한 전자 장치 및 그의 동작 방법 |
CN110096996B (zh) * | 2019-04-28 | 2021-10-22 | 达闼机器人有限公司 | 生物信息识别方法、装置、终端、系统及存储介质 |
WO2021049681A1 (ko) * | 2019-09-10 | 2021-03-18 | 엘지전자 주식회사 | 클라우드 서버를 기초로 인증을 수행하는 전자 장치 및 그 제어 방법 |
AU2020344601A1 (en) * | 2019-09-11 | 2022-05-05 | Selfiecoin, Inc. | Enhanced biometric authentication |
CN111008620A (zh) * | 2020-03-05 | 2020-04-14 | 支付宝(杭州)信息技术有限公司 | 目标用户识别方法、装置及存储介质、电子设备 |
CN111860358B (zh) * | 2020-07-23 | 2021-05-14 | 浙江赛慕威供应链管理有限公司 | 基于工业互联网的物料验收方法 |
USD976904S1 (en) | 2020-12-18 | 2023-01-31 | Stone Lock Global, Inc. | Biometric scanner |
WO2022225146A1 (ko) * | 2021-04-20 | 2022-10-27 | 삼성전자 주식회사 | 사용자의 생체 데이터를 이용해 인증을 수행하는 전자 장치 및 그 방법 |
CN113379006B (zh) * | 2021-08-16 | 2021-11-02 | 北京国电通网络技术有限公司 | 图像识别方法、装置、电子设备和计算机可读介质 |
KR102593260B1 (ko) * | 2021-09-02 | 2023-10-24 | (주)씨유박스 | 생체정보 템플릿을 이용한 좌석 이탈 관리 방법 및 장치 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1728156A (zh) * | 2005-06-27 | 2006-02-01 | 成都翔宇信息技术有限公司 | 出入境身份证件与生物活体指纹自动识别方法及系统 |
JP2008123216A (ja) * | 2006-11-10 | 2008-05-29 | Konica Minolta Holdings Inc | 認証システム及び認証方法 |
CN101226590A (zh) * | 2008-01-31 | 2008-07-23 | 湖南创合制造有限公司 | 一种人脸识别方法 |
CN101266704A (zh) * | 2008-04-24 | 2008-09-17 | 张宏志 | 基于人脸识别的atm安全认证与预警方法 |
CN101414351A (zh) * | 2008-11-03 | 2009-04-22 | 章毅 | 一种指纹识别系统及其控制方法 |
CN201904809U (zh) * | 2010-12-20 | 2011-07-20 | 惠州紫旭科技有限公司 | 基于云计算的数据服务系统 |
CN102646190A (zh) * | 2012-03-19 | 2012-08-22 | 腾讯科技(深圳)有限公司 | 一种基于生物特征的认证方法、装置及系统 |
Family Cites Families (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040177097A1 (en) | 2000-12-01 | 2004-09-09 | Philips Electronics North America Corporation | Web-based, biometric authentication system and method |
KR100397916B1 (ko) * | 2001-07-16 | 2003-09-19 | (주)니트 젠 | 지문 등록 및 인증방법 |
DE60237833D1 (de) | 2001-07-18 | 2010-11-11 | Daon Holdings Ltd | Verteiltes netzwerksystem mit biometrischer zugangsprüfung |
US7506162B1 (en) * | 2003-07-14 | 2009-03-17 | Sun Microsystems, Inc. | Methods for more flexible SAML session |
CA2600938A1 (en) * | 2004-03-24 | 2005-10-06 | Andre Hoffmann | Identification, verification, and recognition method and system |
US7836510B1 (en) * | 2004-04-30 | 2010-11-16 | Oracle America, Inc. | Fine-grained attribute access control |
US20060218630A1 (en) * | 2005-03-23 | 2006-09-28 | Sbc Knowledge Ventures L.P. | Opt-in linking to a single sign-on account |
RU2306603C1 (ru) * | 2006-02-01 | 2007-09-20 | Федеральное государственное унитарное предприятие "Научно-исследовательский институт "Восход" | Автоматизированная система идентификации личности граждан по данным паспортно-визовых документов |
US8051179B2 (en) * | 2006-02-01 | 2011-11-01 | Oracle America, Inc. | Distributed session failover |
US8239677B2 (en) * | 2006-10-10 | 2012-08-07 | Equifax Inc. | Verification and authentication systems and methods |
JP5011987B2 (ja) * | 2006-12-04 | 2012-08-29 | 株式会社日立製作所 | 認証システムの管理方法 |
US8185646B2 (en) | 2008-11-03 | 2012-05-22 | Veritrix, Inc. | User authentication for social networks |
US20110251954A1 (en) * | 2008-05-17 | 2011-10-13 | David H. Chin | Access of an online financial account through an applied gesture on a mobile device |
JP5147673B2 (ja) | 2008-12-18 | 2013-02-20 | 株式会社日立製作所 | 生体認証システムおよびその方法 |
US20100246902A1 (en) | 2009-02-26 | 2010-09-30 | Lumidigm, Inc. | Method and apparatus to combine biometric sensing and other functionality |
JP5287550B2 (ja) * | 2009-07-01 | 2013-09-11 | 富士通株式会社 | 生体認証システム,生体認証方法,生体認証装置,生体情報処理装置,生体認証プログラムおよび生体情報処理プログラム |
KR101226151B1 (ko) * | 2009-08-17 | 2013-01-24 | 한국전자통신연구원 | 바이오 등록 및 인증 장치와 그 방법 |
US8924569B2 (en) | 2009-12-17 | 2014-12-30 | Intel Corporation | Cloud federation as a service |
CN101763429B (zh) * | 2010-01-14 | 2012-01-25 | 中山大学 | 一种基于颜色和形状特征的图像检索方法 |
US8572709B2 (en) * | 2010-05-05 | 2013-10-29 | International Business Machines Corporation | Method for managing shared accounts in an identity management system |
US8869244B1 (en) * | 2011-05-03 | 2014-10-21 | Symantec Corporation | Techniques for providing role-based access control using dynamic shared accounts |
JP5320433B2 (ja) * | 2011-05-10 | 2013-10-23 | 株式会社日立ソリューションズ | 統合検索装置、統合検索システム、統合検索方法 |
US9258344B2 (en) * | 2011-08-01 | 2016-02-09 | Intel Corporation | Multi-hop single sign-on (SSO) for identity provider (IdP) roaming/proxy |
US20130067345A1 (en) * | 2011-09-14 | 2013-03-14 | Microsoft Corporation | Automated Desktop Services Provisioning |
US20130067469A1 (en) * | 2011-09-14 | 2013-03-14 | Microsoft Corporation | Load Balancing By Endpoints |
US8589481B2 (en) * | 2011-09-14 | 2013-11-19 | Microsoft Corporation | Multi tenant access to applications |
US8635152B2 (en) * | 2011-09-14 | 2014-01-21 | Microsoft Corporation | Multi tenancy for single tenancy applications |
US8438635B2 (en) * | 2011-09-15 | 2013-05-07 | Microsoft Corporation | Single sign-on for remote desktops |
US20130073670A1 (en) * | 2011-09-15 | 2013-03-21 | Microsoft Corporation | Geo-Migration Of User State |
US8812687B2 (en) * | 2011-09-15 | 2014-08-19 | Microsoft Corporation | Managing user state of cloud desktops |
US20130074064A1 (en) * | 2011-09-15 | 2013-03-21 | Microsoft Corporation | Automated infrastructure provisioning |
CN102333091A (zh) * | 2011-09-27 | 2012-01-25 | 惠州紫旭科技有限公司 | 基于云计算的数据安全认证方法 |
CN102360355B (zh) * | 2011-09-28 | 2013-04-24 | 福州海景科技开发有限公司 | 基于云计算环境的人脸识别搜索比对引擎 |
US9160536B2 (en) * | 2011-11-30 | 2015-10-13 | Advanced Biometric Controls, Llc | Verification of authenticity and responsiveness of biometric evidence and/or other evidence |
US9311679B2 (en) * | 2011-10-31 | 2016-04-12 | Hearsay Social, Inc. | Enterprise social media management platform with single sign-on |
-
2012
- 2012-03-19 CN CN201210072147.2A patent/CN102646190B/zh active Active
-
2013
- 2013-03-13 AP AP2014008012A patent/AP2014008012A0/xx unknown
- 2013-03-13 KR KR1020147029180A patent/KR101629224B1/ko active IP Right Grant
- 2013-03-13 WO PCT/CN2013/072531 patent/WO2013139221A1/zh active Application Filing
- 2013-03-13 RU RU2014141345/08A patent/RU2589344C2/ru active
-
2014
- 2014-09-05 US US14/478,024 patent/US10108792B2/en active Active
- 2014-09-16 ZA ZA2014/06794A patent/ZA201406794B/en unknown
-
2018
- 2018-09-14 US US16/131,844 patent/US10664581B2/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1728156A (zh) * | 2005-06-27 | 2006-02-01 | 成都翔宇信息技术有限公司 | 出入境身份证件与生物活体指纹自动识别方法及系统 |
JP2008123216A (ja) * | 2006-11-10 | 2008-05-29 | Konica Minolta Holdings Inc | 認証システム及び認証方法 |
CN101226590A (zh) * | 2008-01-31 | 2008-07-23 | 湖南创合制造有限公司 | 一种人脸识别方法 |
CN101266704A (zh) * | 2008-04-24 | 2008-09-17 | 张宏志 | 基于人脸识别的atm安全认证与预警方法 |
CN101414351A (zh) * | 2008-11-03 | 2009-04-22 | 章毅 | 一种指纹识别系统及其控制方法 |
CN201904809U (zh) * | 2010-12-20 | 2011-07-20 | 惠州紫旭科技有限公司 | 基于云计算的数据服务系统 |
CN102646190A (zh) * | 2012-03-19 | 2012-08-22 | 腾讯科技(深圳)有限公司 | 一种基于生物特征的认证方法、装置及系统 |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3214798A4 (en) * | 2014-10-28 | 2017-10-11 | Alibaba Group Holding Limited | Identity authentication method and device |
JP2018500634A (ja) * | 2014-10-28 | 2018-01-11 | アリババ グループ ホウルディング リミテッド | 本人認証方法および装置 |
US10572642B2 (en) | 2014-10-28 | 2020-02-25 | Alibaba Group Holding Limited | Method and apparatus for identity authentication |
US10839061B2 (en) | 2014-10-28 | 2020-11-17 | Advanced New Technologies, Co., Ltd. | Method and apparatus for identity authentication |
KR101528112B1 (ko) * | 2014-11-20 | 2015-06-17 | 중앙대학교 산학협력단 | 생체 특성에 기반해 데이터 서버로 액세스하고자 하는 사용자를 인증하기 위한 클라우드 서버 |
CN104573457A (zh) * | 2014-12-30 | 2015-04-29 | 东莞市高明企业服务有限公司 | 一种基于云平台的智能门控制系统及其控制方法 |
WO2017071493A1 (zh) * | 2015-10-26 | 2017-05-04 | 阿里巴巴集团控股有限公司 | 身份识别、业务处理以及生物特征信息的处理方法和设备 |
US10740440B2 (en) | 2016-02-11 | 2020-08-11 | Sebron Hood, III | System and method for the verification of medication |
US10896752B2 (en) | 2016-02-11 | 2021-01-19 | John Woodyear | System and method for the verification of medication |
WO2020140014A1 (en) * | 2018-12-27 | 2020-07-02 | John Woodyear | System and method for the verification of medication |
US11842804B2 (en) | 2018-12-27 | 2023-12-12 | John Woodyear | System and method for the verification of medication |
Also Published As
Publication number | Publication date |
---|---|
US10108792B2 (en) | 2018-10-23 |
RU2589344C2 (ru) | 2016-07-10 |
US20190012450A1 (en) | 2019-01-10 |
RU2014141345A (ru) | 2016-05-10 |
ZA201406794B (en) | 2015-11-25 |
US20150007295A1 (en) | 2015-01-01 |
AP2014008012A0 (en) | 2014-10-31 |
KR101629224B1 (ko) | 2016-06-10 |
US10664581B2 (en) | 2020-05-26 |
CN102646190B (zh) | 2018-05-08 |
KR20140138991A (ko) | 2014-12-04 |
CN102646190A (zh) | 2012-08-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10664581B2 (en) | Biometric-based authentication method, apparatus and system | |
JP6634127B2 (ja) | カメラ付きデバイスに関連する生体認証のためのシステム及び方法 | |
KR101997371B1 (ko) | 신원 인증 방법 및 장치, 단말기 및 서버 | |
TWI727329B (zh) | 用於基於深度學習方法提供對資源之選擇性存取之防欺騙系統及方法 | |
US9122913B2 (en) | Method for logging a user in to a mobile device | |
US20050207614A1 (en) | Iris-based biometric identification | |
US20120117633A1 (en) | Enhanced Security For Pervasive Devices Using A Weighting System | |
CN111611437A (zh) | 一种防止人脸声纹验证替换攻击的方法及装置 | |
OA17098A (en) | Authentication method, device and system based on biological characteristics. | |
KR100597753B1 (ko) | 컴퓨터 및 컴퓨터의 사용자인증방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13765028 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20147029180 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2014141345 Country of ref document: RU Kind code of ref document: A |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC DATED 17.02.2015 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13765028 Country of ref document: EP Kind code of ref document: A1 |