Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Survival authentication method on basis of identification cards and composite biological feature recognition

A biometric identification and authentication method technology, applied in the field of computer system design, can solve problems such as easy to falsify, easy to falsify in remote authentication, and unclear photos of ID cards, so as to solve the problem of survival identification and reduce the possibility of falsification. Reduce the effect of manual review

Inactive Publication Date: 2014-03-12
神思依图(北京)科技有限公司
View PDF5 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 1. Low authority: The credibility of street communities, units and other organizations may be relatively poor, and fraudulent incidents are prone to occur; in addition, remote certification by mail in other places is more likely to be fraudulent
[0008] 2. Poor reliability: Single face recognition and voiceprint recognition have high requirements on light and sound environment, low recognition rate and poor reliability
[0009] 3. High cost: These types of certification methods all have high costs. Whether you go to the social security hall to apply, unit community organization, mail, or door-to-door certification, it will cause a huge consumption of manpower and material resources.
[0010] 4. Poor uniqueness: The error rate of staff identifying retired personnel is high, especially when the photo of the ID card is not clear enough, disfigured or has been used for a long time, and the appearance has changed, it is difficult to identify whether the retired personnel are consistent with the ID card
[0011] 5. Easy to falsify: Fingerprint recognition and face recognition are easy to falsify, such as using photos and artificial fingerprints to pass verification easily

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Survival authentication method on basis of identification cards and composite biological feature recognition
  • Survival authentication method on basis of identification cards and composite biological feature recognition
  • Survival authentication method on basis of identification cards and composite biological feature recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In a nutshell, improving the efficiency of personnel remote identity and survival authentication, reducing authentication costs, facilitating personnel operations, and reducing the possibility of fraud are the current direction of survival authentication.

[0036] A generalized technical solution:

[0037] The system realized by this method should include a verification network supported by a server group, that is, remote identification is performed by the verification network, and a dedicated terminal or a common terminal is configured on the client side. Among them, special-purpose terminals should have second-generation ID card reading modules, face recognition modules, voiceprint recognition modules, network modules and storage information modules, and ordinary terminals should include network modules and face and voiceprint acquisition modules, such as videophones, personal computer, etc. All terminals are hereinafter collectively referred to as terminals.

[003...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a survival authentication method on the basis of identification cards and composite biological feature recognition. The survival authentication method has the advantages that personnel is recognized by the aid of server clusters, computation resources can be integrated, accordingly, artificial auditing can be omitted, and the remote personnel identification and survival authentication efficiency can be improved; human faces and voiceprints are recognized, composite recognition of the human faces and composite recognition of the voiceprints are combined with each other, the survival of the personnel can be effectively recognized, and accordingly the counterfeiting probability can be reduced.

Description

technical field [0001] Aiming at some problems existing in social security fund management, the invention proposes a method for personnel identity authentication in social security fund management, which belongs to the field of computer system design. Background technique [0002] With the rapid development of my country's economy, the labor and social security undertakings have developed by leaps and bounds, and the reform of social insurance information has also made great progress. However, with the socialization of social insurance payments, the problem of fraudulent social security payments has become increasingly prominent , and gradually aroused keen attention from all sides. [0003] The problem of fraudulent claiming of social security funds is an urgent problem to be solved in my country's social security business, and it is also a worldwide problem. Survival certificates, unit or hospital certificates are very easy to forge, and can no longer meet the needs of soc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06K9/62G06F21/32
Inventor 王继春孙涛
Owner 神思依图(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products