Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Biometric feature recognition device and method

A biometric feature recognition and biometric technology, applied in character and pattern recognition, instruments, computer parts, etc., can solve the problem of data tampering or replacement, and achieve the effect of ensuring security

Active Publication Date: 2018-12-18
HANGZHOU SYNOCHIP DATA SECURITY TECH CO LTD
View PDF11 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, when comparing the collected biometric information with the pre-stored user biometric information in the security hardware, the identification code is first compared, and then the biometric value is compared to improve the efficiency of successful terminal unlocking, but this application is only To prevent biometric information data from being attacked or stolen by malicious programs (APP) during transmission, the technical means used is to encrypt the data itself, that is, the application still has the risk of data being tampered with or replaced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Biometric feature recognition device and method
  • Biometric feature recognition device and method
  • Biometric feature recognition device and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] see figure 1 , the biometric identification device of this embodiment, including

[0038] The main control module is used to send control commands, receive various result instructions, generate keys, store keys, generate random numbers, encrypt operations, decrypt operations and random number checks;

[0039] The biometric identification module is used to receive control commands from the main control module, execute corresponding control commands and feed back biometric identification results to the main control module, store keys, generate random numbers, perform encryption operations, decryption operations, and random number inspections;

[0040] The execution module is used to receive the control command from the main control module, and execute the opening / closing of the mechanical or electronic switch;

[0041] The input / output module is used to realize the input of user information and operations, and the output of application information provided by the user; ...

Embodiment 2

[0046] see Figure 2-4 , this embodiment provides a biometric identification method, using the biometric identification described in Embodiment 1, the steps are as follows:

[0047] 1) Before the biometric identification device is used for the first time, an identity binding operation is required. The main control module sends a binding command to the biometric identification module, and at the same time generates an encryption key for storage and transmits the encryption key to the biometric identification module; after receiving the binding command and the encryption key, the biometric identification module stores the encryption key , and send the binding success to the main control module. Identity binding operations can be repeated. If the main control module or the biometric identification module has not performed an identity binding operation, then store the key, if the main control module or the biometric identification module has performed an identity binding operati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a biometric feature recognition device. The biometric feature recognition device comprises a main control module and a biometric feature recognition module; the main control module is used for sending a control command, receiving various result instructions, generating a key, storing the key, generating a random number and conducting encryption operation, decryption operation and random number testing; the biometric feature recognition module is used for receiving the control command from the main control module, executing the corresponding control instruction, feeding back a biometric feature recognition result to the main control module, storing the key, generating a random number and conducting encryption operation, decryption operation and random number testing;and the main control module and the biometric feature recognition module are connected, adopt a bidirectional identity authentication mechanism, can conduct user biometric feature registration and recognition operations only after confirming legal identities mutually and cannot conduct biometric feature registration and recognition operations if identity authentication fails.

Description

technical field [0001] The invention belongs to the technical field of biometric features, and in particular relates to a biometric feature identification device and method. Background technique [0002] In biometric identification devices (such as door locks, access control, gates, etc. based on fingerprint identification, face recognition, etc.), the biometric identification function is usually implemented by a dedicated module to complete the acquisition of original images, user registration, Specific functions such as template storage, search and comparison. UART, USB, SPI and other common serial communication protocols are used for data transmission between the biometric identification module and the main control module of the equipment. board, making it easy to remove or replace. Because biometric identification devices are generally used in occasions involving access control, such as installing door locks, access control, gates, etc. in homes or public places, if th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/00G06K9/00G07C9/37
CPCG07C9/00309G07C9/00563G07C2009/005G06F18/00
Inventor 吴斌钱鹏
Owner HANGZHOU SYNOCHIP DATA SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products