Device and method for biometric identification

A biometric identification, biometric technology, applied in character and pattern recognition, instruments, computing, etc., can solve the problem of data being tampered or replaced, and achieve the effect of ensuring security

Active Publication Date: 2021-06-08
HANGZHOU SYNOCHIP DATA SECURITY TECH CO LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, when comparing the collected biometric information with the pre-stored user biometric information in the security hardware, the identification code is first compared, and then the biometric value is compared to improve the efficiency of successful terminal unlocking, but this application is only To prevent biometric information data from being attacked or stolen by malicious programs (APP) during transmission, the technical means used is to encrypt the data itself, that is, the application still has the risk of data being tampered with or replaced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method for biometric identification
  • Device and method for biometric identification
  • Device and method for biometric identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] see figure 1 , the biometric identification device of this embodiment, including

[0038] The main control module is used to send control commands, receive various result instructions, generate keys, store keys, generate random numbers, encrypt operations, decrypt operations and random number checks;

[0039] The biometric identification module is used to receive control commands from the main control module, execute corresponding control commands and feed back biometric identification results to the main control module, store keys, generate random numbers, perform encryption operations, decryption operations, and random number inspections;

[0040] The execution module is used to receive the control command from the main control module, and execute the opening / closing of the mechanical or electronic switch;

[0041] The input / output module is used to realize the input of user information and operations, and the output of application information provided by the user; ...

Embodiment 2

[0046] see Figure 2-4 , this embodiment provides a biometric identification method, using the biometric identification described in Embodiment 1, the steps are as follows:

[0047] 1) Before the biometric identification device is used for the first time, an identity binding operation is required. The main control module sends a binding command to the biometric identification module, and at the same time generates an encryption key for storage and transmits the encryption key to the biometric identification module; after receiving the binding command and the encryption key, the biometric identification module stores the encryption key , and send the binding success to the main control module. Identity binding operations can be repeated. If the main control module or the biometric identification module has not performed an identity binding operation, then store the key, if the main control module or the biometric identification module has performed an identity binding operati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The biometric identification device includes a main control module, which is used to send control commands, receive various result instructions, generate keys, store keys, generate random numbers, perform encryption operations, decryption operations, and random number inspections; the biometric identification module uses To receive control commands from the main control module, execute corresponding control commands and feed back biometric identification results to the main control module, store keys, generate random numbers, encrypt operations, decrypt operations and random number inspections; the main control module and biometrics The feature recognition module is connected and adopts a two-way identity authentication mechanism. User biometric registration and identification operations can only be performed after mutual confirmation of legal identities. If identity verification fails, biometric registration and identification operations cannot be performed.

Description

technical field [0001] The invention belongs to the technical field of biometric features, and in particular relates to a biometric feature identification device and method. Background technique [0002] In biometric identification devices (such as door locks, access control, gates, etc. based on fingerprint identification, face recognition, etc.), the biometric identification function is usually implemented by a dedicated module to complete the acquisition of original images, user registration, Specific functions such as template storage, search and comparison. UART, USB, SPI and other common serial communication protocols are used for data transmission between the biometric identification module and the main control module of the equipment. board, making it easy to remove or replace. Because biometric identification devices are generally used in occasions involving access control, such as installing door locks, access control, gates, etc. in homes or public places, if th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00G07C9/37G06K9/00
CPCG07C9/00309G07C9/00563G07C2009/005G06F18/00
Inventor 吴斌钱鹏
Owner HANGZHOU SYNOCHIP DATA SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products