CN114743218A - Identity verification method and system - Google Patents

Identity verification method and system Download PDF

Info

Publication number
CN114743218A
CN114743218A CN202210367009.0A CN202210367009A CN114743218A CN 114743218 A CN114743218 A CN 114743218A CN 202210367009 A CN202210367009 A CN 202210367009A CN 114743218 A CN114743218 A CN 114743218A
Authority
CN
China
Prior art keywords
user
signal
brain wave
electroencephalogram
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210367009.0A
Other languages
Chinese (zh)
Inventor
黎晓锋
焦苏芮
尤立凯
刘煜伟
颜钰人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202210367009.0A priority Critical patent/CN114743218A/en
Publication of CN114743218A publication Critical patent/CN114743218A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Evolutionary Computation (AREA)
  • Computational Linguistics (AREA)
  • Molecular Biology (AREA)
  • Computing Systems (AREA)
  • Biophysics (AREA)
  • Data Mining & Analysis (AREA)
  • Mathematical Physics (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The invention discloses an identity authentication method and an identity authentication system, which can be applied to the field of network security. Playing specific image content to a user to be authenticated; collecting a first brain wave signal, a first step state signal, a second brain wave signal and a second step state signal of a user to be verified; flattening the first brain wave signal and the first step state signal; performing primary verification on the user to be verified by using a first preset algorithm and the acquired brain wave signals and gait signals; if the first electroencephalogram ID corresponding to the first electroencephalogram signal and the first gait ID corresponding to the first step signal are verified preliminarily, acquiring a first electroencephalogram ID corresponding to the first electroencephalogram signal and a first gait ID corresponding to the first step signal; and performing identity authentication on the user to be authenticated according to the first electroencephalogram ID, the first gait ID, the second electroencephalogram ID and the second step ID. The brain wave signals are difficult to steal and copy, the gaits of different people are different, and the safety performance can be improved by combining the brain wave signals and the gaits for identity verification.

Description

Identity verification method and system
Technical Field
The invention relates to the technical field of identity verification, in particular to an identity verification method and an identity verification system.
Background
When an ATM (automatic teller machine) performs identity verification, security authentication methods such as password authentication, fingerprint authentication, face authentication, and the like are generally used for performing identity verification. However, the password has the characteristics of easy loss and easy stealing, and the password authentication mode cannot meet the security requirement; at present, fingerprints and human faces of users can be simulated through a fingerprint film and a reverse monitoring mask, and once the fingerprint data and the human face data are lost, the fingerprints and the human face data cannot be replaced, and the fingerprint authentication mode and the human face authentication mode cannot meet safety requirements. In summary, the security authentication method adopted by the current ATM is poor in security performance.
Disclosure of Invention
In view of this, embodiments of the present invention provide an identity authentication method and system to solve the problems of poor security performance of the existing security authentication method.
In order to achieve the above purpose, the embodiments of the present invention provide the following technical solutions:
the first aspect of the embodiments of the present invention discloses an identity authentication method, which includes:
playing specific image content to a user to be authenticated;
acquiring a first brain wave signal and a first step state signal of the user to be verified, and acquiring a second brain wave signal and a second step state signal which are acquired in advance and correspond to the user to be verified, wherein the second brain wave signal is acquired when the specific image content is played to the user to be verified;
flattening the first brain wave signal and the first step signal;
performing preliminary verification on the user to be verified by using a first preset algorithm and combining the flattened first brain wave signal, the flattened first step state signal, the flattened second brain wave signal and the second step state signal;
if the user to be verified passes the preliminary verification, acquiring a first electroencephalogram ID corresponding to the first electroencephalogram signal and a first gait ID corresponding to the first step signal by using a second preset algorithm;
and performing identity verification on the user to be verified according to the first electroencephalogram ID, the first step ID, a second electroencephalogram ID corresponding to the second electroencephalogram and a second step ID corresponding to the second step signal.
Preferably, the process of acquiring the first brain wave signal and the first step signal of the user to be authenticated includes:
the method comprises the steps of collecting a first brain wave signal of a user to be verified by using a non-invasive brain wave collecting helmet, and collecting a first step signal of the user to be verified by using a wearable sensor or an image collecting device.
Preferably, the process of acquiring the first step status signal of the user to be authenticated by using the image acquisition device includes:
collecting the motion video of the user to be verified by utilizing image collection equipment;
and analyzing the motion video by using a gait analysis algorithm to obtain a first step signal of the user to be verified.
Preferably, the preliminary verification of the user to be verified is performed by using a first preset algorithm in combination with the flattened first brain wave signal, the flattened first step state signal, the flattened second brain wave signal, and the second step state signal, and includes:
processing the flattened first brain wave signal and the flattened first step signal through a DeepKey algorithm to obtain a first processing result;
comparing the first processing result with a second processing result, wherein the second brain wave signal and the second step state signal are flattened in advance, and the second processing result is obtained by processing the flattened second brain wave signal and the flattened second step state signal by using the DeepKey algorithm in advance;
determining that the user to be verified passes preliminary verification under the condition that the similarity between the first processing result and the second processing result is greater than or equal to a similarity threshold;
and under the condition that the similarity between the first processing result and the second processing result is smaller than a similarity threshold, determining that the user to be verified does not pass the preliminary verification.
Preferably, if the user to be authenticated passes the preliminary authentication, acquiring a first electroencephalogram ID corresponding to the first electroencephalogram signal and a first gait ID corresponding to the first step signal by using a second preset algorithm, including:
if the user to be verified passes the preliminary verification, calculating the flattened first brain wave signal and the flattened first step signal as the parameters of the RNN algorithm to obtain a corresponding weight map;
and mapping the weight map to acquire a first electroencephalogram ID corresponding to the first electroencephalogram signal and a first gait ID corresponding to the first step signal.
Preferably, the performing identity verification on the user to be verified according to the first electroencephalogram ID, the first step ID, the second electroencephalogram ID corresponding to the second electroencephalogram, and the second step ID corresponding to the second step signal includes:
acquiring a second electroencephalogram ID corresponding to the second electroencephalogram and a second gait ID corresponding to the second step state signal;
comparing the first electroencephalogram ID with the second electroencephalogram ID, and comparing the first gait ID with the second step ID;
determining that the user to be authenticated passes identity authentication when the first electroencephalogram ID is the same as the second electroencephalogram ID and the first step ID is the same as the second step ID;
determining that the user to be authenticated does not pass authentication if the first electroencephalogram ID and the second electroencephalogram ID are different, and/or if the first step ID and the second step ID are different.
Preferably, the method further comprises:
under the condition that the user to be verified passes identity verification, if a brain signal change instruction is detected, updating the specific image content;
and playing the updated specific image content to the user to be verified, and re-collecting the brain wave signal of the user to be verified, which is used as the second brain wave signal.
A second aspect of an embodiment of the present invention discloses an identity authentication system, including:
the playing unit is used for playing the specific image content to the user to be verified;
the acquisition unit is used for acquiring a first brain wave signal and a first step state signal of the user to be verified, and acquiring a second brain wave signal and a second step state signal which are acquired in advance and correspond to the user to be verified, wherein the second brain wave signal is acquired when the specific image content is played to the user to be verified;
the processing unit is used for flattening the first brain wave signal and the first step state signal;
the first verification unit is used for performing preliminary verification on the user to be verified by using a first preset algorithm and combining the flattened first brain wave signal, the flattened first step state signal, the flattened second brain wave signal and the second step state signal;
the acquiring unit is used for acquiring a first electroencephalogram ID corresponding to the first electroencephalogram signal and a first gait ID corresponding to the first step signal by using a second preset algorithm if the user to be verified passes the preliminary verification;
and the second verification unit is used for verifying the identity of the user to be verified according to the first electroencephalogram ID, the first step ID, a second electroencephalogram ID corresponding to the second electroencephalogram and a second step ID corresponding to the second step signal.
Preferably, the acquiring unit, configured to acquire the first brain wave signal and the first step signal of the user to be authenticated, is specifically configured to: the method comprises the steps of collecting a first brain wave signal of a user to be verified by using a non-invasive brain wave collecting helmet, and collecting a first step signal of the user to be verified by using a wearable sensor or an image collecting device.
Preferably, the acquiring unit, configured to acquire the first step signal of the user to be authenticated by using an image acquiring device, is specifically configured to: collecting the motion video of the user to be verified by utilizing image collection equipment; and analyzing the motion video by using a gait analysis algorithm to obtain a first step signal of the user to be verified.
Based on the identity authentication method and system provided by the embodiment of the invention, the specific image content is played to the user to be authenticated; acquiring a first brain wave signal and a first step state signal of a user to be verified, and acquiring a second brain wave signal and a second step state signal which are acquired in advance and correspond to the user to be verified; flattening the first brain wave signal and the first step state signal; performing primary verification on a user to be verified by utilizing a first preset algorithm and combining the flattened first brain wave signal, the flattened first step state signal, the flattened second brain wave signal and the second step state signal; if the user to be verified passes the preliminary verification, acquiring a first electroencephalogram ID corresponding to the first electroencephalogram signal and a first gait ID corresponding to the first step signal by using a second preset algorithm; and performing identity authentication on the user to be authenticated according to the first electroencephalogram ID, the first gait ID, the second electroencephalogram ID corresponding to the second electroencephalogram and the second gait ID corresponding to the second step state signal. According to the scheme, the user is preliminarily verified through the collected brain wave signals and gait signals of the user, and the user is authenticated after the preliminary verification. The brain wave signals are difficult to steal and copy, the gaits of different people are different, and the safety performance can be improved to meet the safety requirement by combining the brain wave signals and the gaits for identity verification.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of an identity authentication method according to an embodiment of the present invention;
fig. 2 is a flowchart of performing preliminary authentication on a user to be authenticated according to an embodiment of the present invention;
fig. 3 is a block diagram of an authentication system according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In this application, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
It should be noted that the identity authentication method and system provided by the invention can be used in the field of network security. The above is only an example, and does not limit the application field of the identity authentication method and system provided by the present invention.
As can be seen from the background art, in the current security authentication method, the password has the characteristics of easy loss and easy stealing, and the password authentication mode cannot meet the security requirement; at present, fingerprints and human faces of users can be simulated through a fingerprint film and a reverse monitoring mask, and once the fingerprint data and the human face data are lost, the fingerprints and the human face data cannot be replaced, and the fingerprint authentication mode and the human face authentication mode cannot meet safety requirements. The safety performance of the safety authentication mode adopted by the current ATM is poor.
Therefore, the embodiment of the invention provides an identity authentication method and system, which perform primary authentication on a user through the collected brain wave signals and gait signals of the user, and then perform identity authentication after the user passes the primary authentication. The brain wave signals are difficult to steal and copy, the gaits of different people are different, and the brain wave signals and the gaits are combined to perform identity verification so as to improve the safety performance.
It should be noted that the identity authentication method provided by the present scheme can be applied to the financial transaction process of the ATM, and similarly, can also be applied to the financial transaction process of other scenarios (or the process that needs to perform identity authentication); in the embodiment of the present invention, an application scenario of the identity authentication method is not limited.
Referring to fig. 1, a flowchart of an identity verification method provided in an embodiment of the present invention is shown, where the identity verification method includes:
step S101: and playing the specific image content to the user to be authenticated.
In the process of implementing step S101 specifically, when the user to be authenticated performs an operation requiring security authentication on the designated device, the specific image content is played to the user to be authenticated through the display screen of the designated device. For example: when a user to be verified performs financial transaction operation on the ATM, specific image content is played to the user through a display screen of the ATM.
Step S102: the method comprises the steps of collecting a first brain wave signal and a first step state signal of a user to be verified, and obtaining a second brain wave signal and a second step state signal which are obtained by pre-collection and correspond to the user to be verified.
It should be noted that the second brain wave signal is acquired when a specific image content is played to the user to be authenticated; specifically, specific image content is played to a user to be authenticated in advance, a second brain wave signal of the user to be authenticated is collected through a non-invasive brain wave collecting helmet, and the collected second brain wave signal is stored as an authentication key. Wherein, the second brain wave signal is extracted based on the P300 brain wave complex (for example only).
And acquiring a second-step state signal of the user to be authenticated by using the wearable sensor or the motion video of the user to be authenticated in advance, and storing the acquired second-step state signal as an authentication key.
It should be further noted that the above-mentioned processes of acquiring the second brain wave signal and acquiring the second step signal may be understood as a preparation work in advance; and when identity authentication is performed subsequently, the identity authentication of the user to be authenticated can be performed by utilizing the pre-collected second brain wave signal and the second step state signal.
In some embodiments, when the second brain wave signal and the second step state signal are stored, the user ID of the user to be verified, the second brain wave signal and the second step state signal may be bound and stored, that is, the second brain wave signal and the second step state signal may be obtained through the user ID of the user to be verified.
In the process of implementing step S102 specifically, when a specific image content is played to a user to be authenticated, a first brain wave signal of the user to be authenticated is acquired, and a first step signal of the user to be authenticated is acquired. And acquiring a second brain wave signal and a second step state signal which are acquired in advance and correspond to the user to be verified through the user ID of the user to be verified. Wherein, the specific image content is played for collecting the first brain wave signal.
It should be noted that the specific image content played when the first electroencephalogram signal is acquired is the same as the specific image content played when the second electroencephalogram signal is acquired.
In some embodiments, the non-invasive brain wave acquisition helmet is used to acquire a first brain wave signal (real-time brain wave signal) of the user to be authenticated, and the wearable sensor or the image acquisition device is used to acquire a first step signal of the user to be authenticated.
In specific implementation, a wearable sensor can be used for acquiring a first step state signal of a user to be authenticated; or acquiring a first step signal of the user to be verified by using the motion video of the user to be verified acquired by the image acquisition equipment.
The mode of acquiring the first step state signal by using the image acquisition equipment is as follows: collecting a motion video of a user to be verified by using image collection equipment; and analyzing the motion video by using a gait analysis algorithm to obtain a first step signal of the user to be verified. For example: when a user to be verified approaches an ATM through a channel, a camera on the ATM (or a camera arranged near the ATM) is used for collecting a video image (namely a motion video) of the walking action of the user to be verified; and analyzing the video image of the walking action of the user to be verified by using a gait analysis algorithm to obtain a first step signal of the user to be verified.
Correspondingly, regarding the above mentioned manner of acquiring the second-step state signal by using the image acquisition device, the specific manner of acquiring the second-step state signal by using the image acquisition device is as follows: and recording the motion video of the user to be verified by utilizing the image acquisition equipment, and analyzing the recorded motion video through a gait analysis algorithm to extract a second step state signal.
Step S103: and flattening the first brain wave signal and the first step signal.
It should be noted that the first brain wave signal and the first step signal are usually multidimensional data, and in order to facilitate subsequent data processing, flattening processing needs to be performed on the first brain wave signal and the first step signal. In the process of implementing step S103 specifically, the first brain wave signal and the first step signal are subjected to flattening processing, and the first brain wave signal and the first step signal are converted into one-dimensional data; that is, the flattened first brain wave signal and the first step signal are one-dimensional data.
Step S104: and performing primary verification on the user to be verified by utilizing a first preset algorithm and combining the flattened first brain wave signal, the flattened first step state signal, the flattened second brain wave signal and the flattened second step state signal.
When the second brain wave signal and the second step signal are stored in advance, the flattening processing of the second brain wave signal and the second step signal is already completed in advance.
In the process of specifically implementing the step S104, a first preset algorithm is used to compare the similarity between the flattened first brain wave signal and the flattened first step signal and the similarity between the flattened second brain wave signal and the flattened second step signal; if the similarity is larger than or equal to the similarity threshold, determining that the user to be verified passes the preliminary verification; and if the similarity is smaller than the similarity threshold, determining that the user to be verified fails the preliminary verification.
In some embodiments, the flattened first brain wave signal and the flattened first step signal may be compared with the flattened second brain wave signal and the flattened second step signal in terms of difference; if the difference degree is within the designated difference range, determining that the user to be verified passes the primary verification; and if the difference degree is out of the specified difference range, determining that the user to be verified fails the preliminary verification. For example: and if the difference degree is within the specified difference range of 0-10%, determining that the user to be authenticated passes the preliminary authentication.
In some embodiments, if it is determined that the user to be authenticated does not pass the preliminary authentication, it is determined that the user to be authenticated is an impostor, and at this time, the operation of the user to be authenticated is rejected, for example: and if the user to be authenticated is determined not to pass the preliminary authentication, refusing the financial transaction operation of the user to be authenticated. If the user to be authenticated is determined to pass the preliminary authentication, steps S105 to S106 are executed to authenticate the user to be authenticated (compare in further detail).
It can be understood that, through the comparison of the similarity (or the difference), a preliminary judgment can be quickly made to judge whether the user to be authenticated is an impostor. If the user to be authenticated is judged to be not the impostor preliminarily (namely, the user passes the preliminary authentication), then the subsequent identity authentication is carried out. If the user to be authenticated is preliminarily judged to be an impostor (namely, the user does not pass the preliminary authentication), the operation of the user to be authenticated is refused, the subsequent identity authentication is not needed, and the computing resource is saved.
Step S105: and if the user to be verified passes the preliminary verification, acquiring a first electroencephalogram ID corresponding to the first electroencephalogram signal and a first gait ID corresponding to the first step signal by using a second preset algorithm.
In the process of implementing step S105 specifically, if the user to be authenticated passes the preliminary authentication, the flattened first brain wave signal and the flattened first step signal are used as parameters of a deep neural network (RNN) algorithm to perform calculation, so as to obtain a corresponding weight map. Specifically, the flattened first brain wave signal and the flattened first step signal are one-dimensional data, and the two-dimensional weight map can be obtained by taking the one-dimensional data as an input parameter of an RNN algorithm (a second preset algorithm) combined with the attention model and calculating the RNN algorithm.
And mapping the weight map obtained by calculating the RNN algorithm to obtain a first electroencephalogram ID corresponding to the first electroencephalogram signal and a first gait ID corresponding to the first step signal.
Step S106: and performing identity authentication on the user to be authenticated according to the first electroencephalogram ID, the first gait ID, the second electroencephalogram ID corresponding to the second electroencephalogram and the second gait ID corresponding to the second step state signal.
It should be noted that, a second electroencephalogram ID corresponding to a second electroencephalogram and a second step ID corresponding to a second step signal are calculated in advance by using an RNN algorithm, and the second electroencephalogram ID and the second step ID are recorded; specifically, the flattened second brain wave signal and the flattened second step state signal are used as parameters of an RNN algorithm to be calculated to obtain a corresponding weight map, and the weight map is mapped to obtain a second electroencephalogram ID and a second step state ID.
It should be noted that the electroencephalogram signal and the electroencephalogram ID have a unique mapping relationship, and the gait signal and the gait ID have a unique mapping relationship; the second electroencephalogram ID and the second step ID are similar to the identity card number of the user to be verified, and the second electroencephalogram ID and the second step ID have uniqueness, namely, the electroencephalogram ID and the gait ID corresponding to different users are different; the authentication of the user to be authenticated can be performed using the second electroencephalogram ID and the second modality ID.
In the process of implementing step S106 specifically, a second electroencephalogram ID corresponding to a second electroencephalogram stored in advance and a second gait ID corresponding to a second step signal are acquired. Comparing the first electroencephalogram ID with the second electroencephalogram ID, and comparing the first step ID with the second step ID.
Under the condition that the first electroencephalogram ID is the same as the second electroencephalogram ID and the first step ID is the same as the second step ID, determining that the user to be authenticated passes the identity authentication, and responding to the operation of the user at the moment; for example: in the case where the first electroencephalogram ID and the second electroencephalogram ID are identical, and the first gait ID and the second gait ID are identical, the ATM may respond to a financial transaction operation of the user.
And in the case that the first electroencephalogram ID and the second electroencephalogram ID are different, and/or in the case that the first step ID and the second step ID are different, determining that the user to be authenticated does not pass the authentication, and rejecting the user's operation at the moment, for example: the ATM denies the financial transaction operation of the user in a case where the first electroencephalogram ID and the second electroencephalogram ID are different, and/or in a case where the first step ID and the second step ID are different.
As can be seen from the above, the second brain wave signal and the second step state signal are stored as a secret key in advance, and in the subsequent authentication process, the security of the user to be authenticated can be authenticated through the second brain wave signal and the second step state signal which are stored in advance. In some cases (e.g., the user wants to replace the second brain wave signal or the second brain wave signal is leaked), the user to be authenticated may choose to replace the stored second brain wave signal.
Preferably, under the condition that the user to be authenticated passes the identity authentication, if a brain signal change instruction is detected, the specific image content is updated; and playing the updated specific image content to the user to be verified, and re-collecting the brain wave signal of the user to be verified, which is used as the second brain wave signal. That is, if the user to be authenticated passes the authentication, if the user to be authenticated needs to change the stored second brain wave signal (a brain signal change instruction is detected), playing the updated specific image content (new image content) to the user to be authenticated, re-acquiring the brain wave signal of the user to be authenticated, and replacing the originally stored second brain wave signal with the re-acquired brain wave signal as a secret key, where the stored second brain wave signal is the re-acquired brain wave signal.
It should be noted that, after the brain wave signal of the user to be authenticated is re-acquired as the second brain wave signal, when the user to be authenticated performs authentication again, the played specific image content is the updated specific image content, and the second brain wave signal used for performing authentication is the brain wave signal re-acquired based on the updated specific image content.
Similarly, the user to be verified may also select to update the second step state signal, and the specific manner of updating the second step state signal may refer to the manner of updating the second brain wave signal, which is not described herein again.
In the embodiment of the invention, the user is primarily verified by collecting the brain wave signals and the gait signals of the user, and the user passes the primary verification and then carries out the identity verification. The brain wave signals are difficult to steal and copy, and the gaits of different people are different, so that the safety performance can be improved to meet the safety requirement by combining the brain wave signals and the gaits for identity verification.
In the foregoing embodiment of the present invention, referring to fig. 2, a process of performing preliminary authentication on a user to be authenticated, which is related to step S104 in fig. 1, shows a flowchart of performing preliminary authentication on a user to be authenticated, which is provided in the embodiment of the present invention, and includes the following steps:
step S201: and processing the flattened first brain wave signal and the flattened first step signal through a DeepKey algorithm to obtain a first processing result.
In the process of specifically implementing step S201, the flattened first brain wave signal and the flattened first step signal are input to a depekey algorithm (a first preset algorithm) for processing, so as to obtain a first processing result (that is, a processing result of the depekey algorithm).
Step S202: and comparing the first processing result with the second processing result.
It should be noted that the second brain wave signal and the second step state signal are flattened in advance, and the second processing result is obtained by processing the flattened second brain wave signal and the flattened second step state signal by using the depekey algorithm in advance. That is, when the second brain wave signal and the second step state signal are stored, the second brain wave signal and the second step state signal are flattened in advance, and the flattened second brain wave signal and the flattened second step state signal are processed by the depekey algorithm to obtain a second processing result (i.e., a processing result of the depekey algorithm).
In the process of implementing step S202, the first processing result and the second processing result are compared to calculate the similarity between the first processing result and the second processing result.
Step S203: and determining that the user to be verified passes the preliminary verification under the condition that the similarity between the first processing result and the second processing result is greater than or equal to the similarity threshold.
In the process of implementing step S203, if the similarity between the first processing result and the second processing result is greater than or equal to the similarity threshold, it is determined that the user to be authenticated passes the preliminary authentication, and then the subsequent authentication is performed (steps S105 to S106 are performed).
Step S204: and under the condition that the similarity between the first processing result and the second processing result is smaller than a similarity threshold value, determining that the user to be verified fails the preliminary verification.
In the process of specifically implementing step S204, if the similarity between the first processing result and the second processing result is smaller than the similarity threshold, it is determined that the user to be authenticated has not passed the preliminary authentication, it is determined that the user to be authenticated is an impostor, and the operation of the user to be authenticated is rejected at this time.
In the embodiment of the invention, through comparison of the similarity, a preliminary judgment can be quickly made to judge whether the user to be verified is an impostor. If the user to be authenticated is judged to be not an impostor preliminarily, then subsequent identity authentication is carried out; if the user to be authenticated is preliminarily judged to be an impostor, the operation of the user to be authenticated is refused, and subsequent identity authentication is not required; the speed of identity authentication is improved and computing resources are saved.
Corresponding to the identity authentication method provided by the embodiment of the present invention, referring to fig. 3, the embodiment of the present invention further provides a structural block diagram of an identity authentication system, where the identity authentication system includes: the system comprises a playing unit 301, a collecting unit 302, a processing unit 303, a first verifying unit 304, an obtaining unit 305 and a second verifying unit 306;
the playing unit 301 is configured to play the specific image content to the user to be authenticated.
The acquisition unit 302 is configured to acquire a first brain wave signal and a first step signal of a user to be verified, and acquire a second brain wave signal and a second step signal, which are acquired in advance and correspond to the user to be verified, where the second brain wave signal is acquired when specific image content is played to the user to be verified.
In a specific implementation, the acquiring unit 302, configured to acquire a first brain wave signal and a first step signal of a user to be authenticated, is specifically configured to: the method comprises the steps of collecting a first brain wave signal of a user to be authenticated by using a non-invasive brain wave collecting helmet, and collecting a first step signal of the user to be authenticated by using a wearable sensor or an image collecting device.
In some embodiments, the acquiring unit 302, configured to acquire the first step signal of the user to be authenticated by using an image acquiring device, is specifically configured to: collecting a motion video of a user to be verified by using image collection equipment; and analyzing the motion video by using a gait analysis algorithm to obtain a first step signal of the user to be verified.
A processing unit 303, configured to perform flattening processing on the first brain wave signal and the first step signal.
The first verification unit 304 is configured to perform preliminary verification on the user to be verified by using a first preset algorithm and combining the flattened first brain wave signal, the flattened first step state signal, the flattened second brain wave signal, and the second step state signal.
The obtaining unit 305 is configured to obtain, by using a second preset algorithm, a first electroencephalogram ID corresponding to the first electroencephalogram signal and a first gait ID corresponding to the first step signal if the user to be authenticated passes the preliminary authentication.
In a specific implementation, the obtaining unit 305 is specifically configured to: if the user to be verified passes the preliminary verification, calculating by taking the flattened first brain wave signal and the flattened first step signal as the parameters of the RNN algorithm to obtain a corresponding weight map; the weight map is mapped to obtain a first electroencephalogram ID corresponding to the first electroencephalogram signal and a first gait ID corresponding to the first step signal.
The second verification unit 306 is configured to perform identity verification on the user to be verified according to the first electroencephalogram ID, the first gait ID, the second electroencephalogram ID corresponding to the second electroencephalogram, and the second gait ID corresponding to the second step signal.
In a specific implementation, the second verification unit 306 is specifically configured to: acquiring a second electroencephalogram ID corresponding to a second electroencephalogram and a second gait ID corresponding to a second step state signal; comparing the first electroencephalogram ID with the second electroencephalogram ID, and comparing the first step ID with the second step ID; determining that the user to be authenticated passes identity authentication under the condition that the first electroencephalogram ID is the same as the second electroencephalogram ID and the first step ID is the same as the second step ID; and determining that the user to be authenticated does not pass the identity authentication under the condition that the first electroencephalogram ID and the second electroencephalogram ID are different and/or under the condition that the first step ID and the second step ID are different.
In the embodiment of the invention, the user is primarily verified by collecting the brain wave signals and the gait signals of the user, and the user passes the primary verification and then carries out the identity verification. The brain wave signals are difficult to steal and copy, and the gaits of different people are different, so that the safety performance can be improved to meet the safety requirement by combining the brain wave signals and the gaits for identity verification.
Preferably, in conjunction with what is shown in fig. 3, the first authentication unit 304 includes: the device comprises a processing module, a comparison module and a determination module, wherein the execution principle of each module is as follows:
the processing module is used for processing the flattened first brain wave signal and the flattened first step state signal through a DeepKey algorithm to obtain a first processing result.
And the comparison module is used for comparing the first processing result with the second processing result, wherein the second brain wave signal and the second step state signal are flattened in advance, and the second processing result is obtained by processing the flattened second brain wave signal and the flattened second step state signal by utilizing a DeepKey algorithm in advance.
The determining module is used for determining that the user to be verified passes the preliminary verification under the condition that the similarity between the first processing result and the second processing result is greater than or equal to a similarity threshold; and under the condition that the similarity between the first processing result and the second processing result is smaller than a similarity threshold value, determining that the user to be verified fails the preliminary verification.
In the embodiment of the invention, through comparison of the similarity, a preliminary judgment can be quickly made to judge whether the user to be verified is an impostor. If the user to be verified is not an impostor in the initial judgment, performing subsequent identity verification; if the user to be authenticated is preliminarily judged to be an impostor, the operation of the user to be authenticated is refused, and subsequent identity authentication is not required; the speed of identity authentication is improved and computing resources are saved.
Preferably, in conjunction with what is shown in fig. 3, the authentication system further comprises:
the updating unit is used for updating the specific image content if a brain signal change instruction is detected under the condition that the user to be verified passes the identity verification; and playing the updated specific image content to the user to be verified, and re-collecting the brain wave signal of the user to be verified, which is used as the second brain wave signal.
In summary, the embodiments of the present invention provide an identity authentication method and system, where a user is primarily authenticated through collecting brain wave signals and gait signals of the user, and then the user is authenticated after the user passes the primary authentication. The brain wave signals are difficult to steal and copy, the gaits of different people are different, and the safety performance can be improved to meet the safety requirement by combining the brain wave signals and the gaits for identity verification.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, the system or system embodiments are substantially similar to the method embodiments and therefore are described in a relatively simple manner, and reference may be made to some of the descriptions of the method embodiments for related points. The above-described system and system embodiments are only illustrative, wherein the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the components and steps of the various examples have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. An identity verification method, the method comprising:
playing specific image content to a user to be authenticated;
acquiring a first brain wave signal and a first step state signal of the user to be verified, and acquiring a second brain wave signal and a second step state signal which are acquired in advance and correspond to the user to be verified, wherein the second brain wave signal is acquired when the specific image content is played to the user to be verified;
flattening the first brain wave signal and the first step state signal;
performing preliminary verification on the user to be verified by using a first preset algorithm and combining the flattened first brain wave signal, the flattened first step state signal, the flattened second brain wave signal and the second step state signal;
if the user to be verified passes the preliminary verification, acquiring a first electroencephalogram ID corresponding to the first electroencephalogram signal and a first gait ID corresponding to the first step signal by using a second preset algorithm;
and performing identity authentication on the user to be authenticated according to the first electroencephalogram ID, the first step ID, a second electroencephalogram ID corresponding to the second electroencephalogram and a second step ID corresponding to the second step signal.
2. The method according to claim 1, wherein the process of collecting the first brain wave signal and the first step signal of the user to be authenticated comprises:
the method comprises the steps of collecting a first brain wave signal of a user to be verified by using a non-invasive brain wave collecting helmet, and collecting a first step signal of the user to be verified by using a wearable sensor or an image collecting device.
3. The method according to claim 2, wherein the process of acquiring the first step signal of the user to be authenticated by using the image acquisition device comprises:
collecting the motion video of the user to be verified by utilizing image collection equipment;
and analyzing the motion video by using a gait analysis algorithm to obtain a first step signal of the user to be verified.
4. The method according to claim 1, wherein the preliminary authentication of the user to be authenticated is performed by using a first preset algorithm in combination with the flattened first brain wave signal, the flattened first step signal, the flattened second brain wave signal and the second step signal, and comprises:
processing the flattened first brain wave signal and the flattened first step signal through a DeepKey algorithm to obtain a first processing result;
comparing the first processing result with a second processing result, wherein the second brain wave signal and the second step state signal are flattened in advance, and the second processing result is obtained by processing the flattened second brain wave signal and the flattened second step state signal by using the DeepKey algorithm in advance;
determining that the user to be verified passes preliminary verification under the condition that the similarity between the first processing result and the second processing result is greater than or equal to a similarity threshold;
and under the condition that the similarity between the first processing result and the second processing result is smaller than a similarity threshold, determining that the user to be verified does not pass the preliminary verification.
5. The method as claimed in claim 1, wherein if the user to be authenticated passes the preliminary authentication, acquiring the first electroencephalogram ID corresponding to the first electroencephalogram signal and the first gait ID corresponding to the first step signal by using a second preset algorithm comprises:
if the user to be verified passes the preliminary verification, calculating the flattened first brain wave signal and the flattened first step signal as the parameters of the RNN algorithm to obtain a corresponding weight map;
and mapping the weight map to acquire a first electroencephalogram ID corresponding to the first electroencephalogram signal and a first gait ID corresponding to the first step signal.
6. The method according to claim 1, wherein authenticating the user to be authenticated according to the first electroencephalogram ID, the first step ID, a second electroencephalogram ID corresponding to the second electroencephalogram, and a second gait ID corresponding to the second step signal comprises:
acquiring a second electroencephalogram ID corresponding to the second electroencephalogram and a second gait ID corresponding to the second step state signal;
comparing the first electroencephalogram ID with the second electroencephalogram ID, and comparing the first gait ID with the second step ID;
determining that the user to be authenticated passes identity authentication when the first electroencephalogram ID is the same as the second electroencephalogram ID and the first step ID is the same as the second step ID;
determining that the user to be authenticated does not pass authentication if the first electroencephalogram ID and the second electroencephalogram ID are different, and/or if the first step ID and the second step ID are different.
7. The method according to any one of claims 1-6, further comprising:
under the condition that the user to be authenticated passes identity authentication, if a brain signal change instruction is detected, updating the specific image content;
and playing the updated specific image content to the user to be verified, and re-collecting the brain wave signal of the user to be verified, which is used as the second brain wave signal.
8. An identity verification system, the system comprising:
the playing unit is used for playing the specific image content to the user to be verified;
the acquisition unit is used for acquiring a first brain wave signal and a first step state signal of the user to be verified, and acquiring a second brain wave signal and a second step state signal which are acquired in advance and correspond to the user to be verified, wherein the second brain wave signal is acquired when the specific image content is played to the user to be verified;
the processing unit is used for flattening the first brain wave signal and the first step state signal;
the first verification unit is used for performing preliminary verification on the user to be verified by using a first preset algorithm and combining the flattened first brain wave signal, the flattened first step state signal, the flattened second brain wave signal and the second step state signal;
the acquiring unit is used for acquiring a first electroencephalogram ID corresponding to the first electroencephalogram signal and a first gait ID corresponding to the first step signal by using a second preset algorithm if the user to be verified passes the preliminary verification;
and the second verification unit is used for verifying the identity of the user to be verified according to the first electroencephalogram ID, the first step ID, a second electroencephalogram ID corresponding to the second electroencephalogram and a second step ID corresponding to the second step signal.
9. The system according to claim 8, wherein the acquisition unit configured to acquire the first brain wave signal and the first step signal of the user to be authenticated is specifically configured to: the method comprises the steps of collecting a first brain wave signal of a user to be verified by using a non-invasive brain wave collecting helmet, and collecting a first step signal of the user to be verified by using a wearable sensor or an image collecting device.
10. The system according to claim 9, wherein the acquiring unit configured to acquire the first step status signal of the user to be authenticated by using an image acquiring device is specifically configured to: collecting the motion video of the user to be verified by utilizing image collection equipment; and analyzing the motion video by using a gait analysis algorithm to obtain a first step signal of the user to be verified.
CN202210367009.0A 2022-04-08 2022-04-08 Identity verification method and system Pending CN114743218A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210367009.0A CN114743218A (en) 2022-04-08 2022-04-08 Identity verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210367009.0A CN114743218A (en) 2022-04-08 2022-04-08 Identity verification method and system

Publications (1)

Publication Number Publication Date
CN114743218A true CN114743218A (en) 2022-07-12

Family

ID=82279186

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210367009.0A Pending CN114743218A (en) 2022-04-08 2022-04-08 Identity verification method and system

Country Status (1)

Country Link
CN (1) CN114743218A (en)

Similar Documents

Publication Publication Date Title
US11023709B2 (en) System, method and apparatus for multi-modal biometric authentication and liveness detection
Li et al. Unobservable re-authentication for smartphones.
US6810480B1 (en) Verification of identity and continued presence of computer users
CN107437074B (en) Identity authentication method and device
JP2019522278A (en) Identification method and apparatus
Gamboa et al. An Identity Authentication System Based On Human Computer Interaction Behaviour.
CN106485125B (en) Fingerprint identification method and device
US11997087B2 (en) Mobile enrollment using a known biometric
Klosterman et al. Secure continuous biometric-enhanced authentication
CN106888204B (en) Implicit identity authentication method based on natural interaction
CN111831995A (en) Trusted identity authentication method and system based on eID and human body biological information
JP2019008369A (en) Information processing apparatus, authentication system, authentication method and program
WO2021011769A1 (en) Methods, systems, and media for secure authentication of users using one or more biometric recognition systems
CN104486306B (en) Identity authentication method is carried out based on finger hand vein recognition and cloud service
CN111611437A (en) Method and device for preventing face voiceprint verification and replacement attack
CN112989937B (en) Method and device for user identity authentication
CN106599843A (en) Fingerprint authentication method and device
Li et al. Hand in motion: enhanced authentication through wrist and mouse movement
CN115906028A (en) User identity verification method and device and self-service terminal
CN114743218A (en) Identity verification method and system
US20230027253A1 (en) Method for confirming the identity of a user in a browsing session of an online service
EP4147415B1 (en) Access authentication using obfuscated biometrics
CN113705428A (en) Living body detection method and apparatus, electronic device, and computer-readable storage medium
JP2018169943A (en) Face authentication processing device, face authentication processing method and face authentication processing system
CN108304746B (en) Method and equipment for updating authentication reference information for electrocardio identity authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination