Fingerprint recognition stands out from the tech army of biometrics

Biometric technology is considered to be the development trend of future identity verification.

However, in the huge team of biometrics, the development of various subdivision technologies and the application cost performance are very unbalanced. So far, nearly 20 kinds of features have been studied in academia, ranging from DNA, face image, iris, infrared face thermogram, ear shape, skull, tooth shape, voice, fingerprint, palm print, vein, signature, handwriting And so on can be identified... Fingerprint recognition, as the most mature technology and the most convenient and low-cost application, stands out in the army of biometric technology.

Fingerprint recognition, as the name suggests, is a technology for identity authentication and identification through the characteristics of human fingerprints. The application of this technology can be described as ancient, but with the high development of information technology today, where will the application of fingerprint technology go?

The author tries to discuss the application trend of fingerprint identification tomorrow from the history of fingerprint identification yesterday and the technology of fingerprint identification today.

Fingerprint recognition: a very old new technology

Fingerprints are innate physical characteristics of people. After about the age of 14, everyone's fingerprints have been finalized. Fingerprints are "unique", two different people will not have the same fingerprints, and fingerprints are also "fixed" and will not change as people continue to grow. Since 1888, when the famous British anthropologists Gramidon and Fraser published an experimental report to prove this characteristic with scientific methods, countries around the world have successively set up fingerprint storage cabinets. After more than 60 years, no identical fingerprints have been found Card.

As early as 7000-6000 BC, the ancient Assyrians and Chinese people realized the characteristics of fingerprints and used fingerprints as a symbol of identity. In the mid-19th century, the research on fingerprints in the scientific sense began. In the 1960s, computers were used to automatically identify fingerprints, and at the same time, the automatic fingerprint identification system (AFIS) for criminal investigations gradually began to be widely used in the world. At this time, the fingerprint collection generally adopts the method of ink stamping. After 1980, with the invention of personal computers and optical fingerprint collectors, fingerprint recognition technology began to enter some non-judicial fields, such as resident ID cards. After 1990, the appearance of cheap fingerprint collectors and computing devices solved the problem of fast and accurate matching algorithms, and made fingerprint identification technology move towards personal-based applications. Since then, people's research on fingerprint identification technology has also made a further understanding of the nature of fingerprints. Now, fingerprint identification has developed to the stage of living body identification technology (first launched by domestic companies such as Arrott), and has been widely used in various fields such as security, attendance, and computer information authentication.

Eight steps: make fingerprint identification clear

After years of development of fingerprint recognition technology, the latest technology has developed to the stage of living body recognition technology, and has been widely used in various fields of security, attendance, and computer information authentication. Fingerprint identification mainly includes the process of acquisition, calculation, transmission, verification, etc. Its principle mainly includes four parts.

The first part - capture (capture). First, use a fingerprint scanner to capture the pattern and other related features of the fingerprint. The image just obtained has a lot of noise. This is mainly due to work and the environment; for example, the fingers are soiled, the fingers have cuts, scars, marks, dry, wet or torn fingers, etc. It is then image-enhanced to reduce noise and enhance the contrast of ridges and valleys. And design a suitable, matching filter and appropriate threshold for the operations involved in processing fingerprint images.

The second part - calculus (algorithm). Using program calculation and statistics to find out the relevant feature points of the fingerprint with the so-called "every person is different and lifelong invariant", and digitize it, the digitized data naturally still has the fingerprint "every person is different". and lifelong."

The third part - transmission (transmit). The digitized fingerprint features are transmitted on the computer in various ways, no matter what transmission method or encryption and decryption method is adopted, the unique characteristics are still retained.

The fourth part - verification (verify). The transmitted data is then calculated by the program to verify its similarity with the comparison data in the database, and if the statistical similarity reaches a certain degree or more, it can represent the fingerprint data transmitted by myself.

It has been scientifically proven that these lines are different in patterns, breakpoints and intersections, and are unique and permanent, which is an important scientific basis for supporting fingerprint biometrics. The identification of fingerprints usually uses the contrast identification method, which is to use the fingerprint acquisition instrument to convert the characteristic points of the finger (breakpoints, bifurcation points, isolated points) with a complex fingerprint calculation method, and convert the initially collected characteristic points into encryption that can be recognized by the computer. Binary files, stored in the computer. In each identity authentication, as long as the newly collected fingerprint and the fingerprint file in the computer are compared with each other, the identity authentication of anyone can be completed in a very short time. According to Shao Yu, a senior domestic biometrics expert and CEO of Arrot Technology, from a professional point of view, as long as the above principles are met, there will be no omissions in conversion, and above a certain comparison value, it can be theoretically confirmed It's my fingerprint.

Fingerprint technology can derive many fingerprint products. Generally speaking, a mature fingerprint identification system application process includes the following eight steps (as shown in the figure).

The first step is to capture the selected fingerprint features through the fingerprint identification device; the second step is to process the fingerprint features, extract and register the biometric template; The template is stored in the card; the fourth step is to scan the selected biometrics on the spot; the fifth step is to process the biometrics and extract the biometric template; the sixth step, the biometric template obtained by scanning is matched with the stored biometric template; the seventh Step 1: Provide matching scores for the application; Step 8: Record relevant security audit trails used by the system.

Fingerprint application: four areas to identify the authenticity of identity

Because of the maturity and ease of use of fingerprint technology, the application of fingerprint identification technology is the most widely used in biometric identification technology. The future application directions of fingerprint identification, which have huge market potential, are mainly divided into four categories: one is the secret system, which requires high security protection; the second is the identification technology for large-scale people; the third is for urban public The civic application of affairs; the fourth is the authentication application from the real life into the virtual world of the Internet.

First of all, in the process of using secret-related information systems in my country, whether it is a single machine or a network, user authentication is an essential content. National confidentiality guidelines BMZ1, BMZ2, BMZ3 and confidentiality standards BMB17 and other confidentiality requirements all strictly stipulate identity authentication measures. It can be seen that the identity verification requirements for confidential information systems are quite high, and only in this way can the security of the system be improved and ensured. When the confidential information system realizes user authentication, it mainly relies on traditional authentication methods such as password + and user name, password + IC card or password + UKEY to realize identity authentication. It was only in the past 1-2 years that the classified information system began to adopt biometric technology to enhance the security of the system.

With the successive promulgation of relevant national policies and regulations, high-security biometric technology has increasingly received detailed regulations and application requirements. "Regulations of the People's Republic of China on Security Protection of Computer Information Systems", "Technical Requirements for Hierarchical Protection of Information Systems Involving State Secrets", "Basic Requirements for Hierarchical Protection of Information System Security", "Information System Security Hierarchical Protection Evaluation Guidelines", "Security of Computer Information Systems" Graded Protection (General Technical Requirements)", which clearly stipulates that my country's "computer information system implements security grade protection", computer information systems at all levels must be designed with user identity authentication functions, and systems above the third level "require stricter identity authentication, For example, special information such as human biometrics (fingerprint, retina) is used for identification, and identification is performed before each user logs in to the system.” Generally, fingerprint identification technology builds a high-level identity authentication security system through two types of products in secret systems. One is the intranet fingerprint identification system, such as the well-known Trustlink secure fingerprint authentication platform in China, the Aliot fingerprint AD domain management system, and the fingerprint door lock system; , Fingerprint safe, fingerprint reader, fingerprint mouse, etc.

Secondly, for the identification technology of large-scale people, this aspect will be developed and applied on a large scale in the future, such as airport customs clearance security, station wharf, large-scale gatherings, etc., biometric technology can be used. For example, there are about 2,000 children missing every day in the United States. So far, nearly 50,000 adults cannot be found. They have launched a plan to use biometrics, especially iris recognition, to find these lost children and adults. .

Again, citizen applications for urban public affairs. Take a city fingerprint card project cooperating with the Wuxi Municipal Government as an example. In 2009, the Wuxi Citizens Card Project, as one of the practical projects of the Wuxi Municipal Government for the private sector, has been launched. In addition to the use of traditional technology applications such as advanced and mature computers and IC cards, the Wuxi Citizens Card Project is the biggest highlight of the project is the introduction of mature and innovative fingerprint authentication technology, which constitutes a more secure, more convenient, and more application functions. Citizen fingerprint card application information platform. When citizens apply for a citizen card, their fingerprints are stored in the fingerprint database platform and the citizen card at the same time. The fingerprint database platform will provide background fingerprint identification and identity authentication for public security, social security, health, education, civil affairs and other related e-government and public utilities, and will be used in some applications. Virtualization of citizen cards in the scene. Using the self-developed urban fingerprint database platform operation platform, Yariot helped the Wuxi Municipal Government to build an urban fingerprint database, and integrated the country's first fingerprint card. Payment, driver's license application, and even voting, etc., can be quickly operated by either using a card or relying on fingerprints. The construction of such an urban fingerprint database and fingerprint citizen card not only benefits the safety and convenience of every citizen, but also provides the government with public affairs such as the management of urban floating population and case detection and comparison. Great help. By building a technologically innovative and people-oriented "Fingerprint Citizen Card" platform, it will further improve the service level of Wuxi Municipal Government for the people, and promote the development of Wuxi's informatization construction towards a higher and more advanced direction.

Finally, in the Internet field, because Internet manufacturers basically implement membership system, repeated registration and login password confusion have become a bottleneck for netizens to use the Internet more effectively. At the same time, the demand for honest Internet and real-name networks calls for an innovative method solve such problems. The Internet third-party fingerprint authentication platform is an innovative move of the Internet in the future. Real-name authentication through fingerprints is both safe and acceptable to netizens. Netizens only need to register their online identity on this platform to surf the Internet and any other network applications. The registration can be easily achieved only by accessing the platform. For netizens, they can log in through this registered platform without having to memorize any website passwords, and since it is a fingerprint registration, they only need to “access the Internet with one finger” to “pass the network”.

Of course, the popular application of fingerprint recognition and even various biometric technologies has actually flourished in many fields. If fingerprint recognition technology is likened to a pile of eggs, then it is conceivable that the above four aspects must be the storage of fingerprints in the future. Identify the largest basket of technical eggs.

Arcade Joystick

Arcade Joystick,arcade joystick 8 way,spanish joystick,joystick

Guangzhou Ruihong Electronic Technology CO.,Ltd , https://www.callegame.com