Comparison of traditional identification technology and biometric technology
[ad_1]
There are mainly two types of identity authentication technologies used in traditional systems:
(1) Personal identification code and password. The two can be used in combination or alone. The key to this method is that the user needs to keep in mind a certain specific information (identification code, password). Once the user forgets, he cannot prove his identity and is rejected; if the identification code (password) is learned by others, others can easily Enter the controlled area by impersonating the identity of a legitimate user. At present, access control/access control systems based on this identity authentication mechanism are still in widespread use. It is not difficult to see that there are great problems with the safety and ease of use of this access control/access control system. Once an illegal intruder pretends to be a legitimate user and enters the controlled area, the system’s audit and verification mechanism cannot detect the occurrence of an illegal intrusion, let alone provide relevant information about the illegal intruder.
(2) IC/inductive ID/RFID card certificate (hereinafter referred to as electronic card certificate). Compared with the previous type, this method has obviously improved significantly. Legal users only need to hold a card to enter the control area, so there is no problem of being unable to enter due to forgetting the personal identification code or password. The problems with this identification technology are:
①The electronic card certificate may be forged;
② The electronic card certificate cannot ensure that the cardholder is the true owner of the certificate. In other words, the electronic card certificate may be borrowed or fraudulently used by others;
③There is a possibility of error or fraud in manual inspection, and the cardholder may enter an unauthorized area;
④ Loss of electronic card certificates will cause great inconvenience to legal cardholders.
Due to the possibility of electronic cards being borrowed or fraudulently used, it is difficult to audit the original records of personnel entry and exit, which leads to the failure of the system’s audit and verification mechanism; according to relevant statistics, the current access control/access control system based on electronic card documents is occupied. Most of the market share.
Biometric authentication technology is an emerging security technology, and it is also one of the most promising technologies in this century. Biometric authentication technology combines information technology with biotechnology and has huge market development potential. Bill Gates once predicted: “The biometric technology that uses human biometrics-fingerprints, voice, face, etc. to verify, will become the most important technological revolution in the IT industry in the next few years.” It can be seen that its development prospects and market potential are huge.
Compared with the above-mentioned two traditional identification technologies, biometric identification technologies such as fingerprints, palms, and iris are obviously more secure based on human biometric identification technologies. In a statistical sense, human fingerprints, palm shape, iris and other physiological characteristics are unique, so these characteristics can be used as the basis for identifying users. The access control/access control system (fingerprint lock) based on fingerprint recognition technology has been successfully developed and put on the market several years ago. Judging from the actual application of fingerprint locks, this technology still has the following problems:
① A high degree of user cooperation is required. The user needs to directly touch the fingerprint collector during the fingerprint collection process, which is prone to feel infringed, resulting in a decrease in the user’s acceptance of fingerprint recognition technology;
②It is difficult to collect fingerprints of some users, and there is a problem of high system rejection rate;
③The experiment shows that the fingerprints of legitimate users may be copied by others, which undoubtedly reduces the security of the entire system;
④ If there is an abnormal situation in the system, it is difficult to know the real identity of the person entering it based on the fingerprint information alone. This brings difficulty to the audit and verification of the system.
The recognition accuracy of palm and iris recognition technology is generally higher than that of fingerprint recognition systems, but there are still shortcomings such as high degree of user cooperation, strong intrusion, use of special equipment, and high price.
Face recognition technology. In a typical application environment, the recognition accuracy of face recognition technology can reach a level equivalent to that of fingerprint recognition technology, and its user-friendliness is significantly higher than that of several other biometric recognition technologies. Its moderate price and superior performance can be more recognized by users. The biggest feature of the face recognition system is concealment and non-compulsive. It does not require you to press your handprints, nor does it require coordinated actions such as your eye gaze. In a sense, its recognition is completed in your unknowingly behavior. Therefore, it can be widely used in important fields such as national security, military security, public security and justice, borders, civil aviation, finance, and insurance. Of course, it can also be used in unit attendance, home security, etc., and has great development value.
Before the emergence of face recognition technology, there were several problems facing the security and public security departments:
(1) How to find specific targets among the crowds at ports or public places such as airports, stations, wharfs, hotels, shopping malls, etc. In the past, security departments and public security departments could only rely on manual control and squatting. In addition to consuming a lot of police force, this method often causes specific targets to slip through the net due to the negligence of the personnel concerned;
(2) After the criminal suspect is under control, he is unwilling to reveal his true identity, and there is no clue to prove his identity. Public security personnel often had to release him because he could not confirm his identity. There are also similar difficulties in the identification of victims;
(3) In terms of entry and exit management, there are often controlled personnel who successfully escaped the supervision of relevant departments by using fake identity documents.
After years of research, the current video-based real-time face recognition system, image and video-based photo comparison system, under controlled conditions, have been able to better meet the needs of security and public security departments. The high-speed automatic recognition capabilities of the face recognition system can largely free the public security and security departments from the past “human sea tactics”, greatly improving the security level of the entire country and society, thereby achieving deterrence and deterrence. The purpose of punishing criminals, maintaining social stability, and ensuring national security. As a high- and mid-end product in the security industry, a digital surveillance system based on face recognition has a very broad application prospect.
The importance of face recognition to the traditional security field
Digital monitoring system
After years of development, digital surveillance systems have now become mainstream products in the security industry. At present, many companies in the industry have widely adopted the mainstream MPEG4 and H.264 encoding and decoding standards, and have made significant technological progress in encoding and decoding efficiency, image quality, and data transmission. However, because the current system focuses on the recording of monitoring scenes and lacks further analysis and understanding of images, there are inherent deficiencies, which affects the further popularization and use of the system.
In summary, the existing digital surveillance system faces four major problems:
(1) Determine whether there are people in the surveillance scene.
(2) The monitored object is difficult to identify.
(3) Determine the identity of the current monitoring object.
(4) Video retrieval is inefficient and difficult, and it is impossible to perform intelligent retrieval based on AV objects such as face images.
It is not difficult to see that the above four problems are the research scope and application fields of face recognition. Through the joint efforts of many researchers, these problems have been solved well under certain application conditions. Therefore, if the face recognition technology can be organically combined with the existing digital surveillance system, it will be able to effectively solve the four major problems existing in the current digital surveillance system.
From the perspective of system implementation, the front-end equipment used by the existing digital surveillance system is consistent with the imaging system used by the face recognition system, and the video stream (uncoded) generated by the digital surveillance system is also the face recognition system. The data source required by the system, in other words, the combination of face recognition technology and digital monitoring system has no obstacles to system realization. The application of face recognition technology in the digital surveillance system is mainly to complete the intelligent processing of face object extraction and image understanding. The application of face recognition technology can realize the intelligent upgrade of the digital monitoring system.
Realizing the combination of face recognition technology and digital monitoring system is an urgent need for the development of the security industry. In a nutshell, the meaning of the combination of the two lies in:
(1) Significantly improve the intelligence of the monitoring system;
(2) Expanding the application field of the monitoring system, injecting new vitality into the development of the traditional monitoring industry, in line with the development trend of the monitoring industry;
(3) Provide users with intelligent video retrieval methods, which significantly improves the ease of use of the system;
(4) Effectively protect the user’s original investment.
Access control/access control system
In addition to the electromechanical control and network communication parts of the access control and access control system, the core of the access control and access control system lies in its identity authentication mechanism and audit verification mechanism. In a typical application environment, the recognition accuracy of face recognition technology can reach a level equivalent to that of fingerprint recognition technology, and its user-friendliness is significantly higher than that of several other biometric recognition technologies. Its moderate price and superior performance can be more recognized by users. At the same time, face recognition technology can be seamlessly integrated with the digital monitoring system, thereby providing a good audit and verification mechanism for the access control/access control system, greatly improving the safety and ease of use of the system.
The importance of biometric technology to the field of information security
With the rapid development of the Internet, network applications such as e-commerce and e-government have also been widely used. How to confirm the real identity of users in a virtual network environment has become the key to network applications. Since April 1, 2005, my country’s first “Electronic Signature Law” has been formally implemented, which provides legal protection for e-commerce and other applications. The security mechanism of the existing electronic banking completely relies on the user account/password/CA digital certificate. Anti-virus experts believe that although online banking uses a variety of security prevention mechanisms, such as CA digital certificates, firewalls, intrusion detection, etc., which are theoretically safe, this security mechanism is mainly applied to the server and protects the client. But they are negligent. Therefore, many Trojan horse viruses similar to online banking thieves steal user accounts and passwords through the client, thereby stealing online banking funds. Account/password, as a kind of private information, should only be held by a legitimate user, but in fact it can be copied/distributed, regardless of whether the dissemination is intentionally or unintentionally leaked, legally or illegally stolen. Although the theft of CA digital certificates is more difficult, it is still unable to prevent illegal attacks or certain types of hacker attacks that can physically access the certificate.
Once an illegal person steals the legal account/password/CA digital certificate, the security mechanism of the online banking transaction system will be in vain, and there is no way to know the true identity of the transaction personnel after the audit results. Therefore, the account/password/CA digital certificate mechanism cannot actually prevent others from illegally stealing or authorizing illegally. With the proliferation of network viruses and hacker tools, the security situation of online banking will face more severe challenges. At present, the most important consideration for online banking is how to ensure the security of the client. According to a survey report recently released by the China Internet Network Information Center (CNNIC), 76% of customers who are unwilling to choose online banking are out of security considerations. Security factors have become a bottleneck hindering the development of online banking, and it is urgent to solve this problem. As a safer and more reliable means of identity authentication, biometrics can be considered to be integrated with the existing security mechanism of online banking to solve many problems existing in the current security mechanism of online banking.
postscript:
One-stop service for all series of IoT products
The main products are high-frequency/ultra-high-frequency readers, handheld data collectors, long-distance card readers, high-frequency and medium-power readers, high-frequency/ultra-high-frequency desktop readers, and high-frequency open access control Attendance channel, UHF anti-theft channel, HF/UHF module, HF/UHF antenna and electronic tag. Many products have obtained EU CE certification, Japan VCC certification, US FCC certification, Taiwan NCC certification, South Korea KCC and EK certification.
The product has been successfully used in logistics management, warehouse management, intelligent transportation, power inspection, product life cycle, anti-counterfeiting traceability, file management, clothing management, library management, logistics training, automation, VIP, electronic payment and other application fields. Unanimous praise from domestic and foreign customers.
[ad_2]