-
Categories
-
Pharmaceutical Intermediates
-
Active Pharmaceutical Ingredients
-
Food Additives
- Industrial Coatings
- Agrochemicals
- Dyes and Pigments
- Surfactant
- Flavors and Fragrances
- Chemical Reagents
- Catalyst and Auxiliary
- Natural Products
- Inorganic Chemistry
-
Organic Chemistry
-
Biochemical Engineering
- Analytical Chemistry
- Cosmetic Ingredient
-
Pharmaceutical Intermediates
Promotion
ECHEMI Mall
Wholesale
Weekly Price
Exhibition
News
-
Trade Service
Fingerprint Identification
In our working life today, whether you are to the bank to withdraw money, to online transactions, or register network services, shopping, or even to visit a friend's office, too many occasions need identity authentication, and the traditional logo-based authentication technology due to the threat of document forgery and password cracking and other means, gradually appear a little weak.
how to protect their important documents, how to ensure that their privacy is not disclosed? In traditional operations, we tend to use password encryption, but this approach may be "anti-gentleman not anti-small people." In the eyes of smart hackers, passwords made up of several characters are vulnerable.
now, the development of technology has allowed us to have a new choice - fingerprint identification encryption products. Applying fingerprint locks to notebooks, chassis, and even mice can protect files, systems, and identify them.Soni's memory stick with fingerprint identification moduleThe concept of fingerprint identification module was first proposed by Toshiba and Mitsubishi in the SD Group, but this time Sony is ahead of the curve, and they have developed a fingerprint identification module based on the memory stick interface and plan to launch it in February.
sony memory stick fingerprint recognition module shape and ordinary memory stick, can be easily inserted into the handheld computer, laptop and other devices with memory stick slots. To solve the problem of the plug-in post-sensing module being covered, Sony will also launch a companion memory stick reader.to protect their laptops with fingerprintsbelieves many notebook users have heard about fingerprint identification cards, and the much-rumoured PCMCIA interface fingerprint identification cards have arrived on the market. Pictured is an EagleTec fingerprint identification card, which connects to a computer and installs the encryption software to encrypt and decrypt the notebook through your fingerprint. Novelty products are always expensive, this PCMCIA interface fingerprint identification card sells for up to 1580 yuan!
optical fingerprint reader is . 20, fingerprint identification does not seem to be 100-000 insurance, if someone stole your finger mold, then open your file is easy. Fortunately, a foot high, a foot high, more "smart" optical fingerprint discernment can let you do not have to worry.
look like a mini mouse with a small window with a bright crystal on it, an optical fingerprint discern. It uses high-tech biological identification technology, through the internal optical sensor CMOS on the blood circulation of living animals, a complete and easy 1 to 1 and 1 pairs of fingerprint images of the match identification.
other fingerprint recognition systems before it are refractive identification systems that can decipher fingerprint passwords if someone else takes your fingerprint. With this optical sensor will not have this kind of problem
Oh! That's it. However, in case one day the finger accidentally hurt, fingerprints have changed, can not open the lock how to do? Don't worry about this, manufacturers have long been considered for the vast number of users. Users are advised to enter two fingerprints, the second of which is an alternate tool. This discernment allows you to select any finger out of ten fingers, and you can choose one finger in each of your left and right hands, but don't forget which one.
of fingerprint recognition technology is . Fingerprint identification technology is the earliest means of identification realized by computer, it is also the most widely used biometric identification technology today. In the past, it was mainly used in criminal investigation systems. In recent years, it has gradually moved towards a broader civilian market.
between 7000 and 6000 BC, the ancient Assyrians and Chinese be aware of the characteristics of fingerprints, and the use of fingerprints as a symbol of personal identity, the middle of the 19th century began to study fingerprints in the scientific sense, and produced two important conclusions: no two finger fingerprints of the same pattern;
these studies have led some governments to use fingerprints to identify criminals. In the field of modern scientific research, fingerprint identification belongs to the "pattern recognition". At the heart of the system is OCR (Optical Character Recognition) technology. By extracting fingerprints from CMOS cameras, entering them into computers, and using a series of sophisticated fingerprint recognition algorithms, modern technology can identify anyone in a very short time. It can be said that fingerprint identification has realized the century revolution in the field of identification.
is there a market for fingerprinting products? After all, not everyone who owns a computer needs to spend a lot of money to protect the system with such a rare hardware device.
to this problem, experts pointed out that at present, this technology has not been widely used in the home, but for the business community, government agencies to provide data protection and control solutions. It can also be integrated into some large security equipment, such as access control, smart buildings and so on. So, its market positioning is also in the commercial aspect.
, however, it is worth looking forward to, with the emergence of this category of products, fingerprint recognition technology to the daily application is not a distant dream. As you can imagine, when this technology is applied in the home field one day, it will bring more surprises and conveniences: such as car theft prevention, ATMs, door locks at home and so on. Isn't it quite ing200s.
the basic principles of fingerprint . In some countries, fingerprints are personal privacy and cannot be processed directly like manual processing, so many biometrics do not store fingerprint images directly.
many different digital algorithms over the years for companies and their research institutions. Fingerprint recognition algorithms are different, but they all come down to finding and comparing fingerprint characteristics on fingerprint images. We define two types of characteristics of fingerprints for fingerprint verification: overall and local.
A general characteristics: Overall characteristics are those that can be directly observed with the naked eye, including: . 1. The pattern other fingerprint patterns are based on these three basic patterns. It's not enough to just rely on the pattern to distinguish fingerprints, it's just a rough classification that makes it easier and faster to search for fingerprints in large databases with more detailed classification. . 2. The pattern area
refers to the area on the fingerprint that includes the overall characteristics, i.e. the fingerprint can be distinguished from the pattern area which type the fingerprint belongs to. Some fingerprint recognition algorithms use only data from the pattern area. SecureTouch's fingerprint recognition algorithm uses the complete fingerprint obtained, not just the pattern area for analysis and identification. . 3. The core
the core point is located at the progressive center of the fingerprint pattern and serves as a reference point when reading and comparing fingerprints. Many algorithms are based on core points and can only process and identify fingerprints with core points. Core points are important for SecureTouch's fingerprint recognition algorithm, but fingerprints without core points can still be processed.
4. The triangle point
triangle point is located at the first fork or break point from the core point, or at the point where the two stripes meet, isolate, turn, or point to these singular points. The triangle point provides the beginning of the count trace of the fingerprint pattern.
5. The number of
refers to the number of fingerprint patterns in the pattern area. In calculating the number of fingerprint tattoos, generally first in the connection of the core point and triangular point, this connection and the number of fingerprint pattern intersection can be considered to be the number of fingerprints. . B Local features
are the characteristics of nodes on the fingerprint, which are called feature points. Two fingerprints often have the same overall characteristics, but their local characteristics-- feature points -- cannot be identical.
fingerprint patterns are not continuous, smooth and straight, but are often interrupted, forked, or discounted.
break points, fork points, and turning points are referred to as "feature points." It is these feature points that provide confirmation of fingerprint uniqueness. The nodes on the fingerprint have four different characteristics:
1. Classification of feature points: there are several types, most typically endpoints and fork points. ends
striped path of the endpoint. fork point
striped path is separated here into two or more lines. points of
the two parallel lines are separated here. isolated
a particularly short pattern, so much so that it becomes a point. the
point is separated into two striped paths, a small ring is merged into one, so that a small ring is called a ring point. short
shorter at one end but not a bit. . 2. Direction: The node can be in a certain direction. . 3. Curvature: Describes the speed at which the direction of the pattern changes. . 4. Location: The location of a node is described by (x, y) coordinates, which can be absolute or relative to a triangle or feature point. review of iris the idea of iris-based identification dates back to the 1880s. In 1885, ALPHONSE BERTILLON applied the idea of using biometrics to identify individuals in criminal prisons in Paris, using biometrics such as the size of the ear, the length of the foot, the iris, etc. Due to technical limitations, iris recognition at that time was mainly based on color and shape information, and information was obtained through human observation.
1987, ophthalmologist ARAN SAF
. IR
and LEONARD FLOM first proposed the concept of automatic iris recognition using iris images, but they did not develop a practical application system. By 1991, JOHNSON at Los Alamos National Laboratory in the United States had implemented an automatic iris recognition system.
this is the first documented iris recognition application. Then, in 1993, JOHN DAUGMAN implemented a high-performance automated iris recognition prototype system. At present, most automatic iris recognition systems use DAUGMAN core algorithms. the
iris is a ring-shaped part located between the black pupil of the eye and the white sclera, which generally presents a radon structure from the inside out, consisting of quite complex fiber
tissues
and contains many interlaced details such as speckles, filaments, crowns, streaks, hidden nests, etc., which are determined in a random combination before birth and remain unchanged for life.
accuracy of iris recognition is the highest of all kinds of biometrics.
, an automatic iris recognition system consists of two modules: hardware and software: iris image acquisition device and iris recognition algorithm. Corresponding to the image acquisition and pattern matching two basic problems. acquisition: from an iris 11mm in diameter, Dr. Daugman's algorithm uses 3.4 bytes of data to represent iris information per square millimeter, so that an iris has about 266 quantified feature points, while general biometrics have only 13 to 60 feature points.
The iris recognition algorithm for 266 quantitative feature points is described in numerous iris recognition technical data, and Dr. Daugman points out that his algorithm allows for 173 independent feature points with binary degrees of freedom. In biometrics, the number of feature points is considerable.
algorithm: . The first step is to locate the iris with a precision camera 3 inches from the eye. When the camera is aimed at the eye, the algorithm gradually aligns the focal length to the left and right sides of the iris to determine the outer edge of the iris, a horizontal method that is blocked by the eyelids. The algorithm also aligns the focal length at the inner edge of the iris (i.e. pupil) and excludes the effects of eye fluid and fine tissues.
monochrome cameras use visible and infrared light, which is positioned in the 700-900mm range (which is the low limit of IR technology, and the American Eye Science Technology Institute used the same range in their macular cysts study). Above the iris, the algorithm subdivides and recombines the iris image by means of two-dimensional Gabor sub-waves, the first subdivided part of which is called phasor, which requires deep mathematical knowledge to understand the principles of two-dimensional Gabor sub-waves. accuracy: iris recognition technology is the most accurate biometric technology, described as follows:
two different iris information have a 75% probability of matching information is 1:106
is the error rate: 1:120000 0
The probability of two different irises producing the same iris code is 1:1052 entry and identification: the positioning of the iris can be completed in 1 second, the time to generate the iris code is only 1 second, the database retrieval time is quite fast. Processor speed is a bottleneck of large-scale retrieval, and the performance of network and hardware equipment also restricts the speed of retrieval.
because iris recognition technology uses monochrome imaging, it is difficult for some images to separate it from the image of the pupil. But the algorithm used in iris recognition allows image quality to vary to some extent.
The same iris produced by the iris code also has a 25% change, which sounds like the Achilles heel of the technology, but in the identification process, the iris code changes only 10% of the entire iris code, it accounts for a relatively small proportion of the code. speech recognition technology is one of the ten most important scientific and technological development technologies in the field of information technology between 2000 and 2010. It is an interdisciplinary subject and is gradually becoming the key technology of human-machine interface in information technology. The combination of speech recognition technology and speech synthesis technology enables people to shake off the keyboard and operate with voice commands. Voice.